SlideShare a Scribd company logo
Running head: CYBER SECURITY
1
CYBER SECURITY/EMERGENCY MANAGEMENT POLICY
2
The term "Running head" is formatted as Running head:
Cyber Security/Emergency Management Policy
American Public University (EDMG 600)
Dr. Darrell Dantzler
05/09/2018
Cyber Security/Emergency Management Policy
Begin the paper with an introduction of your topic. An
introduction has an attention getter, purpose or thesis statement,
and an overview. An attention getter can begin with any of the
6 ways: (1) Anecdote, (2) Question, (3) Quotation, (4) Humor,
(5) Shocking Statistic, or a (6) combination of them
(http://classroom.synonym.com/5-types-attention-getters-
essays-2877.html). After you introduce the topic, state the
purpose of the paper. The purpose can be as simple as restating
the objective of the assignment. The purpose of this paper is to
(state purpose). (Overview) The paper will address the
following: (List topics)
Part 1
After reading Moore at al. (2010), Goodyear, Portillo, Goerdel
& Williams (2010) and Deloitte-NASCIO (2013), develop a
cyber security/EM Policy Analytical model in which you will
recommend and justify the most effective way to manage
emergency management related cyber security issues at
the state level.
Cyber Security
Cybercrimes are increasingly becoming more common in all
sectors in the world. This has made cyber
security a top agenda for everyone in the world. This has
resulted in the conventions and creation of agencies and
structures that will facilitate cyber security (Deloitte-NASCIO.
2013, p 16).According to the author, a number of cyber laws
have been formulated and more are being formulated to handle
this challenge. For this matter, protecting our companies from
various incidences of cyber-crimes, we will need to formulate
clear and organised policies that will pit every structure in place
to check the menace (Deloitte-NASCIO. 2013, p 34).Since
internet is a gala for vast information in which everyone and
business navigate through, with different intentions, protecting
personal and company sensitive information is increasingly
becoming a challenge (Moore et al., 2010, p 56). Cyber security
policy will try to track the paths of the internet users in order to
control their navigation and keep it on the recommended or
acceptable tracks. Allowing internet users to deviate from the
pre-determined and acceptable paths, as are stipulated in the
policy, will lead to discrepancy in the use of information on the
internet thus risking accessibility and sharing of sensitive
information without permission (illegal). When personalised or
sensitive information reached the public pages of the internet, it
becomes irretrievable and loses secrecy. This is the major
concern of most governments. Hackers have been able to exploit
the Operating System (OS) of people’s computers, accessing
and leaving the gathered information in the public domain and
attackers (Goodyear et al., 2010, p 36).
Cyber security/Emergency Management Policy
A number of policies need to be put in place to bar internet user
and the hackers from accessing, gathering and sharing
personalized or sensitive information to the public or exposing
it to the hackers. Most citizens are not conscious of the existing
cyber security policies and so still believe that it is the work of
the government to ensure internet is free from hackers and that
their information is safe.
Policies Recommendation
The policies
I will recommend are, educational or capacity building among
the internet users’ policy, the continuous cyber security
research framework, incident response, personal device use,
email, data sharing
and security of devices policy.
Justification of Policies
As a government with such a challenge, the most profound
policy will be education awareness
policy. Educational program will be aimed at sensitizing
individuals about their specific roles in cyber security and
personalized or sensitive information protection (Goodyear et
al., 2010, p 45). Educational campaigns can also be used to
create awareness about information encryption, sharing and
other sensitive cyber security concerns in order to help them
become more conscious internet users who understand the
detrimental effects of not taking measures to secure sensitive
information from hackers. This is especially good in this times
as the world of social media, e-commerce and digitization of
most of the sectors in the world is taking place. Most of this
information will need to be protected and kept at bay from the
attackers (Deloitte-NASCIO. 2013, p 12).
Establishment of a continuous cyber security framework
is important and will help to critically look into the emerging
techniques and the recurrent trends in cyber security and also
assist in the designing emergency management systems that will
reduce the damage in the event the attack occurs (Moore et al.,
2010, 48). The framework will ensure a specialized plan is put
in place in order to address cyber security concerns. It will
facilitate local and state level cyber security structural
formulation, establishment of cyber security agreements,
coordinating all state entities to realize synergy as they work
together and involvement of the private sector in order to fight
the wide scope and growing cyber security concerns (Goodyear
et al., 2010, p 24). This will facilitate sharing of cyber security
information (attack and threats information) thus pooling
together resources to fight the cyber risks and reduce the
damages associated with it. According to Goodyear et al. (2010,
p 25), formation of a partnership between the private sector and
the public sector and coordinating the federal resources and the
state will be paramount.
Incident response policy will facilitate federal and national
awareness of their responsibilities in use of intervention tools in
the response towards a cyber-attack. The policy will level
communication grounds and establish a formidable structure in
order to alleviate breakdown in outreach program about cyber
threats and response actions during an attack in order to achieve
high responses and quick action. Response policy to address
agency tactic gaps and lack of intervention tools and will also
enforce other tactical responses. It will enhance roles of the
state, federal agencies, managers and facilitate efficient
decision making process among the agencies during the attack
(Goodyear et al., 2010, p 29).
The policy governing use of personal device will restrict the use
of personal devices to access company information, unless it is
a closely monitored and safely kept device. The devices should
protected
by passwords, will encourage the use of safe networks only,
keep security software updated and upgraded and also ways to
lock the devices when not in use (Moore at al., 2010, p 102).
Emailing and data sharing policy is a good policy that will
ensure emailing, data sharing is monitored, including the
protection of the devices being used. Moore at al. (2010, p
33),recommends that the company should put in place a policy
that discourages opening of attachments sent to the company
unless the source is known and is safe. The massagers will be
prompted to identify the inconsistencies and identifies of the
senders. Data sharing should only be done using the company
network and lastly, a disciplinary action policy. A number of
warnings, termination of employees and networks, evaluation
and case-by-case assessment of the breach will be conducted
(Goodyear et al., 2010, p 45).
References
Goodyear, M., Goerdel, H., Portillo, S., & Williams, L. (2010).
Cybersecurity management in the states: The emerging role of
chief information security officers. Retrieved from
Deloitte-NASCIO. (Date). “
2014 Deloitte-NASCIO Cybersecurity Study: State Governments
at Risk: Time to Move Forward,” Deloitte Developmental LLC,
October 2014,
http://www.nascio.org/publications/documents/Deloitte-
NASCIOCybersecurityStudy_2014.pdf
Moore, T., Pym, D. J., & Ioannidis, C. (2010). Economics of
information security and privacy. Springer.
Part 2
After reading the article, respond to the followingfour questions
bellow.Separate each response with the sub-headed question
statement):
Way forward for cyber security
According to me, cyber security need to be devolved to
individual companies and internet users but at the same time
monitored by both private and governmental agencies
collaboratively (Jayawardane et al., 2015, p 23). This should be
formulated in a clearly guided policy in which pre-determined
super governing agreements will be entered into among the
agencies in order to ensure every party plays its role. This will
help pool resources and intervention tools together and fight a
common battle through a common channel and thus reducing
inter-agencies supremacy and tactical battles thus mitigating the
effects of cyber incidences and reducing the threats (Carr, 2016,
p 56).
Applicability of traditional regulatory model
Yes! A traditional
model will work in this space. The model will bring together the
federal and state governments on one table, and partner with the
private sector to fight the common battle with a common goal
(Jayawardane et al., 2015, p 46).
Need for a new cyber security model
Yes! A newer model to fight the 21st century cyber security
issues need
to be developed. This model should incorporate the traditional
model with modifications due to the emerging cyber security
challenges in which individual internet users should come in.
the model should make it clear that the responsibility for cyber
security in everyone’s. According to Clinton (2011, p 97), cyber
space is rapidly changing and so the model to be developed
should incorporate psychological and behavioral approaches in
understanding the tactics of the cyber attackers and also include
the tracking of the various serves with strictly monitored
technologies
Government regulation
The government should regulate every internet user and the
companies hosting web pages
. The owners of the cyber space should also be closely
monitored by the government (National Research Council
Group, 2010, p 23).
A research question for further research
To conclude, we need to find out if the attackers have their
cyber technology laboratory where they carry out attackers or
are inside employees and therefore formulate a policy that will
regulate employees’ movements or track the hackers’ cyber
space.
Conclusion
Conclusions wrap up what you have been discussing in your
paper. After moving from general to specific information in the
introduction and body paragraphs, your conclusion should begin
pulling back into more general information that restates the
main points of your argument. Conclusions may also call for
action or overview future possible research. The following
outline may help you conclude your paper:
In a general way,
· Restate your topic and why it is important,
· Restate your thesis/claim,
· Address opposing viewpoints and explain why readers should
align with your position,
· Call for action or overview future research possibilities.
References
Carr, M. (2016). Public–private partnerships in national
cyber‐security strategies. International Affairs, 92(1), 43-62.
Clinton, L. (2011). A relationship on the rocks: industry-
government partnership for cyber defense. Journal of Strategic
Security, 4(2), 97.
Jayawardane, S., Larik, J. E., & Jackson, E. (2015). Cyber
Governance: Challenges
,
Solution
s, and Lessons for Effective Global Governance. The Hague
Institute for Global Justice Policy Brief.
National Research Council. (2010). Proceedings of a Workshop
on Deterring Cyber attacks: Informing Strategies and
Developing Options for US Policy. National Academies Press.
�Your title line goes here. It shall be the Long title in Upper
and Lower case, centered with no bold. The paper is introduced
in this area with an attention getter, purpose/thesis statement,
and overview of topics. See the APA Paper Template Provided
in the Resources Area
�Nice job!
�Paragraph is not supported. It only has two sentences. More
discussion or application is warranted here, or consider
combining with other paragraphs
�This discussion is not comprehensive
�Nice Discussion
�Nice job!
�Great Discussion in the following paragraph
�Great job!
�Remove quotation marks from title.
�More In-depth Discussion is Warranted and More In-Depth
Application is Warranted
�More In-depth Discussion is Warranted and More In-Depth
Application is Warranted
�Why, how? Please apply your discussion
�Great research question(s) or ideas.
�include a conclusion
�Only capitalize the first letter of the first word of a title, the
first word after a colon or a dash in the title, and proper nouns.
Do not capitalize the first letter of the second word in a
hyphenated compound word.
�Only capitalize the first letter of the first word of a title, the
first word after a colon or a dash in the title, and proper nouns.
Do not capitalize the first letter of the second word in a
hyphenated compound word.
BUAD 2020 Information Technology Management
Assignment #1 – Using Excel's Functions for Data Analysis
Due: Sunday, May 20th 11:59pm
Case Background:
You have been hired by John McDougal, sales manager of
Macy's Franklin Park store, to help
him better understand the productivity of his sales force.
Mr. McDougal has provided you with a download from
the POS system that contains the employee name, rank,
department, sales and hours worked. That data is
provided to you in the file named
A1_MacysDeptStore.xlsx (and is available for download
on Blackboard – under the assignment course link) and
looks similar to the image below.
Mr. McDougal would like you to produce a series of reports that
will let him know how well the
sales force is performing – where performance is defined by
how many employees meet their
targeted sales quotas and the overall percentage of the sales
quota obtained by the cumulative
efforts of all salesmen.
Mr. McDougal has identified two ways that he would like the
analysis of each week presented.
Each part is detailed below.
Part 1: Mr. McDougal would like a weekly recap of sales by
salesman that displays information
regarding weekly sales, the salesman's sales quota, the percent
of the quota met, number of
hours worked, base pay earned, commission due and the
salesman's gross pay for the week
under review. He put together a sample of how he would like
the report to look – use this
layout – or your best judgement to produce a well laid out and
easy to understand report.
Notice the report includes the name in the format of Last, First.
You will need to use some text
functions to display the name concatenating the empLast to the
empFirst with a comma and
space between (", ") .
Assignment #1 – Using Excel's Functions for Data Analysis
2
The other formulas required to produce this detail report will
need to pull information from a
table of hourly wages and quotas that Mr. McDougal has
provided to you.
Each employee is assigned a "Rank" within the sales force.
Macy's has 5 different ranks. The
employee's base pay and commission rate is dependent upon the
rank assignment. For
example, a rank of AM indicates an Assistant Manager who is
paid $23.50 per hour, is expected
to produce $200.00 of sales for each hour that he/she works and
is paid a commission on his
sales, if he/she meets the hourly sales quota for the week. The
table of values displayed below
should be replicated and used in your workbook:
Hourly Wages & Quotas
Sales
Rank Sales Title Hourly Wage
Hrly Sales
Quota
Commission
Rate
AM Assistant Manager $ 23.50 $ 200.00 3.0%
PT1 Sales Assistant $ 10.50 $ 100.00 1.0%
PT2 Sales Partner $ 11.75 $ 125.00 1.5%
S1 Sales Associate $ 13.50 $ 150.00 2.0%
S2 Sales Consultant $ 15.00 $ 175.00 2.5%
times the hourly sales quota of the
designated Sales Rank.
s
the hourly wage.
their Target Sales – by multiplying
the weekly sales amount times the commission rate that
corresponds to the employee's Sales
Rank.
and Commission.
The report should be sorted to make it easy to identify the
"best" salesperson – defined by the % of
target column.
Part 2: Mr. McDougal would also like a summary report that
will display the counts, sales and quotas
(targets) by Rank. (The % of Target column in this summary
report is calculated as Total Sales divided
by Total Target.)
Assignment #1 – Using Excel's Functions for Data Analysis
3
Put the Excel skills taught thus far to produce the requested
information for Mr. McDougal. Write (and
leave) formulas on the Raw Data worksheet to convert data, as
needed. Copy and paste (AS VALUES)
the data from the Raw Data worksheet onto your Reporting
worksheet. Insert worksheets within the
workbook supplied to build your report and summary solutions
to present the required information.
Use absolute addressing, VLookup, IF, Count, CountIF, SumIF,
and various text functions to create your
solution. Create a solution that would work with this or
another similar data set. Do NOT go into the
data and modify it by hand – and do not use Pivot Tables in this
assignment. Create formulas to lookup,
calculate and display the requested information.
Pay attention to formatting, column widths, headings, and other
visual aids to produce easily consumed
information.
Attention: No late work accepted.
Assignment Deliverables:
#1 Course Link
Assignment #1 – Using Excel's Functions for Data Analysis
4
Submitted by: _________________________________
Section: ___________
Grading Rubric for Assignment #1:
Points
Earned
Category Description/Requirements
______(5)
Manipulation of
text data
Use of functions to manipulate downloaded data provided on
Raw Data worksheet to produce the data in the form needed for
reporting purposes. Leave the formulas demonstrating how you
converted the data from the form given to the form needed.
Failure to submit a document with those formulas will be
interpreted as if you made the changes manually and will result
in
0 points awarded in this category.
______(5)
Formula
Addressing
Demonstrated understanding of absolute and relative addresses
and/or named ranges to simplify copy/paste of complex
formulas.
______(10)
Weekly
Productivity Report
Correct use of formulas and functions to produce required
information for Weekly Productivity Report.
______(10) Summary Report
Correct use of formulas and functions to produce required
information for Summary Report.
______(5) Formatting
Attention to details to format reports and report data, Print to
fit,
text alignments, data formatting – and generally provide a
report
easily read and consumed.
______(5) Proper Submission
Post Excel document to Blackboard and submit required
hardcopy reports with grading rubric.
______(40) Total Points Earned
Attention: No late work accepted.
Notes:
RawDataempFirstempLastrankdepartmentsaleshoursDorianSanta
naS2Juniors$4,058.6217QuynRyanS2Shoes$3,431.1617LucianH
endrixAMInfants$9,200.2232MaryamWrightPT1Juniors$3,615.6
037FlorenceTerryS2Mens$4,811.5313GrantBallardPT1Mens$2,
907.9825ZeldaRileyPT1Childrens$4,123.0022DaceyGilmorePT1
Womens$1,700.8316SachaShortS1Mens$4,840.1128BurkeCarril
loPT2Cosmetics$5,071.9734PhoebeCombsPT2Shoes$4,208.622
8LaceyRosarioS2Juniors$5,082.7631OriSargentAMHousewares
$5,741.2715MaggieEnglandPT1Childrens$2,621.9216SandraGe
orgePT1Cosmetics$1,556.6516FayMeadowsS2Housewares$5,53
6.7931JamesonSalinasPT2Cosmetics$4,191.6030GretchenDiazS
1Mens$5,387.2636UrsulaMannPT1Mens$4,127.7822LaithKlein
PT2Mens$5,107.6131FreyaGarrisonAMShoes$9,966.5536Vanna
DoylePT1Womens$2,604.7625SukiDurhamS2Juniors$6,670.233
7PaulaCruzS2Shoes$6,144.8834ChelseaMccormickS1Childrens$
5,371.4839NeveToddS1Childrens$2,560.4513TarikBondS1Child
rens$5,932.3331BlytheArnoldS1Mens$3,854.8221LukePiercePT
1Womens$5,661.1437TashaRoblesPT2Mens$4,778.2938SylviaP
agePT2Housewares$3,866.3023NigelGilesAMMens$7,607.2533
EltonVelezPT1Cosmetics$2,852.7621TylerShermanPT2Mens$4,
720.2032JosephJordanPT2Womens$4,774.9326EmmaMeltonPT2
Housewares$5,183.3922IndigoRiversS2Childrens$3,682.7418Ca
ndiceJarvisAMMens$7,666.5628NellMclaughlinS2Childrens$5,
331.5614CurranAtkinsS1Childrens$5,152.4728AubreyByersPT1
Cosmetics$4,284.8822CadmanQuinnS1Housewares$9,429.9333
CiaraEllisonPT1Mens$2,419.3934KeatonDavidPT2Juniors$3,00
1.7736MerrillHerringS1Shoes$7,139.7627ThorWorkmanS2Infan
ts$3,903.6622LeoRichAMShoes$13,949.0940MariNoelS1Junior
s$4,289.0219XenosRosarioS1Infants$5,105.7734VirginiaBenso
nPT2Womens$5,563.7813BuckminsterRiggsS1Womens$3,198.2
018BriannaWilliamAMInfants$6,500.7120OctaviaSaundersS1Co
smetics$8,327.2938DeaconWintersPT2Childrens$4,019.3223She
ilaRushS2Mens$3,139.4912JessicaDunnAMHousewares$5,820.3
134JolieValenciaPT2Infants$2,670.7040RemediosKirklandAMJ
uniors$5,770.5112OceanLoganS2Shoes$4,011.8421HermioneFr
yS1Womens$5,899.1438VioletHewittAMShoes$7,064.4532Cedr
icRiddleS2Shoes$8,203.0039WyomingHansonS2Cosmetics$10,3
01.9839DavidReeseS2Shoes$5,371.0729SheaBartlettS2Children
s$2,492.4817ArethaLoweS1Juniors$5,118.5019ConstanceBattle
PT1Shoes$3,651.8932AddisonVasquezPT2Womens$5,500.4227
KaneShawS1Mens$5,468.3225NaomiMorganS1Cosmetics$4,933
.2131KennethOliverPT2Infants$3,931.1123ClaireCampbellPT2I
nfants$1,905.6015RandallHahnS1Housewares$2,677.6313Ferdin
andValdezS2Infants$3,867.0337MollyPottsPT1Housewares$2,7
14.7327PearlWoodsAMCosmetics$4,129.5416FrederickaFinchA
MCosmetics$5,891.3921StoneGibbsS2Cosmetics$5,148.1837Ma
rsdenWeeksS1Mens$5,547.8837EvanRushPT2Shoes$3,181.2916
TimonCastilloS1Childrens$3,617.9815KyleChurchAMHousewar
es$8,525.6237UrielRosalesPT2Womens$4,668.1623EvelynMont
oyaPT2Womens$5,572.3333FinnDaughertyS2Juniors$4,817.612
1JustineGilesPT1Juniors$558.7123ToddLeonardS2Womens$8,0
23.3739QuintessaVaughanS2Childrens$5,151.9320KellyGoodwi
nS1Housewares$505.9725MartinMosesS1Infants$3,212.7819Kai
tlinChanAMChildrens$3,865.6524KeefeCharlesS1Mens$7,881.1
132ImaniMendezPT2Cosmetics$6,273.3533CamilleRollinsAMC
osmetics$7,665.8926NeveDanielsS2Cosmetics$5,094.3927Willo
wFitzgeraldAMShoes$3,669.7020AlanBrayPT1Infants$2,964.82
22JoanMasseyAMHousewares$6,016.7732EleanorStantonPT1Inf
ants$4,521.5530MacySalasPT1Infants$4,739.8038
Running head: SHORT TITLE IN ALL CAPS1
INSERT THE SHORT TITLE IN ALL CAPS2
Insert the Long Title: Use Upper and Lower Case Font and No
Bold
Your Name (Student #)
University Name (EDMG 600)
Professor's Name
Date
Insert the Long Title of Your Paper No Bold or Underline
Begin the paper with an introduction of your topic. An
introduction has an attention getter, purpose or thesis statement,
and an overview. An attention getter can begin with any of the
6 ways: (1) Anecdote, (2) Question, (3) Quotation, (4) Humor,
(5) Shocking Statistic, or a (6) combination of them
(http://classroom.synonym.com/5-types-attention-getters-
essays-2877.html). After you introduce the topic, state the
purpose of the paper. The purpose can be as simple as restating
the objective of the assignment. The purpose of this paper is to
(state purpose). (Overview) The paper will address the
following: (List topics)
Article #1 (Name and/or Author)
This is the first main point as listed in the overview and pulled
from the assignment requirements. I recommend you look at the
rubric and the assignment requirements to ensure you address
all requirements. Please provide example to support your
research or assumptions. Real world events, experiences,
opinions based on research, conclusions based on research. Be
sure to use in text citation (Dantzler, 2014).
Strengths and Weaknesses
Add sub topics if applicable and in text citation if applicable
(Author, 2014).
Most and Least Persuasive, Premise, Claim or Rebuttal
Add sub topics if applicable and in text citation if applicable
(Author, 2014).
Article #2 (Name and/or Author)
This is the second main point as listed in the overview and
pulled from the assignment. It also ensure you address all
points on the scoring rubric. Please provide example to support
your research or assumptions. Real world events, experiences,
opinions based on research, conclusions based on research. Be
sure to use in text citation (Author, 2014).
Strengths and Weaknesses
Add sub topics if applicable and in text citation if applicable
(Author, 2014).
Most and Least Persuasive, Premise, Claim or Rebuttal
Add sub topics if applicable and in text citation if applicable
(Author, 2014).
Article #3 (Name and/or Author)
This is the third main point as listed in the overview and pulled
from the assignment. It also ensure you address all points on
the scoring rubric. Please provide example to support your
research or assumptions. Real world events, experiences,
opinions based on research, conclusions based on research. Be
sure to use in text citation (Author, 2014).
Strengths and Weaknesses
Add sub topics if applicable and in text citation if applicable
(Author, 2014).
Most and Least Persuasive, Premise, Claim or Rebuttal
Add sub topics if applicable and in text citation if applicable
(Author, 2014).
Research or Policy Question for Further Research
U.S. Government Framework Addressing Cyber Security
Challenges
This is the fourth main point as listed in the overview and
pulled from the assignment. It also ensure you address all
points on the scoring rubric. Please provide example to support
your research or assumptions. Real world events, experiences,
opinions based on research, conclusions based on research. Be
sure to use in text citation (Author, 2014).
Research or Policy Question for Further Research
Conclusion
Conclusions wrap up what you have been discussing in your
paper. After moving from general to specific information in the
introduction and body paragraphs, your conclusion should begin
pulling back into more general information that restates the
main points of your argument. Conclusions may also call for
action or overview future possible research. The following
outline may help you conclude your paper:
In a general way,
· Restate your topic and why it is important,
· Restate your thesis/claim,
· Address opposing viewpoints and explain why readers should
align with your position,
· Call for action or overview future research possibilities.
References
Abrams, R. (2014). Target puts data breach costs at $148
million, and forecasts profit drop. Retrieved from
http://www.nytimes.com/2014/08/06/business/target-puts-data-
breach-costs-at-148-million.html?_r=0
Bellovin, S. M., Bradner, S. O., Diffie, W., Landau, S., &
Rexford, J. (2011). Can it really work? Problems with extending
Einstein 3 to critical infrastructure.Harvard National Security
Journal, 3, 1-38. Retrieved from http://harvardnsj.org/wp-
content/uploads/2012/01/Vol.-
3_Bellovin_Bradner_Diffie_Landau_Rexford.pdf
Clemente, D. (2013). Cyber security and global
interdependence: What is critical? Retrieved from
http://www.chathamhouse.org/sites/files/chathamhouse/public/R
esearch/International%20Security/0213pr_cyber.pdf
Cornish, E. (2005). Futuring: The exploration of the future.
Bethesda, MD: World Future Society.
Department of Homeland Security. (2013). National
infrastructure protection plan: Partnering for critical
infrastructure security and resilience. Retrieved from
http://www.dhs.gov/sites/default/files/publications/NIPP%2020
13_Partnering%20for%20Critical%20Infrastructure%20Security
%20and%20Resilience_508_0.pdf
Nojeim, G. T. (2010). Cybersecurity and freedom on the
internet.Journal of National Security Law & Policy, 4, 119-137.
Retrieved from https://cdt.org/files/pdfs/09_Nojeim.pdf
Saadawi, T. & Jordan, L. (2011). Introduction. In T. Saadawi &
L. Jordan (Eds.), Cyber infrastructure protection (pp.1-12).
Retrieved from
http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB1067
.pdf
Running head: SHORT TITLE IN ALL CAPS
1
Insert the Long Title: Use Upper and Lower Case Font
and No Bold
Your Name
(Student #)
University Name (EDMG
600
)
Professor's Name
Date
1. Research Project Proposal Required Content
2. Policy Project Proposal Required Content
3. Research Project Final Version Required Content
4. Policy Project Final Version Required Content
APA6thEditionCitation,ReferencingandFormattingrequired
RESEARCH PAPER PROPOSAL
REQUIRED CONTENT
Your Final Project Proposal (for Research Paper OR Policy
Paper) should be approx. 2 pages long, including tentative
references. It must include the following subsections/subtitles
in the following order:
1. Title Page
name, professor's name, and a tentative
title).
2. Problem Statement (include Problem Background)
– cite and/or reference ‐‐ at
least two per‐
reviewed resources to illuminate the problem).
serve verbatim as the Title of
your paper.
3. Research Question (must end with “?”)
been covered in the literature, or you believe has been covered
or answered incorrectly, insufficiently or inadequately.
which one is possible effect/consequence?
4. Thesis or Proposition
Question)
B and C affect/cause or correlate with Y”
5. Tentative Literature/Resources List
resources)
any level ‐‐
local, state or federal, or media resources, newspapers, TV,
radio, printed or electronic ‐‐ can be utilized as primary sources
but they are not peer‐ reviewed resources.
Emergency
Management or the course textbook, are peer‐reviewed
resources.
You should discuss at least two fellow classmates' Final Paper
Proposals.
You should discuss the content of your classmates' proposals,
not their grammar or writing. If necessary, I will contact each of
you regarding grammar and writing.
POLICY PAPER PROPOSAL/OUTLINE
REQUIRED CONTENT
Your Final Policy Paper Proposal should be 2 pages long,
including tentative references, and
must include the following subsections/subtitles in the
following order:
1. Title Page
me, your name, professor's name, and a
tentative title).
2. Problem Statement (include Problem Background)
resource to illuminate the problem
3. Policy Question
g the present course; inferring about the future:
What?, How?, or How?
Project
4. Policy Claim (your preliminary/presumed answer to your
Policy Question; possible
Recommended Policy Action.
5. Tentative Literature/Resources List
resources)
any level ‐‐ local, state or federal, or media resources can be
utilized as primary sources ‐‐ but they are not peer‐reviewed
resources.
Emergency
Management or the course textbook, are peer‐reviewed
resources.
You should discuss at least two fellow classmates' Final Paper
Proposals.
You should discuss the content of your classmates' proposals,
not their grammar or writing. If necessary, I will contact each of
you regarding grammar and writing.
RESEARCH PAPER FINAL VERSION REQUIRED CONTENT
Final version of the Research Paper must be APA‐formatted,
and must include the following subsections in the following
order:
1. Title Page
2. Statement of Purpose
3. Problem Statement (utilize literature/reference and cite using
APA standard)
‐reviewed literature listed in your
References
failed to address this problem.
4. Research Question
problem/process/phenomenon that has not been covered in the
literature, or you believe has been covered or answered
incorrectly, insufficiently or inadequately.
(independent/dependent, i.e., cause and effect)
5. Literature Review
eview should show you have read and
understood what experts in the field have written about the
same or similar problem.
topic/problem. " You can be praising and critical.
iencies in authors’ Claims,
Grounds, Assumptions, Warrants, Backing, Qualifiers, and
Rebuttals
6. Research Design/Methodology
Mixed)
paragraph will suffice), and
should point to a method you would use to investigate the
problem in depth.
conduct your own research. This is why the emphasis is on your
Literature Review.
7. Thesis/Proposition
Question)
(independent/dependent, i.e., cause and effect), after you
discovered deficiencies in the literature and
policy/practice
problem/phenomenon
tion of variables, research
instruments, validity, sample, collecting data, etc., you do not
need to go in detail here.
8. Analysis (of your investigation)
Review.
Findings related to your Research
Question and the Thesis?
supports or rejects the existing Literature’s arguments and/or
Practice?
or refute your Proposition (Thesis)?
9. Conclusion and Recommendations for Further Research
POLICY PAPER FINAL VERSION REQUIRED CONTENT
Final version of the Policy Paper must be APA‐formatted, and
must include the following subsections in the following order:
1.Executive Summary (1‐2 paragraphs)
2.Problem Statement
3.Problem Background
4.Forecasting Policy Options
be the status quo
(“do nothing”)
Option
feasibility, and pros and cons
of each Policy Option
5. Recommended Policy Action (in your Policy Paper Proposal
you labeled it "Policy
Claim ‐ your presumably preferred option at the preliminary
stage of your research
makers or business leaders
6. Monitoring (of the Recommended) Policy Action's Outcomes
outcomes should
be monitored?
7. Evaluating Recommended Policy Action’s Performance
performance should be
evaluated?
8.Conclusion
9.References
At least 8‐10 peer‐reviewed references in addition to
government and media resources
First and Second person, are not allowed in formal writing.
I have to approve your Proposal/Outline before you continue
expanding it into a full paper. Let me know if you have
questions.
Research Proposal1
AMERICAN PUBLIC UNIVERSITY SYSTEM
Charles Town, West Virginia
PROPOSAL FOR THESIS/RESEARCH PAPER
MASTER OF ARTS IN EMERGENCY AND DISASTER
MANAGEMENT
AMERICAN MILITARY UNIVERSITY
SCHOOL OF SECURITY & GLOBAL STUDIES
[student name]
201X
I propose to the Thesis/Research Paper Professor and to the
Department a study of the following
topic to be conducted in partial fulfillment of the requirements
for the degree of Master of Arts in
Emergency and Disaster Management: [title]
Title of the Proposal
[week 3: put your title here]
Problem Statement
[put your problem statement text here. APA-reference it with at
least tow peer-reviewed references; minimum 350 words]
Need for the Study
[put your need for the study text here; two double-spaced
paragraphs; 250 words min]
Target Audience
[put your target audience text here; minimum 150 words ]
Objectives of the Research
[put your objectives of the research text here (minimum 150
words]
Hypothesis
[put your hypothesis here; single paragraph statement; it is your
preliminary/presumed answer to your Research Question:
factors A, B and C affect/cause or correlate with Y. You can
hypothesize inductively, by generalizing practice/policy, or
deductively, by testing a presumably applicable known theory.
Central Research Question plus sub questions
[put your research questions here; the central question should
point to a problem/process/phenomenon that has not been
covered in the literature, or you believe has been covered or
answered incorrectly, insufficiently or inadequately; distill key
variables/factors: which one is possible cause and which one is
possible effect/consequence?]
Literature Review
[Provide APA-referenced and formatted critical review of the
key issues pertinent to your topic by at least five peer-reviewed
authors; minimum two double-spaced pages-long, 750 words
minimum]
Shortfalls in the Literature
[put your shortfalls in the literature text here; at least two
paragraphs; minimum 50 words]
Summary of Findings
[put your summary of findings text here; 150 words minimum]
Methodology
Selection of Method(s)
[put your selection of methods text here; minimum 350 words]
Data Collection Process and Analysis
[put your data collection text here; minimum 150 words]
Researcher’s Perspective
Potential Bias Issues
[put your potential bias text here; minimum 250 ]
Anticipated Ethical Issues
[put your anticipated ethical issues text here; minimum 150
words]
References
[put your references text here]
Source: William N. Dunn, (1981). Public Policy Analysis.
