What are the ethical dilemmas and challenges faced by information security professionals? - Management
Read the case studies (Attached Below) Making Ethical Decisions ETHICS AND THE INFORMATION SECURITY PROFESSION Answer the following Questions: What are the ethical dilemmas and challenges faced by information security professionals? Are professional organizations' ethical codes of conduct beneficial as an information security professional? How does a corporate ethical policy help information security professionals with ethical decision making? Writing Requirements The Essay must be 3 pages long. Double Space Must have an introduction with a clear thesis statement, a body discussing the three main points, an ethics section discussing the documents ethical ramifications, and a conclusion Use at least 2 academic books and 3 scholarly articles from a library database ETHICS AND THE INFORMATION SECURITY PROFESSION  Whether you subscribe to a professional code of conduct[1] or you just claim to be the "good guy" who is protecting the information assets of your organization, your colleagues, your employer, and those whose information you protect expect you to behave ethically. In this context, I use ethics to mean "the rules or standards governing the conduct of the members of a profession."[2] However, elements of its common use as a synonym for morals also apply. Ethical conduct includes both acts of commission and acts of omission. We have obligations to perform certain tasks and obligations not to perform others. Just as a soldier may be held to account for accepting an unlawful order, so may the information security professional be held to account for acceding to management requests if they would violate professional ethics. I have found, however, a wide diversity of opinion among people who assert professional status in our field. The use of "social engineering" as a technique for testing security, for example, is viewed by some as ethical and by others as unethical. Since I have a background in applied psychology where psychological experimentation might have included "tricking" a person, I have strong feelings about the protocols that you should follow. I believe that a full and professional debriefing of any victims of such trickery is needed. Otherwise, the security test may inadvertently harm these people. In most situations I've heard about, no such protocols were in place. I'd view such testing as unethical. I recognize, however, that other competent and well-meaning professionals may hold a contrary opinion. The rules in our profession are evolving with few well-documented cases. Many organizations with which we may associate have codes of conduct. The Information Systems Security Association (ISSA) has a terse one (see http://www.issaintl.org/members.html). The Information Systems Audit and Control Association (ISACA) has a longer one, which also refers to additional ISACA standards (see http://www.isaca.org/cert3.htm). And the Association for Computing Machinery (ACM)[3] has a very detailed code (see http://www.acm.org/constitution/code.html). The International Information Systems Security Certification Consortium, (ISC),[2] also has a code of ethics. It is only slightly longer than the ISSA code. At the time of my writing, the Ethics Committee of (ISC)[2] was revising this code. In the discussion that follows, I will refer to these and other codes of ethics. SOME BEHAVIOR IS CLEARLY UNETHICAL When the issue is selling confidential data to which you have privileged access or mounting a denial of service attack against a previous employer who refused to renew your employment contract, the information security professional has little trouble knowing what is, and what is not, ethical behavior. Shades of gray invade our ethical palette when we must weigh a social good against a personal evil, or when we can only accomplish one of mutually exclusive objectives forcing an ethical dilemma. For example, an employee tells you of an overheard conversation in which "George" boasts of a scheme to defraud his employer. You have the authority to turn on detailed auditing for all of his transactions and the privileged access level necessary for reading his e-mail, should you investigate George to determine the truth of the allegation? Can you ignore the warning? What if George was boasting of a bomb he had built instead of a fraud he was going to commit? What if George had been discussing only a novel he had just read? The Hippocratic Oath taken by medical doctors includes a pledge to do no harm. Perhaps we should begin with this ethical edict. (In fact, the ACM code contains a similar pledge.) Simple as this principle sounds, our actions in complex situations force us to make difficult choices. We are bound to weigh the interests of many parties in our professional activities. For example, how will our action (or inaction) affect our employer, other employees, stockholders, vendors/suppliers, customers, our professional colleagues, and society at large? Whose interests should take precedence when an inevitable conflict occurs? Although many of us have years of risk management experience and may have used risk analysis tools to assist us, our experience with ethical assessments may lie more with our personal character than with any training in ethical analysis. Our codes of conduct tend to speak in absolutes, but we tend to operate more on the basis of situational ethics. In our earlier example with George, does the risk to the many outweigh the rights of the few? Or are personal freedoms an absolute? If you feel that this begins to sound like a political or religious discussion, then you grasp the complexity of determining