Individual: Conflict

User Generated

WnivWvzrarm91

Computer Science

CYB100

Description

Reference: Pluralsight video "Conflict Resolution in the Workplace" by Stephen Haunts Research a current domestic or international conflict in the cyber domain. As a way of checking for your understanding of the nature of conflict as described in the video, write a 1/2-page to 1-page methodology for resolving the conflict using Microsoft® Word that addresses the following: •Identify the reason for the conflict and the opposing forces •Accurately identify the key political figures that impact the outcome or resolution of the conflict •If you were involved with the resolution of the conflict, what style of conflict resolution would you use--the competing shark, the collaborating owl, the avoiding turtle, the accommodating teddy bear, or the compromising fox--and why? •Do you think in our current political environment we may take the easy way out and try to sweep the conflict under the rug? •There is one simple widely used method to resolve common conflict that goes by the acronym DESC that stands for Describe, Express, Specify, Consequences. Do you think this method could be used to resolve the conflict you identified? Do you think methods for conflict resolution in the workplace are the same as geological conflicts? Why or why not? Submit your assignment using the Assignment Files tab.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Attached.

Running head: CYBERCONFLICT

1

Cyber Conflict
Institutional Affiliated
Date

CYBERCONFLICT

2

As the world continues to adopt and attach the internet in all spheres of life, stakes are
becoming high in terms of ensuring that the internet is a safe spot for connecting people in the
social context. Cyber has evolved as a domain in itself with conflicts and high stakes in the
modern living. One of the most common conflicts in the cyber domain is cyber warfare. It refers
to using and targeting computers, computer resources and networks in a warfare. Generally, it
encompasses espionage, cyber-attacks, and sabotage. The threat is real and cuts across national
borders to become a global security threat (Kosenkov...


Anonymous
Just what I needed. Studypool is a lifesaver!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags