Part 1Â (Refer to WeekÂ 5Â Readings in the Lessons for Week 5)After readingÂ Moore at al. (2010), Goodyear, Portillo, Goerdel & Williams (2010) and Deloitte-NASCIO (2013), develop a cybersecurity/EM Policy Analytical model in which you will recommend and justify the most effective way to manage emergency management related cybersecurity issues at theÂ stateÂ level.Use additional resources as needed.Conclude with aÂ research or policy questionÂ for further research.You must use literature and cite properly.Â ProvideÂ in-text citations and references.750 wordsapa formatat least 3 referencesÂ WEEK 5 READINGSRequired: Deloitte-NASCIO (2013).Â Cybersecurity Study State Governments at Risk: A Call for Collaboration and Compliance. Â https://edge.apus.edu/access/content/group/security-and-global-studies-common/EDMG/EDMG600/2012_nascio_deloitte_global.pdfRequired:Â Moore at al. (2010).Â Bridging the gap: developing a tool to support local civilian and military disaster preparedness. Santa Monica, CA: RAND (Chapters 4 & 5) Â https://www.rand.org/content/dam/rand/pubs/technical_reports/2010/RAND_TR764.pdfRequired:Â Marcus, L. J., Dorn, B. C. & Henderson, J.M. (2005).Â Meta-leadership and national emergency preparedness strategies to build government connectivity. Working Paper, Center for Public Leadership, Harvard University. Â Â Â http://dspace.mit.edu/bitstream/handle/1721.1/55934/CPL_WP_05_03_DornHendersonMarcus.pdf?sequence=1Required:Â Becerra-Fernandez, I., Madey, G., Prietula, M., Rodriguez, D., Valerdi, R., & Wright, T. (2008).Â Design and Development of a Virtual Emergency Operations Center for Disaster Management Research, Training, and Discovery. Paper presented at the Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences. Â Â https://edge.apus.edu/access/content/group/security-and-global-studies-common/EDMG/EDMG600/CLEPM03.pdfRequired:Becerra-Fernandez, I., Xia, W., Gudi, A., & Rocha, J. (2007).Â Task Characteristics, Knowledge Sharing and Integration, and Emergency Management Performance: Research Agenda and Emergency Management Challenges. Paper presented at the 16th International Conference on Management of Technology. https://www3.nd.edu/~veoc/resources/Papers/ISCRAM2008_Becerra-Fernandez_etal.pdfÂ Â Part 2Â (Refer to Week 6 Readings in the Lessons for Week 6)After reading the article, respond to the followingÂ fourÂ questions bellow.Separate each response with the sub-headed question statement):Larry Clinton describes government-industry partnership as similar to a parent-child relationship, wherein the parent (government) feels the need to exhibit some tough love on an uncooperative and immature child (the private sector). The analogy breaks down, however, when one realizes that in this case the “child” (industry) is actually far bigger, stronger, and has more resources than the supposed parent. Clinton argues it is the parent (government) in this case that is ultimately reliant on the child for cyber security. While industry cyber systems are vulnerable to attack-as are virtually all infrastructures historically- the market has produced an array of effective means to protect their cyber systems. The problem is the lack of proper implementation of cyber security best practices and relatively simple fixes, like software updates and security patches. Title each response with the question text:What needs to be done and how do we get people to do it?Will a traditional regulatory model work in this space? Does a newer model to address uniquely 21st century issues need to be developed?Whom should the government regulate?ConcludeÂ with a research or policy question for further research.You must use literature and cite properly.UseÂ APAÂ styleProvideÂ in-text citations and references.750 wordsapa formatat least 3 referencesWEEK 6 READINGÂ Required:Â Clinton, L (2011).Â Industry- Government Partnership for Cyber Defense,Â Journal of Strategic Security, Volume 4, Number 2 , Summer 2011 (it may take 5-6Â minutes to download Â http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1108&context=jssÂ Required:Â National Research CouncilÂ Group (2010). Read sections “Attribution and Economics,” (pp. 3-54) and “The Organization of the United States Government and Private Sector for Achieving Cyber Deterrence,â€ (pp. 245-272) in Informing Strategies and Developing Options for U.S. Policy Committee on Deterring Cyberattacks. Proceedings of a Workshop on Deterring Cyber Attacks (takes a couple of minutes to download). Â Â https://www.nap.edu/login.php?record_id=12997&page=http%3A%2F%2Fwww.nap.edu%2Fdownload.php%3Frecord_id%3D12997Â Required:Â Responses to QuestionsÂ Posed by Ms. Melissa Hathaway During Her Presentation at the National Science Foundation on March 18, 2009 March 31, 2009. https://www.whitehouse.gov/files/documents/cyber/National%20Science%20Foundation%20-%20HathawayQuestions%20Mar%2031%202009.pdf
Such a cheap price for your free time and healthy sleep
All online transactions are done using all major Credit Cards or Electronic Check through PayPal. These are safe, secure, and efficient online payment methods.