Englewood Cliffs: Prentice Hall.
Page 1
Policy Issue Paper Template
EELLEEMMEENNTTSS OOFF TTHHEE IISSSSUUEE
PPAAPPEERR
PPOOLLIICCYY-- IINNFFOORRMMAATTIIOONNAALL
CCOOMMPPOONNEENNTT
PPOOLLIICCYY--AANNAALLYYTTIICC
MMEETTHHOODD
11.. SSOOUURRCCEE AANNDD
BBAACCKKGGRROOUUNNDD OOFF TTHHEE
PPRROOBBLLEEMM
aa.. DDeessccrriippttiioonn ooff PPrroobblleemmaattiicc
SSiittuuaattiioonn
bb.. OOuuttccoommeess ooff PPrriioorr EEffffoorrttss ttoo
RReessoollvvee PPrroobblleemm
cc.. AAsssseessssmmeenntt ooff PPaasstt PPoolliiccyy
PPeerrffoorrmmaannccee
dd.. SSiiggnniiffiiccaannccee ooff PPrroobblleemmaattiicc
SSiittuuaattiioonn
PPOOLLIICCYY OOUUTTCCOOMMEESS
PPOOLLIICCYY PPEERRFFOORRMMAANNCCEE
MMoonniittoorriinngg
EEvvaalluuaattiioonn
22.. TTHHEE PPOOLLIICCYY PPRROOBBLLEEMM
aa)) PPrroobblleemm SSttaatteemmeenntt
bb)) AApppprrooaacchh ttoo AAnnaallyyssiiss
cc)) MMaajjoorr SSttaakkeehhoollddeerrss
dd)) GGooaallss aanndd OObbjjeeccttiivveess
ee)) MMeeaassuurree ooff EEffffeeccttiivveenneessss
ff)) PPootteennttiiaall SSoolluuttiioonnss
PPOOLLIICCYY PPRROOBBLLEEMMSS PPrroobblleemm
SSttrruuccttuurriinngg
33.. PPOOLLIICCYY AALLTTEERRNNAATTIIVVEESS
aa.. DDeessccrriippttiioonn ooff AAlltteerrnnaattiivveess
bb.. CCoommppaarriissoonn ooff AAlltteerrnnaattiivveess
cc.. SSppiilllloovveerrss aanndd EExxtteerrnnaalliittiieess
dd.. CCoonnssttrraaiinnttss aanndd PPoolliittiiccaall
FFeeaassiibbiilliittyy
PPOOLLIICCYY AALLTTEERRNNAATTIIVVEESS
FFoorreeccaassttiinngg
44.. PPOOLLIICCYY
RREECCOOMMMMEENNDDAATTIIOONNSS
aa.. CCrriitteerriiaa ffoorr RReeccoommmmeennddiinngg
AAlltteerrnnaattiivveess
bb.. DDeessccrriippttiioonn ooff PPrreeffeerrrreedd
AAlltteerrnnaattiivvee((ss))
cc.. OOuuttlliinnee ooff IImmpplleemmeennttaattiioonn
SSttrraatteeggyy
dd.. PPrroovviissiioonn ffoorr MMoonniittoorriinngg aanndd
EEvvaalluuaattiioonn
ee.. LLiimmiittaattiioonnss aanndd
UUnnaannttiicciippaatteedd CCoonnsseeqquueenncceess
PPOOLLIICCYY AACCTTIIOONNSS
PPOOLLIICCYY OOUUTTCCOOMMEESS
PPOOLLIICCYY PPEERRFFOORRMMAANNCCEE
RReeccoommmmeennddaattiioonn
MMoonniittoorriinngg
EEvvaalluuaattiioonn
55.. RREEFFEERREENNCCEESS
66.. AAPPPPEENNDDIICCEESS
Source: William N. Dunn, (1981). Public Policy Analysis.
Englewood Cliffs: Prentice Hall.
Page 2
AA CChheecckk ffoorr PPrreeppaarriinngg PPoolliiccyy
IIssssuuee PPaappeerr
RRaattiinngg SSccaallee::
11==TToottaallllyy AAddeeqquuaattee
22==AAddeeqquuaattee
33==IInnaaddeeqquuaattee
44==TToottaallllyy IInnaaddeeqquuaattee
00==NNoott AApppplliiccaabbllee
EElleemmeenntt ooff PPoolliiccyy IIssssuuee PPaappeerr
EExxaammppllee//NNoottee
RRaattiinngg
11.. SSOOUURRCCEE AANNDD
BBAACCKKGGRROOUUNNDD OOFF
TTHHEE PPRROOBBLLEEMM
EExxaammppllee//NNoottee RRaattiinngg
pprroobblleemmaattiicc
ssiittuuaattiioonn ddeessccrriibbeedd
IInnccrreeaassiinngg ccrriimmee rraatteess mmaayy bbee
aannaallyyzzeedd iinn ccoonnjjuunnccttiioonn wwiitthh
ddaattaa oonn
uunneemmppllooyymmeenntt,, ppoolliiccee
rreeccrruuiittmmeenntt,, cciittiizzeenn’’ss ssuurrvveeyyss,,
mmiiggrraattiioonn,, aanndd
ssoo oonn..
r
eeffffoorrttss ttoo rreessoollvvee
pprroobblleemmss iinn tthhee aarreeaa bbeeeenn
ddeessccrriibbeedd??
““SSiimmiillaarr ttrraaiinniinngg pprrooggrraammss hhaavvee
bbeeeenn iimmpplleemmeenntteedd iinn NNeeww YYoorrkk,,
FFlloorriiddaa,, aanndd CCaalliiffoorrnniiaa,, aatt aa
ccoosstt ooff $$44,,000000--55,,000000 ppeerr
ttrraaiinneeee””
tthhee ppaasstt
ppoolliiccyy ppeerrffoorrmmaannccee??
““TTrraaiinniinngg pprrooggrraammss iinn NNeeww
YYoorrkk aanndd CCaalliiffoorrnniiaa rreessuulltteedd iinn
aa 11
ppeerrcceenntt rreedduuccttiioonn iinn hhaarrdd--ccoorree
uunneemmppllooyymmeenntt aanndd wweerree jjuuddggeedd
ttoo bbee
hhiigghhllyy ssuucccceessssffuull..””
pprroobblleemmaattiicc
ssiittuuaattiioonn cclleeaarrllyy ddeessccrriibbeedd??
““PPrroobblleemmss ooff iinndduussttrriiaall
ppoolllluuttiioonn aarree mmoorree sseevveerree ttooddaayy
tthhaann aatt aannyy
ttiimmee iinn oouurr hhiissttoorryy aanndd aaffffeecctt
tthhee pphhyyssiiccaall wweellll--bbeeiinngg ooff 6600
ppeerrcceenntt ooff
tthhee ppooppuullaattiioonn.. TThhee rreessoolluuttiioonn
ooff tthheessee pprroobblleemmss iiss aann uurrggeenntt
mmaatttteerr
tthhaatt ccaallllss ffoorr ttiimmeellyy aanndd ddeecciissiivvee
aaccttiioonn..””
22.. TTHHEE PPOOLLIICCYY PPRROOBBLLEEMM
EExxaammppllee//NNoottee RRaattiinngg
Iss tthhee pprroobblleemm cclleeaarrllyy ssttaatteedd??
““TThhee pprroobblleemm aaddddrreesssseess iinn tthhiiss
ppaappeerr iiss hhooww bbeesstt ttoo ssaattiissffyy tthhee
nneeeedd
ffoorr iinnccrreeaasseedd ffiissccaall
aaccccoouunnttaabbiilliittyy aammoonngg llooccaall
ggoovveerrnnmmeennttss iinn tthhee
rreeggiioonn..””
““TThhee iissssuuee aaddddrreesssseedd iinn tthhiiss
ppaappeerr wwhheetthheerr tthhee ssttaattee’’ss
DDeeppaarrttmmeenntt ooff
CCoommmmuunniittyy AAffffaaiirrss sshhoouulldd
iinnccrreeaassee iittss tteecchhnniiccaall aassssiissttaannccee
ttoo llooccaall
ggoovveerrnnmmeennttss iinn tthhee aarreeaa ooff
ffiinnaanncciiaall mmaannaaggeemmeenntt
cclleeaarrllyy ssppeecciiffiieedd ““IInn aaddddrreessssiinngg
tthhiiss iissssuuee wwee hhaavvee eemmppllooyyeedd
ccoosstt--eeffffeeccttiivveenneessss
aannaallyyssiiss aass aa wwaayy ttoo ddeetteerrmmiinnee
tthhee lleevveellss ooff iinnvveessttmmeenntt
nneecceessssaarryy ttoo
ttrraaiinn 1100,,000000 llooccaall ooffffiicciiaallss iinn
ccaasshh mmaannaaggeemmeenntt tteecchhnniiqquueess..
Source: William N. Dunn, (1981). Public Policy Analysis.
Englewood Cliffs: Prentice Hall.
Page 3
iiddeennttiiffiieedd aanndd
pprriioorriittiizzeedd
TThhee ttaasskk hheerree iiss ttoo iiddeennttiiffyy aallll
ppeerrssoonnss aanndd ggrroouuppss wwhhoo
ssiiggnniiffiiccaannttllyy
aaffffeecctt aanndd aarree aaffffeecctteedd bbyy tthhee
ffoorrmmuullaattiioonn aanndd iimmpplleemmeennttaattiioonn
ooff
ppoolliicciieess.. ““SSttaakkeehhoollddeerrss wwhhoo aarree
oonnllyy mmaarrggiinnaallllyy iinnfflluueennttiiaall ((oorr
aaffffeecctteedd)) mmaayy bbee ddrrooppppeedd ffrroomm
tthhee aannaallyyssiiss,, bbuutt tthhiiss rreeqquuiirreess
pprriioorriittiizzaattiioonn..””
AArree ggooaallss aanndd oobbjjeeccttiivveess cclleeaarrllyy
ssppeecciiffiieedd ““TThhee ggooaall ooff tthhiiss
ppoolliiccyy iiss ttoo iimmpprroovvee tthhee
pphhyyssiiccaall sseeccuurriittyy ooff tthhee
ccoommmmuunniittyy.. TThhee oobbjjeeccttiivvee iiss ttoo
rreedduuccee rreeppoorrtteedd ccrriimmeess bbyy 1100
ppeerrcceenntt
oorr mmoorree iinn tthhee 22000033--22000044
ppeerriioodd..””
AArree mmeeaassuurreess ooff eeffffeeccttiivveenneessss
cclleeaarrllyy
ssppeecciiffiieedd
HHeerree tthheerree aarree mmaannyy cchhooiicceess::
bbeenneeffiitt--ccoosstt rraattiiooss,, nneett bbeenneeffiittss,,
ddiissttrriibbuuttiioonnaall bbeenneeffiittss,, aanndd ssoo
oonn..
AArree aallll sseettss ooff ppootteennttiiaall
ssoolluuttiioonn oouuttlliinneedd?? ““AAnnyy eeffffoorrtt
ttoo rreedduuccee ccrriimmee iinn tthhee aarreeaa
sshhoouulldd ttaakkee iinnttoo aaccccoouunntt tthhee
eeffffeeccttiivveenneessss ooff llaaww
eennffoorrcceemmeenntt pprrooggrraammss,, tthhee
uunneemmppllooyymmeenntt rraattee,,
ppooppuullaattiioonn ddeennssiittyy,, aanndd
uurrbbaanniizzaattiioonn..
33.. PPOOLLIICCYY AALLTTEERRNNAATTIIVVEESS
EExxaammppllee//NNoottee RRaattiinngg
AArree AAlltteerrnnaattiivvee ssoolluuttiioonnss
ssppeecciiffiieedd ““TThhrreeee ppoolliiccyy
aalltteerrnnaattiivveess aarree aannaallyyzzeedd iinn tthhee
ccoouurrssee ooff tthhiiss ppaappeerr::
eedduuccaattiioonnaall pprrooggrraammss ttoo aalleerrtt
cciittiizzeennss ttoo tthhee rroollee tthheeyy ccaann
ppllaayy iinn
ccrriimmee ccoonnttrrooll;; ppoolliiccee ttrraaiinniinngg
pprrooggrraammss:: aanndd aaddvvaanncceedd ccrriimmee
ccoonnttrrooll
tteecchhnnoollooggyy..””
AArree aalltteerrnnaattiivveess ssyysstteemmaattiiccaallllyy
ccoommppaarreedd iinn
tteerrmmss ooff tthheeiirr pprroobbaabbllee ccoossttss
aanndd
eeffffeeccttiivveenneessss??
““PPrrooggrraamm AA hhaass aa bbeenneeffiitt--ccoosstt
rraattiioo wwhhiicchh iiss ttwwiiccee tthhaatt ooff
PPrrooggrraamm
BB..””
AArree rreelleevvaanntt ssppiilllloovveerrss aanndd
eexxtteerrnnaalliittiieess
iinncclluuddeedd iinn tthhee aannaallyyssiiss ooff tthhee
aalltteerrnnaattiivveess??
““TThhee eeaarrllyy cchhiillddhhoooodd
eedduuccaattiioonnaall pprrooggrraamm iiss nnoott oonnllyy
ccoosstt--eeffffeeccttiivvee..
IItt wwiillll aallssoo pprroodduuccee ssppiilllloovveerrss
iinn tthhee ffoorrmm ooff iinnccrreeaasseedd
ppaarrttiicciippaattiioonn ooff
ffaammiillyy mmeemmbbeerrss iinn tthhee sscchhooooll..
AAtt tthhee ssaammee ttiimmee tthheerree aarree
iimmppoorrttaanntt
eexxtteerrnnaalliittiieess iinn tthhee ffoorrmm ooff
iinnccrreeaasseedd ccoosstt ffoorr
ttrraannssppoorrttaattiioonn ttoo aanndd
ffrroomm tthhee sscchhooooll..””
AArree aallll rreelleevvaanntt ccoonnssttrraaiinnttss
ttaakkeenn iinnttoo
aaccccoouunntt??
TThheerree mmaayy bbee ffiinnaanncciiaall ((ffoorr
eexxaammppllee,, ffiixxeedd ccoossttss)),, lleeggaall ((ffoorr
eexxaammppllee,,
llaawwss pprroossccrriibbiinngg cceerrttaaiinn
aaccttiioonnss)),, oorr ppoolliittiiccaall ((ffoorr
eexxaammppllee,, llaacckk ooff
ppoolliittiiccaall ssuuppppoorrtt))
HHaavvee aalltteerrnnaattiivveess bbeeeenn
ssyysstteemmaattiiccaallllyy
ccoommppaarreedd iinn tteerrmmss ooff ppoolliittiiccaall
ffeeaassiibbiilliittyy??
TThhee ppooiinntt hheerree iiss ttoo mmaakkee
iinnffoorrmmeedd jjuuddggmmeennttss aabboouutt tthhee
pprroobbaabbllee
ssuuppppoorrtt,, rreelleevvaannccee,, aanndd
iinnfflluueennccee ooff kkeeyy ssttaakkee hhoollddeerrss
iinn ggaaiinniinngg
aacccceeppttaannccee ffoorr aanndd iimmpplleemmeennttiinngg
eeaacchh aalltteerrnnaattiivvee..
44.. PPOOLLIICCYY
RREECCOOMMMMEENNDDAATTIIOONNSS
EExxaammppllee//NNoottee RRaattiinngg
rreeccoommmmeennddiinngg
aalltteerrnnaattiivveess cclleeaarrllyy ssppeecciiffiieedd
CCrriitteerriiaa mmaayy iinncclluuddee:: nneett
wweellffaarree iimmpprroovveemmeenntt;;
ddiissttrriibbuuttiioonnaall
iimmpprroovveemmeenntt,, ccoosstt
eeffffeeccttiivveenneessss,, aanndd ssoo oonn..
tteerrnnaattiivvee
bbeeeenn cclleeaarrllyy
ddeessccrriibbeedd??
