Southern New Hampshire Univer

Overview: This assignment will introduce you to risk analysis and the purpose of the threat assessment process through a case study. ? Begin by reviewing Chapter 6, Section 6.1 (chart) and Section 6.4 (risk formula), in Understanding, Assessing, and Responding to Terrorism. ? Then, in https://www.ojp.gov/pdffiles1/bja/210680.pdf, read the following sections: o “Identifying Critical Infrastructure: What to Protect” (which is located in the “Introduction” section) for background. o The case study “A Tale of One City” (which is located in the “Risk Management” section of the document), which will be used as the case study scenario mentioned below. 

The risk formula for this course will be as follows: Risk = Threat x Vulnerability x Consequence (R = T x V x C) 

These are the five steps in the risk management process you will use in this course and apply to this assignment: 

? Asset Assessment—Identifying Critical Infrastructure 

? Assess Threats—A systematic effort to identify and evaluate existing or potential threats to a jurisdiction and its targets.

? Assess Vulnerability—The identification of weaknesses in physical structures, personnel protection systems, processes, or other areas that may be exploited by terrorists.

? Assess Risk (Criticality and Consequence Analysis)—Criticality assessments help planners determine the relative importance of assets, helping to prioritize the allocation of resources and the most critical assets. An essential part of the risk equation is considering the consequence of the loss of or serious damage to important infrastructures, systems, and other assets. 

? Determine Countermeasures—Countermeasures, such as expansion of staffing, installation of equipment and new technology, or target hardening, must be evaluated or tested periodically to ensure that improvements are working as intended (Assessing and Managing the Terrorism Threat, 2005). 

Case Study: Using the details from the case study scenario “A Tale of One City”, you are the chief of police for a community of 75,000. The mayor has tasked you with conducting a risk assessment of critical infrastructure within your jurisdiction. You learn that the mayor has raised questions regarding your department’s recent risk assessment report. 

Prompt: Draft a paper summarizing the information that you would present to the mayor. Specifically, the following critical elements must be addressed (use the case study for details): 

? Explain to the mayor the five main steps to risk management that your team applied in the risk management process. Provide details about how these steps relate to the case study. 

? Identify the key community partners that your team worked with. 

? Identify the regional law enforcement partners that your team worked with. 

? List the critical infrastructures that were identified within the jurisdiction in order of significance to the community, from least significant to most significant. Referring to the case study, explain why they were listed in that order. 

? Use a scale of low, moderate, and high to identify any threat levels (T), vulnerability levels (V) or criticality levels (C) for key infrastructures in the scenario.

? What did the team identity as the major critical infrastructure risk for the community? Explain why they identified this particular risk. 

? Explain the importance of objective assessment in this process.  

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

Successful mobile apps are all designed to benefit users. If a user  is going to engage with an app repeatedly, the product needs to help  them meet their goals and should offer a great deal of value. In order  for an app to accomplish this, the creator of an app needs to take time  to investigate their target audience so they can understand who their  users are and what needs they have. For this assignment, you will  analyze an app to determine what development choices were made in order  to meet a user’s needs.

Prompt

When selecting a mobile app to analyze for this assignment, think of  apps you use often and understand well. This will allow you to form  deeper connections with the topics we are tackling this week and may  help you see something you use every day from a new perspective.  However, if you wish, you may instead search online for an app you are  less familiar with and try to make your assessment from a more  objective, outside perspective. Note that in this case, it does not  matter what platform (Android, Apple, or other) the app you choose comes  from.

Specifically, you must address the following rubric criteria:

  • Describe the design and purpose of the app you selected.  Begin by looking at the app overall and think about what primary task  the app has been created to help users achieve. Identify the overarching  goal you believe the app was created for. Also discuss the design  elements that lead you to draw this conclusion. Think about what the app  looks like and how that signifies to users what the app will enable  them to do.
  • Identify the user needs that the app is designed to address.  You should identify at least three needs the app helps users address.  Each app’s overall purpose, which you have already looked at, is  supported by smaller tasks a user can do within the app. For example, a  maps app may have the overall goal of providing location information to a  user. This might be supported by how it identifies local restaurants or  offers directions from one address to another via varying pathways.  Think about the following questions as you craft your response: 
    • What users does this app serve?
    • What might a user want to accomplish with this app?
    • How does the app support those user goals?
    • Is the app trying to persuade a user to take an action?
    • What is the app’s business objective?
  • Explain what specific features the app has tailored to meet its users’ needs.  After you have thought about the user needs that the app addresses,  look at the design elements or features which were created to support  them. Ask yourself, are there clear buttons that allow users to take  actions? Does the screen’s layout allow users to effectively navigate  content? Think about all the smaller details that make up the app’s  interface and consider how those individual components operate in a way  that is effective for users.
  • Discuss what user information would be helpful for an app developer to know before designing.  The analysis you just completed relied on assumptions about who the  user is, but the app developer would need to have a much more detailed  concept of the user based on research and data. If you were the one  responsible for designing the app you selected, what information would  you want to know about your users’ goals, needs, and experiences?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Respond to two colleagues who chose a different area of focus in beginning treatment in the following ways:

Explain how the DSM-5 Z codes (other conditions that may be a focus of clinical attention) identified in each post influenced your and your colleague’s decisions.

Share any insights you gained from watching your colleague’s video.

Colleague 1: Britney L.

  • Provide the full DSM-5 diagnosis for the client. Remember, a full diagnosis should include the name of the disorder, ICD-10-CM code, specifiers, severity, and the Z codes (other conditions that may be a focus of clinical attention). Keep in mind a diagnosis covers the most recent 12 months.

309.28 (F43.23) Adjustment disorder with mixed anxiety and depressed mood, acute

Z. 630. Relationship distress with spouse or intimate partner

  • Explain the diagnosis by matching the symptoms identified in the case to the specific criteria for the diagnosis.

Criteria A: The development of emotional or behavioral symptom in response to an identifiable stressor(s) occurring within 3 months of the onset of the stressor (s).

  • Identify the first area of focus you would address as client’s social worker and explain your specific treatment recommendations. Support your recommendations with research.

The first area I would address with Marvin as a Social Worker would him acknowledging that he cheated on his wife and realized that he got HPV from being intimate with his colleagues, I would also incorporate Cognitive Behavioral Therapy (CBT) as a treatment plan, along with Psychotherapy, which is talk therpay because I would work on him with building up the courage to tell his wife that he cheated on her with a colleague. According to Vinopal twenty percent of men cheat compared to 13 percent of women. According to the U.S. General Social Survey men cheat, due to causal infidelity .

  • Explain how you would manage client’s diverse needs, including his co-occurring disorders.

I would encourage that Marvin attends a support group so he could share his story, and gain insight from other men on why he chose to have an affair on his wife with his colleague. Marvin has no co-occurring disorders.

  • Describe a treatment plan for client, including how you would evaluation his treatment.

A treatment plan for Marvin would include weekly therapeutic session twice a wee individually, then I would encourage couple’s session after Marvin needs are met pertaining to individual session. I would evaluate his treatment by using an assessment sheet on his moods, depression and anxiety using a rating scale. I would also evaluate his treatment plan by using stress management, coping skills and social support.

Colleague 2: Kimberly

The client is a 35-year-old African American man with an occupation of journalism and resides in Nashville, Tennessee. The client is in a marriage with his wife of two years and has no children. He has not had psychiatric help in the past and reports his maternal grandmother of having depression. The client was carried away and had sex with someone other than his wife during a business trip and has HPV. The client feels he does not relate to his wife and has not told her about the event taking place during the business trip and about having HPV.

995.85 (T74.01XA) Suspected partner neglect due to the client feeling they do not relate to his spouse and cannot open up to her. The client also shows signs of PTSD 309.81 (F43.10). Reason for this diagnosis is due to the feeling of sadness, having fatigue and headaches, which may have manifested from the flash backs, and guilt for not talking to his wife about the activity taken place during the business trip and contracting HPV. Another diagnosis is generalized anxiety disorder (300.02) (F41.1). The client shows symptoms of fatigue, distress, and rumination about the outcome of sharing about the event to his wife. The client feels he would “act out and maybe negatively impact” his wife and marriage with her.

The first area of focus I would address to the client is the importance of communicating to your spouse about an infection before having unprotected sex. To approach this, it is obvious the client does not have the courage to talk to his wife about the incident happening during a business trip. I would recommend therapy focusing on the client’s marriage and ways to avoid infidelity. The client having therapy with his wife may show teach them how “committed they are to the relationship” (GoodTherapy, n.d.). There is also an opportunity for the encouragement of talking about the strengths and the weakness of the relationship and recall patterns they would like to change. Another to address is the action of infidelity. Before it occurs, it may be helpful for the client to understand about an aspect of themselves they are trying fulfill, such as feelings of loneliness and trying to connect or low self-esteem (GoodTherapy, n.d.).

CBT may help manage with the flashbacks and the anxiety the client is exhibiting. CBT may be used to challenge the client’s thoughts about themselves and get into depth with themselves before performing an action with negative consequences (GoodTherapy, n.d.).

Along with marriage counseling, CBT, after 8 sessions, shows effectiveness with or without medication (Therapist Aid, n.d.). The Dyadic Adjustment Scale (DAS) can be used to measure the quality of a relationship between a couple. According to Huston (2017), the DAS has been used since 1976 and provides a good comparison of success rates now versus those from past decades.

References

GoodTherapy. (n.d.). Affair recovery. Retrieved from https://www.goodtherapy.org/learn-about-

therapy/issues/infidelity/recovery#:~:text=They%20may%20help%20the%20couple,also

%20help%20clarify%20the%20relationship.&text=Therapists%20can%20help%20peopl

e%20who,through%20feelings%20of%20self%2Dblame.

Huston, M. (2017, December 6). Couples therapy: does it really work? How to predict your

chances of success in couples counseling. Retrieved from

https://www.psychologytoday.com/us/blog/in-it-together/201712/couples-therapy-does-

it-really-work

Therapist Aid. (n.d.). Treating anxiety with CBT. Retrieved from

https://www.therapistaid.com/therapy-guide/cbt-for…

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Respond to at least two colleagues in the following ways:

  • Based on the needs your colleague identified, explain some of the factors the mental health community could address in both types of traumatic events.
  • Explain skills your colleague could develop to address the traumas described in their articles.

Colleague 1: Tiffany

Mass shootings appear to be happening more and more these days. With that being said the treatment needed by individuals involved is only going to continue to increase. “Simply by definition, mass shootings are more likely to trigger difficulties with beliefs that most of us have, including that we live in a just world and that if we make good decisions, we’ll be safe” (Novotney, 2018). “Research also suggests that mass shooting survivors may be at greater risk for mental health difficulties compared with people who experience other types of trauma, such as natural disasters. “The National Center for PTSD estimates that 28 percent of people who have witnessed a mass shooting develop post-traumatic stress disorder (PTSD) and about a third develop acute stress disorder” (Novotney, 2018). A study conducted after the 2008 shootings on NIU’s campus, “found that although a large percentage of mass shooting survivors were either resilient or displayed only short-term stress reactions, about 12 percent reported persistent PTSD, a number that’s higher than the average prevalence of PTSD among trauma survivors as a whole” (Novotney, 2018). After the initial shock wears off survivor’s typically develop a number of symptoms such as fear, anger, anxiety, difficulty paying attention, depression and disturbed sleep. This is the phase where we can step in and provide the much needed supports. There are two programs out there that help survivors rebuild the skills needed to cope with the trauma. These programs help people not only with coping skills but also how to rebuild their faith in the community as a whole. The “two evidence-based programs are often used to help survivors manage their stress are: the Cognitive Behavioral Intervention for Trauma in Schools (CBITS) and the Skills for Psychological Recovery (SPR) programs” (Novotney, 2018).

Now when it comes to interpersonal trauma such as childhood sexual abuse, things are much different. According to a recent study its estimated that “8%−12% of children and adolescents in the United States have experienced at least one type of sexual assault in their lifetime” (Hanson & Wallis, 2018). Many of these victims suffer with “posttraumatic stress disorder, including re-experiencing symptoms (e.g., nightmares, frequent stomachaches when reminded of the abuse), avoidance of thoughts, feelings, or reminders of the abuse, negative thoughts and feelings (e.g., self-blame about what happened, loss of interest in activities, feeling alone and isolated), and trauma-related arousal (e.g., increased irritability, difficulty sleeping and concentrating in school)” (Hanson & Wallis, 2018). A well-known treatment for this kind of trauma is trauma-focused cognitive-behavioral therapy. This is where the child and their parent would meet with the counselor on a weekly basis to talk about the trauma related symptoms they are experiencing. “An important component of trauma-focused CBT is the inclusion of the caregiver in sessions as a way to build support, teach the same skills being taught to the child, increase communication about the traumatic event, and increase the likelihood that skill acquisition would generalize to the home environment” (Hanson & Wallis, 2018). Even with these interventions it’s important to remember that the child was most likely exposed to the sexual trauma multiple times. There for symptoms can present well into adulthood.

We can clearly see that there is a big difference between the two traumas. The mass shooting is over in 10-15 min and most people only experience this one. While the childhood sexual trauma most likely occurred over a longer period of time. However, with that said some of the psychological impacts are very much the same with both. The difference seems to be that the mass shooting survivors tend to recover faster and their symptoms are not as severe. It was a trauma that was not expected and occurred quickly. Often times the children can be groomed for months prior to the assault taking place. Many times the perpetrator makes the child feel about themselves or that they will harm their family if they say something.

References

Hanson, R. F., & Wallis, E. (2018). Treating Victims of Child Sexual Abuse. American Journal of Psychiatry, 175(11), 1064–1070. https://doi.org/10.1176/appi.ajp.2018.18050578

Novotney, A. (2018, September). What happens to the survivors? Https://Www.apa.org. https://www.apa.org/monitor/2018/09/survivors

.

Colleague 2: Kimberly


  • Post the APA references for the two studies you located.

Haugen, P. T., Splaun, A. K., Evces, M. R., & Weiss, D. S. (2013). Integrative approach for the treatment of posttraumatic stress disorder in 9/11 first responders: three core techniques. Psychotherapy (Chicago, Ill.), 50(3), 336–340. https://doi.org/10.1037/a00325264344. https://doi.org/10.3390/ijerph17124344

Hanson, R. & Wallis, E. Treating Victims of Child Sexual Abuse. American Journal of Psychiatry 2018 175:11, 1064-1070

  • Provide a brief description of the traumatic events, including a summary of how they affected the individuals involved.

Among human-made disasters, terrorist events, and mass murders, the attack on the World Trade Center (WTC) on September 11th, 2001 (9/11) stands out as an event resulting in nearly 3000 deaths on the day of the attacks, as well as extensive long-term health effects. Those who witnessed these events and have lived are facing PTSD as well as other extensive long-term health effects.

Childhood sexual abuse is generally defined as a form of child abuse that involves sexual activity. The U.S. Centers for Disease Control and Prevention (CDC) defines childhood sexual abuse as “any completed or attempted (noncompleted) sexual act, sexual contact with, or exploitation of a child by a caregiver.” Childhood sexual abuse has been associated with increased risk for a multitude of acute and long-term psychological and physical health problems, including depression, posttraumatic stress, and substance abuse problems, as well as sexual revictimization in adolescence and adulthood.

  • Describe the interventions discussed in the articles and explain how they addressed the psychosocial issues and needs of the individuals affected by the trauma.

In this article one of the interventions discussed was integrative psychosocial intervention. integrative psychosocial intervention uses a more active therapeutic stance than most psychodynamic therapies and strategic use of select CBT interventions. The primary goal is to assist individuals in coming to terms with the unique, idiosyncratic meaning of the event to which they have been exposed.

In this article one of the interventions discussed was a trauma-focused treatment that have empirical support for children and adolescents are cognitive-behavioral therapies, with several common cross-cutting elements. These elements include psychoeducation about trauma and its impact (e.g., PTSD); affective modulation skills, such as relaxation and controlled breathing; gradual exposure to trauma memories; and cognitive processing to address unhelpful or inaccurate cognitions, such as guilt or self-blame.

  • Explain the effectiveness of the interventions, as stated in the articles.

As stated in the article these interventions are components of a cohesive, integrative treatment combined with elements of cognitive-behavioral therapies tailored to this population. This treatment is to help the patient to, “reestablish a sense of purpose and meaning in life, and hope for the future, in spite of the fear and loss inspired by the trauma”

As stated in the article repeated exposure to details of the trauma supports the individual in dealing with the trauma related emotions and helps them improve by processing the traumatic event. which has been demonstrated to facilitate recovery.

  • Analyze and discuss the similarities and differences in the individuals’ needs depending on whether the issues occurred due to a national traumatic event or an interpersonal trauma.

There were several similarities within the articles, no matter if the trauma was faced individually or on a national level there is still support needed to over come the issues that they faced. One difference is that on a national level everyone knows about the trauma that you faced therefore it is easier for the individual to seek help. Whereas those who faced it on a personal level they have to be able to seek support, without the social worker already having knowledge of the event.

Kimberly Daniels

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Competency

In this project, you will demonstrate your mastery of the following competencies:

  • Explain the concepts of virtualization
  • Explain the concepts of cloud based architecture

Scenario

The company you work for, Packages Plus Delivery (PPD), currently houses its physical computing environments on site. Packages Plus Delivery is growing, including the number of packages delivered and the number of employees hired each quarter. As a result of this growth and to better meet the needs of the clients, organizational leadership recently made the decision to virtualize all computing environments.

Leadership is deciding between internal virtualization and the use of an external vendor. They are also considering a move to cloud-based architecture but want to know more about the risks and cost benefits of moving to a cloud environment.

As a virtual solutions analyst at Packages Plus Delivery, you serve on a Virtualization Transition Committee. This group has been asked to create a presentation that emphasizes how the decision to move to virtualization will improve business strategy, and what the options are if the company considers moving the infrastructure to a cloud environment. Your presentation will ensure that leadership makes an informed decision.

Directions

You have been asked to create a presentation that supports the company’s decision to move to virtualization. Within the presentation, you will need to address each of the following topics in order to inform leadership:

  1. Describe how the company’s decision to move to a virtual computing environment will impact its business strategy. If you use sources, be sure to provide a citation.

You must include:

  • The benefits of your company’s decision to move to a virtual computing environment
  • The constraints of the decision to move to a virtual computing environment
  • An explanation of how moving to virtualization will impact the scalability of the business
    • The costs of moving to virtualization
    • The hardware and software, and other technologies involved
  1. In order to provide the most detailed information, you need to compare the implications of the organization moving to a virtual environment using its hardware servers in-house with the implications of using a third-party vendor to virtualize. You may create a visual (such as a Venn Diagram) or write a passage to explain these concepts. You will need to compare the following factors and describe the advantages, disadvantages, and risks associated with each:
  • Cost: equipment such as hardware and software, maintenance (i.e., upgrades and backups), licensing, security (i.e., shared responsibility, on premises)
  • Capacity
  • Agility
  • Service availability
  1. As the company moves toward virtualization, you want to inform leadership of cloud-based architecture by describing the cloud service models that are available.

You must describe:

  • IaaS
  • PaaS
  • SaaS

For each cloud service model, you must:

  • Explain how it supports virtualization
  • Advantages for organizations
  • Disadvantages for organizations
  1. Describe different types of cloud deployment models that the company can deploy.

You must include:

  • The benefits of each cloud deployment model
  • The constraints of each cloud deployment model
  • An explanation of how each cloud environment impacts the scalability of the business
    • The costs of moving to that type of deployment model
    • The training involved in moving to that type of deployment model

What to Submit

To complete this project, you must submit the following:

Presentation
Your presentation should be submitted on a file that your instructor can easily access (.ppt, PDF, .doc).

Your presentation must include:

  • The evidence that supports your company’s decision to move to virtualization
  • A comparison of creating a virtual environment in-house compared to using an external vendor
  • Information on the various cloud service models
  • Description of cloud deployment model options

Supporting Materials

The following resource(s) may help support your work on the project:

Packages Plus Delivery Images
You are welcome to use these images of the company’s logo to enhance your presentation. 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview: For Milestone Two, you will establish the context for your healthcare product or service, and analyze the market. To establish the context, you will describe the industry segment, describe your target markets, and specify the marketing goals and objectives. In analyzing the market, you will conduct a strengths, weaknesses, opportunities, and threats (SWOT) analysis, assess the competitors in the market, and determine the current market position.

Prompt: Establish the context for your healthcare product or service, and analyze the market. Specifically, the following critical elements must be addressed:

  1. Establish the Context
    1. Determine the marketing goals of your initiative. You should develop at least three specific objectives that apply best practices and align to theorganizational mission and vision.
    2. Analyze the industry segment for your healthcare product or service. Include all relevant details related to population segment anddemographics, market size, psychographic or health status segmentation, regulatory influences, payer mix, and key success factors.
    3. Identify and describe your target markets. Be sure to include all relevant details related to their demographics, characteristics, preferences, andconsumer behaviors. In any area where you are lacking critical information, explain the type of data that you would collect to fully understand your target markets.
  2. Market Analysis
    1. Conduct a SWOT analysis for your selected healthcare product or service. Be sure to thoroughly analyze the strengths, weaknesses,opportunities, and threats by including at least three items in each category.
    2. Assess your organization’s competitors using specific supporting examples. You should address at least two competitors, and discuss at leastthree strengths and weaknesses for each.
    3. Based on your SWOT and competitor assessment, draw informed conclusions about your organization’s current market position and justify yourclaims with specific supporting examples.

page2image1085413408

Rubric

Guidelines for Submission: Your draft must be submitted as a 4- to 5-page Microsoft Word document with double spacing, 12-point Times New Roman font, one- inch margins, and at least three sources cited in APA format.

https://hcsmmonitor.com/2020/12/31/how-to-set-smar…

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview: This milestone focuses on the topic of this week’s lessons: compensating employees. Using the material on compensation provided in this week’s lesson and the case study, write a short paper in which you:

  •  Describe the compensation philosophy of Maersk and how the market influences this philosophy.
  •  Determine the value of salary surveys to an organization.
  •  Describe the advantages of discretionary benefits to Maersk.Guidelines for Submission: Your submission should be two pages in length and double-spaced using 12-point Times New Roman font. Be sure to list your references at the end of your paper. Submit journal assignment as a Word document.https://www.shrm.org/resourcesandtools/hr-topics/b…
  • https://www.shrm.org/resourcesandtools/hr-topics/b…
  • Module Four explored various aspects of performance management. This module takes the next step by looking at employee compensation, which is often in part driven by an employee’s performance appraisal. But compensation means much more than just an hourly wage or salary. HR leaders know that to remain competitive, organizations need to think strategically in terms of all forms of compensation. Being strategic with employee compensation will determine the kind of employee a business will attract, allowing it to compete successfully for the best people (Lister, 2015).
    As Snell, Morris, and Bohlander observe, “Developing a compensation strategy requires that the organizational objectives are first analyzed. What does the company want to be known for?” (2015, p. 346). Some companies strive to have the highest pay in their industry, believing this approach will enable them to attract and retain the best talent. Others choose to fall somewhere in the middle, while the rest intentionally pay under the market rate, often attempting to have their benefit package make up the difference.
    But external comparisons are not the only consideration. Employers need to be mindful of three forms of pay equity impacting employee perception:
    External equity: Employees compare their pay level to others doing similar work for different employers
    Internal equity: Employees assess how their pay compares to others in different positions in their organization
    Individual equity: Employees compare themselves to co-workers in their organization with the same job title (Snell, Morris, & Bohlander, 2015, p. 350).
    Attracting and retaining key talent requires that HR leaders and senior management do their best to balance all three forms of pay equity. For employers with a decentralized hiring process, it can be especially difficult to achieve internal equity when there is no oversight of new hire pay rates by HR staff.
    Other forms of compensation are typically left to the organization’s human resources staff to develop and maintain. The U.S. Bureau of Labor Statistics reported in March 2015 that private industry employers spent an average of $31.32 per hour worked for total employee compensation. Wages and salaries accounted for just under 70 percent of these costs, while averaged benefits represented slightly more than 30 percent (Bureau of Labor Statistics, 2015).
    Take a moment to reflect on this statistic using your own job. Using the 30% average, what is your benefit package worth? Does the figure surprise you? If so, you are not alone. Benefits consultants advise employers to educate employees on the value of their benefit offerings. A good example of a company that realized it needed to heed this counsel is Credit Suisse. The value of its benefit package put the company in the top 75th to 80th percentile, yet an employee engagement survey showed that employee satisfaction with the benefit package was only 55–58 percent (HR Enwisen, 2012).
    It is no wonder that benefits account for 30% of employers’ compensation costs. A sample total compensation statement from SHRM lists the following benefits employers offer for employees and their families:
    Medical benefits
    Vision benefits
    Vacation leave
    Holiday leave
    Disability insurance
    Employee assistance plan
    Retirement
    Dental benefits
    Flexible spending accounts
    Sick leave
    Personal days
    Life insurance
    Social security (SHRM, 2014)
    Other sources expand this list to educational assistance, relocation, and miscellaneous forms of paid leave such as bereavement, military, and jury duty (SHRM, 2012). Some employers offer less common benefits, such as adoption assistance and volunteer days.
    Traditionally, the approach of viewing all forms of pay and benefits as a whole has been referred to as “total compensation.” Susan Deller of Eckler Ltd. advises HR professionals not to confuse the concept of total compensation with total rewards. She states:
    A total compensation approach focuses on the financial rewards of the employment deal. These are the tangibles—they can be measured and added together to give a dollar value . . . On the other hand, total rewards present a more inclusive perspective [to encompass] the intangibles that are often the most critical factor in driving performance (Bruce, 2015).For a clearer understanding of what Total Rewards encompass, view this video on the changing role of total rewards video from WorldatWork.
    – The captioned version of this video may be accessed in the following link: OL-211: The Changing Role of Total Rewards (CC)
    References
    Bruce, S. (2015, March 23). Total rewards vs. total compensation: Are you muddling the two? BLR—Business and Legal Resources. Retrieved from http://compensationdailyadvisor.blr.com/2015/03/total-rewards- vs-total-compensation-are-you-muddling-the-two/
    Bureau of Labor Statistics. (2015, March 11). Employer costs for employee compensation news release text. Retrieved from http://www.bls.gov/news.release/ecec.nr0.htm
    HR Enwisen. (2012). Your employee total rewards statements: It’s more than you think! [Video file]. Retrieved from
    Lister, J. (2015). Strategic plan for employee compensation and benefits. Houston Chronicle. Retrieved from http://smallbusiness.chron.com/strategic-plan-empl…
    SHRM. (2012, December 11). Communication: What should be included in a total compensation statement? Retrieved from http://www.shrm.org/templatestools/hrqa/pages/tota…
    SHRM. (2014, August 22). Total compensation statement. Retrieved from http://www.shrm.org/templatestools/samples/hrforms…
    Snell, S., Morris, S., & Bohlander, G. W. (2015). Managing compensation. In Managing Human Resources (17th ed.). Australia: Cengage Learning.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Competency

In this project, you will demonstrate your mastery of the following competency:

Analyze quantitative and qualitative data to solve problems and make decisions that impact organizations and their stakeholders

Scenario

  • You have been asked to present your data findings and decision-making modeling to the leadership panel for feedback prior to the stakeholder meeting presentation. The panel wants to preview the charts and graphs that will be included in your presentation based on the research you have conducted. They would like to see how you will use the data to inform your recommendation, and how you will tell the story of that data.

Directions

Part 1: Using the research gathered in Project One, provide a visualization for each of the following, then summarize what the data is showing:

The current state of the U.S. automotive manufacturing industry

Sales by fuel type (electric, hybrid, gas)

Current automotive industry trends

The trend toward different types of motors for the vehicles being made and sold, such as electric and hybrid

Trends in customer demands such as vehicle color, extra features, and styles

  1. Trends in the body types of vehicles sold (SUVs, trucks, sedans)

Trends in the new industry

Expected growth areas

  1. Sales by type of products or services offered
  2. Trends in customer demands

Then, provide a summary of all of the data visualized.

Summarize the collective data about both industries as a whole.

  1. Determine what the data is not telling you about the new industry.
  2. Part 2: Analyze three decision making models and select the one model that is best suited for making your decision.
  3. Analyze and provide an overview of the following three models and select one for use. Resources are listed in the Supporting Materials section.
  4. The Rational Model

The Intuitive Model

The Recognition-Primed Model

  1. Explain your choice of decision-making model.
  2. Why does your selection make the most sense for this project?
  3. What to Submit

To complete this project, you must submit a PowerPoint presentation of 12 to 15 slides with speaker notes. Sources should be cited according to APA style.

Supporting Materials

The following resources support your work on the project:

  1. Reading: Rational Decision Making: The 7-Step Process for Making Logical Decisions
  2. Reading: Intuitive Decision Making

Reading: The Recognition-Primed Decision Model

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview 

You are excited to see the possibilities after finishing the Business Model Canvas Template. The next step is the development of the BMC slide deck for review by the experienced former project manager mentioned in the Module Four assignment.

Scenario 

In the BMC slide deck, you will make educated assumptions (based on research in Marketline, Yahoo Finance, or the company’s website) about your selected company’s resources, partnerships, cost structures (what needs to be paid for), how the product or service will be marketed, value delivery (product sold online, in-store, or both), and the unique value proposition for a specific targeted market segment.

All 9 segments of your redeveloped BMC must encompass elements to achieve new product/service feasibility.

Beyond profitability, other key elements that the experienced project manager stressed were diversity, equity, and inclusion (DEI), as well as corporate social responsibility (CSR). In the marketplace, companies that have diverse project teams get varied perspectives that help the overall project. Just as important, companies that “give back” to the communities they serve do better and are supported by millennial buyers—a big target segment for many companies.

Financials, DEI, and CSR must be addressed in the funding pitch, which you will complete as your course project, due in Module Seven.

Prompt

You will create a slide deck that will help you expand on your BMC chart in detail as you refine how your selected company will create value for itself while delivering a new product or service for customers. Complete the Milestone Two Template linked in the Guidelines for Submission section for this assignment.

Specifically, you must address the following rubric criteria:

Deliver a unique value proposition.

Leveraging the blue ocean strategy, what makes the product or service unique?

How does it provide a strategic advantage in the marketplace?

Answer key business model questions about the customer.

  1. Customer acquisitions

Revenue models

Price points for the product/service

  1. Key activities for the value proposition (product or service)
  2. Answer key business model questions about assets, partners, and cost.
  3. Assets available

Key partners

Cost structures

  1. Import your existing business model canvas chart from Module Four.
  2. Clarify your business model assumptions.
  3. Check your assumptions
  4. Complete the assumptions chart
  5. Prepare to meet customers.

Highlight the materials needed

Update your documentation.

  1. Targeted segment
  2. Type of value delivered
  3. How the product is unique
  4. Update your business model.

Complete any updates to the BMC chart

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I’m working on a business law project and need a sample draft to help me learn.

Competency

In this project, you will demonstrate your mastery of the following competency:

Differentiate between matters of law and matters of ethics in business situations

Scenario

  • A few years ago Clare Applewood started a small outdoor equipment business called Mountain Top View. The company is a sole proprietorship. The company began as a single storefront and has grown rapidly to include online ordering through the company website. The company’s website includes the statement, “We are committed to keeping customer information secure and protected.” Clare also uses social media sites to market the company.

Carlos Rodriguez has worked for the company since the beginning. He oversees both store and online operations. Clare and Carlos make most decisions together.

Steve, the company’s Information Technology lead, discovered that the company database of customer information was hacked. Customer names, addresses, and phone numbers were accessed for only those customers who placed online orders in the first quarter of the year. Steve was able to correct the code that allowed the hack and is confident that the database is now secure.

When Carlos overhears Steve talking about the database fix in the store break room, he questions Steve about why he did not bring the breach to anyone’s attention. Steve explains that because he was able to quickly correct the code that led to the breach, and because only address and phone number information for a handful of customers was accessed, he didn’t think it was necessary to say anything.

Clare asks Carlos to evaluate whether the company has an ethical and/or legal obligation to report the breach to their customers and to recommend a course of action. She also asks Carlos to select an ethical test or framework that all employees can use in the future to help guide their decisions.

Directions

Report

Evaluate whether the company has an ethical and/or legal obligation to report the breach to its customers. Your evaluation should be framed as a report for the owner, Clare, that includes the following sections and information. Cite your sources using APA style.

Introduction

Include a definition of ethics and explanation of how ethics compares to law.

Provide an explanation of corporate social responsibility and how it relates to ethical business practices.

  1. Analysis

Provide a summary of the ethical and/or legal issues involved in this situation.

Briefly describe the relevant stakeholders, the key facts, and the potential implications or impact of the situation.

  1. Recommendation
  2. Provide your recommendation for a course of action supported by relevant resources, such as specific laws and commonly accepted ethical practices.
  3. Explain the reasoning behind your recommendation and use reliable sources, such as the textbook and other course resources, to support your position.

Conclusion: Describe how advances in technology in today’s business world have both legal and ethical implications.

Ethical Test or Framework

  1. Select a test or framework for all employees in this company to use. Demonstrate how it can be used when faced with an ethical dilemma. Cite your sources using APA style.
  2. Test or framework
  3. Select a text or framework option from among those described in the textbook.

Name the option you selected and describe the test or framework, including its advantages and potential shortcomings.

Explain why the test or framework that you selected is appropriate for this company; justify your selection.

  1. Apply the test or framework to the scenario to demonstrate how Steve could have used it to guide his decision making and actions.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

o begin this discussion, introduce yourself to your classmates and instructor. Briefly discuss your background, describe your professional goals, explain what you hope to gain from this course, and share what you enjoy doing in your free time.

Then, continue your initial post by responding to the following:

Consider the article The Ethics of Empowering Patients as Partners in Healthcare-Associated Infection Prevention, particularly the inclusion of patients in the process of working to reduce healthcare-associated infections (HAIs). Consider some of the ethical implications with regard to patient autonomy and patient welfare when we do not involve patients in specific decisions regarding known risk (e.g., surgical infection risk).

Hi everyone,

My name and Zana, and I live in New Jersey. I studied dental hygiene in Minnesota and have been a hygienist for over three years. I am taking this class as part of the Master’s in Healthcare Administration program here at SNHU. I am pursing this degree to expand future job opportunities. In my free time, I enjoy hiking, cooking, and spending time with family and friends.

Nearly 100,000 patient deaths occur each year because of hospital infections. Most of these infections can be prevented with proper tools and interventions including patient education and empowerment (Palmore & Grady, 2014). Additionally, it is important to consider patient autonomy in terms of risk reduction. Patient autonomy refers to the freedom of personal choice and decision making with disregard from controlling pressures. Since vast differences between provider and patient knowledge exist, health professionals must educate patients regarding their health conditions and potential risk factors that may occur during and after in hospitalization treatments (Palmore & Grady, 2014). Patient autonomy is respected when providers disclose important and relevant medical information and allow patients to process and act upon such information. For example, explaining to a patient the benefits of frequent bandage changes or different resting positions to prevent ulcers promotes patient awareness and autonomy. Additionally, patient autonomy may be endorsed when hospital staff reveal potential risk information before treatment is completed.

Considering and respecting the ethical component of patient welfare may also reduce healthcare-associated infections. This may be achieved by risk prevention education and encouraging patient involvement such as asking questions. For example, providers can educate patients why they wear various PPEs and the importance of hand washing before and after procedures to prevent hospital infections. By not explaining the importance of necessary infection control protocols such as these, patients may be less likely to participate in empowerment strategies. Hospitals and medical providers should attempt to inform patients using simple and understandable language concerning steps they take to reduce the spread of infection and disease so they may also practice better hygiene procedures outside of the hospital setting (Palmore & Grady, 2014).

My name is Brittany Zaring. I am a Registered Dietitian (RD) that runs the Nutrition and Food Services department at a VA in TX. I have been married for 8 years and we recently had our first child in March of this year. I’ve been a RD for 8 years and worked primarily as a food service dietitian since graduation. For the past 17 months, I’ve been the Chief of my department having to run both the food service and clinical operations. My main professional goal is to have an analyst type job where I can recommend actions to leaders and not necessarily be a leader in the hospital myself. I’m looking forward to taking a step down. Pursing a second master’s has allowed me to have a broader understanding of healthcare outside my nutrition bubble. What I hope to get out of this course is the preparation of taking on a program analyst role where I can recommend actions and assist in the development of programs within the healthcare entity. In my free time, I hang out with my husband and daughter. We go on hikes at our local park. I also volunteer at my church as an AWANA leader for 3- and 4-year-old kiddos.

If not engaging patients in their healthcare treatment, one must evaluate the potential consequences against potential benefits. The article suggests informing patients may increase their stress while staying in the hospital. Stress does have the potential to increase the risk of a healthcare associated infection (HAI) (Sharp, Palmore, & Grady, 2014). However, evaluating the ethics of the decision one can turn to the Hippocrates and “First, do no harm” (Shmerling, 2020). To live by that motto, health care professionals owe it to empower their patients and involve them in every step of their care. Only way to do that is to offer the education in a way they understand it. This can help to build trust in the organization as well as to the treatment team. Although, failing to adapt to the learning style and ability of the patient, this could have negative implications. If patients do not understand the warning signs of HAI, they may not report as soon as they should to those caring for them or it may make them freeze in fear to pursue any other additional care.

References

Sharp, D., Palmore, T., & Grady, C. (2014). The ethics of empowering patients as partners in healthcare-associated infection prevention. Infection Control and Hospital Epidemiology, 35(3). https://doi-org.ezproxy.snhu.edu/10.1086/675288

Shmerling, R. H. (2020). First, do no harm. https://www.health.harvard.edu/blog/first-do-no-ha…

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Discussion 2: Depression and Suicide Intervention

When working with adolescents you will likely be faced with issues of depression, anxiety, and suicidal ideation and even attempts. For youth between the ages of 10 and 24, suicide is the third leading cause of death in the United States (Centers for Disease Control and Prevention, 2012). It is essential to understand the risks associated with teen suicide and intervention strategies to address this issue.

By Day 4

Post a review of the literature on adolescent depression and suicide and identify an evidence-based intervention that addresses these issues. Then, apply that intervention to either the Brady or Tiffani case. Describe the possible risk factors the client presents that would make him or her at risk for depression and suicide. Then, plan an intervention for that client to address these issues.

Support your posts with specific references to the Learning Resources. Be sure to provide full APA citations for your references.

By Day 6

Respond to at least two colleagues who identified a different client and provide feedback and/or support.

Support your responses with specific references to the Learning Resources. Be sure to provide full APA citations for your references.

Colleague 1:Rachel Ramsey

Challenges with adolescents are common during these years, though when left unaddressed many risk factors are cultivated. Conceptually, depression is a high-risk factor for suicidal behavior amongst youth (Devenish et al., 2018). Devenish et al., (2016) methodical review of psychological interventions to prevent and treat depression in adolescents. Moreover, the study determined that Cognitive Behavioral Therapy (CBT) interventions produce pre and post declines in suicidality with average consequential sizes and are least effective than pharmacotherapy in reducing suicidality (Devenish et al., 2016).

In the case study of Tiffani Bradley, there is demonstrated repetitive trauma endured. There is a multitude of factors that may correlate to Tiffani experiencing feelings of hopelessness. Risk factors consisting of depression and suicidality are evident with Tiffani. She experienced separation and loss of her family, thoughts of being unwanted, and being sexually abused and eventually pimped by Donald, as these experiences heighten the risk factors. An evidence-based practice (EBP) that would benefit Tiffani is implementing a course for Adolescents Coping with Depression (ACD). LeCroy and Williams (2013) suggest the overall approach of this intervention is to intercede in the dysfunctional cognitions and alter the adolescents’ interactions within their environment. ACD and CBT are comparatively similar in their strategies when working with youth (LeCroy & Williams, 2013).

ACD consists of six sessions in communication and problem solving in which adolescents discover active listening, problem-solving, and negotiation skills (LeCroy & William, 2013). Further, ACD will permit Tiffani to effectively increase enjoyable activities while developing self-change skills, establishing realistic goals, creating a plan for change, and self-reinforcement (LeCroy & Williams, 2013). Also, the last two sessions of the ACD course integrate the proficiencies to assess how to predict and plan for potential problems (LeCroy & Williams, 2013). Undoubtedly, Tiffani will encounter many relationships in her life, as she may feel distrust in others due to pre-existing factors of her past. Lastly, planning for impending challenges is critical with Tiffani, as this will allow her to develop solutions and apply them to future dilemmas.

References

Devenish, B., Berk, L., & Lewis, A. J. (2016). The treatment of suicidality in adolescents by psychosocial interventions for depression: A systematic literature review. Australian & New Zealand Journal of Psychiatry, 50(8), 726–740. https://doi[1]org.ezp.waldenulibrary.org/10.1177/0…

LeCroy, C. W., & Williams, L. R. (2013). Intervention with adolescents. In M. Holosko, C. Dulmus, & K. Sowers (Eds.), Social work practice with individuals and families: Evidence[1]informed assessments and interventions (pp. 97–124). Hoboken, NJ: Wile

Colleague 2: Kristine

In the article I found for this discussion titled, Anxiety and Depression in Children and Adolescents, written by the CDC, found on the website, the most important comment I read was that parents should first “reach out to the primary care physician or mental health specialist about having an evaluation done” (CDC, 2021).

The EB intervention that addresses the issues

Child therapy, family therapy, or both are known to help the child process the events causing the depression or suicidal ideation. The involvement of the school they attend is also included and can be helpful in some situations.

Applying therapy to the case of Brady

Brady, a 15-year-old Caucasian male, recently suffered the loss of his mother, presents as immature and below average intelligence and emotional functioning, according to Plummer (2014) in Social Work Case Studies: Concentration year. Steve, Brady’s father has become angrier and more alienated from his son not helping him through the grieving process since the passing of his mom, causing him to grieve the loss of both parents. After the initial assessment to see what stage of development Brady is, I would incorporate child therapy in the form of play therapy as this may be beneficial to help him relax and start making sense of his situation. Once rapport is built, bring into play the other techniques of drawing and creating a genogram as the social worker did in the case study, engaging Brady to think about who is the most important to him in his life, working down to who is the least important. This will help Brady organize his thoughts on each person and maybe share stories about why he placed them in the order he did for the genogram. This could lead to the sharing of fond memories, or the troublesome ones that surround his relationship with his father.

Possible risk factors for depression/suicidality

In the case of Brady, the biggest risk factor is the trauma of losing his parents at almost the same time. His mother passed away, gone for good, but his father checked out, not really seeing the trauma through his son’s eyes because his vision was clouded by only his loss. That trauma is enough to push Brady farther away and down that path of destructive thoughts and depression, unless someone notices the changes and gets him some help.

Intervention plan

My first goal would be to assess Brady for appropriate developmental stage appropriate intervention strategies. Then I would schedule sessions that are structured around that stage to help build him up from the low he is currently in. I would incorporate the use of many different tools to help teach him healthy coping skills, things like role play, puppets, or even empty chair therapy. After using the empty chair therapy to help him practice talking to his dad about his feelings, I would begin combined sessions, so that Steve can learn from his son how the loss has affected him and how he feels in that moment he lost his mother, he actually lost them both. I would continue to work with them until they have the balance that they need to be a constructive, beneficial family unit.

References

CDC (2021) Center for Disease Control. Anxiety and Depression in Children and Adolescents.

Plummer, S. -B., Makris, S., & Brocksen, S. M. (eds). (2014b). Social work case studies: Concentration year. Baltimore, MD: Laureate International Universities Publishing [Vital Source e-reader]. Working with Families: The Case of Brady (pp. 26-28)

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Competency

In this project, you will demonstrate your mastery of the following competency:

  • Apply user-centered design principles and industry standards in the development of a mobile application

Scenario

Congratulations! Your App Development Proposal has received approval
after being shared with both your client and the mobile application
development team at Mobile2App. It is now time to construct a UI based
on your original proposal. You must supply the client with a complete UI
design that is easy to understand and demonstrates a creative theme and
layout for the finished application.

Directions

Open the Android Studio Layout Editor to begin creating the UI for
your app. Be sure to use the Install Android Studio resource and the
Build a Simple User Interface resource, both linked in the Supporting
Materials section, to get started with this software. Throughout this
project, continue to reference the App Development Proposal you
completed in Project One while paying particular attention to the
section on UI Design. Also be sure to let the Android Design and Quality
Guidelines document, which is linked in the Supporting Materials
section, guide your decisions.

Your completed UI should include all of the screens needed for your
app to operate but the UI will not yet be functional. You will only be
creating the UI components for this project as the supporting code will
be completed in Project Three.

  1. Create UI with appropriate design elements to support a user logging in (1 screen). Your UI must include a login screen, that contains the following:
    • Fields for the user to provide a username and password
      • Note that the password element should be configured in a way that
        obscures any text that is typed into the field. This means the text will
        need to be visually converted into dots.
    • A button for the user to submit their username and password
    • A button for the user to create a new login if it is their first time using the application
      • Note that to simplify the account creation process, you can use the
        same login screen for this purpose. Create a button that will add the
        username and password into the database if it does not already exist.
    • Any other fields or elements that are necessary to make your application visually appealing, intuitive, and usable
  1. Create UI with appropriate design elements to display database information as a grid (1 screen). Your UI must include a data display screen, that contains the following:
    • A grid for displaying data
    • Logical labels and headers for the data that will be displayed
    • A button for adding data to the grid
    • A button on each row for deleting that row of data from the grid
    • A mechanism that allows a user to change the value associated with
      each grid item (e.g. the number of a specific item in an inventory or
      the date of an event)
    • Any fields needed to add data to your grid, though this can be on a new screen if you feel the layout is better for your app
  1. Create UI with appropriate design elements to prompt a user
    for permission to communicate with the text messaging app and display
    information based on permission (1 screen).
    Your UI will need
    to include a button, or alternate mechanism, that would cause the app to
    ask a user for permissions so it can communicate with SMS messaging. A
    user that grants permission will then receive automated system
    notifications based on which option you chose in Project One. These
    notifications would be low inventory, an upcoming event, or reaching a
    goal weight. If the user denies access to the permissions needed for the
    app to interact with SMS, then your app should still continue to
    function overall but should not provide any notifications.
  1. Develop visual hierarchy and consistency between UI elements on different screens.
    The layout for each screen should follow an intuitive visual flow, have
    a consistent theme, and be creative but still easy to understand. Ask
    yourself the following to help determine if your visual hierarchy is
    successful:

    • Does my focus order match with the steps a user would follow when completing a task?
    • Does my grouping organize content in a way that makes sense for the user?
    • Do my transitions have consistency between screens and tasks?

