Entries by Student

write my assignment 28796

Need an research paper on ethical dilemma executive summary. Needs to be 4 pages. Please no plagiarism. It is something which is very common in public sector and law enforcement firms, yet as a responsible citizen and police officer it is my duty to take necessary actions to stop this practice. As I am transferred to the current police department only recently, I must not show impatience in reporting the misconduct done by any colleague/police officer. I will secretly collect necessary facts and gather the past records of that officer on my own. I will wait till the time I have strong evidence that supports my claim. However, since that officer has strong connections and has established goodwill and PR among influential people while on the other hand, I have not yet built the integrity and trust which is required to challenge an experienced officer. Therefore, in this case I have several options: I will find out the name and designation of his immediate supervisor or the person whom he reports to. and I will quietly collect his/her views about bribery. I can send an anonymous letter to the internal affairs office of the police department which is responsible to carry out investigation about any misconduct or police abuse. Many countries have state police posts that can be used to report the cases of corruption. However, in case there is extreme violation of law, I will have to take serious actions by reporting anonymously to public safety board which deals with officer’s disciplinary actions and police corruption. Otherwise, I will try to find local FBI near my department from their official website i.e. http:// If the issue is not yet resolved then I will write an anonymous letter to the editor of the local newspaper and will send him/her the police disciplinary records because when media is involved serious efforts are made by concerned authorities to investigate the claims of corruption and breach of employment code of conduct. The professional implications of police reporting can be very serious especially when one is reporting against some big fishes of the police department. In such situation following consequences may occur: If my name is revealed, my job will be at risk or perhaps I will be transferred to some other department/city. I may receive threats and the security of my family can be endangered. Police officer can send me behind the bars by putting false accusations against me or due to some false disciplinary charges. There are two ways to deal with these consequences. first is to report the corruption claims to the most trusted authority that ensures that my identity will not be revealed under any circumstance. Second condition is to challenge on the basis of strong evidence, public support and recordings of victims. Some countries use the tactic of “mystery audit” in which some senior police officials or people from investigating agencies disguise as common people and go to the police department for filing a complaint. They talk to the officers who are the suspects of corruption and create a situation of offering bribe or gifts. If officer(s) accept the bribe then the suspect is caught red handed. This method is very successful for conducting unbiased investigation. On the other hand, the liabilities of not reporting such acts are much greater than the consequences of reporting those acts. When an officer breaches the law, its impacts are not seen on the individual or departmental level only, rather it affects the whole system.

 

"Not answered?"


Get the Answer

write my assignment 16566

Hi I need help with this question please. finding the net present value and the payback period and the internal rate of return and the accural accouting rate of return based on net initial investment, accural accounting rate of return based on average investment.

Jefferson Labs , a nonprofit organization , estimates that it can save $33 090 a year in cash operating costsfor the next & years if it buys a special-purpose eye – testing machtesting machine at a costcost of $140 000 . No terminal disposal value isexpected . Jefferson Labs required rate of return is 12% . Assume all cash flows occurat year – end except for initial investment amounts . Jefferson Labs uses straight line depreciationresent Value of $1 table Present Value of Annuity of $1 table Future Value of ST table Future Value of Annuity of ST tableRead the requirementsRequirement 1 Calculate the following for the special – purpose eye – testing machine :a . Net present value ( NPV ) ( Use factors to three decimal places X X X X and use a minus sign or parentheses for a negative net present value Enter the net presentI value of the investment rounded to the nearest whole dollar . )The net present value is sCalculate the following for thefor the special – purpose eye – testing machinea . Net present valueb . Payback periodC . Internal rate of returnAccrual accounting rate of return based on net initial investmentAccrual accounting rate of return based on average investme2 . What other factors should JeffersonLabs consider in deciding whether topurchase the special-purpose eye- testing machine ?

 

"Not answered?"


Get the Answer

write my assignment 13113

Russia & China negotiators often open up with the extreme positions. Swedish people on the contrary have often been prepared towards starting with what they would achieve. Negotiators from East have been quite different. They have been much more focus on whole view at very end apart from making the incremental decisions. Americans may take the contracts quite seriously however that has not been a case with Russians. Japanese on the contrary may consider a contract the insult as its relationship as well as also businesses has been dependent on the social trust.

Hi Elsie – Good start on your “Main Post“. I agree that “Relationship Building” is important, but how would you go about “getting to know one’s contacts in a host country and building mutual trust“? Also, as a stage in the “Negotiation Process“, relationship building is number two right after “Preparation” and right before “Exchanging Task-Related Information“. What does this indicate in the scheme of things? Please share.

Professor O’Bryant

How culture impacts relations in businessDiscuss the stages in the negotiation process and how culturally based value systemsinfluence these stages.The five interrelated phases in the…

 

"Not answered?"


Get the Answer

write my assignment 23240

Hi, need to submit a 2250 words essay on the topic Database security: Authorization and access control.

Authentication is a process through which system identifies the user. After completion of the authentication process, the process of authorization is executed, which permits the user to access required resources through which user could be identified. Authorization determines what type of resources, activities or services a user is permitted to access (Mark, 2008).

Access control refers to the system through which access to the information and services, resources is provided to the authorized entity. In computing, access control is a process which ascertains how users and systems are communicating or interacting with each other (Messaoud, 2006). ‘Entity’ is a term used in access control to start or perform computational tasks. For example, it can be the&nbsp.end user that invokes the command or the computer program, which sends instructions for performing the task. Programming task can work as a user through the diamond process (Messaoud, 2006).

Confidentiality, Integrity and Availability (CIA) is a model designed to handle policies for the information system in any organization. This model is sometimes called as the CIA triad. (Messaoud, 2006) CIA triad is a well-known mechanism for security model development and is used to develop necessary solutions for information security. CIA provides protection and secrecy of data when needed in database (Messaoud, 2006).

The term confidentiality refers to a set of rules that limit information access in a real and accurate manner. Data secrecy or confidentiality refers to prevention of unauthorized access to data. Confidentiality operation makes sure that data is delivered to the intended persons (Messaoud, 2006).

An example of confidentiality is a bank account number, which assigns an individual identity to every account holder. Data encryption is the best way for ensuring confidentiality of this type of data. Data encryption, which transforms data into code, is applied on

 

"Not answered?"


Get the Answer