602 Cyber Norms

What do we mean by cyber norms? Are they changing?

reading resource:

The purpose of cyber intelligence is to collect information of potential cyber threats, to assess one’s own vulnerabilities, to mitigate riisks created by those vulnerabilities, to assess others’ vulnerabilities and to act upon them as necessary. To do this one must focus on identifying the adversary infrastructure and adversary agents,capabilities, intentions, and ongoing actions. As noted by the Intelligence and National Security Alliance, “effective cyber intelligence will begin to enable predictive, strategic warning regarding cyber threat activities, mitigate risks associated with the threat, enhance our ability to assess the effects of cyber intrusion, and streamline cyber security into a more efficient and cost effective process based on well informed decisions (INSA 2011).

The Cyber Intelligence Community

It’s a not as easy as you might think to decide what professions are part of the cyber intelligence community. Of course it includes government officials and analysts focusing on cyber security. However, it also includes some telecommunication and internet providers, Computer Emergency Readiness Teams, and private companies involved in cyber security. Those who work on cyber intelligence must have the same basic skills as others who work in int intelligence. The intelligence tactics, techniques, and procedures (TTPs) that are used in all types of intelligence are applied to cyberspace as well. However, there are also additional skills such as advanced technical abilities, and these skills must be updated constantly. The government has not been as successful at recruiting people with these types of skill sets. One agency that does have a solid pool of talent is the Information Assurance Directorate (IAD) at the National Security Agency. There has been a good deal of attention to the need for more people with such expertise in cyber security. What is often neglected in the discussion is the need for policy analysts and thought leaders who have those skills but also understand them in the context of global security.

Technical skills alone are important for those working at the tactical level. However, it is crucial at the strategic level we have people who can understand and plan for cyber attacks.As with nuclear specialists or space they need to move beyond how to do something to why and when to do it. Divorcing cyber skills from the broader knowledge needed for strategic thinking will lead to mission confusion, ad hoc decision making and poor communication because the computer guys don’t speak the same language as the policy guys running the show. Scientists and engineers who want to be advanced practitioners must study policy and policy makers who want to truly lead must know the technical side.

Understanding the political and policy l implications requires a solid understanding of political science and international relations. Advanced practitioners need to have studied constitutional rights, national and international court cases, and the tension between cybersecurity and various components of human security

it’s important to remember that the goal of cyber intelligence is not just so that a particular government can protect itself, but also so that it can increase its on cyberpower. Degrees of cyberpower may be obtained throuItgh intelligence collection that allows a state to exploit offensive or defensive tools that an adversary may possess or through disruptive technology that deprives the adversary from effectively operating within the environment or domain.


Espionage may be committed by governments such as China through its use of specialized units trained to obtain information which may provide a military or industrial advantage or edge. North Korea and China are fairly well recognized for their direct and indirect acts of espionage. A report issued by the Mandiant Corporation identified approximately 20 groups operating in China that represent an ongoing advanced persistent threat in relation to cyber-espionage. However, perhaps the greatest known threat of espionage is commonly attributed to the People’s Liberation Army of China Unit 61398. The size of the unit, in manpower estimates, runs from the hundreds of personnel to over a thousand (Mandiant, 2013). The attacks attributed to the unit have been so pervasive and wide spread they have established attacks in numerous sectors to include: health care, legal, food and agriculture, chemical, high-tech electronics and navigation just to name a few. Their tools of the trade include malware and the use of distributed networks utilizing command and control servers across the globe.

Threat Agents:

1. Hackers (structured and unstructured.

2. Industry competitors

3. Insiders

4. Terrorist groups

5. Lone Wolf Terrorists

6. Hacktivists

7. Government Agents

One challenge is the lack of clear communication between industry and government when it comes to cyber intelligence. Obviously clearance is an issue but even when industry folks have the correct info they rarely get it in a prompt manner. There are legal and contractual reasons why industries may not be able to share information.