ethical behavior. When we truly wish to act ethically, real-world cases may force difficult choices. When we need to determine if someone has acted ethically, for example, in enforcing a professional code of conduct, we may similarly face difficulties, both in knowing what the ethical action should have been and in knowing whether the professional's actions were unethical or just poor judgment. As information security professionals, we may need to meet a higher standard than other information professionals. Because we have "special knowledge" others will rely on our advice. If our advice proves inaccurate, we must take responsibility for it. Even when our advice is accurate, because we will not always succeed in making our case clear or sufficiently convincing, some people will ignore our advice. Is a "CYA" memo to the file expiation for us when damage results from our being ignored? Should it be a defense in an ethics proceeding? None of the codes of ethics I've read address the resolution process for ethical dilemma. For example, a requirement to protect confidential information (or a national security classified document) may make cooperation with an investigation difficult, if by cooperation we mean the volunteering of such information. Some of the codes require compliance with "professional standards" as yet undocumented for the information security profession. And all of them ask us to make judgments about outcomes when we can only accurately assess our own actions. In this last case, we seem to ask members of our profession to foresee all consequences. I believe the lack of specificity -- in particular, the absence of clearly documented standards of behavior --makes self-regulation problematic. Notwithstanding, I propose a few rules that might spark a debate. 1. I will resign rather than participate in unethical conduct. The practical implications of ethical practice include a willingness to resign rather than participate in unethical conduct. If your management insists on you monitoring the actions of an individual or group, for example, to catch them at "something" so management can fire them, such monitoring may be unethical -- even illegal -- especially if no objective reason to suspect them of wrongdoing exists. Your first obligation would be to advise management of the risk such an action entails. But if management insists, you are forced to choose between ethical conduct (i.e., you refuse to participate) or unethical conduct (i.e., you do as asked). 2. I will report unethical conduct to appropriate authorities. Refusing to participate may be insufficient in meeting your professional obligations. If you have a mechanism for independent reporting of fraud and abuse, you may also have an obligation to report the actions of your management. 3. I will support my colleagues in their ethical conduct. The information security professional may face difficult choices. Unethical behavior should have consequences to the professional, although ethical behavior is no talisman warding off adverse results. Other members of the profession have an obligation, in my view, to support the ethical conduct of their colleagues. Conversely, we should refuse to engage professionally with persons known by us to conduct themselves unethically. 4. I will shun those persons whom I know have conducted themselves unethically. One of the hallmarks of a profession come of age is its ability to police itself. To the extent that the bodies promoting professional certifications in our field take seriously this obligation, our endeavors rise to the stature of a traditional profession. If we do not take seriously our professional ethics, we risk externally imposed regulation or the denigration of our field to that of a technical specialty, an administrative function, or a hired hand. Our professional ethics warrants wider discussion and open debate. Codes of conduct are a good start, but we need a body of professional standards. Perhaps we may also be able to develop "ethics analysis" tools to assist us. Much work in academic circles has already been done. See, for example, the Center for Applied Ethics at http://www.ethics.ubc.ca/resources/computer/index.html. You may also wish to see a wide variety of codes of ethics from many fields (including a "hacker" code of ethics!). If you visit http://www.ethics.ubc.ca/resources/professional/codes.html you, will find more than two dozen. Please let me know your views on codes of conduct and professional ethics. You may send me an e-mail at [email protected] Notes 1. For examples, the Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified Protection Professional (CPP), or Certified Fraud Examiner (CFE). · 2. The American Heritage Dictionary of the English Language, New College ed. (Boston: MA, Houghton Mifflin Company.) · 3. ACM has a special interest group for security audit and control (SIGSAC) that participated in creating its code of ethics. ~~~~~~~~ By Ralph Spencer Poore RALPH SPENCER POORE is an Area Practice Leader, Electronic Commerce for Ernst & Young LLP. Copyright of Information Systems Security is the property of Taylor & Francis Ltd and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. References Poore, R. S. (1999). Ethics and the information security profession. Information Systems Security, 8(1), 15. JENNIFER KREIE AND TIMOTHY PAUL CRONAN MAKING ETHICA DECISIONS How companies might influence the choices one makes. T oday's information technology makes vast amounts of data accessi- ble to businesses and their employ- ees. This accessibility provides great benefits but also creates the poten- tial for misuse of information tech- nology. Businesses are concerned about the ethical behavior