Research Project & Paper

 

Cannabis use disorder

 

All papers are to be written in APA Format.

 

– Minimum of Five Pages in Length

 

– General Overview of the Disorder

 

– Treatment/Medication

 

– Research/Studies/Literature Review

 

– Any controversies, important historical information regarding treatment?

 

References should include books, journal articles, and creditable websites. 

1.  Read the two articles below that discuss why fuel prices fluctuate. Research two of these types further.  

 

2. Locate two JOURNAL articles which discuss this topic further. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology.  

 

3. Summarize these journal articles. Please use your own words

A. On the discussion forum, please describe the reasons for having a totally anonymous means of accessing the internet. Please also discuss the dangers of that same internet. Minimum 250 words.

B. Respond to two classmates’ postings. Minimum 100 words per posting.

 

REPLY – 1

 

Anonymity means the state of being unrecognized. On the internet, it is used to refer to the ability of an internet user to access a site on the internet without his/her identity being established. There are some reasons as to why people prefer being anonymous on the internet. Some of these reasons include;

First is the desire of protecting the identity. Although one might not be undertaking any illegal activity, everyone needs some aspect of privacy. There are some social classes that people attain that call for this king of concealed identity. People who are introverts tend to like carrying out their activities incognito. The other need for anonymity is the need to avoid personal harassment that comes from online attacks due to an individual’s opinions. At times when one gives their views via social media, the opponents to that opinion might bash the proponent, leading to damage to his reputation (Christopherson, 2007). However, once a person has hidden his/her online identity, such attacks will not be directed to his identity. Lastly, anonymity helps to conceal the identity of people who may need to ask very sensitive questions via the internet. For instance, one may need to inquire from health experts via the online platforms concerning his/her health conditions and the possible symptoms of some disease. People feel more comfortable when they do this incognito.

Some of the dangers that come along with the use of the internet include cyber threats and cyberbullying. Here, the security of one’s personal information is put at risk due to the possibility of phishing. Also, internet users may, at times, bully a person by spreading false information about them (James, 2008). Furthermore, cases of sexual abuse by people taking part in online dating have been on the rise. Exposure of children to the internet has also led to moral decadence. This is why a need arises to come up with measures to mitigate some of these problems.

References

Christopherson, K. M. (2007). The positive and negative implications of anonymity in Internet social interactions: “On the Internet, Nobody Knows You’re a Dog.” Computers in Human Behavior, 23(6), 3038-3056.

James, J. (2008). Digital divide complacency: Misconceptions and dangers. The Information Society, 24(1), 54-61.

 

REPLY – 2

 

In today’s world, all of us are dependent on the Internet for various reasons. It’s main ability to connect people via electronic devices; to have information available to many of us and major source of entertainment. However, it is to be noted that there are disadvantages due to internet as well. They include malware, cyber-attacks, security issues, etc.

Keeping that in the mind, user privacy is a major concern. Data can be accessed by any hacker to misuse it. To reduce such activities, anonymizer services, have been introduced. Although they serve the purpose but then they do have their own disadvantages as well.

HTTP, the hyper text transfer protocol, allows you to get HTML documents and is a client-server protocol, which will allow user to access the documents accessing via a web browser through a request and response cycle. Even though HTTP is simple, extensible and stateless, it doesn’t store any information that is sent to the server.

An anonymizer is a proxy tool which helps to make the attempts made on the internet untraceable. Using of an anonymizer will help to reduce risks to some extent and avoid thefts. Data anonymization is a process implemented to protect data. It protects data by either encrypting the data. (Eckert C., Pircher A., 2001)

There are different levels of anonymity. They are defined as below

Level 1: Pseudo-anonymity with respect to the communication partner

Level 2: Pseudo-anonymity with respect to the anonymizing service

Level 3: Anonymity with respect to the communication partner

Level 4: Anonymity with respect to the anonymizing service

Level 5: Anonymity with respect to third parties

Level 6: Anonymity with respect to the anonymizer

There are different kinds of anonymizer services. They are Log-file anonymizer; proxy anonymizer and the web anonymizer. Developed for the Apache Web server, the log file anonymizer, preserves the privacy of user’s data. The proxy anonymizer will receive requests and forwards them to the original proxy server after hiding and modifying the information that was sent.

It is to be considered that there are problems with the anonymity of the data. They are re-identification. In case of a health care organization, data security and privacy are very important. Data masking doesn’t use metrics to measure the actual risk of re-identification and they deal with direct identifiers, which is a potential issue as to uniquely identify the data, identifiers such as name, email or social security number, etc. and if such data is eliminated, it is surely is an issue. To avoid such instances, data masking needs to be done to fields that don’t need any analytics. (Privacy Analytics, 2017).