““WWee tthheerreeffoorree rreeccoommmmeenndd tthhaatt
tthhee sseeccoonndd aalltteerrnnaattiivvee bbee
aaddoopptteedd
aanndd iimmpplleemmeenntteedd,, ssiinnccee iitt iiss
lliikkeellyy ttoo bbee mmoorree ccoosstt--eeffffeeccttiivvee
aanndd iiss
ppoolliittiiccaallllyy ffeeaassiibbllee uunnddeerr pprreesseenntt
ccoonnddiittiioonnss..””
Source: William N. Dunn, (1981). Public Policy Analysis.
Englewood Cliffs: Prentice Hall.
Page 4
iimmpplleemmeennttaattiioonn cclleeaarrllyy
oouuttlliinneedd??
““TThhee pprrooppoosseedd ppoolliiccyy sshhoouulldd bbee
iimmpplleemmeenntteedd bbyy tthhee DDeeppaarrttmmeenntt
ooff
LLaabboorr aanndd ssttaattee eemmppllooyymmeenntt
ooffffiicceess.. IImmpplleemmeennttaattiioonn sshhoouulldd
bbee
pphhaasseedd oovveerr aa ppeerriioodd ooff tthhrreeee
yyeeaarrss aanndd ffooccuuss oonn cciittiieess wwiitthh
mmoorree
tthhaann 5500,,000000 ppeerrssoonnss..
mmoonniittoorriinngg aanndd
eevvaalluuaattiinngg ppoolliicciieess??
““TThhee ssttaattee eemmppllooyymmeenntt ooffffiicceess
sshhoouulldd eessttaabblliisshh ssppeecciiaall uunniittss ttoo
eennggaaggee iinn pprroocceessss aanndd oouuttccoommee
eevvaalluuaattiioonnss,, aatt iinntteerrvvaallss ooff 3300
ddaayyss..
RReessuulltt ooff mmoonniittoorriinngg aanndd
eevvaalluuaattiioonn sshhoouulldd bbee ssttoorreedd iinn aa
mmaannaaggeemmeenntt iinnffoorrmmaattiioonn ssyysstteemm
aanndd rreeppoorrttss sshhoouulldd bbee ffiilleedd
qquuaarrtteerrllyy..
uunniinntteennddeedd
ccoonnsseeqquueenncceess ttaakkeenn iinnttoo aacccceenntt??
HHeerree tthhee ppooiinntt iiss ttoo ssppeecciiffyy hhooww
lliimmiittaattiioonnss ooff tthhee aannaallyyssiiss
aaffffeecctt tthhee
ccoonnffiiddeennccee oonnee hhaass iinn tthhee
ccoonncclluussiioonnss.. PPoossssiibbllee
uunniinntteennddeedd
ccoonnsseeqquueenncceess ((ffoorr eexxaammppllee,,
aabbuusseess ooff ssoocciiaall wweellffaarree
pprrooggrraammss,,
nnuucclleeaarr mmeelltt--ddoowwnnss,, aanndd ssoo oonn))
sshhoouulldd aallssoo bbee tthhoouugghhtt tthhrroouugghh..
AArree rreeffeerreenncceess cciitteedd iinn tthhee tteexxtt
iinncclluuddeedd iinn
tthhee aapppprroopprriiaattee ffoorrmm??
IItt iiss pprreeffeerraabbllee ttoo uussee ““nnaammee--
ddaattee”” bbiibblliiooggrraapphhiicc ffoorrmm iinn aa
ppoolliiccyy
iissssuuee ppaappeerr.. OOnnllyy tthhee nnaammee ooff
tthhee aauutthhoorr,, tthhee ddaattee ooff tthhee
ppuubblliiccaattiioonn,,
aanndd ppaaggee nnuummbbeerrss wwiillll bbee
iinncclluuddeedd iinn tthhee tteexxtt,, wwiitthh nnoo
ffoooottnnootteess aatt
tthhee bboottttoomm ooff tthhee ppaaggee.. FFoorr
eexxaammppllee:: ((JJoonneess,, 22000088:: 2200--2233))..
TThhee
cciittaattiioonn iinn tthhee rreeffeerreenncceess wwiillll
rreeaadd:: JJoonneess,, JJoohhnn,, ((1122000088)),, AA
RReeppoorrtt oonn
tthhee FFiissccaall CCrriissiiss.. WWaasshhiinnggttoonn,,
DD..CC..:: FFiissccaall IInnssttiittuuttee..
IIss rreelleevvaanntt ssuuppppoorrttiinngg
iinnffoorrmmaattiioonn
((ssttaattiissttiiccss,, lleeggiissllaattiioonn,,
ddooccuummeennttss,,
ccoorrrreessppoonnddeennccee)) iinncclluuddeedd??
AAllll ssttaattiissttiiccaall ttaabblleess sshhoouulldd bbee
pprrooppeerrllyy nnuummbbeerreedd aanndd hheeaaddeedd
aanndd
tthhee ssoouurrccee ooff ddaattaa ssppeecciiffiieedd aatt
tthhee bboottttoomm ooff tthhee ttaabbllee..
LLeeggiissllaattiioonn,,
ddooccuummeennttss aanndd ccoorrrreessppoonnddeennccee
sshhoouulldd bbee iiddeennttiiffiieedd aass ttoo iittss
ssoouurrccee,,
ddaattee,, aauutthhoorr((ss)),, aanndd ssoo oonn..
Assignment Rubric
Graduate Level
EXEMPLARY
LEVEL
4
ACCOMPLISHED
LEVEL
3
DEVELOPING
LEVEL
2
BEGINNNIG
LEVEL
1
TOTAL POINTS
SYNTHESIS OF KNOWLEDGE
(FOCUS/THESIS)
[Graduate Learning Outcomes Assessment Objective #4]
20
1-8
9-14
15-18
19-20
Student exhibits a defined and clear understanding of the
assignment.
Thesis is clearly defined and well constructed to help guide the
reader throughout the assignment.
Student builds upon the thesis of the assignment with well-
documented and exceptional supporting facts, figures, and/or
statements.
Establishes a good comprehension of topic and in the building
of the thesis.
Student demonstrates an effective presentation of thesis, with
most support statements helping to support the key focus of
assignment.
Student exhibits a basic understanding of the intended
assignment, but the thesis is not fully supported throughout the
assignment.
While thesis helps to guide the development of the assignment,
the reader may have some difficulty in seeing linkages between
thoughts.
While student has included a few supporting facts and
statements, this has limited the quality of the assignment.
Exhibits a limited understanding of the assignment. Reader is
unable to follow the logic used for the thesis and development
of key themes. Introduction of thesis is not clearly evident, and
reader must look deeper to discover the focus of the writer.
Student’s writing is weak in the inclusion of supporting facts or
statements.
16
FOUNDATION OF KNOWLEDGE
[Graduate Learning Outcomes Assessment Objective #3]
20
1-8
9-14
15-17
18-20
Student demonstrates proficient command of the subject matter
in the assignment.
Assignment shows an impressive level of depth of student’s
ability to relate course content to practical examples and
applications.
Student provides comprehensive analysis of details, facts, and
concepts in a logical sequence.
Student exhibits above average usage of subject matter in
assignment.
Student provides above average ability in relating course
content in examples given.
Details and facts presented provide an adequate presentation of
student’s current level of subject matter knowledge.
The assignment reveals that the student has a general,
fundamental understanding of the course material.
Whereas, there are areas of some concerning in the linkages
provided between facts and supporting statements.
Student generally explains concepts, but only meets the
minimum requirements in this area.
Student tries to explain some concepts, but overlooks critical
details.
Assignment appears vague or incomplete in various segments.
Student presents concepts in isolation, and does not perceive to
have a logical sequencing of ideas.
18
APPLICATION OF KNOWLEDGE (CRITICAL THINKING
SKILLS)
[Graduate Learning Outcomes Assessment Objective #5]
20
1-8
9-14
15-18
19-20
Student demonstrates a higher-level of critical thinking
necessary for graduate level work.
Learner provides a strategic approach in presenting examples of
problem solving or critical thinking, while drawing logical
conclusions which are not immediately obvious.
Student provides well-supported ideas and reflection with a
variety of current and/or world views in the assignment.
Student presents a genuine intellectual development of ideas
throughout assignment.
Student exhibits a good command of critical thinking skills in
the presentation of material and supporting statements.
Assignment demonstrates the student’s above average use of
relating concepts by using a variety of factors. Overall, student
provides adequate conclusions, with 2 or fewer errors.
Student takes a common, conventional approach in guiding the
reader through various linkages and connections presented in
assignment.
However, student presents a limited perspective on key
concepts throughout assignment.
Student appears to have problems applying information in a
problem-solving manner.
Student demonstrates beginning understanding of key concepts,
but overlooks critical details.
Learner is unable to apply information in a problem-solving
fashion.
Student presents confusing statements and facts in assignment.
No evidence or little semblance of critical thinking skills.
18
ORGANIZATION OF IDEAS/FORMAT
10
1-3
4-6
7-8
9-10
Student thoroughly understands and excels in explaining all
major points.
An original, unique, and/or imaginative approach to overall
ideas, concepts, and findings is presented.
Overall format of assignment includes an appropriate
introduction (or abstract), well- developed paragraphs, and
conclusion.
Finished assignment demonstrates student’s ability to plan and
organize research in a logical sequence.
Student explains the majority of points and concepts in the
assignment.
Learner demonstrates a good skill level in formatting and
organizing material in assignment.
Student presents an above average level of preparedness, with
few formatting errors.
Learner applies some points and concepts incorrectly.
Student uses a variety of formatting styles, with some
inconsistencies throughout the paper.
Assignment does not have a continuous pattern of logical
sequencing.
Assignment reveals formatting errors and a lack of organization.
Student presents an incomplete attempt to provide linkages or
explanation of key terms.
9
WRITING SKILL
[Graduate Learning Outcomes Assessment Objective #2]
10
1-3
4-6
7-8
9-10
Student demonstrates an excellent command of grammar, as
well as presents research in a clear and concise writing style.
Presents a thorough, extensive understanding of word usage.
Student excels in the selection and development of a well-
planned research assignment.
Assignment is error-free and reflects student’s ability to prepare
graduate-level writing for possible publication in a peer-
reviewed (refereed) journal.
Student provides an effective display of good writing and
grammar.
Assignment reflects student’s ability to select appropriate word
usage and presents an above-average presentation of a given
topic or issue.
Assignment appears to be well written with no more than 3-5
errors. Student provides a good final product that covers the
above-minimal requirements.
Assignment reflects basic writing and grammar, but with more
than 5 errors.
Key terms and concepts are somewhat vague and not completely
explained by student.
Student uses a basic vocabulary in assignment.
Student’s writing ability is average, but demonstrates a basic
understanding of the subject matter.
Topics, concepts, and ideas are not coherently discussed or
expressed in assignments.
Student’s writing style is weak and needs improvement, along
with numerous proofreading errors.
Assignment lacks clarity, consistency, and correctness. Student
needs to review and revise assignment.
8
USE OF COMPUTER TECHNOLOGY/ APPLICATIONS
10
1-3
4-6
7-8
9-10
Student provides a high-caliber, formatted assignment.
Learner exhibits excellent use of computer technology in the
development of assignment.
Quality and appropriateness of stated references demonstrate
the student’s ability to use technology to conduct applicable
research.
Given assignment includes appropriate word processing,
spreadsheet and/or other computer applications as part of the
final product.
Assignment presents an above-average use of formatting skills,
with less than 3 errors.
Students has a good command of computer applications to
format information and/or figures in an appropriate format.
Student uses at least two types of computer applications to
produce a quality assignment.
Student demonstrates a basic knowledge of computer
applications. Appearance of final assignment demonstrates the
student’s limited ability to format and present data. Resources
used in assignment are limited. Student may need to obtain
further help in the use of computer applications and Internet
research.
Student needs to develop better formatting skills. The student
may need to take additional training or obtain help from the
Educator Help Desk while preparing an assignment. Research
and resources presented in the assignment are limited. Student
needs to expand research scope. The number of formatting
errors is not acceptable.
10
RESEARCH SKILL
[Graduate Learning Outcomes Assessment Objective #1]
10
1-3
4-6
7-8
9-10
Student provides sophisticated synthesis of complex body of
information in the preparation of assignment.
Research provided by student contributes significantly to the
development of the overall thesis.
Student incorporates at least of 7-10 quality references in
assignment.
Student incorporates a variety of research resources and
methodology in the preparation of assignment.
Student achieves an above average synthesis of research, but
interpretation is narrow in scope and description within
assignment. Assignment contains less than 7 resources, and
presents an average overview of key concepts.
Assignment provides a basic, but borderline perspective of
student’s research abilities. Student has incorporated less than 4
sources, which does not attempt to cover key elements of
assignment.
Student fails to provide an adequate synthesis of research
collected for assignment. The lack of appropriate references or
source materials demonstrates the student’s need for additional
help or training in this area. Student needs to review and revise
the assignment. The paper is not of acceptable quality for
graduate-level work.
10
TOTAL POINTS
89
Quazi, thanks for your work. The assignment required you to
develop a cybersecurity/EM Policy Analytical model in which
you will recommend and justify the most effective way to
manage emergency management related cybersecurity issues at
the state level based on the readings. You were also asked to
discuss the government-industry partnership as similar to a
parent-child relationship including answering the following
questions: (1) what needs to be done and how do we get people
to do it; (2) will a traditional regulatory model work in this
space; (3) does a newer model to address uniquely 21st century
issues need to be developed; and (4) whom should the
government regulate? You were also to conclude with a
research or policy question for further research. Please see the
feedback in the paper. Also, see the templates and videos below
and use the as refreshers as applicable.
Formatting Your APA Document Video
https://www.youtube.com/watch?v=9pbUoNa5tyY
APA Citation Basics Video
https://www.youtube.com/watch?v=uVlsbN99LIQ
APA Formatting Reference List Basics Video
https://www.youtube.com/watch?v=HpAOi8-WUY4
�There was no introduction The tone and flow of the paper was
not set. There also was no conclusion. See paper template
�You had some good discussion and evaluation of the readings
in some areas, but more in-depth information was indicated in
others. See part I. Please see feedback in the paper and the
templates in the resources section
�You had some good application in some areas, but more in-
depth application was warranted in others. Please see feedback
in the paper.
�Outstanding presentation of ideas. Outstanding use of
headings. Please continue to use headings in the future papers.
.
�There were APA writing errors with the in text citations, title
page, body, and reference page. Please see feedback in the
paper.
�Outstanding use of computer technology and applications.
�Outstanding research and reporting. Great list and utilization
of sources!
Running head CYBER SECURITY                                  .docx

More Related Content

PDF
Global Partnership Key to Cyber Security
DOCX
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
DOCX
Analysis of personal information security behavior and awareness.docx
DOCX
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
DOCX
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
DOCX
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
PDF
Framework for cybersecurity info sharing
DOCX
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
Global Partnership Key to Cyber Security
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
Analysis of personal information security behavior and awareness.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Framework for cybersecurity info sharing
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx

Similar to Running head CYBER SECURITY .docx (20)

PDF
Multi-Dimensional Privacy Protection for Digital Collaborations.
PDF
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
PDF
Improved-Cybersecurity-cooperation
DOCX
Discussion Questions The difficulty in predicting the future is .docx
DOCX
Cybersecurity Business Risk, Literature Review
DOCX
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
DOCX
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
DOCX
Introduction Over the past years, there have been increasing ca.docx
DOCX
Information Systems Security & Strategy
PDF
Guideline Thailand Cybersecure Strate Digital Economy
DOCX
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
PDF
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOCX
Classmate 1Cybersecurity risk can be characterized as the ris.docx
PDF
OverseeCyberSecurityAsHackersSeekToInfiltrate
PDF
System Dynamics Based Insider Threats Modeling
DOCX
Article 1 currently, smartphone, web, and social networking techno
DOCX
LD7009 Information Assurance And Risk Management.docx
PDF
Institutional Cybersecurity from Military Perspective
PDF
OSA - Internet Security in India
PDF
Addressing Policy Challenges of Disruptive Technologies
Multi-Dimensional Privacy Protection for Digital Collaborations.
