It is a writing-intensive project designed to give students who are interested in public relations

Click here to order this assignment Plagiarism.Written from scratch by professional writers.

It is a writing-intensive project designed to give students who are interested in public relations the opportunity to polish their skills as a PR officer for an organization facing a public relations challenge. The first third of the project will be a statement of the problem(s) facing the organization and why it merits further analysis. The second phase of the project will include a revision of the first section, plus the addition of a larger section describing the courses of action recommended by the student. The final third of the project will incorporate any revisions to the second part of the project, plus a Power Point presentation detailing the nature and scope of the problem, as well as the student’s recommended solutions and their expectations of the results. Specific dates and point values for each section of the QEP Signature Assignment are located in the Course Requirements and Assignments section of the syllabus. All parts of this project must be produced in Microsoft Word. The text must be double-spaced, have one-inch margins, and be in either 12-point Times New Roman, Calibri, or Arial font.

This challenge must be real and not yet solved: it cannot be hypothetical.  Consequently, you will need to scan news sites for a company, organization, or group that is undergoing one or more struggles that could be helped with the assistance of a qualified PR firm (like the kind you own).

To adequately complete Part 1 of the Signature Project , I need you to provide me with (1) relevant information about the organization/business/group you are interested in aiding with your PR skills; (2) a brief history of the organization/business/group; and (3) the nature of the problem/challenge facing them; and (4) why the challenge merits the use of a PR firm to assist it.  All this should be done in 3-4 paragraphs spanning a total of 2-3 pages, and using the text and font guidelines already mentioned.

For Kant, how are moral principles developed?

Click here to order this assignment Plagiarism.Written from scratch by professional writers.

Make sure to answer the following questions and no less than 400 words.

  1. For Kant, how are moral principles developed?
  2. Do you think that human reason is better than human emotion, when deciding moral issues?
  3. What are the possible negative effects with a rule that eliminates any possibility of lying?
  4. Based on human reason, what do you think you owe other human beings?
  5. What are the possible moral implications of any moral theory that argues that the means justify the ends?

Data Classification and Visualization Assessment Assignment Help

Click here to order this assignment Plagiarism.Written from scratch by professional writers.

Part 4

In addition to the Business Intelligence Development Plan template including section headings (project outline), you should submit a Data Classification and Visualization Assessment section of 4–5 pages that includes the following for the case study organization:

  • Describe the specific types of structured and unstructured data that are essential to the case study organization.
  • Describe the specific structured and unstructured data that will be needed to support the KPIs that were identified in Week 3’s IP.
  • Describe the specific methods and tools that will be used to provide visualization of the structured and unstructured data for the organization.
  • Explain what type of PROBLEM-SOLVING SEARCH METHODS is been using in the organization and why?
  • What kind of simulation software you will use in your organization
  • Explain the selected techniques employed in prescriptive analysis for your organization
  • Demonstrate the DECISION SUPPORT SYSTEMS MODELING in your organization
  • What kind of the STRUCTURE OF MATHEMATICAL MODELS FOR DECISION SUPPORT will be in your organization?
  • All sources should be cited both in-text and in the References section using APA format.

Aging Population and Global Water shortage assignment Help

Click here to order this assignment Plagiarism.Written from scratch by professional writers.

My first effective method for identifying and narrowing down to just one topic is to look at all of the listed topics and pick out two or three that might interest me.  I picked Aging Population and Global Water shortage.  In looking at research on both topics, I ultimately narrowed it down to Global Water Shortage.

Since I am already a part of the Aging Population, I decided that with me being somewhat of an authority on that, it would be a waste of my time to talk about me.  I already feel beyond old, so no point in making it worse.

My next and probably last effective method of choosing a topic for research is to start with a short outline.  If I am still into the subject, then I began to get into writing some a paper on the topic.  If I lose all interest after the first paper or assignment, I look for something else.

Three ways I critically analyze sources to determine if they are scholarly is to look at the author and see if the author is an authority on the subject matter.  The next way is to look at the source, such as if it is from a journal, scientific publisher, or a professional society.  Finally, I use reference material from the library as a credible source for information.

Fast facts: Global water crisis. 844 million people lack basic drinking water access, more than 1 of every ten people on the planet. Women and girls spend an estimated 200 million hours hauling water every day. … 90 percent of all natural disasters are water-related.

(, 5/17/18).

Support of my claims that we are in a bad situation with the Global Water Shortage.  The following two quotes are from Ashford University Library

“Water scarcity is a great public health concern, affecting sanitation, hygiene, and disease prevention. It is predicted to increase substantially because of global climate change.  Although the earth is made up of 70 percent water, only 2.5 percent of that is freshwater, and only 1 percent is easily retrievable for human use.”  (Codington-Lacerte, C., 2013).

“The eastern basin of the Aral Sea dried up completely in August, (2015) for the first time in 600 years. California has experienced an unprecedented three-year drought.  In today’s world, we see how the lack of access to water can fuel conflict and even threaten peace and stability.” (Eliasson, Jan 2015).

The reason for using scholarly sources when writing on a selected is that it is really bad to quote an article or to post and then find out that your written view on the subject is in error.


Codington-Lacerte, C. (2013). Water scarcity. Salem Press Encyclopedia,

Eliasson, Jan. In: Nature. Jan 1, 2015, Vol. 517 Issue 7532, p. 6, 1 p.; Nature    Publishing Group Language: English, Database: CPI.Q (Canadian Periodicals)

Read and review the Eliza intake document.

Click here to order this assignment Plagiarism.Written from scratch by professional writers.

Part 1: Intake

  1. Read and review the Eliza intake document.
  2. Assess how     you would use the Level 01 Cross-Cutting Measure (CCM-1), in     addition to what specific questions would need to be answered by the     end of the biopsychosocial assessment.

Part 2: Biopsychosocial Assessment

  1. Review the completed biopsychosocial assessment for   Eliza.
  2. Provide an assessment related to client symptomology     along with a DSM and ICD diagnosis based on client   assessment.
  3. Provide the initial treatment goals and   plan.

Part 3: Treatment Planning

  1. Determine what Level 02 Cross-Cutting Measure (CCM-2) you     would utilize in future sessions based on the information   provided.
  2. Identify one additional assessment outside of those     provided by the APA that would measure what the future counselor is     attempting to assess based on treatment goals/plan.
  3. Describe how you would convey the assessment findings to the     client and family.
  4. Include how you would prioritize the     needs and formulate agreed upon outcomes, measures, and   strategies.

Part 4: Referral

  1. Identify any possible referrals you might make and how you     might address them with your client.
  2. How would you     know who to make referrals to and how would you follow up with the     referral after you make it?

Be sure to include three to five scholarly resources in your paper.

Prepare this assignment according to the guidelines found in the APA   Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to   beginning the assignment to become familiar with the expectations for   successful completion.

You are required to submit this assignment to Turnitin. Please refer   to the directions in the Student Success Center.

This assignment assesses the following     programmatic competency: 1.6: Identify an appropriate testing     instrument, explain how to administer the test, and interpret test results.

This assignment meets the following CACREP Standards:

2.F.5.j. Evidence-based counseling strategies and techniques for     prevention and intervention.

5.C.2.b. Etiology, nomenclature, treatment, referral, and     prevention of mental and emotional disorders.

5.C.2.d. Diagnostic process, including differential diagnosis and     the use of current diagnostic classification systems, including the     Diagnostic and Statistical Manual of Mental Disorders (DSM) and the     International Classification of Diseases (ICD).

This assignment meets the following NASAC Standards: 

45) Match treatment activities and community resources with     prioritized client needs, in a manner consistent with the client’s     diagnosis and existing placement criteria.

52) Arrange referrals to other professionals, agencies, community     programs, or other appropriate resources to meet client needs.

55) Evaluate the outcome of the referral.

56) Initiate collaboration with referral sources.

57) Obtain and interpret all relevant screening, assessment, and     initial treatment planning information.

61) Coordinate all treatment activities with services provided to     the client by other resources.

62) Summarize the client’s background, treatment plan, recovery     progress, and problems inhibiting progress for the purpose of     assuring quality of care, gaining feedback, and planning changes in     the course of treatment.

78) Work with the client to establish realistic, achievable goals     consistent with achieving and maintaining recovery.

City Racquetball Club (CRC) offers racquetball and other physical fitness facilities to its members.

Click here to order this assignment Plagiarism.Written from scratch by professional writers.

Problem 45

City Racquetball Club (CRC) offers racquetball and other physical fitness facilities to its members.


There are four of these clubs in the metropolitan area. Each club has between 1,800 and 2,500 members.

Revenue is derived from annual membership fees and hourly court fees. The annual membership fees

are as follows:

Individual………………………………………………………………………………… $ 40

Student…………………………………………………………………………………… 25

Family…………………………………………………………………………………….. 95

The hourly court fees vary from $6 to $10 depending upon the season and the time of day (prime

versus nonprime time).

The peak racquetball season is considered to run from September through April. During this

period, court usage averages 90 to 100 percent of capacity during prime time (5:00–9:00 p.m.) and 50 to

60 percent of capacity during the remaining hours. Daily court usage during the off-season (i.e., summer)

averages only 20 to 40 percent of capacity.

Most of CRC’s memberships have September expirations. A substantial amount of the cash receipts

are collected during the early part of the racquetball season due to the renewal of the annual membership

fees and heavy court usage. However, cash receipts are not as large in the spring and drop significantly

in the summer months.

CRC is considering changing its membership and fee structure in an attempt to change its cash

receipts. Under the new membership plan, only an annual membership fee would be charged, rather than

a membership fee plus hourly court fees. There would be two classes of membership as follows:

Individual ………………………………………………………………………………………………. $250

Family …………………………………………………………………………………………………… 400

The annual fee would be collected in advance at the time the membership application is completed.

Members would be allowed to use the racquetball courts as often as they wish during the year under the

new plan.

All future memberships would be sold under these new terms. Current memberships would be honored

on the old basis until they expire. However, a special promotional campaign would be instituted to attract

new members and to encourage current members to convert to the new membership plan immediately.

The annual fees for individual and family memberships would be reduced to $200 and $300,

respectively, during the two-month promotional campaign. In addition, all memberships sold or renewed

during this period would be for 15 months rather than the normal one-year period. Current members

also would be given a credit toward the annual fee for the unexpired portion of their membership fee, and

for all prepaid hourly court fees for league play that have not yet been used.

CRC’s management estimates that 60 to 70 percent of the present membership would continue with

the club. The most active members (45 percent of the present membership) would convert immediately

to the new plan, while the remaining members who continue would wait until their current memberships

expire. Those members who would not continue are not considered active (i.e., they play five or less

times during the year). Management estimates that the loss of members would be offset fully by new

members within six months of instituting the new plan. Furthermore, many of the new members would

be individuals who would play during nonprime time. Management estimates that adequate court time

will be available for all members under the new plan.

If the new membership plan is adopted, it would be instituted on February 1, well before the summer

season. The special promotional campaign would be conducted during March and April. Once the

plan is implemented, annual renewal of memberships and payment of fees would take place as each

individual or family membership expires.


Required: Your consulting firm has been hired to help CRC evaluate its new fee structure.

Write aletter to the club’s president answering the following questions.

  1. Will City Racquetball Club’s new membership plan and fee structure improve its ability to plan its

cash receipts? Explain your answer.

  1. City Racquetball Club should evaluate the new membership plan and fee structure completely

before it decides to adopt or reject it.

  1. Identify the key factors that CRC should consider in its evaluation.
  2. Explain what type of financial analyses CRC should prepare in order to make a complete


  1. Explain how City Racquetball Club’s cash management would differ from the present if the new

membership plan and fee structure were adopted.




Which is more detrimental to a firm, pricing your product or service too high, or pricing your product or service too low?

Click here to order this assignment Plagiarism.Written from scratch by professional writers.

Which is more detrimental to a firm, pricing your product or service too high, or pricing your product or service too low?

Pricing of a product is a very important component that determines the success of a product. Price is the amount the end user is expected to pay for procuring the product. Price is often linked to the perceived value of the product. If the price of the product is marked too high, it may lead to decrease in the sales of the product. Other way around, if the price of the product is marked too low, it may lead to undermining the value of the product. So pricing the product at the right price is very important for success of the product.

Marking the product or service high may be tricky in many ways.

Firstly, it may lead to customers looking for products which are potentially cheaper than the offered product.

Secondly, higher prices may lead to non-availability to those customers with low purchasing power, thus eliminating a complete class of the society of people.

Thirdly, higher prices will impact the broader reach of the commodity to the people. Higher priced products will be restricted to certain borders of the country.

All the above will lead to decrease in the sales of the product and potentially decrease the profit on that particular product for the company.

Marking a price lower also has its own share of drawbacks.

Firstly, lowering the price of a product might result in having a presumption that the product or service if of lower quality.

Secondly, it becomes difficult to increase the prices in future if the cost of producing the product goes up.

Thirdly, a low-priced product will lead to difficulty in making profit for the company or will take time to make profit for the company.

So, from the above it can be inferred that a low-priced product may impact the profit-making of the company in multiple ways.

It is very essential for a company to have the right price set for the product. Effective pricing will account for more than 50% of the product sales for the company.


Nagle, T. T., & Müller, G. (2017). The strategy and tactics of pricing: A guide to growing more profitably. Routledge.

Patrick Campbell, 20016. The Importance of Value-Based Pricing Strategy and Why You’re Likely Selling Your Products Short. Retrieved from:

Crime Prevention on the Deep Dark Web Sample paper

Click here to order this assignment Plagiarism.Written from scratch by professional writers.

Crime Prevention on the Deep Dark Web

Policy Analysis Outline

September 23, 2018

Table of Contents

Abstract 3

Key Words: 3

  1. Introduction. 4
  2. Problem Statement 4
  3. Importance to Cybersecurity. 4
  4. Roadmap. 5
  5. Background. 5
  6. History. 5
  7. Purpose of the Deep Dark Web. 6
  8. Current policies and practices. 6

III. Approach. 7

  1. What are you proposing to do about it (new policy, strategy, law) 7
  2. Critical review of the policies – why it may or may not work? What research supports this idea? 8
  3. Conclusion. 8
  4. Summary and strengths and weaknesses of the plan. 8
  5. Suggestions for future research. 8

References: 9












The internet has created new opportunities for learning, socializing, trading, and organizing. Now that almost every individual in the globe has access to the internet, online security and anonymity have become vital to individuals, corporations, state, and non-state. Beyond the common web crawling browsers such as Google, Yahoo, and YouTube is a sea of hidden websites known as the deep web that cannot be accessed with regular browsers. Security agencies and organizations are encountering a new threat, the Deep Dark Web, where confidential data is leaked, making various firms vulnerable to hackers. Cyber-security policies and laws should be enacted and implemented to counter this new wave of crime.




Key Words: Deep Dark Web, policies, strategy, hacking, Cybersecurity.











I.     Introduction

A.    Problem Statement

Many organizations have incurred losses after their private information was enforcement.

B.     Importance to Cybersecurity

Understanding the implications of the Deep Dark Web as a facilitation for crimes is of importance to the field of Cybersecurity. The Deep Dark Web serves criminals as a safe environment to engage in criminal activities, right after data has been stolen. Since the Deep Dark Web is an online platform, designed to erase navigation tracks, it is very difficult for cCybersecurity professionals and law enforcement to capture those engaging in illegal activities. Also, most of those who commit electronic crimes tend to finish their work through the sale of information on the Deep Dark Web. Sensitive personal and organization information such as Intellectual Property, Personal Identifiable Information (PII), amongst others is being leaked into the internet and distributed illegally through the Deep Dark Web. Having this information in the Deep Dark Web.


C.    Roadmap

This paper seeks to identify a policy issue concerning the Deep Dark Web and criminal activities that take place within the system. Also, during the research, an overview on how the Deep Dark Web originated will be provided, as well as, why it exists, and the policies that are currently in place to counter criminal activity.

The paper also has the proposed policies or laws together with an analysis on what can or cannot work. Monitoring the deep dark web ensures enables organizations to determine when its data is on its way for sale, thus enabling the organization take proactive steps to prevent such data leakage or breach.

This descriptive research gathers court cases and newspaper articles to examine the different ways in which law enforcers can succeed in preventing crime in the deep dark web. The research will apply both qualitative and quantitative data to analyze successful and failed attempts by law enforcers to contain dark web crimes. No human subjects were used in the collection of this data; only secondary sources will be used. The variables for this research include the type of crimes on the dark web, the nature of the crime, the type of market, and the nature of policies adopted (international or regional).

II.   Background

A.    History

The Deep Dark Web was originated in the 1960s to designate networks that were separated from ARPANET (that evolved into internet) for security reasons (McCormick, 2013). The Dark Net could receive data from the ARPANET though they had addresses that did not appear in network listings as well as would not answer inquiries or pings. The US government created the Deep Dark Web to enable the spies to exchange information entirely anonymously (Meena, 2016). A technology referred to as Tor (The Onion Router) was developed by the US military researchers in the mid-1990s. Tor was released to the public domain so that everyone can use (Zur, 2018). This browser is the most famous method known to work as a road to enter the Deep Dark Web.

B.     Purpose of the Deep Dark Web

Various individuals and organizations use it for both legal and illegal purposes. Research done in 2014 by University of Portsmouth indicated that the most searched content on Tor was child pornography and the black market where personal details, guns, and drugs are sold. It is also used to hide illegal online activities such as extremism, finance, fraud, abuse, arms, and hacking. On the other side, the government uses the dark web for two reasons: law enforcement and military intelligence. The military uses the Dark Web to protect military command as well as control systems from being recognized and hacked by the enemy. The Dark Web is also used for law enforcement purposes by performing online surveillance, sting operations, as well as maintaining the anonymous tip lines (Mattmann, 2017).

C.    Current policies and practices

Previous research indicates that law enforcement agencies are increasingly facing difficulties surveilling and catching criminals on the deep dark web due to advanced encryption technology that offers more privacy and anonymity. Currently the Deep Dark Web is counteracted by various enforcement strategies and international law. A “Convention on Cybercrime” was promulgated by the Council of Europe which required signatory countries to criminalize different acts of computer misuse as well as prosecute or extradite the offenders (CM., 2018). Over 50 nations, including the United States, are EU Convention signatories. Various programs have been used to search computers that visit the dark web, for instance Tika and NIT, which are used to search child pornography in the dark web as well. Memex, which was launched by the Defense Advanced Research Projects Agency in 2014 is used to mine the Deep Dark Web to determine aspects of human trafficking. Also, Netherland’s Drug Information and Monitoring System (DIMS) are used to monitor illicit drugs market in recreational settings (Edmundson, 2017).

III. Approach

A.    What are you proposing to do about it (new policy, strategy, law)

Governments can use other strategies or develop new laws and policies to counter the dark web market. One of the ways organizational or personal data is shared by criminals and where hacktivits exchange tips is through chat forums (Varghese, 2014). Thus, organizations should partner with security agencies to monitor the discussions to establish the threat which they pose. Secondly, the government should control or ban the use of bit coin since most illegal transactions are paid by that. The bit coin is not regulated by a central authority (it is outside the established financial system), it is anonymous, decentralized, and the transaction are not linked with addresses, names, or any information. Controlling or banning the bit coin will greatly reduce the deep dark web illegal activities (Chikada, 2016). The other strategy that the security forces can use is real life observation and monitoring parcels (SBWire, 2018). Mostly the dark wen entails drug trade where the drugs are delivered by companies through parcels or emails (Hale, 2018). By cutting the link between the source and the client, the drug industry will decrease over time. Real life observation is where the security agencies track individuals suspected to be involved in dark web activities (Koebler, 2015). For instance, the founder of Silk Road, Ross Ulbricht was tracked and convicted by tracking his real-life activities.

B.     Critical review of the policies – why it may or may not work? What research supports this idea?

Disrupting the dark-net sales may potentially result in to never-ending games of “whack a mole” where old crypomarkets are replaced with new ones with buyers and sellers moving from one site to another. Thus, a new strategy is needed to counter the dark web activities. The above strategies may go a long way in reducing and preventing dark web illegal activities. The Deep Dark Web is more complicated than it seems or else, it would have been outside the criminal world a long time ago, therefore, some challenges may be present during the implementation of policies that seek to deter illegal activity in this platform.

IV. Conclusion

A.    Summary and strengths and weaknesses of the plan.

The activities in deep dark web can be minimized by enforcing the various policies and implementing the different strategies. The strength of these policies plans is that it can be easily implemented in various countries and by different organizations. The weakness is that the emergency of new dark sites makes it difficult to eliminate the deep dark web illegal activities.

B.     Suggestions for future research

The future research should focus on how to identify every bit of criminal activity in the Deep Dark Web as well as implementing barriers that prevent this activity.






Chikada, A. (2016). The Deep Web, darknets, Bitcoin and brand protection. Retrieved from:

C.M. (2018). Law Enforcement’s Techniques in Curbing Cybercrime in the Dark Web. Retrieved from:

Edmundson, N. (2017). To Catch a Criminal: Hacking into the Dark Web and International Law Implications. Retrieved from:

Hale, J. (2018, June 13). HIDDEN WEB What is the dark web? From drugs and guns to the Chloe Ayling kidnapping, a look inside the encrypted network. Retrieved from:

Jona, S. (2018). Dark Web Demand Increases despite the Crackdown, Research Confirms. Retrieved from:

Koebler, J. (2015). Six Ways Law Enforcement Monitors the Dark Web. Retrieved from:

Mattmann, C. (2017). Google for the dark web: The US Government tech that could scour the hidden internet for criminal activity. Retrieved from:

Mccormick, T. (2013). The Darknet: A Short History. Retrieved from:

McGlynn, L. (2018, May 08). What Employers Need to Know About the Dark Web. Retrieved    from     need-to-know-about-dark-web.aspx

Meena, S. (2016). What is the history of deep web? Retrieved from:

Piscitello, D. (2017). The Dark Web: The Land of Hidden Services. Retrieved from   

SBWire. (2018). Digitial Journal . Retrieved from:

Sidek, F. B. (2015). Understanding the Importance of the Deep Web and Dark Web. Retrieved from:

Varghese, J. (2014). Five strategies for negotiating international business contracts. Retrieved from:

Zur, A. R. (2018). What is the Deep Dark Web? Retrieved from:


Project 1: Topic Exploration Graphic Organizer

Click here to order this assignment Plagiarism.Written from scratch by professional writers.

Link to article:

Review the news story you chose to complete Project 1: Topic Exploration Graphic Organizer (submitted at the end of Theme: Understanding the Scientific Process) and respond to the following:

What prior knowledge and assumptions about the science topic in your article did you have before viewing this news story? In other words, describe what you already knew about the topic.  

As you complete this assignment, keep in mind that your answer to this question or a closely related question will be part of Project 2: Question Development Worksheet. It is recommended that, in addition to entering the answer to the question, you save your answers in a Word document that you can refer to later when completing Project 2.

This activity will be graded based on completion.