References:

Eckert C., Pircher A. (2001) Internet Anonymity: Problems and Solutions. In: Dupuy M., Paradinas P. (eds) Trusted Information. SEC 2001. IFIP International Federation for Information Processing, vol 65. Springer, Boston, MA

Privacy Analytics. (Jan 9th, 2017). The Problem with Data Masking Techniques. Retrieved from https://privacy-analytics.com/de-id-university/blog/problem-data-masking-techniques/

 
 
 

Read/review the following resources for this activity:

 

 

Introduction
This assignment is designed to have you identify the components of a scientific experiment. If you are having some trouble identifying the variables in the worksheet, have a look at the video link above.

 

Activity Instructions
Download the week 4 worksheet from the Course Document folder. Create another separate Word document with “week 4 worksheet” as the title and include your last name. Then, answer the questions in the worksheet in the separate document. Make sure you number your answers so they can be matched up with the correct questions.

 

Writing Requirements (APA format)

 

  • Complete the provided worksheet
  • Your work should be uploaded in a separate Word document
  • 1-inch margins
  • Double spaced
  • 12-point Times New Roman font

 

Grading and Assessment

 

  • This assignment will be graded based upon how well you answered the questions in the worksheet. Also, the correctness of the provided answers will affect the grading as well.

 

Course Learning Outcome(s): 1, 2, 3, 5, 7
1.   Understand the language of research.
2.   Evaluate the validity of how concepts are measured
3.   Understand and apply the scientific method to answering research questions.
5.   Develop verbal and written communication skills
7.   Critically evaluate research, being able to differentiate shoddy research from good research 

Reply to the students responce in 150 wprds provide 1 refernce

 

 

 

 8. Equity financing can come from external or internal sources. Which of these is the least expensive and why?

 

Internal sources of finance can be manipulated more. A business has some say in when they pay their bills, like the beginning or end of a month or as installments. They can earn cash from customers on their time table, assuming the customers pay. If a company can collect their funds faster, then they will have more time to invest before having to pay bills. This can be done by offering customers incentive to pay sooner, like a small discount for paying in full in a set count of time. Benefits of internal sources are that the profit can be reinvested which can provide a return to investors which can then invest more which helps the company grow, internal sources do not have to be repaid, and there is no interest charge. A downfall is that the capital is limited by the already generated revenue. External source of finance are sometimes used if a company cannot gain enough from their internal capital generating streams. An example of an external source of finance would be a loan. They could also use a bank overdraft which is where the frim would only borrow the money it really needs, however this is expensive and banks often want the money to be paid back very quickly. They could use trade credit which is a good way to provide short term capital, but other companies may not want to trade with them if their payback period is not fast.

Watch this movie “The Imitation Game” then provide your feedback in APA.

 

Trailer  https://www.youtube.com/watch?v=nuPZUUED5uk

 

  1. Who is Alan Turing?
  2. What is the Enigma machine?
  3. How was encryption used during the war?
  4. How were the messages deciphered?
  5. What points were interesting to you?
  6. Anything else you would like to discuss?

 

  • 5 pages
  • Full APA
  • In-text citations
  • References 

Topic about The Big Short

 

 Approved and integrate Risk from chap 12 and homelessness—–Many families currently share one home to make affordable!—– 

 

1.     Identify a Health, Human or Ecological Topic for Analysis.

 

 

2.     Describe the topic and how it relates to the Course, Course Concepts and/or principles.

 

3.     Analyze the Decision-Making Process (Human) or the Environmental (Ecological) application that is used for your topic

 

 

    4.     What is the reason for your interest or analysis?

 

 

5.     What changes or recommendations should be made?

 

6.     Would you try to influence your area of interest? 

 

Why or why not? How?  

 

Note: The 6-8 page paper must be typed (12-14 point font), with separate reference (scholarly using MLA, APA or Scientific) and title page.

 

Thoughts:

 

1) Term Paper for Health; Water or Air Quality(Indoor), Asthma, Food Safety, Nutrition , GMO’s vs Organic, Obesity, Drugs and addictions

 

2) Term Paper for Human Ecology; Poverty, Housing, Wastes, Sanitation, Food Security  and, Human Hazards (Radiation, and Pesticides); or School Dropouts, Juvenile delinquency and Crime

 

3) Natural Hazards (Fire, Flood, Freezing, Earthquakes), and Disease epidemiology (Ebola, malaria etc.)

 

4) Science information/data/research can be used for advocacy of a special interest group, showing differences of expert s, contrasting positions and taking-sides or showing the trade-offs.

 

 

 

How are Impacts or hazards measured or assessed? i.e. cost-benefit analysis, risk assessment, or health/ecological thresholds/indicators.

 

 

 

What are the time frames for decisions? Emergency, Law Enforcement procedures, planning process

 

 

 

Is there an environmental health strategy; Health Education/Promotion, Design with Nature, pollution prevention, or environmental enhancement.