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
Improved-Cybersecurity-cooperation
Discussion Questions The difficulty in predicting the future is .docx
Cybersecurity Business Risk, Literature Review
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
Introduction Over the past years, there have been increasing ca.docx
Information Systems Security & Strategy
Guideline Thailand Cybersecure Strate Digital Economy
1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
Classmate 1Cybersecurity risk can be characterized as the ris.docx
OverseeCyberSecurityAsHackersSeekToInfiltrate
System Dynamics Based Insider Threats Modeling
Article 1 currently, smartphone, web, and social networking techno
LD7009 Information Assurance And Risk Management.docx
Institutional Cybersecurity from Military Perspective
OSA - Internet Security in India
Addressing Policy Challenges of Disruptive Technologies
Ad

More from susanschei (20)

DOCX
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
DOCX
SPT 208 Final Project Guidelines and Rubric Overview .docx
DOCX
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
DOCX
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
DOCX
Spring 2020 – Business Continuity & Disaster R.docx
DOCX
Sports Business Landscape Graphic OrganizerContent.docx
DOCX
Spring 2020Carlow University Department of Psychology & Co.docx
DOCX
Sport Ticket sales staff trainingChapter 4Sales .docx
DOCX
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
DOCX
SPM 4723 Annotated Bibliography You second major proje.docx
DOCX
Speech Environment and Recording Requirements• You must have a.docx
DOCX
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
DOCX
Speech Recognition in the Electronic Health Record (2013 u.docx
DOCX
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
DOCX
Specialized Terms 20.0 Definitions and examples of specialized.docx
DOCX
Special notes Media and the media are plural and take plural verb.docx
DOCX
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
DOCX
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
DOCX
Speaking about Muhammad, Speaking for MuslimsAuthor(s) An.docx
DOCX
Speaker NameSpeech TitleDirections For each area li.docx
Src TemplateStandard Recipe CardName of dishSpanish Vegie Tray Ba.docx
SPT 208 Final Project Guidelines and Rubric Overview .docx
Ssalinas_ThreeMountainsRegionalHospitalCodeofEthics73119.docxR.docx
Spring 2020Professor Tim SmithE mail [email protected]Teach.docx
Spring 2020 – Business Continuity & Disaster R.docx
Sports Business Landscape Graphic OrganizerContent.docx
Spring 2020Carlow University Department of Psychology & Co.docx
Sport Ticket sales staff trainingChapter 4Sales .docx
Sponsorship Works 2018 8PROJECT DETAILSSponsorship tit.docx
SPM 4723 Annotated Bibliography You second major proje.docx
Speech Environment and Recording Requirements• You must have a.docx
Sped4 Interview 2.10.17 Audio.m4aJodee [000008] And we are .docx
Speech Recognition in the Electronic Health Record (2013 u.docx
Sped Focus Group.m4aJodee [000001] This is a focus group wi.docx
Specialized Terms 20.0 Definitions and examples of specialized.docx
Special notes Media and the media are plural and take plural verb.docx
SPECIAL ISSUE ON POLITICAL VIOLENCEResearch on Social Move.docx
SPECIAL ISSUE CRITICAL REALISM IN IS RESEARCHCRITICAL RE.docx
Speaking about Muhammad, Speaking for MuslimsAuthor(s) An.docx
Speaker NameSpeech TitleDirections For each area li.docx
Ad

Recently uploaded (20)

PDF
My India Quiz Book_20210205121199924.pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PPTX
20th Century Theater, Methods, History.pptx
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
My India Quiz Book_20210205121199924.pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
20th Century Theater, Methods, History.pptx
Virtual and Augmented Reality in Current Scenario
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
HVAC Specification 2024 according to central public works department
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Introduction to pro and eukaryotes and differences.pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Share_Module_2_Power_conflict_and_negotiation.pptx
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
A powerpoint presentation on the Revised K-10 Science Shaping Paper
What if we spent less time fighting change, and more time building what’s rig...
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS

Running head CYBER SECURITY .docx

  • 1. Running head: CYBER SECURITY 1 CYBER SECURITY/EMERGENCY MANAGEMENT POLICY 2 The term "Running head" is formatted as Running head: Cyber Security/Emergency Management Policy American Public University (EDMG 600) Dr. Darrell Dantzler 05/09/2018 Cyber Security/Emergency Management Policy Begin the paper with an introduction of your topic. An introduction has an attention getter, purpose or thesis statement, and an overview. An attention getter can begin with any of the 6 ways: (1) Anecdote, (2) Question, (3) Quotation, (4) Humor, (5) Shocking Statistic, or a (6) combination of them (http://classroom.synonym.com/5-types-attention-getters- essays-2877.html). After you introduce the topic, state the purpose of the paper. The purpose can be as simple as restating the objective of the assignment. The purpose of this paper is to (state purpose). (Overview) The paper will address the following: (List topics) Part 1 After reading Moore at al. (2010), Goodyear, Portillo, Goerdel & Williams (2010) and Deloitte-NASCIO (2013), develop a
  • 2. cyber security/EM Policy Analytical model in which you will recommend and justify the most effective way to manage emergency management related cyber security issues at the state level. Cyber Security Cybercrimes are increasingly becoming more common in all sectors in the world. This has made cyber security a top agenda for everyone in the world. This has resulted in the conventions and creation of agencies and structures that will facilitate cyber security (Deloitte-NASCIO. 2013, p 16).According to the author, a number of cyber laws have been formulated and more are being formulated to handle this challenge. For this matter, protecting our companies from various incidences of cyber-crimes, we will need to formulate clear and organised policies that will pit every structure in place to check the menace (Deloitte-NASCIO. 2013, p 34).Since internet is a gala for vast information in which everyone and business navigate through, with different intentions, protecting personal and company sensitive information is increasingly becoming a challenge (Moore et al., 2010, p 56). Cyber security policy will try to track the paths of the internet users in order to control their navigation and keep it on the recommended or acceptable tracks. Allowing internet users to deviate from the pre-determined and acceptable paths, as are stipulated in the policy, will lead to discrepancy in the use of information on the internet thus risking accessibility and sharing of sensitive information without permission (illegal). When personalised or sensitive information reached the public pages of the internet, it becomes irretrievable and loses secrecy. This is the major concern of most governments. Hackers have been able to exploit the Operating System (OS) of people’s computers, accessing and leaving the gathered information in the public domain and attackers (Goodyear et al., 2010, p 36). Cyber security/Emergency Management Policy A number of policies need to be put in place to bar internet user
  • 3. and the hackers from accessing, gathering and sharing personalized or sensitive information to the public or exposing it to the hackers. Most citizens are not conscious of the existing cyber security policies and so still believe that it is the work of the government to ensure internet is free from hackers and that their information is safe. Policies Recommendation The policies I will recommend are, educational or capacity building among the internet users’ policy, the continuous cyber security research framework, incident response, personal device use, email, data sharing and security of devices policy. Justification of Policies As a government with such a challenge, the most profound policy will be education awareness policy. Educational program will be aimed at sensitizing individuals about their specific roles in cyber security and personalized or sensitive information protection (Goodyear et al., 2010, p 45). Educational campaigns can also be used to create awareness about information encryption, sharing and other sensitive cyber security concerns in order to help them become more conscious internet users who understand the detrimental effects of not taking measures to secure sensitive information from hackers. This is especially good in this times as the world of social media, e-commerce and digitization of most of the sectors in the world is taking place. Most of this information will need to be protected and kept at bay from the attackers (Deloitte-NASCIO. 2013, p 12). Establishment of a continuous cyber security framework is important and will help to critically look into the emerging techniques and the recurrent trends in cyber security and also assist in the designing emergency management systems that will reduce the damage in the event the attack occurs (Moore et al., 2010, 48). The framework will ensure a specialized plan is put in place in order to address cyber security concerns. It will
  • 4. facilitate local and state level cyber security structural formulation, establishment of cyber security agreements, coordinating all state entities to realize synergy as they work together and involvement of the private sector in order to fight the wide scope and growing cyber security concerns (Goodyear et al., 2010, p 24). This will facilitate sharing of cyber security information (attack and threats information) thus pooling together resources to fight the cyber risks and reduce the damages associated with it. According to Goodyear et al. (2010, p 25), formation of a partnership between the private sector and the public sector and coordinating the federal resources and the state will be paramount. Incident response policy will facilitate federal and national awareness of their responsibilities in use of intervention tools in the response towards a cyber-attack. The policy will level communication grounds and establish a formidable structure in order to alleviate breakdown in outreach program about cyber threats and response actions during an attack in order to achieve high responses and quick action. Response policy to address agency tactic gaps and lack of intervention tools and will also enforce other tactical responses. It will enhance roles of the state, federal agencies, managers and facilitate efficient decision making process among the agencies during the attack (Goodyear et al., 2010, p 29). The policy governing use of personal device will restrict the use of personal devices to access company information, unless it is a closely monitored and safely kept device. The devices should protected by passwords, will encourage the use of safe networks only, keep security software updated and upgraded and also ways to lock the devices when not in use (Moore at al., 2010, p 102). Emailing and data sharing policy is a good policy that will ensure emailing, data sharing is monitored, including the protection of the devices being used. Moore at al. (2010, p 33),recommends that the company should put in place a policy
  • 5. that discourages opening of attachments sent to the company unless the source is known and is safe. The massagers will be prompted to identify the inconsistencies and identifies of the senders. Data sharing should only be done using the company network and lastly, a disciplinary action policy. A number of warnings, termination of employees and networks, evaluation and case-by-case assessment of the breach will be conducted (Goodyear et al., 2010, p 45). References Goodyear, M., Goerdel, H., Portillo, S., & Williams, L. (2010). Cybersecurity management in the states: The emerging role of chief information security officers. Retrieved from Deloitte-NASCIO. (Date). “ 2014 Deloitte-NASCIO Cybersecurity Study: State Governments at Risk: Time to Move Forward,” Deloitte Developmental LLC, October 2014, http://www.nascio.org/publications/documents/Deloitte- NASCIOCybersecurityStudy_2014.pdf Moore, T., Pym, D. J., & Ioannidis, C. (2010). Economics of information security and privacy. Springer. Part 2 After reading the article, respond to the followingfour questions bellow.Separate each response with the sub-headed question statement): Way forward for cyber security According to me, cyber security need to be devolved to individual companies and internet users but at the same time monitored by both private and governmental agencies collaboratively (Jayawardane et al., 2015, p 23). This should be formulated in a clearly guided policy in which pre-determined super governing agreements will be entered into among the agencies in order to ensure every party plays its role. This will help pool resources and intervention tools together and fight a common battle through a common channel and thus reducing inter-agencies supremacy and tactical battles thus mitigating the
  • 6. effects of cyber incidences and reducing the threats (Carr, 2016, p 56). Applicability of traditional regulatory model Yes! A traditional model will work in this space. The model will bring together the federal and state governments on one table, and partner with the private sector to fight the common battle with a common goal (Jayawardane et al., 2015, p 46). Need for a new cyber security model Yes! A newer model to fight the 21st century cyber security issues need to be developed. This model should incorporate the traditional model with modifications due to the emerging cyber security challenges in which individual internet users should come in. the model should make it clear that the responsibility for cyber security in everyone’s. According to Clinton (2011, p 97), cyber space is rapidly changing and so the model to be developed should incorporate psychological and behavioral approaches in understanding the tactics of the cyber attackers and also include the tracking of the various serves with strictly monitored technologies Government regulation The government should regulate every internet user and the companies hosting web pages . The owners of the cyber space should also be closely monitored by the government (National Research Council Group, 2010, p 23). A research question for further research To conclude, we need to find out if the attackers have their cyber technology laboratory where they carry out attackers or are inside employees and therefore formulate a policy that will regulate employees’ movements or track the hackers’ cyber space. Conclusion Conclusions wrap up what you have been discussing in your paper. After moving from general to specific information in the
  • 7. introduction and body paragraphs, your conclusion should begin pulling back into more general information that restates the main points of your argument. Conclusions may also call for action or overview future possible research. The following outline may help you conclude your paper: In a general way, · Restate your topic and why it is important, · Restate your thesis/claim, · Address opposing viewpoints and explain why readers should align with your position, · Call for action or overview future research possibilities. References Carr, M. (2016). Public–private partnerships in national cyber‐security strategies. International Affairs, 92(1), 43-62. Clinton, L. (2011). A relationship on the rocks: industry- government partnership for cyber defense. Journal of Strategic Security, 4(2), 97. Jayawardane, S., Larik, J. E., & Jackson, E. (2015). Cyber Governance: Challenges , Solution s, and Lessons for Effective Global Governance. The Hague Institute for Global Justice Policy Brief.
  • 8. National Research Council. (2010). Proceedings of a Workshop on Deterring Cyber attacks: Informing Strategies and Developing Options for US Policy. National Academies Press. �Your title line goes here. It shall be the Long title in Upper and Lower case, centered with no bold. The paper is introduced in this area with an attention getter, purpose/thesis statement, and overview of topics. See the APA Paper Template Provided in the Resources Area �Nice job! �Paragraph is not supported. It only has two sentences. More discussion or application is warranted here, or consider combining with other paragraphs �This discussion is not comprehensive �Nice Discussion
  • 9. �Nice job! �Great Discussion in the following paragraph �Great job! �Remove quotation marks from title. �More In-depth Discussion is Warranted and More In-Depth Application is Warranted �More In-depth Discussion is Warranted and More In-Depth Application is Warranted �Why, how? Please apply your discussion �Great research question(s) or ideas.
  • 10. �include a conclusion �Only capitalize the first letter of the first word of a title, the first word after a colon or a dash in the title, and proper nouns. Do not capitalize the first letter of the second word in a hyphenated compound word. �Only capitalize the first letter of the first word of a title, the first word after a colon or a dash in the title, and proper nouns. Do not capitalize the first letter of the second word in a hyphenated compound word. BUAD 2020 Information Technology Management Assignment #1 – Using Excel's Functions for Data Analysis Due: Sunday, May 20th 11:59pm
  • 11. Case Background: You have been hired by John McDougal, sales manager of Macy's Franklin Park store, to help him better understand the productivity of his sales force. Mr. McDougal has provided you with a download from the POS system that contains the employee name, rank, department, sales and hours worked. That data is provided to you in the file named A1_MacysDeptStore.xlsx (and is available for download on Blackboard – under the assignment course link) and looks similar to the image below. Mr. McDougal would like you to produce a series of reports that will let him know how well the
  • 12. sales force is performing – where performance is defined by how many employees meet their targeted sales quotas and the overall percentage of the sales quota obtained by the cumulative efforts of all salesmen. Mr. McDougal has identified two ways that he would like the analysis of each week presented. Each part is detailed below. Part 1: Mr. McDougal would like a weekly recap of sales by salesman that displays information regarding weekly sales, the salesman's sales quota, the percent of the quota met, number of hours worked, base pay earned, commission due and the salesman's gross pay for the week under review. He put together a sample of how he would like the report to look – use this
  • 13. layout – or your best judgement to produce a well laid out and easy to understand report. Notice the report includes the name in the format of Last, First. You will need to use some text functions to display the name concatenating the empLast to the empFirst with a comma and space between (", ") . Assignment #1 – Using Excel's Functions for Data Analysis 2 The other formulas required to produce this detail report will need to pull information from a table of hourly wages and quotas that Mr. McDougal has
  • 14. provided to you. Each employee is assigned a "Rank" within the sales force. Macy's has 5 different ranks. The employee's base pay and commission rate is dependent upon the rank assignment. For example, a rank of AM indicates an Assistant Manager who is paid $23.50 per hour, is expected to produce $200.00 of sales for each hour that he/she works and is paid a commission on his sales, if he/she meets the hourly sales quota for the week. The table of values displayed below should be replicated and used in your workbook: Hourly Wages & Quotas Sales Rank Sales Title Hourly Wage Hrly Sales Quota
  • 15. Commission Rate AM Assistant Manager $ 23.50 $ 200.00 3.0% PT1 Sales Assistant $ 10.50 $ 100.00 1.0% PT2 Sales Partner $ 11.75 $ 125.00 1.5% S1 Sales Associate $ 13.50 $ 150.00 2.0% S2 Sales Consultant $ 15.00 $ 175.00 2.5% times the hourly sales quota of the designated Sales Rank. s the hourly wage. their Target Sales – by multiplying the weekly sales amount times the commission rate that corresponds to the employee's Sales
  • 16. Rank. and Commission. The report should be sorted to make it easy to identify the "best" salesperson – defined by the % of target column. Part 2: Mr. McDougal would also like a summary report that will display the counts, sales and quotas (targets) by Rank. (The % of Target column in this summary report is calculated as Total Sales divided by Total Target.) Assignment #1 – Using Excel's Functions for Data Analysis 3
  • 17. Put the Excel skills taught thus far to produce the requested information for Mr. McDougal. Write (and leave) formulas on the Raw Data worksheet to convert data, as needed. Copy and paste (AS VALUES) the data from the Raw Data worksheet onto your Reporting worksheet. Insert worksheets within the workbook supplied to build your report and summary solutions to present the required information. Use absolute addressing, VLookup, IF, Count, CountIF, SumIF, and various text functions to create your solution. Create a solution that would work with this or another similar data set. Do NOT go into the data and modify it by hand – and do not use Pivot Tables in this assignment. Create formulas to lookup, calculate and display the requested information.
