Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
5-6 Yhomit
- Part 1 (Refer to Week 5 Readings in the Lessons for Week 5)
- After reading Moore at al. (2010), Goodyear, Portillo, Goerdel & Williams (2010) and Deloitte-NASCIO (2013), develop a cybersecurity/EM Policy Analytical model in which you will recommend and justify the most effective way to manage emergency management related cybersecurity issues at the state level.
- Use additional resources as needed.
- Conclude with a research or policy question for further research.
- You must use literature and cite properly.
- Provide in-text citations and references.
- 750 words
- apa format
- at least 3 references
WEEK 5 READINGS
Required: Deloitte-NASCIO (2013). Cybersecurity Study State Governments at Risk: A Call for Collaboration and Compliance. https://edge.apus.edu/access/content/group/security-and-global-studies-common/EDMG/EDMG600/2012_nascio_deloitte_global.pdf
Required: Moore at al. (2010). Bridging the gap: developing a tool to support local civilian and military disaster preparedness. Santa Monica, CA: RAND (Chapters 4 & 5) https://www.rand.org/content/dam/rand/pubs/technical_reports/2010/RAND_TR764.pdf
Required: Marcus, L. J., Dorn, B. C. & Henderson, J.M. (2005). Meta-leadership and national emergency preparedness strategies to build government connectivity. Working Paper, Center for Public Leadership, Harvard University. http://dspace.mit.edu/bitstream/handle/1721.1/55934/CPL_WP_05_03_DornHendersonMarcus.pdf?sequence=1
Required: Becerra-Fernandez, I., Madey, G., Prietula, M., Rodriguez, D., Valerdi, R., & Wright, T. (2008). Design and Development of a Virtual Emergency Operations Center for Disaster Management Research, Training, and Discovery. Paper presented at the Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences. https://edge.apus.edu/access/content/group/security-and-global-studies-common/EDMG/EDMG600/CLEPM03.pdf
Required:Becerra-Fernandez, I., Xia, W., Gudi, A., & Rocha, J. (2007). Task Characteristics, Knowledge Sharing and Integration, and Emergency Management Performance: Research Agenda and Emergency Management Challenges. Paper presented at the 16th International Conference on Management of Technology. https://www3.nd.edu/~veoc/resources/Papers/ISCRAM2008_Becerra-Fernandez_etal.pdf
- Part 2 (Refer to Week 6 Readings in the Lessons for Week 6)
- After reading the article, respond to the following four questions bellow.
- Separate each response with the sub-headed question statement):
- Larry Clinton describes government-industry partnership as similar to a parent-child relationship, wherein the parent (government) feels the need to exhibit some tough love on an uncooperative and immature child (the private sector). The analogy breaks down, however, when one realizes that in this case the "child" (industry) is actually far bigger, stronger, and has more resources than the supposed parent. Clinton argues it is the parent (government) in this case that is ultimately reliant on the child for cyber security. While industry cyber systems are vulnerable to attack-as are virtually all infrastructures historically- the market has produced an array of effective means to protect their cyber systems. The problem is the lack of proper implementation of cyber security best practices and relatively simple fixes, like software updates and security patches. Title each response with the question text:
- What needs to be done and how do we get people to do it?
- Will a traditional regulatory model work in this space?
- Does a newer model to address uniquely 21st century issues need to be developed?
- Whom should the government regulate?
- Conclude with a research or policy question for further research.
- You must use literature and cite properly.
- Use APA style
- Provide in-text citations and references.
- 750 words
- apa format
- at least 3 references
WEEK 6 READING
Required: Clinton, L (2011). Industry- Government Partnership for Cyber Defense, Journal of Strategic Security, Volume 4, Number 2 , Summer 2011 (it may take 5-6 minutes to download http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1108&context=jss
Required: National Research Council Group (2010). Read sections "Attribution and Economics," (pp. 3-54) and "The Organization of the United States Government and Private Sector for Achieving Cyber Deterrence,” (pp. 245-272) in Informing Strategies and Developing Options for U.S. Policy Committee on Deterring Cyberattacks. Proceedings of a Workshop on Deterring Cyber Attacks (takes a couple of minutes to download). https://www.nap.edu/login.php?record_id=12997&page=http%3A%2F%2Fwww.nap.edu%2Fdownload.php%3Frecord_id%3D12997
Required: Responses to Questions Posed by Ms. Melissa Hathaway During Her Presentation at the National Science Foundation on March 18, 2009 March 31, 2009. https://www.whitehouse.gov/files/documents/cyber/National%20Science%20Foundation%20-%20HathawayQuestions%20Mar%2031%202009.pdf