 

Reply to students responce and provide 1 reference

 

1) If you were evaluating an investment opportunity, which technique would you use and why?

If I was evaluating an investment opportunity for my company, the technique I would use would be the Net Present Value (NPV). Whenever a company is looking for different investment opportunities, it is crucial for them to calculate the Net Present Value of that investment because it represents the present value of all of the projected cash inflows. As a matter of fact, the concept of Net Present Value Rule (NPVR) states that a company should only invest in opportunities that have a positive Net Present Value because it shows that “theoretically” (there are no certainties in investments) they’ll be profitable, however, an investment with a negative net present value will ultimately result in a loss for the investor.

3) You are comptroller for your company. The CEO is a savvy individual with great instincts for the business. She strongly favors an investment that is only marginally acceptable at best. She has asked you to put together justification for it. What will you do?

If I was the comptroller of my company and my CEO wanted to proceed with an investment that was only marginally acceptable, and then asked me to put together a justification for it; I would have to have a very strategic plan if I wanted to keep my job (I would also begin to improve my resume). First and foremost, it is my responsibility as the comptroller to make sure that the company is investing in ways that will be profitable, financially viable, and overall beneficial for the company. I would begin by doing my research to find different investment opportunities that were more secure and yet still had a decent rate of return for our investment. As the say goes, always bring solutions to problems. I would then approach the CEO letting her know my concerns with the marginally acceptable investment, what things are wrong with proceeding with that investment, and then following on by showing her the investment opportunities that I found that were much safer and a better investment opportunity overall.

5) Last year your company financed its investments by selling shares of common stock. This year the plan is to use debt. The after-tax cost of debt is 5%, the cost of equity is 12% and the weighted average cost of capital is 9.5%. The first investment for this year is an expansion project. What cost of capital will you use and why?

For our expansion project investments this year, the cost of capital that we will be utilizing will be the Weighted Average Cost of Capital (WACC). Whenever you are looking for the most accurate and total picture of the cost of capital, look no further than the Weighted Average Cost of Capital which would be 9.5% for the upcoming year. WACC is widely used and accepted among almost all financial analyst today and it is an important calculation. It is very useful for companies when evaluating prospective projects and what risk that they will have on the company.

 

Topic about Hungry Planet: What the World Eats by Peter Menzel, Faith D’Aluisio

1.     Identify a Health, Human or Ecological Topic for Analysis.

2.     Describe the topic and how it relates to the Course, Course Concepts and/or principles.

3.     Analyze the Decision-Making Process (Human) or the Environmental (Ecological) application that is used for your topic

    4.     What is the reason for your interest or analysis?

5.     What changes or recommendations should be made?

6.     Would you try to influence your area of interest? 

Why or why not? How?

Note: The 6-8 page paper must be typed (12-14 point font), with separate reference (scholarly using MLA, APA or Scientific) and title page.

Thoughts:

1) Term Paper for Health; Water or Air Quality(Indoor), Asthma, Food Safety, Nutrition , GMO’s vs Organic, Obesity, Drugs and addictions

2) Term Paper for Human Ecology; Poverty, Housing, Wastes, Sanitation, Food Security  and, Human Hazards (Radiation, and Pesticides); or School Dropouts, Juvenile delinquency and Crime

3) Natural Hazards (Fire, Flood, Freezing, Earthquakes), and Disease epidemiology (Ebola, malaria etc.)

4) Science information/data/research can be used for advocacy of a special interest group, showing differences of expert s, contrasting positions and taking-sides or showing the trade-offs.

How are Impacts or hazards measured or assessed? i.e. cost-benefit analysis, risk assessment, or health/ecological thresholds/indicators.

What are the time frames for decisions? Emergency, Law Enforcement procedures, planning process

Is there an environmental health strategy; Health Education/Promotion, Design with Nature, pollution prevention, or environmental enhancement.

 
 
 

Background: The amount of personal information available on the Internet is frightening. Anonymous users can discover your name, DOB, place of address (with photo), email address(es), dating profiles, phone number, likes, dislike, family relatives, social media accounts, and photos …the list goes on and on.

 

Requirements: Using https://osintframework.com/ , or other tools (ex. Google), research the information available on yourself. Try to find all of the information listed above (even if some of it might be inaccurate) and make sure to list the sites (URLs) you found it on. If you cannot find a specific information, explain what you tried to do in order to find it. Then, answer these four questions:

 

  • What are the advantages and disadvantages (or dangers) of these tools?
  • Were you aware that this information was online?
  • Does knowledge of this information on these sites make you vulnerable?
  • What steps could you take to make this information harder to obtain? (give example of actual, specific steps)

 

There is no specific number of pages for this assignment. It has to have enough pages to prove your point and to cover all the requirements.