  • 18. Pay attention to formatting, column widths, headings, and other visual aids to produce easily consumed information. Attention: No late work accepted. Assignment Deliverables: #1 Course Link Assignment #1 – Using Excel's Functions for Data Analysis
  • 19. 4 Submitted by: _________________________________ Section: ___________ Grading Rubric for Assignment #1: Points Earned Category Description/Requirements ______(5) Manipulation of text data Use of functions to manipulate downloaded data provided on Raw Data worksheet to produce the data in the form needed for
  • 20. reporting purposes. Leave the formulas demonstrating how you converted the data from the form given to the form needed. Failure to submit a document with those formulas will be interpreted as if you made the changes manually and will result in 0 points awarded in this category. ______(5) Formula Addressing Demonstrated understanding of absolute and relative addresses and/or named ranges to simplify copy/paste of complex formulas. ______(10) Weekly
  • 21. Productivity Report Correct use of formulas and functions to produce required information for Weekly Productivity Report. ______(10) Summary Report Correct use of formulas and functions to produce required information for Summary Report. ______(5) Formatting Attention to details to format reports and report data, Print to fit, text alignments, data formatting – and generally provide a report easily read and consumed. ______(5) Proper Submission Post Excel document to Blackboard and submit required hardcopy reports with grading rubric.
  • 22. ______(40) Total Points Earned Attention: No late work accepted. Notes: RawDataempFirstempLastrankdepartmentsaleshoursDorianSanta naS2Juniors$4,058.6217QuynRyanS2Shoes$3,431.1617LucianH endrixAMInfants$9,200.2232MaryamWrightPT1Juniors$3,615.6 037FlorenceTerryS2Mens$4,811.5313GrantBallardPT1Mens$2, 907.9825ZeldaRileyPT1Childrens$4,123.0022DaceyGilmorePT1 Womens$1,700.8316SachaShortS1Mens$4,840.1128BurkeCarril loPT2Cosmetics$5,071.9734PhoebeCombsPT2Shoes$4,208.622 8LaceyRosarioS2Juniors$5,082.7631OriSargentAMHousewares $5,741.2715MaggieEnglandPT1Childrens$2,621.9216SandraGe orgePT1Cosmetics$1,556.6516FayMeadowsS2Housewares$5,53 6.7931JamesonSalinasPT2Cosmetics$4,191.6030GretchenDiazS 1Mens$5,387.2636UrsulaMannPT1Mens$4,127.7822LaithKlein PT2Mens$5,107.6131FreyaGarrisonAMShoes$9,966.5536Vanna DoylePT1Womens$2,604.7625SukiDurhamS2Juniors$6,670.233 7PaulaCruzS2Shoes$6,144.8834ChelseaMccormickS1Childrens$
  • 23. 5,371.4839NeveToddS1Childrens$2,560.4513TarikBondS1Child rens$5,932.3331BlytheArnoldS1Mens$3,854.8221LukePiercePT 1Womens$5,661.1437TashaRoblesPT2Mens$4,778.2938SylviaP agePT2Housewares$3,866.3023NigelGilesAMMens$7,607.2533 EltonVelezPT1Cosmetics$2,852.7621TylerShermanPT2Mens$4, 720.2032JosephJordanPT2Womens$4,774.9326EmmaMeltonPT2 Housewares$5,183.3922IndigoRiversS2Childrens$3,682.7418Ca ndiceJarvisAMMens$7,666.5628NellMclaughlinS2Childrens$5, 331.5614CurranAtkinsS1Childrens$5,152.4728AubreyByersPT1 Cosmetics$4,284.8822CadmanQuinnS1Housewares$9,429.9333 CiaraEllisonPT1Mens$2,419.3934KeatonDavidPT2Juniors$3,00 1.7736MerrillHerringS1Shoes$7,139.7627ThorWorkmanS2Infan ts$3,903.6622LeoRichAMShoes$13,949.0940MariNoelS1Junior s$4,289.0219XenosRosarioS1Infants$5,105.7734VirginiaBenso nPT2Womens$5,563.7813BuckminsterRiggsS1Womens$3,198.2 018BriannaWilliamAMInfants$6,500.7120OctaviaSaundersS1Co smetics$8,327.2938DeaconWintersPT2Childrens$4,019.3223She ilaRushS2Mens$3,139.4912JessicaDunnAMHousewares$5,820.3 134JolieValenciaPT2Infants$2,670.7040RemediosKirklandAMJ uniors$5,770.5112OceanLoganS2Shoes$4,011.8421HermioneFr yS1Womens$5,899.1438VioletHewittAMShoes$7,064.4532Cedr icRiddleS2Shoes$8,203.0039WyomingHansonS2Cosmetics$10,3 01.9839DavidReeseS2Shoes$5,371.0729SheaBartlettS2Children s$2,492.4817ArethaLoweS1Juniors$5,118.5019ConstanceBattle PT1Shoes$3,651.8932AddisonVasquezPT2Womens$5,500.4227
  • 24. KaneShawS1Mens$5,468.3225NaomiMorganS1Cosmetics$4,933 .2131KennethOliverPT2Infants$3,931.1123ClaireCampbellPT2I nfants$1,905.6015RandallHahnS1Housewares$2,677.6313Ferdin andValdezS2Infants$3,867.0337MollyPottsPT1Housewares$2,7 14.7327PearlWoodsAMCosmetics$4,129.5416FrederickaFinchA MCosmetics$5,891.3921StoneGibbsS2Cosmetics$5,148.1837Ma rsdenWeeksS1Mens$5,547.8837EvanRushPT2Shoes$3,181.2916 TimonCastilloS1Childrens$3,617.9815KyleChurchAMHousewar es$8,525.6237UrielRosalesPT2Womens$4,668.1623EvelynMont oyaPT2Womens$5,572.3333FinnDaughertyS2Juniors$4,817.612 1JustineGilesPT1Juniors$558.7123ToddLeonardS2Womens$8,0 23.3739QuintessaVaughanS2Childrens$5,151.9320KellyGoodwi nS1Housewares$505.9725MartinMosesS1Infants$3,212.7819Kai tlinChanAMChildrens$3,865.6524KeefeCharlesS1Mens$7,881.1 132ImaniMendezPT2Cosmetics$6,273.3533CamilleRollinsAMC osmetics$7,665.8926NeveDanielsS2Cosmetics$5,094.3927Willo wFitzgeraldAMShoes$3,669.7020AlanBrayPT1Infants$2,964.82 22JoanMasseyAMHousewares$6,016.7732EleanorStantonPT1Inf ants$4,521.5530MacySalasPT1Infants$4,739.8038 Running head: SHORT TITLE IN ALL CAPS1 INSERT THE SHORT TITLE IN ALL CAPS2
  • 25. Insert the Long Title: Use Upper and Lower Case Font and No Bold Your Name (Student #) University Name (EDMG 600) Professor's Name Date Insert the Long Title of Your Paper No Bold or Underline Begin the paper with an introduction of your topic. An introduction has an attention getter, purpose or thesis statement, and an overview. An attention getter can begin with any of the 6 ways: (1) Anecdote, (2) Question, (3) Quotation, (4) Humor, (5) Shocking Statistic, or a (6) combination of them (http://classroom.synonym.com/5-types-attention-getters- essays-2877.html). After you introduce the topic, state the purpose of the paper. The purpose can be as simple as restating the objective of the assignment. The purpose of this paper is to (state purpose). (Overview) The paper will address the following: (List topics) Article #1 (Name and/or Author) This is the first main point as listed in the overview and pulled from the assignment requirements. I recommend you look at the rubric and the assignment requirements to ensure you address all requirements. Please provide example to support your
  • 26. research or assumptions. Real world events, experiences, opinions based on research, conclusions based on research. Be sure to use in text citation (Dantzler, 2014). Strengths and Weaknesses Add sub topics if applicable and in text citation if applicable (Author, 2014). Most and Least Persuasive, Premise, Claim or Rebuttal Add sub topics if applicable and in text citation if applicable (Author, 2014). Article #2 (Name and/or Author) This is the second main point as listed in the overview and pulled from the assignment. It also ensure you address all points on the scoring rubric. Please provide example to support your research or assumptions. Real world events, experiences, opinions based on research, conclusions based on research. Be sure to use in text citation (Author, 2014). Strengths and Weaknesses Add sub topics if applicable and in text citation if applicable (Author, 2014). Most and Least Persuasive, Premise, Claim or Rebuttal Add sub topics if applicable and in text citation if applicable (Author, 2014). Article #3 (Name and/or Author) This is the third main point as listed in the overview and pulled from the assignment. It also ensure you address all points on
  • 27. the scoring rubric. Please provide example to support your research or assumptions. Real world events, experiences, opinions based on research, conclusions based on research. Be sure to use in text citation (Author, 2014). Strengths and Weaknesses Add sub topics if applicable and in text citation if applicable (Author, 2014). Most and Least Persuasive, Premise, Claim or Rebuttal Add sub topics if applicable and in text citation if applicable (Author, 2014). Research or Policy Question for Further Research U.S. Government Framework Addressing Cyber Security Challenges This is the fourth main point as listed in the overview and pulled from the assignment. It also ensure you address all points on the scoring rubric. Please provide example to support your research or assumptions. Real world events, experiences, opinions based on research, conclusions based on research. Be sure to use in text citation (Author, 2014). Research or Policy Question for Further Research Conclusion Conclusions wrap up what you have been discussing in your paper. After moving from general to specific information in the introduction and body paragraphs, your conclusion should begin
  • 28. pulling back into more general information that restates the main points of your argument. Conclusions may also call for action or overview future possible research. The following outline may help you conclude your paper: In a general way, · Restate your topic and why it is important, · Restate your thesis/claim, · Address opposing viewpoints and explain why readers should align with your position, · Call for action or overview future research possibilities. References Abrams, R. (2014). Target puts data breach costs at $148 million, and forecasts profit drop. Retrieved from http://www.nytimes.com/2014/08/06/business/target-puts-data- breach-costs-at-148-million.html?_r=0 Bellovin, S. M., Bradner, S. O., Diffie, W., Landau, S., & Rexford, J. (2011). Can it really work? Problems with extending Einstein 3 to critical infrastructure.Harvard National Security Journal, 3, 1-38. Retrieved from http://harvardnsj.org/wp- content/uploads/2012/01/Vol.- 3_Bellovin_Bradner_Diffie_Landau_Rexford.pdf Clemente, D. (2013). Cyber security and global interdependence: What is critical? Retrieved from
  • 29. http://www.chathamhouse.org/sites/files/chathamhouse/public/R esearch/International%20Security/0213pr_cyber.pdf Cornish, E. (2005). Futuring: The exploration of the future. Bethesda, MD: World Future Society. Department of Homeland Security. (2013). National infrastructure protection plan: Partnering for critical infrastructure security and resilience. Retrieved from http://www.dhs.gov/sites/default/files/publications/NIPP%2020 13_Partnering%20for%20Critical%20Infrastructure%20Security %20and%20Resilience_508_0.pdf Nojeim, G. T. (2010). Cybersecurity and freedom on the internet.Journal of National Security Law & Policy, 4, 119-137. Retrieved from https://cdt.org/files/pdfs/09_Nojeim.pdf Saadawi, T. & Jordan, L. (2011). Introduction. In T. Saadawi & L. Jordan (Eds.), Cyber infrastructure protection (pp.1-12). Retrieved from http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB1067 .pdf Running head: SHORT TITLE IN ALL CAPS 1
  • 30. Insert the Long Title: Use Upper and Lower Case Font and No Bold Your Name (Student #) University Name (EDMG 600 ) Professor's Name Date
  • 31. 1. Research Project Proposal Required Content 2. Policy Project Proposal Required Content 3. Research Project Final Version Required Content 4. Policy Project Final Version Required Content APA6thEditionCitation,ReferencingandFormattingrequired RESEARCH PAPER PROPOSAL REQUIRED CONTENT Your Final Project Proposal (for Research Paper OR Policy Paper) should be approx. 2 pages long, including tentative references. It must include the following subsections/subtitles in the following order: 1. Title Page name, professor's name, and a tentative title). 2. Problem Statement (include Problem Background) – cite and/or reference ‐‐ at
  • 32. least two per‐ reviewed resources to illuminate the problem). serve verbatim as the Title of your paper. 3. Research Question (must end with “?”) been covered in the literature, or you believe has been covered or answered incorrectly, insufficiently or inadequately. which one is possible effect/consequence? 4. Thesis or Proposition Question) B and C affect/cause or correlate with Y” 5. Tentative Literature/Resources List resources) any level ‐‐ local, state or federal, or media resources, newspapers, TV, radio, printed or electronic ‐‐ can be utilized as primary sources but they are not peer‐ reviewed resources.
  • 33. Emergency Management or the course textbook, are peer‐reviewed resources. You should discuss at least two fellow classmates' Final Paper Proposals. You should discuss the content of your classmates' proposals, not their grammar or writing. If necessary, I will contact each of you regarding grammar and writing. POLICY PAPER PROPOSAL/OUTLINE REQUIRED CONTENT Your Final Policy Paper Proposal should be 2 pages long, including tentative references, and must include the following subsections/subtitles in the following order: 1. Title Page
  • 34. me, your name, professor's name, and a tentative title). 2. Problem Statement (include Problem Background) resource to illuminate the problem 3. Policy Question g the present course; inferring about the future: What?, How?, or How? Project 4. Policy Claim (your preliminary/presumed answer to your Policy Question; possible Recommended Policy Action. 5. Tentative Literature/Resources List resources) any level ‐‐ local, state or federal, or media resources can be utilized as primary sources ‐‐ but they are not peer‐reviewed resources. Emergency Management or the course textbook, are peer‐reviewed resources.
  • 35. You should discuss at least two fellow classmates' Final Paper Proposals. You should discuss the content of your classmates' proposals, not their grammar or writing. If necessary, I will contact each of you regarding grammar and writing. RESEARCH PAPER FINAL VERSION REQUIRED CONTENT Final version of the Research Paper must be APA‐formatted, and must include the following subsections in the following order: 1. Title Page 2. Statement of Purpose 3. Problem Statement (utilize literature/reference and cite using APA standard) ‐reviewed literature listed in your References
  • 36. failed to address this problem. 4. Research Question problem/process/phenomenon that has not been covered in the literature, or you believe has been covered or answered incorrectly, insufficiently or inadequately. (independent/dependent, i.e., cause and effect) 5. Literature Review eview should show you have read and understood what experts in the field have written about the same or similar problem. topic/problem. " You can be praising and critical. iencies in authors’ Claims, Grounds, Assumptions, Warrants, Backing, Qualifiers, and Rebuttals 6. Research Design/Methodology Mixed) paragraph will suffice), and should point to a method you would use to investigate the problem in depth.
  • 37. conduct your own research. This is why the emphasis is on your Literature Review. 7. Thesis/Proposition Question) (independent/dependent, i.e., cause and effect), after you discovered deficiencies in the literature and policy/practice problem/phenomenon tion of variables, research instruments, validity, sample, collecting data, etc., you do not need to go in detail here. 8. Analysis (of your investigation) Review. Findings related to your Research Question and the Thesis?
  • 38. supports or rejects the existing Literature’s arguments and/or Practice? or refute your Proposition (Thesis)? 9. Conclusion and Recommendations for Further Research POLICY PAPER FINAL VERSION REQUIRED CONTENT Final version of the Policy Paper must be APA‐formatted, and must include the following subsections in the following order: 1.Executive Summary (1‐2 paragraphs) 2.Problem Statement 3.Problem Background 4.Forecasting Policy Options be the status quo (“do nothing”)
  • 39. Option feasibility, and pros and cons of each Policy Option 5. Recommended Policy Action (in your Policy Paper Proposal you labeled it "Policy Claim ‐ your presumably preferred option at the preliminary stage of your research makers or business leaders 6. Monitoring (of the Recommended) Policy Action's Outcomes outcomes should be monitored? 7. Evaluating Recommended Policy Action’s Performance performance should be evaluated? 8.Conclusion 9.References
  • 40. At least 8‐10 peer‐reviewed references in addition to government and media resources First and Second person, are not allowed in formal writing. I have to approve your Proposal/Outline before you continue expanding it into a full paper. Let me know if you have questions. Research Proposal1 AMERICAN PUBLIC UNIVERSITY SYSTEM Charles Town, West Virginia PROPOSAL FOR THESIS/RESEARCH PAPER MASTER OF ARTS IN EMERGENCY AND DISASTER MANAGEMENT AMERICAN MILITARY UNIVERSITY SCHOOL OF SECURITY & GLOBAL STUDIES [student name] 201X
  • 41. I propose to the Thesis/Research Paper Professor and to the Department a study of the following topic to be conducted in partial fulfillment of the requirements for the degree of Master of Arts in Emergency and Disaster Management: [title] Title of the Proposal [week 3: put your title here] Problem Statement [put your problem statement text here. APA-reference it with at least tow peer-reviewed references; minimum 350 words] Need for the Study [put your need for the study text here; two double-spaced paragraphs; 250 words min] Target Audience [put your target audience text here; minimum 150 words ] Objectives of the Research
  • 42. [put your objectives of the research text here (minimum 150 words] Hypothesis [put your hypothesis here; single paragraph statement; it is your preliminary/presumed answer to your Research Question: factors A, B and C affect/cause or correlate with Y. You can hypothesize inductively, by generalizing practice/policy, or deductively, by testing a presumably applicable known theory. Central Research Question plus sub questions [put your research questions here; the central question should point to a problem/process/phenomenon that has not been covered in the literature, or you believe has been covered or answered incorrectly, insufficiently or inadequately; distill key variables/factors: which one is possible cause and which one is possible effect/consequence?] Literature Review [Provide APA-referenced and formatted critical review of the
  • 43. key issues pertinent to your topic by at least five peer-reviewed authors; minimum two double-spaced pages-long, 750 words minimum] Shortfalls in the Literature [put your shortfalls in the literature text here; at least two paragraphs; minimum 50 words] Summary of Findings [put your summary of findings text here; 150 words minimum] Methodology Selection of Method(s) [put your selection of methods text here; minimum 350 words] Data Collection Process and Analysis [put your data collection text here; minimum 150 words] Researcher’s Perspective
  • 44. Potential Bias Issues [put your potential bias text here; minimum 250 ] Anticipated Ethical Issues [put your anticipated ethical issues text here; minimum 150 words] References [put your references text here] Source: William N. Dunn, (1981). Public Policy Analysis. Englewood Cliffs: Prentice Hall. Page 1 Policy Issue Paper Template
  • 45. EELLEEMMEENNTTSS OOFF TTHHEE IISSSSUUEE PPAAPPEERR PPOOLLIICCYY-- IINNFFOORRMMAATTIIOONNAALL CCOOMMPPOONNEENNTT PPOOLLIICCYY--AANNAALLYYTTIICC MMEETTHHOODD 11.. SSOOUURRCCEE AANNDD BBAACCKKGGRROOUUNNDD OOFF TTHHEE PPRROOBBLLEEMM aa.. DDeessccrriippttiioonn ooff PPrroobblleemmaattiicc SSiittuuaattiioonn bb.. OOuuttccoommeess ooff PPrriioorr EEffffoorrttss ttoo RReessoollvvee PPrroobblleemm cc.. AAsssseessssmmeenntt ooff PPaasstt PPoolliiccyy PPeerrffoorrmmaannccee dd.. SSiiggnniiffiiccaannccee ooff PPrroobblleemmaattiicc
  • 46. SSiittuuaattiioonn PPOOLLIICCYY OOUUTTCCOOMMEESS PPOOLLIICCYY PPEERRFFOORRMMAANNCCEE MMoonniittoorriinngg EEvvaalluuaattiioonn 22.. TTHHEE PPOOLLIICCYY PPRROOBBLLEEMM aa)) PPrroobblleemm SSttaatteemmeenntt bb)) AApppprrooaacchh ttoo AAnnaallyyssiiss cc)) MMaajjoorr SSttaakkeehhoollddeerrss dd)) GGooaallss aanndd OObbjjeeccttiivveess ee)) MMeeaassuurree ooff EEffffeeccttiivveenneessss ff)) PPootteennttiiaall SSoolluuttiioonnss PPOOLLIICCYY PPRROOBBLLEEMMSS PPrroobblleemm SSttrruuccttuurriinngg 33.. PPOOLLIICCYY AALLTTEERRNNAATTIIVVEESS aa.. DDeessccrriippttiioonn ooff AAlltteerrnnaattiivveess bb.. CCoommppaarriissoonn ooff AAlltteerrnnaattiivveess cc.. SSppiilllloovveerrss aanndd EExxtteerrnnaalliittiieess dd.. CCoonnssttrraaiinnttss aanndd PPoolliittiiccaall FFeeaassiibbiilliittyy
  • 47. PPOOLLIICCYY AALLTTEERRNNAATTIIVVEESS FFoorreeccaassttiinngg 44.. PPOOLLIICCYY RREECCOOMMMMEENNDDAATTIIOONNSS aa.. CCrriitteerriiaa ffoorr RReeccoommmmeennddiinngg AAlltteerrnnaattiivveess bb.. DDeessccrriippttiioonn ooff PPrreeffeerrrreedd AAlltteerrnnaattiivvee((ss)) cc.. OOuuttlliinnee ooff IImmpplleemmeennttaattiioonn SSttrraatteeggyy dd.. PPrroovviissiioonn ffoorr MMoonniittoorriinngg aanndd EEvvaalluuaattiioonn ee.. LLiimmiittaattiioonnss aanndd UUnnaannttiicciippaatteedd CCoonnsseeqquueenncceess PPOOLLIICCYY AACCTTIIOONNSS PPOOLLIICCYY OOUUTTCCOOMMEESS PPOOLLIICCYY PPEERRFFOORRMMAANNCCEE
  • 48. RReeccoommmmeennddaattiioonn MMoonniittoorriinngg EEvvaalluuaattiioonn 55.. RREEFFEERREENNCCEESS 66.. AAPPPPEENNDDIICCEESS Source: William N. Dunn, (1981). Public Policy Analysis. Englewood Cliffs: Prentice Hall. Page 2 AA CChheecckk ffoorr PPrreeppaarriinngg PPoolliiccyy IIssssuuee PPaappeerr RRaattiinngg SSccaallee::
  • 49. 11==TToottaallllyy AAddeeqquuaattee 22==AAddeeqquuaattee 33==IInnaaddeeqquuaattee 44==TToottaallllyy IInnaaddeeqquuaattee 00==NNoott AApppplliiccaabbllee EElleemmeenntt ooff PPoolliiccyy IIssssuuee PPaappeerr EExxaammppllee//NNoottee RRaattiinngg 11.. SSOOUURRCCEE AANNDD BBAACCKKGGRROOUUNNDD OOFF TTHHEE PPRROOBBLLEEMM EExxaammppllee//NNoottee RRaattiinngg pprroobblleemmaattiicc ssiittuuaattiioonn ddeessccrriibbeedd
  • 50. IInnccrreeaassiinngg ccrriimmee rraatteess mmaayy bbee aannaallyyzzeedd iinn ccoonnjjuunnccttiioonn wwiitthh ddaattaa oonn uunneemmppllooyymmeenntt,, ppoolliiccee rreeccrruuiittmmeenntt,, cciittiizzeenn’’ss ssuurrvveeyyss,, mmiiggrraattiioonn,, aanndd ssoo oonn.. r eeffffoorrttss ttoo rreessoollvvee pprroobblleemmss iinn tthhee aarreeaa bbeeeenn ddeessccrriibbeedd?? ““SSiimmiillaarr ttrraaiinniinngg pprrooggrraammss hhaavvee bbeeeenn iimmpplleemmeenntteedd iinn NNeeww YYoorrkk,, FFlloorriiddaa,, aanndd CCaalliiffoorrnniiaa,, aatt aa ccoosstt ooff $$44,,000000--55,,000000 ppeerr ttrraaiinneeee”” tthhee ppaasstt ppoolliiccyy ppeerrffoorrmmaannccee??
  • 51. ““TTrraaiinniinngg pprrooggrraammss iinn NNeeww YYoorrkk aanndd CCaalliiffoorrnniiaa rreessuulltteedd iinn aa 11 ppeerrcceenntt rreedduuccttiioonn iinn hhaarrdd--ccoorree uunneemmppllooyymmeenntt aanndd wweerree jjuuddggeedd ttoo bbee hhiigghhllyy ssuucccceessssffuull..”” pprroobblleemmaattiicc ssiittuuaattiioonn cclleeaarrllyy ddeessccrriibbeedd?? ““PPrroobblleemmss ooff iinndduussttrriiaall ppoolllluuttiioonn aarree mmoorree sseevveerree ttooddaayy tthhaann aatt aannyy ttiimmee iinn oouurr hhiissttoorryy aanndd aaffffeecctt tthhee pphhyyssiiccaall wweellll--bbeeiinngg ooff 6600 ppeerrcceenntt ooff tthhee ppooppuullaattiioonn.. TThhee rreessoolluuttiioonn ooff tthheessee pprroobblleemmss iiss aann uurrggeenntt mmaatttteerr tthhaatt ccaallllss ffoorr ttiimmeellyy aanndd ddeecciissiivvee aaccttiioonn..””
  • 52. 22.. TTHHEE PPOOLLIICCYY PPRROOBBLLEEMM EExxaammppllee//NNoottee RRaattiinngg Iss tthhee pprroobblleemm cclleeaarrllyy ssttaatteedd?? ““TThhee pprroobblleemm aaddddrreesssseess iinn tthhiiss ppaappeerr iiss hhooww bbeesstt ttoo ssaattiissffyy tthhee nneeeedd ffoorr iinnccrreeaasseedd ffiissccaall aaccccoouunnttaabbiilliittyy aammoonngg llooccaall ggoovveerrnnmmeennttss iinn tthhee rreeggiioonn..”” ““TThhee iissssuuee aaddddrreesssseedd iinn tthhiiss ppaappeerr wwhheetthheerr tthhee ssttaattee’’ss DDeeppaarrttmmeenntt ooff CCoommmmuunniittyy AAffffaaiirrss sshhoouulldd iinnccrreeaassee iittss tteecchhnniiccaall aassssiissttaannccee ttoo llooccaall ggoovveerrnnmmeennttss iinn tthhee aarreeaa ooff ffiinnaanncciiaall mmaannaaggeemmeenntt
  • 53. cclleeaarrllyy ssppeecciiffiieedd ““IInn aaddddrreessssiinngg tthhiiss iissssuuee wwee hhaavvee eemmppllooyyeedd ccoosstt--eeffffeeccttiivveenneessss aannaallyyssiiss aass aa wwaayy ttoo ddeetteerrmmiinnee tthhee lleevveellss ooff iinnvveessttmmeenntt nneecceessssaarryy ttoo ttrraaiinn 1100,,000000 llooccaall ooffffiicciiaallss iinn ccaasshh mmaannaaggeemmeenntt tteecchhnniiqquueess.. Source: William N. Dunn, (1981). Public Policy Analysis. Englewood Cliffs: Prentice Hall. Page 3 iiddeennttiiffiieedd aanndd pprriioorriittiizzeedd TThhee ttaasskk hheerree iiss ttoo iiddeennttiiffyy aallll
  • 54. ppeerrssoonnss aanndd ggrroouuppss wwhhoo ssiiggnniiffiiccaannttllyy aaffffeecctt aanndd aarree aaffffeecctteedd bbyy tthhee ffoorrmmuullaattiioonn aanndd iimmpplleemmeennttaattiioonn ooff ppoolliicciieess.. ““SSttaakkeehhoollddeerrss wwhhoo aarree oonnllyy mmaarrggiinnaallllyy iinnfflluueennttiiaall ((oorr aaffffeecctteedd)) mmaayy bbee ddrrooppppeedd ffrroomm tthhee aannaallyyssiiss,, bbuutt tthhiiss rreeqquuiirreess pprriioorriittiizzaattiioonn..”” AArree ggooaallss aanndd oobbjjeeccttiivveess cclleeaarrllyy ssppeecciiffiieedd ““TThhee ggooaall ooff tthhiiss ppoolliiccyy iiss ttoo iimmpprroovvee tthhee pphhyyssiiccaall sseeccuurriittyy ooff tthhee ccoommmmuunniittyy.. TThhee oobbjjeeccttiivvee iiss ttoo rreedduuccee rreeppoorrtteedd ccrriimmeess bbyy 1100 ppeerrcceenntt oorr mmoorree iinn tthhee 22000033--22000044 ppeerriioodd..”” AArree mmeeaassuurreess ooff eeffffeeccttiivveenneessss cclleeaarrllyy
  • 55. ssppeecciiffiieedd HHeerree tthheerree aarree mmaannyy cchhooiicceess:: bbeenneeffiitt--ccoosstt rraattiiooss,, nneett bbeenneeffiittss,, ddiissttrriibbuuttiioonnaall bbeenneeffiittss,, aanndd ssoo oonn.. AArree aallll sseettss ooff ppootteennttiiaall ssoolluuttiioonn oouuttlliinneedd?? ““AAnnyy eeffffoorrtt ttoo rreedduuccee ccrriimmee iinn tthhee aarreeaa sshhoouulldd ttaakkee iinnttoo aaccccoouunntt tthhee eeffffeeccttiivveenneessss ooff llaaww eennffoorrcceemmeenntt pprrooggrraammss,, tthhee uunneemmppllooyymmeenntt rraattee,, ppooppuullaattiioonn ddeennssiittyy,, aanndd uurrbbaanniizzaattiioonn.. 33.. PPOOLLIICCYY AALLTTEERRNNAATTIIVVEESS EExxaammppllee//NNoottee RRaattiinngg AArree AAlltteerrnnaattiivvee ssoolluuttiioonnss
  • 56. ssppeecciiffiieedd ““TThhrreeee ppoolliiccyy aalltteerrnnaattiivveess aarree aannaallyyzzeedd iinn tthhee ccoouurrssee ooff tthhiiss ppaappeerr:: eedduuccaattiioonnaall pprrooggrraammss ttoo aalleerrtt cciittiizzeennss ttoo tthhee rroollee tthheeyy ccaann ppllaayy iinn ccrriimmee ccoonnttrrooll;; ppoolliiccee ttrraaiinniinngg pprrooggrraammss:: aanndd aaddvvaanncceedd ccrriimmee ccoonnttrrooll tteecchhnnoollooggyy..”” AArree aalltteerrnnaattiivveess ssyysstteemmaattiiccaallllyy ccoommppaarreedd iinn tteerrmmss ooff tthheeiirr pprroobbaabbllee ccoossttss aanndd eeffffeeccttiivveenneessss?? ““PPrrooggrraamm AA hhaass aa bbeenneeffiitt--ccoosstt rraattiioo wwhhiicchh iiss ttwwiiccee tthhaatt ooff PPrrooggrraamm BB..””
