1) Answer ANY THREE of the questions listed below. The three question response posts must have a minimum of 200 words each and must directly quote and properly cite (using MLA format) from the assigned textbook readings. I expect substantive and scholarly posts which evince an understanding of the complex chapter readings. Failure to meet the above criteria will result in a point deduction. For the in-text citation, just put the name of the philosopher whose text you are citing in parentheses followed by the publication year of the e-book (2020). Here’s an example: (Plato, 2020).
QUESTIONS:
Chapter 4: Aristotle
1. According to Aristotle, how do we acquire virtue?
2. Explain Aristotle’s doctrine of the Mean. How does it relate to his teaching on moral virtue? Give two examples from your own experience.
Chapter 5: Epicurus
1. Although Epicurus is a hedonist, he is clearly opposed to vulgar hedonism. Can you find additional arguments for or against the theory of vulgar hedonism? Is it not terribly “ judgmental” for us to claim that some pleasures are “higher” or “ lower” than others? Shouldn’t we just tolerate and accept differences of opinion in this area? Or does it make more sense to argue that there is a natural hierarchy of pleasures and pains?
2. Epicurus believes that fear of divine retribution is the greatest source of fear and anxiety. Do you agree with this assessment? Why or why not?
3. Epicurus argues that the best and happiest way of life is one in which one seeks to satisfy on the most basic, natural and necessary desires. Do you agree that embracing such a life of simplicity (no honor, fame, luxury or wealth) is really more conducive to happiness and tranquility than trying to “keep up with the Joneses”? If you said “yes,” then are you already taking measures to live in the Epicurean manner?
Chapter 6: St. Thomas Aquinas
4. How would St. Thomas defend himself (if, indeed, such a defense is possible) against the charge of being “homophobic” (a word that did not exist in his time, but which is fairly common today)? Would you find his defense plausible? Why or why not?
5. If one is not at all religious, is it still possible to take St. Thomas’ natural law principle seriously? Could it still be relied upon as a guide to living well? Explain.
Chapter 7: Thomas Hobbes
6. Do you think that being self-interested is a bad thing? If so, why? If not, why not?
7. Compare Christ’s Golden Rule with Hobbes’ Golden Rule. Which do you think is more effective in getting people to obey the laws, and why?
8. Do you agree with Hobbes that our natural condition is one of lawlessness and violence? How do you think you would behave if you knew you could get away with whatever you wanted to? Do we only obey the laws out of fear of punishment?
Assignment on Aristotle’s ethical ideas of distributive and procedural justice: Views on justice impact many areas of criminal justice, including the concepts of fairness, equality, and impartiality, and influence the ethical standards you apply in various situations in the field. Your views on justice and how you act in situations will affect the opinions others have of you in the communities you serve. Views on justice also impact actions taken and decisions made that affect the wider population.
Assume you have been selected as one of three potential candidates for a new position in your local criminal court. The presiding judge wants to understand your views on substantive justice.
Write a 1,050- to 1,400-word brief describing the origins of the concept of justice and how you believe they are defined today. Complete the following in your brief:
-Explain Aristotle’s ethical ideas of distributive and procedural justice.
-Compare substantive justice and procedural justice, including how procedural justice impacts wrongful convictions and moral perceptions of racial discrimination, such as the Central Park Five and the story of Brian Banks, a former football star.
-Explain how you understand justice as defined by today’s modern criminal justice agencies. Include reasoning and examples in your explanation to support your opinion
Book VI discusses the importance of what Aristotle terms, ‘Virtues of Thought,’ as opposed to ‘Virtues of Action.’ Certainly there is an important relationship between thoughts and actions with regard to virtues. What is the nature of this relationship for Aristotle? Why might we think that thoughts are more important than actions? Why might we think that actions are more important than thoughts?
This discussion is, admittedly, very broad. This is because I want you to take this general question of thoughts & actions and use it to sum up your thoughts on Aristotle’s Virtue Ethics as a whole. Be sure to reflect in your initial post on other aspects of Aristotle’s philosophy, i.e., virtues as an aspect of character, the Doctrine of the Mean, public virtue, etc.
Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Aristotle terms, ‘Virtues of Thought,’ as opposed to ‘Virtues of Action
Read/review the following resources for this activity:
Textbook: Chapter 6, 10
Magstadt, T. M. (2017). Understanding politics: Ideas, institutions, and issues. Australia: Cengage Learning.
Lesson
Instructions
Aristotle defined tyranny as an illegitimate form of government by one individual that tightly controlled every part of life and government. Adolf Hitler is the most notorious tyrant. Using a totalitarian society from the past or present, discuss how the state and its leader attempt to impede citizens from exercising their rights. In your discussion, explain some components of an “ideal citizen,” consequences of voter apathy, and ways the state controls the citizen.
Writing Requirements (APA format)
Length: 1.5-2 pages (not including title page or references page)
1-inch margins
Double spaced
12-point Times New Roman font
Title page
References page (minimum of 2 scholarly sources)
Grading
This activity will be graded based on the essay rubric.
Course Outcomes (CO): 1
Due Date: By 11:59 p.m. MT on Sunday
Rubric
Week 5 Assignment: Essay – Ideal Citizen in a Totalitarian Government
Week 5 Assignment: Essay – Ideal Citizen in a Totalitarian Government
Criteria RatingsPts
This criterion is linked to a Learning Outcome Actual case study of a country.
20.0 pts
Uses a historical or contemporary example of a totalitarian country
16.0 pts
There is a totalitarian country, but it is not real.
12.0 pts
There is a country, but it is not totalitarian.
0.0 pts
There is no country mentioned.
20.0 pts
This criterion is linked to a Learning Outcome Control by a totalitarian leader
20.0 pts
Describes the three ways, violence, propaganda, and scapegoating, that leaders use to keep control in the country.
16.0 pts
Only two of the tactics of totalitarian leaders are described.
12.0 pts
Only one of the tactics of totalitarian leaders are described.
0.0 pts
How a totalitarian leaders keeps control is not addressed.
20.0 pts
This criterion is linked to a Learning Outcome Citizens in the country.
20.0 pts
States and describes two ways of stopping a totalitarian regime by using political socialization, civil disobedience, resist propaganda. Discusses voter apathy.
16.0 pts
States and describes one way of stopping a totalitarian regime by using political socialization, civil disobedience, resist propaganda. Discusses voter apathy.
12.0 pts
States and describes one way of stopping a totalitarian regime by using political socialization, civil disobedience, resist propaganda. Does not discuss voter apathy.
0.0 pts
Does not address the concepts.
20.0 pts
This criterion is linked to a Learning Outcome Scholarly resources
10.0 pts
Uses both the book and, at least, one outside scholarly source.
8.0 pts
Uses only the book or a scholarly source.
6.0 pts
Uses only a scholarly source and the source is not scholarly.
0.0 pts
Does not use the book or scholarly source.
10.0 pts
This criterion is linked to a Learning Outcome APA
5.0 pts
All sources are properly cited and referenced according to APA standards.
4.0 pts
Sources are either properly cited or referenced, missing one of those elements.
3.0 pts
The citation and/or reference are incorrect.
0.0 pts
No APA format was used.
5.0 pts
This criterion is linked to a Learning Outcome Writing
5.0 pts
Presents information using clear and concise language in an organized manner (minimal errors in English grammar, spelling, syntax, and punctuation).
4.0 pts
Presents information using understandable language but is somewhat disorganized (some errors in English grammar, spelling, syntax, and punctuation).
3.0 pts
Presents information using understandable language but is very disorganized (many errors in English grammar, spelling, syntax, and punctuation).
0.0 pts
Presents information that is not clear, logical, professional or organized to the point that the reader has difficulty understanding the message (numerous errors in English grammar, spelling, syntax, and/or punctuation).
5.0 pts
Project 4: System Development or Application Assurance
Start Here
It is critical that cybersecurity professionals be able to use all applicable systems, tools, and concepts to minimize risks to an organization’s cyberspace and prevent cybersecurity incidents. In this project, you will demonstrate your understanding of how to apply security principles, methods, and tools within the software development life cycle. You will also apply your knowledge of the cybersecurity implications related to procurement and supply chain risk management.