Computer and telecommunications networks are a core part of the national infrastructure and include electric power grids, the flow of financial data, financial markets, military and civilian aviation systems, critical first-response systems, military response systems and information systems. These are obviously key parts of national security that must be protected from cyberattacks. Federal agency and military computer systems are frequently targeted by domestic and foreign sources, as are U.S. lawmakers. Policymakers have implemented a number of programs to protect U.S. information infrastructure, such as the National Strategy to Secure Cyberspace of 2003, the ‘Einstein Program’ of 2003-U.S. Computer Emergency Readiness Team (US-CERT), and the Comprehensive National Cybersecurity Initiative of 2008 (CNCI). The IC is also active in preventing attacks and protecting information infrastructure. Interestingly, there have been reports that the Einstein Program may expand critical infrastructure and monitor private networks for malicious intrusions. This will raise privacy concerns.
People have the right to be left alone and to be excluded from publicity. These are rights that are protected by law in most democracies. Privacy laws include how the state handles personal information. Privacy is closely related to autonomy and freedom, which can naturally be taken away should an individual be suspected of or proven to be involved in criminal and terrorist behaviors. Privacy relates to four areas: 1) Communications, 2) Information, 3) One’s possessions, and 4) One’s body and health.

Legally, the desire for privacy must be expressed, otherwise no desire for privacy is assumed. For instance, if you have a conversation with somebody and you do not ask them to keep it confidential; they are under no inherent obligation to do so. The same applies to trade secrets.

Technology has made it easier to exclude people from accessing information in some cases, such as by the use of passwords, but naturally, technology has also made it easier to access private information. The panopticon phenomenon refers to the feeling of always being watched, and the resultant fear and anxiety that is generated, while the loss of privacy translates to a loss of freedom, dignity and spontaneity.

The panopticon phenomenon exists because e-mails can be intercepted, people can be monitored, databases are frequently merged by organizations, and people’s private information is shared amongst organizations. Store cards track people’s spending patterns, hackers break into computer systems, identity fraud is increasing, and attempts to prevent digital information from being decoded are made. Moreover, infopreneurs trade in private and personal information.

Importantly, people have a right to be free from intrusion and interference. However, if private or personal information has been made public, it is no longer legally seen as private. Finally, people must have the opportunity to verify information that was obtained about them, no unnecessary information should be gathered, and information that is no longer necessary for the purposes it was collected for, should be destroyed. Information must be kept confidential.

According to the European Convention on Human Rights (ECHR), that the right to privacy is a qualified right that depends on circumstances of public interest such as national security, public safety, protection of the rights and freedoms of others, and the prevention of disorder. Due to the fine balance between rights and security, the ECHR further outlines that with respect to the right of privacy, exceptions can be made as long as intrusions are legal, proportional, the last resort, accountable whereby they are authorized and monitored, and records are kept, and have finality in that the information is used for the purposes it was obtained for.

Information Operations

Information operations (IO) disrupt enemy information systems and protect U.S. information systems. Due to technological developments across the globe, terrorists and foreign spies use computer network attacks, such as hacking and cyberattacks, to attack the United States. While these technological attacks against the U.S. have become prolific, domestic and international laws have not kept up. While the U.S. obviously needs to patrol these kinds of attacks in order to prevent them, the lack of debate and legal development have resulted in the ethical and societal issues being faced today around public privacy and civil liberty rights.

Every facet of life today relies on technology. From food production and delivery, to water treatment and financial systems, society relies on technological information systems. National security thus extends far beyond just military concerns, and includes the business, government and civilian services we take for granted on a daily basis. Naturally, the military and all national security matters also rely heavily on high-tech systems.

Weapons systems, communications systems, command and control systems, targeting systems, laser range finders, vision enhancement and global positioning, all depend on high technology systems. The military Secret Internet Protocol Router Network (SIPRNET) and the Non-classified Internet Protocol Router Network (NIPRNET) allow for the global and instantaneous distribution of vital information across U.S. operations. These capabilities however, also pose an immense threat and operational vulnerability to the U.S.

Critical Infrastructure Protection
The need to protect these technological systems is obviously of utmost importance to the whole nation, not just to national security agencies. The nation’s complete dependence on technology makes it a prime target for terrorists and other enemies.Information assurance (IA) is the part of IO that protects U.S. information systems against threats. The National Information Infrastructure (NII) was created by President Clinton’s 1996 Executive Order 13010, to protect critical U.S. information technology systems.

Critical Infrastructure Protection warns about and responds to infrastructure attacks. The FBI is responsible for coordinating NII protection in government, civilian and industrial organizations. The National Infrastructure Protection Center (NIPC) was established by the FBI to coordinate national responses to cyber-crime.