of their employees and the security of their information systems. Therefore, businesses are interested in whether they can infiuence their employees' decision to act ethically or unethically [1, 9]. One avenue of action for companies is to establish a code of ethics and there is evidence that having such standards does influence employees [7]. Some researchers [4, 8] believe there are certain sit- uations where external infiuences, such as company standards, are more likely to affect employees' behav- ior. This view of ethical decision-making is based on the concept of an individual's perceived importance of an ethicaliyiE) issue [8]. When an ethical issue is per- ceived as very important, we are more likely to rely on our personal values in judging what is ethical or unethical. However, we are more open to external infiuences, such as business or professional codes of ethics or the opinions of peers, if we do not consider the ethical issue very important. The results of a recent study support the idea that businesses can infiuence their employees' behavior particularly in certain situations. When a person feels the ethical issue in a situation is not especially impor- tant, that person is more likely to act based on what company standards say is acceptable or unacceptable behavior. This does not mean employees will ignore company standards when an ethical issue is important to them, but they are more likely to take their cue from the company when they do not feel an impor- tant ethical issue is involved. On the other hand, in a situation where a person feels the ethical issue is very 66 De<:ember2000/Vol.43,No. 12 COHMUNICAT1ONSOFTHEACM important, that person may make a judgment based more on personal values than on business standards. An ethics survey was given to just over 300 stu- dents' at a large university located in the midwest U.S. The survey participants were mostly from MIS classes but a few were in accounting or finance classes. Stu- dents participated voluntarily. Over three-quarters of the participants were juniors or higher—almost one- third were seniors or graduate students. The average number of years of work experience was 2.4 years. Interestingly, 45% of the participants said they had encountered an ethical dilemma at work. The survey contained five scenarios that were adapted from [3]. The scenarios involve the use of Q information technology and each describes an ^ Thf pa nit i pan IS induded 16 frt-shmtn, 55 sopliomores, 140 juniors, 53 seniors, and X 41 graduate students. The total number ot respondents varies tor each scenario because Q, oFsome incomplete responses. employees actions in a particular situation. The sce- narios were chosen to represent possible ethical issues such as privacy, intellectual property, and accessibility. These scenarios have also been used in previous research conducted by the authors.' During the survey the participants first read each scenario and judged whether what the person did was acceptable (ethical) or unacceptable (unethical).' Next, the participants were given a 7-point scale to rate the importance of the ethical issue in the scenario (very important to unimportant) and to rate the ^A ptevious Communicatiom article examined the ditTerences in ethical judgment between men and women [5|. This atEicle deals with a different data set collected with jn extended •iurvey. A stimmary of the ditTetences between men and women for the current and previous study is available on the Web at web, nmsu.edu/-jkreit7. Signifi- cant difterente.f were tound between men anii women tor some, bul not all, tesfHinses in the srudv on which rhij article ii based, -'The terms "acceptable" and "unacceptable" were used interchangeably with "ethical" and "unethical" when the survey was presented to the study parricipanis. COMMUNICATIONS OF THE ACM December 2000/Vol, 43, No, \1 67 probability they would do the same as the person described (extremely probable to extremely improba- ble). The participants were also asked whether an established company policy against such behavior might affect the employee's behavior. Finally, partici- pants were asked to indicate the degree to which var- ious factors' influenced their judgment of the behavior described in each scenario. The following five sections describe each scenario and highlight certain responses to survey: was the behavior acceptable or not; how important was the ethical issue; would survey respondents probably do the same; how probable is it that someone would do the same if company policy prohibited this behavior; and what percentage of respondents said personal val- ues were very influential in their judgment. The table appearing here provides an overview of the survey responses for each scenario. Seven potenciail)' influenrial factors were discii.wed in a previous Commtinic/itions arti- de |5|: personal values, religious belief sysltm, personal environment, social envinin- menc. legal environment, husinty. environ men I, and professional environment. Scenario One: Making Unauthorized Program Modifications The first scenario used in the ethics survey describes a programmer who modifies a bank's accounting system to bide his overdrawn account and avoid an overdraft charge. After making a deposit, the pro- grammer corrects his modification. A large majority (85%) of survey participants said it was unaccept- able for the programmer to modify the bank's accounting system, and the ethical issue was con- sidered very important by almost two-thirds (63%) of the respondents (see the table). In line with the PIE concept that people are more likely to rely on their personal values when judging an important ethical issue, many participants (72%) in this sur- vey said they relied heavily on their personal values in judging the programmer's behavior. Interestingly, 2 3 % said they would do the same as the program- mer in the scenario (a point we return to later). Thirty-seven percent believe the programmer would do the same despite company policy against such behavior. Table 1. Summary of survey responses by scenario. Judgment of this behavior Unacceptable Acceptable Importance of the issue* Very important Not very important Undecided How probable is it that you would do the same?