{"id":21738,"date":"2025-04-02T10:07:29","date_gmt":"2025-04-02T10:07:29","guid":{"rendered":"https:\/\/academicwritersbay.com\/solutions\/start-offer-intelligence-tech-research-project-purpose\/"},"modified":"2025-04-02T10:07:29","modified_gmt":"2025-04-02T10:07:29","slug":"start-offer-intelligence-tech-research-project-purpose","status":"publish","type":"post","link":"https:\/\/academicwritersbay.com\/solutions\/start-offer-intelligence-tech-research-project-purpose\/","title":{"rendered":"Start Offer Intelligence Tech Research Project Purpose"},"content":{"rendered":"<div class='css-tib94n'>\n<div class='css-1lys3v9'>\n<div>\n<p>Start Offer Intelligence Tech Research Project <br \/> Purpose <br \/> The rationale for this Start Offer Intelligence (OSINT) Project is to make exhaust of publicly accessible sources of files to envision an rising application of know-how and then put together a file valid for dissemination to interested occasions in business and executive (subscribers to a risk intelligence reporting service). <br \/> Overview  <br \/> Your task is to make an OSINT file which affords knowledge regarding the traits of an rising application of know-how and the threats \/ attacks to which it will likely be inclined. The customers of this file non-public an hobby in increasing valid countermeasures to stop attacks by a colossal spectrum of attackers from hobbyists to quasi-consultants and legal entities to effectively organized, nation-say sponsored groups. When capacity, your OSINT must explore the varieties and identities of identified attackers who are inclined to middle of attention on customers and usages of the know-how lined by your file.  <br \/> The basic ask that have to be answered to your OSINT file is: what are the cybersecurity implications (excellent or flawed) of a particular rising application of know-how? <br \/> For this task, your characteristic is that of a risk intelligence research intern working for a risk intelligence provider (non-public company). Your target market for this file will doubtless be subscribers to a cybersecurity risk intelligence reporting service supplied by your employer. These subscribers are essentially senior managers and executives in firms and executive organizations. <br \/> The high-stage visibility to your deliverable methodology that, as well to without considerations accessed web sources and social media, your research have to also encompass research-based mostly mostly journal articles, papers published in conference court docket cases, and doctoral dissertations. Threat research and intelligence reports published by mainstream firms, e.g. Verizon, Forrester, Deloitte, and various others., must also be regarded as for exhaust as valuable sources to your OSINT file. Explore step #3 below Habits Your OSINT Research (below) for additonal info about how many sources are required and what kinds of sources are allowed. <br \/> The next knowledge desires, previously acknowledged by your company\u2019s risk researchers, have to be met by the deliverable for this task. <br \/> (a) Identification and description (traits) of the know-how,   <br \/> (b) Attainable or identified uses of the know-how to toughen or make stronger business operations of firms and executive companies; this entails vogue of merchandise which incorporate the know-how and capacity or identified uses of the know-how to toughen or make stronger cybersecurity, i.e. <br \/> a. uses of the know-how to diminish or arrange risk <br \/> b. uses of the know-how to expand resistance to threats\/attacks <br \/> c. uses of the know-how to diminish vulnerabilities in an existing know-how application  <br \/> (c) capacity or identified uses or exploitation of the know-how by attackers, criminals, terrorists, and various others. to design their desires. <\/p>\n<\/p>\n<p>Instructions are attached.<\/p>\n<p>Template also attached.<\/p>\n<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class='css-6a9esh'>\n<div class='css-eql546'>\n<ul class='css-2imjyh'>\n<li class='css-1960nst'>\n<div class='css-1nylpq2'>\n<div class='css-1yqrwo0'>CSIA459OSINTTechResearchProject2023.docx<\/div>\n<\/p><\/div>\n<\/li>\n<li class='css-1960nst'>\n<div class='css-1nylpq2'>\n<div class='css-1yqrwo0'>CSIA_Paper_TemplateTOCTOF20213.pdf<\/div>\n<\/p><\/div>\n<\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<p>             CSIA 459: Evaluating Emerging Technologies         <\/p>\n<p>             <b>Start Offer Intelligence Tech Research Project<\/b>         <\/p>\n<h2>                          Purpose         <\/h2>\n<\/p>\n<p>The rationale for this Start Offer Intelligence (OSINT) Project is to make exhaust of publicly accessible sources of files to envision an rising application of know-how and then put together a file valid for dissemination to interested occasions in business and executive (subscribers to a risk intelligence reporting service).<\/p>\n<\/p>\n<h2>                          Overview          <\/h2>\n<\/p>\n<p>Your task is to make an OSINT file which affords knowledge regarding the traits of an rising application of know-how and the threats \/ attacks to which it will likely be inclined. The customers of this file non-public an hobby in increasing valid countermeasures to stop attacks by a colossal spectrum of attackers from hobbyists to quasi-consultants and legal entities to effectively organized, nation-say sponsored groups. When capacity, your OSINT must explore the varieties and identities of identified attackers who are inclined to middle of attention on customers and usages of the know-how lined by your file. <\/p>\n<p>The basic ask that have to be answered to your OSINT file is:              <b>what are the cybersecurity implications (excellent or flawed) of a particular rising application of know-how<\/b>?         <\/p>\n<p>For this task, your characteristic is that of a risk intelligence research intern working for a risk intelligence provider (non-public company). Your target market for this file will doubtless be subscribers to a cybersecurity risk intelligence reporting service supplied by your employer. These subscribers are essentially senior managers and executives in firms and executive organizations.<\/p>\n<p>The high-stage visibility to your deliverable methodology that, as well to without considerations accessed web sources and social media, your research have to also encompass research-based mostly mostly journal articles, papers published in conference court docket cases, and doctoral dissertations. Threat research and intelligence reports published by mainstream firms, e.g. Verizon, Forrester, Deloitte, and various others., must also be regarded as for exhaust as valuable sources to your OSINT file. Explore step #3 below              <i>Habits Your OSINT Research<\/i> (below) for additonal info about how many sources are required and what kinds of sources are allowed.         <\/p>\n<p>The next knowledge desires, previously acknowledged by your company\u2019s risk researchers, have to be met by the deliverable for this task.<\/p>\n<p>(a) Identification and description (traits) of the know-how,  <\/p>\n<p>(b) Attainable or identified uses of the know-how to toughen or make stronger business operations of firms and executive companies; this entails vogue of merchandise which incorporate the know-how and capacity or identified uses of the know-how to toughen or make stronger cybersecurity, i.e.<\/p>\n<p>a. uses of the know-how to diminish or arrange risk<\/p>\n<p>b. uses of the know-how to expand resistance to threats\/attacks<\/p>\n<p>c. uses of the know-how to diminish vulnerabilities in an existing know-how application <\/p>\n<p>(c) capacity or identified uses or exploitation of the know-how by attackers, criminals, terrorists, and various others. to design their desires.<\/p>\n<\/p>\n<h2>                          Instructions         <\/h2>\n<\/p>\n<p>Structure your deliverable as a research file. Your file must encompass the following sections:<\/p>\n<p>1. Title page with author and date<\/p>\n<p>2. Desk of Contents (also Desk of Figures if graphics are customary)<\/p>\n<p>3. Government Summary<\/p>\n<p>4. Introduction<\/p>\n<p>5. Abilities Description and Utilization Prognosis<\/p>\n<p>6. Threat Prognosis<\/p>\n<p>7. Summary and Conclusions<\/p>\n<p>8. Reference List<\/p>\n<\/p>\n<h3>                          Resolve an Emerging Utility of Abilities         <\/h3>\n<\/p>\n<p>To start, resolve an rising application of know-how. Functions of know-how that are at uncover in the              <i>rising <\/i>phases encompass:         <\/p>\n<p>\u00b7 5G\/6G Telecommunications Technologies &#038; Implementations (Networks)<\/p>\n<p>\u00b7 Synthetic Intelligence<\/p>\n<p>\u00b7 Self sustaining Automobiles (flooring, sea, or air)<\/p>\n<p>\u00b7 Blockchain Abilities<\/p>\n<p>\u00b7 Data Science <\/p>\n<p>\u00b7 Deep Dwelling Dialog Networks<\/p>\n<p>\u00b7 Graphene<\/p>\n<p>\u00b7 Implantable Clinical Devices (including mind, prosthetics, medication offer, cardiac toughen, and various others.)<\/p>\n<p>\u00b7 Infrastructure for Vivid Cities (surveillance, monitoring, web page online visitors adjust, utilities, and various others.)<\/p>\n<p>\u00b7 Net of Things (in particular Operational Abilities)<\/p>\n<p>\u00b7 Net of Things Devices in Vivid Properties \/ Vivid Buildings<\/p>\n<p>\u00b7 Machine Finding out <\/p>\n<p>\u00b7 Nano machines<\/p>\n<p>\u00b7 Neuromorphic laptop chips<\/p>\n<p>\u00b7 Bodily Unclonable Functions (PUFs) (devices &#038; electrical circuits)<\/p>\n<p>\u00b7 Precision Agriculture (integrated methods utilizing satellite imagery, GPS, Sensors, Robots)<\/p>\n<p>\u00b7 Robot inspectors for physical infrastructures (constructions, roads, railways, pipelines, and various others.) <\/p>\n<p>\u00b7 Wearable Sensors for Dangerous Materials Detection (e.g. CBRNE): Emergency Products and providers Sector<\/p>\n<p>You is probably going to be inspired to see for and compare extra acceptable technologies earlier than deciding upon your know-how replacement for this task.<\/p>\n<p>While you pick out to envision a know-how that&#8217;s no longer on the recommended technologies checklist (look above) or included in the route readings, it is advisable to first request and rep your instructor\u2019s permission.  Your instructor could require that you produce preliminary library searches for research papers and technical papers to point out that it&#8217;s essential to well procure a ample amount of sources to total the task.<\/p>\n<\/p>\n<h3>                          Habits Your OSINT Research &#038; Info Acquisition         <\/h3>\n<\/p>\n<p>             <b>Step 1.<\/b> Review this UMGC library info to permit you remember sources to your OSINT Research:  https:\/\/libguides.umgc.edu\/credibility          <\/p>\n<\/p>\n<p>             <b>Step 2.<\/b> Brainstorm key phrases that it&#8217;s essential to well exhaust to back procure Net sources of info about your chosen know-how. You&#8217;ll likely be in a position to also peep for and review articles and postings in effectively identified cybersecurity trade blogs, info articles, and social media accounts. Explore              https:\/\/agio.com\/newsroom\/the-high-10-cybersecurity-blogs-for-2021\/ and              https:\/\/libguides.umgc.edu\/cybersecurity for lists of sources.   You must procure and exhaust no longer much less than five diversified sources on this category (Net sources).         <\/p>\n<p>             <b>Step 3.<\/b> Use your preliminary put of sources to make extra key phrase lists to make exhaust of in looking out the UMGC library databases for expert journal articles, papers, and other scholarly publications (\u201csources\u2019) which debate your chosen rising application of know-how.  You must procure and file on five (5) or extra Start Sources which you received from Net web sites, social media, and various others. You must also procure and file on an additional five or extra Start Sources which you received from databases which index expert and academic papers (look              https:\/\/libguides.umgc.edu\/scholarly if you occur to is probably going to be no longer clear what this means). The next UMGC library and\/or freely accessible Net databases are identified to non-public valid expert and\/or research-based mostly mostly articles which meet the \u201cdatabases\u201d as offer requirement:         <\/p>\n<p>\u00b7 ACM Digital Library              https:\/\/dl-acm-org.ezproxy.umgc.edu\/          <\/p>\n<p>\u00b7 Dissertations &#038; Theses (Pro Quest)              https:\/\/www-proquest-com.ezproxy.umgc.edu\/pqdtglobal\/developed?accountid=14580          <\/p>\n<p>\u00b7 IEEE Computer Society Digital Library              https:\/\/www-laptop-org.ezproxy.umgc.edu\/csdl\/house         <\/p>\n<p>\u00b7 Research Gate              https:\/\/www.researchgate.safe\/ (required free story to access papers)         <\/p>\n<p>\u00b7 ARVIX              https:\/\/arxiv.org\/          <\/p>\n<p>\u00b7 Science Command              https:\/\/www-sciencedirect-com.ezproxy.umgc.edu\/search          <\/p>\n<p>Since the point of this OSINT search is to procure knowledge about              <i>rising<\/i> features of know-how, your sources must non-public a publication date of 2018 or later (2018, 2019, 2020, 2021, 2022, 2023). For papers listed in Science Command, it&#8217;s essential to additionally exhaust papers that are marked \u201cIn Press.\u201d          <\/p>\n<p>While you occur to could want finished your research for this task             <b>, you&#8217;ll need to non-public 15 or extra effectively chosen, high quality, authoritative sources which it&#8217;s essential to exhaust to meet the screech material necessities of this mission. No longer much less than 5 of these sources have to be from the expert literature<\/b>, i.e. gaze-reviewed journal articles, executive or corporate paperwork or reports, trade publications, and various others. Explore               https:\/\/libguides.umgc.edu\/credibility and              https:\/\/libguides.umgc.edu\/scholarly for additonal info about evaluating sources.          <\/p>\n<p>5. Resolve if you occur to could want to add photos or no longer (including images, charts, graphics, and various others.). While you produce encompass photos, it is advisable to provide clear that every such merchandise has a caption and that the caption entails the in-text quotation for the offer of the image (add the offer to your checklist of references). The image have to be readable (in middle of attention, no longer blurry) and of an appropriate measurement. Any screech or screech customary MUST enormously add to the screech material and back the reader to love your diagnosis. Make no longer add gratuitous imagery (no \u201csee candy\u201d or ornamental photos). Make no longer add photos valid to expand your page depend!<\/p>\n<p>Present: if you occur to could want captioned items, it is advisable to encompass a Desk of Figures after your Desk of Contents.<\/p>\n<h3>                          Striking It All Collectively         <\/h3>\n<\/p>\n<p>1. Search the suggestion of the grading rubric for specific screech material and formatting necessities for this task.<\/p>\n<p>2. Your 8 to 12 page OSINT file must be expert in appearance with fixed exhaust of fonts, font sizes, margins, and various others. You must exhaust headings and page breaks to organize your paper. Title page, table of contents, and reference checklist produce no longer depend towards the page depend. Be aware that your target market will income extra from a transparent, concise, and apt presentation of files. Including extra screech material valid to artificially meet a page depend (or exceeding the recommended length by including filler) is no longer going to boost your grade.<\/p>\n<p>3. Your paper must exhaust fashioned terms and definitions for cybersecurity.  <\/p>\n<p>4. The CSIA program recommends that you apply fashioned APA formatting since this affords you with a doc that meets the \u201cexpert appearance\u201d necessities. APA formatting strategies and examples are chanced on below Direction Resources. An APA template file (MS Note layout) has also been supplied to your exhaust. CSIA_Paper_Template(TOC+TOF,2021).docx. \u00a0This file has the vogue gallery put up so as that it&#8217;s essential to well exhaust the built-in parts of MS Note to generate a Desk of Contents and, if crucial, a Desk of Figures.<\/p>\n<p>5. Your submitted file have to encompass a separate duvet page on the starting which affords the task title, your title, and the due date. Your reference checklist have first of all a fresh (separate) page on the high of your file.<\/p>\n<p>6. You is probably going to be anticipated to jot down grammatically valid English in every task that you post for grading. Make no longer turn in any work without (a) utilizing spell take a look at, (b) utilizing grammar take a look at, (c) verifying that your punctuation is correct and (d) reviewing your work for valid observe utilization and properly structured sentences and paragraphs.  <\/p>\n<p>7. You is probably going to be anticipated to credit ranking your sources utilizing in-text citations and reference checklist entries. Both your citations and your reference checklist entries have to apply a fixed quotation vogue (APA, MLA, and various others.). <\/p>\n<p>8. Explore the \u201cExamples\u201d portion (below) for knowledge about straightforward  create a Desk of Contents and Desk of Figures. The built-in back for MS Note can even toddle you via establishing these screech material substances to your OSINT file.<\/p>\n<\/p>\n<h2>                          Examples         <\/h2>\n<\/p>\n<p>Desk of Contents Purpose 1 Overview 1 Instructions 2 Resolve an Emerging Utility of Abilities 2 Habits Your OSINT Research &#038; Info Acquisition 3 Striking It All Collectively 4 Examples 5 References 7 <\/p>\n<p>The Desk of Contents (TOC) above used to be generated utilizing MS Note\u2019s References > Desk of Contents characteristic (look Resolve 1). You must make exhaust of the headings kinds from the Vogue Gallery in focus on in confidence to non-public the TOC generated for you.<\/p>\n<p>The Desk of Figures (References > Insert Desk of Figures) requires that you exhaust the Vogue Gallery\u2019s \u201ccaption\u201d vogue. An example of the Vogue Gallery window is shown in Resolve 2.<\/p>\n<p>When utilizing Heading or Caption Kinds in the Vogue Gallery, it&#8217;s essential to well (must) trade them to Dim Font, 11 or 12 point, and add condo earlier than and after. Use the back characteristic in MS Note if you occur to provide no longer already know straightforward  produce these adjustments.<\/p>\n<\/p>\n<p>                          Resolve 1. Reference Tab in MS Note (Microsoft, 2021)         <\/p>\n<\/p>\n<\/p>\n<p>                          Resolve 2. Vogue Gallery in MS Note (Microsoft, 2021).         <\/p>\n<\/p>\n<h2>                          References         <\/h2>\n<\/p>\n<p>Microsoft. (2021). Microsoft Note (Net page of job 365). Redmond, WA: Creator.<\/p>\n<p>Copyright \u00a9 2022 by College of Maryland Global Campus. All rights reserved.<\/p>\n<div>\n<h2>image1.png<\/h2>\n<\/p>\n<\/div>\n<div>\n<h2>image2.png<\/h2>\n<\/p>\n<\/div>\n<div>\n<h2>image3.png<\/h2>\n<\/p>\n<\/div>\n<p>                ,<\/p>\n<div>\n<p>Running head: PAPER TEMPLATE  1  <\/p>\n<\/p>\n<p>Title of Paper  <\/p>\n<p>Your Title  <\/p>\n<p>Month Day, three hundred and sixty five days  <\/p>\n<\/p><\/div>\n<div>\n<p>2  <\/p>\n<p>Running head: PAPER TEMPLATE  <\/p>\n<\/p>\n<p>Desk of Contents  <\/p>\n<p>Desk of Figures \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026 2  <\/p>\n<p>Introduction \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026. 3  <\/p>\n<p>Prognosis\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026. 3  <\/p>\n<p>First Sub-portion \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026. 4  <\/p>\n<p>2nd Sub-portion \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026 4  <\/p>\n<p>Summary and Conclusions \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026. 4  <\/p>\n<p>References \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026 5  <\/p>\n<\/p>\n<p>Desk of Figures  <\/p>\n<\/p>\n<p>Resolve 1. References Tab in MS Note (Microsoft, 2021). \u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026\u2026. 4  <\/p>\n<\/p>\n<\/p><\/div>\n<div>\n<p>3  <\/p>\n<p>Running head: PAPER TEMPLATE  <\/p>\n<\/p>\n<p>Introduction  <\/p>\n<p>This template used to be built from APA 6 th <\/p>\n<p>  model necessities. You could proceed to make exhaust of it in  <\/p>\n<p>CSIA classes to your projects and papers even supposing the university has officially adopted APA  <\/p>\n<p>model 7. The requirement for CSIA assignments is that your work be expert in  <\/p>\n<p>appearance and that sources are cited and referenced utilizing a system or vogue that&#8217;s fixed  <\/p>\n<p>and affords ample knowledge so as that readers can fact-take a look at your work.  <\/p>\n<p>Paragraph. Use the Fashioned Indent vogue to indent your paragraphs as First Line Indent by  <\/p>\n<p>\u00bd lope. This vogue can even double condo between lines. Make no longer hit the ENTER key till you  <\/p>\n<p>non-public finished your paragraph. Let MS Note wrap lines within the paragraph itself.  <\/p>\n<p>To your reference portion, exhaust the Reference vogue from the vogue gallery to indent your  <\/p>\n<p>entries as Striking Indent by \u00bd lope. This vogue can even double condo your references for you.  <\/p>\n<p>Make NOT hit the ENTER key till you advance to the END of a reference entry. While it&#8217;s essential to well want to  <\/p>\n<p>power MS Note to wrap long URLs, exhaust the Insert->Symbol characteristic to insert a no width optional  <\/p>\n<p>destroy character. Or, switch on paragraph marks (so as that it&#8217;s essential to well look the image for the character)  <\/p>\n<p>and reproduction\/paste this character (in an instant to the left of the outlet parenthesis for this clause  <\/p>\n<p>it is advisable to appear two gray squares, one within the replacement). While you produce no longer look the character, then you  <\/p>\n<p>produce no longer non-public paragraph marks was on (click on on the \u00b6 image in the paragraph formatting neighborhood  <\/p>\n<p>on the Dwelling Ribbon).  <\/p>\n<p>Prognosis  <\/p>\n<p>Paragraphs. Use sub-headings as fundamental and easiest if you occur to could want no longer much less than two sub-sections  <\/p>\n<p>under a foremost portion heading. While you is probably going to be including figures, produce clear that you encompass a  <\/p>\n<p>caption below each one (look Resolve 1). <\/p>\n<\/p><\/div>\n<div>\n<p>4  <\/p>\n<p>Running head: PAPER TEMPLATE  <\/p>\n<\/p>\n<p>First Sub-portion  <\/p>\n<p>Paragraph  <\/p>\n<\/p>\n<p>Resolve 1. References Tab in MS Note (Microsoft, 2021).  <\/p>\n<p>2nd Sub-portion  <\/p>\n<p>Paragraph  <\/p>\n<p>Summary and Conclusions  <\/p>\n<p>Paragraph  <\/p>\n<\/p><\/div>\n<div>\n<p>5  <\/p>\n<p>Running head: PAPER TEMPLATE  <\/p>\n<\/p>\n<p>References  <\/p>\n<p>Microsoft. (2021). Microsoft Note (Net page of job 365). Redmond, WA: Creator.  <\/p>\n<p>Reynolds, G. W. (2010). Ethics in the toddle in the park age (Third ed.). Boston, MA: Direction  <\/p>\n<p>Abilities.  <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Start Offer Intelligence Tech Research Project Purpose The rationale for this Start Offer Intelligence (OSINT) Project is to make exhaust of publicly accessible sources of files to envision an rising application of know-how and then put together a file valid for dissemination to interested occasions in business and executive (subscribers to a risk intelligence reporting [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-21738","post","type-post","status-publish","format-standard","hentry","category-solutions"],"_links":{"self":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts\/21738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/comments?post=21738"}],"version-history":[{"count":0,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/posts\/21738\/revisions"}],"wp:attachment":[{"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/media?parent=21738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/categories?post=21738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/academicwritersbay.com\/solutions\/wp-json\/wp\/v2\/tags?post=21738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}