Information Operations comprises five primary capabilities that are used for offense and defense

Offensively, these capabilities are used to influence enemy decision makers and achieve certain objectives. Perception management action use OPSEC, PSYOPS and military deception to limit the information enemies have about U.S. plans through classifying and safeguarding information. Perception management causes enemies to respond in desired ways by influencing their perceptions. This is achieved by feigning military maneuvers, concealing actual military maneuvers, and distributing false information and propaganda, such as hacking into websites and distributing leaflets. EW is used to destroy enemy information systems and to degrade enemy capabilities.

Defensively, these capabilities are used to coordinate personnel, technology, policies, procedures and operations, in order to protect friendly information systems and infrastructure. Network monitoring and defense and counterintelligence operations, as well as enemy perception management are also used in defensive IO.

Ethical and Legal Issues
Civilian and military targets have largely become indistinct, because the Department of Defense’s communications, as well as those of enemies, use communication systems that are owned and operated by civilians. These systems can thus be referred to dual-use systems, which obviously lead to a number of legal and ethical problems in which security demands and civil rights clash.
High-tech systems have also blurred the line as to what military targets are. For instance, enemies use technology to target utilities and other civilian facilities, while the U.S. must grapple with the ambiguous, complex onslaught of terrorism that uses unconventional methods of attack, in the context of both a peacetime and wartime framework.

The Ethics and Legalities of Wartime Information Operations
Information Operations in the context of wartime is easier to delineate, because in wartime, the U.S. has far less restrictions on its ability to diminish the enemy’s capacity to conduct war, and the U.S. population is far more likely to support its actions. The U.S. would be justified in attacking enemy utilities and facilities, and could use IO to render them inoperative rather than physically destroying them. This is a huge advantage when enemies use noncombatants to shield strategic targets, just as Saddam Hussein did in the Gulf War. Moreover, once the war is over, the facilities can be repaired far more easily than if they were physically destroyed. Thus, enemies could realize that the U.S. does not wish to destroy their country, but that it rather aims to end hostilities.
However, the United Nations Resolution 2284-10 November 1975 states that technology should not be used to violate the territorial integrity and sovereignty of states, while Article 54 of Protocol 1 states that a nation may not interfere with objects that are indispensable to civilian survival such as water and food supplies. The values that nations hold determine how they utilize non-lethal technology weapons to pressurize enemies.
It has also been argued that it is legally easier to use lethal force than non-lethal IO actions, which currently require substantial legal authorizations before they are permissible. Moreover, the rules of engagement as they refer to IO are underdeveloped, and need to be debated and instituted on an international level. Currently, nations are only restrained by their ethical and moral values.


INSA. 2011. Cyber Intelligence: Setting The Landscape For An Emerging Discipline.

Sears improvement

For an additional fee, a customer purchasing a Sears Roebuck appliance, such as a washing machine, can purchase a three-year service contract. The contract provides free repair service and parts for the specified appliance using an authorized Sears service provider. When a person with a Sears service contract needs to repair an appliance, such as a washing machine, he or she calls the Sears Repairs & Parts department to schedule an appointment. The department makes the appointment and gives the caller the date and approximate time of the appointment. The repair technician arrives during the designated time framework and diagnoses the problem. If the problem is caused by a faulty part, the technician either replaces the part if he is carrying the part with him or orders the replacement part from Sears. If the part is not in stock at Sears, Sears orders the part and gives the customer an approximate time when the part will arrive. The part is shipped directly to the customer. After the part has arrived, the customer must call Sears to schedule a second appointment for a repair technician to replace the ordered part. This process is very lengthy. It may take two weeks to schedule the first repair visit, another two weeks to order and receive the required part, and another week to schedule a second repair visit after the ordered part has been received.

. Diagram the existing process

. What is the impact of the existing process on Sear’s operational efficiency and customer relationships?

. What changes could be made to make this process more efficient? How could information systems support these changes? Diagram the improved process.

Baldwin County, week1 discussion help

Please do a paragraph about this post with this instruction . 

post most have  4 or more  sentences .

 you also have to have a high quality post from a content perspective. This means it also needs to do more than agree with or praise a class mate. If you agree with a classmate, explain why, give an example, share what you learned in the readings

I live in Bay Minette, Alabama. Bay Minette is in Baldwin County. Baldwin County is located in south Alabama along the Gulf of Mexico and Bon Secour Bay.  Baldwin County is recognized as one of the premier tourism spots in Alabama. There are approximately 8,500 residents living in the city limits of Bay Minette and an additional 20,000 beyond the city limits (Home, n.d.). Baldwin County is known as republicans. They believe in Americanism, a term comprised of two root words, “American” and “exceptionalism.” They believe the best way to ensure Americanism is through Republicanism. Every elected official in Baldwin County is a registered Republican. The reason: To be elected in Baldwin County, candidates are held to the values, standards and expectations of the Republican Party’s Platform….and the planks thereof. Republicans make up the overwhelming majority of the county’s electorate (McCollough, 2015).

Examples of phenomenological communities include religious groups, social groups or profession. My phenomenological communities are my church and my co-workers. They are my phenomenological community because we have the same beliefs and values. We all share the same interest.

I feel like some challenges the community health nurse faces are language and cultural barriers. A community nurse has to go to all areas of a community. It is just as challenging with all the communities. Some benefits would be the experience that the nurse would get working with all the different cultures. One solution for the language barrier would be is to have an interpreter present during your visits to the ones that doesn’t speak English. The solution for the cultural barriers would be education. The nurse needs to be informed before their first visits in the community.

quasi-experimental design, assignment help (2 pages)

one step in the scientific method, after choosing a topic and forming a
research question and hypothesis, researchers need to decide what type
of research design they want to use. As you have learned during class,
there are many different methods that a researcher could use. It can be
helpful to think through the different options prior to determining what
method to use. It is important to think of what is most needed from
your study results when choosing what method to use. For example, is
internal validity or external validity more important? As all
methodologies have limitations, what are limitations that you can “live
with” in regards to studying your research question? A researcher who
wants to prioritize results that generalize to real world settings would
likely want to prioritize strong external validity and be able to “live
with” limitations to internal validity. A researcher who wants to be
able to make strong causal inferences from the results would likely want
to prioritize strong internal validity and be able to “live with”
limitations to external validity.

Think of a topic of interest to you that involves comparing two groups of people. Then choose one of the following to answer:

A: Discuss how a quasi-experimental design could be used to study your topic.

  • What is your research question, hypothesis, and target population?
  • Why would a quasi-experimental design be better to use than other study methods for this topic?
  • What are strengths and limitations of your study that result from using a quasi-experimental design?

B: Discuss how a single factor experimental design could be used to study your topic.

  • What is your research question, hypothesis, and target population?
  • Why would a single factor experimental design be better to use than other study methods for this topic?
  • What are strengths and limitations of your study that result from using a single factor experimental design?

Prepare a 3–4-page report on nurse-patient communication in which you address types of communication,


Prepare a 3–4-page report on nurse-patient communication in which you address types of communication, factors that influence the communication experience, and how the patient experience affects health outcomes. Recommend evidence-based strategies to improve nurse-patient communication and explain how the strategies consider patient demographics.

Nursing professionals do not only communicate with others within their organizations—often, they are also the first point of contact with patients. Thus, nursing professionals need superior communication skills to explain procedures and medication instructions, as well as to listen to what patients need to say.


By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:

  • Competency 2: Describe the concepts, processes, and tools required to conduct comprehensive health assessments for individuals, families, communities, and populations.
    • Recommend evidence-based strategies to improve nurse-client/patient communication.
    • Explain how nurse-client/patient communication strategies consider individual demographics.
  • Competency 3: Explain the internal and external factors that can affect the health of individuals, families, communities, and populations.
    • Describe the types of communication that occur between nurses and clients/patients.
    • Explain the factors that influence the communication experience between nurses and clients/patients.
    • Explain how the client/patient communication experience can impact health care outcomes.


    Clark and Paraska (2014) suggest that understanding how people communicate is the first step in learning how to teach patients more effective methods of listening, self-awareness, and self-expression—and also in identifying barriers in communication. The process of communication can be difficult, as we can interpret meaning based on a variety of hidden messages—some conscious and intentional—some not.


    Clark, C. C., & Paraska, K. K. (2014). Health promotion for nurses: A practical guide. Burlington, MA: Jones & Bartlett.