** Probable Improbable Undecided If there were a stated company policy against such behavior. how probable is it someone would still do it? Probable Improbable Undecided Personal values were very infiuer)tial Scenario 1 Programmer modifies a bank's software to avoid a fee. 85% 15% 63% 22% 15% 23% 66% 11% 37% 47% 16% 72% Scenario 2 Employee keeps soft- ware sent in error but does not pay for it. 60% 40% 39% 40% 21% 56% 34% )0% 54% 34% 12% 65% Scenario 3 Programmer uses company equipment for personal use. 22% 78% 16% 66% !8% 74% 15% 11% 16% 77% 7% 52% Scenario 4 Employee uses proprietary software without paying fee. 75% 25% 61% 18% 21% 29% 54% 17% 41% 46% 13% 60% Scenario 5 Employee copies g o v e r n m e n t database w h e n t o l d t o by boss. 73% 27% 74% 13% 13% 28% 61% 11% 25% 62% 13% 64% * Based on a 7-point scale with responses grouped as very important ( I to 3) t o not very important (5 to 7). A rating of 4 was classified as undecided. ** Based on a 7-point scale with responses grouped as probable (1 to 3) co impmbable (5 t o 7). A rating of A was classified as undecided. 6 8 December 2000/Vol. 43, No. 12 COMMUNICATIONS OF THE ACM Scenario Two: Keeping Something Not Paid For The second scenario presented a situation in which a person receives software ordered from a mail-order company but also finds another software package was sent in error. The extra software is not listed on the invoice. The person keeps the program without paying for it. Table 1 shows that a majority of the study respon- dents (60%) said keeping the software was unaccept- able. In contrast to the first scenario, far fewer people (39%) said there was a very important ethical issue involved in this scenario. Many of the respondents (65%) still said personal values were very influential in their judgment (more so than any other factor). A lit- tle over half of the participants (56%) said they would also keep the software without paying for it. One explanation for this comes ftom past surveys when the external factors such as company policy more likely to influence someone's judgment when no important ethical issue is perceived in the situation? The per- centages shown in the table appearing here lend sup- port to this proposition. Although three-quarters of the participants (74%) said they would do as the pro- grammer did, just over three-quarters (77%) said it was unlikely a person would still do so if there were a company policy against personal use of company computer equipment. Scenario Four: Using Programs Without Paying the Required Fee The fourth scenario presents a person who was inad- vertently given access free of charge to a proprietary program. The person decides to use the program without paying the required fee. The table shows that 75% of the patticipants said it was unacceptable People rely heavily on their personal values when deciding what is ethical or unethical behavior. researchers have discussed the scenarios after conduct- ing the survey. Subjects have stated it is acceptable to keep the software because the mail-order company made the error and the customer is justified in taking advantage of the error. Of all five scenarios this one has the largest percentage, 54%, who believe a person would act the same despite what the company says is acceptable. Scenario Three: Using Company Resources For Personal Purposes In the third scenario a programmer uses company computer equipment to write programs for his friends on his own time on weekends. The program- mer does not charge anything for his programs. This scenario is a good contrast with the other scenarios. It is the only scenario for which a majority (78%) said the behavior of the person was acceptable and the importance of the ethical issue was also the lowest, with only 16% of the respondents rating the issue as very important. Also, this scenario has the smallest number of people (52%) who said their personal val- ues were very influential in their decision. Since the ethical issue wasn't very important to many, this scenario provides the opportunity to check for support of the PIE concept described here. Are to use a proprietary program without paying the required fee and 6 1 % said this is a very important issue. Personal values were again most often rated (60%) as being very influential in the participants' decision. Fifty-four percent of the participants said they themselves would not do as the person did in the scenario, but less than half of the people (46%) feel company policy against such behavior would dissuade employees from doing this. Scenario Five: Keeping Something Not Paid For The fmal scenario describes a marketing company employee who performs some data processing on contract for a government agency. The data concerns infotmation about children and theit patents. The employee is told by his boss to make a copy of the data for the company's tise. The contract with the government agency does not explicitly prohibit this, so the employee makes a copy of the data. In the current survey 73% said copying the data li k iiitL-icstLiig to noif ihat the siifijcas in the ^mdy on whiih this article i.i based judgfd itiis lith.iviot as acceptable by a mucb l.irger percentage than did the subjects in tbt 1991) survey. Sixiy percent of the students In tbe previou.s year said tbis was unatceptabic. One pos.sibie explanation is that recent news coverage of ways in which information tccbnology can tbrtaten personal privacy has heightened awareness and awareness and raised concern. COMMUNICATIONS OF THE ACM December 2000/Vol. 43. No. \1 6 9 Reliance on personal values in many situations does not rule out that an established code of ethics could affect what employees decide to do. was unacceptable.