Description
Given the current state of the law and the variances across the country, where do you see same-sex marriage standing as a legally-recognized type of marriage?
Is it recognized in your state? If so, what are the chances that the laws in your state will potentially change? Has a law already been passed?
Do you think it should be a state or federal issue? Why? Support your position with legal examples.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Great! Studypool always delivers quality work.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Rasmussen College Corporate Ancient Art Collection Proposal Discussion Paper
CompetencyApply strategies for evaluating different art forms in various contexts.ScenarioYour workplace has built a parki ...
Rasmussen College Corporate Ancient Art Collection Proposal Discussion Paper
CompetencyApply strategies for evaluating different art forms in various contexts.ScenarioYour workplace has built a parking deck. The ground level is unusable for cars due to clearance issues. The company you work for recently heard that it can receive tax breaks if it invests in an art collection, so they have decided to turn the unusable first level of the parking deck into an art museum. You have been asked to spearhead this initiative.InstructionsCreate a proposal for a corporate art collection. Be sure your proposal answers the following questions:What type of work will you select? Include a description.Why is this type of art a good investment for your particular company? Include a rationale.What is the budget? Include the total cost with details.What other expenses will be associated with the management of this art collection? List the details with costs.What other external resources will you use to offset this budget? List the details of the resources.
Harvard University Emergency Management Vulnerability Discussion
What is the most significant vulnerability facing the emergency management discipline and why?Required Readings:NIPP 2013 ...
Harvard University Emergency Management Vulnerability Discussion
What is the most significant vulnerability facing the emergency management discipline and why?Required Readings:NIPP 2013 Partnering for Critical Infrastructure Security and Resilience: https://www.cisa.gov/publication/nipp-2013-partner...Instructions: Fully utilize the materials that have been provided to you in order to support your response. Please respond to at least two other students and provide substantive comments that contribute something new and important to the discussion. You may challenge, support or supplement another student’s answer using the terms, concepts and theories from the required readings. Also, do not be afraid to respectfully disagree where you feel appropriate; as this should be part of your analysis process at this academic level.200-250 words for discussion 100-150 words for student responsesStudent #1 ThomasGood Afternoon all,I love this week's forum discussion because it is a broad question, and I get to read what everyone thinks is the most critical vulnerability in our nation. When I think about Critical Infrastructure Protection, the first vulnerability that comes to mind is a biological attack on our food and Water supply, also known as Agro-terrorism.The effects of this kind of attack can be characterized as very disruptive because its a threat to the U.S food chain and also to our economy.Agro-terrorism can be defined as the deliberate introduction of a disease agent against livestock or into the global food chain, to undermine national stability and produce public fear. Depending on the disease agent, it is a tactic that can be used to generate economic, social, and political disruption or as a form of direct aggression against the human population.Agro-terrorism is divided into three areas. The first is an intentional attack against the U.S. food supply by contaminants that render food poisonous or, in some way, inedible. The second is a pathogenic agent transmitted by one infected host to another, directly or indirectly, between animals and the third is the deliberate introduction of a foreign animal disease (FAD), designed to attack the nation's livestock population or an infectious disease introduced into the commercial poultry population. (Staff Editor TPS, 2019)Agriculture terrorism has several characteristics that pose unique problems for emergency management personnel and how they must manage the risk of such an attack on the food chain. If an attack were to occur, it would be hard to detect or stop initially. By its nature, agricultural production is geographically disbursed, generally in open fields, and is located in unsecure pastures throughout the rural countryside. While some livestock are housed in somewhat secure facilities, agriculture requires vast land that is difficult to secure from intruders.Live animals, grains, and other processed food products, are routinely transported and commingled in the processing and production pipeline. These factors reduce the barriers that would typically slow pathogenic dissemination and increase the food supply risk.I believe that just the rumor of a disease in a country's agricultural products could stop all exports and imports of that commodity, restricting its availability for months or years. (Chalk P., 2003) This could cause severe economic and social problems. These are just a few reasons why I think this is largest vulnerability in the CIP realm.R. Tom M.ReferencesStaff Editor, "Is your farm ready for a foreign animal disease?" The Pig Site, Biosecurity and Hygiene, 22 July 2019, Retrieved from: https://thepigsite.com/news/2019/07/is-your-farm-ready-for-a-foreign-animal-diseaseChalk Peter, "THE BIO-TERRORIST THREAT TO AGRICULTURAL LIVESTOCK AND PRODUCE", Testimony presented before the Government Affairs Committee, United States Senate, 19 November 2003, Retrieved from: CT213.pdf, Pg. 1Monke Jim, "Agro-terrorism: Threats and Preparedness", CRS Report for Congress, 12 March 2007, Retrieved from: https://fas.org/sgp/crs/terror/RL32521.pdfDHS. (2014). Executive Order 13636 Privacy and Civil Liberties Assessment Report. Washington, DC: The Privacy Office and the Office for Civil Rights and Civil Liberties. Retrieved from https://www.dhs.gov/sites/default/files/publications/2014-privacy-and-civil-liberties-assessment-report.pdfMack, M. H. (2014). Privacy and Civil Liberties Assessment Report. Washington, D.C.: Department of Homeland Security. Retrieved from https://www.dhs.gov/sites/default/files/publications/2014-privacy-and-civil-liberties-assessment-report.pdfWortzel, L. (2003). Securing America's Critical Infrastructures: A Top Priority for the Department of Homeland Security. Washington, D.C.: The Heritage Foundation. Retrieved from http://www.heritage.org/homeland-security/report/securing-americas-critical-infrastructures-top-priority-the-departmentStudent #2 JoshuaGood Afternoon Class & Prof.For this weeks discussion we will be focusing on the most significant vulnerability facing the emergency management discipline. Emergency Management and Disaster Risk Management (EM/DRM) is founded in the value of protecting those must vulnerable to a hazard event. This value is exercised through government involvement in combination with Non-Governmental Organizations (NGOs), community groups and individuals (Etkins, et al. 2016). EM/DRM is also cemented ethical principles to aid in the establishment of a moral basis for their actions. Multiple theories have been engaged to gain a broader range of perspectives on the ethical dialogue such as Utilitarianism and Deontology (Etkins, et al. 2016).As far as the most significant threat to the EM/DRM discipline, I would have to say it is our nations critical infrastructures. Critical Infrastructure is defined as “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters" (DHS, 2013). The environment of this field has been constantly evolving alongside technology, bringing with it a sharp increase in cyber risk exposure levels. The vast and ever growing amount of reliabilities and interconnectedness of Americas critical infrastructure sectors allows for growth of vulnerabilities and exploitation events. The National Infrastructure Coordinating Center is the primary information sharing operations center which maintains situational awareness of the nation's critical infrastructure for the federal government. With sixteen separate CI sectors reporting to various agencies, Sector Coordinating Councils (SCCs) and Government Coordinating Councils (GCCs) it becomes easier to understand the complexities that can lead to significant vulnerabilities. It is essential that we be able to mitigate these exposure events and prevent them from occurring in the future.V/R,JMDHS. (2013). National Infrastructure Protection Plan (NIPP) 2013. Retrieved from https://www.cisa.gov/sites/default/files/publications/national-infrastructure-protection-plan-2013-508.pdfEtkin, D., Feldmann-Jensen, S., Smith, S., & Jensen, S. (2016). Toward a substantive dialogue: The case for an ethical framework in emergency management, part 2. Australasian Journal of Disaster and Trauma Studies, 20(1), 49-53. Retrieved from https://search-proquest-com.ezproxy1.apus.edu/docview/1833936104?accountid=8289
4 pages
Exercise 3.2
Identify the fallacies of relevance committed by the following arguments 1. The position open in the accounting department ...
Exercise 3.2
Identify the fallacies of relevance committed by the following arguments 1. The position open in the accounting department should be given to Frank ...
