Recent orders
Discussion Board. increase in drug abuse among the youths
Discussion Board
Name
Instructor
Course
Date
Description of the problem
There has been an increase in drug abuse among the youth in our neighborhood. Many young people are increasingly abusing drugs at an early age. When one takes a walk around the neighborhood they are likely to meet groups of young people exchanging cigarette puffs or drinking. It is also common to come across young people lying down on the ground and helpless. This has resulted to many of the young people dropping out of school. It has also led to the young people turning into crime in order to sustain their drug abuse habits. Drug abuse also increases the vulnerability of this young people since after they take the drugs they end up being helpless and hence anyone can take advantage of them (Deboskey, 2010).
Thesis statement
Drug abuse by the youth in the neighborhood is increasingly becoming a menace to the entire community. Parents are loosing their young children to drug abuse each day. There is the need to come up with effective measures of dealing with the problem in the neighborhood.
Conclusion
There is need to come up with effective and long lasting solutions to the issue of drug abuse among the youth in the neighborhood. Everyone in the neighborhood should be part of helping find a solution to the problem. There is need for the young people to be advised and educated on the effects of abusing these drugs. There should also be counselling sessions for the youth that will help those who are already hooked to stop taking drugs. Parents should also guide and counsel their children on effects of drug abuse. Unless effective control measures are created, parents will end up loosing their children to the menace. Dealing with the issue will also result to reduction of crime in the neighborhood and parents.
ReferenceDeboskey, R. (2010). Youth and Drug Abuse. Clinical Toxicology, 187-193.
Cybercrime Tactics, Technology and Techniques
Cybercrime Tactics, Technology and Techniques
Name
Institutional Affiliations
Question 1
Computers and internets have entered the mainstream of people’s life. Today, millions of people including the employees are spending much of their time using computers as well as, mobile devices in sending and receiving emails. Others use computers to maintain databases and surfing the internet. Unfortunately, it has been revealed that hackers who use these technology devices such as computers and mobile phones have never missed obtaining personal information of internet users; as a result, they tend to a crime by hacking into users accounts through network systems. Research shows that hackers use computers to cause crimes by launching hackers’ attacks against vulnerable computer networks.
In a typical workplace, the employers technically own the workspace such as computers, network and many others; as a result, they are entitled to monitor the use of each computer within their workspace. However, these employment settings are seen to be misused by the employees for their personal pursuits. There are a variety of reasons as to why some employers would wish to do a search on employee’s computers without his/her consent. For instance, if the employer may wish to locate a certain document that he/she wants to use, then he may opt to use the employees’ computer without asking for permission. The employer may also be interested to find out if the employees are mishandling any property within the organization as well doing a search to find out if the employee is committing a crime after gathering information from other staffs that the person might be using the internet in downloading child pornography.
On the other hand, there are situations when employers are not allowed to do a search on employee’s computers. For example, employees have right to privacy and so they also deserve respect at workplace. For that reason, employees have to be prepared in mind before the search, since this will help them hiding private information which they might be storing in the computers. Employers on the other hand should ensure that employees become aware of the search and so if there are documents which are confidential should not be accessed. The fourth Amendments limit the government agents to search for and seize a proof or evidence without a warrant. The Amendment states that the right of an individual is to be secure in their persons in opposition to unreasonable searches and seizures shall (Jarret & Bailie, 2003).
Question 2
According to the article where a 17- year-old hacker taps into inactive forum run by the hardcore porn site and using it to expose personal information of 350,000 registered users; this can be justified as hacking but not breaking the law (Theriault, 2012). In 2011, cybercriminals and hackers had taken the lead allowing both ethical and unethical hacking a big business. A good number of ethical and unethical hackers are happy so as to let the whole world know what they have been up to. Groups such as anonymous tend to hack for fun so as to draw attention to an issue by defacing websites as well as, launching distributed-denial-of-services (DDoS) attacks that involves sending huge amount of traffic to knock the websites offline.
In this case, this a 17-year-old hacker can be identified as unethical hacker because after tapping into inactive forum, he later go ahead to expose personal information of the registered people arguing out that his main aim was not to embarrass the customers of that site or to make money, but he wanted to highlight how vulnerable popular websites are. If this was true, then one thing he/she could have done is to hack the site but never to expose information of those involved. For ethical hacking, the hackers have to respect the individual’s company’s privacy.
References
Jarret, M. & Bailie, M. (2003). Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal.
