Types of regulation: Management-based regulatory delegation

Types of regulation: Management-based regulatory delegation

This figure depicts the phases of Organizational activity that Management-Based, Regulatory Delegation and Management Based Regulatory Delegation are involved in and impacts.

Advertisements
Tagged

TheCyberSrtudent.com coming soon

TheCyberSrtudent.com coming soon

80% done with my coming soon page for the site. Here are some of the features I am looking to offer.

Tagged , , , , , , ,

It depends on US

It depends on US

A picture I made during my 20-minute creativity warm-up a couple of nights ago. essentially the factor we forget in the equation is synergy. It does not just depend on me working, but it also depends on me working with others. two was and will always be better than one.

Tagged , , , , ,

A different kindof community Outreach – www.WhitesBarberCo.com

www.WhitesBarberCo.com

Today I finally published a website I built for a local barbershop located in Laurel, White’s Barber Co. I did the entire project refusing to take any money and sacrificing a lot of time to meet their deadlines for marketing. This was one of the first projects I put on my calendar for this year with a few goals in mind:
1. To help a business owner desiring to make a positive impact in their community
2. To make this the first year that I utilized every bit of every skill that I have to help others in need.

A lot of times we think about community outreach as making food for the hungry, or building houses for the homeless. While community outreach is this and then some, I want to spend this year (and hopefully many more years to come) expanding the scope of how we reach out to our community. I want to make 2013 where I spend time trying to help local businesses with any active, latent, refined or rusty skill that I have to help them reach their goals and dreams in hopes that our efforts will stimulate our economy in a way that economist have not thought of yet.

Join me, maybe?

Tagged , , , , , ,

COMMUNITY OUTREACH SMALLGROUP UPDATE FOR THE WEEK OF MARCH 10TH – 16TH

Image

Hola mis amigos!

 

Last week was AMAZING! We had almost 30 people to volunteer at the house throughout the day. Collectively as a team, we quickly met and exceeded the expectations that were set by the organization. We lterally amazed the staff with our commitment and willingness to put work in this house that is going to be a safe haven for victims of sex trafficking  in the future. 

So since we did such a great job and made such a great impact, WE ARE GOING BACK THIS WEEKEND! The Safe House has a grandopening next weekend and they are not quite to showcae level yet. So we are going to show up and give them a hand once again. 

I will be there circa 11am. Please feel free to show up starting then. We will watch the video from the church and then do a discussion as we volunteer. 

If you need the address again it is:  4710 Curtis ave Baltimore, MD 21226.

And as usual BRING A FRIEND! Call or text me if you have any questions. 

See you Saturday !

Tagged , , , , , ,

Community Outreach Smallgroup Update for the week of March 3rd – 9th

Family!

It has certainly been a while but I hope that everyone is okay. There have been many occurences since the last time we met; our church family has been brought to a new place of depending on God and we lost an irreplaceble pillar in our church. In times like we these we have to remember the teachings of the bible and our pastor and come together as a family and church to make it through. While I have might have been extremely busy and out of touch the past three weeks, I want to asure you all that I am here if you need someone to speak to and I am praying for each and every one of you according your personal situations.

I am excited to see everyone saturday and excited for this weekend. Thanks to folks like Duana, Becca and Alicia we have a a great community service event planned after we our video and discussion. We will be going into baltimore to help out Safe House of Hope with a very important project. Safe House of Hope is a faith based organization doing phenomenal things in the city of Baltimore to assist women involved in sex-trafficking. They are looking to open a new facility that will provide services to these women including, classes, food pick-up, counseling and shelter. We will be helping them at around noon for as long as we can in what will be an all day effort to open a new Sex Trafficking Refuge Home. I am told that we may be painting and knocking down walls so I am already excited and I hope that you all will join me to help out in this great cause.

Image

The location of the event is: 4710 Curtis ave Baltimore, MD 21226.

We will be meeting at: 5638 Ritchie Hwy, Baltimore, MD at Noon. That means we will NOT be meeting at the church this saturday!

I love you guys and I hope to talk to you soon! BRING A FRIEND! See you Saturday !

Tagged , , , ,

Some of the Difficulties policy-makers face trying to counter cyber-crime

Most national level policy is complicated. Each policy proving difficult to create and implement simply because our nation is made of up of so many different types of people who all have been a voice to express their wants. However, creating policy to address cyber crime in the United States has been the toughest and most complicated policy issue to date. This is primarily for three different reasons, our massive dependence on cyberspace, the rapid pace that technologies are being introduced and evolving in cyberspace and the disparity between the average level of knowledge and the required level of knowledge needed to create policies that will adequately and legally address the crime and issue.

Throughout American history, policies have swung on a pendulum powered by election seasons but motivated by current events. The recent series of violent crimes involving high powered guns has tilted gun policy more to the restrictive side. However, it will only take time and another series of events where it can be justified that citizens need to be heavily armed to protect themselves to swing it back to the other side. The difference between gun policy and cyber policy is our everyday dependence on it in almost every factor of our lives. Inevitably any policy created to provide security in cyber space against cyber criminal will infringe on the rights and freedoms (or perceived rights and freedoms) of the innocent utilizing cyberspace. A prime example of this is how the Cybersecurity act of 2012 did not pass due to the concern of it being used for surveillance on innocent citizens rather than cyber criminals. This concept of the “Internet of Things” where every single thing we interact with has an IP and is connected to cyberspace frightens those who are privacy conscious.(2011)  This issue is compounded by the rapid pace that technologies are being introduced and evolving and becoming available to the consumer before being fully considered for security. Companies are rushing to push the use of cyber space into the next frontier, providing new ways to do everything, consumers are jumping on it as soon as possible in efforts to be on the edge of innovation and criminals are right behind them looking to exploit it before the companies or consumers can catch on. One day we are using credit cards to make transactions, the next day we are using our phones as wallets to make those same transactions. This trend renders public demand as an effective means to counter cyber crime useless; it complicates things for policy makers who cannot realistically keep up with the pace at which things are growing and do what it takes to make effective policy. This gap between how fast policymakers are learning about cyberspace and the speed of policy vs. the speed of new technologies in cyberspace is leaving a door wide open for cyber criminals.

In the end, we have cybersecurity policies that do not adequately address the nation’s cybercrime concerns. Homeland Security Presidential Directives like HSPD-7 have been the main pieces of policy being helping to defend against cybercrime. However, it is more national security focused and there is still a need for a major policy that addresses cyber crime in a way that can be applied in every instance, state and appliance. As Susan Brenner highlights in “Cyber crime and the U.S. Criminal Justice System”, factors like whether the cyber criminal is a juvenile, the definition of “force” and inflammatory charges like child pornography makes it hard to prosecute against cyber crime, especially in a nation that has varying definitions of basic concepts like cyber space or cyber crime. (2006) However, the recently released Critical Infrastructure Security and Resilience Presidential Policy Directive 21 and Executive Order for Improving Critical Infrastructure Cybersecurity is set change our government’s stance on how much the private sector defends the national critical infrastructure. Presidential Policy 21 is set to assess, redefine and improve the relationship between the government and the private sector, update the NIPP and clearly identify who has a hand in protecting the nation’s critical infrastructure from the federal government. The Executive Order for Improving Critical Infrastructure Cybersecurity is accompanies the presidential directive, but provides much more verbiage for understanding how the nation’s stance on cyber security in the private sector will change and how it will include the owners and operator of critical infrastructure and the sector specific agencies who are already assisting them in defending themselves in cyberspace. This presidential order is the most important directive to date that makes it clear that the government will tell the private sector how to improve and their cybersecurity.

While Presidential Policy Directive 21 may be a landmark policy clearly stating how the government will interact with the privacy industry to secure the nation’s critical infrastructure, it does not have any verbiage clearly outlining how much the private industry should be responsible for protecting national security of the critical infrastructure that owns and operates. Consequently, this executive order is the most feared order to be released since the inception of cyberspace. There are varying opinions about how much the private industry should be responsible for protecting national security, all agreeing that they should be responsible on some level but no consensus on how much. Essentially, as the Department of Homeland Security and the government as a whole tackles the deliverables tasked to them by the Presidential Policy Directive, they must develop recommendations for determining how much each sector and each operator and owner should be responsible for protecting national security.

–Marcus Stallworth 02/28/2013

Brenner, S. W. (2006). Cybercrime and the U.S. criminal justice system. In H. Bidgoli (Ed.), Handbook of information security (Vol. 2). New York, NY: John Wiley & Sons

Lopez, J., Najera, P., Roman, R. (2011). Securing the Internet of things. IEEE Computer. Vol. 44, no. 9, pp. 51-58, Septermber

Homeland Security Presidential Directive 7 (HSPD-7), (Dec. 17, 2003) Critical Infrastructure Identification, Prioritization, and Protection.

Tagged , , , , , ,

How to make your prayers “easier”

In our second week of small groups we discussed began a more in depth look at How to pray. We noted that the structure of prayer according to the lessons of Jesus Christ, was to first address and praise Our Father, and then ask and then close out with praise again.
Even though we have this outline sometimes it is still easy to pray past a few short minutes. However, in our group we explored the structure and how to apply it build our prayer life. The result of our exploration was to call Our father by every name that we know Him as, revealed to us through revelations in the bible and out lives. In our group meeting, we were able to come up with almost 40 names. We came to the consensus that if we asked our Father for at least one thing pertaining to the names that addressed Him while opening up in praise, our prayer would become exponentially more intentional, connected, thorough and even longer as well as many other things.

Here is a graphic that you can print out and put in your prayer corner that will help you to remember who God is and what we can ask Him for while speaking with Him in prayer.

Tagged , , , , ,