This is the fourth and final project for this course. There are 13 steps in this project. Begin below to review your project scenario.
Transcript
Competencies
Your work will be evaluated using the competencies listed below.
• 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
• 1.5: Use sentence structure appropriate to the task, message and audience.
• 2.4: Consider and analyze information in context to the issue or problem.
• 9.4: Software Security Assurance: Demonstrate secure principles, methods, and tools used in the software development life cycle.
• 9.5: Software Security Assurance: Describe the cybersecurity implications related to procurement and supply chain risk management.
Step 1: Assess Software Vulnerabilities
Project 2 outlined the steps involved to produce a final vulnerability and threat assessment, and Project 3 covered risk analysis and mitigation. Those assessments were across the entire enterprise and included numerous elements outside the realm of systems and technology. However, they did uncover opportunities for improvement in the application software processes.
For this step, return to the vulnerability and threat assessment from Project 2 and focus on all areas of application software that were itemized. Give additional thought to uncover software that perhaps did not make the list or were assumed to be secure and simply overlooked.
The assignment is to create a more comprehensive list of application software that could place the enterprise at risk of a breach, loss of data, loss of production, and/or loss of brand confidence.
The assessment should include the application of secure principles, development models such as the maturity model or integrated product and process development (IPPD), software development methods, libraries and toolsets used in the software development life cycle or systems development life cycle.
Use the Software Vulnerability Assessment Template to submit your results for feedback.
Submission for Project 4: Software Vulnerability Assessment
Previous submissions
0
Drop files here, or click below.
Add Files
In the next step, you will review your organization’s software procurement policy.
Step 2: Review Software Procurement Policy
Upon completion of the software specific vulnerability assessment, conduct a review of the organization’s software procurement policies for software development methods.
Note that there is no submitted assignment for this step. Your review will be used in the submission for the following steps.
When the review is complete, move to the next step, where you will create a table or spreadsheet that lists recommended policies for software procurement that address certain questions or concerns.
Step 3: Create a Software Procurement Policy List
You’ve reviewed the organization’s policies for software development methods. Now it’s time to create a policy list for software procurement. The following are some sample questions to be included in a software procurement policy:
• Does the vendor provide any cybersecurity certifications with the product?
• Does the vendor provide access to the source code for the product? Are there other security issues in source code to be addressed?
• What is the guaranteed frequency of security updates to be provided for the product?
• What is the implementation process for software updates/upgrades?
What are additional questions or concerns that should be included in the procurement process? Create a table or spreadsheet that lists recommended policies to properly address these questions or concerns.
Use the Procurement Policy Template to list the cybersecurity implications related to procurement and supply chain risk management and submit your results for feedback.
Submission for Project 4: Procurement Policy List
Previous submissions
0
Drop files here, or click below.
Add Files
In the next step, you will generate assurances or controls to address each of the policy issues identified here.
Now that the procurement policies have been identified in the previous step, what assurances or controls should be established as policy that would evaluate the security implications during the software acceptance process? The objective is to provide a one-page overview of security testing that would be included in the acceptance of a vendor’s application.
The next step in this project will document the actual testing and validation. This step is simply to verify the congruence between the procurement process and acceptance process. In other words, do the procurement policies establish the correct cyber security framework for software purchase and do the acceptance policies match?
In considering the security implications of the in the software acceptance phase of the development cycle, use the Software Acceptance Policy Template to document recommended tests and assurances for the procurement policies identified in the previous steps.
Submit your results below for feedback.
Submission for Project 4: Software Acceptance Policy
Previous submissions
0
Drop files here, or click below.
Add Files
In the next step, you will research software testing and validation.
Step 5: Research Software Testing and Validation Procedures
Based on the software acceptance policies created in the previous step, consider what testing and validation procedures could be used to assure compliance.
Note that there is no submitted assignment for this step. You will submit the final list of recommended testing and validation procedures in the next step.
Step 6: Document Software Testing and Validation Procedures
You’ve completed the research, and it is now time to create testing and validation procedures that follow a specific process to assure compliance. The key to the success of this step is to document exact procedures to be followed by a testing team prior to installation.
