Be on schedule.Score better.

support@savemydegree.com

EN

write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by

write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Note: There are 2 parts to this assignment.

Part 1

For this Discussion Board assignment, complete the following:

  • Based upon the network that you have selected to study this term, explain whether it is a scale-free or small-world network. Your network will not be both. Start with understanding how these each operate and how they differ. Identify your network, and answer the following:
    • Is your network scale free or small world? How do you know? Which principles of scale-free or small-world networks apply to your selected network and the interdependencies between and among its assets, nodes, and links?
    • Is your network also a cascading network? Specifically, why do you believe it is or is not?
  • How does understanding the difference between scale-free and small-world networks help to plan protective measures more successfully?
    • How can understanding your type of network potentially impact your vulnerability and risk analyses?
    • Provide at least 2 examples of how understanding your network better in this respect helps you understand potential vulnerabilities and defend against them.

Part 2

On August 1, 2007, the I-35W Bridge in Minneapolis, Minnesota collapsed, killing 13 people and injuring 121. The U.S. Fire Administration, an entity within the Federal Emergency Management Agency (FEMA), produced a technical report covering the response, recovery activities, and lessons learned regarding this catastrophic event.

This report is available for download.

Under the M.U.S.E. offerings for this Phase, look for the item titled “FEMA Report on MN Bridge Collapse.” Review and study this presentation before answering the following questions. You may also conduct external research, but if you do, be sure to select professional source documents such as FEMA after action reports, engineering records, and lessons. Be sure to answer the following questions:

  • What potential vulnerabilities can be associated with the I-35W bridge collapse?
    • Consider this type of list an organized form of brainstorming. Think of vulnerabilities as gaps in security or protection, structural flaws, or the likelihood of something bad happening. Do not limit the list of vulnerabilities at first; it can be reduced to the most likely or most potentially costly items at a later time.
  • How does the environment impact which vulnerabilities are most likely or even possible?
    • As you contemplate potential vulnerabilities, use the 360-degree analysis this course continues to reinforce. Notice how the vulnerabilities expand, contract, change, or are eliminated based on various changing conditions. In this case, such a view should include assessing environments comprised of natural, manmade, and combined conditions. For example, think about the time of day and time of year it was when the bridge collapsed. An example question might be: Does the season impact the degree or depth of a vulnerability to this bridge? Or, how much greater might the loss of life had been if the collapse occurred in the winter?
  • Based on the list of potential vulnerabilities, what potential costs or consequences might result from each?
    • After listing the vulnerabilities and questions, reduce the list to the most likely possibilities, and consider the potential costs or consequences of each vulnerability. Again, think in a 360-degree way of what might constitute costs or consequences. Do not get stuck on what the actual outcome resulted in, but also consider how much worse or how differently it might have turned out.
  • How do you select the most likely vulnerabilities from a list of many?

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

In the mini lecture, we discussed the policy implications of trait theories. Primarily, we looked at the implications for treatment, rehabilitation, and

In the mini lecture, we discussed the policy implications of trait theories. Primarily, we looked at the implications for treatment, rehabilitation, and prevention. Let’s expand this discussion to the criminal justice system. Specifically, the adjudication stage. Please address the following: Should individuals with Antisocial Personality Disorder be held responsible for

n this discussion, you’ll complete your first of three Walk In My Shoes assignments. These learning activities, which will end in your final presentation,

n this discussion, you’ll complete your first of three Walk In My Shoes assignments. These learning activities, which will end in your final presentation, explore corrections through the perspectives of individuals most impacted by these systems. We’ll begin by reading two articles from “Life Inside,” a weekly first-person series written by real

part A (2.3 Discussion: Police Organizations) Why This Discussion? Now that you’ve learned about police organizations, it’s time to apply what you’ve

part A (2.3 Discussion: Police Organizations) Why This Discussion? Now that you’ve learned about police organizations, it’s time to apply what you’ve learned while acting again as the chief of the Atlanta Police Department. Since police chiefs are expected to make evidence-based decisions as police leaders, consider what evidence from the

Description Deliverable Length: 2 pages (matrix may be enclosed in the paper) Complete the following:Using the technique of screening for suitability,

Description Deliverable Length: 2 pages (matrix may be enclosed in the paper) Complete the following: Using the technique of screening for suitability, feasibility, acceptability, distinguishability, completeness, and evaluation criteria, conduct a critical analysis to identify the most practical course of action (COA). Develop a comparison matrix slide that examines the COAs

Description Deliverable Length: 2 pages (matrix may be enclosed in the paper) Complete the following:Using the technique of screening for suitability,

Description Deliverable Length: 2 pages (matrix may be enclosed in the paper) Complete the following: Using the technique of screening for suitability, feasibility, acceptability, distinguishability, completeness, and evaluation criteria, conduct a critical analysis to identify the most practical course of action (COA). Develop a comparison matrix slide that examines the COAs

Discuss the difference between classical, neoclassical, and positivist criminology. Give an example of a crime and explain the crime using each

Discuss the difference between classical, neoclassical, and positivist criminology. Give an example of a crime and explain the crime using each theory. What are the differences between criminal and civil law? Provide examples or scenarios that highlight those differences. Justify your response with supporting material from at least one scholarly academic