4 pages
P587 Qualitative Research
Qualitative research is empirical study where surveys are conducted using non-numerical data. The collection of data in th ...
P587 Qualitative Research
Qualitative research is empirical study where surveys are conducted using non-numerical data. The collection of data in the qualitative research uses ...
Motivation to pursue a degree in college
1.What is your primary motivation for going to college and pursuing a degree? Would your motivation be considered external ...
Motivation to pursue a degree in college
1.What is your primary motivation for going to college and pursuing a degree? Would your motivation be considered external or internal? Why?2.What is the process of replacing bad habits with good ones? How can doing this affect your life?3.Discuss one tool to maintain your motivation and another to recharge your motivation. How can you use these tools and strategies to improve your performance?4.Here is the link to a great article on self motivation. I especially like number 4 which is find the good in the bad. Often we let problems and challenges discourage us but one way to turn challenges into something positive is to ask yourself, what is the lesson in this? If nothing else challenges can teach you valuable lessons for your future. https://www.lifehack.org/articles/featured/8-steps-to-continuous-self-motivation.html
Similar Content
Civil Rights Movement,
How did the Civil Rights Movement, the Vietnam War, and the women’s
movement contribute to an increased awareness on t...
US International University Africa Simple Recipe for Preparing Cookies Essay
please assist me with a recipe for baking cookies...
A Buddhist Perspective of the World, philosophy homework help
https://docs.google.com/document/d/1nxKjm3gMTsj_2X...Hi, can you revise my English paper in better wordings and grammar, p...
Grossmont College ?Defining Happiness Essay
Defining Happiness
. The purpose of this essay is to -investigate and propose a definition of happiness, as explained by ...
California State University Northridge Movements of the 1960s Discussion
How have the protest cycles of the 1960s influenced the social movements of today? Why did the protest cycle decline? What...
EAPS 120 Purdue University Wk 4 Volcanic Eruption and Evacuation Plan Discussion
It should be 1-2 paragraphs in length (300-500 words).Discussion DetailsPlease read the news releases listed below about p...
Jesus Christ
Jesus Christ was born to the virgin Mary and Joseph through immaculate conception. While much is not known about Jesus Chr...
History of Computers
12/26/1791 |Charles Babbage |Charles Babbage, was an English mathematician, philosopher, inventor and mechanical engineer ...
Aristotle's Natural Philosophy
Emphasis on form as the key to knowledge.
Emphasis on knowledge (episteme) as the human purpose ( telos)
Belief that nat...
Related Tags
Book Guides
The Woman in the Window
by A. J. Finn
Uncle Tom's Cabin
by Harriet Beecher Stowe
Beowulf
by Anonymous Anglo-Saxon poet
Blink
by Malcolm Gladwell
No Exit
by Taylor Adams
The Tipping Point
by Malcolm Gladwell
One Flew Over the Cuckoos Nest
by Ken Kesey
The Da Vinci Code
by Dan Brown
Shattered - Inside Hillary Clintons Doomed Campaign
by Amie Parnes and Jonathan Allen
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Rasmussen College Corporate Ancient Art Collection Proposal Discussion Paper
CompetencyApply strategies for evaluating different art forms in various contexts.ScenarioYour workplace has built a parki ...
Rasmussen College Corporate Ancient Art Collection Proposal Discussion Paper
CompetencyApply strategies for evaluating different art forms in various contexts.ScenarioYour workplace has built a parking deck. The ground level is unusable for cars due to clearance issues. The company you work for recently heard that it can receive tax breaks if it invests in an art collection, so they have decided to turn the unusable first level of the parking deck into an art museum. You have been asked to spearhead this initiative.InstructionsCreate a proposal for a corporate art collection. Be sure your proposal answers the following questions:What type of work will you select? Include a description.Why is this type of art a good investment for your particular company? Include a rationale.What is the budget? Include the total cost with details.What other expenses will be associated with the management of this art collection? List the details with costs.What other external resources will you use to offset this budget? List the details of the resources.
Harvard University Emergency Management Vulnerability Discussion
What is the most significant vulnerability facing the emergency management discipline and why?Required Readings:NIPP 2013 ...
Harvard University Emergency Management Vulnerability Discussion
What is the most significant vulnerability facing the emergency management discipline and why?Required Readings:NIPP 2013 Partnering for Critical Infrastructure Security and Resilience: https://www.cisa.gov/publication/nipp-2013-partner...Instructions: Fully utilize the materials that have been provided to you in order to support your response. Please respond to at least two other students and provide substantive comments that contribute something new and important to the discussion. You may challenge, support or supplement another student’s answer using the terms, concepts and theories from the required readings. Also, do not be afraid to respectfully disagree where you feel appropriate; as this should be part of your analysis process at this academic level.200-250 words for discussion 100-150 words for student responsesStudent #1 ThomasGood Afternoon all,I love this week's forum discussion because it is a broad question, and I get to read what everyone thinks is the most critical vulnerability in our nation. When I think about Critical Infrastructure Protection, the first vulnerability that comes to mind is a biological attack on our food and Water supply, also known as Agro-terrorism.The effects of this kind of attack can be characterized as very disruptive because its a threat to the U.S food chain and also to our economy.Agro-terrorism can be defined as the deliberate introduction of a disease agent against livestock or into the global food chain, to undermine national stability and produce public fear. Depending on the disease agent, it is a tactic that can be used to generate economic, social, and political disruption or as a form of direct aggression against the human population.Agro-terrorism is divided into three areas. The first is an intentional attack against the U.S. food supply by contaminants that render food poisonous or, in some way, inedible. The second is a pathogenic agent transmitted by one infected host to another, directly or indirectly, between animals and the third is the deliberate introduction of a foreign animal disease (FAD), designed to attack the nation's livestock population or an infectious disease introduced into the commercial poultry population. (Staff Editor TPS, 2019)Agriculture terrorism has several characteristics that pose unique problems for emergency management personnel and how they must manage the risk of such an attack on the food chain. If an attack were to occur, it would be hard to detect or stop initially. By its nature, agricultural production is geographically disbursed, generally in open fields, and is located in unsecure pastures throughout the rural countryside. While some livestock are housed in somewhat secure facilities, agriculture requires vast land that is difficult to secure from intruders.Live animals, grains, and other processed food products, are routinely transported and commingled in the processing and production pipeline. These factors reduce the barriers that would typically slow pathogenic dissemination and increase the food supply risk.I believe that just the rumor of a disease in a country's agricultural products could stop all exports and imports of that commodity, restricting its availability for months or years. (Chalk P., 2003) This could cause severe economic and social problems. These are just a few reasons why I think this is largest vulnerability in the CIP realm.R. Tom M.ReferencesStaff Editor, "Is your farm ready for a foreign animal disease?" The Pig Site, Biosecurity and Hygiene, 22 July 2019, Retrieved from: https://thepigsite.com/news/2019/07/is-your-farm-ready-for-a-foreign-animal-diseaseChalk Peter, "THE BIO-TERRORIST THREAT TO AGRICULTURAL LIVESTOCK AND PRODUCE", Testimony presented before the Government Affairs Committee, United States Senate, 19 November 2003, Retrieved from: CT213.pdf, Pg. 1Monke Jim, "Agro-terrorism: Threats and Preparedness", CRS Report for Congress, 12 March 2007, Retrieved from: https://fas.org/sgp/crs/terror/RL32521.pdfDHS. (2014). Executive Order 13636 Privacy and Civil Liberties Assessment Report. Washington, DC: The Privacy Office and the Office for Civil Rights and Civil Liberties. Retrieved from https://www.dhs.gov/sites/default/files/publications/2014-privacy-and-civil-liberties-assessment-report.pdfMack, M. H. (2014). Privacy and Civil Liberties