At a minimum, the procedures should address the following questions:
• What are potential vulnerabilities inherent in the application platform?
• How well does the vendor document preventive measures built into the application?
• Are there alternative solutions provided by the vendor or in the application in case of a breach?
• What additional safeguards can be added to ensure the security of the software environment?
The testing and validation procedures should address each of these concerns.
The executive team will want to see specific steps for the testing team to follow as the team members complete the tests and assurances you recommended in the previous step.
Document your specific testing and validation recommendations from a cybersecurity policy standpoint in the Test Script Procedures Template and submit for feedback.
Submission for Project 4: Test Script Procedures
Previous submissions
0
Drop files here, or click below.
Add Files
In the next step, you will consider procedures for upgrading software.
Step 7: Review Software Upgrade Procedures
In the last step, you documented testing and validation requirements. In this step, it’s important to review software upgrades. Installation of a software upgrade has similar, yet unique requirements from the previous steps. In most enterprise environments, software updates and upgrades follow a specific change management routine. However, complete reliance on this procedure can lead to unintended oversight of cybersecurity issues. The change management process is generally focused on detecting errors and the auditing and logging of changes in the operational environment after the upgrade has been performed.
From the cyber perspective, this is not enough. As demonstrated in previous steps, significant effort is required to ensure a secure environment, not just an operational one. The question to be answered is “when” should the upgrade be performed during an application or system change. Should it be performed multiple times during the update?
Think through this issue thoroughly and make notes on your thought process. It is important that the risk analysis associated with an application or system change is conducted at the optimal time.
Note that there is no submitted assignment for this step. However, the research and corresponding notes related to this step will be applicable to the final report for Maria and the other executives. When this is complete, move to the next step, where supply chain risks will be considered.
Step 8: Review Supply Chain Risks
Following the previous steps relative to the supply chain and previous projects, it is time to thoroughly review risk within the supply chain.
Like many companies, your organization is dependent on a supply chain, so the software development process must include a supply chain risk management (SCRM) plan to minimize the impact of supply chain-related risks on business operations and the security of the infrastructures and data.
Note that there is no submitted assignment for this step. The identified supply chain risks will be reported in the next step.
Step 9: Document Supply Chain Risks
After review, it’s time to document supply chain risks. This portion of the overall report requires a two- to three-page narrative that addresses the following supply chain concerns:
1. Describe cybersecurity implications related to the procurement process.
2. Provide recommendations that would address these concerns.
3. Include appropriate supply chain risk management practices.
Where appropriate, cite references to support the assertions in the recommendations and conclusion.
Submit your report on supply chain concerns here for feedback.
Submission for Project 4: Supply Chain Cyber Security Risk Report
Previous submissions
0
Drop files here, or click below.
Add Files
Then, move to the next step, in which you will consider how the procedures of acquisition, procurement, and outsourcing line up in the organization.
Step 10: Consider Alignment Issues
Based on the review and recommendations on the supply chain described in the previous step, consider how well the policies and procedures regarding the acquisition, procurement, and outsourcing of software in your organization are aligned.
Outline a strategic approach to getting all the functions in alignment. There is no submission for this step. The alignment recommendations will be submitted in the next step.
Step 11: Develop an Acquisition Alignment Report
Keeping the alignment issues in mind from the previous step, prepare a one-page plan to align acquisition, procurement, and outsourcing of software applications for the enterprise. This should be a strategic approach to getting all the functions in alignment. Start with a request for information, proceed through acquisition, testing, and implementation, and finish with ongoing maintenance of the application.
All the work has been done in the previous steps. This step is designed to “bring it all together” in one easy-to-understand approach. The approach will be used in the final step to complete the supply chain analysis with a mitigation plan as it applies to software acquisition and maintenance.
Submit your one-page plan to align acquisition, procurement, and outsourcing efforts with your organization’s information security goals here for feedback.
Submission for Project 4: Acquisition Alignment Report
Previous submissions
0
Drop files here, or click below.
Add Files
In the next step, you will consolidate all your work thus far.
Step 12: Consolidate Your Work
The acquisition plan alignment is complete. For this exercise, collate all the material presented in the previous steps into a cohesive presentation that describes the entire software risk analysis processes and articulates specific supply chain cybersecurity threats and the technologies and policies that can be used to mitigate them.
You will use your consolidated results in your final project submission in the next step.
Project 4: System Development or Application Assurance
Step 13: Write the Risk Analysis/Supply Chain Threats/Mitigation Report
Management is always interested in solutions, and Maria Sosa and the other executives at your company are no exception. In the case of cybersecurity, there are no absolute solutions to an ever-changing environment. However, there are steps to mitigation that might eliminate or minimize the results of certain vulnerabilities. This final step is to describe the mitigation strategies recommended as a result of all previous steps in the project.
The final report for the executive meeting should be five to seven pages, only one to two of which will have to be written in this step. The remainder is from all the previous steps in the project.
Use the Supply Chain Risk Mitigation Final Report Template to submit your specific testing and validation procedures.
Check Your Evaluation Criteria
Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.
• 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
• 1.5: Use sentence structure appropriate to the task, message and audience.
• 2.4: Consider and analyze information in context to the issue or problem.
• 9.4: Software Security Assurance: Demonstrate secure principles, methods, and tools used in the software development life cycle.
• 9.5: Software Security Assurance: Describe the cybersecurity implications related to procurement and supply chain risk management.
Submission for Project 4: Supply Chain Risk Mitigation Final Report
Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals Aristotle defined tyranny as an illegitimate form of government by one individual that tightly controlled every part of life and government.
Return to the topic you chose in the week three. Articulate a specific dilemma in a situation faced by a particular person based on that topic. The situation can be real or fictional.
write a summary of the dilemma.
Define any needed key terms associated with the dilemma.
Analyze the conflicts or controversies involved in the dilemma.
Revise and write based on any feedback you received in your previous draft (week three).
Reference and discuss any professional code of ethics relevant to your topic such as the AMA code for doctors, the ANA code for nurses, etc. State whether and how your chosen topic involves any conflicts between professional and familial duties or conflicts between loyalty to self and loyalty to a community or nation.
What in your view is the most moral thing for that person to do in that dilemma? Why is that the most moral thing? Use moral values and logical reasoning to justify your answer
Next, apply the following:
Aristotle’s Golden Mean to the dilemma
Utilitarianism to the dilemma
Natural Law ethics to the dilemma
Which of those three theories works best ethically speaking? Why that one?
Why do the other two not work or not work as well?
Is it the same as what you said is the most moral thing earlier? Why or why not?
Use the 5 articles from your annotated bibliography to support your answers. Requirements
Length: 4-5 pgs not including title page or references page)
Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals.
Compare and contrast Plato’s ideal republic to Aristotle’s description of the “best” constitution. What are the primary characteristics of each political system, and how does each relate to Plato’s (transcendent) and Aristotle’s (immanent) differing theories of form? And, lastly, choose one thinker in the Christian era (either St. Augustine or St. Thomas Aquinas) to highlight in connection to Plato and Aristotle. That is, how does St. Augustine’s or Thomas Aquinas’s theorization of human nature and politics compare to, or differ from, Plato’s and Aristotle’s respective theorizations? Be sure to cite specific passages from the assigned readings to substantiate your argument, and answer each part of the question.
How does St. Aquinas’s view of human nature and reason (which can be discerned from his discussion of the different kinds of law) compare to, or differ from Aristotle’s? And, why does St. Aquinas say that law is distinct from reason?
Timely Delivery– primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Plato’s ideal republic to Aristotle’s description of the “best” constitution
1. How would Thucydides and Aristotle argue for or against the Iraq Invasion in 2003? Use the views of both thinkers to support your position.
2. There is a tendency for IR structural realism theorists (especially Mearsheimer) to argue that confrontation between U.S. and China is inevitable. What might the contributors to Universal Moral Order (such as Grotius, Aquinas, the Stoics, etc.) suggest to prevent this confrontation?
BOOKS: Political Theories of International Relations: From Thucydides to the Present by David Boucher and International Relations in Political Thought: Texts from the Ancient Greeks to the First World War by Chris Brown
Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. How would Thucydides and Aristotle argue for or against the Iraq Invasion in 2003?