  • Assessment Instructions

    Imagine that, in an effort to reduce the number of patient complaints about nursing staff, organizational leadership has asked your department to prepare some preliminary research on a number of different topics. Your topic is patient communication, such as the following:

    • The types of communication that take place between nurses and patients.
    • The factors that can influence both positive and negative experiences.
    • How the experience can impact health care outcomes.
    • Strategies that can improve the communication between nurses and patients.


    Search the Capella library and the Internet for peer-reviewed journal articles or other professional resources on the topic of effective communication with patients. You will need at least 3 resources to support your work in this assessment.


    Prepare a report on patient-nurse communication in which you include the following:

    • Describe the types of communication that take place between nurses and clients/patients. Do not forget to consider types of communication beyond verbal and written on paper.
    • Explain the factors that influence positive and negative experiences during the communication process. (Hint: Consider the experiences of both the client/patient and the nurse. Also, consider things such as age, gender, culture, and so on, of both the client/patient and the nurse.)
    • Explain how the client/patient experience can impact health care outcomes.
    • Recommend evidence-based strategies for improving communication between client/patients and nurses.
    • Explain how the strategies consider different client/patient demographics.

    Format this assessment as a report that you would give to your supervisor. It may be helpful for you to review how your organization formats internal reports and incorporate your findings. You are still required to adhere to APA guidelines for in-text citations and references, as well as for formatting your reference page.

    Additional Requirements

    • Include a title page and a reference page.
    • Ensure your assessment is 3–4 pages in length.
    • Use double-spaced, 12-pt., Times New Roman font.

    Patient Communication Scoring Guide

    Describe the types of communication that occur between nurses and clients/patients. Does not describe the types of communication that occur between nurses and clients/patients. Identifies the types of communication that occur between nurses and clients/patients. Describes the types of communication that occur between nurses and clients/patients. Describes the types of communication that occur between nurses and clients/patients, including verbal and nonverbal, paper, and forms of e-communication.
    Explain the factors that influence the communication experience between nurses and clients/patients. Does not explain the factors that influence the communication experience between nurses and clients/patients. Identifies the factors that influence the communication experience between nurses and clients/patients. Explains the factors that influence the communication experience between nurses and clients/patients. Explains the factors that influence the communication experience between nurses and clients/patients for both nurses and clients/patients and considers a broad range of factors, including age, gender, and culture.
    Explain how the client/patient communication experience can impact health care outcomes. Does not explain how the client/patient communication experience can impact health care outcomes. Explains how the client/patient communication experience can impact health care outcomes, but the explanation is missing key elements. Explains how the client/patient communication experience can impact health care outcomes. Explains how the client/patient communication experience can impact health care outcomes and illustrates with real-world examples.
    Recommend evidence-based strategies to improve nurse-client/patient communication. Does not recommend evidence-based strategies to improve nurse-client/patient communication. Recommends strategies to improve nurse-client/patient communication but does provide supporting evidence. Recommends evidence-based strategies to improve nurse-client/patient communication. Recommends evidence-based strategies to improve nurse-client/patient communication and suggests benchmarks to determine if the strategies are effective.
    Explain how nurse-client/patient communication strategies consider individual demographics. Does not explain how nurse-client/patient communication strategies consider individual demographics. Explains how nurse-client/patient communication strategies consider individual demographics but omits some key areas of demographics, such as spirituality, sexual orientation, et cetera. Explains how nurse-client/patient communication strategies consider individual demographics. Explains how nurse-client/patient communication strategies consider individual demographics connecting the strategies to a broad range of demographics including spirituality, sexual orientation, culture, gender, age, et cetera.
    Write content clearly and logically with correct use of grammar, punctuation, and mechanics. Does not write content clearly, logically, or with correct use of grammar, punctuation, and mechanics. Writes with errors in clarity, logic, grammar, punctuation, or mechanics. Writes content clearly and logically with correct use of grammar, punctuation, and mechanics. Writes clearly and logically with correct use of spelling, grammar, punctuation, and mechanics; uses relevant evidence to support a central idea.
    Correctly format citations and references using current APA style. Does not correctly format citations and references using current APA style. Uses current APA style to format citations and references but with numerous errors. Correctly formats citations and references using current APA style with few errors. Correctly formats citations and references with no errors.

article comparison, writing assignment help

here are 2 different essay that need to be reading, then  fin some connection between 2 reading and write a new paper .

