Paper, Order, or Assignment Requirements
Weeks 3-4 Written Assignment (submit here)
Submit as single MS Word document.
Title each Part below. The minimum approximate length for both Parts should be 1500 words
- Part 1 of 2(refer to Week 3 Readings)
- Evaluate arguments and theses by
- Clemente (2013)
- Bellovin, Bradner, Diffie, Landau & Rexford (2011)
- Saadawi & Jordan (2011) and
- FEMA (2013).
Specifically, respond to the following questions:
- What do they have in common?
- What are the differences is their assessment of cybersecurity and critical infrastructure protection?
- How does FEMA’s Critical Infrastructure Protection Plan address key requirements set for by Clemente (2011)?
- Conclude with a researchor policy question for further research.
- IMPORTANT!You must APA-utilize (cite, reference and list) all Week 3 Required
- Part 2 of 2 (refer to Week 4 Readings)
- Evaluate strengths and weakness
- Findings and Lessons Learned in Xia, Becerra-Fernandez, Gudi, & Rocha-Mier (2011)
- Information Fusion in Hennessy, Patterson & Lin (Eds.) (2003).
- Can these findings be utilized in your city, county, state EOC. Why? Why not?
- Conclude with a research or policy question for further research
- You mustAPA-utilize (cite, reference and list) all Week 4 Required
Week 3 Readings
- Required: Clemente, D. (2013).Cyber security and global interdependence: What is critical? Programme Report. February 2013. Chattam House.
- Required:Bellovin, S. M., Bradner, S. O., Diffie, W, Landau, S. & Rexford, J. (2011). Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure. Harvard National Security Journal. 3.1, pp. 1-38.
- Required: Saadawi, T & Jordan, J. Jr., (2011). eds.Cyber Infrastructure Protection. Strategic Studies Institute. Carlisle Barracks: U.S. Army War College (choose Chapter 1 Introduction and one chapter from each of the three Parts)
- Required:FEMA (2013). National Infrastructure Protection Plan.
Week 4 Readings
- Required:Xia, W., Becerra-Fernandez, I., Gudi, A., & Rocha-Mier, J. (2011). Emergency Management Task Complexity and Knowledge-Sharing Strategies. Cutter IT Journal, 24(1), pp. 20-25.
- Required:Hennessy, Patterson & Lin (Eds.) (2003), Information Technology for Counterterrorism: Immediate Actions and Future Possibilities, Section 2 (Types of threats associated with information technology infrastructure), Section 3.2 Systems for Emergency Response and Section 4. National Academies Press. (it may take a few minutes to download and open).
- Required:Zibuschka, J., Laufs, U. & Roßnagel, H. (2011). Towards ubiquitous emergency management systems. Modiquitous 2011 Proceedings.
- Required:Amin, S., & Goldstein, M. P. (2008). Data against natural disasters: establishing effective systems for relief, recovery, and reconstruction. Washington DC: World Bank (it may take a minute or two do download).
- Required:Becerra-Fernandez, I., Xia, W., Gudi, A. & Rocha, J. (2008). Task Characteristics, Knowledge Sharing and Integration, and Emergency Management Performance: Research Agenda and Challenges. Proceedings of the 5th International ISCRAM Conference – Washington, DC, USA, May 2008 (it may take a minute or two do download).
Is this question part of your Assignment?
We can help
Our aim is to help you get A+ grades on your Coursework.
We handle assignments in a multiplicity of subject areas including Admission Essays, General Essays, Case Studies, Coursework, Dissertations, Editing, Research Papers, and Research proposals
Header Button Label: Get Started NowGet Started Header Button Label: View writing samplesView writing samples