What to Submit

To complete this project, you must submit the following:

App UI Design
Your final design should be
submitted as a ZIP file including the full contents of your Android
Studio project. Remember to title the file with your name and the app
option you previously selected.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

It’s best practice to document your plan for full stack development
as you progress through a project. The Software Design Document (SDD) is
an engineering document that contains technical specifications and
written descriptions. You will complete several components of the SDD to
provide a more detailed illustration of the system architecture for the
Travlr Getaways website.

This milestone is intended for you to finish the diagrams that you
will deliver to your client, Travlr Getaways. Specifically, you will
create a diagram called a sequence diagram, which demonstrates the flow
of communication; complete a Class diagram that illustrates the
JavaScript classes used in the application; and fill in a table that
demonstrates your understanding of endpoints in the web app. For each of
these illustrations, you will produce written explanations. Keep your
audience in mind and be sure to communicate clearly and concisely in
client-facing technical documentation.

Please note: You already started your work in the SDD for Travlr
Getaways in Milestone One. You will continue to build upon this
document in this milestone, and later deliver the final product as part
of your project submission.

Prompt

Continue your work on the SDD for Travlr Getaways by using the
partially completed SDD you submitted in Milestone One. Prepare a
written explanation of the work you’ve produced on the full stack
application thus far by completing the following sections of the SDD:

System Architecture View

  • Sequence Diagram: Illustrate the flow of logic in a web application by completing a sequence diagram using the Sequence Diagram Template in Lucidchart.
    • You will not be able to edit the template. Rather, you must click
      File, then Make a Copy to edit and save the document in your Lucidchart
      account. When editing the sequence diagram, be sure to label the highest level of organization properly using the following options:

      • Controller/Model
      • Route
      • Browser/View/Template
      • MongoDB
      • HTTP Client
      • Controller
    • Please note: Labels may be used more than once.
    • Save the completed sequence diagram as an image file (PNG or JPEG) and insert the image in the System Architecture View: Sequence Diagram section of the SDD.
    • Below the diagram, be sure to describe the flow of logic in the web application based on the sequence diagram.
  • Class Diagram: Illustrate the JavaScript classes of the web application by completing a class diagram for the web application using the Travlr Class Diagram Template in Lucidchart.
    • You will not be able to edit the template. Rather, you must click File, then Make a Copy
      to edit and save the document in your Lucidchart account. Consider
      typical travel components and use them to label the diagram correctly.
      Edit the class diagram and label the class titles properly using the
      following options:

      • Itinerary
      • CruiseInfo
      • TravellerInfo
      • FlightInfo
      • HotelInfo
      • TripInfo
      • Membership_Admin
      • HotelBooking
      • CruiseBooking
      • FlightBooking
      • Travel_Agent
      • MemberAccount
    • Save the completed class diagram as an image file (PNG or JPEG) and insert the image in the System Architecture View: Class Diagram section of the SDD.
    • Below the diagram, be sure to describe the JavaScript classes of the web application based on the class diagram.

Interfaces

  • API Endpoints: Exposing RESTFul endpoints is a
    design approach to enable an application to participate in a larger
    ecosystem. In the API Endpoints table provided in the SDD, document each endpoint including the HTTP method, purpose, URL, and any relevant notes.

Guidelines for Submission

Continue building on the SDD you submitted in Milestone One. Complete
the following sections: System Architecture View: Sequence Diagram,
System Architecture View: Class Diagram, and the API Endpoints table.
Submit this iteration of the SDD with all the necessary components.

Please note: You will only be graded on the sections relevant to
Milestone Two that are outlined in the rubric below. Although it may be
helpful to implement feedback from your instructor on aspects that were
outlined in Milestone One, it is not required for this
assignment submission. Each section will, however, be submitted and
reassessed in your final Project submission later in this course.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Part 1:

Provide a status report to your classmates and instructor. Discuss any major modifications you have made to the system or documentation. Discuss your implementation support strategy and any enhancements that can add new capabilities to the system.

Is the system easily scalable?

How else could your system be enhanced?

Engage your classmates in discussions that mimic team dynamics expected in professional real-world information technology project environments.

In response to your peers, provide constructive feedback on the future enhancements and implementation support sections of their project closure document and suggestions they can incorporate into their documentation or implementation. Do you see any potential obstacles they might come up against? If so, what approach can they take to overcome these challenges?

Part 2:

Wireless LANs (WLANs) have become a significant segment of the LAN market. As a network consultant for a local coffee shop, you have been researching different WLAN configurations to determine the best solution for a location. Define WLAN, list at least four advantages and at least four disadvantages of WLANs, and list and briefly define four application areas of WLANs. 

After you complete your main post, respond to at least two other classmates’ posts with comments that start a conversation. What differences or similarities do you see between your post and other classmates’ posts? What did you learn from your classmates’ posts?

To complete this assignment, review the Discussion Rubric document.

Part 3:

For this module’s discussion, research a recent science news event that has occurred in the last six months. The event should come from a well-known news source, such as ABC, NBC, CBS, Fox, NPR, PBS, BBC, National Geographic, The New York Times, and so on. Post a link to the news story, and in your initial post:

Summarize your news story and its contributions to the science or STEM fields

If your news event is overtly related to technology, explain how this event contributes to technology studies? If your news event does not directly relate to technology, how could the science behind your event be applied to technology studies?

In response to your peers, provide feedback about their news story and describe the value of the scientific lens for understanding technology. 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Wilmont’s is a top‐ranked U.S. retail pharmacy company based in St. Louis, Missouri, with more than 8,000 stores nationwide and more than 244,000 employees. The company has engaged in a number of innovative business practices, and now they are considering breaking ground with an even newer concept—using drones to deliver prescriptions and drugstore items. The idea isn’t new—a small firm named DronesTech, Inc., in San Francisco, California, announced its drone-delivery capability in March, and the company is looking to develop a relationship with drugstores around the country to launch the concept for real. Wilmont’s may be the big break it’s looking for!

Pharmacist removing and sorting prescriptions from a traditional pharmacy shelf.

Wilmont’s operations VP, George Cranston, has asked the CIO, James Connor, to develop a pilot project to get something going and see how this works. Mr. Cranston will provide the funds and oversee all aspects of this initiative. You are a project manager for Wilmont’s internal IT department, and the Mr. Connor has assigned you to lead this project in terms of the information systems that will be needed to support the pilot project. Phillip Greenberg is the project manager at DronesTech, Inc., who will work with you. You have been asked to provide a project charter document along with a project management plan prior to starting the project. Read the following complete case study, which will be needed for you to create these documents: Project Management Case Study.

Two men working on the details of building a drone.

Directions

As you complete these documents, be sure to refer back to the scenario and case study to obtain all the essential information. Wilmont’s is eager to get this project started and has asked you to provide the following documents in order to begin:

  • Project charter document: This critical, one-page document will outline the tasks that will be performed on the project and authorize the project management team to begin the work. Specifically, it must include the following:
    • Project name: Give the project a name.
    • Objectives: List at least three primary objectives of this project. Consider the following question: What is the purpose and desired outcome of this project?
    • Deliverables: List at least three deliverables. Consider the following question: What will you need to deliver to your manager throughout the life cycle of this project?
    • Constraints and scope boundaries: Briefly describe any constraints, including time, cost, and scope. You should also explain what is in and out of scope for this project.
    • High-level milestones: List at least five high-level milestones. These do not need to include dates or budget but should consist of the major milestones that must be completed to bring this project to a close.
    • Risks: List at least three potential project risks. Consider the following question: What might cause delays in the project, be too expensive, impact personnel, and so forth?
    • Approval signatures: Include a space for approval signatures by the project manager and executive sponsor.
  • Project management plan: Complete the Project Management Plan Template. The template has additional details beyond the directions given here, so be sure to open the template early and read through it entirely. This document will outline exactly how you plan to manage this project and is an essential tool to move forward. Many of the sections may be adapted from your project charter document. The following sections must be completed:
    • Introduction: What is the purpose of the project management plan?
    • Goals and objectives: What are the goals and objectives expected to be achieved as a result of implementing the project?
    • Scope: This section includes the scope definition, costs and benefits, project deliverables list, and milestones.
    • Assumptions: What specific and measurable assumptions have been made about this project that relate to scope, schedule, resources, and so forth? List at least three.
    • Constraints: This section includes project constraints and critical dependencies.
    • Quality management: This section include tools and techniques and the quality management approach.
    • Project management approach: This is the most in-depth section of your plan. It should include a brief summary of your project effort estimation, communications and control approach, risk assessment, and project budget. It must also include the following:
      • Work breakdown structure (WBS) Gantt chart: Include a high-level WBS of the project, highlighting the stages and major tasks that must be performed to complete the project. Then complete a Gantt chart, which reflects the project schedule and is composed of the WBS, the projected date that each task is to be started and completed, and the resources assigned.
    • Approvals: Include a sign-off sheet at the end of your project management plan.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

In this activity, your task will be to analyze the data and use the information gathered to answer simple questions by summarizing the results.

Prompt

Your team has been given various data sets in order to analyze information and summarize the findings. These are in the form of simple return merchandise authorizations, or RMAs. Your task is to write brief summaries that capture the results of the analysis to present to the product manager, who may or may not have a technical background. This is why you should write the summaries for an audience of nontechnical stakeholders.

Write a detailed summary of your analysis of the bulleted items below. Prepare your summary for nontechnical stakeholders. Use the list below to guide the structure and organization of your report.

  • Write SQL commands that capture specific, usable data that can be used in your analysis.
  • Analyze the results of queries to identify specific information that can be presented in your summary.
    1. Sales by region:
      1. Analyze sales by state to determine where the company has the largest customer base.
      2. Analyze the data to determine the top three products sold in the United States.
      3. Analyze the data to determine the top three products sold in the southeastern region of the United States.
        • Southeastern states to include in your analysis: Virginia, North Carolina, South Carolina, and Georgia
    2. Returns by region:
      1. Analyze the data to determine the top three products returned in the United States.
      2. Analyze the data to determine the top three products returned in the northwestern region of the United States.
        • Northwestern states to include in your analysis: Washington, Oregon, Idaho, and Montana
  • Write an effective summary of the analysis of the captured data.
    1. Sales by region:
      1. Provide a well-written summary of your analysis on parts A through C.
    2. Returns by region:
      1. Provide a well-written summary of your analysis on parts A and B.
  • Clearly communicate your findings to the Quantigration product manager by writing a report that explains your findings in a way nontechnical stakeholders will be able to digest and use.

In a Word document, use double spacing, 12-point Times New Roman font, and one-inch margins to write a report that captures your findings.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I don’t know how to handle this Business question and need guidance.

Use the work completed in Modules Four and Five discussions and transfer into your existing Presentation Template from Checkpoint Submission One in Module Three. This will cover the following critical elements of the final project: Trade Regulations and Legal Considerations, Political-Legal Environment Observation Deck, Economic Measures, Transportation, and Telecommunication.

Submit the presentation for participation credit and instructor guidance to assist you in completing your final project, which is due in Module Seven. Use the Final Project Guide to assist you in the development of this presentation.

For additional details, please refer to the following documents:

This is the feedback from the professor on Checkpoint 1 so far so that you are aware: 

You have an outstanding start to your final project. Treat this presentation, as you are presenting to a board about a possible expansion into your selected country. Please review the bullet points below:

Rationale- You will want to add more detail. Why would someone look at your selected country as a possible location for a new company? 

Location and Geography- Well done! You provided a wonderful map and discussed the location, water access, boarding countries and natural hazards.

Sociocultural environment- The chart was well placed and provided important data. You also fully covered the Literacy Rate, Rate of urbanization, Heavily populated cities, Major religions, Educational data, and Age Structure. Well done!

Values and Communication- You met all the requirements for this section. 

Business Etiquette- You successfully covered five rules of business etiquette.

Sociocultural Environment: Observation Deck- You are off to a solid start here. I would encourage you to add additional information. This is where you have the chance to bridge the gap between the research, and how it interacts and defines the business environment of today.

Political- Legal Environment- You did a great job in this section and fully met the requirements

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

In your initial post, introduce yourself. Include:

  • Your name and what you prefer to be called
    • Where you are from
    • Your goals for taking this course

Then discuss why you think studying history is valuable. How can knowledge of our past improve your communities?

Video: What Is History For? (4:13)
View this video, which describes the significance of history. Consider the following point made at the end of the video: “Good history should always mean history with solutions or consolations for today.” Do you agree or disagree?

The video “What is History For?” argues that history matters because it provides solutions to the problems of the present. Recall the statement “Those who don’t know history won’t be able to improve the present.” Consider a recent event, either in your personal life or in the news. In a few sentences, describe a way that a past historical event could inform your understanding of the recent event. Briefly describe a strategy for how you could be conscious of presentism (the use of modern values to interpret past events) in the study of those past events.

Two major historians, Howard Zinn and Larry Schweikart, have written popular books on American history containing very different historical interpretations of the same events. Explore this interactive resource on Zinn and Schweikart to learn about their different personal assumptions, beliefs, and values that might influence how each historian interprets historical events and might introduce bias into their writing.

A text only version is available: A Tale of Two Historians Text Only Transcript Word Document

After reviewing Zinn’s and Schweikart’s personal assumptions, beliefs, and values as well as excerpts from their historical writing, respond to the following questions:
What do you believe to be the major distinctions in their personal assumptions, beliefs, and values?

What do you believe to be the major distinctions in their interpretations of history?
Do you notice any biases? If so, what are they?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Discussion: Theory Integration

For narrative-collaborative and solution-focused therapies, primacy is given to clients’ own meaning-making of their family stories. In other words, change comes not from altering dysfunctional patterns of relating, but re-authoring the ways couples and families make meaning of their relationships. Consider the impact of such techniques if your theoretical orientation is more action-oriented in focus. Conversely, imagine the potential difficulty if narrative-collaborative is your chosen theory, but clients are less inclined to talk about their problems and participate in this type of storytelling.

For this Discussion, select one of the theories demonstrated in the media this week (either narrative-collaborative or *solution-focused*). Consider challenges you might encounter if you attempted to integrate the theory you selected with your lens for couples counseling, including, but not limited to, agency or private practice demands, ethical responsibilities, or theory incompatibility. https://waldenu.kanopy.com/video/irreconcilable-differences-solution-focused-approach-marital-therapy

By Day 4

Post a brief explanation of one challenge you may encounter if you attempted to integrate the theory you selected with your main theoretical orientation in your future professional practice. Then, explain how you might mitigate this challenge.

Be sure to support your postings and responses with specific references to the resources.

Select and respond to a colleague who selected a different theory and title your posting as follows: “Integrating [X] theory into [Y] theory”

Colleague 1: Tomeka

A brief explanation of one challenge you may encounter if you attempted to integrate the theory you selected with your main theoretical orientation in your future professional practice. 

The theory I choose is narrative-collaborative. The video explains to the listeners how narrative-collaborative allows clients to rewrite their personal stories, experiences, and relationships (Psychotherapy.net, 2002b). “In therapy organized by the narrative metaphor, we work to help people find new meaning in their lives by experiencing, telling, and circulating stories of as-yet-unstoried aspects of their lives and relationships” (Gurman, et al., 2015, p. 271).  Alternative stories permit individuals to live out new characters, additional opportunities for connections, and new fates dependent on encounters shown. (Gurman, et al., 2015).  One challenge I may encounter if I attempted to integrate the narrative-collaborative with the main theoretical orientation in my future professional practice would be not knowing if clients are being honest. Individuals don’t normally think about the narratives they are naturally introduced to as stories (Gurman, et al., 2015). Narrative therapy gives the client the opportunity of how they tell their story and explain their truths. In the video, it states how in narrative-collaborative, the client and social worker rewrite this story (Psychotherapy.net, 2002b). Strengths and new perspectives are included when the client rewrites the story (Psychotherapy.net, 2002b). The social worker rewrite should provide support to the story written by the client (Psychotherapy.net, 2002b).

Then, explain how you might mitigate this challenge.

I might mitigate this challenge by explaining to the client at the beginning of the session how important it is for them to discuss the truths so that I can better understand their life and help them throughout the process. I would also share with them the statement made by Carlson, “Be careful of the stores you tell about yourself and that others tell about you because eventually, they’ll live you” (Psychotherapy.net, 2002b). It can have an impact on how we not only view ourselves but how others view us. Others could expect us to live what we have told to them. 

Gurman, A. S., Lebow, J. L., Snyder, D. K. (2015). Clinical handbook of couple therapy. New 

York, NY: The Guilford Press.

Psychotherapy.net. (Producer). (2002b). Narrative therapy with children [Video file]. United States: Author.

Colleague 2: Adriana 

One challenge I may encounter is integrating Narrative therapy in my future professional practice. The narrative is as it sounds; the client is telling their own story from their lens. According to Gurman (2015), “the teller of the story and invite him or her to reflect on the partner’s reflection.” The partner’s response and body language are essential. Their response will tell if the speaker is speaking the truth. As social workers, narrative therapy is an excellent idea because the client can lead. However, the social workers must look at other aspects of the client—their body language and how the other party will react and respond to the message. With narrative therapy, Gurman also mentions other skills to use. According to Gurman (2015), “stories need listeners as well as tellers.” According to Psychotherapy (2002), “allow the client define the issue, in their own words.” Another challenge is for the social worker not to indulge too much in one topic throughout the session finding balance is critical and elaborating the main focus points. 

I might mitigate this challenge by allowing the couple to tell their story from their lens. If there is something that may be shocking, keeping a neutral look is highly important. Because clients will react to my interaction, I would also build the rapport of comfort for my clients, and be respectful and remain neutral and present, positive feedback and empathy.

References

Gurman, A. S., Lebow, J. L., Snyder, D. K. (2015). Clinical handbook of couple therapy. New York, NY: The Guilford Press. Chapter 10, “Narrative Couple Therapy

Psychotherapy.net. (Publisher). (2002b). Narrative therapy with children. [Video file]. United States: Retrieved from the Walden Library Datatbases.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Discussion: Positive Regard

Carl Rogers, a humanistic psychologist, believed that individuals must feel accepted for who they are in order to have a high level of self-worth (Farber & Doolin, 2011). Rogers coined the term “positive regard” to explain this concept of feeling accepted. Also, he believed that positive regard is essential to personal growth and self-actualization.

For this Discussion, view the “Johnson” video (Episode 3).

https://drive.google.com/file/d/1wo74KV3K4yHEsZTBU…

(Article is attached)

By Day 3

Post your description of the purpose of this group. Explain the use of empowerment and strengths-based strategies. How does “positive regard” impact the group session in this video? How might you respond to Talia when she voices her skepticism of the usefulness of group sharing?

By Day 5

Respond to a colleague who has a different response to Talia. Discuss the benefits of using a strengths-based strategy in this group setting.

Colleague 1: Caneshia

Purpose of Group

The purpose of the group is to provide emotional support for women who have experienced being sexual assaulted. The group provides a space for women to be vulnerable and feel comfortable with expressing feelings and emotions towards being sexually assaulted. In additional to physical support for the patient. Receiving a hug from someone who has been down the road can mean much more. I have been a victim of sexual assault and a hug from a stranger was healing. Although I had a great support system, the hug from someone who suffered the assault was healing. One group member shared how she could realize she was not to blame for the actions of her perpetrator (Laureate Education (2013). This illustration provided an example of support of other group members. The statement provided by the group member allows other group members to understand it is not their fault. Often individuals fault self for the assault. Even though this is not the case. Hearing personal testimonies can serve purpose of finding connection with individuals sharing similar traumatic experiences. The purpose of the group is to allow healing using the support of others. Another purpose is to educate and witness how others face challenges and how the group members have overcome those presented challenges.

Empowerment and Strengths-based Strategies

When an individual has experienced trauma, particularly sexual assault empowerment is required. There is a feeling of worthlessness. Worthlessness comes to mind when I reflect on my trauma. I felt hopeless and lost. I was not able to focus on my mental strength. Thus, I needed empowerment just as the women presented in the video. Self- confidence is a factor I needed. I needed to know I was going to be emotional successful in overcoming the trauma. I could not figure what my strengths were. Hence, empowerment within a group is essential. The group members will require empowerment to overcome the mental struggles of healing from the trauma. Empowerment will also assist group members when group meetings are in session. This simply implies the empowerment will go beyond group meetings and into the daily living. Empowerment can be completed through strength-based strategies. An illustration of this can be to focus on the strength of each group member. Group members can employ strengths resulting to empowered. When members come into session explaining they tried new approaches, other members should be encouraged to praise them for their achievements (Toseland, R. W., & Rivas, R. F., 2017). The overall goal of the group is to empower the members to take control of the group and their lives (Toseland, R. W., & Rivas, R. F., 2017).

How does “positive regard” impact the group session in this video?

Positive regard refers to as treating patients in a consistently warm, highly regarding manner to inevitably allow them to grow psychologically, to fulfill their potential (Farber, B. A., & Doolin, E. M., 2011). An illustration of positive regards was the positive reinforcement provided to group members testimony. The group leader educated group members on the importance of expressing support for one another. Often group members reserved and refrain from self-disclosure, the member must receive positive regard of the positive outcome of being transparent with others.

Respond to Talia Skepticism

Talia expressed reservations of sharing to the group members due to disconnect of emotions. Talia was not prepared to face her trauma. Thus, Talia became skeptical to present within group. Talia is new to the group; I would approach her skepticism with reassurance that her emotions are normal. I would express empathy for her feelings and assure her that she is not alone. Additionally, I would praise Talia for the progress she has done since her sexual assault.

Reference:

Farber, B. A., & Doolin, E. M. (2011). Positive regard. Psychotherapy, 48(1), 58–64.

Laureate Education. (Producer). (2013b). Johnson (Episode 3) [Video file]. In Sessions. Baltimore, MD: Producer. Retrieved from https://class.waldenu.edu

Colleague 2: Stacey Jones

Group Purpose

Talia Johnson was recently sexually abused while attending a fraternity party(Laureate Education, 2013). The purpose of the Counseling Center (RCC) group is to help young women overcome their trauma, eliminate their self-blaming behaviors, and empower them to feel in control over their life. For instance, Talia’s peers were able to help her understand that she is not responsible for Eric’s actions.

Empowerment and strengths-based strategies

As a group facilitator, there are various ways in which I can empower my group members. According to Toseland & Rivas (2017), empowerment is the power of the group to help members feel good about themselves and enable them to use their ability to help make a difference. The group facilitator utilized empowerment strategies such as asking the group members to process their feeling associated with a traumatic event. Creating an open and safe environment allows group members to share their experiences without being judged. As depicted in the process group, Talia is having difficult time processing and blaming herself for the abuse. A strength-based strategy that can assist Talia in removing self-blaming thoughts is cognitive restructuring. Cognitive restructuring is focused on correcting cognitive distortions and deprecating self-talk. This was depicted when one of the group members shared that she used to blame herself for being raped, but her thought process changed with the group’s help.

Positive Regard

According to Farber & Doolin (2011), positive regard such as warmth, empathy, genuineness are necessary and sufficient in a therapeutic process. The social worker used positive regard with the following statement, “thank you for sharing your thoughts and for your support”. The social worker’s positive regard impacted the group session by encouraging other members to share their experiences. For instance, this was depicted when other group members shared their experiences and growth with Tilia. Furthermore, positive regard aims to build a therapeutic atmosphere that encourages members to share their emotions.

Talia’s skepticism

As depicted in the video, Talia is skeptical about the effectiveness of the group because she is hurt, betrayed, and blames herself for the assault. As a group facilitator, I have to meet Talia at her current level of change and understand that she is new to the group process. As the facilitator, I can utilize interpersonal interventions that focus on members’ cognition and affects; thought, beliefs, values, feelings, sensations, and emotions. On the other hand, I can utilize the social relations model (SOREMO), which allows the client to share information to gain positive feedback from group members that can help therapeutically. As mentioned by Piper et al. (2006), a therapist uses SOREMO to answer questions about characteristics of the perceiver, the person receiving the feedback, an interaction between the characteristics of the perceiver and the person receiving the feedback, characteristics of the group, and any errors. Furthermore, this model assist the social worker in gaining insight into the interpersonal relationship and irrational belief system.

References

Farber, B. A., & Doolin, E. M. (2011). Positive regard. Psychotherapy, 48(1), 58–64.

Piper, W. E., Ogrodniczuk, J. S., Lamarche, C., & Joyce, A. S. (2006). Use of the social relations model by

group therapists: Application and commentary. International Journal of Group Psychotherapy,

56(2), 191–209.

Laureate Education. (Producer). (2013b). Johnson (Episode 3) [Video file]. In Sessions. Baltimore, MD:Producer. Retrieved from https://class.waldenu.edu

Toseland, R. W., & Rivas, R. F. (2017). An introduction to group work practice (8th ed.)

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Scenario

The image depicts a person holding a tablet in front of a laptop. The foreground depicts a world map with lines connecting cross-continental areas. The foreground also depicts computer generated charts.

You work for DZM Web Solutions, a company that develops software solutions for businesses in the customer service industry. You are the project manager of an IT project to update a database to a new software version. This database holds all information related to and in support of Sarbanes–Oxley Act. The upgrade is major and encompasses many changes because laws have changed. This project was attempted last year but it failed due to a change in the organizational structure and because other databases needed to be changed first. Some changes are completed and some are not. The company wants to be proactive.

The old project manager left some notes and a few half-completed project documents for your assistance. He is no longer with the company. The board of directors is very upset and has assigned a new change control board that will not budge on issues brought forward. Expectation is high that this project will be delivered on time and budget. In addition, the project management office (PMO) is beginning to migrate from a strict waterfall methodology to an iterative approach as management believes this will save projects from failure.

You now have a six-month deadline to complete the project. You have a budget of $150,000 to cover secured resources and any equipment needed before the system loses support from the developer and fines are rendered for noncompliance. You have been assigned a new project team, but contracted support staff has not been defined because the head of procurement retired. The sponsor, Lillian Timmons, is the only remaining project stakeholder from the first attempt, and she is upset that the project is starting over. She has asked you to spend the first week completing a full review of what went wrong and how you will change and manage the project going forward. You are to submit a memo to her by Friday end of day discussing your findings. She is not willing to take a chance on you as a PM if you don’t know what you’re doing. You need to gain her confidence to move forward.


Directions

  • Your memo should describe risk management approaches and analyze errors in communication and project management methodologies in past project developments. Your memo should inform the organization’s new direction for this project and assist in planning and execution for future projects. In your responses, consider PMBOK® methodologies and approaches.
    • Evaluate past project communications for effectiveness and appropriateness. Include the following in your response:
      • Where would you find documented past communication problems?
      • Why were past project communications ineffective or not appropriate? Provide examples to support your response.
      • How would you determine the risk aversion of the stakeholders?
      • How would you communicate with your stakeholders in this project scenario? Provide evidence to support why this strategy would be effective.
    • Define triple constraint and its impact on project planning and execution. Include the following in your response:
      • What is the triple constraint and how is it impacted with project changes?
      • What benefits can triple constraint have when planning and executing a project?
      • What elements are crucial to ensure that triple constraint is used effectively?
    • Determine if an appropriate project management methodology was used in the past project attempt in the provided scenario. Include the following in your response:
      • What is a methodology? Define the following:
        • Waterfall
        • Agile
      • What project management methodology was used in the past attempt, and why was that methodology appropriate or inappropriate?
      • What product methodology could be effectively applied to this project?
    • Explain strategies for identifying potential project risks and informing management. Include the following in your response:
      • Overall, what are common risks for this type of project?
      • How risk averse are your stakeholders?
    • Describe your approach for analyzing a project for risk. Include the following in your response:
      • What qualitative factors are considered in risk analysis?
      • What quantitative factors are considered in risk analysis?
    • Describe mitigation strategies for the identified potential risks. Consider the following in your response:
      • What steps would you take to develop a response after a strategy is defined?
    • Explain the use of a change management plan for supporting project success. Include the following in your response:
      • What is a change management plan and when should one be used?
      • What are the benefits of having a well-developed change management plan?
      • What elements should be addressed in a change management plan to increase likelihood of success?
      • Should the project be continued? Why or why not?
      • What role do stakeholders play in change management?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Competency

In this project, you will demonstrate your mastery of the following competency:

  • Differentiate between matters of law and matters of ethics in business situations

Scenario

A few years ago Clare Applewood started a small outdoor equipment  business called Mountain Top View. The company is a sole proprietorship.  The company began as a single storefront and has grown rapidly to  include online ordering through the company website. The company’s  website includes the statement, “We are committed to keeping customer  information secure and protected.” Clare also uses social media sites to  market the company.

Carlos Rodriguez has worked for the company since the beginning. He  oversees both store and online operations. Clare and Carlos make most  decisions together.

Steve, the company’s Information Technology lead, discovered that the  company database of customer information was hacked. Customer names,  addresses, and phone numbers were accessed for only those customers who  placed online orders in the first quarter of the year. Steve was able to  correct the code that allowed the hack and is confident that the  database is now secure.

When Carlos overhears Steve talking about the database fix in the  store break room, he questions Steve about why he did not bring the  breach to anyone’s attention. Steve explains that because he was able to  quickly correct the code that led to the breach, and because only  address and phone number information for a handful of customers was  accessed, he didn’t think it was necessary to say anything.

Clare asks Carlos to evaluate whether the company has an ethical  and/or legal obligation to report the breach to their customers and to  recommend a course of action. She also asks Carlos to select an ethical  test or framework that all employees can use in the future to help guide  their decisions.

Directions

Report

Evaluate whether the company has an ethical and/or legal obligation  to report the breach to its customers. Your evaluation should be framed  as a report for the owner, Clare, that includes the following sections  and information. Cite your sources using APA style.

  1. Introduction 
    1. Include a definition of ethics and explanation of how ethics compares to law.
    2. Provide an explanation of corporate social responsibility and how it relates to ethical business practices.
  2. Analysis 
    1. Provide a summary of the ethical and/or legal issues involved in this situation.
    2. Briefly describe the relevant stakeholders, the key facts, and the potential implications or impact of the situation.
  3. Recommendation 
    1. Provide your recommendation for a course of action supported by  relevant resources, such as specific laws and commonly accepted ethical  practices.
    2. Explain the reasoning behind your recommendation and use reliable  sources, such as the textbook and other course resources, to support  your position.
  4. Conclusion: Describe how advances in technology in today’s business world have both legal and ethical implications.

Ethical Test or Framework

Select a test or framework for all employees in this company to use.  Demonstrate how it can be used when faced with an ethical dilemma. Cite  your sources using APA style.

  1. Test or framework 
    1. Select a text or framework option from among those described in the textbook.
    2. Name the option you selected and describe the test or framework, including its advantages and potential shortcomings.
    3. Explain why the test or framework that you selected is appropriate for this company; justify your selection.
  2. Apply the test or framework to the scenario to demonstrate how Steve could have used it to guide his decision making and actions.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Hi, I need to develop a business plan for a donor center. I have already completed the Needs Analysis which is attached. The business plan template and full instructions are also attached.

Phase 2 – Developing Business Plan

Now that you have completed the Needs Analysis and evaluated the information you’ve obtained, you will create a strategic 12 month business plan that will help you focus on the 5 C’s within the center to ultimately achieve next level, sustainable results.

The business plan template you will be using is designed to be your roadmap for success. As with any effective plan, you will concentrate both short term and long term results, while driving the sustainability of the business.

Two distinct audiences will be involved in the development of this plan; you and the Center Manager (CM). At this point, you and your CM have begun establishing a partnership and an aligned vision will be required to gain consensus on this plan. Remember, your CM will want to have a clear picture of what results can be delivered by when and how these results will contribute to the long term objectives. As the Assistant Manager, the plan you develop must be based on your aligned understanding of the challenges and uncertainties involved, as well as, understanding your scope of decision making authority in the center.

The template provided is designed to be used in a constantly evolving state. This means that not only will the original plan be used to track progress and results every three months, but it will must also be reviewed and adapted with that frequency.

At the initial three month review point, you may be required to adjust your future targets based on the insight gained during the initial review period. This plan will become a living document and be the roadmap to achieving sustainable results. When setting objectives you should consider that the 12 month business plan works as follows for each of the 5 C’s:

  • 0 – 3 months: Determine the quick wins and easy fixes
  • 4 – 6 months: Promote stabilization of the processes affected
  • 7 – 9 months: Work to reduce variations and errors precursors
  • 10 – 12 months: Optimize performance and look for improvement opportunities
  • 13 months: Develop updated business plan for implementation

When considering your goals and building your plan, ask yourself the following questions:

Vision

What do we want to achieve by the end of 12 months?

3 Months

6 Months

9 Months

12 Months

Performance Objectives

How are we going to measure success?

Workstreams and Projects

What are the main work areas? What are the proposed main projects in those work areas?

Resources / Data Collection

How many and what kind of people do we need to work on the projects? What do we need to know in order to achieve success?

Adjustments

Does your plan support the desired outcome? Were any changes necessary to keep your plan on track?

Sustainability

Do the items implemented continue to deliver desired results?

Be sure to think about the strategy behind your plan, and remember that not every task needed to obtain a goal can be listed in this plan. To keep track of the multitude of tasks that may need to occur, we have provided you with a Plan of Action template. The Plan of Action will allow you to assign responsibilities, due dates and resources to the members of your team, while satisfying the need for tracking and accountability.

To ensure the business plan is successful, you will need to decide on both a communication and implementation plan for the center. By opening the lines of clear, concise and frequent communication, you can garner support and gain buy-in from everyone in the center. Including them in the creation of the Plan of Action will build a stronger team and more effectively address the items that need to be changed.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Introduce yourself briefly. Based on your own personal ideas and viewpoint, provide a definition of privacy. This definition can be based on any aspect of privacy.

In your response posts, compare and contrast your thoughts with those of your peers. Did anything influence your perspective?

Note: Privacy can be a highly personal topic. In your posts, remember to maintain professionalism. Focus on the topic and not on the person. 

1st peer post

Katherine Gomez posted Oct 25, 2021 9:37 PM

Hi everyone,

My name is Katherine, and I live in New Jersey, just about five minutes from New York City. I work full-time at a financial institution and am proudly pursuing a bachelor’s degree in Information Technology.

I believe that the idea of privacy has become more complex matter, especially as technologies have evolved. I do think that with evolving technology, as a society, we need to recognize that privacy is an important asset, which we need to be diligent about. My definition of privacy encompasses our abilities to have a safe exchange of information, as one deems fit, within a secure exchange. I determine how and what I do with my information, no one else. This information can be highly sensitive or not; and a secure exchange can be from an interaction with a friend to highly confidential information that is encrypted. The availability and need for instant information have become a necessity that as society; we have become more willing to disclose snippets of information, in exchange for the convenience of having access to more information, and with the possibility of instant gratification. Ultimately, the responsibility of our own privacy relies on each of us; whether it be corporate or personal, we have the obligation to ensure that the information handled, is the information one wants to handle, and that is used as it is intended use.

I look forward to learning from all of you this term!

Discussion 1

Contains unread posts

Philip Wheeler posted Oct 26, 2021 7:22 AM

Subscribe

Hey everyone! My name is Phil Wheeler. I am currently pursing my undergraduate degree in Cybersecurity.

Privacy has a lot of different definitions. I would define privacy is the method to make what would be public information confidential. Privacy is used to ensure that people that are not authorized to access information that is deemed sensitive by the person that controls that information.

Great meeting everyone!

Phil

2nd peer post

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

In your initial post, introduce yourself to the class by describing your interest in the impact of systems on organizations and what you hope to gain from this course. Then take a moment to look at the world around you and consider how it is filled with systems. You will likely see an alarm clock, a washing machine, an automobile, or a bike; you may even be wearing a system in the form of a Fitbit. Technically speaking, you are a system.

Systems are so embedded and tied to our capacity to function that often we take them for granted. We can also fail to recognize the significance of the parts that make up systems. For instance, would a washing machine still function effectively without a drain pipe? How about a bicycle without pedals? Essentially, a whole system is a collective of parts that work together.

In your initial post, you are to create your own definition of what a system is, beyond the idea that it is a collection of parts. For this post, you may want to consider:

Feedback as it relates to the idea of systems

Different kinds of systems

  • System functionality
  • For the second part of this initial post, you will choose an organization, such as a chain of stores or a corporation, and consider the systems that exist within the organization. Within your post, answer the following questions:
  • What systems might exist within the organization?

How might the systems impact functionality in the organization?

In your response to two peers, address the following questions:

  • How might the success of your peers’ systems be measured?
  • Which system do you think has the most overall impact on the organization?

1st peer post

Alan Fairfield posted Oct 26, 2021 9:00 AM

Hello class! Great to be here in week one of this course.

I would define a system as a collection of individual components, which work together in synergy to enact particular functions, in a way that is more efficient than the individual sums of the system’s constituent parts. Interaction and interdependence are key elements of what constitutes a system, as the prompt established with the washing machine and drainpipe example. Each component may measure, transmit, collect, store, or apply a certain processing to information, and this feedback is what differentiates a system from a process. Then, processes which are interrelated and involve human and/or technological processes are commonly accepted definitions of systems. There are many different types of systems. Order processing, payroll, office automation, support, are all types of systems which augment organizational processes. With each type of system, are different functionalities. An order processing system functions as a ledger for orders, and as a transmitter of data to the relevant interfaces, so orders can be completed. Payroll handles employee information and ensures that inputs and outputs are confidential and have integrity.

Furthermore, going back to the washing machine example, some systems may be kinetic, while other systems may be cybernetic, electrical, mechanical, or human (which is somewhat different from cybernetic, which incorporates humans with information systems).

Organizations may have payroll systems, Point of Sale (POS) systems, database systems, Intrusion Detection and Prevention Systems (IDPS), quality assurance systems, and office automation systems. Of course, this list is not exhaustive, and there are many other types of systems that might exist within an organization. Organizations also may have kinetic systems, like HVAC systems, electrical systems to power their operations, or mechanical systems (depending on the type of organization), which work in concert with information systems.

These systems naturally impact the functionality of organizations. Information systems allow for information to be stored, processed, transmitted, and otherwise utilized for functional purposes. Electrical and HVAC systems enable an organization to enact regular operations, including the maintenance of information systems. Human-centric systems, like payroll, allow the organization to employ and contract people under relevant laws and regulations, which impacts functionality by enabling a much higher output.

Undoubtedly, systems both enable a baseline level of functionality, and magnify functionality greatly. Let me know what you all think!

2nd peer post

Kyle Sanborn posted Oct 26, 2021 4:59 PM

Subscribe

Hello everyone!

My interest of systems on organizations is the interaction that not only the collection of parts have but how the systems can interact with each other as well. Different systems work together, and that can technically be classified as a system – making a system a collection of systems. It is incredibly interesting to me to think about how each part of a system is important, but other parts play more vital roles. The criticality of each role is worth analysis itself, and I hope to learn more about this important from this course.

My own definition of a system would be numerous items coming together to work towards a common goal, each having their own purpose in accomplishing said goal. Each item affects the system in its own way, where it can either affect the entire system or only other specific parts of the system. This, however, could potentially create a cascading effect throughout the system where one failure could create other failures leading to an entire system failure which could then potentially affect other systems that are connected to this one. The possibilities with systems and the effect that one failure can have almost seem endless!

One major aspect for organizations, such as Walmart, would be their sales and marketing systems. Sales could be seen as one system, and marketing could be seen as another. When done correctly, these two systems could create a positive feedback loop where if one is doing well, the other also does well. However, the same can be said if one is doing poorly, the other could potentially do poorly as well. Marketing needs to device strategies that can boost their product’s appeal or outreach, leading to an increased interest in those products. Sales would then ensure that they have those chosen products in stock to meet the increased demand that marketing has created. If this goes well, marketing brings people in, and then sales keeps up with the stock. More people hear about this and become interested in buying the product, and then buy it if they see it in stores. This would result in a successful marketing and sales campaign. In a different case, marketing could bring increased interest in those products, but if sales can’t keep up with demand, then the success that marketing would bring in is directly affected. Similarly, if marketing doesn’t raise interest in those chosen products, then there might be a higher supply and lower demand, leading to lowering prices in order to get rid of these products faster. Overall, it is clear that these two systems have direct impacts on one another.
 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

As globalization has become increasingly common, so has the importance of analyzing opportunities to create value through outsourcing the supply chain. In this assignment, you will create a checklist to help determine which country might be the best location for parts of your organization’s supply chain.

Scenario

You are a consultant who specializes in helping U.S.-based businesses expand into new international locations. You have a new client who’s looking to outsource their company’s manufacturing of hard drives and computer memory, and it’s your job to assist in selecting the new locations. The company is very focused on quality, sustainability, and equality, and your client would like these attributes upheld in the new manufacturing locations.

Your task is to evaluate two of the following countries:

  • India
  • Mexico
  • Thailand

Then, recommend one country you believe would be the most suitable for the company’s new manufacturing facility, and one country that would be considered the least suitable.

Prompt

Evaluate both countries being considered for a new manufacturing facility through exploration of course and outside resources. Then, recommend the most and least suitable location based on the company’s attributes and requirements.

Specifically, you must address the following rubric criteria:

  • Sustainability Measures and Environmental Regulation: Briefly describe sustainability measures and regulations in each country, and analyze how they may work well with or create conflict or tension with your U.S.-based company.
    • Examples of items to consider include regulations around pollution, waster, and power sources.
  • Cost and Workforce: Briefly describe each country’s workforce for the creation of computer components and the cost of that labor.
    • Examples of items to consider include workforce education levels, the overall cost of labor, types of manufacturing available in the country, and the existence of a specialized workforce that can create computer components.
  • Government Regulation: Briefly describe the overall regulatory environment of each country. Take the most likely mode of entry into consideration for each country.
    • Examples of items to consider include the types of manufacturing operations allowed in the country, the labor regulations, and the overall business regulations.
  • Intellectual Property: Briefly describe the risk of intellectual property being stolen by creating a manufacturing location in each country.
    • Examples of items to consider include each country’s reputation when it comes to intellectual property, intellectual property regulations, and any other legal protections for intellectual property.
  • Reputation: Briefly describe the ways an organization can face reputational risk through outsourcing its manufacturing to each country.
    • Examples of items to consider include if and why other organizations have closed manufacturing locations in each country, how your organization’s customer base will view manufacturing in each country, and the protections each country provides to its workforce and the environment.
  • Recommendations: Based on your evaluations of the key attributes and requirements, recommend one country that is the most suitable location for your client’s new manufacturing facility, and one country that would be the least suitable location. Justify your recommendations with evidence from your evaluations and the course resources.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

(I HAVE INCLUDED ATTACHMENTS WITH THE KELLOGG FINANCIAL STATEMENTS YOU WILL NEED TO DO THESE CALCULATIONS ) **

FIN 325Final ProjectMilestone ThreeGuidelines & Rubric Overview:

The final project for this course is the creation of a financial statement analysis.A business’s financial statements offer important insights into its performance and financial health that help guide internal managers’ and external investors’ resource allocations. For a financial analyst, being able to accurately read and interpret these statements is a critical tool in making sound recommendations to clients or company executives. Analysts also need to understand how the limitations of these statements and the legal and ethical obligations that underpin them impact business decisions.

Prompt: In this milestone, you will submit adraft of aportion of the analysis step (PartII), Section C: Key Ratios. You will calculate the ratios for the company selected in Milestone One and show your calculations for each indicator in an appendix. Specifically, you must calculate and explain profitability, liquidity, debt, operating performance, cash flow,and investment valuation.

Specifically,the following critical elementsmust be addressed:

II.Analysis. Use this section to present your findings, based on quantitative and qualitative analysis of the financial statements. Include a copy ofthe financial statements and any ratios or analysis in an appendix as support for your text. In particular, this section should cover:

c)Key Ratios. Use this section to discuss key performance indicators (ratios). Be sure to show your calculations for each indicator in an appendix. Specifically, you must look at:

1.Profitability: Accurately present and explain the significance of the profit margin, return on assets, return on equity, and return on capital ratios for this company. In other words, what are the ratio values for this company,and what do they suggest for informing decisions to buy or sell company shares or change management procedures?

2.Liquidity: Accurately present and explain the significance of the current, quick, and cash ratios for this company. In other words, what are the ratio values for this company,and what do they suggest for informing decisions to buy or sell company shares or change management procedures?

3.Debt:Accurately present and explain the significance of debt, debt-equity, andinterest coverage ratios for this company. In other words, what are the ratio values for the company,and what do they suggest for informing decisions to buy or sell company shares or change management procedures?

4.Operating performance: Accurately present and explain the significance of the fixed-asset turnover ratio for this company. In other words, what is the ratio value for this company,and what does it suggest for informing decisions to buy or sell company shares or change management procedures?

5.Cash flow: Accurately present and explain the significance ofthedividends payout ratio for this company. In other words, what is the ratio value for this company,and what does it suggest for informing decisions to buy or sell company shares or change management procedures?

