№ lp_1_2_32978
File format: docx
Character count: 4198
File size: 15 KB
An essay exploring the relationship between social science and ethical hacking, focusing on how ethical hackers use social science principles to understand human behavior, navigate ethical dilemmas, and ensure cybersecurity practices are inclusive and fair.
Year:
2025
Region / city:
Not specified
Subject:
Cybersecurity, Social Science, Ethical Hacking
Document Type:
Essay
Author:
Papa Mintah-Adu
Target Audience:
Professionals in cybersecurity, social science researchers
Period of Action:
Not specified
Approval Date:
Not specified
Date of Changes:
Not specified
Note:
Contextual Description
Price: 8 / 10 USD
The file will be delivered to the email address provided at checkout within 12 hours.
The file will be delivered to the email address provided at checkout within 12 hours.
Don’t have cryptocurrency yet?
You can still complete your purchase in a few minutes:- Buy Crypto in a trusted app (Coinbase, Kraken, Cash App or any similar service).
- In the app, tap Send.
- Select network, paste our wallet address.
- Send the exact amount shown above.
The final amount may vary slightly depending on the payment method.
The file will be sent to the email address provided at checkout within 24 hours.
The product description is provided for reference. Actual content and formatting may differ slightly.
Title:
AI quiz: discussion questions on hacking, responsibility, marketing, and automation
Type of document:
Educational discussion material
Subject:
Artificial intelligence ethics
Themes:
Human, social and environmental wellbeing; reliability and safety; accountability; contestability; fairness; inequality
Topics covered:
Hacking; self-driving cars; responsibility; marketing bias; automation and employment
Intended audience:
Learners discussing AI ethics
Structure:
Scenario-based questions with prompts for discussion
Year:
2024
Region / City:
United States
Topic:
Cybersecurity, Incident Response
Document Type:
Template
Organization / Institution:
HACS
Author:
HACS
Target Audience:
Contractors, Agencies
Validity Period:
Ongoing
Approval Date:
Not specified
Date of Changes:
Not specified
Year:
2021
Region / City:
Massachusetts
Topic:
Cybersecurity, Public Water Supply
Document Type:
Template
Organization / Institution:
Massachusetts Department of Environmental Protection (MassDEP)
Author:
Andrew Hildick-Smith
Target Audience:
Public water and wastewater utilities
Effective Period:
Ongoing
Approval Date:
2021
Date of Last Update:
N/A
Year:
2022
Month:
June
Document status:
Draft
Document identifier:
IMDRF/CYBER WG/N73DRAFT:2022
Topic:
Medical device cybersecurity
Subject:
Software Bill of Materials (SBOM)
Document type:
Regulatory guidance
Authoring group:
Medical Device Cybersecurity Working Group
Organization:
International Medical Device Regulators Forum
Intended stakeholders:
Medical device manufacturers; healthcare providers; regulators; software vendors
Scope:
Medical devices including software-based and in vitro diagnostic devices
Related documents:
IMDRF/CYBER WG/N60FINAL:2020
Copyright holder:
International Medical Device Regulators Forum
Year:
2021
Region / city:
Washington, D.C.
Topic:
Cybersecurity, Automotive Recycling, Vehicle Repair
Document Type:
Letter
Organization:
National Highway Traffic Safety Administration (NHTSA)
Author:
Sandy Blalock, Executive Director
Target Audience:
National Highway Traffic Safety Administration (NHTSA), Automotive Manufacturers
Period of validity:
Not specified
Approval date:
Not specified
Date of amendments:
Not specified
Year:
2023
Region / City:
United States
Theme:
Cybersecurity, Workforce Development
Document Type:
Interview
Organization:
U.S. Department of Homeland Security (DHS)
Author:
Gregory Bird
Target Audience:
Cybersecurity professionals, Human Resources in cybersecurity
Period of Action:
Ongoing
Approval Date:
Not provided
Date of Changes:
Not provided
Year:
2017
Region / city:
Federal Government
Topic:
Cybersecurity, Information Technology
Document type:
Policy Document
Agency / organization:
Office of Personnel Management (OPM)
Author:
Office of Personnel Management (OPM)
Target audience:
Federal agencies, cybersecurity professionals
Period of validity:
Not specified
Approval date:
Not specified
Date of amendments:
Not specified
Year:
2026
Region / City:
N/A
Subject:
Cybersecurity Training
Document Type:
Instructional Guide
Organization / Institution:
DARS
Author:
N/A
Target Audience:
Employees of DARS
Action Period:
N/A
Approval Date:
N/A
Date of Changes:
N/A
Year:
2025
Organization:
NAIC (National Association of Insurance Commissioners)
Project Sponsor:
Miguel Romero
Prepared by:
Koty Henry
Target Audience:
State insurance regulators and licensed insurers
Type of Document:
Project Proposal / Implementation Plan
Relevant Legislation:
Insurance Data Security Model Law #668 (MDL #668)
Related Policy:
Cybersecurity Event Response Plan (CERP), March 17, 2024
Submission Date:
05/26/2025
Key Resources:
NAIC technical and cybersecurity teams, regulatory/legal input, business analysts, project managers, training/support staff, infrastructure (servers/cloud services)
Implementation Steps:
Portal development, testing, deployment, and state utilization survey
Goals:
Centralized reporting of cybersecurity events, improved regulatory compliance, data security, and cross-jurisdiction coordination
Risks/Challenges:
State-specific variations, adoption rate, confidentiality and security validation
Existing Alternatives:
Appian platform or other configurable platforms
Note:
Year
Topic:
Cybersecurity
Document Type:
Template
Organization:
Harbour Investments, Inc.
Target Audience:
Financial advisors, cybersecurity professionals
Year:
2026
Region / City:
United States
Topic:
Cybersecurity, Compliance
Document Type:
Request for Proposal
Agency / Institution:
U.S. Department of Defense
Author:
Unspecified
Target Audience:
Organizations handling Controlled Unclassified Information (CUI)
Period of Application:
Ongoing
Approval Date:
Unspecified
Modification Date:
Unspecified
Year:
2014
Region/City:
United States
Topic:
Cybersecurity
Document Type:
Statement of Work (SOW)
Organization:
Federal Government, Department of Defense (DoD), Intelligence Community (IC)
Author:
Not specified
Target Audience:
Federal agencies, Contractors
Period of Effectiveness:
Not specified
Approval Date:
Not specified
Date of Changes:
Not specified
Year:
2023
Region / City:
USA
Topic:
Cybersecurity Services, Risk Assessment, Vulnerability Testing
Document Type:
Template
Agency/Institution:
HACS
Author:
HACS
Target Audience:
Federal Agencies, Contractors
Period of Action:
N/A
Approval Date:
N/A
Modification Date:
N/A
Note:
RFQ Number
Issued to:
Contractors under GSA Multiple Award Schedule (MAS IT)
Type of Document:
Federal solicitation / request for quote
Services:
Highly Adaptive Cybersecurity Services (HACS)
Applicable Regulations:
Federal Acquisition Regulation (FAR) 8.4
NAICS Code:
[Not specified]
PSC Code:
[Not specified]
Performance Location:
[Primary work location specified in RFQ]
Period of Performance:
Base period with option periods from date of award
Overtime Policy:
Approved only by Contracting Officer’s Representative (COR)
Holidays Observed:
Federal holidays and additional days designated by statute, executive order, or proclamation
Submission Requirements:
Signed cover letter by authorized company negotiator
Year:
2025
Region / City:
NASA
Topic:
Cybersecurity
Document Type:
Policy Reference
Agency / Institution:
NASA OCIO
Author:
Cybersecurity Policy Team
Target Audience:
Contract Teams, Programs
Period of Validity:
Ongoing
Approval Date:
March 21, 2025
Modification Date:
Not Provided
Year:
2024
Region / City:
Massachusetts
Topic:
Cybersecurity, Health Services, Billing
Document Type:
Official Update
Organization / Institution:
Executive Office of Health and Human Services, Office of Medicaid
Author:
Mike Levine
Target Audience:
Healthcare Providers, Billing Intermediaries, Health Safety Net Facilities
Period of Validity:
August 2024
Approval Date:
August 2024
Date of Changes:
August 2024
Year:
Not provided
Region / City:
Not specified
Topic:
Research ethics, manuscript submission
Document type:
Template
Author:
Not specified
Target audience:
Authors submitting research articles
Period of validity:
Not provided
Approval date:
Not specified
Date of changes:
Not specified
Year:
Not specified
Region / City:
Not specified
Topic:
Christian Ethics, Moral Philosophy
Document Type:
Academic Assignment
Organization / Institution:
Not specified
Author:
Not specified
Target Audience:
College students
Period of validity:
Not specified
Approval date:
Not specified
Date of changes:
Not specified
Year:
2024
Region / City:
Africa
Topic:
Vector Control, Malaria, Genetically Modified Organisms
Document Type:
Consultancy Announcement
Organization:
African Union Development Agency-NEPAD (AUDA-NEPAD)
Author:
Not specified
Target Audience:
Individual Consultants
Period of Validity:
Not specified
Approval Date:
Not specified
Modification Date:
Not specified
Document type:
Administrative form
Subject area:
Health ethics and governance
Jurisdiction:
New South Wales, Australia
Issuing body:
NSW Health
Related guideline:
GL2007_020 Quality Improvement & Ethical Review: A Practice Guide for NSW
Applicable activities:
Quality Assurance and Quality Improvement projects
Review pathway:
SESLHD Research Office and Low and Negligible Risk Ethics Committee
Target users:
Health professionals undertaking QA/QI activities
Submission method:
Email to SESLHD Research Office
Sections included:
Ethical Risks Checklist, Project Summary, Risk Management
Form parts:
Part A and Part B
Governing policy framework:
NSW Health ethics review policy