Theriault, C. (2012, February 13). 350,000 users exposed by hardcore porn hack. Retrieved March 18, 2015, from https://nakedsecurity.sophos.com/2012/02/13/350000-users-exposed-by-hardcore-porn-hack/
Exam 2 Prep Sheet
Exam 2 Prep Sheet
This prep sheet is a general guide for your exam. Please know this review sheet may not be completely reflective of your exam. As mentioned in class and on my syllabus, students are responsible for reading the assigned material and reviewing lecture material. This prep sheet is optional, but intended to help you prepare for the exam. As a general rule, students should focus mostly on topics that are presented in class and the concepts that are on the chapter handouts (posted on Canvas).
The exam will cover Ch. 5, 6, and 8 (it is important that you check handouts for exact sections).
Questions with a * are typically a short answer questions on your exam.
Bring one scantron form AND one small blue book.
Bring all your stamped chapter notes for credit.
Exam Breakdown:
60 Multiple Choice = 60 points
5 Short Answers= 40 points (see * below)
Ch. 6 (MC #1-20)
What is habituation?
What is sensitization?
What is classical conditioning?
What is an unconditioned stimulus?
What is an unconditioned response?
What is a neutral stimulus?
What is a conditioned stimulus?
What is a conditioned response?
What do we know about the importance of timing the presentation of the neutral stimulus with the unconditioned stimulus?
What is acquisition?
When given a scenario, be able to explain the US, UR, NS, CS, and CR. What is extinction? What is spontaneous recovery? *
What is shaping? What would happen in the process of shaping? What are primary reinforcers and secondary reinforcers? Give examples of each. *
What is stimulus discrimination?
What is stimulus generalization?
What is a phobia?
What is systematic desensitization?
What is counterconditioning?
What were the findings of the “Little Albert” case?
What is a Skinner box?
What is operant conditioning?
What is positive reinforcement?
What is negative reinforcement?
What is positive punishment?
What is negative punishment?
Be able to identify above four when given scenarios.
What is the most effective method?
What is law of effect?
What is shaping? What is a primary reinforcer and a secondary reinforcer and what is the difference? *
What is observational learning?
What is modeling?
What is vicarious learning?
Ch. 8 (MC #21-40)
What are the three memory stores (i.e., sensory storage, short-term storage, and long-term storage). Be able to name, describe, and discuss the duration & capacity of each. *
What are the three phases of information processing in memory (i.e., encoding, storing, retrieval)?
What is chunking?
What is elaborative rehearsal vs. maintenance rehearsal?
What is the primacy effect?
What is the recency effect? What is chunking?
What is prospective memory?
What is retrograde amnesia vs anterograde amnesia?
What is explicit memory? What are episodic memories? What are semantic memories?
What are procedural memories?
What are prospective memories?
What are the processes that affect access of memories in long-term storage?
What are retrieval cues?
What are context-dependent memories?
What are state-dependent memories?
What are the ways in which we forget?
What is absentmindedness?
What is blocking or tip-of-the tongue phenomenon?
What is interference (i.,e., proactive interference and retroactive interference)?
What is persistence? What is PTSD?
Name and discuss the ways in which our memories can be distorted. Provide examples of each. *
Ch. 5 (MC #41-60)
What is sensation? What is perception?
What is transduction?
After transduction, neural signals pass through which part of the brain (except for smell)?
What is the absolute threshold vs. the difference threshold?
What is Weber’s Law?
What is sensory adaption?
What is the retina?
What is the iris and pupil responsible for?
What are rods? Cones?
What are ganglion cells?
What is opponent processing theory?
What is Gestalt psychology?
What are the Gestalt principles of grouping?
What is temporal coding?
The primary auditory cortex is located in what brain lobe?
What is the eardrum responsible for?
What is the cochlea?
What is the vestibular sense?
What are papillae?
Taste buds are located on what part of the body? Approximately how many does the average person have?
What are the five main tastes?
What is the epithelium?
What is the olfactory bulb and it’s function?
What is the amygdala? How is it related to memories?
What is the kinesthetic sense?
What are slow fibers? What are fast fibers? What types of pain are they associated with?
When experiencing an injury, when are you more likely to experience the most pain?
Research has shown that what method is the best to help manage pain?
Study the steps in the sensation and perception of the senses we learned about during group presentations. Be able to explain the entire process from start to finish. Be able to walk me through an entire process (including anatomy, what sensory receptors, what part of the brain it is processed in, etc.).*