6.Investment valuation:Accurately present and explain the significance oftheprice/book value, price/earnings, price/sales, and dividend yield ratios for this company. In other words, what are the ratio values for this company,and whatdo they suggest for informing decisions to buy or sell company shares or change management procedures?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

  • 4-3 Jupyter Notebook (Discussion Prep)External Learning ToolTask: View this topicThis activity will take you to the Jupyter Notebook containing the Python scripts for your Module Four discussion. It is highly recommended that you read through the discussion prompt before completing your work in this notebook. When you are finished completing and running the Python scripts, begin work on your initial discussion post.
    Note: This task is not graded, but you will be required to attach your completed Jupyter notebook to your discussion post in the next activity.
  • 4-4 Discussion: Hypothesis Testing for the Difference Between Two Population ParametersDiscussion TopicTask: Reply to this topicStarts May 22, 2021 10:59 PMUse the link in the Jupyter Notebook activity to access your Python script. Once you have made your calculations, complete this discussion. The script will output answers to the questions given below. You must attach your Python script output as an HTML file and respond to the questions below.In this discussion, you will apply the statistical concepts and techniques covered in this week’s reading about hypothesis testing for the difference between two population proportions. In the previous week’s discussion, you studied a manufacturing process at a factory that produces ball bearings for automotive manufacturers. The factory wanted to estimate the average diameter of a particular type of ball bearing to ensure that it was being manufactured to the factory’s specifications.Recently, the factory began a new production line that is more efficient than the existing production line. However, the factory still needs ball bearings to meet the same specifications. To compare the accuracy of the new process against the existing process, the factory decides to take two random samples of ball bearings. The first sample is of 50 randomly selected ball bearings from the existing production line, and the second sample is of 50 randomly selected ball bearings produced from the new production line. For each sample, the diameters of the ball bearings were measured.The two samples will be generated using Python’s numpy module. These data sets will be unique to you, and therefore your answers will be unique as well. Run Step 1 in the Python script to generate your unique sample data.Suppose that the factory claims that the proportion of ball bearings with diameter values less than 2.20 cm in the existing manufacturing process is the same as the proportion in the new process. At alpha=0.05, is there enough evidence that the two proportions are the same? Perform a hypothesis test for the difference between two population proportions to test this claim.In your initial post, address the following items:
    1. Define the null and alternative hypotheses in mathematical terms as well as in words.
    2. Identify the level of significance.
    3. Include the test statistic and the P-value. See Step 2 in the Python script. (Note that Python methods return two tailed P-values. You must report the correct P-value based on the alternative hypothesis.)
    4. Provide a conclusion and interpretation of the test: Should the null hypothesis be rejected? Why or why not?
    5. In your follow-up posts to other students, review your peers’ analyses and address the following questions:
    6. How does your conclusion compare to theirs?
    7. Do they have the correct conclusion based on their P-value and the level of significance? Why or why not?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Touchstones are projects that illustrate your comprehension of the course material, help you refine skills and demonstrate application of knowledge. You can work on a Touchstone anytime, but you can’t submit it until you have completed the unit’s Milestone. Once you’ve submitted a Touchstone, it will be graded and counted toward your final course score.

Description

Getting Started

For Touchstone 1, you will be writing two separate, distinct paragraphs. You will write one paragraph in the informative mode and one paragraph in the descriptive mode.

The informative paragraph must be written in a non-biased tone and explain, teach, or inform. The descriptive paragraph must use sensory details to describe a person, place or object.

In order to foster learning and growth, all essays you submit must be newly written specifically for this course. Any recycled work will be sent back with a 0, and you will be given one attempt to redo the touchstone.

Choosing a Topic

For the informative paragraph, be creative and choose a topic that you already know something about. (You do not need to conduct any research for this paragraph.) Be sure to write in an objective and non-biased manner with your intended audience and purpose in mind. You may write about any topic you wish that you know something about, however; below are some sample topics that may help you get started.

  • The background, history, or rules of a particular game or sport
  • The materials, tools, background or approach for a hobby you enjoy
  • The action/process for an activity such as driving, planting a garden, grilling a steak, etc.
  • The history of a place that you know a lot about (a city, state, natural attraction, etc.)
  • A scientific process or concept that you are very familiar with

For the descriptive paragraph, use sensory language and vivid details to describe a person, a place or a thing. Sensory details describe how something looks, sounds, feels, smells or tastes. You should use precise language to “show” rather than “tell” about what you are describing. Be sure to write with your intended audience and purpose in mind. What you write about is entirely up to you as long as you use vivid details and sensory language to bring the description to life. However, below are some sample topics that may help you get started.

  • Describe a room in your house
  • Describe your favorite spot to spend time
  • Describe a person who is special to you
  • Describe a meal that you enjoy eating or cooking
  • Describe a unique family tradition

Paragraph Guidelines

Refer to the checklist below throughout the writing process. Do not submit your Touchstone until your paragraphs meet all guidelines.

Paragraph Structure
  • Does each paragraph include a topic sentence that depicts the controlling idea of the paragraph?
  • Does each paragraph include supporting sentences that effectively support your topic sentence?
  • Are all sentences or details in the paragraph relevant to the topic sentence?
  • Does each paragraph include a concluding sentence that gives closure to the paragraph?
Paragraph Cohesion
  • Is the sequence of all sentences within each paragraph logical (topic sentence first, logical sequence of supporting sentences, concluding sentence last)?
  • Are transitions used effectively to connect ideas within the paragraph?
  • Is the paragraph easy to read?
Sentence Structure
  • Are all sentences complete and correct?
  • Are there any run-on sentences? Have you used conjunctions and correct punctuation between independent clauses?
  • Are there any sentence fragments? Does each sentence have a subject and verb and express a complete thought?
Descriptive Paragraph
  • Does the writing “show” the reader details rather than “telling” about them?
  • Does the paragraph describe a person, place or object?
  • Have you touched on at least three of the senses in your use of sensory language?
Informative Paragraph
  • Does the paragraph clearly inform the reader about a topic?
  • Is the paragraph based on information or facts rather than opinion?
  • Is the tone of the paragraph neutral and objective?
Conventions
  • Have you checked your paragraph for grammatical errors?
  • Have you used Spell-Check or another method to check spelling?
  • Have you used punctuation correctly?
Before you Submit
  • Have you underlined your topic sentence, one supporting sentence and your concluding sentence in each paragraph?
  • Have you clearly labeled each paragraph as either “Descriptive” or “Informative”?
  • Have you clearly identified the intended audience and purpose above each paragraph?
  • Have you included your name, date and course at the top left of the page?
  • Is each paragraph between 200-300 words?
Reflection
  • Have you answered all of the reflection questions thoughtfully and thoroughly?
  • Are your answers to the reflection questions included on a separate page below your paragraphs?
  • Have you met or exceeded the required length for each reflection response?

Reflection Questions

  1. What do you think your strengths and weaknesses are in terms of sentence construction and paragraph development? (1-2 sentences)
  2. Explain how writing for a particular purpose and audience shaped each of your paragraphs. (3-5 sentences)
  3. Discuss your feelings about writing in different modes. Is there a particular mode you enjoy writing in more than another? (3-5 sentences)
  4. Explain how different writing modes that you have learned about might be applied to scenarios in your real life. (3-5 sentences)

Scoring

Your composition and reflection will be scored according to the Touchstone 1 Rubric, which considers your reflection, your descriptive and informative paragraph elements, structure and organization as well as your use of conventions.

Requirements

  • Each paragraph should be 200 to 300 words (approximately 1/2 page) in length
  • Double-space the paragraphs and use 1-inch margins
  • Use a readable 12-point font
  • All writing must be appropriate for an academic context
  • All writing must be original and written for this assignment
  • Plagiarism of any kind is strictly prohibited
  • Submission must include your name, the name of the course, the date, and the title of your composition
  • Submission must include both your descriptive and informative paragraphs and your answers to the reflection questions following each
  • Submit a single file only, including all assignment components
  • Acceptable file formats include .doc, and .docx.

Helpful Tutorials

Example

→ Sample Touchstone

Scoring

Proficient (90-100%) Acceptable (70-89%) Needs Improvement (50-69%) Non-Performance (0-49%)

Conventions (10)

Demonstrate command of standard English grammar, punctuation, spelling, capitalization and formatting. Formatting of paragraph meets requirements for appropriate line spacing, margins and font size.

There are no errors or minimal errors in grammar, punctuation, spelling, capitalization and formatting (line spacing, margins and font size). There are occasional errors in grammar, punctuation, spelling, capitalization, formatting, and usage. There are frequent errors in grammar, punctuation, spelling, capitalization and formatting (line spacing, margins and font size). There are consistent errors in grammar, punctuation, spelling, capitalization and formatting (line spacing, margins and font size).

Sentence Structure (15)

Sentences are constructed effectively and do not include run-ons or fragments.

There are minimal errors in sentence structure involving run-on sentences or sentence fragments. Sentence structure errors do not impede understanding of the writing. Some errors in sentence structure involving run-on sentences or sentence fragments may be present, but the writing is predominantly error free. Sentence structure errors occasionally impede understanding of the writing. A significant number of errors in sentence structure involving run-on sentences or sentence fragments are present. Sentence structure errors tend to impede the understanding of the writing. The majority of the writing contains errors in sentence structure involving run-on sentences or sentence fragments. Sentence structure errors consistently impede the understanding of the writing making it difficult to follow.

Paragraph Structure (15)

Paragraphs include all required elements including a topic sentence, supporting sentences and a concluding sentence.

The paragraph includes a topic sentence, supporting sentences and a concluding sentence. All elements of the paragraph are constructed effectively. The paragraph includes a topic sentence, supporting sentences and a concluding sentence. Two of the elements of the paragraph are constructed effectively and one is not. Only one of the three paragraph elements (a topic sentence, supporting sentences or concluding sentence) is present and used effectively. The other two elements may be absent or may be constructed ineffectively. All three of the paragraph elements (a topic sentence, supporting sentences and concluding sentence) are absent or used ineffectively.

Paragraph Cohesion (15)

Presents a coherent paragraph that includes effective transitions. Paragraphs are structured logically.

The sequence of all sentences within the paragraph is logical and transitions used to connect sentences and ideas are effective such that the flow of writing can be described as smooth throughout. The sequence of sentences within the paragraph are predominantly logical, and the transitions used to connect sentences and ideas are predominantly effective, however there are a few issues disrupting the flow of the writing such that the flow of writing can be described as predominantly smooth. In multiple instances, the sequence of sentences within the paragraph is illogical, and/or the transitions used to connect sentences and ideas are ineffective such that the writing lacks a smooth flow. There are many issues with illogical sequence of sentences and poor transitions throughout the writing making it difficult to follow or make connections.

Descriptive Paragraph (15)

Presents a paragraph that effectively incorporates elements of descriptive writing.

The description predominantly “shows” rather than “tells” using vivid sensory details (details that evoke sight, smell, sound, touch, or taste). Achieves the purpose of providing a detailed description of a person, place or thing, such that the subject can be visualized/experienced by the reader. The description adequately “shows” rather “tells” but leans somewhat too heavily on “telling.” The writing still primarily achieves the purpose of providing a description of a person, place or thing, however the description is lacking in detail and immediacy, such that the subject can mostly be visualized/experienced by the reader. The description predominantly “tells” rather than “shows.” The writing minimally achieves the purpose of providing a description of a person, place or thing, such that it is difficult for the reader to visualize/experience the subject The writing cannot be considered a descriptive paragraph. It does not achieve the purpose of providing a description of a person, place or thing.

Informative Paragraph (15)

Presents a paragraph that effectively incorporates elements of informative writing.

The writing employs an objective or neutral tone and effectively incorporates plenty of informative details. The writing clearly achieves the purpose of informing the reader. The tone of the writing is predominantly objective or neutral and incorporates some informative details. The writing adequately achieves the purpose of informing the reader. The tone of the writing is not objective or neutral and does not incorporate informative details. The writing does not effectively achieve the purpose of informing the reader. The writing cannot be considered an informative paragraph.

Reflection (15)

Reflect on the writing.

Demonstrates thoughtful reflection; includes multiple insights, observations, and/or examples. Answers all reflection questions effectively, following response length guidelines. Primarily demonstrates thoughtful reflection, but some responses are lacking in detail or insight. Answers all reflection questions, primarily following response length guidelines. Shows limited reflection; the majority of responses are lacking in detail or insight. Answers reflection questions inadequately: may not answer all of the questions and/or may not follow response length guidelines. Does not answer the majority of reflection questions or the majority of answers do not follow response length guidelines.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

  • Apply database systems concepts and principles in the development of a client/server application
  • Develop client-side code that interfaces with databases

Scenario

You work for Global Rain, a software engineering company that  specializes in custom software design and development. Your team has  been assigned to work on a project for an innovative international  rescue-animal training company, Grazioso Salvare. You have been made the  lead developer on this project.

As part of its work, Grazioso Salvare identifies dogs that are good  candidates for search-and-rescue training. When trained, these dogs are  able to find and help to rescue humans or other animals, often in  life-threatening conditions. To help identify dogs for training,  Grazioso Salvare has reached an agreement with a non-profit agency that  operates five animal shelters in the region around Austin, Texas. This  non-profit agency will provide Grazioso Salvare with data from their  shelters.

In meeting with the client, you have discovered that they look for  certain profiles in dogs to train. For example, search-and-rescue  training is generally more effective for dogs that are no more than two  years old. Additionally, different breeds of dogs are proficient at  different types of rescue, such as water rescue, mountain or wilderness  rescue, locating humans after a disaster, or finding a specific human by  tracking their scent.

Grazioso Salvare is seeking a software application that can work with  existing data from the animal shelters to identify and categorize  available dogs. Global Rain has contracted for a full stack development  of this application, including a database and a client-facing web  application dashboard through which users at Grazioso Salvare will  access the database.

In the initial phases of this development, you developed a database  and a Python module enabling CRUD functionality for MongoDB. For Project  Two, you will complete the development of this project by coding the  dashboard and the database interface logic. This will include dashboard  attributes. The dashboard must be a user-friendly, intuitive interface  that will reduce user errors and training time.

Additionally, Grazioso Salvare has requested that the code for this  project be open source and accessible on GitHub, so that it may be used  and adapted by similar organizations. To that end, they have asked that  you also create a README file that documents and provides instructions  for reproducing the project.

Directions

Web Application Dashboard (Python Code)
After  successful completion of previous milestones and Project One, you have  created a database and established successful CRUD routines in Python  for MongoDB. For Project Two, you will now create a fully functional  MongoDB dashboard. This will allow the client, Grazioso Salvare, to  interact with and visualize the database.

To create the dashboard, you will create the different components in  Python code. Dashboard web applications lend well to the MVC design  pattern. Using this design pattern, the model is contained and accessed  in MongoDB, the views are dashboard widgets, and the controller uses  your CRUD Python module for queries as part of the interaction between  components. You will also be required to test and deploy the dashboard,  taking screenshots to show that each of the components executes  successfully.

The graphic gives a more visual depiction of the steps for the project. Step 1: Review the specs. Your code will put these into action! Step 2: Get started on the dashboard with an unfiltered data table of shelter animals. Step 3: Develop queries that allow users to filter the database. Step 4: Build interactive options through which users will activate the filters. Step 5: Add widgets for dynamic presentations of retrieved data. Step 6: Test the dashboard, verifying functionality with screen captures. Step 7: Create a README file to document your work.

  1. Before developing the Python code for the dashboard, be sure to  review the Dashboard Specifications Document provided by the UI/UX  developer at Global Rain. This document is located in the Supporting  Materials section and will provide you with examples of the different  dashboard widgets you will create: 
    • Interactive options to filter the Austin Animal Center Outcomes data set
    • A data table which dynamically responds to the filtering options
    • A geolocation chart and a second chart of your choice that dynamically respond to the filtering options
    • In addition to the widgets, you have been asked to include the Grazioso Salvare logo and a unique identifier  containing your name somewhere on the dashboard. A high-resolution copy  of the logo is included in the Supporting Materials section.
  2. Next, you will begin developing the Python code for your dashboard.  Starter code is contained in the ProjectTwoDashboard.ipynb file, linked  in the What to Submit section. Start by creating a data table on the dashboard which shows an unfiltered view of the Austin Animal Center Outcomes data set. To populate the data onto your table, utilize your previous CRUD Python module from Project One to run a “retrieve all” query and bring in the data from MongoDB.

    Tip:  Be sure to consider your client when creating the interactive data  table. Consider optional features that will make the table easier to  use, such as limiting the number of rows displayed, enabling pagination  (advanced), enabling sorting, and so on.

    Note: If you completed  the Module Six Milestone, you have already completed this step. Copy  your code for the data table into the ProjectTwoDashboard.ipynb file.

  3. Next, you will make sure that the dashboard filter options can properly retrieve data from the database. Start by developing database queries that match the required filter functionality.  Refer to the Rescue Type and Preferred Dog Breeds Table, located in the  Dashboard Specifications Document, to help you construct these queries.  

    Note: Be sure to utilize your previous CRUD Python module  (a PY file) from Project One to develop these database queries. You  will need to hard code in the username/password for the “aacuser”  account as part of the CRUD Python module class instantiation.

  4. You must develop the controller pieces to create interactive options that allow for the selection of data based on your filtering functions  (such as radio items or drop-downs). Develop these pieces in your IPYNB  file, and be sure to import and use your CRUD Python module queries  from Step 3. These interactive options will enable the control of other dashboard widgets, such as the data table and charts.

    Tip:  You may choose any interactive option that you wish, such as radio  items, a drop-down menu, and so on, as long as the client is able to  intuitively use the interactive option to filter the data. Refer to the  Dash Core Components reading from the module resources to help you set  up these options.

  5. Next, you must modify or create the dashboard widgets that receive  input from the interactive options and present those dynamic updates to  the client. Be sure to modify or create these widgets in your IPYNB  file. Specifically, you must do the following: 
    • Modify the data table you created in Step 2 so that it is an interactive data table that responds to input from the interactive options.
    • Create charts that display data in response to updates  from the data table. As outlined in the Dashboard Specifications  Document, you are required to create, at minimum, a geolocation chart  and a second chart of your choice.
    • Note: If you completed the Module Six Milestone, you have already  begun work on this step by creating the geolocation chart. Copy your  code into the ProjectTwoDashboard.ipynb file. You will need to make sure  that this chart receives updates from the interactive options.
  6. Finally, after developing all of your code, you must test and deploy  the dashboard to make sure that all of your components work. To  complete this step, run your IPYNB file. You must either take screenshots or create a screencast of your dashboard and widget functionality. Each of your screenshots or your screencast should contain the Grazioso Salvare logo and your unique identifier. Your screenshots or screencast must show the following: 
    • The starting state of your dashboard, which should include your widgets for the interactive options to filter data (such as radio items or drop-downs), the interactive data table, and the charts
    • Executions of your dashboard, showing the widgets after each of the following data filters has been applied (four screenshots total): 
      • Water Rescue
      • Mountain or Wilderness Rescue
      • Disaster or Individual Tracking
      • Reset (returns all widgets to their original, unfiltered state)
    • You will include all of these screenshots, or your screencast, in  your README file when describing the functionality of your project.  These screenshots are required as they demonstrate proof of your dashboard’s functionality.

README File
Grazioso Salvare has requested  documentation to accompany the code for your dashboard. This will ensure  that they are able to understand the work that was completed and more  easily maintain the code for this project.

You have been asked to create a README file that documents the project and includes instructions for reproducing the project. Be sure to address all of the following areas:

  • Describe the required functionality of the project.  Include the screenshots or screencast taken while testing and deploying  your dashboard (Step 6) as proof that you have achieved the required  functionality.
  • Describe the tools used to achieve this functionality and a rationale for why these tools were used. 
    • Be sure to explain why MongoDB was used as the model component of  the development, including what specific qualities or capabilities it  provides for interfacing with Python.
    • Be sure to explain the Dash framework that provides the view and controller structure for the web application.
    • Be sure to include links to any resources or software applications that were accessed or used.
  • Explain the steps that were taken to complete the project.
  • Identify any challenges that were encountered and explain how those challenges were overcome.

What to Submit

To complete this project, you must submit the following:

Web Application Dashboard (Python Code)
Submit a zipped folder containing all of the code for your dashboard. The zipped folder should include your completed ProjectTwoDashboard.ipynb file containing  the source code for your dashboard. Be sure to also include the code  for the CRUD Python module (PY file) that you originally developed in  Project One. All code files should follow industry standard best  practices, including well-commented code.

README
Your submission should be a Word document  that documents the project and provides instructions for reproducing it.  In your README file, be sure to include all required screenshots (or  your screencast) to demonstrate the functionality of your dashboard.

Supporting Materials

The following resource(s) may help support your work on the project:

Reading: CS 340 Dashboard Specifications Document
This  document was created by your UI/UX developer and details the necessary  functionality of your dashboard, as well as providing you with a  prototype of the dashboard layout. This document also contains the  Rescue Type and Preferred Dog Breeds table, which aligns dog breeds with  their use in different types of rescue. Use this table to help  structure the queries for your dashboard filtering options.

Image: Grazioso Salvare Logo
This  high-resolution PNG file contains the Grazioso Salvare logo. Be sure to  include this logo as part of your dashboard to ensure that the  application is properly branded.

Data Set: Austin Animal Center Outcomes
Grazioso  Salvare has provided you with this sample data set (CSV file) of animal  center outcomes. This will become the basis of your database and can be  used to test the functionality of your code. This data set has been  modified for the purposes of this project. Specifically, the following  columns have been added: location_lat (latitude), location_long  (longitude), and age_upon_outcome_in_weeks (the age of the animal, given  in weeks).

Reference: Austin Animal Center. (2020). Austin Animal Center Outcomes [Data set]. City of Austin, Texas Open Data Portal. https://doi.org/10.26000/025.000001

Reading: CS 340 Jupyter Notebook in Apporto (Virtual Lab) Tutorial
This  tutorial will help you navigate the technology you will be using in  this course. You will learn how to get into the Jupyter Notebook via the  Virtual Lab (Apporto), as well as how to complete, save, and download  your work.

Reading: CS 340 Mongo in Apporto (Virtual Lab) Tutorial
This tutorial will help you navigate the different Mongo tools needed for your development.

Textbook: Head First Python
This  Shapiro Library textbook was designed to teach the Python programming  language. Refer to this resource if you need a refresher on any Python  syntax as you develop your code.

Reading: Style Guide for Python Code
Refer  to this style guide when developing your Python code for this project.  It is important that your code follows industry standard best practices,  such as including clear variable names, exception handling, and in-line  comments throughout your code.

Reading: Make a README
This  reading describes the purpose behind README files, and will help you  keep in mind the purpose and intended audience for your README file. You  are not required to use the same sections as suggested in this reading.  As a note, the examples in this article use the MD format, which is a  common format for README files on GitHub. You have been asked to submit  your README file as a Word document for this project.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Discussion: Involuntary Group Members

Involuntary members have been ordered to attend a group in exchange for some reward. Many times, this is a result of judicial system intervention. Often, these members are not interested in participating and getting to know others. The clinical social worker must understand the potential issues or problems that arise within a group of involuntary members and ways to address these issues. It can be especially difficult to create a sense of empowerment when these members have been mandated to attend.

For this Discussion, pay particular attention to the Schimmel & Jacobs (2011) piece.

By Day 3

Post your description of the strategies for working with involuntary group members presented in the Schimmel & Jacobs (2011) article. Describe ways you agree and/or disagree with their strategies. How might you handle the situations presented in the article differently? Explain ways these strategies promote empowerment.

By Day 5

Respond to a colleague who presents a different point of view on these strategies than you

College 1: Caneshia

Strategies for working with involuntary group members

Self-denial is characteristic a social worker will face. Thus, one must act accordingly to ensure the patient feels comfortable and safe. Patients who desire not to participate will react in negative ways. This can include speaking out of term, rude comments, or will attempt to sabotage the group. Involuntary members are difficult to motivate to participate in groups (Schimmel & Jacobs, 2011). Schimmel and Jacobs discussed several strategies to engage in voluntary members in hopes of them benefiting from the groups. It is important for leaders to be energetic, motivated, patient, and flexible when working with involuntary members (Schimmel & Jacobs, 2011). As a social worker, one must locate the root of lack of motivation to participate within group. For example, the patient could have experienced trauma that has led to hurt and frustration. The primary issues are not the patient unwillingness to work with the group, the patient does not know how to process emotions. There is a lack of education of how to process feelings and emotion. One strategy can that be done is educating the purpose of the group. Hence, the goals of the group. In addition, explain the dynamic of the group. Explain how the group is structured for support and not to attack the patient. A second strategy is to use written exercises. Written exercises will engage in voluntary members by giving them a brief written task to answer incomplete or making a list (Schimmel & Jacobs, 2011). Members will be cooperative if the group leader asked for a verbal response. This strategy will allow the patient to focus on their answers. Thus, causing the patient to become comfortable with reporting to the group. The written exercise can prompt group participants on becoming comfortable in being vulnerable with group members. Group members are presented time to process thoughts. As a group leader I attempted this strategy; however, one member was not able to read in English. Thus, further assistance was needed. I read the question presented so the group participate was able to understand. To reduce anxiety for the patient, I ensured the group that I would not be taking the question up. This also helps with individuals who read and write on a level below their age. Hence, spelling and grammar errors.

Agree and/or disagree with their strategies

I agree with the strategies for working with involuntary group members. Some members may feel ashamed or embarrassed. The actions presented on behave of the group member may not match the emotions and feelings of the group member. Writing down personal feelings and emotions is easier for some. The patient may not know how to put their feelings and emotions to words. Often one will experience difficult times, and our words are difficult to speak. The leader of the group must be prepared for negative reactions at any time of the group session and not take it personal (Schimmel & Jacobs, 2011). While guiding a patient to identifying stressors or triggers, conflict is expected to occur. This, the social worker should act accordingly to the conflict. As the social worker, being transparent of how the group is confidential, here for support, and beneficial for the patient situation. One will be open to cooperate. Some members are mandated to participate, thus, participating and completing group will be the deciding factor of their situation.

How I will react differently

I will research the patient limitations. For example, as I stated, the group member was not able to read English. I understood this limitation due to reading each patient’s report prior to group. I read medications, I read doctor visits, previous notes from other meetings. In addition, I read each group member’s safety plan. I knew each patient’s likes and dislike. I read the motivation skills of each patient. Overall, I knew my patient prior to group. This is to ensure that another patient does not trigger another patient. I knew the comfort zone of all the patients individually prior to placing the members in a group. It is important to understand your patient as an individual first.

Why empowerment

To empower the members the worker should, “emphasize members’ choices, their resiliency in the face of obstacles, and their strengths and abilities to change and to overcome adversity” (Toseland & Rivas, 2017, p.99). The written exercises allow the patient to witness their obstacles. The patient can reflect on those obstacles by reading the obstacles directly. The group member sees those obstacles, reflect on those obstacles, and can speak on the obstacles. For example, the group member can read their triggers, identify the triggers exist, accept those triggers, and speak on the triggers to the group.

Reference:

Schimmel, C. J., & Jacobs, E. (2011). When leaders are challenged: Dealing with involuntary members in groups. Journal for Specialists in Group Work, 36(2), 144– 158.

Toseland, R. W., & Rivas, R. F. (2017). An introduction to group work practice (8th ed.). Boston, MA: Pearson.

Chapter 7, “The Group Begins” (pp. 197–230)

Chapter 8, “Assessment” (pp. 230-263)

Colleague 2: Stacey Jones

Strategies for working with involuntary group members

Schimmel & Jacobs (2011) suggest various strategies in which social workers can address involuntary group members. One of the essential skills needed to lead involuntary groups is the leaders’ willingness to exert greater control over the group. Greater control can be applied by implementing the group topic or removing the group members’ resistance by becoming more voluntary. Strategies to engage involuntary group members are writing exercises, using prompts, and rounds. Each of these strategies are used to help remove resistance by encouraging the group member to share and become more open-minded in the process group.

Agree or Disagree with the strategies

As a social worker with over three years of facilitating groups, I have unknowingly implemented each of these strategies. Therefore, I agree with their effectiveness when working with involuntary group members. As a group facilitator, I often have difficulties conducting my all-female group due to members being involuntary to the group process. I recently started implementing a journal reflection assignment at the start of my group, which changed the dynamics. According to Schimmel & Jacobs (2011), writing exercise increases group members’ comfort level. In the past, I facilitated an all-male domestic violence group, and I used a prompt of a handmade flag. The flag was created because my clients were court-order to attend a domestic violence course due to their history as a perpetrator of abuse. I used to flag when my clients minimized and justified their role in the abuse. Therefore, the flag assists my client in challenging their irrational and rational thought process. I also used the rounds method to facilitate member introductions and build rapport (Toseland & Rivas, 2017).

How will I react to the situations presented

Schimmel & Jacobs (2011) states that social workers must be flexible and willing to adapt to the needs of their clients. Although I used the strategies mentioned above, I do not force my clients to share because demanding participation will only create hostility. I will handle the situations presented in the article differently by using an individual approach method. I will pay attention to boy language, speech pattern, and voice. For instance, some group members may display a level of resistance due to recent and unrelated trauma. Therefore, paying attention to body language such as crying helps the facilitator gain limited insight into the client’s behavior.

Strategies that Promote Empowerment

The mentioned strategies promote empowerment because they assist clients with gaining control over their lives. According to Toseland & Rivas (2017), empowerment in groups helps assist members in feeling good about themselves and encourages them to make a difference in their lives. For instance, the strategy of the round methods enables clients to identify and process their feelings. This assists in empowerment because clients can take an active role in the healing journey.

Reference:

Schimmel, C. J., & Jacobs, E. (2011). When leaders are challenged: Dealing with involuntary members in groups. Journal for Specialists in Group Work, 36(2), 144– 158.

Toseland, R. W., & Rivas, R. F. (2017). An introduction to group work practice (8th ed.). Boston, MA: Pearson.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Assignment:

Read the article: Controlling Simple Habits

* Read and review all of the information in this lesson including the sample data collection tools, the powerpoint presentation, etc.

* To practice and apply what you have learned in this lesson you will collect some baseline data on a simple habit you have. If you choose to focus on yourself that way you can monitor this daily, hourly, and moment by moment if necessary. For a day, use a chart, calendar, or other data collection tool to collect data on how many times or how often you exhibit the targeted behavior you have selected. Make it simple as this is a practical exercise for you to get some experience and become more comfortable with this process.

* Gather Baseline Data: on the first day, monitor how many times you exhibit the targeted behavior. Do not apply any intervention (do not reward yourself for stopping or substituting the behavior with something more positive or productive). Just monitor and gather baseline data. You must chart this on a checklist, calendar, spreadsheet, etc.

* Decide on a simple intervention: If the simple habit is nail biting, for example, decide to reduce the number of times you bit your nails to XXX (number of times) a day/hour, etc. Make it a manageable number and something obtainable. If you accomplish your goal, reward yourself with something that will be satisfying to you.

* Make sure you consider the concepts of deprivation and satiation when deciding on the reward/positive consequence of achieving your goal. A reward will only be a stronger motivator if you have been deprived of it for a period of time.

* This simple exercise will help you as you move along in your process of collecting data and monitoring your progress toward your A Better Me Plan. It will also help prepare you as you plan on designing your proposed Behavior Modification Project for a program/agency in the Human Services field (see syllabus for details).

Discussion Board: Post your summary of what you did above. Discuss what the process was like.

* Were you able to develop more of an awareness of the “simple habit” by just making the attempt to collect the data and record it? Sometimes we have habits that we are not aware of until someone else points it out to us. We then try to become aware and change this behavior (if it is annoying or bothersome to ourselves or others).

* Were you able to come up with a simple reward or positive consequence for yourself to motivate you to modify or change your behavior? * Was it something you have been deprived of for some time?

* Please share the results of this simple exercise in your posting.

Respond to 2 of your class colleagues listed below.

student one:

My Habit

I chose to monitor how many times in one day over 3 days I sucked my thumb. Yes, this is a bad habit that I have had since I was a child. I have always been embarrassed when someone noticed it while I was out in public or even at work. Over time as an adult, I grew to understand the underlying causes that would trigger me to put my thumb in my mouth. If there was a stressful event, I was thirsty, tired or hungry I would suck my thumb the most. I also, would suck my thumb when I wanted to concentrate and that seemed to calm me. So, during these times I would catch myself in the act or even have someone else point it put to me and I would document it.

The chart that I used measured only after I first woke up in the morning from 6am till lunchtime, and then lunchtime till dinner. I did tick markers every time I left the house and attempted to put my thumb in my mouth. Seeing that this chart would be the most accurate from days I was not in my house. I also had my husband point out to me through the times when I was putting my thumb in my mouth outside of the house. I was shocked to even think I would do it when I was driving, although it was ONLY at stop lights or heavy traffic where we were at a stop. After monitoring the first day and realizing when I did it the most out of the house I decided to find something to keep my mouth busy.

I bought a few varieties of gum. I use to be a smoker and usually when I was out in public, I did not put my thumb in my mouth but a cigarette instead. From the moment I would get in my car I would take out a stick of gum and put it in my mouth. Once I would get to points of destinations like the gas station, restaurant or other activity I had planned for the day I would start with a new piece of gum.

Student two:

I chose to monitor how much I cuss. I did not think that I cuss that much but others have said that I do cuss a lot. I was shocked at how much I do cuss. I decided that every time I am aware that I will cuss to say something funny instead. So instead of saying a cuss word I say “fudge” or something like that. I decided that I would limit my cussing to 10 times a day. If I reach my goal and cuss 10 times or less than I will watch one episode of a Netflix show that I have not been able to watch due to time constraints. If I meet my goal, I will give myself the time to watch the show.

I was very shocked at how much I cussed. I never really thought it was a problem but after doing this assignment, I realize I CUSS and CUSS a lot. I was very disappointed in myself that I actually cuss that much. This assignment really made me aware of the problem and now I know I need to work really hard to fix it.

I was able to figure a simple reward. I do not get a lot of time to watch television. One of my favorite shows on Netflix is Virgin River. I have not had much time, so I really want to watch it. I made the decision to reward myself one episode a day if I meet my goal of a reduced number of times that I cuss. I have been deprived of watching the show so I think it will be a great motivator.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

ASSIGNMENT:

You have been working on your “A Better Me Plan”. Take this opportunity to update the class on how you are doing toward your goal. (my goal is to work on eating healthier and lose weight)

*****IMPORTANT POINTS TO COVER (must be included in your discussion post for full credit): Identify and then describe what type of schedule of reinforcement you are using in your plan? Have you used any of the principles of Differential Reinforcement? (Maybe this would be a good time to add some to your plan.)

At this point in your plan, are you motivated to work on your goal (s)? Respond to the quote below and how it applies to behavior modification: How can you use the principles you have learned so far when working with clients in the human services field?

“Motivation is what gets you started. Habit is what keeps you going.” – unknown

Respond to 2 of your class colleagues listed below.

Student one:For my Better Me Plan it was brought to my attention that my focus needed to be adjusted. Not why I keep choosing these men that are bad for me, but to start looking at fixing myself and why look at why I don’t feel I deserve better. This will be a difficult process to go through because I will have to look at my past and try to dig deep to see why I don’t like myself, and what I can do to start appreciating myself more. I’ve been through this process before in a group call Celebrate Recovery, this will be round 2.

I believe in the quote, and I just need to find that one thing to motivate me, and then make a habit of it.

Student two:

My better me plan was to focus on becoming more healthier. I am doing better then what I was doing a couple months ago, I have started exercising and eating more healthier. I don’t let things stress me and I have been more relaxed now then ever before. I am using the Fixed-Interval Schedule in my plan, because after I have been doing better for myself I will get more and more healthier and my body will feel much better then what it did. I have not used any of the principles in Differential Reinforcement but I plan to use Differential Reinforcement of Alternative Behavior. I am very much motivated to continue working on my goal and I plan to keep working on it so I can not only be healthy for myself but for my son as well because with him being 1 I have a lot of running after him I will be doing. The quote “Motivation is what gets you started. Habit is what keeps you going.” is a great quote and very much true. When you have something to motivate you or someone motivating you, you will accomplish so much more because you are working towards something. When something becomes a habit for you, you will continue to do it over and over again. This is a great quote.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

The domain name system (DNS) protocol plays a critical role in enabling network communications. Before you begin this discussion, consider reviewing the optional resources in the Reading and Resources section of this module, as you may want to use them to support your posts.

For your initial post, discuss a potential consideration associated with the use of DNS. Frame your consideration in terms of potential impacts to network architecture, organizational security, or technology management. Consider the following DNS-related topics as the focus for your post:

Zones: resource record types and/or zone transfers

Zones: master (primary) zone versus slave (secondary) zones

  • Public DNS versus private DNS versus split DNS
  • DNS-related vulnerabilities: man-in-the-middle attacks, DNS cache poisoning/DNS spoofing, Kaminsky DNS vulnerability, dynamic DNS update vulnerabilities, or distributed denial of service (DDoS) attacks
  • Static DNS versus dynamic DNS (DDNS)
  • Respond to at least two of your peers by addressing one of the following:
  • Select a different frame of reference (infrastructure, security, or maintenance) and compare the effect on the selected topic identified in the original post.

Or

Provide additional considerations, advantages, or implications related to the original post. 

  • will post the peer posts later

Peer 1:

Benjamin Kachel posted Nov 16, 2021 4:16 PM

Subscribe

Hello Classmates,

I’m excited to see what you all come up with this week in terms of discussion posts! DNS protocols are not my forte by any means and they are a very new thing to me. So, I’m hoping this post can spark some good discussion to help me understand them better and you too if you have never really studied them before!

So, I’m slowly kind of piecing this together and the DNS type I would like to talk about is the public vs private vs split. So a private DNS is held within the company and works on the local network. It is cut off from the outside world by a firewall and is used internally. It should only answer to internal IPs. Public DNS is basically the internet. You type in a website address, the DNS server gets a request from you looking for the website, it finds the IP address you are trying to look for, and returns the information you requested. Split DNS uses multiple DNS servers to keep the traffic flow moving while also maintaining confidentiality on the internal network. I found an article on techopedia that explained it quite well. It states, “When internal network users look up hostnames, the internal DNS answers and externally forwards this information as needed. External users that lookup hostnames in an internal network are greeted by an external DNS, which contains data limited to publicly accessible resources; this prevents internal secrets from being divulged.”

This would impact the network architecture in a way that would allow for external to internal and internal to external communication so firewalls, switches, routers, DNS servers, and waps would all need to be configured to allow for these types of communications. Also, the DNS servers themselves can have rules as to which IP’s

As far as organizational security goes, I believe the settings for the DNS servers would impact this area the most. There is definitely a need for a firewall in a split DNS setup or any type of setup that allows outside traffic in or communication with the public internet.

Thanks and I’m excited to see what you all come up with.

~Ben

Resources

Techopedia, (2021), Split Domain Name System (Split DNS)
Retrieved from:https://www.techopedia.com/definition/1346/split-domain-name-system-split-dns

Peer 2:

Thomas Talbot posted Nov 17, 2021 2:55 PM

Subscribe

Well, I am not an expert by any means on anything DNS, but I will do my best to provide some useful and relevant information on the topic. The area that I opted to focus my post about is distributed denial of service (DDoS) attacks. DDoS attacks are malicious attacks on networks that disrupts normal operations and communications with a flood of malicious traffic (McAfee, 2021). The number of DDoS attacks is on the rise and both Amazon and Google have had these types of attacks launched against them (McAfee, 2021).

With DDoS attacks, groups of IoT devices or botnets which are typically, but not always affected, by malware and used to target a server or website (McAfee, 2021). Poor password habits can also lead to devices being hijacked by would-be attackers (McAfee, 2021). The attacker would likely need hundreds or thousands of devices working in unison to make one of these attacks possible (McAfee, 2021). The size of the botnet needed to take down the target depends on the intended target.

There are three main categories of DDoS attacks. These three categories are volume-based attacks, protocol attacks and application layer attacks (“What is a DDoS Attack?”, n.d.). Volume based attacks have the goal of utilizing all the bandwidth between the target and the internet (“What is a DDoS Attack?”, n.d.). Protocol attacks attempt to consume all server resources and sometimes include exhausting the resources of a firewall or load balancer (“What is a DDoS Attack?”, n.d.). Application layer attacks flood the system with what would appear to be legitimate requests in order to disrupt services (“What is a DDoS Attack?”, n.d.).

Identifying a DDoS attack can be tricky but there are a few telltale signs that one is taking place. These signs are:

  • Suspicious amounts of traffic originating from a single IP address or IP range
  • A flood of traffic from users who share a single behavioral profile, such as device type, geolocation, or web browser version
  • An unexplained surge in requests to a single page or endpoint
  • Odd traffic patterns such as spikes at odd hours of the day or patterns that appear to be unnatural (e.g. a spike every 10 minutes) (“What is a DDoS Attack?”, n.d., para. 10).

In order to prevent a device from easily being swept up into one of these botnets, there are several actions that one should take. The first of which is to secure your router by changing the default password that came with it (McAfee, 2021). The next action is to change the default passwords that are included with Internet of Things (IoT) devices (McAfee, 2021). The third action is to use a comprehensive security solution, which are widely available from third-party vendors (McAfee, 2021). Performing these three actions is also something that one should undertake to better secure their devices and network overall.

Reference

McAfee. (2021, March 24). What Is a DDoS Attack and How to Stay Safe from Malicious Traffic Schemes. Retrieved from https://www.mcafee.com/blogs/tips-tricks/ddos-atta…

What is a DDoS Attack? (n.d.). Retrieved from https://www.cloudflare.com/learning/ddos/what-is-a…
 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Scenario

The organization that you are a director of leadership and learning for has been conducting engagement surveys among its employees every two years to gain a deeper understanding of employees’ views on areas such as customer service, the organization’s overall strategy, job satisfaction, rewards and recognition, and training and development. The most recent survey was conducted this year, and the organization wants to carry out another survey in two years.

Prompt

Your task is to evaluate the employee survey results using a GROW Model Template (attached down below) and identify several survey questions that will target leadership skill and behavior improvement for the next two years. You will also represent the trends you’ve identified with bar or line graphs. For this assignment, you will complete the first five sections of the GROW model template:

  • Identified Trends
  • Employee Survey Results Data
  • Focus Areas
  • Reality—Current State
  • Desired Future State—Where Would You Like to Be?

Specifically, you must address the following rubric criteria:

  1. In the Identified Trends section, identify any noticeable trends in the Employee Satisfaction Survey Results (attached down below) data and address the following in your response.
    1. Are there certain focus areas that have seen significant changes compared to others?
    2. How might one focus area impact another?
  1. In the Employee Survey Results Data section, create bar or line graphs from the employee survey results data that best represent the trends you’ve identified above.
  1. In the Focus Areas section, identify three focus areas to improve the organization based on your evaluation, and provide rationale.
  1. In the Reality—Current State section, explain the current state for each focus area you’ve identified above according to the employee survey results. Consider the following in your response:
    1. In the Reality—Current State section, explain the current state for each focus area you’ve identified above according to the employee survey results. Consider the following in your response:
  1. In the Desired Future State—Where Would You Like to Be? section, create a goal to address each focus area you’ve identified within the next two years, and describe the impact to the entire organization. Consider the following in your response:
    1. The desired result should be 10% improvement for the next survey.

Guidelines for Submission

Submit the GROW Model Template as a Word document. Insert your bar or line graphs in the appropriate section. Please note that you should fill in all but the last two sections of the template for this assignment. You will complete the last two sections in Module Five. If references are included, they must be cited in APA format.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

So far in this course, you have explored many different mobile app  examples, all of which have differed greatly from one another. Now that  you have a stronger understanding of how this variance is underpinned by  standard design best practices, you will start to explore tactics you  would use to create your own mobile app UI.

In this assignment, you will select an app screen to re-create. This  can be from an app you have already analyzed in this course, another app  you are familiar with using, or a completely new app you found via  research. Then, you will determine what you would change on the screen  based on the understanding you have cultivated throughout this course  regarding design best practices and translating the needs of users.

Prompt

Specifically, you must address the following rubric criteria:

  • Design a user interface for a mobile app screen. On paper, or using a software of your choice (such as Microsoft PowerPoint), redesign one  screen for a mobile app. The way you illustrate the design can be  simple but it must include all the necessary elements for a user to  complete the primary tasks the screen was designed for. However, the  features you include should not necessarily be the same. Only the  overall goal that addresses user needs must be maintained. While  designing, you must do the following: 
    • Include relevant features such as navigation components or information components.
    • Label every component and describe them, along with any data they collect or interact with.
    • Indicate which elements on the screen are interactive.
  • Apply mobile app UI design best practices. Be sure  you continue to reference the Android Developers – Design for Android  guidelines, linked in the Resources section of this module, as you work  on your UI design. These are very comprehensive but it is important to  use them in all aspects of design.
  • Justify your design decisions. Explain why you  chose to make the UI design updates that you did for your creation. Your  reasons should be user-driven and compatible with the Design for  Android guidelines. Comment on any new features you introduced or any  challenging areas you overcame with creative solutions.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Your third longer-term assignment in this course is a presentation or short paper in which you will share your question derived at the end of your observation journal in Module Four, and discuss why it is important and how developments in the social sciences contribute to our understanding of ourselves, each other, and the world around us.

This final reflection will assess the following course outcomes, which you focused on throughout Modules Seven and Eight:

? Investigate major developments in the progression of social scientific thought for informing critical questions that drive social scientific inquiry ? Articulate the value of the social sciences for their impact on contemporary issues

Prompt

Your third project is a presentation or short paper (you are free to choose) that explores the question you posed at the end of your observation journal. With that question as your topic, you will explain why the answer to it is important to understanding yourself, other people, and the world around you, and how the social sciences have developed to help us answer these important questions. Be sure your actual question is apparent on the presentation or paper.

Specifically,

the following critical elements must be addressed in your submission:

I. Explain why your question is important to you as a member of society.

II. Detail the major developments in social science thinking that drive questions regarding studying the individual. Use course resources to back up

your discussion.

III. Explain how finding the answer to your question might impact others around you. For instance, who might be most invested in the answer?

IV. Detail the major developments in social science thinking that drive questions regarding studying others. Use course resources to back up your

discussion.

V. Explain why studying human behavior and identity is a valuable human endeavor.

VI. Detail the major developments in social science thinking that support the study and advancement of the social sciences as necessary and valuable.

Use course resources to back up your discussion.

Supporting Work and Resources

Throughout Modules Seven and Eight, there are supports you will use as you work directly on different elements of the final reflection.

1. In Module Four, you submitted your observation journal. Review your submission and the feedback for this assignment via the Project Two submission link in the Grades section of the course. Use the question you created from your observation journal for your final reflection. You are free to incorporate any feedback from your instructor on this question into your final reflection.

2. In Module Six, you submitted a micro-presentation or short answer response to give you an opportunity to practice elements of the final submission. For this assignment, you reflected on what you considered to be some of the most significant developments covered in Modules Five and Six and addressed the following:

a. Identify the developments and how they impact individuals or larger groups/cultures.

b. Describe how the developments changed society’s understanding. How is the development applicable outside of the social sciences?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Scenario

You work as the accountant of a sole proprietorship, Jamie’s Consulting. Jamie’s Consulting has decided to expand and would like to obtain a line of credit with the bank. To apply for a line of credit, the bank requires the most recent set of financial statements. To help the owner, Jamie, accurately convey the business’s performance and overall financial health to the bank, she has asked you to review the business’s recent transactions and write a brief that will prepare her for her meeting with the bank.

Directions

  • Financial Review: Jamie emails you the quarterly business transactions Word document to review. Jamie is currently traveling for business and would like the information from the review in a clear and concise manner. Use the Financial Review Template Word Document to review the transactions and provide sufficient reasoning for Jamie to understand your rationale for deciding to share the financial information with the bank. To ensure the financial information is accurate, reliable, and relevant, include the following in your review:
    • Apply the most relevant accounting principle from GAAP to each business transaction.
    • Explain your rationale for applying each accounting principle.
    • Use the accounting principles to decide to include or omit each business transaction.
    • Determine the appropriate account types for each business transaction. Note that each transaction will correspond to more than one type of account.
    • Refer to the accounting equation to determine whether each account type results in an increase or decrease of the account.
  • Brief to the Owner: After you send the financial review information, Jamie follows up with you via email. She is unfamiliar with financial accounting practices and asks you to write a brief that will prepare her for communicating the reliability of the financial information to the bank. As an accountant, you are responsible for effectively conveying the importance of accurate financial information. Specifically, Jamie asks you to address the following in your brief:
    • Explain the importance of applying GAAP to justify the accuracy, reliability, and relevance of financial information.
    • Describe the limitations or risks of applying GAAP. Address Jamie’s concerns by discussing the following:
      • What are the methods used to identify, record, and communicate financial information?
      • What are the implications for omitting one or more of the generally accepted accounting principles?
      • What uncertainties and risk factors are associated with reporting financial information?

What to Submit

For this project, you must submit the following:

  1. Financial Review
    The financial information must be submitted using the Financial Review Template. Include references in the footnotes section of your review.
  2. Brief to the Owner
    Your brief to the owner should not exceed 250 words in length. Cite all references appropriately.

    Supporting Materials

    The following resource(s) may help support your work on the project:Jamie’s Consulting Quarterly Business Transactions Word Document
    This document contains the business transactions for Jamie’s Consulting. You will need the transactions to prepare the financial information for Jamie’s meeting with the bank

  3. Financial Review Template Word Document
  4. Complete this template using the business transactions provided to prepare the financial information for Jamie’s meeting with the bank.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Share your observations about how technology improves or does not improve healthcare quality. Discuss the impact on the following:

  • Communication
  • Caring
  • Patients

Then, select one of the areas impacted—communication, caring, or patients—and propose a new technology (e.g., BCMA, CPOE, Telehealth) that could improve quality in that area. You are required to research at least two evidence-based resources and properly cite them in your post.

In responses to your peers, identify if you believe they recommended the best new technologies for the problems, or suggest an alternative technology.

Student 1

It has been my experience that technology has greatly improved healthcare quality. Over my 30 year nursing career I have seen many changes that help to avoid and prevent medical errors from happening. One change was the creation of healthcare information technology (HIT) which can be defined as the application of information processing that involves both computer hardware and software that deals with storage, retrieval, sharing and use of healthcare information, data and knowledge for communicating and decision making (Alotaibi, 2017). HIT reduces human errors, improves clinical outcomes, facilitates care coordination, improves the efficiency of practices and can track data over time. Working in the intensive care units, I have also notice the improvement of technology in the equipment that we use to care for patients. Equipment and procedures are much less invasive and safer then before. The guidelines for improving and standardizing equipment and enhancing educational programs has also improved the care that can be provided(Inoue et al, 2019).

A new technology that I would like to propose is the creation of wireless EKG monitoring. When a patient is connected to continuous 12 lead EKG the wires that are on the patient then connected to the monitor are so cumbersome. Often times they get pulled off inertly and cause false alarms. I had an experience where a patient had a 12 lead EKG in place and it was tethered thru his gown pocket up to the monitor. Unfortunately the patient heart rate slowed dangerously low and I called a code. My colleague ran in to the room and ripped my patients gown off …along with all the EKG leads. We were scrambling to replace them all as quickly as we could so we could identify the patients rate and rhythm. Ever since then I no longer tether the cords thru the pocket of the gowns and I try to share that experience with all the nurse – especially those new to the ICU. If the EKG were wireless and had some sort of sensing device that relayed back to the monitor it would be much more comfortable for the patients and just as efficient for staff.

References:

Alotaibi, Y., Federico, F., (2017). The impact of health information technology on patient safety. Saudi Medical Journal Vol 38 (12). 1173-1179.

Inoue, S. Hataleya, A., Kondo, Y., Hifumi, T. Sakuramoto, H. (2019). Post-intensive care syndrome: its pathophysiology, prevention, and future directions. Acute Medicine & Surgery Vol6: 233-246. doi:10.1002/ams2415

Student 2 

New Technology

With new technology, healthcare services places patientcare as a priority towards maintaining patient wellness by empowering patients to take responsibility of their own health (Nash et. al, 2019; Using, 2008). According to the Institute of Medicine and the Affordable Care Act of 2011, patient-centered care, identifies patient empowerment with tools and technologies to store, retrieve, and manage their personal health information, resulting in better health information management, exchange, and usage (Nash et. al, 2019; Using, 2008). New technology such as e-health improve the quality of healthcare services among communication, caring for patients, and assisting patients with care responsibilities. New technology within healthcare organizations includes services like barcode medication administration (BCMA) systems, computerized provider order entry (CPOE) systems, and Telehealth (Nash et. al, 2019). The usage of new technology such as BCMA and Telehealth is reducing errors by fifty-five percent within communication among service providers (i.e., patients, physicians, and insurances), and improves patient safety, regarding the ‘five rights’ of medication use- right patient, right medication, right dose, right route, right time (Sneha & Straub, 2017; Using, 2008).”

Bar-coded medication administration (BCMA) helps better identify patients, which reduces medication errors. Computerized physician order entry (CPOE) helps eliminate misinterpretation of illegible written orders. And connecting homebound patients to providers (Telehealth) has reduced hospital readmissions. However, even with these technological advancements, healthcare still faces challenges with overall quality and safety (Nash et. al, 2019). New technology usage in a healthcare faculty such as Tower Health at Home, in Berks County, because it helps provides better quality services through proper communication among services providers and patients. Within the whole organization facility, it also improves quality of services and care among patients through system considerations, medication implication, and organization framework changing culture diversity, reducing care workload, and addressing reporting capability (Nash et. al, 2019; Using, 2008).

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview: In this discussion, you will present an after-action report on the counterterrorism tactics used in the documentary Homegrown (cc).
Prompt: The oral presentation you will create for this discussion is an after-action report on the counterterrorism tactics used in the documentary Homegrown
(cc). Your presentation should include six to eight slides, excluding title and reference slides, with speaker notes on each slide. Focus on the counterterrorism
tactics highlighted in the documentary. Your oral presentation should be no more than five minutes.
As you build your presentation, remember that slides serve as visual aids that accompany what you would say during a presentation. Use the notes section of
each slide to add the details (in complete sentences) of what you will say while delivering the presentation.

Specifically, the following critical elements must be addressed:

 Strength: Identify a strength of the government’s counterterrorism approach illustrated in the documentary. (For example, what was a positive outcome
of the actions taken by the government?)

 Weakness: Identify a weaknesses of the government’s counterterrorism approach illustrated in the documentary. (For example, what was a
counterproductive or negative outcome of the actions taken by government?)

 Justification: Justify your thoughts on whether the right strategies were taken or those strategies were counterproductive to the overall approach to
dealing with American citizens, referring to the outcomes in the documentary.

 Audio/Video: Ensure that your audio/video quality is clear enough that others can understand your message and your speech is aligned with any visuals
used. ( I will complete this portion myself once the powerpoint is complete)

Guidelines for Submission: Your presentation should include six to eight slides, not including title and reference slides, with speaker notes on each slide. Any
citations and references should use the latest edition of the APA guidelines.

here is the link for the homegrown documentary. i will provide information https://digitalcampus-swankmp-net.ezproxy.snhu.edu…

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

The elevator pitch was a success! Senior management believes they made the right choice in giving you the title of CIO and putting you in charge of seizing new opportunities in the marketplace.

Scenario

While the pitch conveyed your good idea, it was just that: an idea. You now have to test the feasibility of your idea. However, before you create a complete business model canvas (BMC), you want to quickly identify key elements needed to take your product or service idea to market.

In doing so, you will assume that all components of the BMC are at the fingertips of your project team. For example, you will have to work with the marketing and sales departments, and perhaps outside vendors and suppliers, to promote, advertise, and sell the product or service.

The Business Model Canvas Template you complete in this assignment will serve as the groundwork for the more detailed PowerPoint slide deck you will create in Milestone Two. As with any well-executed project, a former project manager experienced in such product-to-market initiatives has agreed to assess your complete BMC slide deck, which you will submit in Module Five.

Prompt

For this assignment, consider the company you have selected and the work you have completed so far to further your business idea. Then, complete the Business Model Canvas Template linked in the Guidelines for Submission section with your assumptions about the key activities for your business idea, product, or service. Specifically, you must address the following rubric criteria:

  • Value proposition: Complete the Value Proposition building block by describing the value of your business idea, such as the customer need you are satisfying or the problem you are solving.
  • Front-stage considerations: Outline the segments related to your potential customers, which include the Customer Segments, Channels, and Customer Relationship building blocks.
  • Back-stage considerations: Make initial assumptions about how your business will work. This includes completing the Key Activities, Key Resources, and Key Partnership building blocks.
  • Financial considerations: Make reasonable assumptions about the segments that will inform your profit projections. These include the Cost Structure and Revenue Stream building blocks.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I’m working on a social science writing question and need support to help me understand better.

Respond to at least two colleagues in the following ways:

  • Provide suggestions to manage the emotional responses your colleague identified.
  • Explain why consideration of culture is important when working with diverse clients
  • Colleague 1: Veneka Brown COLLAPSE

    Identify and discuss elements of Dr. Sommers-Flanagan’s suicide risk assessment. The elements of Dr Sommers-Flanagan’s suicide risk assessment consist of the cultural check-in, Cognitive Triad Assessment, Assessment of Physical, Assessment of Social Relationships, Directly Ask the Question, Asking About Exceptions, and Asking About the Plan.Describe any personal emotional response you would have to Tommi’s revelations and reflect on reasons you might experience these emotions.After watching Tommi interview with Dr. Sommers-Flanagan’s, I felt sad and most importantly worried about her. I could not relate to Tommi revelations, but I sure would help her in any way that I can. Tommi have been through so much and I could tell just by looking at her while listening to her talk about her suicide ideation. I could not believe how open Tommi was when it came down to her talking about her thoughts. It broke my heart when Tommi did not show any remorse when talking about her friend that committed suicide.Describe the elements of safety planning that you would put in place as Tommi’s social worker in the first week and in the first months. First and foremost, I would suggest that Tommi come speak with me at least once a week. I also would recommend that Tommi see a therapist to help her learn a better way to cope with things that she is currently dealing with in her life. Even through Tommi does not mind talking about some of the things that has happened in her life; she still has some things hidden within her that she would need to let go of. I also will ask that any weapons within the home be removed. I also could look for any relatives or close friends that Tommi may have for her be around them to ensure that she is safe.Identify a suicide risk assessment tool you would use at future sessions to identify changes in her risk level. Explain why you would use this tool.The suicide risk assessment tool I would probably use is the Cultural Risk Assessment. I would use this tool because The Cultural Assessment of Risk for Suicide (Cars) measures and assesses cultural factors not typically examined in general suicide assessment research (Osteen et al, 2014). Explain any adjustments or enhancements that might be helpful given Tommi’s cultural background. Support your ideas with scholarly resources.Tommi will make sure she is safe by removing any weapons such as sharps knife blades and guns from her living situation.

  • Reference:Osteen, P.J., Jacobson, J.M., & Sharpe, L.T. (2014). Suicide Prevention in Social Work Education: How Prepared Are Social Work Students? Journal of Social Work Education, 349-364.
  • Colleague 2: Ashley McBeth

    COLLAPSE

    Identify and discuss elements of Dr. Sommers-Flanagan’s suicide risk assessment.Dr. Sommers-Flanagan’s suicide risk assessment one over a multitude of questions and categories for clinicians to ask their patients. These include but are not limited to cultural connection assessment, cognitive triad assessment, physical assessment symptoms, assessment of social relationships, directly asking about suicide plan/thoughts, are asking about explanations for SI, history on previous attempts, reframing reasons to live, lastly safety plan. Each of these components helps create the suicide risk assessment and build upon the client’s knowledge. Also, during the video, they were utilizing nonverbal’s. Watching her affect, her speech, as well as her appearance and engagement. Each of these components related directly back to the suicide risk assessment. I enjoyed how he gave examples for his cognitive triad assessment as well as physical assessment questions. Asking about negative thoughts with herself, the world, or her future and eating, sleeping, and focus. The patient may not understand what a symptom of their mental health is and what is normal; some of the patients have been living for years in the same pattern. Giving them a general idea of symptoms can assist in recognition and education for their mental health. Describe the elements of safety planning that you would put in place as Tommi’s social worker in the first week and the first months.The element of safety planning I would include with Tommi during the first session would be a brief safety plan as Dr. Sommers-Flanagan did. He reiterated her protective factors, what she enjoys doing, speaking to her sister, and reiterated her ability to call 911. However, I will write these components down in a worksheet format because when patients are in a state of crisis, they are not always able to think of these skills we spoke about. Within the first months of seeing Tommi, I would continue the suicide risk assessment at a more minimal level, working on measurable outcomes for the cognitive triad assessment, if her peers are still calling her a zombie as well as still asking those direct questions are you currently thinking about suicide or death, do you have a plan, do you feel safe?” As well as referring her to other clinicians that she could also benefit from including a psychiatrist who can enable a balance of medication if that is part of her specific goals.Identify a suicide risk assessment tool you would use at future sessions to identify changes in her risk level. Explain why you would use this tool.Explain any adjustments or enhancements that might be helpful given Tommi’s cultural background. Support your ideas with scholarly resources.
    Given Tommi’s background, it would be beneficial for the practitioner to perform evidence-based research on her tribe. Her mannerisms and eagerness to share about her tribe could mean it is a protective factor in her life. LaFromboise (2016) stated that incorporating the patient and her/his elders in treatment was a more significant positive outcome and how the treatment plan manifested. AILS, American Indian life skills were created based upon records from different tribes and congruent needs seen within Indian and Native American cultures by LaFromboise (2016). When incorporated culture within a treatment plan LaFromboise (, 2016), I decreased the rate of suicide and an increased feeling of community supports. In the case of Tommi, she has few social supports but presents with nonverbal’s taking pride in her culture; by utilizing her cultural foundation, the social worker can better tailor resiliency factors, protective factors and improve overall feelings of hopelessness. References:LaFromboise, T. D., & Malik, S. S. (2016). A culturally informed approach to American Indian/Alaska Native youth suicide prevention. In N. Zane, G. Bernal, & F. T. L. Leong (Eds.), Evidence-based psychological practice with ethnic minorities: Culturally informed research and clinical strategies. (pp. 223–245). American Psychological Association. https://doi-org.ezp.waldenulibrary.org/10.1037/149…

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Assignment: Conducting a Diagnostic Interview With a Mental Status Exam

Before moving through diagnostic decision making, a social worker needs to conduct an interview that builds on a biopsychosocial assessment. New parts are added that clarify the timing, nature, and sequence of symptoms in the diagnostic interview. The Mental Status Exam (MSE) is a part of that process.

The MSE is designed to systematically help diagnosticians recognize patterns or syndromes of a person’s cognitive functioning. It includes very particular, direct observations about affect and other signs of which the client might not be directly aware.

When the diagnostic interview is complete, the diagnostician has far more detail about the fluctuations and history of symptoms the patient self-reports, along with the direct observations of the MSE. This combination greatly improves the chances of accurate diagnosis. Conducting the MSE and other special diagnostic elements in a structured but client-sensitive manner supports that goal. In this Assignment, you take on the role of a social worker conducting an MSE.

To prepare:

  • Watch the video describing an MSE. Then watch the Sommers-Flanagan (2014) “Mental Status Exam” video clip. Make sure to take notes on the nine domains of the interview
  • Review the 9 Areas to evaluate for a Mental Status Exam and example diagnostic summary write-up provided in this Week’s resources.
  • Review the case example of a diagnostic summary write-up provided in this Week’s resources.
  • Write up a Diagnostic Summary including the Mental Status Exam for Carl based upon his interview with Dr. Sommers-Flanagan
  • ***Links:
  • Watch the “Mental Status Examination” segment starting at 01:22:23. This is the case of Carl, which will be used for the Application.
  • .https://waldenu.kanopy.com/product/clinical-interv…
  • https://drive.google.com/file/d/1vmoV8azDoEt8wUc-K..

By Day 7

Submit a 2- to 3-page case presentation paper in which you complete both parts outlined below:

Part I: Diagnostic Summary and MSE

Provide a diagnostic summary of the client, Carl. Within this summary include:

  • Identifying Data/Client demographics
  • Chief complaint/Presenting Problem
  • Present illness
  • Past psychiatric illness
  • Substance use history
  • Past medical history
  • Family history
  • Mental Status Exam (Be professional and concise for all nine areas)
    • Appearance
    • Behavior or psychomotor activity
    • Attitudes toward the interviewer or examiner
    • Affect and mood
    • Speech and thought
    • Perceptual disturbances
    • Orientation and consciousness
    • Memory and intelligence
    • Reliability, judgment, and insight

Part II: Analysis of MSE

After completing Part I of the Assignment, provide an analysis and demonstrate critical thought (supported by references) in your response to the following:

  • Identify any areas in your MSE that require follow-up data collection.
  • Explain how using the cross-cutting measure would add to the information gathered.
  • Do Carl’s answers add to your ability to diagnose him in any specific way? Why or why not?
  • Would you discuss a possible diagnosis with Carl at this point in time? Why?

Support Part II with citations/references. The DSM 5 and case study do not need to be cited. Utilize the other course readings to support your response.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

In this module, you have learned about contemporary privacy concerns in a global economy. As an IT professional, you will make ethical decisions based on organizational and legal parameters. Being aware of current events that involve the ethics of privacy can inform your decision making. If you’re in a position to advocate for a system requirement that involves privacy and/or compliance, you could refer to a historic example of an IT system that did or did not consider ethics. Learning about at least one event involving privacy and IT can help you advocate for ethical system requirements.

Prompt

Research a current event related to privacy issues in information technology, and find an article about it. You will want to search for an event that happened within the past 10 years. It is recommended that you search for an article using the Shapiro Library, but you are not required to.

You can search for a current event by using the A–Z databases page. If you explore a database on this list, you probably should search for a specific event instead of general topics.

Some databases that may be helpful to you include:

  • Academic OneFile – Gale
  • AccessScience
  • Business Insights: Global – Gale
  • Computing Database – ProQuest
  • Gartner
  • IEEE Xplore Digital Library (Institute of Electrical and Electronic Engineers)
  • SAGE Knowledge: Business Cases
  • Telecommunications Database – ProQuest

If you are having difficulty navigating the Shapiro Library, please contact a librarian. You can chat with a librarian 24/7, and email or call a librarian. The library’s contact information can be found on the main page of its website.

Since academic publications can be outdated, you may prefer to search for a current event through a credible online news site. Here are some credible news sites that can help you in your search:

If you need some guidance to find an event that relates to IT privacy issues, some of these topics may help you search:

  • Data collected through the internet of things
  • Traffic monitoring cameras
  • Mass surveillance
  • Body cameras on police officers
  • Data collected on social media networking sites
  • Privacy on a cloud

To complete this activity:

  • Find a credible resource that discusses a current event on privacy issues and information technology
  • Write a 1- to 2-page paper that includes:
    • A short summary of the event to explain how it relates to the concepts in this course
    • Your personal reflection on the event. In your reflection, you can choose to answer these questions (if they’re applicable):
      • What ethical decision making did or did not occur?
      • What impact did the event have?
      • What could have been documented in the system requirements?
      • If you were an IT professional involved with the event, what would you have done?
      • What caused the event to happen?
      • What could have been done differently?
      • How will this event influence global conversations on privacy issues?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Assignment 1: Week 9 Blog

Refer to the topics covered in this week’s resources, and incorporate them into your blog.

By Day 3

Post a blog post that includes:

  • An explanation of how you have addressed termination or how you might address termination during your field education experience, (Redeem Healthcare Medical Systems in Baltimore, MD)

By Day 4

Respond to the blog post of three colleagues in one or more of the following ways:

  • Validate an idea in your colleague’s posting with your own experience.
  • Expand on your colleague’s posting.

Colleague 1: Ashlynn

I have addressed termination I many ways in my field experience. Working with CPS, termination is within 30 days. When receiving a complaint, I make it very clear of what it is like working with CPS and how long we have to investigate a case. However, there are some cases, where a case cannot be completed within 30 days and an extension is need. I am sure to provide the family with a notice of this so that we are all on the same page.

When I have worked with foster care, termination was much different. I’ve had cases where the children had been in foster care for years and the parents are still working on their treatment plan. In foster care, although the workers have an input, the termination process is up to the judge or referee assigned to the case.

Termination is when it’s time to end services with a client, whether it’s planned or voluntarily done by the client. It is important to create a plan for termination and a general timeline of when it may occur (Garthwait, 2017). Having a plan creates an expectation for the client and what they should expect. Termination should be done in a way that is structured and effective for the client and does not become a negative experience for the client. Clients should always be notified especially as the time comes closer to termination. By having open communication with the client, termination can be a smooth transition.

Reference

Garthwait, C. L. (2017). The social work practicum: A guide and workbook for students (7th ed.). Upper Saddle River, NJ: Pearson.

Colleague 2: Amber

  • An explanation of how you have addressed termination or how you might address termination during your field education experience.

I have experienced termination in my field experience and had to address it with the social work team I work with. I worked with a patient that had very high anxiety and worry. He would have panic attacks and worry about his jaw pain how it may lead to may serious life threatening this worry incapacitated him so much that he could not work or function. He had jaw surgery and was in quite some pain for a while and thinks it may be cancer, although the patient was cleared by his doctor of any illness and is perfectly healthy. He is originally in Kentucky but could not find any hospitals in his area that had an open bed, so he came to Virginia to find a facility that could treat him. While at the facility, he had several discharge dates but persuaded the doctor to postpone his discharge because he did not feel ready, I personally met with him and talked with him how life at home would be and planned what he could do if he felt the “ball in his stomach” showed up again. So finally, his day came to discharge, and he left but and came back 2 hours later. He told me “I just knew something wasn’t right”, the social worker and I asked him, what did he mean by that and he said his “anxiety started up again”.

At this point we have exhausted all resources and his insurance stopped paying out, so he was self-pay and over 30,000 in debt. The medicine that the doctor prescribes takes the edge off, but he needs more intensive therapy, which he cannot get from the hospital. We explained the best course of action for him financially and mentally, which would be transfer to the facility next door. He finally terminated from the facility to go to facility across campus. Although the client still had some anxiety that inhibited his daily functioning the social worker identified that it was beyond her what she could offer, According to NASW Utah chapter termination can occur when a “client has mental health needs that are beyond the social worker’s area of expertise” (2015). When we discharged him to the new facility the social work term made sure it was done properly and explained why his treatment with us was ending because “termination of treatment is an important phase of the therapeutic processing” ( (Felton & Polowy, 2015).

Felton , E. M., & Polowy, C. I. (2015, May). Termination: Ending the Therapeutic Relationship- Avoiding Abandonment. Termination Guidelines .

Colleague: Jacqueline

An Explanation of How You Have Addressed Termination or How You Might Address Termination During Your Field Education Experience

Termination has been a complicated subject at the group home where I am completing my field experience. The children who reside in the home have all experienced abandonment. They often times get attached to adults in their lives because of this. I recently spoke with a group of them about terminating our sessions and they were all extremely sad, it was very difficult for me. Termination occurs for many reasons including there was a predetermined service length, the client may want to discontinue sessions, etc (Garthwait, 2017). In this case I must terminate my involvement at the group home because my field experience is coming to an end. I am addressing this by speaking often with the residents about my departure to help acclimate them to the concept of termination. I have expressed to them that I have learned so much from them and greatly enjoyed our time together, and allowed them to ask any questions they may have. I also plan to have a small party to say goodbye at week 11 during our last day together. In addition, I have my own issues with abandonment and have a hard time saying goodbye so this is something I will need to practice and learn as I go through my educational process in this program.

As a social worker I will work with clients that build rapport or even become dependent upon my assistance. I realize that termination skills are something that I will need to work on and learn with additional experience. It is necessary at one point or another to terminate sessions with clients so it is an important skill to become familiar with. With practice I will learn the best practices for terminating sessions and be able to use them for a smooth effective termination.

Garthwait, C. L. (2017). The social work practicum: A guide and workbook for students (7th ed.). Upper Saddle River, NJ: Pearson.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Scenario

You work for Healing Thyme Hospital. The hospital’s board of directors is looking to purchase Lueders Medical Clinic, a local medical practice, and has asked you to provide them with insights on how the clinic is performing financially. You will need to analyze the clinic’s performance and recommend whether purchasing the clinic is a good investment.


Directions

The board of directors for the hospital has asked you to complete the financial analysis workbook and then write a brief that interprets your calculations and evaluates the clinic’s business performance. You will send your financial analysis to the board of directors to support your recommendation on whether the hospital should purchase the clinic.

  • Financial Analysis Workbook
    First, read the Lueders Medical Clinic 2017–2018 Financial Statements, which is linked in the Supporting Materials section. Then, perform the financial analysis of the clinic using the Financial Analysis Workbook Excel spreadsheet, which is also linked in the What to Submit section. This way, you can apply the ratios and vertical and horizontal analyses to the clinic’s annual financials.

The board will review your report to verify that you:

  • Use the base amounts from the financial statements to perform the vertical analysis
  • Calculate the ratios accurately using the formulas provided in the workbook
  • Validate the accuracy of the ratios by showing the calculations and using the appropriate units

As you complete each section, it may be helpful to take notes about what you learn. Then, you can use your notes to evaluate the business’s financial status and write your brief to the board of directors.

  • Brief to the Board of Directors
    Once you have completed your financial analysis, interpret the ratios and vertical and horizontal analyses to evaluate the business performance of Lueders Medical Clinic.

    In your brief, make sure to refer to your financial analysis workbook. It is important that you explain what each ratio tells you about the clinic’s performance. Then, recommend whether it is a good investment for the hospital to purchase the clinic. Use your financial analysis workbook to explain your decision.

Specifically, address the following in your brief:

  • Examine the clinic’s financial performance.
    • How does the clinic’s financial performance compare against industry averages and past performance?
    • What are the strengths and weaknesses of the clinic’s financial performance?
  • Recommend appropriate actions using your financial analysis as support.
    • Is purchasing the clinic is a good or bad investment?
    • What are some potential areas of improvement?

What to Submit

For this project, you must submit the following:

  1. Financial Analysis Workbook
    Download and complete the Financial Analysis Workbook Excel spreadsheet with two worksheets. Use the first worksheet to perform the horizontal and vertical analyses. Use the second worksheet to perform the ratio analysis. Refer to the Lueders Clinic 2017–2018 Financial Statements to calculate each ratio. Your workbook must include two completed worksheets (Horizontal and Vertical Analysis and Ratio Analysis). It should be presentable and annotated for your audience.
  2. Brief to the Board of Directors
    Your brief to the hospital’s board of directors should be 250–500 words or about 1–2 pages in length. Cite your sources appropriately

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

As the question will narrate what is needed. This is a two-part paper. The first part is ( contract Law) 2-3 pages and the other part is Tort Law (1-2) pages. Here is the full explanation and the scenario given.  Your task is to complete two short papers, one on contract law and one on tort law. 

Contract Law
Your submission should be a 2- to 3-page Word document with 12-point Times New Roman font, double spacing, and one-inch margins. Sources should be cited according to APA style.

Tort Law
Your submission should be a 1- to 2-page Word document with 12-point Times New Roman font, double spacing, and one-inch margins. Sources should be cited according to APA style.

Please keep in mind the following:

  • This is a paper, and should be in proper paper format, that means no outlines, numbers or bullets as a general form.
  • Times New Roman Font, 12 pt, Double spaced with 1” Margins
  • APA citations, this includes a works cited page, as well as in-text citations. As a guideline, you should have a minimum of 1 in-text citation per paragraph.

Fact Pattern: The Friendly Dawg is a retail pet supply store owned by Dave Dawgs. Dave has worked in the store since high school and took over running the store after his father died two years ago. Originally the store sold only pet food and supplies, such as animal food, bird cages, water bowls, pet beds, and so forth. Upon taking ownership, Dave added fish tanks with fish for sale. Recently he built a kennel and cages in a former storage area in the rear of the store in order to sell live animals, such as snakes, birds, dogs, and cats. Landlord Lou came by during renovations and asked what was going on. One of Dave’s employees told Lou that The Friendly Dawg was expanding its inventory and needed the space. Landlord Lou told the employee, “Very exciting! Good luck!”

A few weeks later, landlord Lou began receiving complaints from the neighboring tenant, the Sunshine Yoga studio, that the noise from the dogs and parrots was very disruptive.

The signed lease between Dave Dawg’s deceased father and Lou describes the business as a pet supply store only and does not mention selling live animals. The lease specifies a rent in the amount of $500 a month. Sunshine Yoga does not have a written lease. The owner of Sunshine Yoga, Jasmine, met Lou one night in a bar two years ago where he verbally offered to rent her the space for $300 a month. Jasmine claims that landlord Lou told her that night that she could rent from him forever and that he would never evict her.

Lou called Dave, asking him to quiet the animals. Dave said he would try, but the complaints from Jasmine continued. Dave also demanded that Lou improve the air-conditioning system, claiming it was too hot in the rear of the store for his animals and it was causing them to become agitated. Landlord Lou refused, claiming that air-conditioning was not meant to cool that area and it was not his job as landlord to take care of live animals.

Dave stopped paying his rent, claiming that he was not obligated to do so because Lou was breaching his obligation under the lease to maintain the property in good repair. The next day, a dangerous snake escaped through the air vents and slithered into the neighboring yoga studio, frightening Jasmine, the owner, such that she had a heart attack.

After recovering, Jasmine stopped paying her rent, claiming that the premises were unsafe due to the presence of wild animals. She also claimed that she has been very depressed and anxious as a result of the ongoing situation. And she contends that she has lost clients because of the noise coming from The Friendly Dawg.

The Friendly Dawg has been a good tenant, enjoys a strong customer base, and pays more in rent than Sunshine Yoga. Sunshine Yoga has always been late with rent, and Jasmine constantly bothers Lou over minor issues.

Contract Law Paper Requirements:

Evaluate the potential rights, claims, defenses, obligations, and remedies for each party from the perspective of contract law. Determine whether landlord Lou has a right to evict either party. Use reliable resources, such as the textbook and other course resources, to support your evaluation. Specifically, include the following components in your evaluation:

  • Contract between The Friendly Dawg and landlord Lou
    1. Analyze the scenario to determine whether a valid contract still exists between The Friendly Dawg and landlord Lou.
      1. Explain the elements of a valid contract, and identify which contract elements, if any, exist between The Friendly Dawg and landlord Lou.
    2. Analyze the potential rights, claims, defenses, obligations, and remedies available to both landlord Lou and The Friendly Dawg in this scenario.
      1. Support your analysis by referencing specific legal principles or laws.
  1. Contract between Sunshine Yoga and landlord Lou
    1. Analyze the scenario to determine whether a valid contract still exists between Sunshine Yoga and landlord Lou. HINT: USE THE 4 ELEMENTS OF A CONTRACT!!
      1. Explain the elements of a valid contract, and identify which contract elements, if any, exist between Sunshine Yoga and landlord Lou.
    2. Analyze the potential rights, claims, defenses, obligations, and remedies available to both landlord Lou and Sunshine Yoga in this scenario. 
      1. Support your analysis by referencing specific legal principles or laws.
  2. Grounds to evict – HINT: THERE IS A LIST OF RIGHTS AND OBLIGATIONS IN IN YOUR TEXT BOOK, FIND THIS LIST AND THEN YOU SHOULD BE ABLE TO EASILY COMPLETE THIS SECTION
    1. Describe whether, based on your analysis of each party’s rights and obligations, landlord Lou has the grounds to evict either The Friendly Dawg or Sunshine Yoga.
    2. Support your conclusions by referencing specific legal principles or laws.
  3. Include a References section and cite your sources using APA style.

Tort Law Paper Requirements:

Tort Law

Evaluate the implications of tort law in this scenario and what legal claims Sunshine Yoga might have. Use reliable resources, such as the textbook and other course resources, to support your evaluation. Specifically, include the following components in your evaluation:

  • Tort law: Define what tort law is and how torts may affect business practices.
  1. Relevant tort laws: Identify tort laws relevant to the scenario, specifically the incident involving the snake.
  2. Legal claims
    1. Identify what legal claims Sunshine Yoga might have against The Friendly Dawg and landlord Lou, based on those tort laws and related legal principles.
    2. Support your conclusions by referencing the applicable tort laws and related legal principles.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Discussion: Confidentiality

One of the most important concepts in clinical practice and group work is confidentiality. All members of the group sign an informed consent form in order to address the rules and parameters of the group sessions. The rules regarding confidentiality are stated in one section of the form. Although every member must sign this agreement, ensuring that all information shared in the group remains confidential can be difficult. As the group leader, the clinical social worker is responsible for developing strategies so that all members feel safe to share.

For this Discussion, review the “Working With Groups: Latino Patients Living With HIV/AIDS” case study.

By Day 3

Post strategies you might prefer to use to ensure confidentiality in a treatment group for individuals living with HIV/AIDS. Describe how informed consent addresses confidentiality in a group setting. How does confidentiality in a group differ from confidentiality in individual counseling? Also, discuss how you would address a breach of confidentiality in the group.

By Day 5

Respond to a colleague who used a different strategy in addressing the issue of confidentiality. Discuss the importance of confidentiality in treatment groups.

Colleague 1: Caneshia

Strategies for confidentiality for individuals living with HIV/AIDS

Some clients are reluctant to participate in therapeutic groups due to an overall lack of trust for group members and fear that potential group participants would disclose information to those outside the group who do not have HIV/AIDS (Olivier, 2009). Some individuals are embarrassed to have HIV/AID’s, thus are not willing and open to public exposure to treatment groups. Hence, I must first display empathy and understanding for the feelings of the patient. I would need to first ensure the patient of privacy disclosure with the patient. I would ensure the patient that their privacy is important and would be enforced. I would report to the patient of the HIPPA laws. I will express the guidelines of the HIPPA law of how personal information will not be given without their permission. As the social worker one should explain the dynamics of the group. The explanation of confidentiality would be explained via the rules for group. Understanding the dynamics of treatment groups can be an example to ensure confidentiality of a treatment group. Social goals in the group setting empower group members develop rapport with each other as it forms the milieu (Toseland & Rivas, 2017). Hence, this implies that members are experiencing similar trauma or goal. I would inform the patient that others within the social group are experiencing the same trauma experience. I lead group with my first internship, and I had a patient reluctant to participate in our treatment group. I reported to the patient of the group rules. This is also a way I would ensure the confidentiality of treatment group is via group rules. The number one rule for group is confidentiality. The group members were not allowed to search for each other on social media or interact with one another outside of group. This is to ensure the confidentiality of each group member. This would also ensure the group members are not communicating about group outside of group. Another form of ensuring confidentiality. Another group rule was to respect other group members. Hence, “do unto others as you will have them do unto you” For example, if you would dislike others to speak of your situation, we do not speak on others situation. As the group leader, confidentiality of not speaking on group issues outside of group was strictly enforced.

Informed consent addresses confidentiality

Informed consent is a means of communicating expectations to the group and allows both the participants and the facilitator to have a mutual understanding (Lasky & Riva, 2006). Informed consent via group rules was a form of addressing confidentiality for each group member. For example, of informed consent to address confidentiality, each group member would have to verbally agree to the term and conditions of group rules. The informal consent via the group rules were to refrain from communication with other group members outside of group. This informal consent was to ensure the information within group remain confidential. As the group facilitator it would be my responsibility to ensure each participant has a solid understanding of the group rules.

Group vs Individual Counseling

During group discussions the group facilitator has little to no control over what is said (Lasky & Riva, 2006). An example of how I gained control of group was via my signals. The timeout sign was one I often used. I would physically hold up this symbol so that group members understood to stop speaking. This symbol was to stop a group member from triggering another patient without other group members knowing the personal information of another group member. For example, if I had a group member who is a rape victim. Saying certain phrases can trigger that group member. Hence, without reviling that the patient is a rape victim I simply hold my timeout sign and switch topics with the group with out verbally saying reasons for the timeout sign. In individual therapy confidentiality is guaranteed, unless a client discloses, they are a risk to themselves or others or discloses abuse. As this information will be given prior to beginning of the session. Before I began anyone on one therapy I informed the patient of confidentiality, I always ended the statement of however, if you place a harm to yourself or others, I am mandated by law to report by law. In group I would also inform the group of the breach. If anyone reports a threat on themselves or others I am mandated to report by law.

Reference:

Lasky, G. B., & Riva, M. T. (2006). Confidentiality and privileged communication in group psychotherapy. International Journal of Group Psychotherapy, 56(4), 455–476.

Olivier, C. (2009). Enhancing Confidentiality within Small Groups: The Experiences of AIDS Service Organizations. Social Work with Groups, 32(4), 274–287. https://doi-org.ezp.waldenulibrary.org/10.1080/016…

Toseland, R. W., & Rivas, R. F. (2017). An introduction to group work practice (8th ed.). Boston, MA: Pearson

Colleague 2: Stacey

Strategies for confidentiality for individuals living with HIV/AIDS

Patients living with HIV/AIDS (PLWH) can become an isolated and venerable group. Therefore, treatment groups are essential for providing security, mutual respect, and support for one another. Confidentiality is critical to any group setting and even more so with PLWS. Confidentiality is the safeguard of client information to ensure their information is not disclosed. In a group setting, one strategy I may use to promote confidentiality is education. According to Laskey & Riva (2006), group leaders should educate group members on confidentiality to ensure that everyone has the same foundation. For instance, I would employ this strategy by allowing the group to identify terms and agreements to confidentiality in which they must follow in and after each group. Another strategy I may use to ensure confidentiality in a group setting is requiring that each member sign a clause that states the information disclosed in the group cannot be disclosed outside of the group. As a social worker, I must understand that confidentiality in a group setting is different compared to an individual session.

Informed consent addresses Confidentiality

According to Laskey & Riva (2006), informed consent is the process by which clients learn about confidentiality and its limits. Informed consent allows the patient to control who has access to their private information. Informed consent is addresses confidentiality in a group setting by allowing the client to determine who much of their pertinent information they would like to disclose.

Confidentiality in a Group and Individual Setting

The nature of confidentiality is more complex in a group setting compared to individual counseling. In a group, an individual discloses information to the therapist and other group members in which there is no guarantee that the information disclosed will remain confidential. In a group setting, the facilitator has less control over the nature and depth of what is shared during the group. In contrast, in an individual session, a therapist has more control over the depth of each session and can guild the nature of the session. In a group setting, group members are not bound by confidentiality due to the third-party rule. The third-party rule states that any information disclosed in front of a third party is deemed not privilege by the court (Lasky & Riva, 2006). Thus, the third-party rule concept suggests that the disclosure in front of another individual is viewed as public (Lasky & Riva, 2006).

Breach of Confidentiality

To address the breach of confidentiality in a group setting, I would bring the issues to the group to help each member identify how the concept of trust and mutual understanding was broken. I would allow each group member to share how their trust has been broken in the past and how it is currently impacting them. As the group facilitator, I would allow the group to determine the ground rules for the breach, either removal from the group or a behavior continuum contract. In addition, I would also address the breach individually with the client to ensure that they have a complete understanding of confidentially and explain the risk of their actions.

Reference:

Lasky, G. B., & Riva, M. T. (2006). Confidentiality and privileged communication in group psychotherapy. International Journal of Group Psychotherapy, 56(4), 455–476

Plummer, S.-B., Makris, S., & Brocksen, S. M. (Eds.). (2014). Social work case studies: Concentration year. Baltimore, MD: Laureate International Universities Publishing [Vital Source e-reader].

“Working With Groups: Latino Patients Living With HIV/AIDS” (pp. 39–41)

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Why is proper DAM important for designers, creative teams, and any group who works with multiple digital files? How can DAM help avoid copyright infringement or licensing issues when using assets from outside sources?

Have you used Adobe Bridge yourself, and if so, what has been your experience?

After researching DAM on the Web, share a resource or article with the class that you found particularly helpful or interesting in understanding this process, explaining why you feel it is a good resource for this discussion.

In response to your peers, review their resource and share any observations you have on its usefulness or insight into explaining/supporting the need for DAM in the creative environment.

To complete this assignment, review the Discussion Rubric document.


In addition to writing the initial post (above), please also write a response to the following two students regarding the same topic!


student one:

A DAM is important for designers, creators and any group that works with digital files because it keeps everything in one accessible place. It cuts out the frustration of trying to keep up with every file that was ever sent and spend more time on being creative. For example, you won’t have to keep asking your colleagues for the updated logo because it will already be uploaded in a file for you. Accessing designs wherever you are can be very beneficial because you can always forget your flash drive or external drive but you’ll always have the files with you with the DAM system. I can see why this system is very effective, especially when it comes to copyright because the DAM system allows companies to control who has access to their work. It makes it super easy to manage the legal rights involved and still be able to store your work in a safe place. I have personally never used Adobe bridge but I can see why this would be a good program to use. Cutting down the amount of emails and links having to be sent out seems like it would be very beneficial to keep organized with everything and stay on the same page.


student two:

Hello class!

After doing some light research on the web, I found this article about DAM from a company called WIDEN which has their own DAM system. DAM is important for designers because it provides a place to put your files that can be easily accessible by you AND your colleagues, and allows and easy search so files aren’t lost in the masses of other projects. Because it is accessed via cloud or an online drive, your files can be accessed anywhere by you or your creative team. DAM also manages your usage rights and tracks your expiration dates so that you don’t get caught up with copyright infringement. One thing that I find is really helpful is that you don’t have to send large files over email because they can be accessed online with DAM. It also allows you to go and look at all of the different revision files that you and your colleagues made throughout the project.

I have never heard of or used any type of DAM system like Adobe Bridge or WIDEN, but I’m sure I will use it in the future and I can already tell it will be incredibly helpful even if it’s just for my own projects.

This is the article that I read to get this information.

https://www.widen.com/blog/seven-ways-digital-asset-management-helps-designers-do-what-you-do-best



Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

This assignment is a continuation of the employee satisfaction survey results and GROW model template assignment that you completed in Module four.

Scenario

The organization that you are a director of leadership and learning for has been conducting engagement surveys among its employees every two years to gain a deeper understanding of employees’ views on areas such as customer service, the organization’s overall strategy, job satisfaction, rewards and recognition, and training and development. The most recent survey was conducted this year, and the organization wants to carry out another survey in two years.

Prompt

Your task is to continue using your GROW model template you began in Module four to complete the final three sections:

  • Identified Gaps—Obstacles
  • Goal Revision
  • A Way Forward—Action

Specifically, you must address the following rubric criteria:

  1. In the Identified Gaps—Obstacles section, describe obstacles that might prevent the focus areas you previously identified moving from current state to future state. Consider the following in your response:
    1. Skill gaps, organizational culture, and resources among other things
  2. In the Goal Revision section, for each of the goals you created previously, describe whether they need to be revised:
    1. For the goals that do need to be revised, provide a revision and explain your changes based on obstacles you identified above.
    2. For the goals that do not need to be revised, provide rationale for why this goal should remain the same. Support your response.
  3. In the A Way Forward—Action section, recommend an actionable step that should be taken in order to close the gap between current state and desired future state for each identified focus area and related goal. Your response should include the following for each actionable step:
    1. An explanation on what the step will entail
    2. Identification of stakeholders who will need to be involved
    3. Justification for how this step will help close the gap between current state and desired future state

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Competencies

In this project, you will demonstrate your mastery of the following competencies:

  • Explain the basic concepts and techniques that pertain to artificial intelligence and intelligent systems
  • Analyze how algorithms are used in artificial intelligence to solve a variety of complex problems

Scenario

You are working as an AI developer for a gaming company. The company  is developing a treasure hunt game where the player needs to find the  treasure before the pirates find it. As an AI developer, you have been  asked to design an intelligent agent of the game for an NPC (non-player  character) to represent the pirate. The pirate will need to navigate the  game world, which consists of different pathways and obstacles, in  order to find the treasure. The pirate agent’s goal is to find the  treasure before the human player. This is commonly called a pathfinding problem, as the agent you create will need to find a path towards its goal.

You have been provided with some starter code and a sample  environment where your pirate agent will be placed. You will need to  create a deep Q-learning algorithm to train your pirate agent. Finally,  you have also been asked to write a design defense that demonstrates  your understanding of the fundamental AI concepts involved in creating  and training your intelligent agent.

Directions

Pirate Intelligent Agent
As part of your project,  you will create a pirate intelligent agent to meet the specifications  that you have been given. Be sure to review any feedback that you  received on your Project Two Milestone before submitting the final  version of your intelligent agent. Follow these steps to complete your  intelligent agent:

  1. Before creating your pirate intelligent agent, be sure to review the  Pirate Intelligent Agent Specifications document, located in the  Supporting Materials section. This document provides details about the  code that you have been given, and what aspects you will need to create.
  2. Download the zipped folder containing your starter code and Jupyter  Notebook files by using the link in the Supporting Materials section.  Access the Virtual Lab (Apporto) by using the link in the Virtual Lab Access  module. Upload the zipped folder into the Virtual Lab, unzip the  folder, and upload the files into the Jupyter Notebook application. Use  the tutorials in the Supporting Materials to help you with these tasks.
  3. Be sure to review the starter code that you have been given. Watch  the Project Two Walkthrough video, located in the Supporting Materials  section, to help you understand this code in more detail.

    IMPORTANT: Do not modify any of the PY files that you have been given.

  4. Complete the code for the Q-Training Algorithm section in your Jupyter Notebook. In order to successfully complete the code, you must do the following: 
    1. Develop code that meets the given specifications: 
      • Complete the program for the intelligent agent so that it achieves its goal: The pirate should get the treasure.
      • Apply a deep Q-learning algorithm to solve a pathfinding problem.
    2. Create functional code that runs without error.
    3. Use industry standard best practices such as in-line comments to enhance readability and maintainability.
  5. After you have finished creating the code for your notebook, save  your work. Make sure that your notebook contains your name in the  filename (such as, “Doe_Jane_ProjectTwo.ipynb”). This will help your  instructor access and grade your work easily. Be sure to download a copy  of your notebook (IPYNB file) for your submission.

Design Defense
As a part of your project, you  will also submit a design defense. This design defense will demonstrate  the approach you took in solving this problem, explain how the  intelligent agent works, and evaluate the algorithm you chose to use. In  order to adequately defend your designs, you will need to support your  ideas with research from your readings. You must include citations for  sources that you used.

  • Analyze the differences between human and machine approaches to solving problems. 
    • Describe the steps a human being would take to solve this maze.
    • Describe the steps your intelligent agent is taking to solve this pathfinding problem.
    • What are the similarities and differences between these two approaches?
  • Assess the purpose of the intelligent agent in pathfinding. 
    • What is the difference between exploitation and exploration? What is  the ideal proportion of exploitation and exploration for this  pathfinding problem? Explain your reasoning.
    • How can reinforcement learning help to determine the path to the goal (the treasure) by the agent (the pirate)?
  • Evaluate the use of algorithms to solve complex problems. 
    • How did you implement deep Q-learning using neural networks for this game?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Case Study Scenario: You are a cybersecurity analyst working at a prominent regional hospital. On Monday morning, the organization’s technology help desk received a call from Dr. John Beard, a long-time resident physician. Dr. Beard called them to report that his company laptop was stolen from his car after he stopped to work out at a local gym on his way home from the office. A representative from the help desk informed you of the theft and also mentioned that Dr. Beard stated that his laptop case contained a USB thumb drive that he purchased to “back up” important patient files he saved onto his laptop. Dr. Beard also revealed that his daily planner “might have” been in the bag, and that the planner had his hospital computer user name and password written on the back cover. Prior to ending the call, Dr. Beard told the representative that he would call her back if his daily planner turned up. As your conversation with the help desk representative wound down, she commented that Dr. Beard had many different computer “issues” that keep her team busy. She recalled talking to Dr. Beard about the hospital’s policy against accessing patient files remotely, and his annoyance with her inability to help him “get work done” while away from the hospital. And just a week ago, a junior member of her team completed a service ticket to reconfigure Dr. Beard’s laptop to grant him administrative rights. The service request stuck out because it did not have a “reason” indicated (a company policy requirement), but was still approved by James Davis, the hospital’s senior system administrator and close personal friend of Dr. Beard. 

Prompt:  After reading the scenario above, complete the Fundamental Security Design Principles mapping table in the Case Study Template and answer the short response questions. 

Specifically, you must address the critical elements listed below: I. Fundamental Security Design Principles Mapping: Fill in the table in the Module Two Case Study Template by completing the following steps for each control recommendation: A. Specify which Fundamental Security Design Principle best applies by marking all appropriate cells with an X. B. Indicate which security objective (confidentiality, availability, or integrity) best reflects your selected control recommendation. C. Explain your choices in one to two sentences, providing a selection-specific justification to support your decision. II. Short Response Questions: A. How might you work with someone like Dr. Beard to cultivate a security mind-set that is more in line with the organization’s ethical norms? Hint: Consider his attitude, his past behaviors, and his opinion about organizational policies. B. How would you help the hospital better secure its patient files? Make sure to incorporate at least one data state (data-at-rest, data-in-use, or data-in-motion) and one of the control recommendations from your completed table in your response. 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Competency

In this project, you will demonstrate your mastery of the following competency:

  • Describe the role that empathy plays in the decision-making processes used across criminal justice professions

Scenario

You are a correctional counselor for a youthful offender program. You are to create a written report to your supervisor about the case you are working on and the role empathy may play in the decisions made by criminal justice professionals regarding the offender and victim. Using the case details linked in the Supporting Materials section, create a written report that focuses on an explanation of empathy, empathy and interactions, responses to the victim, empathy and the restorative justice process, and media and empathy.

Directions

Using the provided case details, create a written report to your supervisor regarding the role that empathy played in the decision-making processes across criminal justice professions specific to this case. Include the following required elements:

  1. Explain what empathy is and how it can be applied in the criminal justice system (50–100 words). Include the following in your explanation:
    1. What is empathy?
    2. In which areas of criminal justice can empathy be applied?
    3. How can it be applied?
  2. Describe how empathy influenced interactions between the victim of the robbery and criminal justice professionals (100–150 words). Include the following in your description:
    1. Which criminal justice professional(s) interacted with the victim?
    2. How did empathy (or lack thereof) affect the interactions between criminal justice professional(s) and the victim?
  3. Analyze responses to a victim of robbery (100–150 words). Include the following in your analysis:
    1. What were the responses to the victim?
    2. How did the responses affect the victim?
    3. Were the responses appropriate or not? If not, how could they be changed to be appropriate?
  4. Explain how empathy influenced the restorative justice process (50–100 words). Include the following in your explanation:
    1. Which criminal justice professional(s) displayed empathy to the offender?
    2. How did empathy affect the offender and the restorative justice process?
  5. Analyze how the media influenced empathy in the criminal justice process (100–150 words). Include the following in your analysis:
    1. What was the role of the media in the case?
    2. Who did the media affect and how?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

You are currently working toward building a full stack web  application for your client, Travlr Getaways. It is important to think  about the overall system view of how all the pieces of the web app will  come together to be a fully functioning website, which will include a  customer-facing website, a database, and an admin single-page  application that all need to work together.

Web applications are an inherently complicated undertaking because of  the variety of complex technologies that must work together seamlessly  and scale up to support thousands of connections in a short time frame.  As part of your deliverables to the client, Travlr Getaways, you will  need to prepare documentation to explain your process and the various  components associated with the full stack web app.

It’s best practice to document your plan for full stack development  as you progress through a project. The Software Design Document (SDD) is  an engineering document that contains technical specifications and some  written descriptions and explanations. You will complete several  components of the SDD in Milestone One.

Prompt

This milestone is intended for you to begin preparing the design  documentation needed to deliver to your client, Travlr Getaways.  Specifically, you will provide a high-level overview, a description of  the design constraints, and a diagram that demonstrates the architecture  of the web app. Keep your audience in mind and be sure to communicate  clearly and concisely in client-facing documentation. Complete the  following sections of the Software Design Document for your client:

Executive Summary: An executive summary is used to  introduce the software design problem and present a solution. Be sure to  provide the client with any critical information they must know in  order to proceed with the process you are proposing. It will be  essential to address the following in the Executive Summary section of  the SDD:

  • Describe the appropriate architecture of the web application based on your client’s software requirements.
  • Reference your use of the MEAN stack for development.
  • Explain both the customer-facing side of the application and the administrator single-page application (SPA).

Design Constraints: Building an application has  constraints. These constraints are things that provide boundaries or  guardrails for the project and naturally come with limitations. Be sure  to address the following in the Design Constraints section of the SDD:

  • Identify the design constraints for developing the web-based Travlr Getaways application.
  • Explain the implications of the design constraints on the application development.

System Architecture View: Component Diagram: A  component diagram has already been created for you. Review the diagram  provided and address the following in the System Architecture: Component  Diagram section of the SDD:

  • Describe the overall system architecture of the web application by referring to the component diagram provided in the SDD.
  • Identify the significant components that will be used and their relationship to one another.

Please note: You will continue to add diagrams and complete  additional sections of the Software Design Document throughout the  course as you develop each aspect of the full stack web application. 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Hint: The chart is taken from https://ourworldindata.org/technological-progress.

From the chart, estimate (roughly) the number of transistors per IC in 2012. Using your estimate and Moore’s Law, what would you predict the number of transistors per IC to be in 2040?

In some applications, the variable being studied increases so quickly (“exponentially”) that a regular graph isn’t informative. There, a regular graph would show data close to 0 and then a sudden spike at the very end. Instead, for these applications, we often use logarithmic scales. We replace the y-axis tick marks of 1, 2, 3, 4, etc. with y-axis tick marks of 101 = 10, 102 = 100, 103 = 1000, 104 = 10000, etc. In other words, the logarithms of the new tick marks are equally spaced.

Technology is one area where progress is extraordinarily rapid. Moore’s Law states that the progress of technology (measured in different ways) doubles every 2 years. A common example counts the number of transitors per integrated circuit. A regular y-axis scale is appropriate when a trend is linear, i.e. 100 transistors, 200 transistors, 300 transistors, 400 transistors, etc. However, technology actually increased at a much quicker pace such as 100 transistors,.1,000 transistors, 10,000 transistors, 100,000 transistors, etc.

The following is a plot of the number of transistors per integrated circuit over the period 1971 – 2008 taken from https://ourworldindata.org/technological-progress (that site contains a lot of data, not just for technology). At first, this graph seems to show a steady progression until you look carefully at the y-axis … it’s not linear. From the graph, it seems that from 1971 to 1981 the number of transistors went from about 1,000 to 40,000. Moore’s Law predicts that in 10 years, it would double 5 times, i.e. go from 1,000 to 32,000, and the actual values (using very rough estimates) seem to support this.

A scatter plot with years as the x-axis and the log of the number of transistors as the y axis. The points on the scatter plot lie roughly on a line.

The following is the same plot but with the common logarithm of the y-axis shown. You can see that log(y) goes up uniformly.

A scatter plot with years as the x-axis and the log of the number of transistors as the y axis (with the log explicitly calculated). The points on the scatter plot lie roughly on a line.

Questions to be answered in your Brightspace Discussion:

Part a: The number of transistors per IC in 1972 seems to be about 4,000 (a rough estimate by eye). Using this estimate and Moore’s Law, what would you predict the number of transistors per IC to be 20 years later, in 1992?

Prediction =

Part b: From the chart, estimate (roughly) the number of transistors per IC in 2012. Using your estimate and Moore’s Law, what would you predict the number of transistors per IC to be in 2040?

Part c: Do you think that your prediction in Part b is believable? Why or why not?

This is all the material that you will need. Please let me know if you have any questions.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

In this discussion, you will reflect on your course experience and think about industry certifications and what they can do for you. In your initial post, make sure that you address at least one reflection question, as well as the certification question.

Course Reflection Questions:

  • What is your the biggest course takeaway?
  • What do you feel was the most important aspect of the course?
  • Is this course what you anticipated or what you thought it would be? Are assumptions you had about the industry or the work different now?

Certification Question:

  • Now that you have thought about your career aspirations in Module One and learned about certifications here in Module Eight, what certifications are targeted toward your desired job role?

Ryan Taylor posted Oct 18, 2021 7:21 AM

Subscribe

Howdy,

My biggest course takeaway was learning about the CIA Triad and the fundamental security design principles. These two concepts are the cornerstones of cybersecurity. We focused a lot of time on learning these and going over different scenarios that we will see in our future of cybersecurity. These principles and concepts are powerful mental tools for approaching security that never go out of date.

I’m already working in my field of study at Los Alamos National Laboratory but wanted to further my education in the field as technology is always changing, oh yeah and a raise in pay, ha. Some of the certifications that I would like to obtain would be Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Cyber Forensics (CCFP), Certified Cloud Security Professional (CCSP), and an ISSEP. I have been really looking into working with the NSA for a long time now, have even had the opportunity to work with them at the lab on a couple of things. I find I have been leaning towards forensics and National security accepts of my career and want to get more involved in those.

It has been great learning with all of you this term and looking forward to next term! Good luck with your future endeavors!!

Cheers,

Ryan

Works Cited

Kim and Solomon. (2016, October). Fundamentals of Information System Security, 3Rd Edition. https://learning.oreilly.com/library/view/fundamentals-of-information/9781284116465/

Mason Voorhees posted Oct 18, 2021 10:02 AM

Subscribe

Hey Class,

When taking this course my biggest take away was understanding threat actors, I think it is very important to know about each type of threat so when I am working, I can keep this in mind, My work uses key cards and other security methods but I never new about a tailgator which is someone who does not have access gains access by someone holding the door open for them. I do this all the time which freaked me out ot know this was a real issue.
I feel this whole course is so important. At work I needed to take cybersecurity trainign which was alot like this course. The main difference between the course at work and this class was the amount of depth. I think my work did a great job on training me though because I leard about many types of attacks like phishing, defense in depth, principles like principle of least privilage. All of this course was very infomative and needed.
This class was not what I thought it was, I thought it was going to invovle programming or creating a security system. After taking the course Im very happy that it was the way it was, it taught me so much about cybersecurity.
For certifications, for my career I dont think I require any of these certifactions needed to become a full stack developer. But a certificaton that strikes my interest has to be a CISM certification. This stands for Certified Information Security Manager. I would want this certification because of how desireable it is by employers and also because it shows how devoted I am to making sure I know the most about security. This would mean I have the mind set of someone who wants to keep there data secure.
Cybersecurity is a topic that needs to be taught to anyone in the techinical field because of how serious attack can get. I recently had a phishing attack on my companies emails which was a pretty serious attack to obtain passwords and usernames of employees. 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

As you learned in Chapter 13 of your textbook, BCPs help organizations prepare for a major disaster or disruption in their operations. Natural disasters, such as floods, hurricanes, and tornadoes, can cause power outages that could severely impact business operations and IT systems. Unforeseen circumstances, such as a hack, data breach, or poorly planned business change, can also impact operations and a business’s IT infrastructures. For this week’s discussion, you and your peers will have the opportunity to reflect on BCPs.

For your initial post, select one of the scenarios below and answer the questions relating to it. Be sure you state which scenario you have selected in your post.

Scenario One
Imagine you work for an organization that has business liability insurance, asset replacement insurance, and natural disaster insurance. Does your organization still need a BCP? Why or why not?

Scenario Two
Imagine you are conducting a BCP for a small auto-parts supply business. As you are creating the BCP for the organization, you realize that it cannot afford to keep more than seven days’ worth of supplies on site. What would you suggest to the owner of the small business, and why?

In your response to your peers:

  • Explain whether you agree or disagree with the initial poster, and with the comments of those who have already responded
  • Provide another rationale or suggestion based on the scenario selected

Peers posts:

King Chang posted Oct 18, 2021 11:27 AM

Hello Dr. Rob and Classmates:

Congratulations to those that have made it to this 8th and final week of this class! My choice for this week’s discussion is scenario one. This organization needs business continuity plan (BCP) just like any business needs one if they plan on long-term success in their given field. The amount of insurance that this organization holds will cover certain financial risks with the insurance companies that underwrite the polices, but how the company operates during a time of natural disaster or any disaster is not something an insurance policy can offer but instead the responsibility is left up to the stakeholders in the organization to mitigate a disaster (Gibson,2015 Ch.13). A BCP should be developed to identify critical business functions (CBF), critical process supporting the CBF’s, critical IT assets and the determination of maximum acceptable outage (MAO) of these functions (Gibson,2015 Ch.13). Organization’s that don’t employ a BCP as a part of understanding their total risk exposure are left to create a BCP during a time of crisis which often generates chaos within an organization because tasks are defensive in nature and more effort is made at damage control versus recovery of key systems in order to get CBF’s back to 100%. A BCP is a road map for an organization to identify critical business functions, who’s in charge during a disaster and the support required to get all critical business functions back online, the organization’s that choose to march forward without a business continuity plan (BCP) are usually the ones you read about in the media (Gibson, 2015 Ch. 13). Thank you Dr. Rob for your guidance this term! I wish everyone good luck in the pursuit of your education goals! Have a great day. King Chang

Reference:

Gibson, D. (2015) Managing Risk in Information Systems. Jones & Bartlett Learning. https://learning.oreilly.com/library/view/managing-risk-in/9781284055955/02_tit.xhtml

Kiersten Dyer posted Oct 18, 2021 12:43 PM

Hello class! For this discussion I’ve chosen scenario number 1.

Business continuity plans should be used in conjunction with insurance coverage. “Insurance coverage without a BC plan implies that your BC strategy is to hope an event does not occur.” (Long, 2017) A business continuity plan is a guide for crisis situations such as natural disaster or cyber attack. It is not a question of if an organization will encounter a crisis situation, but when. When a crisis does occur, the business will have the BCP as a blueprint to follow to restore critical business functions and to reduce the impact of the event on the organization. Insurance would play a role in the contingency portion of a BCP as one of the tools in restoring normal business functions.

It’s been a pleasure being in class with you all!

References

Long, R. (2017, August 22). The difference between business continuity and insurance. MHA Consulting. https://www.mha-it.com/2017/08/22/business-continuity-and-insurance/

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

For this milestone, you will begin developing the Python code for a couple of your dashboard widgets in an IPYNB file in Jupyter Notebook. Specifically, you will begin coding the interactive data table and the geolocation chart. You will need to make sure that both of these components receive data from the MongoDB database. You will use the CRUD Python module from Project One to help you retrieve this data and pass it to the dashboard widgets. Recall that the MVC design pattern is a separation of application logic into a stack of software components, such as MongoDB for model storage, the web server for implementing application controller logic, and the web browser for production of the view.

You will continue building on this work to complete Project Two, which will be due in Module Seven.

Prompt

You have been asked to create a data table on the dashboard which shows an unfiltered view of the Austin Animal Center Outcomes data set. You have also been asked to add a geolocation chart to the dashboard, which will help the client visualize the data. For more details about the dash components for data tables and the geolocation chart, refer to the Module Six resources.

  1. Open the ModuleSixMilestone.ipynb file, which contains the starter code for the Grazioso Salvare dashboard. Upload this file into Apporto and open it using the Jupyter Notebook application. Be sure to review all of the starter code that you have been given. Pay special attention to the import commands and the comments describing what each section of code does.
  2. Update the code to create an interactive data table on the dashboard which shows an unfiltered view of the Austin Animal Center Outcomes data set. To populate the data onto your table, you will utilize your previous CRUD Python module, from Project One, to run a “retrieve all” query and bring in the data from MongoDB. This data retrieval will serve to access the “model” portion of your MVC pattern: the MongoDB database. Be sure to hardcode in the username and password for the “aacuser” account.

    Note: It may take a few minutes for the data table to fully render and display, depending on the speed of your internet connection.

    Tip: Be sure to consider your client when creating the interactive data table. Consider optional features that will make the table easier to use, such as limiting the number of rows displayed, enabling pagination (advanced), enabling sorting, and so on. Review the Module Six resources on data tables to help you select and set up these features.

  3. Add a geolocation chart that displays data from the interactive data table to your existing dashboard.
    • You are being given the function that sets up accessing the data for the geolocation chart and calls the Leaflet function: update_map: def update_map(viewData):     dff = pd.DataFrame.from_dict(viewData)     # Austin TX is at [30.75,-97.48]     return [         dl.Map(style={'width': '1000px', 'height': '500px'}, center=[30.75,-97.48], zoom=10, children=[             dl.TileLayer(id="base-layer-id"),             # Marker with tool tip and popup             dl.Marker(position=[30.75,-97.48], children=[                 dl.Tooltip(dff.iloc[0,4]),                 dl.Popup([                     html.H1("Animal Name"),                     html.P(dff.iloc[1,9])                 ])             ])         ])     ] 
    • You will need to structure this function into your dashboard code by putting the correct statements in the layout. These statements are important so that your layout has a place for the geolocation chart. Here is an example statement: html.Div(             id='map-id',             className='col s12 m6',             ) 
    • You will also need to add in the correct callback routines for the geolocation chart. These will look similar to the callback routines used for user authentication and your data table. Here is an example callback routine: @app.callback(     Output('map-id', "children"),     [Input('datatable-id', "derived_viewport_data")]) 
    • Note: The Leaflet geolocation chart will show the first row of the data table by default. As long as your chart shows the location of the dog in the first row, that is sufficient for checking that your geolocation chart is set up correctly.
  4. Finally, run the IPYNB file and take a screenshot of your dashboard as proof of this execution. Your screenshot should include 1) the interactive data table populated with the Austin Animal Center Outcomes data from MongoDB and 2) your geolocation chart showing the location of the first dog in the table. Additionally, your unique identifier (created in the Module Five assignment) should also be visible in the screenshot.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Consider the life cycle steps identified in this document and how they apply to the article A Health System-Based Critical Care Program With a Novel Tele-ICU: Implementation, Cost, and Structure Details. For example, resources are planned, designed, implemented, and evaluated. What resource requirements are needed to accomplish the program, and how are they justified?

In your responses, state whether you think your peers effectively justified the resource requirements for the program. Why or why not? Offer suggestions for improvement, citing the CDC program life cycle framework.

Starting up a new healthcare program within a preexisting program can be a challenge. This requires careful strategic planning and allocating available resources for the best possible outcome. Using the logic model will create a visual on the planning, implementation, and evaluation. “Ideally, the development of a logic model engages and guides program development and evaluation planning simultaneously (Step2B, 2021).” The article focuses on hospitals within the Fairview Health System (FHS). They have designed a program using telehealth to lower the risk of patients needing critical care services by being more readily available to their patients.

“Improving the efficiency of critical care service is needed as the shortfall of intensivists is increasing (Fortis et al., 2014).” The article describes what their current problem is and a solution they have proposed, telehealth. It states that there needs to be some improvement in their critical care facility, which they believe telehealth will improve their general outcome (Fortis, 2014). Thanks to telehealth, now intensivists can view their patient’s EMR’s without them being in the facility, give them feedback, answer questions, and have their patient’s charts ready. Studies showed that mortality decreased and improved their patients’ overall outcomes since implementation.

When the Fairview Health System was looking to improve efficiency of its ICUs out of a need due to limited intensivists, a tele-ICU program was developed that would allow for implementation of a remote ICU program and standardization of critical care practices across ICUs. The life cycle steps/ logic model can be used to represent program outcomes and show how the program will reach these outcomes, while portraying the logic for these program expectations. Steps of logic model include definition of the problem, capacity/ resource/ haps inventory, definition of activities, if…then process, arrange logic model components, and logic model narrative.

Due to the lack of intensivists available within FHS, and data showing that intensivists improve outcomes for ICU patients, a need was demonstrated to implement changes to the current ICU program. Rather than using existing telemedicine programs that would have licensing fees and additional potential associated operating costs, FHS set out to create a tele-ICU program using “off the shelf” technology that would allow intensivists to share clinical responsibilities and reduce the costs of the remote ICU program. Intensivists also have the ability to access the EMR data remotely, giving them the same insight into health information as if they were on-site. This was all part of the goal of reducing the overall per-bed cost (increasing efficiency). Overall, the study seems to have accomplished what it set out to do, and it started out with the identification of a problem, setting goals, planning resources, etc. which are part of the basis for the steps set out in the logic model document.

–Andrew

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

PART #1:

For this assignment, you will use the Vinho Winery Case Study and other course resources to review raw data sets that summarize the production, sales,
and distribution of wine. You will need to analyze the various types of wine and different distribution centers to determine their financial impacts on the
organization’s total revenue. All of your analyses need to be submitted in an annotated Excel file, and each analysis needs to include a rationale.
Specifically, the following critical elements must be addressed:


A. Using a pivot table, determine the percentage of wine varieties sold from each distribution center. Illustrate your results in the form of a pie chart. Hint:
Create a pivot table using the data spreadsheet as its basis.

B. Generate a labeled bar chart that illustrates the sum of wine varieties sold to each distribution center.

C. Using a pivot table, calculate the total amount of revenue generated for each distribution center. Illustrate your results on a bar chart. Hints: Production
cost data is provided in the Costs and Distances tab. Make sure you don’t mix your units of measurement (i.e., pallets, cases, or bottles).


D. Using the IF function, calculate the central tendencies (mean, median, and mode) of shipment volume for each distribution center. Illustrate your results
in a table. (Do NOT use a pivot table or manually identify each cell to be evaluated.)
E. Analyze the frequency of shipment by size using a histogram. Use the following bin sizes (number of pallets): 72, 48, 24, 18, 12, 6, 3, 1.
F. Create a shipment histogram to show the distribution of shipments for Portland and Riverside. Use the same bin sizes as you did in Part E. Hint: Use the
alphabetical sort for the destination column, and select Data Analysis to plot the frequency of pallet shipments using the bin sizes listed for the two
destinations separately.
G. Provide a summary statement that describes the inefficiencies in the organizational sales analysis. In your response, explain why this information is
important for influencing management decisions.

PART 2: For this milestone worksheet assignment, complete the following:

 Review the Milestone One Rubric.

 Address the following three parts of the Milestone One Worksheet:

o Describe SNHU Clothing’s business needs and identify what types of data can help best address SNHU Clothing’ business needs.

o Identify the current client systems in use at SNHU Clothing and illustrate how they interrelate.

o Describe how you will access the data you need, how you will know what information is currently available, and how and where the data is
stored.

 Upload your completed and saved worksheet file, along with any flowcharts, to the learning environment.

PART#3:

Specifically, the following critical elements must be addressed:
I. Project Proposal. The project proposal should contain enough detail so that relevant stakeholders (who will vary depending on your selected case
study) can determine if the proposed solution is feasible and will address the needs or gaps in the current operating environment. The following
sections should be included:

A. Problem Statement: Craft a clear, accurate problem statement that highlights the information technology-related aspects of the challenges you
are facing.

B. Significance: Analyze the significance of this problem and what a solution could mean to you, the company or group, and the discipline or area
of interest within information technology. In other words, describe the significance that this project has to your discipline or area of interest
within information technology and your development as a practitioner. This will be your chance to sell this project idea so that it is exciting for
your imaginary stakeholder audience, and also for your real-world instructor, peers, and potential employers.

C. Objectives: Describe the scope, goals, and objectives of your project. If you are addressing only a part of the overarching problem, state this in
this section. Make sure that your objectives are reasonable (i.e., could be accomplished without exorbitant resource usage, an irrational
timeline, etc.).

D. Deliverables: Propose your overall solution, highlighting the key deliverables that you will create to solve the problem or challenge the
statement.

E. Methodology: Establish the methodology and techniques that you intend to use throughout the design phase of your project, with support as to
how each is appropriate for the situation.

F. Risks: Analyze the problem and your own solution proposal to highlight any risks that may prevent successful completion of your solution
design. Include risks that result from the project not fulfilling the objective to solve the information technology problem. In other words, what
risks are present and how would they impact the potential for a successful information technology solution?

ALL RUBRICS WILL BE SEND ONCE ITS ACCEPTED.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Competencies

In this project, you will demonstrate your mastery of the following competencies:

  • Explain the basic concepts and techniques that pertain to artificial intelligence and intelligent systems
  • Analyze current trends and emerging technologies in Computer Science for their impacts on society

Scenario

You are the lead engineer for a major social networking company that
utilizes neural networks in its personalization algorithms.
Personalization plays a major role in your business model. The company
is an industry leader in user experience and your customers expect the
software to anticipate their needs in terms of recommended posts,
recommendations for friends requests, groups to join based on shared
interests, news articles they may be interested in, discussions they may
want to join, games they may want to play, and other features available
on the site. This experience is monetized through targeted advertising.
Your sales reps claim a click-through rate that is double that of your
closest competitor because you know everything there is to know about
your users.

To achieve these results, the company collects user data in the form
of mouse clicks, site navigation, links followed, time spent on a page,
location data, and so on. Everything a user does within the app is
stored and fed into multiple neural networks that create models designed
to personalize the user’s experience on the site. In a nutshell, these
algorithms are designed to create a personalized user experience that
will maximize the time a user spends on the site and the number of ads
they click on. An EU regulator has brought to the company’s attention
that you may be violating some aspects of the GDPR law. Specifically,
they are concerned that your business model may not conform to some or
all of the following principles defined by the law:

  1. Transparency: The company must make it clear how they are using data.
  2. Purpose limitation: Data may be gathered for pre-specified purposes, not archived and reused for any future use.
  3. Data minimization: Only the data gathered for those pre-determined purposes may be gathered, not more.
  4. Accuracy: Companies have a responsibility to keep data up-to-date and accurate, and must fix inaccuracies as soon as possible.
  5. Storage limitation: Data may only be retained as long as it is applicable to the purposes noted above; it cannot just be stored indefinitely.
  6. Confidentiality: Data must be kept secure and confidential to a reasonably expected degree.
  7. Accountability: Companies may be held responsible for following these principles and can be penalized if they do not.

You have been asked to write a white paper that addresses the
regulator’s concerns. Your white paper will be presented to an
interdepartmental team of systems engineers, software developers, AI
experts, and members of the legal team, so that they can move forward
with bringing your company into GDPR compliance.

Directions

White Paper

Using your knowledge of how neural networks work and the GDPR
principles outlined above, write a white paper that addresses the
regulator’s concerns. Recommend changes where necessary and defend
existing practices where applicable. Note that proposing remedies to one
principle may violate another. In order to adequately address each
aspect of the prompt, you will need to support your ideas with research
from your readings. You must include citations for sources that you used.

  1. Explain the basics of neural networks and how they work by addressing the following:
    1. Provide a brief explanation of how neural networks work. How do the
      input layer, hidden layer, and output layer interact to classify
      objects? Consider the fact that your target audience may have limited
      technical knowledge.
  1. Evaluate how neural networks are used to create personalization by addressing the following:
    1. How are neural networks utilized to aid in the personalization of the user experience?
    2. What ethical concerns can this raise? Consider hidden biases that
      may arise in using a “black box” classification system, where the
      algorithms are unknown to the user.
  1. Analyze how portions of the GDPR affect personalization by addressing the following:
    1. Summarize the portions of the GDPR that affect personalization. Be sure to consider at least four
      of the following in your answer: transparency, purpose limitation, data
      minimization, accuracy, storage limitation, confidentiality, and
      accountability.
  1. Assess how the GDPR is affecting the company’s practices by addressing the following:
    1. What specific legal concerns may arise from your company’s use of
      neural networks as a classifier to personalize the user experience?
    2. Is not collecting data a possibility for the company’s business model? Defend your answer.
  1. Propose adaptations to the company’s practices to act in compliance with the GDPR by addressing the following:
    1. What are the current trends (best practices) in artificial intelligence and machine learning aimed at preserving privacy?
    2. What changes to the way the company collects, stores, and employs
      user data do you propose to comply with GDPR? Defend existing practices
      where applicable.

What to Submit

To complete this project, you must submit the following:

White Paper
Your submission should be a 3– to
5–page Word document with 12-point Times New Roman font, double spacing,
and one-inch margins. Sources should be cited according to APA style.

Supporting Materials

The following resource(s) may help support your work on the project:

Website: Guide to the General Data Protection Regulation (GDPR)
This
website will provide you with a summary of the principles behind the
GDPR laws. Begin by reviewing the first page so that you understand the
purpose of the guide. Then be sure to concentrate on each of the pages
under the “Principles” section. Concentrate on each of the pages under
the “Principles” section as they are outlined in the guide to the
general data protection regulation. As you read, be sure to consider how
each principle would impact the company’s business model for your
project.

Reading: AI and the Janus Face of the GDPR – Chance or Challenge?
This
reading discusses several impacts of the GDPR on Artificial
Intelligence (AI), including challenges as well as opportunities to
create a stronger, more reliable AI. As you read, consider the following
questions:

  • What are the potential positive and negative impacts of the standard of transparency for AI?
  • What are the potential positive and negative impacts of the standard of data minimization for AI?

Reading: How GDPR Can Undermine Personalization and User Experience
This
reading discusses some of the challenges that the GDPR creates for
businesses that use personalization and advertising. It also provides a
few suggestions for how businesses can move forward in productive ways
while still being GDPR-compliant. As you read, consider the following
questions:

  • What principle(s) of the GDPR have affected mailing lists for companies? How are these mailing lists related to personalization?
  • What are the benefits and drawbacks of gaining the user’s consent to store cookies when visiting a website?
  • What are some of the proposed solutions to help balance the
    customer’s right to privacy and companies’ desire to provide a
    personalized user experience?

Reading: How to Develop Artificial Intelligence That Is GDPR-friendly
This
reading describes the impact of the GDPR on artificial intelligence,
specifically the potential impacts on machine learning algorithms. The
reading then suggests some possible methods that can be used to help
protect user data and enhance compliance with the GDPR. As you read,
consider the following questions:

  • What is the main conflict between the GDPR and machine learning algorithms?
  • What are the specific complications with “black box” algorithms?
  • Why is considering potential biases of data sets important? How can biases be addressed?
  • What are some of the principles for good data protection?

Reading: Rethinking Data Privacy: The Impact of machine learning
This
reading provides more detail about data sets and the difficulties in
maintaining privacy for users. It also discusses how machine learning
exacerbates these difficulties, as well as describing possible solutions
in more detail. As you read, consider the following questions:

  • What is the basic structure of a data set? What are de- and
    re-identification, and why are they important in thinking about data
    privacy?
  • What are some of the specific challenges for AI and machine learning with regard to data privacy?
  • What are the emerging trends to preserve privacy? How might they be applicable to the scenario for this project?

Website: General Data Protection Regulation (GDPR) – Official Legal Text
This
website contains the full text of the GDPR. Some of the other readings
in the Supporting Materials mention specific subsections of the law. For
additional context about these sections, refer to the relevant sections
of the GDPR. Note: You are not required to read the entirety of the GDPR official legal text. This website has been included as a reference.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I’m working on a philosophy writing question and need support to help me study.

Instructions

Below are basic arguments in English. Choose one argument and translate the argument into the symbolism of Predicate Logic. Refer to the translation chart on page 481 of your text for help translating. Then, Use one of the Indirect proof techniques combined with Rules of Inference and Equivalence from Chapter 8 to demonstrate the validity of the argument.
Next, construct an alternate proof. In other words, if the proof was done using RAA, now use CP; if you used CP, now use RAA. Consider the following questions, as well, in your journal response:

  • Will a direct proof work for any of these (ie. a proof that doesn’t rely on making assumptions as CP and RAA do)?
  • Can the proof be performed more efficiently by using different Equivalence rules?

Arguments:

  1. There are rights that cannot be waived. But alienable rights can be waived. It follows that some rights are inalienable. (Rx: x is a right; Wx: x can be waived; Ax: x is an alienable right)
  2. All contingent beings are causally dependent. No necessary beings are causally dependent. Every physical entity is contingent. All atoms are physical entities. We may conclude that no atom is a necessary being. (Cx: x is a contingent being; Dx: x is causally dependent; Nx x is a necessary being; Px: x is a physical entity; Ax: X is an atom)
  3. There is an entity that is more powerful than all entities. Therefore, at least one entity is more powerful than itself. (Mxy: x is more powerful than y)
  4. All brain processes are physical processes. No mental processes are tangible. Therefore, every brain process that is a mental process is also an intangible process. (Bx: x is a brain process; Px: x is a physical process; Mx: x is a mental process; Tx: x is tangible.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Addressing Ethical Issues

Helping professionals often face difficult decisions in their work that may have ethical ramifications. Ethical dilemmas span all areas of your professional practice from confidentiality and privacy to cultural considerations. For this Assignment, you concentrate on cultural considerations that may pose challenges to ethical practice. (Culture is broadly defined here as the behaviors, traditions, and/or beliefs of any subgroup.) Select one of the two case studies below to use for this assignment. After analyzing the case study, consider how you might address the issues present using your professional practice code of ethics.

Review the case studies below before completing the Assignment.

Case Study #1

Nitin and Priya are first-generation Indian-American immigrants, while their 16-year-old son was born and raised in the United States. They were reluctant to engage in treatment, but are doing so at the request of their son, Sujay. In Sujay’s view, his parents are being overly controlling regarding his upcoming choice of college, which is causing increasingly frequent clashes between him and his parents. Sujay wants to attend art school, while his parents want him to attend engineering school. They state that a career in science, religion, law, or medicine is the appropriate path for a person of his caste. Sujay claims that while he wants to please his parents, he feels they are stifling his passion and imposing cultural norms that, to him, are a part of their “world” and not his. You have little knowledge of Indian culture or the caste system and are unsure whether the issue at hand is a matter of controlling parents dealing with a life transition issue or a serious conflict involving social and cultural influences.

Case Study #2

Nicole and Julia explain to you that their relationship has felt strained lately and that they fear they are heading for a breakup. The couple explain to you that they have been in a long-term, non-monogamous relationship, but that lately, Nicole has expressed desire to change this practice. Julia feels that Nicole is “changing the rules halfway through the game” and that her sexual relationships with others are of no consequence to how she feels about Nicole. Their current relationship practice conflicts with your own personal opinion about the role of monogamy in relationships, and thus you feel conflicted about how to handle the situation.

  • Identify the case study you chose and describe the ethical issue(s) present in it.
  • Explain how you would address each of these issues.
  • Justify your response using the appropriate professional Code of Ethics.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

PLEASE ANSWER THE FOLLOWING DISCUSSION QUESTION. AFTER COMPLETING THE INITIAL RESPONSE, PLEASE ALSO PROVIDE RESPONSES TO THE TWO STUDENT’S DISCUSSION POSTS BELOW REGARDING THE SAME TOPIC!

This week, you have learned about various object-oriented programming principles and their importance in programming. In this discussion, you will spend time discussing these principles with your peers. You will also reflect on what you have learned in the first few modules of the course. In your initial post for this discussion, address the following:

  • How do the four main OOP principles (inheritance, encapsulation, abstraction, and polymorphism) work together to make a well-designed application? How do they allow a programmer to create more reusable and maintainable code?
  • What was the most interesting thing that you learned in the course so far?
  • What concept(s) do you feel are unclear or that you need more practice applying?

In responding to your classmates, address the following:

  • What did you learn from your classmate’s post? Do you have any additional information on any of the principles for your classmate to consider?
  • What did you find interesting or relatable in your peers’ posts?

To complete this assignment, review the Discussion Rubric.

STUDENT ONE:

Hello,

OOP plays a role in programing by enabling four different principles to work together by allowing you to separate code into different classes. For example Encapsulation allows you to lock down classes that are not allowed to be touch by other classes in the code or scripts. While on the other hand you polymorphism that allows you to use other classes to create sub-classes to work off each other. Then abstraction allows you to nick pick what you want to use for each classes with different inputs. Then inheritance does what it means it can inherit other properties to fill its child or traits.

I think for me as I go into week three and my second programming class I am learning more on how I don’t think I have a mind set of a programmer to sit down and focus. I am having a hard time to sitting down and absorbing all the information that I need. I am slowly working through it but it is something I am noticing as time goes on.

STUDENT TWO:

So far learning about object oriented program has been pretty interesting. The four concepts working together form a nice cohesion.

First up is Encapsulation which is going to reduce the complexity of your code by helping to eliminate the overall number of parameters in the code. Increasing the reusability within our code is going to help us out as well. Instead of writing out entire equations we can just write one and reuse it over and over.

Next is Abstraction which is going to reduce the complexity. Whenever you create a new object it should only expose a high level mechanism for using it. The relevance needs to stay within the current object and what it needs to function. Good implementation of this will isolate the impact of changes as well.

With Inheritance we can start to do some unique things. After creating a parent class, we can begin to spawn child classes. Each of these child classes can be unique and have their own specific functions. Of course these can also spawn more child classes that can all use the fields and methods of the parent class. This will help eliminate redundant code.

Lastly polymorphism helps us refactor ugly switch/case statements. Instead of creating many switch statements we can polymorph one to be use over and over. This is necessary within the hierarchy of child parent classes. Without this we would not be able to have a method implemented for the parent class that we’d like for the children too.

Learning about OOP and how everything is coming together has been the best so far to me. I’ve enjoyed learning java quite a bit more than I initially expected I would, but I think I’m starting to understand the concepts a bit. I feel I just need more practice and review so I don’t forget to utilize all the tools available.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Scenario

The organization that you are a director of leadership and learning for has been conducting engagement surveys among its employees every two years to gain a deeper understanding of employees’ views on areas such as customer service, the organization’s overall strategy, job satisfaction, rewards and recognition, and training and development. The most recent survey was conducted this year, and the organization wants to carry out another survey in two years.

Prompt

Your task is to evaluate the employee survey results using a GROW Model Template and identify several survey questions that will target leadership skill and behavior improvement for the next two years. You will also represent the trends you’ve identified with bar or line graphs. For this assignment, you will complete the first five sections of the GROW model template:

  • Identified Trends
  • Employee Survey Results Data
  • Focus Areas
  • Reality—Current State
  • Desired Future State—Where Would You Like to Be?

Specifically, you must address the following rubric criteria:

  1. In the Identified Trends section, identify any noticeable trends in the Employee Satisfaction Survey Results data and address the following in your response.
    1. Are there certain focus areas that have seen significant changes compared to others?
    2. How might one focus area impact another?
  2. In the Employee Survey Results Data section, create bar or line graphs from the employee survey results data that best represent the trends you’ve identified above.
  3. In the Focus Areas section, identify three focus areas to improve the organization based on your evaluation, and provide rationale.
  4. In the Reality—Current State section, explain the current state for each focus area you’ve identified above according to the employee survey results. Consider the following in your response:
    1. The potential impact on survey results over time, the “why.”
  5. In the Desired Future State—Where Would You Like to Be? section, create a goal to address each focus area you’ve identified within the next two years, and describe the impact to the entire organization. Consider the following in your response:
    1. The desired result should be 10% improvement for the next survey.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Wheelies is a small family-owned scooter and bicycle rental business near the large tourist city of San Francisco, California. Wheelies currently has 42 employees, most of whom are San Francisco residents. Currently, Wheelies promotes itself by having their employees hand out 20% discount coupons within a one-mile radius of the store. Employees do this each morning for the three hours that the store is open. Additionally, Wheelies has a Facebook page (though it was last updated two months ago) that offers a two-for-one rental coupon to followers who share the post. The biggest struggle for Wheelies is its competition with other local businesses to attract tourists. The owner of Wheelies has decided to invest in more modern marketing techniques in hopes of establishing a well-known presence in the community and gaining new customers who return to support the business year after year. This will require the owner to better understand the company’s audiences and how best to market to them.

You have been hired by the owner as a consultant, and your job is to create a basic communication plan that provides guidance on how to appropriately collect demographic information, analyze the gathered demographic data from the San Francisco Fact Sheet PDF, and identify ways to reach the target audience so that the owner can move forward with her new marketing campaign.

The full communication plan will be created for your final project in this course. This plan will affect both internal staff and external customers, so it’s important to keep in mind these key elements of the company:

  • Employees
    • Since it is the off-season, the seasonal part-time staff are not currently working at Wheelies. This means a significant portion of the employee base that will be impacted by your communication plan will not be physically present during the plan development.
    • You will be unavailable during most of the busy season when the part-time staff come back to work.
  • Company Goals

Be sure to provide sufficient guidance and rationales in your communication plan that will allow for the plan to speak for itself.

Prompt

Using the provided scenario and customer data set, begin work on your communication plan for Wheelies in support of your final project submission due in Module Seven. The plan should address the company’s goals to be well-known in the community and to retain new customers year after year.

Specifically, you must address the following rubric criteria:

  1. Review how data and information were collected to provide feedback on how they were collected and suggestions for future improvements:
    • Evaluate if the data and information are accurate, credible, and valid based on how they were collected.
    • Determine if the data and information were collected in accordance with federal laws and regulations.
  2. Analyze the demographic data that Wheelies has already collected on their target audiences:
    • Identify important target audience demographic information that has been collected.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I don’t understand this Management question and need help to study.

Overview: For this milestone, review the case study, A.P. Moller-Maersk Group: Evaluating Strategic Talent Management Initiatives, through page 13 (up to HR- Customer Initiative at Maersk) and the job posting for a Customer Service – CARE Business Partner. View the SHRM PowerPoint presentation and its note pages: Unit 6: Training Methods, Experiential Learning and Technology.

Using the material on needs assessment and training strategies provided in this week’s lesson and the case study, in a short paper you should:

  •  Illustrate the value of a training needs assessment in an organization in general, supporting your response.
  •  Describe the components of a needs assessment used to determine the training requirements of a Customer Service – CARE Business Partner at Maersk.
  •  Describe the importance of creating Specific, Measurable, Achievable, Realistic, and Time-oriented (SMART) objectives for a training plan.
  •  Explain the importance of developing learning activities for a Maersk Customer Service – CARE Business Partner training program.
  •  Describe how you would incorporate adult learning principles and methods of experiential learning from this course into the Maersk Customer Service –CARE Business Partner training program.Guidelines for Submission: Your submission should be 2–3 pages in length and double-spaced using 12-point Times New Roman font. Be sure to list your references at the end of your paper. Submit journal assignment as a Word document
  • In the last module, you looked at how organizations plan for their human resource requirements and how they fill open positions. In Module Three, you will explore training and development, processes organizations use to ensure their employees have the knowledge, skills, and abilities they will need to achieve their goals.Before you begin, it will be helpful to learn about andragogy, defined as “the art and science of helping adults learn” by Malcolm Knowles, an American practitioner and theorist of adult education (Educational Technology and Mobile Learning, 2015). According to Knowles, adult learners:
    • are internally motivated and self-directed
    • apply their life experiences and knowledge when learning
    • are goal oriented, focusing more on intrinsic rather than external factors
    • need to see the relevance of what they are learning
    • are practical and like to be respected (Educational Technology and Mobile Learning, 2015)

    To understand how to apply these principles when designing adult learning programs, consider this comparison of traditional teaching methods, known as pedagogy, to andragogy.

    Categories Pedagogy Andragogy
    Self-Concept
    • Children are dependent on teacher and enjoy dependence.
    • Expects to be taught. Takes no responsibility of teaching self.
    • Expects teacher to be dominant in determining what, when, and how something is to be learned.
    • Adults expect and enjoy independence. They like to take control.
    • Learning is a process of sharing with the teacher and one another.
    • Teacher has responsibility to encourage and nurture the process of self-direction.
    Need to Know
    • Children need to know what the teacher teaches in order to pass and get promoted. Material does not need to be “life applicable.”
    • Adult learners need to know why they need to learn something before undertaking to learn it.
    Experience
    • Children have few experiences relevant to what is being taught; therefore, teacher must create pertinent experiences.
    • Teachers or experts are the transmitters of experience.
    • Teachers seldom recognize experiences that children do have.
    • Elicits little discussion in class-teacher to student, one-way communication.
    • Have many experiences; therefore, teacher must draw on adult-learner experiences.
    • Trade-off. Anyone in class also could share.
    • In some areas, students may have more experience than the instructor.
    • Elicits two- and three-way communication: instructor to student(s) and student to student.
    Readiness to Learn
    • Children are not necessarily ready to learn. Teacher must decide when it is time to learn specific skills or knowledge and tries to create motivation.
    • We impose uniform curricula on children by classes and age groups.
    • Adults normally come to class motivated and ready to learn, because they have chosen the training.
    • Adults learn in order to cope with real-life tasks.
    • Adults do not group by age or sex, but by experience.
    Time Perspective
    • Children study content for the future. (“Someday you will need this.”)
    • Children are taught to only accept knowledge and
      understanding level, not application level.
    • Pragmatic—adults want application today.
    • Can barely tolerate studying anything that cannot be applied to a task they expect to perform.
    Orientation to learning
    • Children and teachers of children are subject-centered and enjoy being so. (1:00 reading, 2:00 math, etc.)
    • Learning is a process of acquiring subject matter content to be used at a later time in life.
    • Adults and teachers are problem or task centered.
    • Learning is a process of increasing competence to achieve full potential in life.

    (Distant eLearning, 2015)For a video summary of these concepts, view Andragogy (Adult Learning) by Janet Finlay.- The captioned version of this video may be accessed in the following link: OL-211: Andragogy (Adult Learning) (CC)A valuable concept relevant to writing meaningful learning objectives is Bloom’s Taxonomy, which “provides an important framework for teachers to use to focus on higher order thinking. By providing a hierarchy of levels, this taxonomy can assist teachers in designing performance tasks, crafting questions for conferring with students, and providing feedback on student work” (Bloom’s Taxonomy, n.d.).Bloom’s Taxonomy classifies the following levels of learning to be addressed in order:

    1. Knowledge – Student recalls or recognizes information, ideas, and principles in the approximate form in which they were learned. Key words include write, list, label, name, and define.
    2. Comprehension – Student translates, comprehends, or interprets information based on prior learning. Key words include explain, summarize, paraphrase, and describe.
    3. Application – Student selects, transfers, and uses data and principles to complete a problem or task with a minimum of direction. Key words include use, compute, solve, demonstrate, apply, and construct.
    4. Analysis – Student distinguishes, classifies, and relates the assumptions, hypotheses, evidence, or structure of a statement or question. Key words include analyze, categorize, compare, and contrast.
    5. Synthesis – Student originates, integrates, and combines ideas into a product, plan or proposal that is new to him or her. Key words include create, design, hypothesize, and develop.
    6. Evaluation – Student appraises, assesses, or critiques on a basis of specific standards and criteria. Key words include judge, recommend, critique, and justify (Gilmore & Menden, n.d.).

    Finally, for an entertaining application of Bloom’s Taxonomy, watch this video on Bloom’s Taxonomy according to Seinfeld.- The captioned version of this video may be accessed in the following link: OL-211: Blooms Taxonomy According to Seinfeld (CC)ReferencesEducational Technology and Mobile Learning. (2015). Awesome chart on “pedagogy vs andragogy.” Retrieved from http://www.educatorstechnology.com/2013/05/awesome…Gilmore, L., & Menden, H. (n.d.). Teaching others what you know—survival training for subject matter experts [PowerPoint slides]. Retrieved from http://www.astdatlanta.org/Resources/Documents/Tea…Bloom’s Taxonomy. (n.d.). Retrieved from http://www.bloomstaxonomy.org/Blooms%20Taxonomy%20…Distant eLearning. (2015). Pedagogy vs andragogy. Retrieved from http://www.distantelearning.com/great-resources/pe…

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

Healthcare laws and policies play a major role in the healthcare industry. The various regulatory bodies protect the public from several health risks and provide numerous programs for public health and welfare. Together, these regulatory agencies protect and regulate public health at every level. It is essential for healthcare professionals to be familiar with and understand these laws to know when they apply and how they are applied.

Because these laws and policies are made by and for the healthcare system stakeholders, it is essential to understand the perspective of each stakeholder. It is important to understand how these laws and policies impact stakeholders and how stakeholders influence the formation and reformation of these laws and policies. Understanding health laws and policies is essential in healthcare for appropriate decision making and implementation. This assignment will help you prepare for both Project One and Project Two and eventually for your future role in your chosen field.

Prompt

In this assignment, you will review the module resources and write a short paper discussing your understanding of health law and policy in the United States. You will also share your thoughts on the value conflicts between stakeholders and the impact on public health services.

You must cite at least three sources to support your claims. For additional help with completing this assignment, refer to the Shapiro Library Guide: Nursing – Graduate item in the Start Here module. You may also use the Online Writing Center, located in the Academic Support module.

Specifically, you must address the following rubric criteria:

Importance of Policy and Law: Explain the importance of policy and law in healthcare.

Impact of Policy and Law: Provide a clear and concise description of the impact of health policy and law on the healthcare system and stakeholders. Consider the following questions in your response:

  1. What are some of the positive and negative impacts of health policy and law on the healthcare system?

What are some of the positive and negative impacts of health policy and law on stakeholders?

  1. Why are these impacts essential to be aware of?

Stakeholder Value Conflict: Define value conflict in your own words as it relates to healthcare and its stakeholders. Consider the following questions in your response:

What are the two major causes of value conflict between stakeholders in the healthcare system, and why might these conflicts occur?

  1. Potential Impact of Value Conflict: Describe at least two potential impacts of stakeholders’ value conflict on the healthcare system. Consider the following question in your response:
  2. How might these impacts affect various stakeholders and their decision making?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

The full instructions and a sample annotated bibliography are attached. I gave already found the 10 references I would like to use. I have cited them below. All I need is the annotated bibliography in APA format please.

References

Evans, S. Z., Simons, L. G., & Simons, R. L. (2016). Factors that influence trajectories of delinquency throughout adolescence.Journal of Youth and Adolescence, 45(1), 156-171. doi:10.1007/s10964-014-0197-5

Hoffmann, J. P., & Dufur, M. J. (2018). Family social capital, family social bonds, and juvenile delinquency. The American Behavioral Scientist (Beverly Hills), 62(11), 1525-1544. doi:10.1177/0002764218787020

Jacobsen, S., & Zaatut, A. (2020). Quantity or quality?: Assessing the role of household structure and parent-child relationship in juvenile delinquency. Deviant Behavior, Retrieved from https://doi.org/10.1080/01639625.2020.1774241

Ksinan, A. J., & Vazsonyi, A. T. (2016). Longitudinal associations between parental monitoring discrepancy and delinquency: An application of the latent congruency model. Journal of Youth and Adolescence, 45(12), 2369-2386. doi:10.1007/s10964-016-0512-4

Kumari, N., & Kiran, M. (2016). Socio-demographic determinants of juvenile delinquents. Indian Journal of Health and Wellbeing, 9(7), 913-915. Retrieved from http://.ia.com/index.php/home/journal_detail/19#list

Meldrum, R. C., Connolly, G. M., Flexon, J., & Guerette, R. T. (2016). Parental low self-control, family environments, and juvenile delinquency. International Journal of Offender Therapy and Comparative Criminology, 60(14), 1623-1644. doi:10.1177/0306624X15584907

Pickett, J. T. (2017). Blame their mothers: Public opinion about maternal employment as a cause of juvenile delinquency.Feminist Criminology, 12(4), 361-383. doi:10.1177/1557085115624759

Simmons, C., Steinberg, L., Frick, P. J., & Cauffman, E. (2018). The differential influence of absent and harsh fathers on juvenile delinquency. Journal of Adolescence (London, England.), 62, 9-17. doi:10.1016/j.adolescence.2017.10.010

Vidal, S., Prince, D., Connell, C. M., Caron, C. M., Kaufman, J. S., & Tebes, J. K. (2016). Maltreatment, family environment, and social risk factors: Determinants of the child welfare to juvenile justice transition among maltreated children and adolescents. Child Abuse & Neglect, 63, 7-18. doi:10.1016/j.chiabu.2016.11.013

Wolff, K. T., Baglivio, M. T., Intravia, J., Greenwald, M. A., & Epps, N. (2017). The mobility of youth in the justice system: Implications for recidivism. Journal of Youth and Adolescence, 46(7), 1371-1393. doi:10.1007/s10964-016-0498-y

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Instructions

Submit the final version of your paper for Final Project Two, which includes all critical elements for all three sections—profile, management plan recommendations, and conclusion—within a single document. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course.

The 21st century has introduced several companies that have made a trademark in the business industry and won people’s hearts. The list of successful companies is huge, but some companies have been leading the industry for years and are still at the top of the list. Google is the chosen company that has led the industry and has won the trust of customers.

Mission and vision statement:

The mission and vision of the company are to organize the information from the whole world and make it accessible to everyone. The management has executed the vision and mission statement by making its services accessible in almost every region of the world and making the search engine fast. Almost all the information related to all the subjects is accessible from Google, requiring a proper strategic plan. The authorities have communicated the vision and mission of the company quite well.

Role of management in strategic management plan:

Google introduced strategic management in 2011 and announced the market penetration as its primary plan. The market penetration means that the company has to acquire more customers and spread its services worldwide. The role of management is of great importance as the sub quarters and the branches of Google have been introduced throughout the world. The managers and leaders have to follow the matrix company structure where the managers’ report the progress of strategic management to their leaders, and further discussion is made accordingly. The managers have to collaborate and gather to execute the company’s strategic management plan (Thompson, 2019).

Organizational culture and role of management:

The managers have introduced the employee motivational culture in the company where the employees are given respect, and they are treated with dignity. The workload is relatively high, and every department has essential duties, so the managers have decided to encourage and motivate the employees to work hard. The culture consists of characteristics including openness, innovation, excellence, hands-on approach, and small company family rapport. It has been found that the employees have given their suggestions and several improvements and modifications have been brought by the company. For example, the employees suggested Google Cloud, so the company worked on it and started its operations accordingly. The managers try to keep the organized culture and traditions (Smithson, 2018)

Role of managers in decision making:

Google has always prioritized the decisions of its managers, and the company is run through the wisdom and strategies of management. The decisions at Google are made by the teams, not by the individuals. The managers are divided into teams to make the decisions, and they are also required to take opinions from employees. Once the managers get the opinions, they are polished, and a final decision is made. For example, the company has to reshape its organizational structure, so chairman Eric Schmidt asked thirty questions regarding the structure of its employees. The same questions were asked from the managers, and the decision of the final structure of the organization was decided. So, the manager’s role is essential in Google, and the employees have to obey the decisions (Namdar, 2018).

Functions of management within this company adhered to the principles of ethics.

The managers have always talked about the culture and traditions of the company and have taught the employees to follow ethics. The managers are advised to train the employees accordingly and ensure that all the employees are fairly treated and are given due respect. Managers and employees correctly follow all the ethics.

Use of human resources to develop its personnel

Google has always used human resources to extend its business. The manpower and the technological advancement are both increased to ensure that the human resources are fairly used. The role of employees and managers are both well defined, and the assets are used correctly and authentically to make sure they use human resources in the right way. Through the market penetration strategy, the business has extended throughout the world (Sullivan, 2013).

References

Namdar. (2018). Analytics at Google: Great Example of Data-Driven Decision-Making. Retrieved from https://www.smartdatacollective.com/analytics-goog…

Smithson, N. (2018, 9 4). Google’s Organizational Culture & Its Characteristics (An Analysis). Retrieved from http://panmore.com/google-organizational-culture-c…

Sullivan, J. (2013). How Google reinvented HR and drives success through people analytics. Retrieved from Insider: https://www.insidehr.com.au/how-google-reinvented-…

Thompson, A. (2019, 12 9). Google’s Generic Strategy (Porter’s) & Intensive Growth Strategies. Retrieved from http://panmore.com/google-generic-strategy-intensi…

This is the first paper

Management Planning

Toyota has often strived to be a solid and competent corporate citizen since its inception. However, the 2009 recall saw the company squander its reputation for reliability and quality. Toyota lacks comprehensive and proactive management plans to predict such issues and aggressively solve them before they intensified into a corporate crisis. Specifically, there is a flawed management framework and plan because of its top-down decision-making, which creates problems when numerous management levels existed between the decision-makers and the company issues. The Japan branch continues making decisions without considering the opinions of the local sources; hence, management stopped crossing the lean Bridge, which made it challenging to solve issues that occurred in the organization (Cole, 2011).

Another problem with the company’s management planning is evident in its risk management, which involves identifying risks early and litigating them while they are still minor issues. In 2009 before its massive recalls, the company disbanded a high-level task force created in 2005 to deal with quality issues. The quality manager cited that quality had been embedded in the firm’s culture and operations, and hence there was no need for a special task force to implement quality control. Therefore, an outgrowth of management’s goals for rapid growth and the increasing complexity of the company’s product resulted in inadequate and ineffective management planning (Kaufman, 2010).

Employee’s perception and Organizational Culture

Toyota has been criticized for being totalitarian management of its employees who are considered as corporate robots. Pressure for conformity is intense at the company, and employees were forced to follow military-style rules that teach works to sacrifice their uniqueness for the team’s good. The guidelines inside the company dictate nearly every aspect of employee’s life and days, including where they take their lunch, take a corner on the firm’s property, and conduct themselves at home. Some workers perceived the organization as a place where individuality vanishes once a person joins the organization and that the firm has always hidden what goes on inside their company (Cole, 2011).

The corporate culture went hand in hand with employee’s perceptions. While the organization argues that it is a disciplined environment that seeks continuous improvement and respect for all people, one of its former employees argued that the firm uses a totalitarian approach in governing the employees. Moreover, the company demonstrated a culture of not owning its mistakes and taking responsibility, but instead, it began blaming its suppliers and drivers for the alleged safety issues. While quality was the cornerstone of Toyota’s products, a culture of complacency saw the company experience quality issues. The company invented Toyota Production System and became reluctant to be vigilant with their manufacturing processes (Kaufman, 2010).

Communication

Toyota did not create and implement a comprehensive and strategic communication strategy to reinforce its crisis management in the wake of its product recalls. In particular, the company did not help the public and consumers understand what it was doing to address the problem; it did not own its mistake and apologize appropriately but instead blamed its suppliers and consumers of the vehicles. Moreover, the organization was not polite enough in addressing consumer concerns (Cole, 2011).

For instance, the company’s communication strategy was ineffective. During the crisis, the CEO and the president were nowhere to be found and were only caught up during the World Economic Forum in Davos. However, the president made brief unsatisfying remarks without clarifying the issue to the eager consumers and the public. The company failed to offer a conventional apology on time and was not convincing to many people. Also, it did not get accurate, factual data to the public, and enlist outside engineers to help discover and fix any safety issues and put its CEO out front to continually update the public on problem-solving progress (Kaufman, 2010).

References

Cole, R. (2011). What Really Happened at Toyota. MIT Sloan Management Review, 52(4). Retrieved from https://www.researchgate.net/publication/265103744…

Kaufman, W. (2010, February 9). Can Toyota Recover Its Reputation For Quality? Retrieved from NPR: https://www.npr.org/templates/story/story.php?stor…

Toyota. (2010). Company Overview. Retrieved from Toyota: https://global.toyota/en/company/

This was my second paper 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

Mobile applications can pull data from multiple sources when  addressing the needs of their users. For example, think about a weather  app and the way it might detail daily or weekly temperature, wind,  humidity, and precipitation data alongside historical statistics for the  same time period. When designing an application, you will need to  consider how the user will interact with that data. Continuing with the  weather app example, users are not going to be looking at a large chart  of numbers. Instead, weather apps are usually tailored with graphics and  descriptive guiding text to help users easily comprehend the most  important information for their current location.

Mobile app designs are meant to give a user the most value and allow  the user to query information. You will be focusing on effective design  for this assignment, specifically for when data is involved in a mobile  app. Your task will be to look at an app and analyze, at a high level,  how it pulls and displays data.

Prompt

Before beginning this assignment, you will need to select a mobile  app that incorporates data for users to access in its design. This can  be an app you are familiar with using or one you have found through  online exploration.

Specifically, you must address the following rubric criteria:

  • Discuss the features of the mobile app. After you  have chosen a mobile app to analyze, briefly identify the app and  explain its purpose. Then address each of the following: 
    • Describe the app’s screens and features.
    • List the major UI components on each screen.
    • Identify where data is included in the app.
  • Discuss the possible data sources of the mobile app.  Determine what data each component of the app either displays or  accepts as input. Then, think about where the data might come from. Note  that sometimes it may come from external sources, and sometimes from  users.
  • Explain how the data that users interact with helps them meet their goals.  Begin by identifying what kinds of data users are interacting with in  the app. Then, discuss how that data helps users meet a need. Think  about how that data is being displayed and why that would be beneficial  for a user.

 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

3-1 Discussion: Adaptive Leadership Toolkit

Catharin Manriquez posted Aug 13, 2021

After reviewing the Employee Satisfaction Survey Results it became clear that employee satisfaction rates were clearly affected by supervisor employee relationship. How the the supervisor interacts with the employees, through feedback and recognition, and wither or not the proper tools are presented to the employee affects how the employee perceives their employer see them. Employees are the foundation of a company, they attribute to the success of the organization and therefore should be treated as so. so when employees are asked questions like “I am proud to be a part of this company” and “My company cares about its employees”, that there will be a decreases in recent favorable results if they don’t feel like they have a good relationship with their supervisors or if they are made feel like they just aren’t important to the organization.

Leadership behaviors needed in order to improve the work environment would be the supervisors overall caring connection skills and relating skills. According to the employee satisfaction survey, employees felt like a decline in how much the company cares about its employees, 4 years ago soring 75 and only scoring 60 this current year. The survey also showed that employees didn’t feel like their supervisor showed appreciation for their work, with a sore of 55 four years ago and only 38 this year, and employees felt like they origination didn’t provide leaders who acted in just and ethical ways, scoring 53 four years ago and 35 this year. The employees feel such a disconnect with their supervisor that the organization only had a 35 for the question “When I am having difficulty my Supervisor is there to support me so I do not feel abandoned” , the highest score in this question was a 44 and that was four years ago, suggestion that employees haven’t been satisfied in this area in the past either.

The leadership skills that I would recommend including in the organizational leader’s toolkit to help improve the identified leadership behaviors would be mentoring developing, relating, and interpersonal intelligence skills. improving these skills will help address employees dissatisfaction and the feeling that their supervisors lack interest in providing emotional support and will improve the employees perception that the origination doesn’t care about it’s employees. Simple little changes can make a big difference in these areas, like acknowledging the employees strengths, recognizing when an employee goes above and beyond, extending ones support during difficult times. superiors addressing difficulty’s and reassuring the employee that an issues will be resolved as a team and providing them with support to address it makes a big difference. Sometimes people just need to be heard and know they are not alone that someone cares, the feeling that you are being heard makes such a big difference, or just being able to vent and saying the problem out loud, makes the situation clear that we are able to solve the problems on our own. Knowing that our supervisors see all the good not just the bad, all of our hard work and our dedication to the organization, its motivating and encouraging. Addressing the dissatisfaction in employees will defiantly trickle up the ladder and improve the overall organizational performance. People work best when they are motivated, when they want to come to work, when at the end of a long eight hours of hard work they feel like they are appreciated and that their supervisor is aware and grateful of all the effort that was put into the work day. The employees performance will be up, their numbers up, their employee-customer interaction satisfaction will go up, and this will be reflected on the organizations financial records, all while being in a pleasant work environment.

Last week, in Module Three, you completed the first of two components of this discussion topic, determining the desired leadership behaviors and skills you wanted to develop to improve leadership behaviors in your organization. This week, in Module Four, you will review the initial posts of two to three of your peers, addressing the following “Stop/Start/Continue” feedback questions:

  • Stop: What are the leadership behaviors/skills the learner has selected that you recommend be stopped, i.e., not pursued? Provide the rationale as to why you believe a leadership skill they have selected may not be the most appropriate focus area based on your review of the employee engagement survey results. If you don’t identify any leadership behavior focus area to stop, then how would you suggest one or more of the targeted leadership behavior areas be modified to better address the outcome desired?
  • Start: What leadership behavior/skill do you recommend the learner add as a focus area? Provide the rationale for your recommendation as well as one to two suggested ways this leadership skill/behavior could be targeted for improvement.
  • Continue: For the recommendations that the learner has made that you fully agree with, provide commentary as to why you believe the selected leadership behavior/skill area is appropriate to be addressed.

Directions

For your response posts, do the following:

  • Reply to at least two classmates outside of your own initial post thread.

When responding to at least two of your peers’ postings, your responses should show that you have given thought to what the original post said. They should also push the conversation forward, offering insights or asking clarifying questions if necessary.

Write a post of 1 to 2 paragraphs.

Consider content from other parts of the course where appropriate. Use proper citation methods for your discipline when referencing scholarly or popular sources.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I will need my initial discussion post and then two classmate responses done.

Over the past two weeks, our readings and discussions have been focused on establishing a baseline for understanding popular culture. In this module, we’ll begin our tour through the four lenses, beginning with history. As we dive into the four lenses, keep in mind that each lens is framed as a way of seeing the world around us and is not necessarily tied to the associated discipline. So, looking through the historical lens isn’t just about History Channel documentaries—it’s also about how you use the lens to understand the past and present. As you write your initial post, answer the following questions:

  • In what ways does looking through the history lens enhance your understanding of popular culture?
  • Consider a current event in the news that portrays a historical element. How does looking through the history lens influence how you perceive both the current and historical cultures referenced? Please share a news link to your event.
  • How does analyzing the relationship between history, culture, and popular culture have an influence on your discipline of study or chosen profession?

Respond to at least two of your classmates. Compare and contrast your answers to further everyone’s understanding of popular culture and the lens of history.

Make sure you support your response with the readings from this module and any additional resources if needed.

To complete this assignment, review the Discussion Rubric PDF document.

Rubrics

1st classmate response needed

Looking through the History Lens

Laura Mills posted Jul 12, 2021 10:17 AM

Hello Everyone!

Welcome to Module 3! Wow, these last couple of weeks feel like they have flown. I have liked the discussion of a variety of topics that we are picking for our final project. Also, how we are going to look through these different general education lenses. From studying with SNHU, I have found it thought-provoking; we can pick a subject and look through it with these different lenses. It makes so much sense because it supports how there are many different perspectives that people see a concept or topic when discussing it. It is a great way to promote conversation around a subject that maybe needs more visibility in society or even one that doesn’t as much. In this discussion, we are talking about the first of four lenses; the history lens. This one is fascinating because, to pick pop culture topics that do not directly tie to the history lens, we get creative with how to see it through this lens. Sometimes it is easy, and other times, it involves thinking outside the box. I am curious to read your responses, and I hope you all have a great, safe, and productive week ahead!

The history lens has enhanced my understanding of popular culture by seeing how the two can intertwine and being able to encompass what people were going through during that time. It is said in a breakdown of the different lenses in the SNHU Shapiro Library that “History can inform the future by analyzing what happened and why” (Southern New Hampshire University, 2021). Specifically, how I have seen history and pop culture intertwine is present in the pop culture artifact I chose to use for my final project. I decided to focus on a TV show that aired this year called Cruel Summer. I know I didn’t have to use what I chose for the final project; I just thought it fit well into the history lens.

What makes this artifact so perfect is that the show takes place in a decade from the past (the ’90s) and brings up one date per episode. It also has characters or images that make quick references to events that we talk about today that happened during that period. In an episode, we see the main character eating a watching the news when it starts to talk about the main character’s kidnapper, who has a slight character resemblance to Ted Bundy, the serial killer from the 1970s (Biel et al., 2021- present).

The other way I mentioned is learning what people during a particular time were experiencing (good and bad). I saw this play out in the fictional novel by F. Scott Fitzgerald, The Great Gatsby. This book that was written during the Roaring 20s details how society functioned in the 1920s. Some references are the end of WWI with the stock market booming, speakeasies & the Prohibition, the creation of old money vs. new money, flappers, and many others (Pruitt, 2018). For the end of WWI and the stock market boom, it is said, in the book “Nick Carraway, the narrator, and Jay Gatsby himself are veterans of World War I, and it is Gatsby’s war service that kicks off his rise from a ‘Mr. Nobody from Nowhere’ (in the words of his romantic rival, Tom Buchanan) to the fabulously wealthy owner of a mansion on West Egg, Long Island” (Pruitt, 2018).

The current news I chose is titled, “Charlottesville removes two Confederate statues as onlookers cheer”. The history lens influences how I see the current and historical cultures by first examining the current situation. In present-day society, we are more aware of giving attention to objects that honor a dark part of America’s history. In present-time, we want to have more accountability, and it starts with having the removal of Confederate statues knowing more about what it was honoring and symbolizing. In fact, in the article, it says,

“‘(Removing the statues) is one small step closer to the goal of helping Charlottesville, Virginia, and America grapple with its sin of being willing to destroy Black people for economic gains,’ Mayor Nikuyah Walker told reporters shortly before the Lee statue was lifted” (Ellis & Hanna, 2021).

History, culture, and popular culture influence graphic design by having a familiarity with creative trends that are currently influencing society, both culturally and in pop culture. The reason for this is because we could be working with a client that falls into that subject, and it is needed for us to be familiar with the person’s brand or the company’s brand for the design to be successful. For the history lens in graphic design, it is good that designers know how design/art trends and even the origins of the different categories of typography from the past. It helps us understand what period they are from and the culture surrounding it.

I want to hear your thoughts! Do you have a favorite general education lens to use? If so, what makes this one your favorite? Since studying with SNHU, have you noticed you look at topics through the four lenses more? Looking through these lenses, has it helped you gain more perspectives on subjects?

Reference:

Biel, J., Napolitano, T., & Purple, M. (Executive Producer). (2021- present). Cruel Summer [TV series]. Entertainment One; Iron Ocean Films.

Ellis, R., & Hanna, J. (2021, July 10). Charlottesville removes two Confederate statues as onlookers cheer. CNN. https://edition.cnn.com/2021/07/10/us/charlottesvi…

Pruitt, S. (2018, November 16). 8 Ways “The Great Gatsby” Captured the Roaring Twenties—and Its Dark Side. HISTORY. https://www.history.com/news/great-gatsby-roaring-…

Southern New Hampshire University. (2021, July 7). Research Guides: IDS 404 – Pop Culture: Lenses Identified. SNHU Shapiro Library. https://libguides.snhu.edu/c.php?g=942743&p=679568…

2nd classmate response needed

3-1 Discussion

Victoria Young posted Jul 12, 2021 7:43 PM

Hello everyone,

When looking through the history lens we can use the history techniques to analyze a certain artifact. When it comes to analyzing a film, we can look at when the film was made and even use the history technique to look at the time of the story inside the film. For example, Stranger Things takes place during the ’80s and we get music from that time period, movies, posters, and even the outfits worn during the ’80s to feel like we are being brought back to that time period and giving us a pop culture nostalgia. Another example is how the show also portrays certain historical events of that time. In the third season of Stranger Things, we can see political undertones became more apparent. The creators took the time to highlight certain themes of commercialization and the rising threat of communism.

One event I can think of is happening at the high school I went to and groups petitioning for the removal of the school nickname of the “rebels” and the removal of using the confederate flag at football games. The group is asking the school to remove its last remaining throwback to confederate culture. As we know the confederate flag is recognized for discriminating against blacks. “During the Civil War, Confederate soldiers were referred to as “rebels” as they attempted to rebel from the Union. The Confederate flag is also called the “Rebel flag.” Many students from other local high schools feel unwelcomed due to the use of the rebel flag and the way some students use it. Many suggest the removal of the nickname and to ban the flag to adapt to an ever-changing world and this must change.

History, culture, and popular culture have a big influence on my chosen profession of being a writer. It’s good to stay up to date with current popular culture events that society is interested in. When writing, you want to keep your readers interested especially where I am writing young adults, most of my readers look for characters and a storyline they can relate to.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

In this assignment, you will evaluate a current organizational structure and recommend structural changes that can help address the concerns the organization identified regarding collaboration, communication, and autonomy.

Scenario

You work for an organization that has traditionally been very formalized, and managers have had a very broad span of control over direct reports from multiple departments and functions. This worked well in the past; managers were able to oversee a high number of direct reports because there were many rules and regulations dictating how their work should be performed. However, there were downsides. Employee talent was underused, and there wasn’t a strong team culture, as most work was done independently according to standard operating processes.

Recently, the organization has been shifting to less formalized working structures to support more creative, innovative work and provide employees with more autonomy. While employees are happy with the purpose of these new changes, managers are feeling overwhelmed, and employees are feeling undersupported. This has impacted function-specific work the most, because in the past, managers didn’t need to understand in-depth, function-specific tasks (such as the technical aspects of graphic design work or the intricacies of project management). Instead, they had the ability to rely on rules, regulations, and standard operating processes. Employees have also noticed a lack of communication around current projects, which has led to a lack of updated information and duplicated work across management teams.

You have been asked to work with the human resources department to recommend a new organizational structure that addresses these identified management and communication concerns.

Prompt

Use the Module Six Assignment Template located in the Guidelines for Submission section to create an updated organizational structure chart for the organization. Then, in a separate Word document, write a brief explanation for your recommended changes and how they will impact both organizational communication and overall team dynamics.

Specifically, you must address the following rubric criteria:

  • Updated Organizational Structure Chart: Create an updated organizational structure chart that addresses management and communication concerns.
  • Explanation of Changes: Explain your reasoning for why you made the changes you did to the company’s organizational structure. Include how your changes differ from the original and why you believe they would benefit the organization.
  • Impact on Organizational Communication: Describe the impact these changes will have on the company’s overall organizational communication.
  • Impact on Team Communication: Describe the impact these changes will have on the company’s overall team communication and reporting structure.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Respond to two of your colleagues’ postings in one or more of the following ways:

  • Ask a probing question.
  • Share an insight from having read your colleague’s posting.
  • Offer and support an opinion.
  • Make a suggestion.
  • Expand on your colleague’s posting. 
  • Colleague 1: Diana Post a brief description of the cultural consideration you selected. Then, explain two challenges of applying your theoretical orientation to address their cultural consideration when working with couple and families. Cultural considerations is important in social work practice especially when related to uncommon ethnicities. I believe that it’s important to have awareness of how this may impact couples and family you work with.  For example, as a Hispanic social worker working with a Chinese couple who suffers from social anxiety there are a few things that I would need to consider. Based on research very few Chinese families utilize services of mental health and therapy. Therefore, it is important to consider how impactful it is to have a rare moment as such. CBT is known to be effective to treat anxiety disorders. I would discuss this intervention approach with couple and collaboratively create a treatment plan. It is frequently noted that Chinese people favor treatment that is directive, structured, and short-term (Chen & Davenport, 2005), as this conforms to the expectations of professionals as authoritative experts. Explain how you might modify evidence-based interventions to be more culturally sensitive and responsive. Justify your response using evidence-based articles. Intervention strategies such as psychoeducation, interpersonal relationship skills, relaxation techniques and problem solving are all good steps to be considerate and direct to what they are accustomed to. However, two challenges that I can foresee being problematic with this is not meeting expectations of the clients and time being a factor. However, modifying how I approach this will be crucial to the results. The time needs to be short term for positive response and meeting the client’s expectations is important specifically in Chinese culture. For modifications in treatment for cultural ethnicities, it is crucial that the therapeutic processes are appropriate for the client, that the treatment progress will be closely monitored, that firm boundaries are maintained, that the focus remains on the client’s therapeutic goals, collaborative relationships will arise, and that therapy is short-term and structured. In doing so these factors will thoroughly help to ensure usefulness of the CBT framework of focusing on present thinking, behavior, and effective communication (Harper, 2003).References Chen, S. W.-H., & Davenport, D, S. (2005). Cognitive-behavioral therapy with Chinese American clients: Cautions and modifications. Psychotherapy: Theory, Research, Practice, Training, 42, 101110. Harper, F. D., & Stone, W. O. (2003). Transcendent counseling: An existential, cognitive behavioral theory. In F. D. Harper, & J. McFadden (Eds.), Culture and counseling: New approaches (pp. 233-251). Boston, NY: Pearson.
  • Colleague 2: A’Lexus Post a brief description of the cultural consideration you selected. Then, explain two challenges of applying your theoretical orientation to address this cultural consideration when working with couples and families. I believe Emotionally Focused Therapy is a theoretical orientation that closely considers all cultures. Many cultural differences play a major role in emotions within human nature (Governors State University 2009). Basic emotions are displayed throughout multiple cultures (Karakurt & Keiley 2009) however, rules around the expression of an individual’s emotions are different across diverse cultures. The cultural consideration I chose is using this theoretical orientation to work with a family that does not speak English. It would be very difficult to communicate with this family on a surface level and trying to express emotions will be an even more difficult challenge. Two challenges associated with this cultural consideration would be learning to be culturally appropriate and acknowledging cultural differences and working through language barriers. Another challenge is becoming culturally competent through learning about a new culture, language, and traditions to become culturally sensitive.Explain how you might modify evidence-based interventions to be more culturally sensitive and responsive. Our professional ethics sit within the traditions, philosophies, values, and practices in our community (Shaw 2015). I would modify evidence-based interventions to be more culturally sensitive and responsive by understanding each client’s cultural reality and reflecting them that understanding to improve rapport and break cultural barriers faced between myself and the client (Karakurt & Keiley 2009). Another way of modifying evidence-based interventions to be more culturally sensitive is asking culturally appropriate questions and adjusting the interventions based on the cultural context of the client, making the interventions more client-centered. It would be important to be aware of culturally specific nonverbal and verbal expressions of emotions as well as to adjust interventions based on these observations (Karakurt & Keiley 2009). ReferenceGovernors State University (Producer). (2009). Emotionally focused couples therapy [Video file]. Chicago, IL: Author.Karakurt, G., & Keiley, M. (2009). Integration of a Cultural Lens With Emotionally Focused Therapy. Journal of Couple & Relationship Therapy, 8(1), 4–14. https://doi-org.ezp.waldenulibrary.org/10.1080/15332690802626684Shaw, E. (2015). Special Issue: Ethics in Couple and Family Therapy. AUSTRALIAN AND NEW ZEALAND JOURNAL OF FAMILY THERAPY, 36(4), 403–408. https://doi-org.ezp.waldenulibrary.org/10.1002/anzf.1132

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

In Module Five, you learned about Q-learning and its variants. This  module introduces you to advanced reinforcement learning concepts such  as actor-critic methods. Using the cartpole problem you solved in Module  Five, you will explore how the same problem could be solved using  policy-based approaches and actor-critic methods. Then you will write a  short paper discussing your findings. This will help you gain a deeper  understanding of advanced reinforcement learning concepts and how they  can be applied to computing problems.

Prompt

In the Module Five assignment, you experimented with the cartpole  problem using a Deep Q-Network (DQN), which is a value-based approach.  There is also a policy-based approach that works better for continuous  environments. Read through one such approach here: Deriving Policy Gradients and Implementing REINFORCE.  Actor-critic models represent another variation of reinforcement  learning by taking the best of both value- and policy-based approaches.  One such approach, A2C, is described here: Understanding Actor Critic Methods and A2C. Be sure to pay special attention to the code included in both of these readings.

Note: As with some of your previous readings, there are some  complicated math equations referenced in these articles. Understanding  the details of the equations is not essential. Instead, pay special  attention to the included code. Although not required for the purposes  of this assignment, you are encouraged to try out the code for these  solutions in a Jupyter Notebook in your Virtual Lab (Apporto).

After reviewing the articles, you must write a short paper explaining your findings. You must include references and in-text citations using APA format. Specifically, in your paper you must address each of the following:

  • Explain how the cartpole problem can be solved using the REINFORCE algorithm. Consider using pseudocode, UML, diagrams, or flowcharts to help illustrate your solution.
  • Explain how the cartpole problem can be solved using the A2C algorithm. Consider using pseudocode, UML, diagrams, or flowcharts to help illustrate your solution.
  • Explain how policy gradient approaches differ from value-based approaches, such as Q-learning.
  • Explain how actor-critic approaches differ from value- and policy-based approaches.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Discussion 2: Self-Disclosure

Knowing that clients might react negatively to your work with them may cause anxiety, frustration, and even anger. It is inevitable that you will work with a client who expresses anger or disappointment over working with you. This does happen in the social work field and is to be expected over time. Understanding how you might react to allegations of incompetence or anger over incomplete goals is essential to managing this type of exchange. While a negative interaction may be justified if either person did not fulfill responsibilities, often it is a result of the client’s personal reaction to the situation. The best response is to use these interactions to build the therapeutic bond and to assist clients in learning more about themselves. Stepping back to analyze why the client is reacting and addressing the concern will help you and the client learn from the experience.

For this Discussion, review the program case study for the Petrakis family.

By Day 4

Post a description of ways, as Helen’s social worker, you might address Helen’s anger and accusations against you. How might you feel at that moment, and how would you maintain a professional demeanor? Finally, how might you use self-disclosure as a strategy in working with Helen?

Support your posts with specific references to the Learning Resources. Be sure to provide full APA citations for your references.

By Day 6

Respond to at least two colleagues who suggested a different strategy and suggest different approaches to working with Helen.

Colleague 1: Melinda

Helen started by asking the age of the social worker, saying the social worker is to young and not experienced to be working with Helen (Laureate Education, 2013). Helen is upset and blames the social worker for Alec moving in because Alec stole medicines from Magda. In that moment the social worker probably felt frustrated, worried and overall anxious. The social worker became upset within the video as her defensive mechanism. I would try and remain calm and professional by asking Helen why she believes that I as the social worker is too young and inexperienced. Explaining the schooling and experience as the social worker could help the situation. However, even though on the outside you want to scream, keeping it cool calm and collective will be most effective when working with someone like Helen.

Using self-disclosure has and is a topic that some social workers do not believe in. However, personally I have found it more helpful when working with a client that I as the social worker have feelings too. McTighe states “At the same time, they are learning to attend to the many levels of conscious and unconscious communication that are occurring throughout the treatment. Making therapeutic use of this material by means of well-conceived and well-crafted interventions can thus seem a Herculean task well beyond the grasp of the trainee” (2011). Knowing your levels of conscious and unconscious communication; whether that is the barriers the social worker has or the things that you may disagree with. Will help in the long wrong. Using self-disclosure at this moment of feeling that your barriers or disagreements will show can help off set. Example: “Helen, I understand you feel I am at fault for this and I have felt this way too when…” This will help Helen understand that everyone has feelings. The social worker could even go to the extent of telling Helen, “I feel upset right now too that you are blaming me, however, Helen, I just want to remind you that we both talked through the problem and we both came the solution. Using this method will help Helen understand that I too am upset because we were working together. But then moving on to a new solution to the new problem.

Laureate Education (Producer). (2013c). Petrakis family: Episode 3 [Video file]. Retrieved from https://class.waldenu.edu

McTighe, J. P. (2011). Teaching the use of self through the process of clinical supervision. Clinical Social Work Journal, 39(3), 301–307.

Plummer, S.-B., Makris, S., & Brocksen, S. M. (Eds.). (2014a). Sessions: case histories. Baltimore, MD: Laureate International Universities Publishing. [Vital Source e-reader].

Colleague 2: Kristine

Description of ways to address Helen’s anger toward you, as her social worker

This type of situation happens more frequently than I would like it to, whether in the role of social worker or the role of certified nurse’s aide. Ways that you as the social worker might address the anger coming from Helen is to justify it. Statements like “I understand you are upset over the turn of events but let us talk about this”, or “I can see that you are angry right now, can you walk me through what happened to cause your irritation”. Sometimes all it takes is acknowledgement when they are upset and the right question to get them talking about it. Having the social worker, as in the case study of the Petrakis family, react in the moment to the anger Helen was giving her did not help things.

How I might feel at that moment

I have felt as if I had done something wrong when things went haywire with clients that I serve. In helping someone ambulate to the restroom who has had a stroke, or a total joint replacement sometimes they can lose their balance and fall. They blamed me saying I pushed them to get out of bed too soon, or something like that. I have been yelled at for something that happened on the shift prior to mine, and while I felt bad, I had to tell them that it was not me at that time, and that I would try to make it better. You feel small, and if you are sensitive to another person’s feelings things like this can leave a person emotional.

How would you maintain professional demeanor?

I acknowledge that whatever they say happened did happen and their feelings are justified. I work hard to re-establish the rapport we had built prior to the incident or offer to trade another caregiver a room and bow out of their care. I know that personality clashes happen, understanding another person’s way of doing things can be hard. By working the problem, you can come to a solution, it just takes some thought and consideration to obtain a happy medium.

Use of self-disclosure.

The use of self-disclosure can help and hinder relationships. It can be great sharing similar situations with those you serve, letting them know they are not alone in how they are feeling. On the other hand, they may see your self-disclosure as a way of making the conversation about you and your experience. You have to read the client and weigh the significance of sharing to their situation, and that comes with experience.

Reference

Plummer, S.-B., Makris, S., & Brocksen, S. M. (Eds.). (2014a). Sessions: case histories. Baltimore, MD: Laureate International Universities Publishing. [Vital Source e-reader].

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Cothey, V. (2004). Web-crawling reliability. Journal of the American Society for Information Science and Technology, 55(14), 1228–1238.

Dunn, R. (1972). Sugar and slaves: The rise of the planter class in the English West Indies, 1624–1713. University of North Carolina Press.

Dunn, T. (2009). Blockading the border and human rights: The El Paso operation that remade immigration enforcement. University of Texas Press.

Heinz, J. P., Lauman, E. O., Nelson, R. L., & Salisbury, R. H. (1993). The hollow core: Private interests in national policy making. Harvard University Press.

McLendon, M. K., Hearn, J. C., & Mokher, C. G. (2009). Partisans, professionals, and power: The role of political factors in state higher education funding. Journal of Higher Education, 80(6), 686–713.

McLendon, M. K., Mokher, C. G., & Doyle, W. (2009). Privileging public research universities: The political economy of state appropriations to higher education. Journal of Education Finance, 34(4), 372–401.

Oppenheim, C. (1995). The correlation between citation counts and the 1992 Research Assessment Exercise ratings for British library and information science university departments. Journal of Documentation, 51, 18–27.

Oppenheim, C. (1997). The correlation between citation counts and the 1992 Research Assessment Exercise ratings for British research in genetics, anatomy, and archaeology. Journal of Documentation, 53, 477–487.

Parsons, T. (1977). Social systems and the evolution of action theory. Prentice Hall.

Reflections of reality: Does India have a bad-debt problem? (2011, August 6). Economist. http://www.economist.com/node/21525452

Tandberg, D. A. (2010a). Interest groups and governmental institutions: The politics of state funding of public higher education. Educational Policy, 24(5), 735–778.

Tandberg, D. A. (2010b). Politics, interest groups, and state funding of public higher education. Research in Higher Education, 15(5), 416–450.

Yeaworth, R. C., Kapp, F. T., & Wingett, C. (1974). Attitudes of nursing students toward the dying patient. Nursing Research, 23, 20–24.

Anonymous. (2010). Food safety shake-up needed in the USA. The Lancet, 375(32), 21-22. http://www.thelancet.com

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I’m working on a business exercise and need support to help me understand better.

Review the scenario, Think about the strategies you would use if you were Jenny’s manager.

Scenario

No One Wants to Work with Her

Jenny is going to a BBQ at Monica and Harvey’s house this afternoon. Because it is a big annual event, it is usually a large party. She will likely know about half the people, as Monica and Harvey invite people from all aspects of their lives. As Jenny enters the backyard, she sees familiar faces, as expected, but also sees a lot of people she doesn’t recognize. Immediately she starts fidgeting, as Jenny isn’t good at making small talk. Instead of making eye contact and going over to people who are acquaintances, she drops her potluck dish down, grabs a drink from the cooler, and tries to find Monica so she will have someone to talk with.

At work, Jenny avoids interpersonal relationships and small talk because she is uncomfortable revealing too much of herself. When Jenny attends meetings at work, she sighs impatiently when someone is late and when people veer too far from the topic, and she makes sure to bring people back to reality. When choosing project teams, people rarely want to work with Jenny, even though she is very capable in her job. Some of the women from the office get together for lunch on Tues-days, but Jenny is never invited. Needless to say, Jenny isn’t well liked at work.

We have all met someone like Jenny, who is seemingly uncomfortable with herself and unpleasant. We may even try to avoid the Jennys we know. Despite Jenny being good at her job, no one wants to work with her. You would think that success at work only takes talent at job-spe-cific tasks. However, this isn’t the case. As we will discuss throughout this chapter and the book, successful people have the skills to do the job, but they also have the human relations skills to get along with others. The focus of this chapter will be personality, attitudes, self-esteem, and percep-tions—all of these topics and more impact our ability to get along with others.


Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Review the scenario and then answer the case discussion questions that follow.

Scenario

We are living in the age of social media. According to Pew Research Center’s survey, 73% of all Internet users use social networking sites. Regardless of whether we like it, many people live their lives online now. We have fewer expectations of privacy, we are more likely to write about what we see as opposed to talk about it, and everything we do and say has a broader audience. This has consequences for how employees work and how companies deal with the online footprint of their employees. For example, companies care about the online presence of job applicants. In a 2013 Career Builder survey, 39% of employers stated that they screen out candidates based on their online presence, and 43% decided to withhold a job offer because of what they came across online. Online behavior can signal whether the applicant would make a bad hire: Someone who bad-mouths a past employer or is disrespectful toward the opposite sex may do the same if hired. But online behavior that has no bearing on performance can also be held against the applicant as well, such as a photo in a bikini, a story the candidate authored that has too much violence, or revelations about the individual’s religious beliefs (the last of these would be illegal if done, but could be a challenge to prove).

Once hired, employees may lose their jobs for misbehaving online. This is probably a surprise to no one, except for the speed at which this occurs. Chrysler fired its social media consultant who tweeted (rudely) from Chrysler’s corporate account that people didn’t know how to drive in Motor City. A police officer lost his job in Florida after venting about parents and teenagers online. Racism, sexism, or just plain rudeness are simply more visible online and have more witnesses, and are therefore more easily actionable.

Not all examples are as clear-cut in terms of how companies should be dealing with online behaviors of employees. Recently, a female computer developer overheard two male conference attendees privately making (what she thought were) sexist jokes at a technology conference. She felt uncomfortable confronting them, so she took their picture and tweeted about them online and blogged about them the next day. One of the male developers in the photo was wearing a name tag, so he was identifiable. The conversation turned to whether the overheard comments were really sexist, was she being overly sensitive, or was technology as a field hostile to women. Then came the announcement that one of the male developers had lost his job following the online reactions to the event. This resulted in counterattacks and threats against the female developer and her company. Her company decided to respond to this situation by firing the female devel-oper. Within four days, two employees had lost their jobs as a result of one person’s using social media to call out perceived bad behavior and the public pressure that resulted afterwards.

Should organizations monitor employee behavior online? Experts differ in their suggestions. It is true that the online presence of employees may have job-related consequences. When Richard E. Grant, a guest actor on the popular show Downton Abbey tweeted pictures from the set, the cast of the show was chastised for their online behavior, as they risk giving away plot points. Companies need to guard their trade secrets and ensure that private and confidential informa-tion is not being shared or that laws are not violated, such as a hospital employee discussing a patient in a Facebook forum, and violating health information privacy laws. A study of IT employ-ees reveals that IT employees witness a lot of bad behavior on the part of employees: Employees download games (52%), download inappropriate attachments (57%), and browse social media sites (82%), introducing concerns about whether employees are doing any actual work during work hours. At the same time, the protection of the company’s rights needs to be balanced with employee privacy concerns and respect. For example, a new trend in some organizations is to ask job applicants to surrender their Facebook passwords to learn more about them. As of 2014, 12 states in the United States have banned this practice, and yet it endures. It seems that orga-nizations will continue to grapple with the reality of the online lives of prospective employees in the near future, and try to figure out the best way to do so.

1. The case only covers the surface of how the changing social media landscape is introducing challenges for managing employees. What additional incidents have you observed? What other challenges face organizations dealing with online interactions among employees, or employees and third parties?

2. How open are you online? Why do you take this approach?

3. How do you think the incident with the conference attendees could have been handled dif-ferently? What should the respective companies have done?

4. How do you think companies should respond to social media and the online presence of their employees? What should a social media policy look like?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer


Review and complete the Real-World Case Study in the 13.4 Chapter Exercises. In this activity, you will evaluate theories for their advantages and disadvantages in addressing the specific case. As you complete the case, consider how the changes at the company may drive the need for a different theory than the one used previously.

Real-World Case Study

Clancey Shoe Factory has a reputation for good shoes made with pride and love. Clancey Shoe Factory is a small family business that supports many of the businesses in the major metro-politan area of Lubbock, Texas. However, a new generation of Clancey children would like to see their business grow and have expanded their market online. Now, the business is getting even busier. More and more orders are coming in every day from all around the world. To keep up with the demand, the Clancey family had to hire more workers to make shoes. However, with more workers also come more problems. In order to keep production moving in an efficient and timely order, they had three main work areas. The first station was in charge of advertising and taking orders and inventory. The second station was in charge of shoe development and creation. The third station was in charge of shoe delivery and order completion. Every worker had different perceptions about the other stations and believed that their own work was harder. Hence they wanted more compensation and more benefits compared to the other workers in the various stations. Within stations, there was friction among the workers with more experience or higher customer satisfaction. At first, everyone was paid the same amount. However, workers felt that was not fair due to their personal tasks or experiences. The Clanceys have many orders to fill, but they will lose business if they cannot satisfy their workers.

1. Pretend you have been asked to be a human-resources expert for the company. What can you do to improve the company?

2. How can you fix this problem? What changes can be made to the company?

3. If you were a worker for this company, what would you want? Why?

4. If you were the owner of this company, what would you do? Why?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I’m working on a statistics discussion question and need a sample draft to help me learn.

The B&K Real Estate Company sells homes and is currently serving the Southeast region. It has recently expanded to cover the Northeast states. The B&K realtors are excited to now cover the entire East Coast and are working to prepare their southern agents to expand their reach to the Northeast.

B&K has hired your company to analyze the Northeast home listing prices in order to give information to their agents about the mean listing price at 95% confidence. Your company offers two analysis packages: one based on a sample size of 100 listings, and another based on a sample size of 1,000 listings. Because there is an additional cost for data collection, your company charges more for the package with 1,000 listings than for the package with 100 listings.

Sample size of 100 listings:

  • 95% confidence interval for the mean of the Northeast house listing price has a margin of error of $25,000
  • Cost for service to B&K: $2,000

Sample size of 1,000 listings:

  • 95% confidence interval for the mean of the Northeast house listing price has a margin of error of $5,000
  • Cost for service to B&K: $10,000

The B&K management team does not understand the tradeoff between confidence level, sample size, and margin of error. B&K would like you to come back with your recommendation of the sample size that would provide the sales agents with the best understanding of northeast home prices at the lowest cost for service to B&K.

In other words, which option is preferable?

  • Spending more on data collection and having a smaller margin of error
  • Spending less on data collection and having a larger margin of error
  • Choosing an option somewhere in the middle

For your initial post:

  • Formulate a recommendation and write a confidence statement in the context of this scenario. For the purposes of writing your confidence statement, assume the sample mean house listing price is $310,000 for both packages. “I am [#] % confident the true mean . . . [in context].”
  • Explain the factors that went into your recommendation, including a discussion of the margin of error

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Competency

In this project, you will demonstrate your mastery of the following competency:

  • Describe the purpose of a web service

Scenario

Conference audience

A company you work for is planning a two-day business conference. Conference speakers and attendees will be traveling from different cities. Over 15 speakers and 200 attendees are estimated to attend.

You are the lead technologist on the planning committee for this conference. To ensure that the event runs smoothly, you suggest that the company use the following web services for the conference:

Smartphone application to be used by conference attendees (e.g., Whova, 10Times, Grupio)

Web service functions and goals:

  • Lists the conference schedule
  • Tracks the number of attendees in each session
  • Provides a communication platform for attendees to virtually network throughout the conference
  • Allows attendees to add the sessions they want to attend into their calendars

Registration sign-in to be used by conference greeters

Web service functions and goals:

  • Allows user to enter a person’s name to see if they have already registered
  • Sends data to a server as to the time that each attendee arrived at the conference
  • Confirms whether registered attendee already purchased a ticket
  • Allows non-registered attendees to pay the ticket price and register

Virtual personal assistant to be used by event coordinators

Web service functions and goals:

  • Tracks the flight numbers and departure times for each speaker
  • Tracks when each conference speaker needs to be picked up from the airport
  • Provides GPS directions from airport to hotel
  • Provides the hotel information for each speaker(room number and check-in times)

As the lead technologist, you have to explain why and how these web services are necessary to the other members of the planning committee. In order to do this effectively, you need to create a technology plan. Not only do you have to consider the user perspective within your plan, but you also need to consider the developer perspective.

Directions

Develop a Technology Plan to present to the Conference Planning Committee. You may use a diagram or other visuals within your plan.

In your plan, be sure to:

  1. Explain the benefits of using web services from both a user perspective and a software developer perspective.

Consider the following question:

  • Why would your company create its own program that would be accessible over the web instead of using the three web services mentioned in the scenario?
  1. Describe the purpose of each web service described in the scenario from a user perspective (smartphone application, registration sign-in, virtual personal assistant).

Consider the following questions:

  • Why would conference attendees use the smartphone application before, during, or after the conference?
  • Why would conference greeters use the registration sign-in before, during, or after the conference?
  • Why would event coordinators use the virtual personal assistant before, during, or after the conference?
  1. Identify additional user requirements that developers would need to know prior to the conference.
  • Topics to consider may include how conference attendees may want to:
    • Use the conference schedule
    • Receive notifications
    • Interact with other attendees

Provide at least two new user requirements for each web service (smartphone application, registration sign-in, and virtual personal assistant) presented in the scenario.

  1. After identifying the user requirements, explain how each web service functionality meets the user requirements you discussed. Be sure that you are referring to the user requirements you identified to explain how each web service functionality meets those requirements.
  1. Determine the protocols that each web service should use to package and send data over a network, and explain why that protocol would be used to best support the service.
  • For the first web service, review the header file, shown in this header file resource, to make this determination.

What to Submit

To complete this project, you must submit the following:

Technology Plan
Your technology plan should be 3–5 pages in length and may include diagrams and visuals. Within the plan, you must address all of the topics presented in the directions. You can use this optional template to help you plan and organize your information.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

PART 1

As you learned in the reading this week, it is important to have a strategy in place to help manage knowledge. Watch the video in MyMISLab, Managing Knowledge located in Chapter 11 (see instruction below) and then respond to the following scenario:

Access this video by going to the MyMISLab area under the course Table of Contents menu and selecting the MyMISLab Multimedia Library link.

  1. Select the Chapter 11 title from the Chapter dropdown list
  2. Select All Sections from the Section dropdown list
  3. Select the Video checkbox from Media Type
  4. Then, select the Find Now button.

The results are below the search area. Select Chapter 11 Video: Managing Knowledge. 

https://mediaplayer.pearsoncmg.com/assets/mymislab…

-In this scenario, what type of information would you gather, and how would you approach gathering both explicit and tacit knowledge? How would you ensure that both departments have the data that they need to be more efficient? What are some ways you might approach benchmarking to measure the effectiveness of your changes?

If you have any questions, you can pose them here as well. In particular, consider how the consumability of the format in which the information is presented impacts the organization’s ability to achieve operational excellence and customer intimacy.

In your responses to your peers, try to address the similarities and differences in your recommended approaches for the scenario, or any questions they have posed, with your own understanding.  

PART 2: Your journal will help you manage the feedback that you receive from your classmates and stakeholders.

Log all of the feedback you have received since your last journal assignment, regardless of whether you intend to (or already did) incorporate it or not. For the feedback you choose to incorporate, briefly describe how you will go about incorporating it and how the feedback improves your design or documentation. If you reject any feedback, discuss why.

To complete this assignment, review the Journal Assignment Guidelines and Rubric document. 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Touchstones are projects that illustrate your comprehension of the course material, help you refine skills, and demonstrate application of knowledge. You can work on a Touchstone anytime, but you can’t submit it until you have completed the unit’s Milestone. Once you’ve submitted a Touchstone, it will be graded and counted toward your final course score.

Touchstone: Did Jim and Laura Buy a Car?

SCENARIO: Jim and Laura Buyer visit the local car dealership because they are interested in buying a new car. The car they currently have is aging and is starting to have mechanical problems. Jim and Laura would share the new car, and use it to go back and forth to work and school. Before going to the dealership, Jim and Laura decide that they can only afford $400.00 a month in car payments.

Once at the car dealership, Jim and Laura meet Stan Salesman. Stan shows them several vehicles and Jim and Laura test-drive several of the cars. Jim and Laura particularly like the blue 4-door sedan. Therefore, they agree to give Stan Salesman a $100.00 deposit to hold the car for a day. Stan Salesman does not give them the receipt but guarantees that the $100.00 is refundable. No documents were signed.

The next day, Stan Salesman calls Jim and Laura to ask them when they would like to take delivery of the car. Jim and Laura, on the way home from the dealership, decided that they were not going to buy the car because they did not want to spend that money each month. Therefore, Jim and Laura tell Stan Salesman that they have decided not to buy the car and request their $100.00 deposit back.

Stan insists that the $100.00 was a deposit on the car and was meant to be part of the contract to buy the car. Stan is very persistent and insistent that Jim and Laura have contracted to buy the car; therefore, the $100.00 will be applied to the purchase price of the car. Jim and Laura are shocked and angry as not only do they not want to spend the money, but now feel as though they are being duped by Stan Salesman.

Jim and Laura have an appointment to see a lawyer in a few days, but know you are a student taking a business law class and come to you for advice. They are very frazzled, and understandably upset that they may have just purchased a car. Since you have been taking business law, you have read and understand the elements of a contract and the defenses to a contract. Therefore, although you are not a lawyer, you provide some basic advice from what you’ve learned in your business law class.

ASSIGNMENT: In three to five (3-5) pages, advise Jim and Laura based on the above facts as presented and the material covered in the lessons. In your paper, be sure to address the following:

  1. Define the elements of a legal contract using examples from the scenario where applicable.
  2. Decide whether or not there was a contract for the purchase of the automobile.
  3. Identify the facts from the scenario which support your decision on whether or not a contract exists for the purchase of the automobile.
  4. Use at least two (2) quality academic resources in this assignment. Note: Wikipedia and other websites do not qualify as quality academic resources.

In order to foster learning and growth, all essays you submit must be newly written specifically for this course. Any recycled work will be sent back with a 0, and you will be given one attempt to redo the touchstone.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview: Much of what happens in healthcare is about understanding the expectations of the many departments and personnel within the organization. Reimbursement drives the financial operations of healthcare organizations; each department affects the reimbursement process regarding timelines and the amount of money put into and taken out of the system. However, if departments do not follow the guidelines put into place or do not capture the necessary information, it can be detrimental to the reimbursement system.

An important role for patient financial services (PFS) personnel is to monitor the reimbursement process, analyze the reimbursement process, and suggest changes to help maximize the reimbursement. One way to make this process more efficient is by ensuring that the various departments and personnel are exposed to the necessary knowledge.

Milestone Two provides you an opportunity to engage with real-world data and tools that you would encounter in an actual professional environment. Specifically, you will begin thinking about reimbursement in terms of billing and marketing. Reimbursement is a complex process with several stakeholders; this milestone allows you to begin thinking about the key players, including third-party billing, data collection, staff management, and ensuring compliance. Marketing and communication also plays a vital role in reimbursement; this milestone offers a chance to begin analyzing effective strategies and their impact.

Prompt: Submit your draft of Sections III and IV of the final project. Specifically, the following critical elements must be addressed:

III. Billing and Reimbursement

Analyze the collection of data by patient access personnel and its importance to the billing and collection process. Be sure to address theimportance of exceptional customer service.

Analyze how third-party policies would be used when developing billing guidelines for patient financial services (PFS) personnel andadministration when determining the payer mix for maximum reimbursement.

  1. Organize the key areas of review in order of importance for timeliness and maximization of reimbursement from third-party payers. Explain yourrationale on the order.
  2. Describe a way to structure your follow-up staff in terms of effectiveness. How can you ensure that this structure will be effective?
  3. Develop a plan for periodic review of procedures to ensure compliance. Include explicit steps for this plan and the feasibility of enacting this planwithin this organization.
  4. IV. MarketingandReimbursement
  5. Analyze the strategies used to negotiate new managed care contracts. Support your analysis with research.

Communicate the important role that each individual within this healthcare organization plays with regard to managed care contracts. Be sure toinclude the different individuals within the healthcare organization.

Explain how new managed care contracts impact reimbursement for the healthcare organization. Support your explanation with concreteevidence or research.

  1. 1
  2. page2image959953904
  3. d. Discuss the resources needed to ensure billing and coding compliance with regulations and ethical standards. What would happen if these resources were not obtained? Describe the consequences of noncompliance with regulations and ethical standards.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Competency

In this project, you will demonstrate your mastery of the following competency:

  • Apply principles of conservation of energy and momentum to analyze the behavior of interacting objects

Scenario

You have been asked by your supervisors at A&L Engineering to design a roller coaster for a new theme park. Because this design is in the initial stages, you have been asked to create a track for the ride. Your coaster should have at least two peaks and two valleys, and launch from an initial height of 75 meters. Each peak and valley should represent a vertical change of at least 20 meters. In your design, you should plan for a mass between 400 and 600 kilograms.

Once you have designed the track, you have been asked to calculate the kinetic energy, potential energy, momentum, and work done by the cart at various points throughout the track. Unless otherwise stated, you can ignore the effects of friction. Following your calculations, you have been asked to describe the energy transfers detailed by these equations.

Directions

To complete this roller coaster design report, complete the following:

  • Create a diagram of a roller coaster track containing at least two peaks and two valleys. As you complete your report, you may wish to design a more complicated coaster. However, it should still have two peaks and two valleys that meet the requirements below and that you are comfortable using in calculations and descriptions of energy and momentum. Your diagram should include the following information:
    • An initial height of 75 meters
    • At least two peaks and two valleys representing drops of over 20 meters
    • A set mass for your roller coaster cart between 400 and 600 kilograms
  • Calculate the kinetic energy, potential energy, and momentum of the cart at the initial drop for both peaks, and for both valleys. If your coaster has more than two peaks and two valleys, select which peaks and valleys you wish to use in your calculations and clearly mark them on your diagram. In your calculations, be sure to explicitly state the equations you use and what values you will be substituting to calculate the final value.
  • Describe the energy transfers that occur as the cart moves along the track. This should be a narrative description of the energy transfers that occur at the initial launching point, peaks, and valleys. In your descriptions, address the following:

In addition to your description of the motion of the cart on the track, you have been asked to model the motion of the cart as it comes to a stop at the end of the coaster. For these calculations, assume that the cart will inelastically collide with a cart of equal mass at rest on a flat surface.

  • Calculate the momentum and kinetic energy of the cart before and after an inelastic collision. In your calculations, be sure to explicitly state the equations you use and what values you will be substituting to calculate the final value.
  • Describe the energy transfers that occur as a cart inelastically collides with an object of equal mass at rest. This should be a narrative description of the energy transfers that occur as the cart inelastically collides with a cart of equal mass. In your descriptions, address the following:

Following the inelastic collision of the carts, the two carts fuse into an object with double the mass of the original cart. There is then a frictional section of the track to slow the cart to a stop over 20 meters. Describe the amount of work due to friction and frictional force exerted to stop both carts over 20 meters.

  • Calculate the work due to friction and frictional force. In your calculations, be sure to explicitly state the equations you use and what values you will be substituting to calculate the final value.
  • Describe the energy transfers that occur as the cart is brought to a stop. This should be a narrative description of the energy transfers—written to describe these concepts to a nontechnical audience—that occur as the cart is brought to a stop. In your descriptions, address the following:

What to Submit

To complete this project, you must submit the following:

Roller Coaster Design Report
Your design report should include a diagram describing the peaks and valleys in your roller coaster design. Your report should also include calculations and qualitative descriptions of the motions of the cart, and of the energy transfers that occur as the cart moves.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Competencies

In this project, you will demonstrate your mastery of the following competencies:

  • Inform business decisions using microeconomic models and theories
  • Determine the impact of economic costs on organizational and individual decision making
  • Explain how market structure impacts a business’s entry and exit into a market and its ability to generate economic profit

Scenario

You and your friend from college have just graduated. You majored in business, and your friend majored in a creative field. Your friend is highly inventive and has come up with an excellent idea for a new product. You both believe in this idea so much that you have agreed to become business partners. However, before you embark on your entrepreneurial adventure, you will have to explain some key microeconomics concepts to your partner that are important to make sound business decisions.

Your business partner is less than enthusiastic about this prospect and has never had an interest in what is often described as the dry and boring field of economics. Every time you have tried to engage your partner in practical discussions, they brush you off and decide to go play video games instead.

Aha! This gives you an idea: What if you could convince your friend to learn about economics through games? You have found several simulation games that demonstrate in real and interesting ways the economic principles that you know your partner needs.

Once you have played the games, you will create a memorandum report summarizing for your friend the educational value of your experiment. In your memorandum, you will restate the key principles and takeaways of each simulation, as well as illustrate how these ideas are relevant to your future entrepreneurial success.

Directions

First, assemble the materials that you will need to complete this assignment:

  1. You will need several simulation report images for your memorandum. All the necessary data visualizations will be generated after you have completed each simulation game. You will be required to save image files of your simulation reports for your simulation discussions. These should also be used to create your memorandum report for the course project. If you have any questions or concerns about the simulation data that should be used for your project, you should promptly reach out to your instructor.
  1. Review and use the Project Template located in the What to Submit section.

    You are expected to reference any source material used in your memorandum report with appropriate citations. To support you, a References page has been added to the project template with a citation for this course’s reading already provided. Any other references you add should be cited according to APA format.

Once you have assembled the required materials listed above, you can now begin drafting your memorandum report by completing the following steps:

  1. Comparative Advantage: Discuss the Comparative Advantage (With Trade) simulation that you played in Module Two. You should add the Production Decisions graph and the Production Trade graph (i.e., the graph showing how many hamburgers per fries) from you simulation report into the project template as Figures 1.1 and 1.2. Then, answer the following questions in the paragraphs below the figures:
    • How does this simulation demonstrate how individuals evaluate opportunity costs to make business decisions? Use the Production Decisions graph from the simulation as a reference to explain what role the production-possibility frontier (PPF) has in the decision-making process.
    • Explain how comparative advantage impacts a firm’s decision to engage in trade. Would a business’s decision to trade cause a change to its PPF? Provide specific reasoning to support your claims.
  1. Competitive Markets and Externalities: Discuss the Competitive Markets and Externalities simulations (both with and without policy interventions) that you played in Modules Three and Four. Add the Supply and Demand chart and the Outcomes by Market table from your simulation reports into the project template as Figures 2.1 and 2.2. Then, answer the following questions in the paragraphs below the figures:
    • What impact do policy interventions have on the supply and demand equilibrium for a product? Provide specific examples from the simulation to illustrate.
    • What are the determinants of price elasticity of demand? Identify at least three examples. Based on the outcome of the simulation, explain how price elasticity can impact pricing decisions and total revenue of the firm.
    • Based on the results of the simulation, can policy market interventions cause consumer or producer surplus? Explain why using specific reasoning.
  1. Production, Entry, and Exit: Discuss the Production, Entry, and Exit simulation that you played in Module Five. Add the Aggregate Outcomes chart from your simulation report into the project template as Figure 3.1. Then, answer the following questions in the paragraphs below the figure:
    • Analyze a business owner’s decision making regarding whether to enter a market. For example, what factors determined the driver’s market entry and exit in the simulation? Use economic models to support your analysis.
    • How does a business owner applying the concept of marginal costs decide how much to produce? For example, how did the driver determine how many hours to drive each day? Use economic models to explain.
    • How does the impact of fixed costs change production decisions in the short run and in the long run? Use the average-total-cost (ATC) model included in the module reading chapters to demonstrate this impact.
  1. Market Structures: Discuss the market structures simulations (Price Discrimination and Cournot) that you played in Modules Six and Seven. Then, do the following in the project template:
    • Complete Table 4.1 as a reference guide for your business partner. The table should compare the attributes of each of the four listed market structures.
    • Answer the following questions in the paragraphs below the table:
      • Explain what market inefficiencies derive from monopolies and monopolistic competition. Use examples from the textbook to support your claims.
      • How do firms in an oligopolistic market set their prices? Use specific examples from the simulations or from the textbook to support your claims.
      • Explain how firms that compete in the four different market structures determine profitability. Use specific examples from the simulations or the textbook to support your claims.
  1. Conclusions: Draw your overall conclusions about the relevance and significance of microeconomics. How will microeconomics principles impact your business decisions moving forward? Provide recommendations to your business partner for your future business venture.
  1. Finally, ensure that all of your sources are properly cited using in-line citations and references according to APA format.

What to Submit

To complete this project, you must submit the following:

Memorandum Report
Your memorandum report should summarize the key principles and takeaways of each microeconomics simulation for your business partner. It should also illustrate how these ideas are relevant to your future entrepreneurial success.

I added the pictures on the template uploaded.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

In the previous milestones, you have focused on certain aspects of provided case studies. For your final paper, you are asked to discuss client information, assessments, addiction information, and treatment found in the provided case study. Read Case Study 1 and then refer to the Case Study Final Project Guidelines and Rubric for a complete description of this paper.

Your paper should:

  • Be composed in MS Word and formatted in APA style
  • Be at least 5 pages in length, not including the title page and references page
  • Employ a minimum of three scholarly sources that directly support your main ideas
  • Identified Client: Robert, 66-year-old male, retired for the past 4 years. He is a husband, father, grandfather, and friend.
    Drug of Choice: Alcohol

    Initial contact: Harriet, Robert’s adult daughter, made the initial contact asking whether or not Family Intervention might be an option in trying to get her father some help for his drinking problem.

    Because this family lives in a large city on the West Coast, the initial interview was done over the phone.

  • Client History: “The drinking got worse after Robert retired, or maybe I started noticing it more.”
    Robert has been married to Colleen for 44 years. They raised 2 daughters, numerous pets, and have lived in the same house for the past 35 years. Some things have changed in their marriage such as they now sleep in separate bedrooms; mostly because of Robert’s drinking.
    Robert would begin drinking in the late mornings just as soon as he could get his chores and errands done.
    Robert and Colleen began to have less and less to talk about as time went by. Colleen didn’t want to talk to Robert when he had been drinking and it began to seem like he was always drinking. And Robert really didn’t have much to say to Colleen. She was always coming and going and when she did stick around it seemed as though she just had something negative to say about what he was doing or not doing, “have you been drinking?” He felt like all she did was nag.
    “The drinking got worse after Robert retired or maybe I started noticing it more” complained Colleen. Robert began to go to bed earlier and earlier. “Now that I look back at it, I think he went off to bed to be able to drink and not have me on his back.”
    Some health issues began to arise, complicated by years of drinking. Roberts’ doctor was having him get his blood tested every 3 months to monitor his diabetes and prostrate concerns. The doctor had long ago told Robert to stop drinking.
    Harriet (Robert’s daughter) stated that others were concerned about her dads drinking as well.
    (A more complete history, not included here, was gathered.)
  • Intervention Team members: During the course of the initial interview a list of possible intervention participants were discussed over the phone (this is often the case where family members live at a distance from each other). Harriet was asked to contact potential participants and ask them to give the Interventionist a call so they might discuss their concerns and also to see if they would be appropriate members of the intervention team.
    Those that called and became part of the team included; older sister Marsha, older brother Franz (living and calling from Sweden), younger brother Bill, wife Colleen, oldest daughter Harriet, younger daughter Liz, nephew Mark, long-time co-worker/friend Arthur and friend Terry. Interviews were conducted and homework assignments given – to write a letter to Robert about their concerns and feelings.
  • Treatment Program: A residential treatment program was contacted by Harriet. Arrangements were made for admission should Robert agree to go to rehab.
    Schedules were arranged and dates set for the upcoming role-play followed the next day by the Intervention.
  • The Role-Play: The day of the role-play arrived. The team members met at older sister Marsha’s house in the same city in which Robert and Colleen lived. We arrived at Marsha’s at 1:30pm . Over the next four hours we heard from everyone. There was a wide range of emotion and a lot of anxiety about whether or not this would actually work.
    Many agreed that Robert was most likely depressed. Some voiced concerns that there were certainly more issues than just the alcohol to be dealt with. “Maybe if his marriage was better he wouldn’t drink so much.” Some were very worried that Robert might get up and walk out.
    “Have you ever had someone just walk out?” someone asked. “Rarely” I responded. “But what do we do if he does?” they asked. “What if he tells us all to get the heck out of his house?”
  • The team talked about the anxiety and solutions were discussed.
  • People read their letters aloud. Some cried. One person was very angry with Robert. We talked and processed through the feelings and arrived at a shared group conclusion that Robert was killing himself by continuing his drinking behavior.
    After years of having to be vigilant for her children’s safety, Harriet stated in her letter that if Robert was unwilling to accept the help being offered through this Intervention and go to the treatment program that she would no longer allow her father to be around his grandchildren. Some team members had strong reactions about her feelings and decision.
    By the time the role-play was complete we had heard all the letters, team members had received feedback from others about how their letters sounded, and some received editing suggestions. We decided the order of who would go first to last.
    Everyone made the decision to be firm with a willingness to hold the line with Love, Concern, and Respect: to encourage Robert to say yes and go directly to the treatment program.
    We addressed all the logistical questions again, making a plan for how Robert would physically get to the treatment program and who would go with him. By the end of the role-play all team members agreed that we had done our best.
    We were providing a plan that could succeed. We were collectively offering Robert the opportunity and method to get his life back.
    We agreed on a time early the following morning to meet at Robert’s home and have the Intervention.
  • The Intervention: No one had mentioned to Robert that an Intervention was in the works. We met just down the street from Robert and Colleen’s home at 8:30 am . When we were assembled we walked to the house. We knocked and with Harriet in the lead we went directly in and got seated in the living room. Robert was in the back of the house. By the time he made his way to the living we were all in position.
    He looked at us, looked at his wife, and his daughters. I introduce myself.
    “Hello Robert, my name is Jerry Wittman and I’m a counselor. I’ve been consulted by your family and friends to help facilitate a family meeting. Everyone has some things to talk with you about, please hear them out. We are going to start with your friend, Arthur.”
    One at a time, each read their letters. Tears were shed. Robert cried as well. When the letters were complete, I briefly summarized the intention of the meeting and discussed where and what the treatment program was and that what was being asked of him today was to agree to go to treatment and begin the process of recovery. He said yes. All congratulated him, gave hugs and prepared for departure to the program.
    Within 45 minutes of completing the Intervention, Robert was on his way to Treatment.
  • Post-Intervention: After Robert had left the house the remaining team members and I sat down and processed through the feelings and thoughts people were experiencing. Team members had previously been given information about self-help (Alanon meetings) and therapist names in their community to follow up with as needed. Immediately family members were encouraged to attend the program’s Family Program. We all agreed to do a check-in via phone in three days.Since then, I have talked with all the participants. Every single one expressed their gratitude for being part of this process. They’ve said that this has been a very powerful and important event in their lives. Colleen (his wife) and I have talked several times. She says that this has been the hardest and most important thing she has ever done in her life. She followed the recommendations and is attending family week at the program.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

The final project for this course is the creation of a strategic marketing proposal.

Developing and implementing a healthcare marketing proposal requires deep alignment with organizational values, systematic inquiry, and applied, strategic thinking. By engaging the steps of the marketing process, you will gain skills and perspectives applicable to a range of healthcare management careers.

In this project, you will apply what you have learned about healthcare marketing to a real-world organization of your choice. Specifically, you will identify a product or service for which you will develop a strategic marketing proposal. In your proposal, you must explain the importance of marketing principles as they uniquely apply to your chosen healthcare organization. Additionally, you will engage in the marketing process by establishing objectives, analyzing the market environment, and developing a promotions mix for effectively marketing your product or service.

The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Three and Five. The final submission is due in Module Seven.

In this assignment, you will demonstrate your mastery of the following course outcomes:

  • Explain the importance of fundamental marketing principles and processes as they uniquely apply to healthcare organizations
  • Determine relevant marketing objectives and target audiences that support the mission, vision, and values of healthcare organizations
  • Analyze healthcare markets to identify sociocultural characteristics, customer needs, and economic factors that influence demand for health services
  • Develop strategic marketing proposals by applying the marketing mix to support the mission and brand identity of healthcare organizationsPrompt Your strategic marketing proposal should address the following critical elements:

I. Introduction

  1. Provide a detailed profile of your selected organization. What type of organization is it? What is its mission and vision, its service area andlocations, and its major products and services?
  2. Describe your marketing initiative in terms of the specific product or service you have selected. Why is it important to the organization? Whatare the current issues with the product or service? Why is a marketing initiative needed?
  3. Explain the relevance of knowing your customers’ needs for marketing your healthcare product or service. Illustrate your response with specificexamples of your primary and secondary customers, as well as their needs, wants, and preferences.

page2image3102136176

  1. Clarify the importance of the “four P’s” of marketing as they apply to your healthcare product or service. Illustrate your response with specific examples of how each is or is not relevant.
  2. Characterize the relevance of drivers of demand for marketing your healthcare product or service. Illustrate your response with specific examples of factors that drive demand for your product or service.
  1. Establish the Context
    1. Determine the marketing goals of your initiative. You should develop at least three specific objectives that apply best practices and align to theorganizational mission and vision.
    2. Analyze the industry segment for your healthcare product or service. Include all relevant details related to population segment anddemographics, market size, psychographic or health status segmentation, regulatory influences, payer mix, and key success factors.
    3. Identify and describe your target markets. Be sure to include all relevant details related to their demographics, characteristics, preferences, andconsumer behaviors. In any area where you are lacking critical information, explain the type of data that you would collect to fully understand your target markets.
  2. Market Analysis
    1. Conduct a SWOT analysis for your selected healthcare product or service. Be sure to thoroughly analyze the strengths, weaknesses,opportunities, and threats by including at least three items in each category.
    2. Assess your organization’s competitors using specific supporting examples. You should address at least two competitors, and discuss at leastthree strengths and weaknesses for each.
    3. Based on your SWOT and competitor assessment, draw informed conclusions about your organization’s current market position and justify yourclaims with specific supporting examples.
  3. Marketing Strategies
    1. Develop a promotions strategy that effectively applies the media mix. Which traditional marketing techniques (e.g., public relations, advertising,sales and sales promotion, direct marketing) do you recommend and why? Defend each of your proposals using specific evidence and principlesdiscussed in the course.
    2. Analyze the resource requirements. What are the types of resources you would need for your proposed strategies? What are the categories ofdirect and indirect expenses to consider?
    3. Propose specific metrics for evaluating the success of your marketing proposals. How would you measure success? What sources of data wouldyou monitor and how would that data be interpreted?
  4. Conclusions: In closing, defend your overall strategy proposal by illustrating the specific ways in which your recommendations would support the mission, vision, and values of your healthcare organization.

page3image3098289552

Milestones

Milestone One: Draft of Introduction
In Module Three, you will submit a draft of your introduction. Your introduction will include a profile of the organization, a description of the specific product or service including the marketing opportunity, the needs of the target market, the promotions mix, and an explanation of the drivers of demand. Use the feedback you received on the Module One journal and the Module Two short paper to assist you in developing your introduction. This milestone is graded with the Milestone One Rubric.

Milestone Two: Draft of Context and Market Analysis
In Module Five, you will submit a draft of your context and market analysis. Establish the context for your healthcare product or service, and analyze the market. To establish the context, you will describe the industry segment, describe your target markets, and specify the marketing goals and objectives. In analyzing the market, you will conduct a SWOT analysis, assess the competitors in the market, and determine the current market position. This milestone is graded with the Milestone Two Rubric.

Final Submission: Strategic Marketing Proposal
In Module Seven, you will submit your strategic marketing proposal. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This final submission will be graded using the Final Project Rubric.

Final Project Rubric
Guidelines for Submission: Your proposal should be 8–10 pages using 12-point Times New Roman font and double-spacing. Any citations should be in APA

format.

Learning Objectives

By the end of this module, you will meet these learning objectives:

  • Explain the importance of fundamental marketing principles and processes as they uniquely apply to healthcare organizations
  • Determine relevant marketing objectives and target audiences that support the mission, vision, and values of healthcare organizations
  • Analyze healthcare markets to identify sociocultural characteristics, customer needs, and economic factors that influence demand for health services
  • Develop strategic marketing proposals by applying the marketing mix to support the mission and brand identity of healthcare organizations

Module at a Glance

This is the recommended plan for completing the reading assignments and activities within the module. Additional information can be found in the module Reading and Resources section and in the task list.

  1. Review associated required resources.
  2. Complete the final project.
  3. https://www.jnj.com

Reading and Resources

Required Resources

Sample Marketing Plan
This sample project may be useful as you finalize your strategic marketing proposal. In addition to illustrating effective methods for organizing and presenting your final proposal, this example may be helpful in reinforcing appropriate application of the steps in the marketing process to a specific healthcare product/service.

8 Things to Include in Every Healthcare Marketing Plan
While the language in this blog differs slightly from the terminology used in this course, you will recognize the key ideas. This article can serve as a reminder of the purpose and key content for several sections of your strategic marketing proposal.

7 Essential Metrics Healthcare Marketers Need to Focus On
Read this article to learn about evaluating the effectiveness of your marketing plan.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Touchstone: Success Narrative

ASSIGNMENT: For this touchstone, you will be writing a success narrative consisting of three components. Specifically, you will write about the following:

  1. Who I Am Now: Create a brief biographical statement describing your academic and professional history, as well as any relevant personal characteristics you’d like to share.
  2. My Goals: Identify three (3) professional and/or academic long-term goals for your future.
  3. How I Will Get There: Based on the professional or academic goals you created, identify at least two (2) short-term steps for each of these goals, and set target dates for each of these short-term steps. Make sure that in your plan to achieve these goals, you account for obstacles that may present themselves along the way.

Sample Touchstone

A. Assignment Guidelines

DIRECTIONS: Refer to the list below throughout the writing process. Do not submit your Touchstone until it meets these guidelines.

1. Who I Am Now

? Have you provided a brief biographical statement explaining your educational and career experiences thus far?? Have you shared any personal characteristics (e.g., determination, flexibility) that you feel are relevant to your narrative?

2. My Goals

? Have you provided three long-term goals you wish to accomplish?? Have you connected those goals to either your academic or professional aspirations?

3. How I Will Get There

? Have you identified and explained at least two short-term steps for achieving each of your three goals?? Have you set target dates for each of these steps?? Have you addressed any obstacles you might face in pursuit of these goals?

B. Rubric

Meets Expectations (80-100%)Partially Meets Expectations (50-79%)Does Not Meet Expectations (0-49%)

Who I Am Now

Write a paragraph describing your academic and professional history, and related personal characteristics.Includes a detailed description of academic and professional history in a single paragraph; includes personal characteristics to support the description.Provides an incomplete description of academic and professional history (i.e., either academic or professional history is not described); does not include any personal characteristics.Does not includes neither an academic nor a professional biographical statement; does not include any personal characteristics.

My Goals

Write a paragraph stating three professional and/or academic long-term goals, and provide a brief description of each goal.

Identifies three professional and/or academic long-term goals; provides brief description of each.Identifies one or two professional and/or academic long-term goals; does not provide a description of the goals.Does not identify any professional and/or academic long-term goals.

How I Will Get There

Write a paragraph describing two or more short-term actions that you can take to achieve each goal described above.

Provides a detailed explanation of at least two short-term actions that be taken to achieve each goal.Provides a detailed explanation of one short-term action that can be taken to achieve each goal.Does not explain any short-term actions that can be taken to achieve the goals.

Overall Reflection

Incorporate thoughtful personal reflection to connect the goals and actions described in the composition.

Demonstrates a clear connection between the goals and the actions that will help achieve them. The composition is at least 500 words.Provides goals and actions, but does not establish a clear connection between them, or does not establish a timeline for the plan to achieve the goals. The composition is 100-200 words too short.Does not demonstrate a meaningful connection between the goals and proposed actions and no timeline to achieve the goals has been provided. The composition is more than 200 words too short.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

In this discussion, debrief your Competitive Round 1. What did you learn from your decisions and rationale for the solutions you implemented in Round 1? What do your reports tell? In particular, focus your responses using the following sections from the Foundation FastTrack: low-tech segment, high-tech segment, and perceptual map.

3-1 Discussion: Debrief Round 1

Jennifer Blevins posted Sep 15, 2021 9:10 AM 

As doing the round 1, I am still confused and trying to figure things out. I still feel like I am on shaky grounds when I try and look for all the reports and information. I am slowly understanding how to do the rounds and make changes. I have not made much changes but a few. I wanted to make sure that I can still make a profit and not lose to much money while doing it. I closed the stock at 10$ a share and the others closed between 13-15$. I am still learning how to read the reports and figure out how to make some more changes. The units I sold were only 375 units and 31% segment. The information for me was comparing to others as well and it was mostly the same. I am looking forward to learning new information as I continue with each round.

I am still new with all this and I may have lost money but I will make changes so that way I can get it back over time. I am learning new ways to make small changes to help gain more confidence and to help earn more profits. 

2nd classmate response needed

3-1 Discussion: Debrief Round 1

Kevin Davis posted Sep 16, 2021 8:01 AM 

Good morning all,

Takeaways from round 1 for me start with being torn from staying conservative or investing aggressively and hope my marketing and product development make me rich!  I reduced the size and added a bit of performance to Able while introducing a new product to best align and stick with my broad differentiator strategy.  I chose not to sell off any stocks, but did incur some long term debt.  At the end of the day my net profit was $3,194 and earnings before interest and tax landed at $5655.

One view I like is the balanced scorecard, and one I try to use at my current employer as well.  What I don’t like is my scores!  For Financial I am 8.4/25 with my biggest hits being profit and leverage.  I have to figure this out, unless it’s just a first round norm and it will stabilize/increase as my strategy gains traction.  That’s the tough part here I think, figuring out if it’s patience or you’re doing something wrong.  My contribution margin and days of working capital are really low, so a place to focus for round 2 for sure and then on the customer side it looks like I totally missed the mark on customer accessibility.  The other area that is a complete fail for me is employee productivity.  I believe this is me understanding the levers to pull and navigation of the CAPSIM dashboard.  I’ll research, implement my next strategy and come back strong in round 2.  

In FastTrack from a market share perspective I am doing pretty well in actual and potential and it appears I am leading a couple of those areas, so that seems promising.  I do believe that I am positioned appropriately on the perpetual map, but time will tell if I am accurate there or not.  For some reason I am missing the mark on the actual vs potential market share which leads me to believe I am off with marketing or pricing.  I’ll dig back into that.  I have a few ideas for round 2 from a business strategy stance and I have some work to do on researching the levers and CAPSIM feel overall.  I’m about 80% there, but for this next round I believe it is critical I figure it out and make the rubber hit the road.  Good luck all!

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

With seemingly never-ending violence, natural disasters, and soldiers returning home from wars growing numbers of people are suffering long lasting mental health crises. It is imperative for clinical social workers to implement effective interventions that address trauma and loss within families.

For this Discussion, view the “Levy” video. https://drive.google.com/file/d/1uh62KiMMLaSuNE8FrdLlcJ70OSex_dg6/view?usp=drivesdk

By Day 3

Post a description of the how the trauma related behaviors evident in the Levy video affect family interactions and the family system. Identify the problems in this case and explain whether these problems would best be addressed through individual treatment, family treatment, or a combination of both. Review the literature and recommend an evidence-based family intervention that might help Jake and Sheri and their sons. Describe how the intervention is implemented and its underlying theory. Explain how this intervention might help the Levy family and ameliorate the presenting problems. Finally, describe why you chose this intervention. Use this week’s resources or the literature to support your conclusions.

By Day 5

Respond to a colleague’s intervention choice that differs from yours. Contrast the underlying theories of the two interventions. Explain whether you agree or disagree with your colleague’s identification of the problem and recommendation to address the problem through individual and/or family treatment.

Colleague: Stacey

Post a description of the how the trauma related behaviors evident in the Levy video affect family interactions and the family system.

Jake is displaying trauma-related symptoms due to his experiences in Iraq. Jake’s trauma manifests in anger, outburst, frustration, and verbal altercations with his wife(Laureate Educaion,2013).. Jake is currently self-medicating to cope with his undiagnosed post-traumatic stress disorder (PTSD). Jake’s drinking has begun to cause his family distress by his anger outburst, inability to follow through with his obligations at work, and aggressive communication style. Jake’s drinking is starting to conflict with his family dynamics. For instance, how Jake was communicating with his wife resembles a chaotic relationship characterized by erratic and limited leadership (Olson, 2002). Jake’s behavior also affects family cohesion by creating an unhealthy and unbalance distance between the couple (Olson, 2002).

Identify the problems in this case and explain whether these problems would best be addressed through individual treatment, family treatment, or a combination of both.

There are a multitude of problems presented in this video. First, Jake stated that he is no longer the man he used to be before Iraq. Second, Jake’s behavior is causing conflict and distress with his family. As a social worker, I would address Jake’s presenting problem through a combination of individual and family treatment. Individual sessions will assist Jake in processing his feelings, emotions, and experiences. Family sessions will allow Jake to disclose his experiences to his family while the social worker helps guild the family through the healing process.

Review the literature and recommend an evidence-based family intervention that might help Jake and Sheri and their sons. Describe how the intervention is implemented and its underlying theory.

For the Levy family, I would recommend Trauma Focus- Cognitive Behavioral Therapy (TF-CBT) as the intervention for the family. TF-CBT is effective for veterans’ families given their risk for heightened mental health problems, stress, child maltreatment, and intimidate partner violence (Ridings et al., 2019). As a social worker, I would implement TF-CBT through psychoeducation, trauma narratives, pro-social coping skills, and ensuring the family’s safety (Ridings et al., 2019). The underlying theory of TF-CBT is to reduce parental depression and PTSD symptoms, emotional distress, strengthened parents’ ability to support their children, and decrease children’s feelings of shame (Ridings et al., 2019).

Explain how this intervention might help the Levy family and ameliorate the presenting problems.

TF-CBT will assist the Levy family in overcoming their presenting problems because Jake will have the opportunity to process his trauma through a narrative discussion. Through psychoeducation, Sheri and her sons would be able to gain an understanding of (PTSD) and Jake’s experiences while in Iraq. TF-CBT use of pro-social coping skills will address Jake’s self-defeating behaviors such as drinking and Sheri’s emotional distress. Finally, TF-CBT will help the children process their feelings and emotions.

Finally, describe why you chose this intervention.

I selected this intervention primarily due to its focus on helping families overcome their trauma.

Reference

Ridings, L. E., Moreland, A. D., & Petty, K. H. (2019). Implementing Trauma-Focused CBT for Children of Veterans in the VA: Providing Comprehensive Services to Veterans and Their Families. American Psychological Association, 16(1), 74-84.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

https://waldenu.kanopy.com/video/emotionally-focused-couples-therapy

By Day 4

Post a brief explanation of one challenge you may encounter if you attempted to integrate the theory you selected with your lens of couple counseling in your future professional practice. Then, explain how you might mitigate this challenge.

Be sure to support your postings and responses with specific references to the resources.

Read a selection of your colleagues’ postings.

By Day 6

Respond to two of your colleagues’ postings and provide an additional strategy to help mitigate the challenges identified by your colleague.

Select and respond to a colleague who selected a different theory and title your posting as follows: “Integrating [X] theory into [Y] theory” 

Colleague 1:Jessica 

The theory that I selected for this week’s assignment was Experiential Therapy. In experiential Therapy the therapists focuses on what the family is experiencing and how the behaviors are impacted by those experiences.  Psychotherapy.net. (Producer). (n.d.).

Experiential psychotherapy focuses on the role of experiencing or in the change process. Experiential therapists are concerned with clients’ being aware of their own experiences to make meaning and help them understand their worlds and to develop more satisfying ways of being with themselves and others. However, experiential practitioners are more focused on guiding in their approach (Watson et al., 2011). 

one challenge you may encounter if you attempted to integrate the theory you selected with your lens of couple counseling in your future professional practice 

One challenge that may come up when using the experiential therapy is someone that is in denial about their behavior and how it impacts the family. 

Then, explain how you might mitigate this challenge. 

The way that I would handle this type of behavior is to have everyone in family identify negative experiences or patterns of their family members, so that one person doesn’t feel left out in the session. 

Colleague 2:Adriana Owens 

I selected emotional focused theory as a theory I plan to utilize in my future professional practice.  There are several challenges in the EFT. While using this theory, I may encounter some clients/patients who are hesitant to reveal their emotions; some may be standoffish. However, the one challenge I feel I may encounter is someone not being receptive to change. According to Gurman et al. (2015), it “looks at distress in relationships through the lens of attachment insecurity.” However, the positive to using emotional focused theory coincides with CBT skills when needed. If someone has specific phobias or anxiety disorders, those are emotions, and utilizing CBT will help assess those feelings. 

While working with this theory, adults have inherited their correct ways, so that rechanneling emotions would be challenging. The positive for me, I am great when it comes to rapport building. Within this theory, rapport building is highly encouraged.

