Category: Social Science

  • Exploring cyber bullying

    Step 1: Access OverDrive

    • Go to the
    • Locate and open OverDrive
    • Browse or search for a technology-related magazine

    Example (optional): Hackercool Magazine January 2026 issue, Ethical Hacking As A Career Reality Check

    Step 2: Select an Article

    • Choose one article related to cybersecurity, hacking, privacy, or digital identity

    Step 3: Create an MLA Citation

    • Create a proper MLA citation for your article
    • You may use:

    Quick Tip: Evaluating Sources

    You are not expected to be an expert yet. Just start by asking:

    • Who created this content?
    • Why was it created?
    • Can I trust the information?

    A short, thoughtful response is enough for this activity.

    Step 4: Submit the Following

    • A screenshot showing the article in OverDrive
    • The MLA citation
    • Short Responses (75150 words total)
      • Article Summary:
        • What is the title of the article and magazine?
        • What is one key idea from the article?
      • Connection to This Week:
        • Identify one key term from this week (for example: cybersecurity, vulnerability, phishing, digital identity, or online reputation)
        • Explain how it connects to the article or what lesson you learned from the article
      • Credibility Check:
        • Do you think this is a reliable source?
        • Use one factor to explain your answer:
          • author or publisher
          • currency (is it up to date?)
          • evidence or examples

    Tip: A short demo video is provided to help you get started with OverDrive and MLA citations.

    Watch: How to Find and Cite an Article

    Use this short demo video as a guide. It shows how to:

    • Access OverDrive through the VVC Library
    • Find a technology magazine article
    • Create an MLA citation using MyBib

    Tip:

    Watch this video before starting to help you complete the assignment.

  • Dissertation

    Please respond to Mary with 250 words no plagairism, no ai no chat bots

    The dissertation journey is a pivotal moment for those who have successfully defended their doctoral theses. This experience holds deep significance not just for the candidates, but also for their families, friends, employers, and everyone in their support circle.

    Dissertations typically follow five essential sections or steps. Familiarizing yourself with these organized steps is critical, as they will guide you in exploring previous research and inform the writing of your own dissertation. While terminologies may vary across doctoral programs, these sections generally include:

    1. **Introduction**: This crucial part outlines the study’s problem or purpose, articulating the reasons for undertaking the research.

    2. **Literature Review**: Here, you demonstrate how your topic has either not been addressed before or how your work builds upon previous studies.

    3. **Methodology**: This section details the methods used in your research, including data collection instruments, participant selection, and research designs.

    4. **Results**: Present the collected data here, clearly linking it to the methodological framework you set out.

    5. **Analysis**: Conclude with a thorough discussion or summary based on your results, drawing insightful conclusions.

    After diving into literature reviews and examining the work of other researchers, you’ll need to craft your own literature review. Here are important guidelines to structure your review effectively:

    – To gain insights into various literature review formats, study published dissertations available in your subject guide’s Dissertations tab.

    – Compile documents that address one or more themes related to your topic.

    – Structure these documents into a matrix: each row for a document and each column for a topic covered within it (similar to a document-term matrix).

    – While an annotated bibliography summarizes articles, this approach can lead to a fragmented literature review.

    – Alternatively, consider conducting a meta-analysis on results within a specific discipline or theme.

    – A best practices literature review should be developed thematically. Discuss each theme in depth, referencing the relevant documents seamlessly.

    – Assess the strengths and weaknesses of each document related to your theme.

    – In my current position as an IRB administrator, I review dissertation on a daily basis from students that conduct research. Classmates, do you believe that adhering to these guidelines will allow you to create a cohesive and impactful literature review for your dissertation?

    References:

    Covey, S. R. (2006). Tie menestykseen. 7 toimintatapaa henkilkohtaiseen kasvuun ja muutokseen [The Seven Habits of Highly Effective People]. Jyvskyl: Gummerus.

    Li, Kam Cheong (1999). Linguistic Consciousness and Writing Performance. Unpublished PhD dissertation.

  • Research Writing

    • Includes one substantive initial post using at least two scholarly or professional references with accompanying in-text citations to support any paraphrased, summarized, or quoted material.
    • While we prefer not to assign word counts to posts, as a suggested best practice, your initial post should be at least 400 words.
    • Includes an open-ended, thought-provoking question posed to classmates.
    • Scenario: You are the safety and health leader of a major conglomerate that has a global footprint of manufacturing and distributing locations. With approximately 23,000 employees scattered across the globe, you have read a significant amount of research on how to decrease slips, trips, and falls and how to reduce soft-tissue injuries associated with the falls themselves.
      Explain to your peers and professor the level of rigor that you must see in the safety and health research to accept the findings and how strong the research must be for you to put your reputation on the line by implementing this new global program.
    • Please no plagiarism no ai no chat bots
  • dissertation

    please respond to nicolas with 1590 words. no plagairism no ai no chat bots

    A dissertation can be defined as a substantial, original research project that contributes new knowledge or insight to a specific field of study. Unlike prior academic work, a dissertation is not necessarily a demonstration of understanding existing literature, but rather it is an opportunity to identify a gap, investigate it deliberately and systematically, and present findings that advance scholarly or professional practice (Creswell, 2012). In this sense, the dissertation represents both a culmination of doctoral study and an entry point into contributing to the broader body of knowledge.

    Traditionally a dissertation is organized into five chapters, each serving a distinct purpose.

    Chapter 1: Introduction

    The introduction establishes the research problem, purpose, and significance, providing readers with a clear understanding of why the study matters.

    Chapter 2: Literature Review

    The literature review synthesizes existing research, identifying gaps and positioning the current study within the broader academic conversation. This chapter is critical in demonstrating scholarly depth and justifying the need for the research.

    Chapter 3: Methodology

    The methodology chapter outlines the research design, data collection, and analysis procedures, ensuring transparency and allowing others to evaluate the study’s rigor.

    Chapter 4: Results

    This chapter presents the findings without interpretation, focusing on what the data reveals.

    Chapter 5: Discussion and Conclusion

    The final chapter, Discussion and Conclusion, interprets the results, connects them back to the research questions and literature, and highlights implications for practice, policy, and future research.

    Each chapter plays a vital role in ensuring the dissertation is both credible and impactful. Collectively, they guide the researcher through a structured process that emphasizes critical thinking, methodological rigor, and scholarly communication. Valdosta State University suggests that this framework serve as a structured method for effectively presenting research, emphasizing the responsibility of the researcher to communicate complex ideas in a clear, concise, and organized manner throughout the dissertation (Valdosta State University & George Washington University, n.d.). Beyond the document itself, the dissertation process develops essential skills such as problem identification, analytical reasoning, and evidence-based decision-making. Moreover, the purpose of a dissertations has the potential to influence real world outcomes by informing policy, improving professional practices, and addressing complex societal challenges. In fields such as public safety and healthcare, research findings can directly impact organizational performance, leadership effectiveness, and community outcomes. As such, the dissertation process not only refines the researcher but also contributes to societal advancement by generating knowledge that can be applied in meaningful ways.

    My question to the class-

    How can we ensure that dissertations, particularly in applied fields like the fire service or public safety, travel past academic publication to be actively translated into real-world practice and organizational improvement?

    References:

    Creswell, J. (2012). Qualitative Inquiry & Research Design: Choosing Among Five Approaches (3rd ed.) [Online]. Sage Publications, Inc.

    Valdosta State University & George Washington University. (n.d.). Dissertation Guidelines. Retrieved March 27, 2026, from

  • forensic science

    You will need to copy and paste these questions (and all future assignment questions) into a Word document and type in the answers. Use as much space as you need, and please do not put one sentence answers. Make sure you fully answer the question and answer ALL parts of the question . Please use the ch 14 15 powerpoints thats attached there are some you tube videos Please no plagiasrism, no ai. no chat bots


    .Chapter 14: Metals, Paint and Soil

    Chapter 15: Forensic Serology

    1. What is a trace element and why are trace elements important in analyzing physical evidence?
    2. How does the way most automobile manufacturers paint their cars help in the forensic comparison of automobile paint?
    3. Why is layer structure important for evaluating the significance of paint evidence?
    4. What is PDQ and how is it used in identifying paint samples?
    5. Where is most paint evidence likely to be found?
    6. Why should paint evidence from a hit and run accident be collected close to the area on the car suspected of being in contact with the victim?
    7. How can soil evidence be valuable even if the site of the crime has not been ascertained?
    8. Why is soil collected from a suspect’s automobile left in lump form?
    9. What is an antigen and how is it useful in individualizing blood?
    10. What are THREE questions criminalists must be prepared to answer when examining dried blood?
    11. List two commonly used color tests for blood. How does a luminol test differ from these tests?
    12. What is a genotype and how do parents’ genotypes affect the blood typing of their offspring?
    13. List THREE reasons why spermatozoa are often not found in seminal fluid collected at a crime scene.
    14. Why is it important for investigators to seek information about when and if voluntary sexual activity last occurred before a sexual assault?
    15. What is an antibody, and what happens when an antibody reacts with its specific antigen?

  • Dissertation

    In your initial post, discuss what a dissertation is. In other words, how would you define a dissertation, what are the 5 chapters in a dissertation and why we have each one, and finally what we hope to learn through the process of writing a dissertation (and how it improves society). Please no plagiarism, no AI No chat bots

    • Includes one substantive initial post using at least two scholarly or professional references with accompanying in-text citations to support any paraphrased, summarized, or quoted material.
    • While we prefer not to assign word counts to posts, as a suggested best practice, your initial post should be at least 350 words.
    • Includes an open-ended, thought-provoking question posed to classmates.
  • social works practice with families and groups

    it should be to social works practice with families and groups

    This is a post for students to discuss their interests and brainstorming ideas. Think about:

    What kind of group would you like to propose?

    What kind of topics would you like to cover for each session? (typically 6 sessions)

    What is the recruitment criteria for the group (age, experience, mental health, marital status, roles etc.)?

    How often would this group run? For how long? How many sessions (at least 6)?

    How would you evaluate the group?

    How would you advertise?

    Where would you have the group?

    What other resources are needed for the group (paper, snacks, babysitting, etc.)?

    Is this an open or closed group?

  • computer ethics

    please respond to tyler with 150 words please no plagerism,no a i no chat bots

    I am choosing to use Cybersecurity, Hacking, and Digital Identity as my resource, as it is becoming increasingly important as technology progresses to get a good understanding of these topics. The key ideas of Cybersecurity, Hacking, and Digital Identity involves understanding how you can protect yourself online by knowing what kind of attacks and defenses are out there. It also describes in detail what personal information of yours is available and how it can be used online.

    Guiding questions:

    Why is cybersecurity important?

    Cybersecurity is very important, especially nowadays when most things we do rely on being connected to the internet or some sort of electronic device. Without cybersecurity jobs and protocols, hackers can easily acquire someone’s personal data, or mess with an entire business causing disruption to their sales or hurting their reputation. Our national security and public infrastructure are also heavily reliant on cybersecurity to keep these services running smoothly.

    Where do cybersecurity risks exist?

    Cybersecurity risks can be found in any digital system that stores data online. These risks can also increase based on flaws in a system that can spread if they are connected like in a supply chain or a government sector.

    Real-world connection: Knowing how to protect myself and many of my accounts online is something I take great care of, because if you don’t, you are basically leaving the front door open for people who wish to steal your information. If an account were to get hacked due to poor security, it is something you need to act on quick even if it takes a lot of time. For example, I know someone who got their Xbox account hacked because they didn’t have a lot of security on it. Eventually they got it back, but it took months of trying to prove it was really their account.

    Reflection on ethics: When it comes to your account safety, both the individual and the company you are giving your information too are responsible for it. Companies specifically have the responsibility to be transparent with the user and to keep your information safe and only use it when authorized and is absolutely needed. Meanwhile, the individual is the one responsible for using as many security measures as the company allows, making strong passwords, and being aware of potential issues that pop up. This shared responsibility provides comfort and trust between individuals and the company so that we can enjoy ourselves safely and not need to worry about attacks on our digital and real-world identities.