1 it must contain one thesis statement in the end of first  paragraph,  then have to 3 body graphs with topic sentence in order to support the these statement. ( 3 body paragraph , each of them must have 2 quotes from different 2 essay,  one from reading 1, another from reading 2 )   —that’s mean should have 6 quotes in all writing. moreover, quote should set up, integrated, punctuated, and cite properly, the quote should  analyze it not summarize it.

2 In first paragraph,should contain(1)  A working title  , (2)  A opening sentence that grabs the readers attention, but relate to the content of this paper, (3)    One or Two sentence that transition your text from the opening sentence to the introduction of the authors,  (4)   Introduce author 1 and the title of the reading and in one or two state the author argument. (5)  At least one sentence that transition from author 1 to author 2, and state how the author argument connect to each other  (6) Introduce Author 2 and the title of the reading and in one to two sentences state the author arguments     (6)after introducing 2 authors , stating their argument, declare their connection, you will need to transition to your own argument(position), in doing  that  you should write 1 -2 sentences state how their argument connect to yours, and how  your position builds on theirs to become your own position.  (7)Thesis statement, your position clearly stated, do not restate the authors argument

 3 In the essay, no ‘I’ or ‘In my opinion’, no’ people ‘.

 4 Transitions between paragraphs are not just mechanical, but explain real connection between real ideal in paragraph.

 6 all body paragraphs effectively support the thesis.( the first paragraph’s last sentence)

7 essay need MLA style, and i will give you a sample writing that i have been written, please follow that format.

Power Imbalance

Please follow all directions.

The article links for the assignment are:




For this assignment, you will assess how power imbalances can influence the process of resolving conflict. You will evaluate how power imbalances can impede an individual’s attempt to manage work-related conflict. After completing the assigned readings for this week, write a paper that focuses on power imbalances.

Be sure to address the following items in your paper:

  • Present a synthesized meaning of conflict and power.
  • Determine how power can constrain or exacerbate conflict.
  • Describe the techniques for balancing power.
  • Provide an example of ‘power currencies’ that you have experiences in conflict whether it be personal or professionally. Keep in mind the acronym RICE (Resource control, Interpersonal linkages, Communication skills, Expertise).
  • Explain how communication be used to mutually establish positive or negative interdependence.
  • Discuss ways for leaders to integrate conflict mediation into organizational culture.
  • Include examples of scenarios in your analysis.

Length: 5–7 pages, not including title and reference pages.

References: Minimum of five scholarly resources.

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.

Be sure to adhere to Northcentral University’s Academic Integrity Policy. View the Assess Power Imbalances to refresh your knowledge of how to achieve academic integrity.

Sociology answer that was answered already for 3.00

Race, Ethnicity, Sex, and Gender” Please respond to one (1) of the following:

  • Describe the effects that the statistical information on a specific race or ethnicity in the areas of health, crime, employment, or education may have in terms of being a predictor of behavior. Provide your opinion on the most likely effects these statistics will have on an individual.
  • Select one (1) of the following terms: liberal feminism, socialist feminism, radical feminism, patriarchy, and multicultural feminism, and define it in your words. Describe the manner in which this term relates to you.

You have answered this question already. How do i purchase it?

Write a Descriptive Writing Piece

Write a 250-word essay #2; this time you will write a Descriptive Writing


Remember when you write this piece to make the reader feel how you feel, hear what you heard, see what you saw, touch what you touched, smell what you smelled. Think of all your senses you used when you were in that place at that time you are describing.






please remember that it’s only 250 words

Write the conclusion, Section V, as well as Section IV, Parts D and E, sociology help

  1. Write the conclusion, Section V, as well as Section IV, Parts D and E of your final project. Combine these with your revised work from all previous milestones and submit your comprehensive case study analysis. Your final submission should be a comprehensive, refined artifact containing all of the critical elements of the final project. This assignment should adhere to APA guidelines and use appropriate level headings, page numbers, margins, and a complete reference page. An abstract is expected. For additional details, please refer to the Final Project Document in the Assignment Guidelines and Rubrics section of the course.

  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.