Psychological and Institutional Statistics:1219617

Part (a)

  • Report necessary fit indices, and all parameter estimates in standardized metric.

The fit indices reported include Chi-squared, Root Mean Square Error of Approximation (RMSEA), Comparative Fit Index (CFI) and   Tucker Lewis Index (TLI).

  1.  
  1. with corresponding
  1.  
  1.  
  2. Compute reliability coefficient for each subject test (i.e., indicator variable). What do you find?

The standardized Root Mean Square Residual (SRMR) from the analysis is 0.089.

The  implies that the indicators explain only 0.7% of variance.

  • Request modification index > 5, report and explain the results.
Table (a): Modification Index  
StatementsM.I
X2 with X118.292
X3 with X121.739
X3 with X212.356
X4 with X29.547
X4 with X35.2036
X5 with X418.114

These results show that the assumption of no direct relationship between X2 and X1, X3 and X1, X3 and X2, X4 and X2, X4 and X3, X5 and X4 are unreasonable since there seems to be relationship between these variables.

Part (b)

  • Report necessary fit indices, and all parameter estimates in standardized metric

The fit indices reported include Chi-squared, Root Mean Square Error of Approximation (RMSEA), Comparative Fit Index (CFI) and   Tucker Lewis Index (TLI).

  •  
  • with corresponding
  •  
  •  
  • Request modification index > 5, report and explain the results.

There was no modification index greater than 5 implying that the assumption of no direct relationship between the variables is valid.

Part (c)

Yes, the two models are of different versions of each other strictly in terms of the parameters and the latent variables. The difference test Chi-squared are the same for both models  

Part (d)

For one-factor model both Chi-squared are significant implying the model is not a good fit. The RMSEA are also way below the desired 0.9. Hence model one-factor loading is not a good fit. The two factor CFA is a good model since the (1) χ2 is not significant and the RMSEA is close to 0.9. Therefore, the preferred model is the two-factor model.

Part (e)

In order to determine which model between one-factor and two-factor model CFA analysis was performed in M-plus software. The results showed that one-factor model does not fit the data well, as the  and the other modification indices do not meet the desired criteria. On the other hand, the two-factor model gave a non-significant  while the other modification index such as CFI and TLI were equal to 1.0. Therefore, in modeling students marks data, a two-factor model would be appropriate.

Bonus Question

This analysis will be improper when the assumption of no direct relationship between the variables is violated.

Cyber Security

Cyberspace

Most of the interconnected digital technologies which are very much helpful regarding the creation of a virtual world can be termed as cyber space. Most of the online communication activities can be significantly improved using this concept. Cyberspace is increasingly used in diverse categories of activities such as policy making, personnel affairs, public relations and developmental operations. A broad range of participants can interact with each other using cyber space.

1.1 Contribution of cyber space

Cyberspace is very much significant to impose the negative externalities on the economic entities. At the same time, it can also be said that cyberspace play a huge role to improve the economy of the private citizens as well. On the other hand, it can be said that cyber economies is very much useful for all the cyber related decisions.

2. Role of cyber-based economies in modernisation

The prime drivers of modernisation are management of data consumption, elimination of the repetitive tasks, reduction of the code complexity, regulatory requirements, compliance issues gaining agility and the disconnected systems is very much affected due to the cyber based economy.  Creation of new job is one of the prime responsibilities of the cyber based economy in the modernisation process. Cyber economy is very much significant for the growth of the GDP as well. Emergence of new services and new industries across the world is one of the major contribution of cyber economy as well. Workforce transformation and creation of innovative business practices are the other major contribution of cyber economy in the modernisation procedure.

3. Critical infrastructure network 

The critical infrastructure of our society include the healthcare facilities, water, public healthcare and emergency services. It can be said that any kind of cyber attacks can have a huge impact on the each of these critical architectures.

3.1 Impact of cyber attacks 

Cyber attacks can have a huge impact on the public health services such as the power supply industry. Cyber attacks not only causes infrastructure risks but also governance problems as well. Security and the resilience of the electric grids can get affected due to cyber attacks as well. Cyber assets, hardware and the critical equipment of the power supply department can be compromised during cyber attacks. At the same time, the information sharing capabilities of this infrastructure can also be compromised during a cyber-attack.

