3-2 Activity Critical Analysis Engage_Alexi Heiney
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
400
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by ElderViperPerson42
RUNNING HEAD: 3-2 Activity: Critical Analysis: Engage
1
3-2 Activity: Critical Analysis: Engage
Alexi Heiney
IDS-400 Diversity
Instructor: Korbin Painter
September 17, 2023
3-2 Activity: Critical Analysis: Engage
2
3-2 Activity: Critical Analysis: Engage
Reliable Evidence from Varied Sources
The African American community in the U.S. faces challenges that are often due to
implicit biases, affecting areas like education, law enforcement, and employment. The goal of
this paper is to analyze these challenges and identify opportunities for positive change. Reliable
evidence from various sources including Project Implicit and Benaji and Greenwald, demonstrate
that many Americans exhibit unconscious preferences for White individuals over Black
individuals. A study by Heitzeg (2016) gives context by showing that Black students face more
suspensions and expulsions than their White peers, suggesting that this bias extends to
educational settings. This paper will use various sources to facilitate informed discussions and
identify potential solutions for reducing implicit bias within the African American community.
Collaborative Engagement with the African American Community
Using existing research is extremely important for building a meaningful dialogue with
the African American community about implicit bias. Data from the sources mentioned above, as
well as others, will help to offer evidence about the extent of implicit bias. This information can
serve as the foundation for community discussions, workshops, and educational programs.
Positive Elements Supporting Transformation
People are becoming more aware of implicit bias. Tools like the Implicit Association Test
(IAT) have not only provided valuable data but also facilitated public conversations around the
topic. Recognizing the problem is the first step toward a solution, and these studies offer a
starting point for discussions and policy change. Efforts, which include workshops and
mentorship programs, have been shown to be effective in reducing racial biases. Projects driven
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Word limit: 1000 words
arrow_forward
Select all type of employees that can cause a data breach as mentioned
on the topic discussion (Select 3 answers only) *
Supervisor
Malicious Employee
Innocent Actions Employees
Regular Employee
Ranking File Employee
Careless or Negligent Employee
arrow_forward
What are some of the characteristics common to female delinquents? How can the identification of the characteristics common to female delinquents help in the creating of delinquency prevention programs?
arrow_forward
"Accountability" - As we've started discussing IT security breaches are continually in the news. Several of these events have led to Personally Identifiable Information (PII) being leaked such as social security numbers, credit card information or simply embarrassing personal details. In many of these cases company Executives have been fired or forced to resign. Do you think that these dismissals have or have not been warranted? Please explain your reasoning
Please: Don't use Chatgpt
arrow_forward
Namira is a young researcher, who’s recently conducting a study on the impact of the pandemic on mental health. For this study, Namira will need a huge amount of data that needs to be processed and she also does not want the information to be influenced by personal bias. Namira’s co-researcher suggested that she should collect information through an information collection method that will collect information on this specific topic from interested people to make her work easier. Namira took her co-researcher’s advice and successfully collected and stored the information in her device to start her research work. As the research was regarding people’s mental health, the collected information was sensitive and highly confidential. One day, Namira received an email from her co-researcher with an email attachment. Upon asking her co-researcher, Namira got to know that her co-researcher never sent any sort of email, it could be a malware-infected email attachment from someone disguised as a…
arrow_forward
Have you ever seen an instance of internet bullying or harassment? How did you react when you first heard about it? The person has apparently been the target of bullying previous to your intervention; please explain how you arrived at this judgment.
arrow_forward
instanse
2
3
8
10
11
12
13
14
15
16
17
18
19
20
21
23
26
27
28
29
30
31
32
33
34
35
36
37
38
39
1401
gold-standard labels
0
0
model-predicted labels
0
0
0
arrow_forward
xplain plagiarism, and why it should be avoided.
arrow_forward
What larger concepts and patterns currently account for most instances of cybercrime? Please include citations if you'd want a full answer.
arrow_forward
"The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events.
Hint: Please don't use chat gpt
arrow_forward
5
arrow_forward
How do bottom-up and top-down strategies differ with respect to protecting sensitive data?When comparing top-down and bottom-up methods, why is one preferred over the other?You'll gain a better sense of the bigger picture as a result of this.
arrow_forward
What is the ultimate goal of incident response?
Question 8 options:
Mitigate the damage
Secure the database
Minimize the damage
Eliminate the threat
arrow_forward
Question 18
Forensics tools are
O Used to obtain information that has been deleted from digital devices
O Designed to provide criminals with access to data as long as it hasn't been deleted already
O Only used to provide authorized law enforcement agents access to data on systems
O Created to give hackers access to data on systems, whether it has been deleted or not
D
Question 19
Why should the alert roster be tested frequently?
O It only needs to be tested once, when the plan is created
O People will always know how to use the alert roster, so it doesn't need frequent testing
O Individual contact information changes often
O So that people will become annoyed with it and start ignoring the alerts
arrow_forward
What are some of the criminal penalties for falsifying documents or covering up information related to financial matters and SOX?
arrow_forward
The Equifax Data Breach
In 2017, from mid-May to July, hackers gained unauthorized access to servers used by Equifax, a major credit reporting agency, and accessed the personal information of nearly one-half the U.S. population.9 Equifax executives sold off nearly $2 million of company stock they owned after finding out about the hack in late July, weeks before it was publicly announced on September 7, 2017, in potential violation of insider trading rules. The company’s shares fell nearly 14 percent after the announcement, but few expect Equifax managers to be held liable for their mistakes, face any regulatory discipline, or pay any penalties for profiting from their actions. To make amends to customers and clients in the aftermath of the hack, the company offered free credit monitoring and identity-theft protection. On September 15, 2017, the company’s chief information officer and chief of security retired. On September 26, 2017, the CEO resigned, days before he was to testify…
arrow_forward
What responsibilities does a "Data Privacy Officer" hold in projects that handle sensitive user data?
arrow_forward
In light of this information, what, if any, inferences can we draw regarding criminal activity
online?
arrow_forward
Identity theft occurs when someone acquires your personal information and uses it to hijack your finances. A common scenario is a thief using your Social Security number to open a credit card account in your name. When the thief does not pay, it is your credit history that is tarnished.
1. List three steps an individual should take to avoid identity theft.
2. List three steps a corporation that maintains your personal data in its information system should take to safeguard your data.
3. How can Internet activities contribute to the likelihood of identity theft? How can you prevent it from happening to you?
arrow_forward
You are asked to do some research, and write a report that answers the following questions about Digital Fingerprinting:
You should tackle the following points:
What is Digital Fingerprinting and for what purposes is it used?
How does the fingerprinting algorithm work? Describe its principle of operation.
Certain steps are followed to reach the desired result- either block, delete or authorize usage of content.
Some cybersecurity experts say that fingerprinting is abusive and exposes the privacy issues of users. Certain solutions were done by some browsers for blocking browser fingerprinting. Describe the measures taken by any of the browsers as a fingerprint defense mechanism.
List two common Fingerprinting Algorithms.
Report Writing:
You should follow the following guidelines while writing your report:
Your report should be between 400 and 500 words in length.
Ensure that your report has an appropriate structure and writing style.
Your report…
arrow_forward
You are asked to do some research, and write a report that answers the following questions about Digital Fingerprinting:
You should tackle the following points:
What is Digital Fingerprinting and for what purposes is it used?
How does the fingerprinting algorithm work? Describe its principle of operation.
Certain steps are followed to reach the desired result- either block, delete or authorize usage of content.
Some cybersecurity experts say that fingerprinting is abusive and exposes the privacy issues of users. Certain solutions were done by some browsers for blocking browser fingerprinting. Describe the measures taken by any of the browsers as a fingerprint defense mechanism.
List two common Fingerprinting Algorithms.
arrow_forward
can someone please help me answer this question?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- Word limit: 1000 wordsarrow_forwardSelect all type of employees that can cause a data breach as mentioned on the topic discussion (Select 3 answers only) * Supervisor Malicious Employee Innocent Actions Employees Regular Employee Ranking File Employee Careless or Negligent Employeearrow_forwardWhat are some of the characteristics common to female delinquents? How can the identification of the characteristics common to female delinquents help in the creating of delinquency prevention programs?arrow_forward
- "Accountability" - As we've started discussing IT security breaches are continually in the news. Several of these events have led to Personally Identifiable Information (PII) being leaked such as social security numbers, credit card information or simply embarrassing personal details. In many of these cases company Executives have been fired or forced to resign. Do you think that these dismissals have or have not been warranted? Please explain your reasoning Please: Don't use Chatgptarrow_forwardNamira is a young researcher, who’s recently conducting a study on the impact of the pandemic on mental health. For this study, Namira will need a huge amount of data that needs to be processed and she also does not want the information to be influenced by personal bias. Namira’s co-researcher suggested that she should collect information through an information collection method that will collect information on this specific topic from interested people to make her work easier. Namira took her co-researcher’s advice and successfully collected and stored the information in her device to start her research work. As the research was regarding people’s mental health, the collected information was sensitive and highly confidential. One day, Namira received an email from her co-researcher with an email attachment. Upon asking her co-researcher, Namira got to know that her co-researcher never sent any sort of email, it could be a malware-infected email attachment from someone disguised as a…arrow_forwardHave you ever seen an instance of internet bullying or harassment? How did you react when you first heard about it? The person has apparently been the target of bullying previous to your intervention; please explain how you arrived at this judgment.arrow_forward
- instanse 2 3 8 10 11 12 13 14 15 16 17 18 19 20 21 23 26 27 28 29 30 31 32 33 34 35 36 37 38 39 1401 gold-standard labels 0 0 model-predicted labels 0 0 0arrow_forwardxplain plagiarism, and why it should be avoided.arrow_forwardWhat larger concepts and patterns currently account for most instances of cybercrime? Please include citations if you'd want a full answer.arrow_forward
- "The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events. Hint: Please don't use chat gptarrow_forward5arrow_forwardHow do bottom-up and top-down strategies differ with respect to protecting sensitive data?When comparing top-down and bottom-up methods, why is one preferred over the other?You'll gain a better sense of the bigger picture as a result of this.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning