Recent orders
Introduction to Project 3
Introduction to Project 3
Cullen Strady
Florida State University
ENC 2135: Research, Genre, and Context
Andrew Zolot
July 18, 2022
Introduction to Project 3
In Chapter 4.3 of the class textbook, the author delineates nine steps to follow when choosing a genre in which to compose. Some of these steps involve revisiting the topic and central idea, reconsidering the rhetorical situation, focusing on the purpose, and rethinking the audience (Braziller & Kleinfeld, 2021). In the video posted by Brook (2022), she shares the same ideas, underscoring taking a stance, identifying and reconsidering the audience, selecting the genre, and defining the rhetorical rationale. At the end of the video, Brook (2022) provides a comprehensive list of genres I might use for my Project 3 on a multigenre persuasive campaign and rhetorical analysis.
The six genres I might want to compose a text in include a blog, poster, Facebook ad, speech, letter to the editor, and PowerPoint presentation. The audience the blog might be effective at reaching comprises a specific group of women entrepreneurs self-identifying as being interested in seeking to increase their awareness of contemporary issues and trends in entrepreneurial leadership. The audience a poster might be effective at reaching is made up of college students studying topics on the role of gender in entrepreneurial leadership. A Facebook ad can effectively reach an extensive global audience of persons who are users of this social networking platform and seeking to add their knowledge of issues pertinent to gender roles in entrepreneurial leadership. Facebook can allow me to choose the audience by characteristics such as locations, topical interests, and demographics.
The audience that a regional letter to the editor can reach with effectiveness is huge because it comprises anyone who can access the letter once it is published. The letter to the editor is normally written to the editor, but it ends up being published in the public domain, such as an article, which eventually reaches a huge audience. The audience a speech can reach effectively comprises individuals in an in-person or virtual environment connected via the internet. Finally, the audience a PowerPoint presentation can reach effectively is a gathering of women in a lecture room learning about gender roles in entrepreneurial leadership.
References
Braziller, A. & Kleinfeld, E. (2021). The Bedford book of genres: A guide & reader for Florida State University (3rd Ed.). Bedford/St. Martin. E-book ISBN: 781319470104.
Brook, A. (2022). Project 3: Multigenre persuasive campaign and rhetorical analysis . YouTube. https://www.youtube.com/watch?v=A8Mr1ASvWu0.
Effect of Legislation on Organizations
Project 1: Effect of Legislation on Organizations
Insert NameCSIA 412 6381
Introduction
The purpose of this paper is to provide an analysis of the effects of key takeaways from the Presidential Policy Directive 21, Executive Order, and the May 2011 Cyber Security Legislative Proposal on the Department of Health and Human Services. Specifically, this paper seeks to analyze and evaluate the effects of refining and clarifying functional relationship across the Federal Government, creating a baseline framework to reduce cyber risk to critical infrastructure, privacy and civil liberties, and critical infrastructure and cybersecurity. This paper is designed to provide an overview of the policies that accompany each key takeaway, the reason the takeaway was chosen, as well as the effects it has had on the Department of Health and Human Services since its inception.
Points of Analysis
The following points of analysis have been collected from the Presidential Policy Directive (PPD) 21, Executive Order (EO) 13636, and the May 2011 Cyber Security Legislative Proposal respectively. These particular points were chosen because of the effects each proposed action has not only on the entity that should be implementing it but also the effect it has on the whole nation when implemented improperly, or not at all.
Refine and clarify functional relationships across the Federal Government to advance the national unity of effort to strengthen critical infrastructure security and resilience (The White House, 2013).
This particular point of analysis was chosen because it highlights the need for systems to work together fluidly and without interruption. If there is an interruption in any system for any reason, this particular point highlights how that affects the government as a whole.
Baseline framework to reduce cyber risk to critical infrastructure (Obama, 2013).
Creating and maintaining a set of standards is imperative to every sector of business whether government, private, or public. By maintaining a set standard, organizations and individuals alike know what is required of them and the industry as a whole is advanced as all professionals are operating under the same system of expectations.
Privacy and civil liberties protections (Obama, 2013).
Risk management is imperative for any internet security program to be effective and functional. Without a risk management plan in place, organizations leave themselves open to various attacks that threaten the consumers they serve as well as the veracity of their services.
Critical infrastructure and cybersecurity plans (Cyber Security Legislative Proposal, 2011).
Much like risk management plans, a complete and active cyber security plan is essential to any organization because it means that the entity is protected and actively monitored. Without an active plan in place, the organization and all of it’s pertinent data is likely to be poached by outside parties.
Analysis/Research
Refining and clarifying relationships
The greatest relationship in place for the Department of Human and Health Services (HHS) as it pertains to the directives outlined in the EO is the relationship with the Office of Civil Rights (OCR). The oversight and management responsibilities as it pertains to the Security Act and HHS, provide OCR with the ability to perform regulatory audits, reconcile issues of noncompliance, and/or impose monetary penalties as deemed necessary (Salmon, 2013). According to Salmon’s (2013) report, however, OCR has failed to fully meet the requirements as outlined, thereby leaving various aspects of HHS’ internet security program vulnerable and at risk for greater threats. As HHS is part of the critical infrastructure of the national government, this leaves the national government open to threat as well. The purpose of refining and clarifying relationships was to instill a system of accountability and advisement in order to strengthen the nation’s infrastructure (The White House, 2013), and though oversight from OCR could have been an amazing asset for the department of HHS, because the responsibility has not been carried out, HHS suffers. As a result of OCR’s lack of routine and preventative audit, various vulnerabilities were identified in HHS’ system and HHS consequently failed various evaluation points of its own (Salmon, 2013). The original effect of this policy meant that HHS would no longer have to rely upon its own resources in order to identify potential threats, however the value of the policy is yet to be observed in this instance.
Baseline framework to reduce cyber risk to critical infrastructure
This mandate originally meant a complete overhaul of the HHS security framework as it now worked to not only be compliant with HIPAA guidelines and directives but also those that were not being instituted as the standard by government officials (Department of Health and Human Services, 2014 May). Addressing this particular mandate meant that HHS strengthened pre-existing relationships while simultaneously forming new ones as they worked in collaboration in order to create a resilient and efficient network. In particular, this mandate birthed a chain of monthly joint briefings which address cyber threats, ways to improve network security, as well as identifying and prioritizing federal resources for cybersecurity (Department of Health and Human Services, 2014 May).
Privacy and civil liberties protection
This area is the one in which HHS has received its hardest hit due to its lack of a risk management protocol and program. According to the evaluation completed by the GAO (2006), HHS lacked a significant amount of internet controls and network security. This lack of security, presents a large window of opportunity for outside parties to gain access to the system. In addition to not having clear and defined security and/or risk management protocol in place, HHS also did not have a fully operational internet security program, thankfully PPD-21 changed all of this. According the HHS website (2014 March), the PPD-21 prompted a series of security system strategic goals aimed at improving the system’s network as well as increasing the viability and security of pertinent data. PPD-21’s call for data security while also sharing information, caused HHS to evaluate their current practices and then move to enhance their current practices in order to support improvements in health as well as fight fraudulent activities (Department of Health and Human Services, 2014 March).
Critical infrastructure and cyber security plans
This final area of analysis is one that has affected HHS the most as it works to enhance its security program to meet the needs of its consumers. As outlined by Salmon’s (2013) evaluation and the evaluation completed by the GAO (2006), the HHS was extremely susceptible to attack from outside parties due to its lack of cybersecurity infrastructure. The growth and improvement from 2006 to 2013 can be measured from the comments made by Salmon versus the problems identified by the GAO. Though HHS still has a lot of work to do as it pertains to being compliance, the improvements made in response to the mandates created are noticeable. For example, though the HHS has still not fully implemented its program, there are pieces such as password protection, data encryption, and collaboration with various entities that have been put into place in order to ensure that the organization moves closer to compliance than it has been in the past (Department of Health and Human Services, 2014 March).
Conclusion
The purpose of any government mandate as it pertains to national security and the nation’s infrastructure is to provide a system of networks that function to improve the quality of service and life for the American people. The purposes of the various mandates addressed in this paper are to increase the stability of the government by strengthening collaboration between various entities, creating a standard of practice and protocol for cybersecurity professionals, protecting the privacy and civil liberties of consumers, and creating solid and well-developed cybersecurity plans. Though the Department of Health and Human Services has quite a ways to go before it is in full compliance with the components of each of the mandates, it has come progressed significantly from where it stood eight years ago.
