Db 1
Suppose that during regular work hours, an employee of XYZ Co. commits a sexual assault or other violent attack upon a member of the public. The employee, of course, is liable for the intentional tort of battery (about which you learned in ( Chapter 6), as well as a criminal offense. Although the doctrine of respondeat superior makes employers liable for their employees’ torts when those torts are committed within the scope of employment, XYZ is quite unlikely to face respondeat superior liability for its employee’s flagrantly wrongful act because a sexual assault or violent attack, even if committed during regular work hours, presumably would be outside the scope of employment.However, as the principles explained in this chapter suggest, XYZ could be liable for its own tort if XYZ was negligent in hiring, supervising, or retaining the employee who committed the attack. A determination of whether XYZ was negligent would depend upon all of the relevant facts and circumstances.Regardless of whether XYZ would or would not face legal liability, the scenario described above suggests related ethical questions that may confront employers. Consider the following:Does an employer have an ethical obligation to take corrective or preventive action when the employer knows, or hasreason to know, that the employee poses a danger to others?Does it matter whether the employer has irrefutable evidence that the emplovee poses a danger. or whether the employer has only a reasonable suspicion to that effect?Does it matter whether the employer has irrefutable evidence that the employee poses a danger, or whether theemployer has only a reasonable suspicion to that effect?If the employer has an ethical obligation to take corrective or preventive action, to whom does that obligation run and what should that obligation entail?Does the employer owe any ethical duty to the emplovee in such situations?You may find it helpful to consider these questions through the frames of reference provided by the ethical theories1 page response
"Looking for a Similar Assignment? Order now and Get 15% Discount! Use Code "FIRST15"


Recognizing the Need for Change
Primary Discussion Response is due by Thursday (11:59:59pm Central), Peer Responses are due by Saturday (11:59:59pm Central).Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.Additional Information:Leroy Banks is the Director of Change Management for Red Carpet, a national hospitality and entertainment company. He has contracted you to be an OD Consultant because Red Carpet has recently acquired a movie theater company and needs to manage the change process. External forces for change are those that come from an organization’s outside environment. Internal forces for change are those that arise from employees within the organization. Leroy has asked you to begin by assessing forces for change.Review the Red Carpet scenario for this course and with your classmates; discuss the following:Identify and describe an example of an external force for change.Identify and describe an example of an internal force for change.In your opinion, what are the biggest challenges of being in the role of an OD Consultant at Red Carpet?
"Looking for a Similar Assignment? Order now and Get 15% Discount! Use Code "FIRST15"


reply 2
Heart disease is one of the highest causes of death in the state of Florida. One of the heart diseases I would like to focus on is stroke. A stroke is a medical emergency and individuals should understand what to do in order to prevent one from occurring. When there is a blockage of blood supply to any part of the brain, a stroke is eminent. One form of primary prevention is measuring blood pressure and cholesterol levels. Lowering blood pressure in individuals can prevent ischemic and hemorrhagic strokes from taking place. A primary public health intervention can include screening people in low-income communities for risk factors. This may provide an opportunity to detect the people who are at higher risk.Surveys can be distributed to communities that ask questions regarding the patient’s diet, lifestyle, their physical activity, and information such as alcohol and smoking use. In the case that a stroke has occurred, a secondary intervention would involve treating the patient with medication such as antihypertensive and statins, which aid in lowering cholesterol and protecting against another stroke. Tertiary measures focus on preventing another stroke and in reducing disability by rehabilitation. This can be accomplished by creating a plan tailored to the patient with the goal of improving their quality of life and rebuilding their independence. Public health officials can come together to create support groups within the community for those patients who have experienced strokes and can educate the public on certain behavior changes to keep them on the right track.
"Looking for a Similar Assignment? Order now and Get 15% Discount! Use Code "FIRST15"


yhtomit 9
Zero-Day exploits and Cyber Weapons300 wordsapa formatdue weduse sources listed belowAnalyze the significance of the STUXNET malicious code events in Iran, and the significance of the Dragonfly malicious code currently found in the US and Europe (Do not dwell on describing the effects, instead describe the significance).Analyze the effects of the global market for sale of ZDEs. Can the proliferation of ZDEs and cyberweapons be controlled or managed by a treaty similar to the Nuclear Non-proliferation Treaty? Is it possible to keep a count of cyber weapons the same way we can monitor nations to count their nuclear weapons? Explain your answer.Describe the characteristics and possible effects on computer equipment and businesses due to a cyberattack using Electromagnetic Pulse (EMP) or Microwave Directed Energy. Compare those characteristics and effects on computers to the traditional effects that are commonly associated with a malicious code cyberattack. Look up the costs for various commercial EMP devices found for sale on the Internet.SOURCEShttps://papers.ssrn.com/sol3/papers.cfm?abstract_id=1830625https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2122666https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2107008https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1905000
"Looking for a Similar Assignment? Order now and Get 15% Discount! Use Code "FIRST15"


wk 2 discussion 2
Post a description of how practitioners in each of the two fields might approach the situation. Then, compare and contrast the practitioners’ approaches to the Japan tsunami. Expand on your insights utilizing the Learning Resources.
"Looking for a Similar Assignment? Order now and Get 15% Discount! Use Code "FIRST15"


DQ3/4
Q1 (3)There have been several individuals who have leaked highly classified (top-secret) material to the public in recent times, including Edward Snowden (former National Security Agency government contractor) and Bradley Manning (former U.S. Army service member). Each have been accused of violating the Espionage Act of 1917. Do you believe that the federal government needs to amend the act to further outline the legality of leaking electronic documentation to the public (United States and abroad)? Why, or why not? What additional safeguards should the federal government put into place to prevent classified materials from falling in the hands of the media or our foreign adversaries?100 WORDS EACH ANSWERQ2 (4)The emergence of technology, software, and hardware has made it very difficult for local, state, and federal law enforcement and intelligence agencies to investigate acts of terrorism. As an example, the Federal Bureau of Investigation (FBI) attempted to gain access to Syed Rizwan Farook’s cell phone shortly after the San Bernardino terrorist attack that killed 14 individuals and wounded 22 others on December 2, 2015. The FBI was initially unable to access the data on the cell phone because of Apple’s lock code and iOS on the iPhone. The FBI demanded that Apple assist in the investigation and provide access to the cell phone. In short, this led to a public debate between Apple and the FBI regarding privacy and intelligence-gathering. Do you believe it is important for manufacturers such as Apple, Google, Amazon, and others to provide a “back door” in order to assist local, state, and federal law enforcement and intelligence agencies in the investigation of domestic and global terrorist attacks? Why, or why not?
"Looking for a Similar Assignment? Order now and Get 15% Discount! Use Code "FIRST15"