^ Seventy-four percent said the eth- ical issue was very important—the largest majority of all the scenarios regarding the perceived importance of an ethical issue. Personal values were rated as a strong influence (64%), more so than other influ- ences. Twenty-eight percent said they would do the same as the employee in the scenario. Sixty-two per- cent said it was unlikely the employee would copy the data if there were a company policy against it, which may he contrary to the PIE concept. Discussion This study offers support for the proposition that external factors, such as a company code of ethics, can he an influence when people do nor think an important ethical issue is involved. The responses to Scenario Three are of particular interest here because few felt an important ethical issue was involved. Most participants in the current survey said it was okay for a programmer to use company computer equipment for personal tise. They also said they would likely do the same. However, over three-quar- ters thought company policy against personal use of computer equipment would dissuade employees from doing as the programmer had done. The personal use of company equipment may be an important issue for businesses even though most employees don't see it as an important ethical issue. It is important for businesses to loiow that the responses in this survey, as well as information from past research, indicate people are receptive to what the company tells them to do in this situation. Further, in discussions with participants of previous surveys, the subjects have often said companies should make it clear to employees if they do not want employees to make personal use of company equipment even on personal time. Conversely, if companies are aware of the ethical issues important to the employee companies may want to use additional means to encourage compli- ance with company policy. For example, the company could notify employees that monitoring and detective See web.nmsu.edu/-jkieie/ for responses and significance levels summarized by gender. measures are tised by the company and there are con- sequences for certain unacceptable behavior. The authors' past research indicates that knowledge of spe- cific negative consequences for certain behavior may act as a deterrent and some past study participants have said the likelihood of getting caught would be a factor in how they act. What people say they probably wouldn't do. Managers that are concerned about their employees acting ethically might take some comfort from what the majority of participants said they would not do themselves. A majority said they would not make unauthorized changes to a program for personal ben- efit (Scenario 1), would not take advantage of access inadvertently given (Scenario 4), and would not copy data that might itwade others' privacy (Scenario 5).'' It is also interesting to note that in all three instances there is a statistically significant difference between women and men. Consistent with previous research [5], a significantly larger number of women than men said they would not do what the employees did in these scenarios. What people say they probably would do. There were two scenarios where the majority of respondents said they would do the same as the employee in the scenario. As noted earlier, 74% of the subjects said they would do the same as the programmer in Sce- nario Three—unless the company had a policy against using company equipment. For Scenario Two a small majority (56%) said they would keep sofiware without paying for it. Well under half (39%) of the respondents felt the ethical issue in this scenario was very important but, unlike Scenario Three, over half of the people (54%) thought an employee would do the same even if com- pany policy prohibited such behavior. One possible explanation for this is that people see this as a situa- tion outside the realm of company policy. The mail order company made an error and it has no impact on the employee's company. Another interesting point can be made about what some people said they would do. Scenarios One and Two, for instance, indicate some people will do what they say is unethical. In other words, some subjects 70 December 2000/Vol. 4J. No. 12 COMMUNICATIONS OF THE ACM said what the person in a scenario did was unaccept- able but they themselves would do the same. For Sce- nario One only 15% of the respondents said is was okay for the programmer to modify the accounting program but 23% said they would do the same. This certainly prompts the question of why people would do something they consider wrong but no clear answer is apparent. When the researchers have dis- cussed this scenario with students, some justifications for the programmer's actions were: "It should be a perk of the job to not have to pay overdraft: charges," and "Its not hurting anyone." Some students also indicated they would do the same as the programmer if they thought they would not get caught. Perhaps any one these arguments is sufficient for some people to decide they would modify the program. In any case, the responses in this survey concur with some findings that people will sometimes do what they say is wrong. For Scenario Two a fairly large number of people, 40%, said keeping the software was okay, but an even larger number, 56%, said they would do the same. Students in the past have argued that since the mail- order company made the error it is okay for the employee to keep the software. The employee didnt steal the software and he or she is not obligated to cor- rect the company's error. A company code of ethics. The results for Scenario Three indicate rhere are situations where companies can influence their employees' behavior. The impact of a company's written standards or code of ethical behavior is, of course, contingent on the company having such a code and on the employees knowing the code exists. However, some research indicates that companies may have a written code of ethics more for reasons of legal protection and public relations than internal use [7]. Employees may not be aware a com- pany code exists. In discussions of the survey's scenar- ios students clearly indicated they believe companies should have specific guidelines for employees to explain what is unacceptable behavior. If a company wants to educate its employees about its code of ethics it could provide ethics training using ethical scenarios tailored to its business environment. Having employees evaluate and discuss ethical scenar- ios would help employees undersrand rhe complexity of certain ethical dilemmas and help employees learn company guidelines for ethical behavior. Managers, like many educators, could use scenarios and discus- sions to help people develop a better understanding of ethical issues, what possible actions there are to take, and the consequences of certain actions [2]. One study reported that workers felt studying ethics affected their views [7]. There is also empirical evi- dence [6] that some students' moral reasoning bcne- fitted from peer-led discussion of ethical scenarios. Ethics training can also make employees aware of penalties for unethical behavior. Conclusion The results of this survey indicate people rely heav- ily on their personal values when deciding what is ethical or unethical behavior. However, when the ethical issue in a given situation is not considered of great importance, people are more likely to consider what company standards say to do or to not do. Reliance on personal values in many situations does not rule out, however, that an established code of ethics could affect what employees decide to do. Businesses can encourage ethical decision-making by having a written code of ethics and providing ethics training, such as discussion of ethical scenarios, to help employees understand what is expected. In addition, businesses should consider providing practi- cal support to employees for handling ethical issues. For instance, a support mechanism for a code of ethics should include procedures for an employee to follow who wants to talk to someone about an ethical issue or to report unethical behavior. B REFERENCES 1. Behar, R. Who's reading your e-mail? fortwnf (Feb. 3, 1997), 57-70. 2. Cougar, J.D, Preparing IS studencs to deal wiiK ethical issues. MIS Quarterly 13, 2 (1989), 211-216. i. Dejoie, R., Fowler, G. and Paradice, D.B. Ethical Issues in Information Systems. Boyd and Fraser Publishing Company, Bosron, MA, 1991. 4. Jones, T.M. Echical decision making by individuals in organizations: An issue-contingent model. Academy of Management Review 16, 1 (1991), 366-395. 5. Kreie, J. and Cronan, T.P. Judging what is echical or unethical: There arc differences between men and women. Commun. ACM 41, 9 (Sept. 1998). 6. Nelson, D.R. and Obremsld, T.E. Protnoting moral growth through intra-group participation. Journal of Business Ethics 9, (1990), 731-739. 7. Pierce, M.A. and Henr)', J.W. Computer ethics: The role of personal, informal, and formal codes. Journal of Business Ethics 15. (1996), 423^37. 8. Robin, D.P., Reidenbach, R.E. and Forresr, P.J, The perceived impor- tance of an echical issue as an influence on the ethical decision-making ok ad minagas. Journal of Business Research 35, (1996), 17-28. 9. Sala, R. What would you do? Computerworld (Mir. 16, 1996). J E N N I F E R K R E I E ([email protected]) is an assistant professor of Business Computer Systems at New Mexico State University. T I M O T H Y P A U L C R O N A N ([email protected],edu) is A professor of Computer Information Systems and Quantitative Analysis at the University of Arkansas in Fayetteville. Permission to make diffital or hard copies of all or part of this work for personal or class- toom use is granted without fee providetl that copies ate nni made or distributed for profit or commercial advanrige and that copies beat this ntrtice and the full citation on the first page. To copy otherwise, to tepublish, to post on server; ot to tedistribute lo lists, tequites prior specific permission and/or a fee. © 2()(H) ACM 0002-0782/00/1200 $5,00 COMMUNICATIONS OF THE ACH December 2000/Vol. 43. No. 12 71
CATEGORIES
Economics Nursing Applied Sciences Psychology Science Management Computer Science Human Resource Management Accounting Information Systems English Anatomy Operations Management Sociology Literature Education Business & Finance Marketing Engineering Statistics Biology Political Science Reading History Financial markets Philosophy Mathematics Law Criminal Architecture and Design Government Social Science World history Chemistry Humanities Business Finance Writing Programming Telecommunications Engineering Geography Physics Spanish ach e. Embedded Entrepreneurship f. Three Social Entrepreneurship Models g. Social-Founder Identity h. Micros-enterprise Development Outcomes Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada) a. Indigenous Australian Entrepreneurs Exami Calculus (people influence of  others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities  of these three) to reflect and analyze the potential ways these ( American history Pharmacology Ancient history . Also Numerical analysis Environmental science Electrical Engineering Precalculus Physiology Civil Engineering Electronic Engineering ness Horizons Algebra Geology Physical chemistry nt When considering both O lassrooms Civil Probability ions Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years) or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime Chemical Engineering Ecology aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less. INSTRUCTIONS:  To access the FNU Online Library for journals and articles you can go the FNU library link here:  https://www.fnu.edu/library/ In order to n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.  Key outcomes: The approach that you take must be clear Mechanical Engineering Organic chemistry Geometry nment Topic You will need to pick one topic for your project (5 pts) Literature search You will need to perform a literature search for your topic Geophysics you been involved with a company doing a redesign of business processes Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages). Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in in body of the report Conclusions References (8 References Minimum) *** Words count = 2000 words. *** In-Text Citations and References using Harvard style. *** In Task section I’ve chose (Economic issues in overseas contracting)" Electromagnetism w or quality improvement; it was just all part of good nursing care.  The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management.  Include speaker notes... .....Describe three different models of case management. visual representations of information. They can include numbers SSAY ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3 pages): Provide a description of an existing intervention in Canada making the appropriate buying decisions in an ethical and professional manner. Topic: Purchasing and Technology You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.         https://youtu.be/fRym_jyuBc0 Next year the $2.8 trillion U.S. healthcare industry will   finally begin to look and feel more like the rest of the business wo evidence-based primary care curriculum. Throughout your nurse practitioner program Vignette Understanding Gender Fluidity Providing Inclusive Quality Care Affirming Clinical Encounters Conclusion References Nurse Practitioner Knowledge Mechanics and word limit is unit as a guide only. The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su Trigonometry Article writing Other 5. June 29 After the components sending to the manufacturing house 1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard.  While developing a relationship with client it is important to clarify that if danger or Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business No matter which type of health care organization With a direct sale During the pandemic Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record 3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015).  Making sure we do not disclose information without consent ev 4. Identify two examples of real world problems that you have observed in your personal Summary & Evaluation: Reference & 188. Academic Search Ultimate Ethics We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities *DDB is used for the first three years For example The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case 4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972) With covid coming into place In my opinion with Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be · By Day 1 of this week While you must form your answers to the questions below from our assigned reading material CliftonLarsonAllen LLP (2013) 5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda Urien The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle From a similar but larger point of view 4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open When seeking to identify a patient’s health condition After viewing the you tube videos on prayer Your paper must be at least two pages in length (not counting the title and reference pages) The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough Data collection Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an I would start off with Linda on repeating her options for the child and going over what she is feeling with each option.  I would want to find out what she is afraid of.  I would avoid asking her any “why” questions because I want her to be in the here an Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych Identify the type of research used in a chosen study Compose a 1 Optics effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte I think knowing more about you will allow you to be able to choose the right resources Be 4 pages in length soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test g One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti 3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family A Health in All Policies approach Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum Chen Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change Read Reflections on Cultural Humility Read A Basic Guide to ABCD Community Organizing Use the bolded black section and sub-section titles below to organize your paper. For each section Losinski forwarded the article on a priority basis to Mary Scott Losinksi wanted details on use of the ED at CGH. He asked the administrative resident