References
Cybersecurity legislative proposal. (2011 May). Retrieved from https://learn.umuc.edu/d2l/le/content/47852/viewContent/2363913/View
Department of Health and Human Services. (2014 March 10). Strategic goal 4: Ensure efficiency, transparency, accountability, and effectiveness of HHS programs. Retrieved from: http://www.hhs.gov/strategic-plan/goal4.html
Department of Health and Human Services (2014 May 12). HHS activities to enhance cybersecurity. Retrieved from: http://www.phe.gov/Preparedness/planning/cip/Pages/eo13636.aspx
GAO. (2006). Department of health and human services needs to fully implement its program (GAO-07-267). Washington, DC. Retrieved from: http://www.gao.gov/new.items/d06267.pdf
Obama, B. (2013, February 19). Executive order 13636 – Improving critical infrastructure cybersecurity. Federal Register. 78(33). Retrieved from: https://learn.umuc.edu/d2l/le/content/47852/viewContent/2363928/View
Salmon, T.M. (2013). The office for civil rights did not met all federal requirements in its oversight and enforcements of the health insurance portability an accountability act security rule. Washington, DC. Retrieved from: https://oig.hhs.gov/oas/reports/region4/41105025.pdf
The White House. (2013, February 12). Briefing Room. Retrieved 01 22, 2015, from The White House: http://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil
Introduction to branches of Accounting
Accounting
Name
Institution
Introduction to branches of Accounting
Accounting is an important concept that its history can be traced back centuries ago. Many businesses, based on numerous transactions made in a day requires accountability and proper records keeping for such in information in order to enhance other activities within a business enterprise such as communication. With the absence of accounting for businesses, this would act as a stabling block for the attainment of organizational objectives such as profit maximization as management of resources requires proper innovative structures for accountability.
According to Dyson (2004) the accounting branches can be segregated into three key areas; financial, cost, tax and managerial accounting (Dyson, 2004, p.12). Accounting plays a significant role in different business enterprises especially on key areas such decision-making, giving information, protection of business from various transactions involved with other business environments and explaining the business position. Financial Accounting is the art of managing business financial recording that stipulates the business position, and it progress in growth through the analysis of profits and losses. According to Babarinde (2003) financial accounting is a system that deals with explaining the situation and the state of affairs for businesses through preparation of financial statements such as the balance sheet and trade and profit loss account (Babarinde, 2003 p. 313). Financial accounting also plays a significant role in running a business enterprise as the system give the estimates of costs on products, functions, activities and the firm progress. Through financial accounting, the management in a business entity can get quality information to plan through budgeting that gives estimates on expected expenditures.
Cost accounting is the system used in controlling activities of production that would regulate expenditures for the business in order to enhance profit maximization. According to Abeygunasekera and Fonseka (2013) every business has its control system that helps in cutting cost either through the production processes such as manufacturing, recruitment, training and development and delivery of services. Through such processes, cost accounting acts a system for the management to control such expenditures incurred through transactions with different business environments as well as in the processes of availing goods and services to consumers (Abeygunasekera & Fonseka, 2013).
Managerial accounting is the process that facilitates the management with information concerning the company’s progress that enhances the management in carrying out their day to day functions. The management in every business ought to have the facts in decision-making, planning, and in the development of policies and through managerial accounting such is facilitated. According to Mbroh (2013) he argued that in managerial accounting, frequent information is made obtainable to the management such as information on funds, profit and cost that gives a bulge of the business advancement and must be factual in support of truth and fairness (Mbroh, 2013).
Recommended accounting methodology for companies
It is necessary for the management of any business to how commitment in recording business transactions as this information can be retrieved for further use when such information is required. There are for instance methods of accounting that are commonly used across bossiness in the world of today. This includes the single entry and doubles entry methods that are used interchangeably in businesses. Use of double entry techniques has proved to have various advantages for many that use it. In the double entry, two columns are created for transaction entries in both what the company receives and also spends while running the business.
By following the right procedures in preparation of journals, trial balance, and final account, the use of the double entry techniques businesses benefits in different ways that is recommendable. Through such a system, the management is also to create the accounting book through a device known as the trial balance that give more accurate inform about the business transaction.
It is also easier to ascertain on the profits and losses incurred by a business if the transaction entries are properly entered in the trial balance device.
According to Mbroh (2013) he also argued that a financial statement such as the balance sheet, the system gives accurate information concerning the position of the business enterprise (Mbroh, 2013). The management is also able to know if the firm has made any development such as profit maximization and growth. This as well regulates spaces for errors as the transaction entries in both the debit and the credit side should balance in the system. Through the double entry system, the management is also able to carry out a comparison study during a specific period such as between two consecutive years. It also becomes easier in making decisions for the business as the business position is made clear for instance in the trade and profit loss accounts.
References
Abeygunasekera, A.W.J.C and Fonseka, A. T (2013) Non-Compliance with Standard
Accounting Practices by Small and Medium Scale Enterprises in Sri Lanka.
Babarinde A. (2003) Financial Accounting, Volume 1, Lagos: JBA Associates Ltd.
Dyson J. R (2004) Accounting For Non-Accounting Students, 6th Ed. Financial Times/ Pitman
Publishing Imprint, England.
Mbroh, (2013) Accounting and Control Systems Practiced By Small and Micro Enterprise
Owners within the Cape Coast Metropolitan Area of Ghana in Asian Journal of Business
and Management Sciences Vol. 1 No. 9 [28-47]