  • computer ethics

    Please respond to cisco with 150 words no plagiarism, no a i. no chat bots

    One of the resources that really stood out to me this week was the CISA Digital Identity and Secure Our World guidance, because it clearly shows how user behavior plays a major role in cybersecurity and ethics.

    One of the main concepts emphasized by CISA is that protecting digital identities is not simply a technical task handled by organizations. It also depends on how people interact with technology on a daily basis. Actions such as enabling multi-factor authentication (MFA), using passkeys, and recognizing phishing attempts can all help reduce cyber attacks. This demonstrates that cybersecurity is a shared responsibility between individuals and organizations.

    In my own technology use, I rely most on my gaming account, email account, and social media accounts. If any of these were hacked, it would be extremely disruptive, especially since my email account is used for account recovery for almost everything else. I have received phishing emails before, one example was an email that appeared to come from Microsoft, but it was misspelled as Mlcrosoft. Because of experiences like this, I do not open emails unless I am expecting them, and I always carefully read the information before clicking anything. I have also started using second-step verification and passkeys, which has made me feel much more secure.

    Regarding my digital identity, I know that some information about me is already online, such as old photos from when I used to hang out with friends. However, the part of my digital identity that I believe is most vulnerable is my passive data, since I dont care about hiding my browsing habits or online activity. When I was younger, I reused passwords across multiple accounts, but I am now transitioning everything to passkeys, and MFA which is much more secure.

    From an ethical perspective, I believe responsibility for a compromised account is shared between individuals and companies. Many users assume that a strong password is enough and trust that large corporations are properly protecting their accounts. At the same time, companies have an ethical responsibility to treat user data as a trust rather than just an asset. A real-world example of this is the AT&T data breaches, where sensitive customer information was stolen.

    I was personally affected by the AT&T breach. My Social Security number was compromised and used for employment, which I discovered when I applied for a program and nearly lost my eligibility because my SSN was already in use. This experience made the risks of cybersecurity failures very real to me, and it has motivated me to educate my family members who may not fully understand these threats.

    After reflecting on this weeks assignments, one security habit I plan to implement is closing old accounts that I no longer use, since unused accounts can still be compromised. The easiest habit for me to follow is enabling MFA because it’s straightforward and effective. The most difficult habit is keeping my systems fully updated because, as a computer and gaming enthusiast, I know updates can sometimes interfere with programs or games that are working perfectly.

    Overall, I believe ethical cybersecurity behavior is important for my future career and reputation. I cannot advocate for security if I do not practice it myself. As the digital world continues to grow, maintaining ethical cybersecurity habits helps build a white-hat reputation, which is essential for trust, credibility, and long-term advancement.

  • computer ethic

    This weeks discussion focuses on cybersecurity, digital identity, and ethical responsibility. As you explored in the readings and materials, protecting digital systems is not just a technical issueit also involves ethical decisions made by individuals, organizations, and society. In this discussion, you will choose one resource and analyze how cybersecurity concepts connect to real-world behavior and ethical responsibility. Please use Resource attached below . Please no Plagiarism, no ai, no chat bots.

    Important Reminder: Posting Deadlines Matter

    Because discussions depend on interaction with your classmates, it is important that everyone posts on time. Posting your initial response by the deadline allows others enough time to read your ideas and respond thoughtfully. Late initial posts make it difficult for meaningful discussion to occur.

    Step 1: Choose ONE resource from this week:

    • The textbook reading: Cybersecurity, Hacking, and Digital Identity
    • The video: The Code of Honor: Expert Insights on Cybersecurity Ethics
    • The SANS Institute website
    • The CISA website or Digital Identity resource

    In your post:

    • State which resource you chose. Provide a brief summary of the key idea(s) in your own words.
    • Answer at least TWO guiding questions associated with that resource. Use the questions provided in the weekly materials to support your response.
    • Make a real-world connection:
      • How does this topic relate to your own technology use?
      • Have you seen or experienced something similar?
    • Reflect on ethics:
      • What ethical responsibility do individuals or organizations have in this situation?
      • Why does this responsibility matter?ssdd

      d

    • dd
    • ddBelow are the resources you can choose from