3.2 Vulnerabilities 

Data of the power supply departments can get compromised during a cyber-attack as a result business strategies cannot be created during the time of crisis. Based on the Sing Health data breach in the year 2018, it can be said that compromise on business data is one of the most significant vulnerability of the cyber security attacks which are conducted by the social engineers. Most of the major critical information which were related to the infrastructure of this healthcare environment were affected due to this cyber attack

4. Impact of disruption of services 

Each component of a Water distribution system such as the sensors as well as the actuators can get compromised due to a cyber-attack. Human machine interfaces and the programmable logic used in the water distribution system can get affected due cyber-attacks as well. As a result, compromise in this system can lead to social and becoming issues, hence it can be said that additional investments are required from the government in the area of cyber warfare so that the network security of the critical infrastructure is improved. National infrastructure can be improved if two way security configurations are incorporated for each of the critical infrastructures.

5. Steps taken by government to address cyber-attacks

Leveraging multifactor authentication all over the public sector organization and the critical architecture is one of the significant steps taken by the government to minimise the chances of a cyber-attack.

Case study

According to (), monitoring all the online activities of the users of the network is very much significant to enhance the security of the national infrastructure.

On the other hand as described by (), critical infrastructure of the public sector offices can be measured using security frameworks.

Most of the cyber security concerns in United Kingdom are addressed by the National Cyber Security Centre. This organization makes the most out of emerging technologies such as Industrial Control Systems to monitor the network security vulnerabilities of the critical architecture.

6. National level structure 

It can be said that the security of the critical architecture can be maintained using co-operative arrangement such as public private partnership with different business communities who understands the insights of social engineering such as the Department of Homeland Security (DHS) in USA.

The role of the cyber security experts is very much responsible for the creation of an incident response plan, it is very much significant to minimise the damage which are already caused due to a security beach. It includes the law enforcements, eradication and recovery and post incident activity.

6.1 Role of military operations 

The attribute of a cyber-attack can be figured out with the help of the intelligence department of the military departments. The attacking protocols of the social engineers can be countered using operational plans created by the IT heads of the military departments.

6.2 Impact of cyber security attacks 

Any sort of cyber attack on the commercial entities which works with the government agencies can have a huge impact the security of the national architecture.

7. Cyber security laws 

Cyber security Act 2018 of Singapore is very much useful to protect the integrity of the data which are access across the private ad policy networks in the country. Singapore is a part of a cyber-security development project which involves global organization such as ASEAN.

Figure 1: Exchange of cyber security norms

Source

8. Role of cyber security agencies 

Cyber security agencies of Singapore works on the collaboration with numerous investigative departments and communities such as Singapore Cyber security Consortium to address or minimise most of the cyber security threats of this country. They are very much significant for the creation of a data security plan protect the organizational data from getting exposed.  

9. Reference

Lorde Discussion – Narrative

Is there any significance of Lorde’s narrative taking place during the Independence Day holiday? Why or why not?

Your discussion must be 250 words in length. One response to another student’s discussion should be at least 100 words in length. Complete these postings by the due date on the syllabus.

NB: PLEASE TO THIS POST BELLOW WITH SEPARATE PAGE

Jozlyn Lara 

Lorde discussion

COLLAPSE

Top of Form

During the time of Lorde’s story, segregation was still on going. Her sister was refused a trip to Washington D.C just because the hotel did not allow colored people to stay. That still didn’t stop them from taking their own trip to Washington D.C.The day they arrived was the fourth of July, they day America gained it’s independence. Even though there were many American’s who had independence there were still people out there who didn’t because of the color of their skin. Humans are Humans, everyone should be treated equally no matter what they look like. But not everyone had or has that same mind set.

Her family decided to stop to get ice cream, but got kicked out just because they were African American. Lorde had so many questions, she knew they had done nothing wrong. She got even more furious when none of her family answered her questions. Her parents had already anticipated it was going to happen. They couldn’t keep Lorde away from the realities of America back then, no matter how hard they tried. Racism is a real problem and is still a on going problem in America. It’s sad to say, racism will probably always be something happening in America. 

The significance of the narrative showed how unfair people of America treated African Americans just cause of their skin color. 

Bottom of Form