Assessment Report. Washington, D.C.: Department of Homeland Security. Retrieved from https://www.dhs.gov/sites/default/files/publications/2014-privacy-and-civil-liberties-assessment-report.pdfWortzel, L. (2003). Securing America's Critical Infrastructures: A Top Priority for the Department of Homeland Security. Washington, D.C.: The Heritage Foundation. Retrieved from http://www.heritage.org/homeland-security/report/securing-americas-critical-infrastructures-top-priority-the-departmentStudent #2 JoshuaGood Afternoon Class & Prof.For this weeks discussion we will be focusing on the most significant vulnerability facing the emergency management discipline. Emergency Management and Disaster Risk Management (EM/DRM) is founded in the value of protecting those must vulnerable to a hazard event. This value is exercised through government involvement in combination with Non-Governmental Organizations (NGOs), community groups and individuals (Etkins, et al. 2016). EM/DRM is also cemented ethical principles to aid in the establishment of a moral basis for their actions. Multiple theories have been engaged to gain a broader range of perspectives on the ethical dialogue such as Utilitarianism and Deontology (Etkins, et al. 2016).As far as the most significant threat to the EM/DRM discipline, I would have to say it is our nations critical infrastructures. Critical Infrastructure is defined as “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters" (DHS, 2013). The environment of this field has been constantly evolving alongside technology, bringing with it a sharp increase in cyber risk exposure levels. The vast and ever growing amount of reliabilities and interconnectedness of Americas critical infrastructure sectors allows for growth of vulnerabilities and exploitation events. The National Infrastructure Coordinating Center is the primary information sharing operations center which maintains situational awareness of the nation's critical infrastructure for the federal government. With sixteen separate CI sectors reporting to various agencies, Sector Coordinating Councils (SCCs) and Government Coordinating Councils (GCCs) it becomes easier to understand the complexities that can lead to significant vulnerabilities. It is essential that we be able to mitigate these exposure events and prevent them from occurring in the future.V/R,JMDHS. (2013). National Infrastructure Protection Plan (NIPP) 2013. Retrieved from https://www.cisa.gov/sites/default/files/publications/national-infrastructure-protection-plan-2013-508.pdfEtkin, D., Feldmann-Jensen, S., Smith, S., & Jensen, S. (2016). Toward a substantive dialogue: The case for an ethical framework in emergency management, part 2. Australasian Journal of Disaster and Trauma Studies, 20(1), 49-53. Retrieved from https://search-proquest-com.ezproxy1.apus.edu/docview/1833936104?accountid=8289
4 pages
Exercise 3.2
Identify the fallacies of relevance committed by the following arguments 1. The position open in the accounting department ...
Exercise 3.2
Identify the fallacies of relevance committed by the following arguments 1. The position open in the accounting department should be given to Frank ...
4 pages
P587 Qualitative Research
Qualitative research is empirical study where surveys are conducted using non-numerical data. The collection of data in th ...
P587 Qualitative Research
Qualitative research is empirical study where surveys are conducted using non-numerical data. The collection of data in the qualitative research uses ...
Motivation to pursue a degree in college
1.What is your primary motivation for going to college and pursuing a degree? Would your motivation be considered external ...
Motivation to pursue a degree in college
1.What is your primary motivation for going to college and pursuing a degree? Would your motivation be considered external or internal? Why?2.What is the process of replacing bad habits with good ones? How can doing this affect your life?3.Discuss one tool to maintain your motivation and another to recharge your motivation. How can you use these tools and strategies to improve your performance?4.Here is the link to a great article on self motivation. I especially like number 4 which is find the good in the bad. Often we let problems and challenges discourage us but one way to turn challenges into something positive is to ask yourself, what is the lesson in this? If nothing else challenges can teach you valuable lessons for your future. https://www.lifehack.org/articles/featured/8-steps-to-continuous-self-motivation.html
Earn money selling
your Study Documents