  • 57. AArree rreelleevvaanntt ssppiilllloovveerrss aanndd eexxtteerrnnaalliittiieess iinncclluuddeedd iinn tthhee aannaallyyssiiss ooff tthhee aalltteerrnnaattiivveess?? ““TThhee eeaarrllyy cchhiillddhhoooodd eedduuccaattiioonnaall pprrooggrraamm iiss nnoott oonnllyy ccoosstt--eeffffeeccttiivvee.. IItt wwiillll aallssoo pprroodduuccee ssppiilllloovveerrss iinn tthhee ffoorrmm ooff iinnccrreeaasseedd ppaarrttiicciippaattiioonn ooff ffaammiillyy mmeemmbbeerrss iinn tthhee sscchhooooll.. AAtt tthhee ssaammee ttiimmee tthheerree aarree iimmppoorrttaanntt eexxtteerrnnaalliittiieess iinn tthhee ffoorrmm ooff iinnccrreeaasseedd ccoosstt ffoorr ttrraannssppoorrttaattiioonn ttoo aanndd ffrroomm tthhee sscchhooooll..”” AArree aallll rreelleevvaanntt ccoonnssttrraaiinnttss ttaakkeenn iinnttoo aaccccoouunntt?? TThheerree mmaayy bbee ffiinnaanncciiaall ((ffoorr
  • 58. eexxaammppllee,, ffiixxeedd ccoossttss)),, lleeggaall ((ffoorr eexxaammppllee,, llaawwss pprroossccrriibbiinngg cceerrttaaiinn aaccttiioonnss)),, oorr ppoolliittiiccaall ((ffoorr eexxaammppllee,, llaacckk ooff ppoolliittiiccaall ssuuppppoorrtt)) HHaavvee aalltteerrnnaattiivveess bbeeeenn ssyysstteemmaattiiccaallllyy ccoommppaarreedd iinn tteerrmmss ooff ppoolliittiiccaall ffeeaassiibbiilliittyy?? TThhee ppooiinntt hheerree iiss ttoo mmaakkee iinnffoorrmmeedd jjuuddggmmeennttss aabboouutt tthhee pprroobbaabbllee ssuuppppoorrtt,, rreelleevvaannccee,, aanndd iinnfflluueennccee ooff kkeeyy ssttaakkee hhoollddeerrss iinn ggaaiinniinngg aacccceeppttaannccee ffoorr aanndd iimmpplleemmeennttiinngg eeaacchh aalltteerrnnaattiivvee.. 44.. PPOOLLIICCYY RREECCOOMMMMEENNDDAATTIIOONNSS
  • 59. EExxaammppllee//NNoottee RRaattiinngg rreeccoommmmeennddiinngg aalltteerrnnaattiivveess cclleeaarrllyy ssppeecciiffiieedd CCrriitteerriiaa mmaayy iinncclluuddee:: nneett wweellffaarree iimmpprroovveemmeenntt;; ddiissttrriibbuuttiioonnaall iimmpprroovveemmeenntt,, ccoosstt eeffffeeccttiivveenneessss,, aanndd ssoo oonn.. tteerrnnaattiivvee bbeeeenn cclleeaarrllyy ddeessccrriibbeedd?? ““WWee tthheerreeffoorree rreeccoommmmeenndd tthhaatt tthhee sseeccoonndd aalltteerrnnaattiivvee bbee aaddoopptteedd aanndd iimmpplleemmeenntteedd,, ssiinnccee iitt iiss lliikkeellyy ttoo bbee mmoorree ccoosstt--eeffffeeccttiivvee aanndd iiss ppoolliittiiccaallllyy ffeeaassiibbllee uunnddeerr pprreesseenntt ccoonnddiittiioonnss..””
  • 60. Source: William N. Dunn, (1981). Public Policy Analysis. Englewood Cliffs: Prentice Hall. Page 4 iimmpplleemmeennttaattiioonn cclleeaarrllyy oouuttlliinneedd?? ““TThhee pprrooppoosseedd ppoolliiccyy sshhoouulldd bbee iimmpplleemmeenntteedd bbyy tthhee DDeeppaarrttmmeenntt ooff LLaabboorr aanndd ssttaattee eemmppllooyymmeenntt ooffffiicceess.. IImmpplleemmeennttaattiioonn sshhoouulldd bbee pphhaasseedd oovveerr aa ppeerriioodd ooff tthhrreeee yyeeaarrss aanndd ffooccuuss oonn cciittiieess wwiitthh mmoorree tthhaann 5500,,000000 ppeerrssoonnss..
  • 61. mmoonniittoorriinngg aanndd eevvaalluuaattiinngg ppoolliicciieess?? ““TThhee ssttaattee eemmppllooyymmeenntt ooffffiicceess sshhoouulldd eessttaabblliisshh ssppeecciiaall uunniittss ttoo eennggaaggee iinn pprroocceessss aanndd oouuttccoommee eevvaalluuaattiioonnss,, aatt iinntteerrvvaallss ooff 3300 ddaayyss.. RReessuulltt ooff mmoonniittoorriinngg aanndd eevvaalluuaattiioonn sshhoouulldd bbee ssttoorreedd iinn aa mmaannaaggeemmeenntt iinnffoorrmmaattiioonn ssyysstteemm aanndd rreeppoorrttss sshhoouulldd bbee ffiilleedd qquuaarrtteerrllyy.. uunniinntteennddeedd ccoonnsseeqquueenncceess ttaakkeenn iinnttoo aacccceenntt?? HHeerree tthhee ppooiinntt iiss ttoo ssppeecciiffyy hhooww lliimmiittaattiioonnss ooff tthhee aannaallyyssiiss aaffffeecctt tthhee
  • 62. ccoonnffiiddeennccee oonnee hhaass iinn tthhee ccoonncclluussiioonnss.. PPoossssiibbllee uunniinntteennddeedd ccoonnsseeqquueenncceess ((ffoorr eexxaammppllee,, aabbuusseess ooff ssoocciiaall wweellffaarree pprrooggrraammss,, nnuucclleeaarr mmeelltt--ddoowwnnss,, aanndd ssoo oonn)) sshhoouulldd aallssoo bbee tthhoouugghhtt tthhrroouugghh.. AArree rreeffeerreenncceess cciitteedd iinn tthhee tteexxtt iinncclluuddeedd iinn tthhee aapppprroopprriiaattee ffoorrmm?? IItt iiss pprreeffeerraabbllee ttoo uussee ““nnaammee-- ddaattee”” bbiibblliiooggrraapphhiicc ffoorrmm iinn aa ppoolliiccyy iissssuuee ppaappeerr.. OOnnllyy tthhee nnaammee ooff tthhee aauutthhoorr,, tthhee ddaattee ooff tthhee
  • 63. ppuubblliiccaattiioonn,, aanndd ppaaggee nnuummbbeerrss wwiillll bbee iinncclluuddeedd iinn tthhee tteexxtt,, wwiitthh nnoo ffoooottnnootteess aatt tthhee bboottttoomm ooff tthhee ppaaggee.. FFoorr eexxaammppllee:: ((JJoonneess,, 22000088:: 2200--2233)).. TThhee cciittaattiioonn iinn tthhee rreeffeerreenncceess wwiillll rreeaadd:: JJoonneess,, JJoohhnn,, ((1122000088)),, AA RReeppoorrtt oonn tthhee FFiissccaall CCrriissiiss.. WWaasshhiinnggttoonn,, DD..CC..:: FFiissccaall IInnssttiittuuttee.. IIss rreelleevvaanntt ssuuppppoorrttiinngg iinnffoorrmmaattiioonn ((ssttaattiissttiiccss,, lleeggiissllaattiioonn,, ddooccuummeennttss,, ccoorrrreessppoonnddeennccee)) iinncclluuddeedd?? AAllll ssttaattiissttiiccaall ttaabblleess sshhoouulldd bbee pprrooppeerrllyy nnuummbbeerreedd aanndd hheeaaddeedd
  • 64. aanndd tthhee ssoouurrccee ooff ddaattaa ssppeecciiffiieedd aatt tthhee bboottttoomm ooff tthhee ttaabbllee.. LLeeggiissllaattiioonn,, ddooccuummeennttss aanndd ccoorrrreessppoonnddeennccee sshhoouulldd bbee iiddeennttiiffiieedd aass ttoo iittss ssoouurrccee,, ddaattee,, aauutthhoorr((ss)),, aanndd ssoo oonn.. Assignment Rubric Graduate Level EXEMPLARY LEVEL 4 ACCOMPLISHED LEVEL
  • 65. 3 DEVELOPING LEVEL 2 BEGINNNIG LEVEL 1 TOTAL POINTS SYNTHESIS OF KNOWLEDGE (FOCUS/THESIS) [Graduate Learning Outcomes Assessment Objective #4] 20 1-8 9-14 15-18
  • 66. 19-20 Student exhibits a defined and clear understanding of the assignment. Thesis is clearly defined and well constructed to help guide the reader throughout the assignment. Student builds upon the thesis of the assignment with well- documented and exceptional supporting facts, figures, and/or statements. Establishes a good comprehension of topic and in the building of the thesis. Student demonstrates an effective presentation of thesis, with most support statements helping to support the key focus of assignment. Student exhibits a basic understanding of the intended assignment, but the thesis is not fully supported throughout the assignment. While thesis helps to guide the development of the assignment, the reader may have some difficulty in seeing linkages between thoughts. While student has included a few supporting facts and statements, this has limited the quality of the assignment. Exhibits a limited understanding of the assignment. Reader is unable to follow the logic used for the thesis and development of key themes. Introduction of thesis is not clearly evident, and reader must look deeper to discover the focus of the writer.
  • 67. Student’s writing is weak in the inclusion of supporting facts or statements. 16 FOUNDATION OF KNOWLEDGE [Graduate Learning Outcomes Assessment Objective #3] 20 1-8 9-14 15-17 18-20 Student demonstrates proficient command of the subject matter in the assignment. Assignment shows an impressive level of depth of student’s ability to relate course content to practical examples and applications. Student provides comprehensive analysis of details, facts, and concepts in a logical sequence. Student exhibits above average usage of subject matter in assignment.
  • 68. Student provides above average ability in relating course content in examples given. Details and facts presented provide an adequate presentation of student’s current level of subject matter knowledge. The assignment reveals that the student has a general, fundamental understanding of the course material. Whereas, there are areas of some concerning in the linkages provided between facts and supporting statements. Student generally explains concepts, but only meets the minimum requirements in this area. Student tries to explain some concepts, but overlooks critical details. Assignment appears vague or incomplete in various segments. Student presents concepts in isolation, and does not perceive to have a logical sequencing of ideas. 18 APPLICATION OF KNOWLEDGE (CRITICAL THINKING SKILLS) [Graduate Learning Outcomes Assessment Objective #5] 20 1-8
  • 69. 9-14 15-18 19-20 Student demonstrates a higher-level of critical thinking necessary for graduate level work. Learner provides a strategic approach in presenting examples of problem solving or critical thinking, while drawing logical conclusions which are not immediately obvious. Student provides well-supported ideas and reflection with a variety of current and/or world views in the assignment. Student presents a genuine intellectual development of ideas throughout assignment. Student exhibits a good command of critical thinking skills in the presentation of material and supporting statements. Assignment demonstrates the student’s above average use of relating concepts by using a variety of factors. Overall, student provides adequate conclusions, with 2 or fewer errors. Student takes a common, conventional approach in guiding the reader through various linkages and connections presented in assignment. However, student presents a limited perspective on key concepts throughout assignment. Student appears to have problems applying information in a problem-solving manner. Student demonstrates beginning understanding of key concepts,
  • 70. but overlooks critical details. Learner is unable to apply information in a problem-solving fashion. Student presents confusing statements and facts in assignment. No evidence or little semblance of critical thinking skills. 18 ORGANIZATION OF IDEAS/FORMAT 10 1-3 4-6 7-8 9-10 Student thoroughly understands and excels in explaining all major points. An original, unique, and/or imaginative approach to overall ideas, concepts, and findings is presented. Overall format of assignment includes an appropriate introduction (or abstract), well- developed paragraphs, and conclusion. Finished assignment demonstrates student’s ability to plan and
  • 71. organize research in a logical sequence. Student explains the majority of points and concepts in the assignment. Learner demonstrates a good skill level in formatting and organizing material in assignment. Student presents an above average level of preparedness, with few formatting errors. Learner applies some points and concepts incorrectly. Student uses a variety of formatting styles, with some inconsistencies throughout the paper. Assignment does not have a continuous pattern of logical sequencing. Assignment reveals formatting errors and a lack of organization. Student presents an incomplete attempt to provide linkages or explanation of key terms. 9 WRITING SKILL [Graduate Learning Outcomes Assessment Objective #2] 10 1-3
  • 72. 4-6 7-8 9-10 Student demonstrates an excellent command of grammar, as well as presents research in a clear and concise writing style. Presents a thorough, extensive understanding of word usage. Student excels in the selection and development of a well- planned research assignment. Assignment is error-free and reflects student’s ability to prepare graduate-level writing for possible publication in a peer- reviewed (refereed) journal. Student provides an effective display of good writing and grammar. Assignment reflects student’s ability to select appropriate word usage and presents an above-average presentation of a given topic or issue. Assignment appears to be well written with no more than 3-5 errors. Student provides a good final product that covers the above-minimal requirements. Assignment reflects basic writing and grammar, but with more than 5 errors. Key terms and concepts are somewhat vague and not completely explained by student.
  • 73. Student uses a basic vocabulary in assignment. Student’s writing ability is average, but demonstrates a basic understanding of the subject matter. Topics, concepts, and ideas are not coherently discussed or expressed in assignments. Student’s writing style is weak and needs improvement, along with numerous proofreading errors. Assignment lacks clarity, consistency, and correctness. Student needs to review and revise assignment. 8 USE OF COMPUTER TECHNOLOGY/ APPLICATIONS 10 1-3 4-6 7-8 9-10 Student provides a high-caliber, formatted assignment. Learner exhibits excellent use of computer technology in the development of assignment.
  • 74. Quality and appropriateness of stated references demonstrate the student’s ability to use technology to conduct applicable research. Given assignment includes appropriate word processing, spreadsheet and/or other computer applications as part of the final product. Assignment presents an above-average use of formatting skills, with less than 3 errors. Students has a good command of computer applications to format information and/or figures in an appropriate format. Student uses at least two types of computer applications to produce a quality assignment. Student demonstrates a basic knowledge of computer applications. Appearance of final assignment demonstrates the student’s limited ability to format and present data. Resources used in assignment are limited. Student may need to obtain further help in the use of computer applications and Internet research. Student needs to develop better formatting skills. The student may need to take additional training or obtain help from the Educator Help Desk while preparing an assignment. Research and resources presented in the assignment are limited. Student needs to expand research scope. The number of formatting errors is not acceptable. 10
  • 75. RESEARCH SKILL [Graduate Learning Outcomes Assessment Objective #1] 10 1-3 4-6 7-8 9-10 Student provides sophisticated synthesis of complex body of information in the preparation of assignment. Research provided by student contributes significantly to the development of the overall thesis. Student incorporates at least of 7-10 quality references in assignment. Student incorporates a variety of research resources and methodology in the preparation of assignment. Student achieves an above average synthesis of research, but interpretation is narrow in scope and description within assignment. Assignment contains less than 7 resources, and presents an average overview of key concepts.
  • 76. Assignment provides a basic, but borderline perspective of student’s research abilities. Student has incorporated less than 4 sources, which does not attempt to cover key elements of assignment. Student fails to provide an adequate synthesis of research collected for assignment. The lack of appropriate references or source materials demonstrates the student’s need for additional help or training in this area. Student needs to review and revise the assignment. The paper is not of acceptable quality for graduate-level work. 10 TOTAL POINTS 89 Quazi, thanks for your work. The assignment required you to develop a cybersecurity/EM Policy Analytical model in which you will recommend and justify the most effective way to manage emergency management related cybersecurity issues at the state level based on the readings. You were also asked to discuss the government-industry partnership as similar to a parent-child relationship including answering the following
  • 77. questions: (1) what needs to be done and how do we get people to do it; (2) will a traditional regulatory model work in this space; (3) does a newer model to address uniquely 21st century issues need to be developed; and (4) whom should the government regulate? You were also to conclude with a research or policy question for further research. Please see the feedback in the paper. Also, see the templates and videos below and use the as refreshers as applicable. Formatting Your APA Document Video https://www.youtube.com/watch?v=9pbUoNa5tyY APA Citation Basics Video https://www.youtube.com/watch?v=uVlsbN99LIQ APA Formatting Reference List Basics Video https://www.youtube.com/watch?v=HpAOi8-WUY4 �There was no introduction The tone and flow of the paper was not set. There also was no conclusion. See paper template �You had some good discussion and evaluation of the readings in some areas, but more in-depth information was indicated in others. See part I. Please see feedback in the paper and the
  • 78. templates in the resources section �You had some good application in some areas, but more in- depth application was warranted in others. Please see feedback in the paper. �Outstanding presentation of ideas. Outstanding use of headings. Please continue to use headings in the future papers. . �There were APA writing errors with the in text citations, title page, body, and reference page. Please see feedback in the paper. �Outstanding use of computer technology and applications. �Outstanding research and reporting. Great list and utilization of sources!