Mitigating the Challenge

Incorporating interventions with our clients after the first session may be beneficial. As social workers, we do have several documents so, being aware does not overwhelm our clients. Session one could consist of reviewing the agency’s policy, gathering their expectations, and informing them of their expectations, which leads to the room to get a feel of the client, rapport building. Also, keep in mind, every client is different, so having more than one way to interact with clients is highly important. 

https://waldenu.kanopy.com/product/emotionally-focused-couples-therapy-sue-jo

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

For this discussion, you will first read the Forbes article, Amazon: The Most Convenient Store on the Planet by Shep Hyken (2018). This article addresses end user experiences in the age of what the author calls The Convenience Revolution. The idea of convenience has transformed dramatically over the past decade. Whether it be a carton of milk, a new sweater, or the latest digital gadget, a simple click of a button can deliver just about anything to your doorstep. As Hyken points out, customer experience and end user requirements have been elevated to not even a new standard, but a new expectation. User expectations involve quality, efficiency, and ease of use. This technological revolution of consumer practice has changed the nature of how organizations and systems operate.

For this discussion, address the following for your initial post:

How are forward-thinking businesses gaining an edge on their competitors?

Where do you see the point at which too much convenience will inevitably be detrimental to the end user’s experience?

In your responses to your peers, address the point at which too much convenience is detrimental. Do you agree or disagree with their opinions? Explain why.  https://www.forbes.com/sites/shephyken/2018/07/22/…

Peer 1:

Hey Class,

Forward thinking businesses are able to gain a competitive edge on competitors by being first in the race to provide a better quality good or service to consumers. The phrase “If your not first, your last” applies here indefinitely. Businesses who often end up stalling or failing, fail to see how changing to the times can be an effective business strategy. What is working now will work in the future right? We can look at Sears and Kodak as an example. Sears failed to follow the trend to an online store and Kodak tried sticking to their gun on film being a niche field in a digital age. Both companies failed to change their business strategies and ended up paying the price.

Too much convenience for an end user can get annoying. There is a chance a system is so dumbed down it can prevent the user from actually learning about the software or website. This can result in companies not being able to show everything they have to offer but what their target audience is looking for specifically. Amazon could have fallen into this trap by just allowing people to buy the same old stuff they always buy, looking at you home goods purchasing system. Amazon does a great job at keeping a broad list of items semi-related posted in channels and emails sent to their consumers to prevent this from happening.

Peer 2:

Hello class!

Forward-thinking businesses seem to face a bit of a double-edged sword. On one hand, if you push forward and try to develop a technology or UI that hasn’t been really done before (eBay for example), your company could become THE company for that use-case. On the other side, if you push forward in a wrong way or direction, like the the HD DVD’s, that fails and ultimately can severely harm the business. Its a gamble that businesses have to face. If they decide not to try to innovate or think ahead though, they can be giving up their position to their competitors. Gaining that customer base by being at the bleeding edge can solidify their positions in the industry.

Like anything though, too much of a good thing is a real possibility. For the more security conscious user, there are several times where that convenience has already crossed their comfortability threshold. Often times, companies and websites will try to learn about their users in order to market their products better to them, but many users may not be comfortable with a company having that much information on them. This could be a point where the convenience of targeted marketing and user experience is crossing the users comfortability threshold on what information the company has on them.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I’m working on a business writing question and need support to help me study.

Overview

Risk and return go hand in hand. Understanding this relationship is critical to making well-reasoned financial decisions, whether you are making personal investment decisions or working for a business where you’re responsible for investing excess cash. This journal assignment allows you to explore the risk-return relationship in the context of investing in stocks in both of these roles.

Prompt

Write a journal discussing risk and return as it relates to investing in stocks.

Specifically, you must address the following rubric criteria:

  • Investment Risk: Explain key risks associated with investing in stocks.
  • Investment Return: Discuss events that can cause the price of a stock to increase or decrease.
  • Risk-Return Relationship: Explain the relationship between risk and return and how this relationship impacts stock investment decisions, using examples to support your claims.
  • Reflection: Describe whether you make stock-investment decisions in your personal life and how you do or would make those decisions.
    • Consider the following in your response: Would your decision-making process change if you needed to make stock-investment decisions for a business? Why or why not?

Guidelines for Submission

Your submission must be a 4- to 5-paragraph Word document with 12-point Times New Roman font, double spacing, and one-inch margins. Sources should be cited according to APA style.

This is what my Professor said this week.

Journal

In addition to the very interesting discussion, you have your second journal, on the topic of risk and return on investing. For reference, here is  a link to the requirements and rubrics:

Module Six Journal Guidelines and Rubric – FIN-320-T5843 Principles of Finance 21EW5 (snhu.edu)

As always, it is very important to go through the resources section of module 5, as that section is a trove of useful information that will help you with your work this week.

Best of luck, and please do not hesitate to ask when needed.

Best regards,

Samer.

Project Two Business Options List 

Choose one of the following businesses to use in Project Two. You will also use this business in the Module Two Journal and the Project Two Milestone.   Need to choose from one of these or I have been using Tesla in my Project

Business Options

• Johnson & Johnson (JNJ)

• Disney (DIS) 

  • Facebook (FB)
  • Kellogg (K)
  • Tesla (TSLA)
  • Microsoft (MSFT)
  • American Express (AXP)

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Be sure to identify which commercial you chose in your post. In responding to your peers, discuss any common marketing strategies you identified among the three commercials, and comment on any insights you learned from reading your classmates’ posts.

Post #1

I chose the “Thank You, Mom” ad from P&G. I am not really sure this particular ad targeted one audience per se. It seems to me that this ad was aimed at just about everyone with a clear message that it is not just these athletes that sacrifice and put in the hard work. Their familes are a huge part of why they participate in these games and their families are a driving force behind them. It is a message to anyone and everyone that wants to one day participate in the Olympics or any other sports for that matter.

This particular ad did not use a celebrity endorsement which I think actually makes it much more effective. The olympics are all about “amateur” athletes and not seeing a famous face I think tugs at the heart strings a little bit more in terms of what some families go through in order for the kids to be able to compete at that level.

I am not sure this was effective for the advertiser as a whole. This seems more like just an investment with a message they wanted to say thank you and somewhat put there name behind that message rather than advertise outright. If they wanted to just straight advertise, they probably would have put their brands more front and center rather than a quick flash at the end of the commercial.

Kenny

Post #2

The commercial I choose for this post was OMEGA- Recording Olympic Dreams Since 1932

What segment of the Olympic audience was the advertiser trying to reach?

To understand what segment of the Olympic audience the advertiser was trying to reach, we must understand what the message behind the commercial is. Throughout the commercial you hear the phrase “you can” over and over and eventually you hear the phrase “do it” on repeat. In my opinion this commercial is serving as motivation and inspiration. The advertiser is using motivation and inspiration to reach aspiring athletes, trainers, and coaches which I believe is the segment of the Olympic audience the advertiser was trying to reach.

Did the ad you chose use an athlete endorsement? If it included an endorsement, do you think the ad would have been as effective without it? If it did not include an endorsement, would including one have made the ad more or less effective? Explain your reasoning.

This commercial did use an athlete endorsement. Although the athletes in this commercial did not directly show, use, or recommend the product, they did allow their image to be used conjointly with the product and according to the book Fundamentals of Sport Marketing this is called a co-present mode endorsement. I do not think this ad would be effective without the athlete endorsements. Reason one being the song in this commercial is great and only reaches its full effect in the aspect of relating it to sports. Reason two being the message behind the commercial which was, motivation and inspiration to aspiring athletes without the use of athlete endorsements in this commercial I think that message would not have been portrayed to the intended targeted audience. Lastly, without athlete endorsements in this commercial the music choice would not have fit, and the commercial would not have made a lot of sense.

Do you think the commercial was an effective promotion for the advertiser? Why or why not?

I do think this commercial was an effective promotion for the advertiser because they incorporated a great music choice, athlete endorsements, and the product was shown frequently throughout the commercial. As a viewer I never lost track of the product throughout the commercial. I think they choose to use Olympic athletes because the Olympics is the pinnacle of athletics and they want there brand to be the pinnacle of watches and that connection also made this commercial effective. If you look at the comments under the video of the commercial you will quickly see that this commercial was effective. You will see comments like, “I could not stop watching this”, “so inspirational”, and “I love OMEGA”.

Zach

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Scenario

You are a successful small business owner and have been asked by the local chapter of the Junior Entrepreneurs Association, a club for high school students interested in business careers, to make a presentation. The title of the presentation is “The U.S. Legal System and Business.” You have been provided with a detailed topic outline for your presentation and have been asked to touch on every topic it contains. You have also been asked to develop your presentation in the context of business and business law.

Directions

The resources provided in the course will support your work; no additional research is required. Create a PowerPoint presentation that specifically covers the detailed topic outline as follows:

  1. Introduction: Provide an introduction to the law and its purposes, including why there is a need for business law.
  2. Foundation: Briefly explain the foundation of the legal system in the United States, including the branches of the U.S. government and their relationship to each other.
  3. Sources
    1. Describe three of the primary sources of U.S. law and provide one example of each primary source of law that is related to the business environment.
    2. Name and briefly summarize the clause of the U.S. Constitution that grants the government the power to regulate business. Provide an example of government regulation of business.
  4. Courts: Differentiate between federal and state courts, including an example of the type of business case that could be heard in each court.
  5. Differences: Explain the difference between criminal law, civil law, and alternative dispute resolution.
  6. Conclusions: Describe why every business owner and leader must have a basic understanding of the U.S. legal system.

What to Submit

To complete this project, you must submit a PowerPoint presentation that includes:

  • At least 8 and no more than 16 slides that contain images and/or text.
    • Each slide should be accompanied by at least 1 and no more than 4 paragraphs of notes (presentation talking points) or recorded narration that is 1 to 3 minutes in length.
  • An APA formatted References slide.
    • Sources should be cited according to APA style.

Supporting Materials

The following resource supports your work on the project:

Tutorials: PowerPoint Office 365 (2019)
These tutorials provide a basic introduction to using PowerPoint, which you may find helpful if you are unfamiliar with the software application.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

A common skill for a cybersecurity analyst is the evaluation of current scholarly articles. Analyzing the findings within those articles develops skills that will help

protect data. Evaluating privacy laws and regulations helps the analyst form baselines for policies within organizations. Choose one of the following articles to

After reading your selected article, address the following critical elements:

I. Analyze the issues within the article related to privacy.

II. Describe the regulations or laws within the article that play a role in the protection of privacy.

III. Explain your opinions on the conclusion of the article. Consider these questions:

                                   – Is the conclusion comprehensive?

                                    – Do you agree with the conclusion?

                                    – Are there areas that could be improved upon?

Privacy, Notice, and Design

particular, the design of built online environments can constrain our ability to understand
and  respond to websites' data use practices or it can enhance agency by giving us control
over  information. This Article is the first comprehensive theoretical and empirical
approach to the design of privacy policies.
     Privacy policies today do not convey information in a way understandable to most
internet users. This is because they are created without the needs of real people in mind.
They  are written by lawyers and for lawyers, and they ignore the way most of us make
disclosure decisions online. They  also ignore the effects of design, aesthetics, and
presentation on our decision-making. This Article argues that in addition to focusing on
content, privacy regulators must also consider the ways that privacy policy design-the
artistic and structural choices that frame and present a company 's privacy terms to the
public-can  manipulate  or coerce users into making  risky privacy choices.

? The Surveillance Gap: The Harms of Extreme Privacy and Data Marginalization

 We live in an age of unprecedented surveillance, enhanced by modem
technology, prompting some to suggest that privacy is dead. Previous scholarship
suggests that no subset of the population feels this phenomenon more than
marginalized communities. Those who rely on public benefits, for example, must
turn over personal information and submit to government surveillance far more
routinely than wealthier citizens who enjoy greater opportunity to protect their
privacy and the ready funds to secure it. This article illuminates the other end of
the spectrum, arguing that many individuals who may value government and
nonprofit services and legal protections fail to enjoy these benefits because they
reside in a "surveillance gap." These people include undocumented immigrants,
day   laborers, homeless persons, and     people   with  felony   conviction
histories suffering collateral consequences of their convictions. Members of these
groups often remain outside of the mainstream data flows and institutional
attachments necessary to flourish in American society. The harms that
surveillance gap residents experience can be severe, such as physical and mental
health injuries and lack of economic stability, as well as data marginalization and
resulting invisibility to policymakers. In short, having too much privacy can be as
injurious as having too little.
    The sources of the surveillance gap range from attempts to contain and control
marginalized groups to data silos to economic exploitation. This article explores
the boundaries of the surveillance gap, evaluates how this emerging concept fits
within existing privacy paradigms and theoretical frameworks, and suggests
possible solutions to enhance the autonomy and dignity of marginalized people
within the surveillance gap.

? Privacy and Cybersecurity Lessons at the Intersection of the Internet of Things and Police Body-Worn Cameras

Prepared for the North Carolina Law Review symposium on
   police body-worn cameras ("BWCs"), this Article shows that
   BWCs can be conceptualized as an example of the Internet of
   Things ("Io T"). By combining the previously separate literatures
   on BWCs and loT, this Article shows how insights from each
   literature apply to the other.

   Part I adopts the loT definition of (1) a sensor connected to the
   Internet that (2) stores and/or processes data remotely, typically
   in the cloud. Applied to BWCs, the camera is a sensor, and the
   video footage and related data are stored outside of the original
   camera, often in the cloud.

   Building on this equivalence of BWCs and loT, Part II examines
   lessons from the substantial IoT literature for BWC privacy and
   cybersecurity. Part I systematically examines leading industry
   standards and Federal Trade Commission guidance that could be
   used to develop applicable criteria for good practice for BWCs.
   Analysis   of  this  literature suggests  three  themes   for
   operationalizing these best practices. First, police departments
   can and should learn from the Io T literature to improve privacy
   and cybersecurity for BWCs. Second, police departments should
   use their bargaining power to demand security and privacy best
 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Kendra Henry posted Oct 11, 2021 6:53 PM

Hello everyone!

My name is Kendra, I am currently pursuing in Finance. This is my first semester as student at SNHU. I currently work in the banking industry and have experience in banking for about 7 years. I worked in the banking retail but not work as an Operations Analyst. I just started the position and looking forward to a new journey, enhancing my knowledge and experience in the upcoming years. I hope to learn about organizational strategy and how it affects the company both internally and externally. I developed a personal growth plan for myself when I was working in retail banking. My first year I was a teller, teller supervisor, became a banker, and then co-manager. I decided to take the opportunity to advance in my career and become an analyst, which is where I am currently. My personal measures of success were to create my own standards and that was important because I wanted to make sure that I am defining that and no one else was for me. Another personal measure was to have resilience. At times there would be challenges, mistakes will happen, and roadblocks but it was important for me is to learn from it and persevere.

In response to your peers, address the following:

Compare your views on personal and professional success. How do they differ?

Share your opinion about the organization identified in the post and its success. Do you agree that this organization is successful? Why or why not?

Share your thoughts about the importance of the non-financial success parameters identified in the post. Write a post of 1 to 2 paragraphs.

Consider content from other parts of the course where appropriate. Use proper citation methods for your discipline when referencing scholarly or popular sources.

Demonstrate more depth and thought than saying things like “I agree” or “You are wrong.” Guidance is provided for you in the discussion prompt.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

The healthcare system has not only undergone drastic changes in past decades but also continues to evolve. What are the factors that are driving the changes? How is healthcare delivered differently from in the past? How are the changes impacting stakeholders? All of these are important questions to ask in order to achieve continuous improvement in the healthcare system.

This assignment will help you explore the history of the healthcare system in the United States and analyze the importance of history in reforming the policies and laws for improvement. You will analyze the influence of stakeholders on the formation and reformation of policies and laws. Also, you will describe how the needs and interests of stakeholders and interest groups influence the decision-making process. This assignment will help you understand how the healthcare system has evolved in the United States and the role of stakeholders in this evolution.

Prompt

To complete this assignment, you will write a short paper to share your research findings on the chosen health law or policy. Essentially, you will select one healthcare policy or law in the United States and conduct research to understand its history and importance in the decision-making process. Using Bardach’s eightfold path model, you will analyze the policy and explain the role of stakeholders in policy or law reformation. Last, you will describe the key stakeholders you identified as drivers for your chosen policy or law.

You must cite at least three sources to support your claims. For additional help with completing this assignment, refer to the Shapiro Library Guide: Nursing – Graduate item in the Start Here module. You may also use the Online Writing Center, located in the Academic Support module.

Specifically, you must address the following rubric criteria:

Selection of the Policy or Law: Describe the policy or law you have selected, explaining why you have chosen this policy or law.

History of Policy or Law: Describe the history of the policy or law you have chosen, explaining why it is essential. Consider the following questions in your response:

  1. Why is understanding the history of the policy or law essential in decision making about the policy or law?

What are the three significant milestones and driving factors in the history of the chosen policy or law?

  1. Influence of Stakeholders and Interest Groups: Using Bardach’s eightfold path model, describe how stakeholders and interest groups can be involved when approaching change in the chosen policy or law. Consider the following questions in your response:

Who are the key stakeholders and interest groups for the selected policy or law?

What could be the impact of noninvolvement of stakeholders and interest groups in policy or law reformation?

  1. How do the needs and interests of stakeholders and interest groups impact the change in the chosen policy or law?
  2. Key Drivers of Policy or Law: Explain how stakeholders were key drivers for the chosen policy or law. Consider the following questions in your response:
  3. Which key stakeholders are key drivers as well for the policy or law?

Which stakeholders and/or interest groups are most impacted by the chosen policy or law?

Proposed Changes or Amendments:Explain what you would like to see changed in the chosen policy or law and why. Consider the following questions in your response:

  1. How will you approach the change implementation process?
  2. In five years, how will historical reviewers view your proposed changes?
  3. How will these changes benefit underserved/vulnerable populations?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

The height of the cylinder is 8 inches.

We’ll be analyzing the surface area of a round cylinder – in other words the amount of material needed to “make a can”.

A cylinder (round can) has a circular base and a circular top with vertical sides in between. Let r be the radius of the top of the can and let h be the height. The surface area of the cylinder, A, is A=2πr2+2πrh (it’s two circles for the top and bottom plus a rolled up rectangle for the side).

A round cylinder with a circle top and base with radius r and a height of h

Part a: Assume that the height of your cylinder is 8 inches. Consider A as a function of r, so we can write that as A(r)=2πr2+16πr. What is the domain of A(r)? In other words, for which values of r is A(r) defined?

Part b: Continue to assume that the height of your cylinder is 8 inches. Write the radius r as a function of A. This is the inverse function to A(r), i.e to turn A as a function of r into. r as a function of A.

r(A)=

undefined

Preview Change entry mode

Hints:

  • To calculate an inverse function, you need to solve for r. Here you would start with A=2πr2+16πr. This equation is the same as 2πr2+16πrA=0 which is a quadratic equation in the variable r, and you can solve that using the quadratic formula.
  • If you want to type in 3π+1 in Mobius, in text mode you can type in (3*pi+1)/(x+1). There is more information in the Introduction to Mobius unit.

Part c: If the surface area is 225 square inches, then what is the rardius r? In other words, evaluate r(225). Round your answer to 2 decimal places.

Hint: To compute a numeric square root such as 17.3−−−−√, you could

  • Use a spreadsheet such as Microsoft Excel or OpenOffice Calc and type in =sqrt(17.3)
  • Use a browser to connect to the Internet and type in sqrt(17.3) into a search field
  • Use a calculator

The radius is inches if the surface area is 225 square inches.

I will need a step-by- explanation plus the answers. Let me know if you need anything else.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I will need my initial post and two classmate responses done. I am doing rental properties out of my home.

Imagine that a small business has three choices for location: leasing a spot in a mall, leasing a location in a central business district, and purchasing a stand-alone structure. The stand-alone site has ample parking and a traffic count of approximately 80,000 cars per day passing by at 35 mph. Foot traffic in the mall is the highest, but so is the lease payment, as well as the restrictions such as business hours. Foot traffic downtown is much less, but so is the rent. Which would you choose? List three reasons why.

Resources:

Chapter 4 and 5: The Harvard Business Review Entrepreneur’s Handbook: Everything You Need to Launch and Grow Your New Business

https://ezproxy.snhu.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=e076mww&AN=2223391&site=ehost-live&scope=site

To complete this assignment, review the Discussion Rubric document.

1st classmate response needed

6-1 Discussion: Choosing the Best Location

Doug Yost posted Jun 9, 2021 7:25 PM

This is a great scenario. In my job, I have to evaluate and select real estate locations all the time so this really hits home with me because these are very real choices in the market. One of the questions that I ask our real estate team is how many cars per day (CPD) are there on the road in front of our potential site. I also ask the CPD on both roads when our potential site is on a corner. Needless to say, I would choose the stand-alone site with the 80,000CPD. (1) If you have good branding and visibility, traffic will solve your marketing initiatives. It is worth paying more for rent when you have this level of traffic in front of your business because it is like you are marketing the store every single day. Banners, Flags, Balloons, and great signage can market your business to 80,000 CPD. When you consider the cost to market to this many people on a daily basis, it would be a staggering amount over and above your facility costs, whether leasing or purchasing. (2) Being located on a road that has 80,000 CPD is a dream for a business, especially at 35 mph instead of highway speeds. Usually, to get this many CPD, it is a highway that runs in front of the store so this is a very special situation. In this case, the traffic will help you drive additional sales in your business because you have a built-in traffic supply. If this were downtown or in a mall, generating traffic would be an expensive challenge. So, being in front of 80,000 CPD helps generate the traffic needed to drives revenue in your business. This truly turns your business into a “numbers game”, which gives the business owner great flexibility in deploying multiple strategies to drive additional revenue, gross margin, or both. (3) With the location and CPD, the business can run promotions, host special events, drive initiatives via social media, hold collaborative events with other business partners, and even introduce new technology / products because of the size of the location and parking. With this visibility, the location can also serve as a fantastic location for charity events. Many times, radio stations or live streaming events will promote efforts to support a charity and this location would serve this need very well. This would allow the location to build some good will with the community aside from its core business and be seen as a good corporate citizen.

Having businesses in each of the options listed to choose from, the stand-alone site with the great traffic and large parking lot is an outstanding location and capable of long-term sustainability.

2nd response needed

office

Sasha Cash posted Jun 9, 2021 4:33 PM

So this is something that really depends on which business someone is working with. Mine is an animal sanctuary/rescue. This means that my main location would either be none of these, or would be the stand-alone structure. There is an option that I think would be better, though: having the sanctuary and rehab spot in a secluded area, such as on my property as originally planned, and then having the store-front adoption/donation center be in one of the locations.
Now, looking at these three options as more of an office location is considerably different. I think this is the only realistic way for my business to operate, as rehabilitating any animals would mean controlling their environment a lot in the beginning. Not to mention, the space would be an issue, especially with barnyard animals or wildlife. So, deciding on the office location would be done with a weighted decision matrix.
Note: this prompt doesn’t say whether the downtown or stand-alone location has the lowest rent, so I will rank them the same.


When I was doing this decision matrix, as I do with all of them, I don’t think of which one I want to win while I’m deciding on weights and ratings. That would, after all, defeat the purpose of the decision matrix. After I finished doing this, I was surprised to find out how low downtown scored. I thought that it was going to be better than the mall spot. There is a chance that I forgot an important category, since I did this rather quickly, but I don’t think that’s what happened here. This example is a huge reason that I like decision matrices.

As for at least three reasons to choose the stand-alone location, I think these are good: ample parking leads to easier access for everyone; rent is fair; the traffic driving by could be huge when it comes to bringing new people in; there would likely be less crowding and some space for doing meet-and-greets for possible adoptions; and business hours can be whatever works for my business.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

In this module, you learned about the importance of interpreting user data to provide recommendations for user system design. User data may include information on how users interact with the system and what their visual preferences may be. This data can be used to inform system or interface changes. For instance, think about all of the logos on your desktop. Has the design of any of these logos changed in the last several years? It’s likely that a few of them have.

This article, https://medium.com/microsoft-design/the-ripple-eff… discusses some of the reasons for the updates, such as changing user needs and technological advances, as well as some of the methods used to gather information to inform the redesign.

In your initial post, respond to the following:

  • Who is impacted the most by the new design of an application?
  • Whose opinion impacts the design process the most?
  • Why is it valuable for an organization to update interface designs?

In your responses to your peers:

  • State whether you agree or disagree, and provide a rationale to support your opinion.
  • Share an example of an application icon or interface that you believe needs an update, and explain why. 

Reply:

Aaron Carll

Hi Class,

When it comes to the applications coming out with new designs or redesigns, I think the long-term users are most affected. Most of the long-term users of particular applications are used to icons or commands being in a specific position or a specific color, and changing those traits will negatively impact the user. For instance, when Windows 10 came out, the Windows button changed shape, and several users I know had trouble finding it. Therefore, frequent or users familiar with products have the most input when a current application is being redesigned. But if it is a new application or design, I think using opinions or habits from the most likely user will impact the design the most. When an organization updates its icon or interface, it can improve the processes it has already created or eliminate unnecessary steps within the process. If the application or design is updated without new icons, users will not know that the process has been updated. Editing the interface design lets users know that they have the latest interface and features.

Thank you

Aaron

Emily Robison 

Hi everyone!

Who is impacted the most by the new design of an application?

When a new design is given to an application, I think that users that are using the app before the new design are impacted the most. The users that are already using the app are probably most impacted by the new design because they are already use to or have a routine on the current design of the app. The current users have to “figure” out the app like they did when they first started using it.

Whose opinion impacts the design process the most.

For the impact of the design process, I will say it depends on if they have a feedback option for the app. Some apps that I have used have a spot that you can put your opinion in for what you’d like to see on the app or what isn’t really working for you. If that is the case, I think that the users have the most impact on the app design. If there is no feedback option from users, then I would say the app designer has the most impact when it comes to the design process.

Why is it valuable for an organization to update interface designs?

I think that it is important to update interface designs because give the latest updates to the app design. If the app uses the input from users it show the users of the app that the app designer are listen to their input.

less

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

  • 2-3 Jupyter Notebook (Discussion Prep)External Learning ToolYou have viewed this topicThis activity will take you to the Jupyter Notebook containing the Python scripts for your Module Two discussion. It is highly recommended that you read through the discussion prompt before completing your work in this notebook. When you are finished completing and running the Python scripts, begin work on your initial discussion post.Note: This task is not graded, but you will be required to attach your completed Jupyter notebook to your discussion post in the next activity
  • 2-4 Discussion: The Central Limit TheoremDiscussion TopicTask: Reply to this topic
    Starts May 8, 2021 10:59 PM

    Use the link in the Jupyter Notebook activity to access your Python script. Once you have made your calculations, complete this discussion. The script will output answers to the questions given below. You must attach your Python script output as an HTML file and respond to the questions below.In this discussion, you will apply the central limit theorem and use principles of the Normal distribution to calculate probabilities. You will demonstrate two key parts of the central limit theorem:

    • The distribution of sample means is approximately Normally distributed (bell-shaped) as the sample size increases and we repeatedly draw these samples, regardless of the shape of the population distribution from which the samples are drawn.
    • The average of all sample means is equal to the population mean. In practice, the average of all sample means will closely approximate the population mean.

    You will generate a population data set representing total precipitation (TPCP) in tenths of a millimeter using Python’s numpy module. The distribution of this data set will be skewed. This data set will be unique to each student, and therefore the answers will be unique as well. Run Step 1 in the Python script to generate your unique population data.In your initial post, address the following items:

    1. In the Python script, you created a histogram for the dataset generated in Step 1. Check to make sure that this data distribution is skewed and included in your attachment. See Step 2 in the Python script.
    2. What is the mean of the TPCP population data? See Step 3 in the Python script.
    3. In the Python script, you selected a random sample with replacement, of size 50 (note that this is a sufficiently large sample), from the TPCP population. What is the mean of your random sample? Does this sample mean closely approximate the TPCP population mean? See Step 4 in the Python script.
    4. You also selected 1,000 random samples of size 50 and calculated the mean of each sample. Then you stored those means into a dataframe. Check to make sure the output of this step is in your attachment. See Step 5 in the Python script.
    5. Review the plotted data distribution for these 1,000 means. Does this approximate a Normal distribution? Does this confirm the first part of the central limit theorem? Why or why not? See Step 6 in the Python script.
    6. What is the “grand” mean and standard deviation of these 1,000 means? Does the grand mean closely approximate (on a relative basis) the mean of the original distribution? Does this confirm the second part of the central limit theorem? Why or why not? See Step 7 in the Python script.

    Recall that your distribution of 1,000 means is Normally distributed even though the population distribution was skewed and the grand mean closely approximates the population mean. In your follow-up posts to other students, review your peers’ results and provide some analysis and interpretation.

    1. Is their population distribution skewed? Is their distribution of 1,000 sample means approximately Normally distributed? Does this confirm the first part of the central limit theorem? Why or why not?
    2. Does their grand mean closely approximate their population mean? Does this confirm the second part of the central limit theorem? Why or why not?
    3. Based on this discussion activity, what have you learned about the central limit theorem?

    Remember to attach your Python output and respond to all questions in your initial and follow-up posts. Be sure to clearly communicate your ideas using appropriate terminology. Finally, be sure to review the Discussion Rubric to understand how you will be graded on this assignment.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Please respond to the following discussion post from a fellow classmate. The goal here is to expand and enhance the discussion with additional ideas and references. Be certain to cite some Biblical principle.


Ethical Concerns With Correctional Privatization

I chose to review a case study written in 2020 titled “Ethical Concerns About Private (and Public) Corrections: Extending the Focus Beyond Profit-Making and the Delegation of Punishment.” The privatization of corrections in the United States is a hotly debated topic in public administration circles, as financially incentivizing punishment raises significant ethical concerns. Corrections are supposed to be rehabilitative entities, a form of punishment that also focuses on the prisoner’s successful reintegration back into society post incarceration. As the author Montes (2020) notes, tying punishment to profits is unethical because privatizing corrections may incentivize the implementation of lower quality services that do not prioritize public safety (p. 610). The use of private prisons continues to proliferate nationally, as “27 states and the federal government currently incarcerate a portion of their correctional populations in privately owned and operated prisons” (Frost et al, 2019, p. 457).

Running corrections like a business is unethical because businesses focus on profits, and in the business world, profits are achieved through repeat customers. It would actually be counter intuitive for a private (or for-profit) corrections facility to invest heavily in programs to reduce recidivism rates. Not when the amount of funding that a privatized corrections facility receives is based upon the number of inmates that they house. Montes (2020) believes that the presence of financial incentives may motivate private providers to invest in approaches that produce higher recidivism rates and that perpetuate severe punishment (p. 610).

Beyond simple administrative ethics, one must also consider consequentialist and deontological ethics with regards to correctional privatization. Einolf (2016) tells us that consequentialist ethics assume that one can define the good or evil of an act by looking at its consequences (p. 355). I feel that the negative consequences associated with privatized corrections far outweigh the positives, especially from an ethical standpoint. The only positive that comes from privatized corrections is that they save taxpayer dollars as private entities can build and run prisons much cheaper than the government. As far as negative consequences, the prioritization of correctional goals has been completely changed. What was previously a goal of rehabilitation and recidivism reduction has been replaced by cost efficiency and profit maximization.

“Deontological ethics, on the other hand, argues that the ethics of an act lie in the actor’s intent, not the acts consequences” (Einolf, 2016, p. 355). It is clear that the intent of the government in choosing to privatize corrections is to save money even if it is at the expense of those incarcerated. The tying of punishment to profits in any manner is highly unethical based on commonly accepted public sector ethical standards.

Proponents of correctional privatization will argue that it is a perfect example of utilitarianism, in that it is achieving the greatest good for the greatest number of people. The percentage of the country’s population that pays taxes is far greater than the percentage that is incarcerated so this is justified. However, as Fischer (2010) points out, while utilitarianism emphasizes efficiency, productivity, and high profits, it can overlook the concerns and rights of individual members (p. 15). In this instance those individual members are the incarcerated, who are witnessing their futures being put in jeopardy through the reduction of opportunities to improve themselves.

In the ancient Greek play Antigone, Sophocles’ highlighted “society’s need for reliable order and a process for creating and sustaining such order” (Marini, 1992, p. 425). An ethical dilemma arises however when maintaining such order is done so in a manner that violates societies moral and ethical standards. O’Reilly (2011) points out that ethical values are simply a reflection of the preferences of an individual or a group (p. 372). And I personally feel that the government is acting unethically in privatizing corrections as it goes beyond restorative justice to a place where private entities are turning a profit off of human punishment. If it were up to me I would end the use of private prisons immediately as it is the correct thing to do both ethically and morally. The last thing we need is for private prisons to create competition in the corrections industry. It is the prisoners that suffer in that scenario as they are the customers and they cannot “take their business elsewhere.”

And lastly, I feel that the privatization of corrections is unethical with regards to the Lord and Biblical standards. We are all God’s children, and he teaches us to forgive those who sin just as he will forgive us. Those in corrections have an obligation to make decisions in the best interest of the incarcerated, not to further punish them due to their limited rights. Leviticus 19:18 reads “Do not seek revenge or bear a grudge against anyone among your people, but love your neighbor as yourself. I am the Lord” (Holy Bible, NIV, 2011).

References

Einolf, C. (2016). The Ethics and Politics of Torture. Public Administration Review, 76(2), 354-357.

Fischer, K. (2010). A Biblical-Covenantal Perspective on Organizational Behavior & Leadership. Faculty Publications and Presentation. https://digitalcommons.liberty.edu/gov_fac_pubs/52…

Frost, N., Trapassi, J., Heinz, S. (2019). Public Opinion and Correctional Privatization. Criminology & Public Policy, 18(2), 457-476.

Marini, F. (1992). The Uses of Literature in the Exploration of Public Administration Ethics: The Example of Antigone. Public Administration Review, 52(5), 420-426.

Montes, A. (2020). Ethical Concerns About Private (and Public) Corrections: Extending the Focus Beyond Profit-Making and the Delegation of Punishment. Criminal Justice Policy Review, 31(4), 609-630.

O’Reilly, P. (2014). Herbert Simon: “Is’s” and “Oughts” After Sixty Years. Public Integrity, 13(4). 371-384.

The Holy Bible New International Version. (2011). Grand Rapids, MI. Zondervan Publishing .

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Jake Savoie posted Oct 4, 2021 12:54 PM

Hello class! My name is Jacob Savoie and I, like all of you, am in the process of completing my program. I must say that I am thoroughly enjoying it so far. I am not new to SNHU (unintentional rhyming is great) in General Studies with a focus in Operations Management. A little bit about me; I have been an Active Duty Air Force member for 15 years now and am currently stationed in Colorado Springs, Colorado where I work for the Inspector General’s office. For those of you unfamiliar with what exactly the IG is, I travel to different bases around the globe and inspect a variety of different programs to ensure that these bases are in compliance with the specific requirements of these programs. I am 34 years old and married with four beautiful children. My wife, Tiffany, is currently in basic training to join the Navy Reserves so these classes are definitely helping me stay occupied while she is gone!

As far as a growth plan, I have never formally completed one. With that being said, I have had several mentors through my career ask what my long and short term goals. This is also a required piece of information on our annual and mid-term feedback forms that our supervisors accomplish with us. As I am a very goal oriented person, this was extremely beneficial for me as it made me think about where I would like to be on a personal level when it is time for me to retire from the military. I also used it as a figurative “North Star” to keep me on track with the goals that I identified. For example, my previous supervisor used our initial feedback as a time to give me a nudge in the direction of getting started up with school again and pursuing my program. I was able to learn from this experience that while it may be acceptable to “wing it” from time to time, it is always better to have a plan in place. A plan gives us and those we create it with something to hold us accountable against and to let us know if we are hitting the mark.

In regards to measures of personal success, I can only think of one off the top of my head. As a supervisor, I usually measure my success by those that I work with on a daily basis. I look at how well those individuals are performing and are they meeting those personal goals that we have discussed and outlined a plan for them to complete. In addition, I look at if they are happy at work! I think that cohesion and actually enjoying your work family and what you do daily has a tremendous impact on productivity. I strive to make my work centers a place that my employees enjoy (enjoy might be too strong of a word, I know) coming to on a daily basis. I will say that it is a fine balance between having a fun work center and it being too fun and no work getting done or personnel feeling that they can slack and won’t be held accountable. This is a lesson that I learned early in my supervisory career.

In response to at least two of your peers, address the following:

Compare your views on personal and professional success. How do they differ?

Share your opinion about the organization identified in the post and its success. Do you agree that this organization is successful? Why or why not?

Share your thoughts about the importance of the non-financial success parameters identified in the post. Write a post of 1 to 2 paragraphs.

Consider content from other parts of the course where appropriate. Use proper citation methods for your discipline when referencing scholarly or popular sources.

Demonstrate more depth and thought than saying things like “I agree” or “You are wrong.” Guidance is provided for you in the discussion prompt.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Another term has almost come to an end! As you completed the modules, you learned about system requirements and implementation planning. Although you may not have physically implemented an IT system in this course, you can apply your new knowledge and skills in your personal and professional life. For this week’s discussion, reflect on what you learned this term.

In your initial post, discuss at least two key takeaways from this course. You may want to consider:

  • What are some of the most valuable skills, knowledge, or abilities that you have gained by taking this course?
  • How can you implement what you have learned in a practical way?
  • What do you hope to do with the knowledge and skills you have learned?
  • How will this course prepare you for courses later in your program?

In your responses to your peers, continue the conversation. You may want to consider:

  • How do you think that the key takeaways that your peer has posted can be applied in a profession or in future courses?
  • Are your key takeaways similar to or different from your peers’ takeaways?
  • What are your general thoughts on what your peer has initially posted about? 

Filippo Lussana posted Aug 15, 2021 8:06 PM

Subscribe

Thanks to this course, I was able to learn more about each phase of the software development life cycle (SDLC) and better understand the importance of requirement analysis and planning when developing and implementing new systems. “Systems analysis and design is a step-by- step process for developing high-quality information systems” (Tilley & Rosenblatt, 2016). Although I already had experience with UML diagrams from the previous courses, I found it interesting and valuable to gain knowledge regarding other types of diagrams and their functions and how to create a system requirements specification (SRS) document.

I think that one of the important things I also learned throughout this course is always to consider the ethical and legal implementation that may arise during the development of a system. “Computing professionals’ actions change the world. To act responsibly, they should reflect upon the wider impacts of their work, consistently supporting the public good” (ACM Code of Ethics and Professional Conduct, 2018). Especially while working on the Milennia HealthCenter assignments, I understood how the security and privacy requirements affect the future behavior and functionalities of a system.

I’m sure that everything I learned in this course will help me continue my program here at SNHU, and I hope one day that I will be able to apply all those skills in a real system implementation for an organization. Knowing the advantages and disadvantages of each SDLC methodology, such as agile and waterfall, will allow me to consider each time the best approach to develop a system and how to prepare an implementation schedule for a successful project.

Best of luck with your studies!

References

Tilley, S., & Rosenblatt, H. J. (2016). Systems Analysis and Design (11th Edition). Cengage Learning US. https://mbsdirect.vitalsource.com/books/9781305533936.

ACM Code of Ethics and Professional Conduct. Association for Computing Machinery. (2018, June 22). https://www.acm.org/code-of-ethics.less

Subscribe

This course has given me a valuable view into the ethical considerations of IT. Learning about the codes of ethics and their impact on businesses has given me a solid foundation for how I would perform as a professional in IT. This course has also been contributory in my experience and familiarity with various IT and business documents. This gives me the practical knowledge and qualifications to be an effective professional in IT for systems implementation. I have the ability to read the documents and to create them, as well as the knowledge needed in order to successfully research these subjects.

I hope to use these in my future courses as I finish my IT degree and go on to the professional world. My interests right now reside with cybersecurity, which is especially affected by ethical decisions. “Ethics […] is a critical part of any sound cybersecurity defense strategy.” (Knowles, 2016) Ethics are one of the core reasons that I want to go into cybersecurity. My empathetic nature leads to a desire to do good in the world and in what I am doing professionally. I look forward to being able to utilize these skills and the knowledge that I have gained in this course in my studies and in my career.

It was a pleasure being in class with you all! Good luck and happy studies!References

Knowles, A. (2016, October 12). Tough challenges in cybersecurity ethics. Security Intelligence. https://securityintelligence.com/tough-challenges-cybersecurity-ethics/ 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

once security requirements have been defined, an organization must have a way to ensure these requirements are satisfied. Security controls are safeguards or
countermeasures implemented by organizations to protect all types of assets (data, physical, personnel, etc.) from threats to confidentiality, integrity, or availability.
Trade groups such as the Center for Internet Security (CIS), the International Organization for Standardization (ISO), and the National Institute of Standards and
Technology (NIST) provide collections of security controls intended to address critical areas of cybersecurity concern; however, these guidelines provide different
levels of detail, vary in prescriptiveness, and apply to different industries and organizational structures. Ultimately, it is up to each organization to determine how to
best implement security controls to meet an organization’s expectations for asset protection. As such, the security practitioner’s role centers around the selection,
design, implementation, and management of the policies, procedures, standards, and guidelines designed to implement these controls.

In the milestone assignment for this project, you examined employee training as a control measure to reduce the incidents and effects of social engineering. As
you saw, training is a key method for incorporating security best practices. However, it is not the only type of control measure relied on by cybersecurity
professionals. In this project, you will incorporate instructor feedback on the milestone as you envision a more comprehensive approach to security controls at
an organization.

In this project, you will analyze requirements, select appropriate security controls, and specify methods to implement your selected controls to satisfy the
requirements. You will demonstrate your mastery of the following course competency:

 CYB-260-03: Design security controls and practices for humans in the system

Scenario

An initial agreement has been made, and Helios Health Insurance has provided a service level
agreement (SLA) that defines the relationship between Fit-vantage and Helios. You have been tasked
with recommending implementation of the controls detailed in the SLA.
Now that the partnership is in place, the insurance company’s SLA contains the terms and conditions
that require evidence of how Fit-vantage will address three critical controls—specifically, how the
organization will use awareness training to defend against social engineering attacks.

To complete this task, you will
prepare service level agreement requirement recommendations for the internal stakeholder board identifying an approach to meeting the requirements in the
scenario.

Prompt

Prepare a brief that outlines the requirement recommendations for the service level agreement and describes your approach to meeting the requirements of
the scenario. You must address the critical elements listed below. The codes shown in brackets indicate the course competency to which each critical element is
aligned.

I. Select two sub-controls that address the requirements of the scenario.

A. Control One: Justify how your selected control type (i.e., policy, standard, procedure, or guideline) and implementation will meet the
requirements. [CYB-260-03]

B. Control Two: Justify how your selected control type (i.e., policy, standard, procedure, or guideline) and implementation will meet the
requirements. [CYB-260-03]

II. Describe the necessity for a training program to address a specific social engineering threat. [CYB-260-03]

III. Describe the expected outcomes of a training program that addresses the social engineering threat you identified in the previous critical element.
[CYB-260-03]

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Half of all Americans feel less secure about their personal information than they did five years ago. The Pew Research Center found that Americans have little trust in organizations when it comes to their data. Many experts suggest that they have very good reasons to distrust. In 2017, hackers stole personal data from Uber, including names, email addresses, and phone numbers, as well as the names and driver’s license numbers of about 600,000 drivers in the United States. Uber paid the hackers $100,000 to delete the data and keep the breach quiet.

In your initial post, address the following:

  • What one change or addition would you recommend to the current laws and regulations regarding personally identifiable information (PII) and privacy?
  • How can the government ensure that companies get more serious about protecting personal data?

In your responses to your peers’ discussion posts:

  • Discuss whether you agree or disagree with your peers’ ideas on changes to the laws or regulations regarding PII.

References

O’Connor, N. (2019). Reforming the U.S. approach to data protection and privacy. Council on Foreign Relations. Retrieved from https://www.cfr.org/report/reforming-us-approach-d…

Smith, A. (2017). Americans’ experiences with data security. Pew Research Center: Internet & Technology. Retrieved from https://www.pewinternet.org/2017/01/26/1-americans…  initial post a couple of paragraphs. response posts one paragraph each

POST 1

Laws in the US protecting PII are inconsistent and unclear. “Companies need clearer rules, and individuals need to be able to incentivize companies to secure data.” (O’Connor, 2018) A significant financial loss in the form of fines would be an effective incentive to encourage companies to more seriously protect personal data. Until it makes sense for them monetarily, companies will continue to do the minimum required to protect personal data.

The procrastination of the US in creating a defined and unambiguous guideline for data protection has cost its citizens. As O’Connor recommends, “The U.S. Congress should join other advanced economies in their approach to data protection by creating a single comprehensive data-protection framework.” (O’Connor, 2018)References

O’Connor, N. (2018, January 22). Reforming the U.S. approach to data protection and privacy. Council on Foreign Relations. https://www.cfr.org/report/reforming-us-approach-data-protection

POST 2

My recommendation to the current laws and regulations regarding personally identifiable information (PII) and privacy for companies to collect only what you need. In many cases, PII may be used only in the verification process. For example, an SSN may be used to verify the identity of an individual, but afterward, the SSN is not necessary. In such cases, companies should not store the SSN because it would only increase the risk for the company. Companies should conduct periodic reviews throughout the year to ensure that data being collected is necessary for daily operations. Not all PII requires the same level of protection. For example, a public directory lists phone numbers with the permission of individuals making its protection less critical. Thus, it’s important to implement a variety of safeguards that address the different risk levels. “Fully 73% of those who have experienced at least one form of data theft say they have refrained from opening an online account due to their concerns about how their information would be treated, compared with 61% of those who have not experienced any type of data theft” (Americans’ experiences with data security, 2020).

Government can play a role by helping to educate the public, by protecting its own infrastructure and by assuring that companies disclose any potential privacy or security threats and adhere to their stated policies (Privacy | USAGov, 2021). It can also set a good example by applying good privacy practices and due process before trying to access citizen’s personal information.

Reference

Privacy | USAGov. (2021, September 7). Official Guide to Government Information and Services | USAGov. https://www.usa.gov/privacy

Americans’ experiences with data security. (2020, August 17). Pew Research Center: Internet, Science & Tech. https://www.pewresearch.org/internet/2017/01/26/1-…less

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Competency

In this project, you will demonstrate your mastery of the following competency:

  • Employ user-centered methodologies in the design of information technology applications and systems
A&D University logo

Scenario

The Director of Operations for A&D University wants to improve the efficiency of food services on campus. They are considering remote access that would allow students to view the cafeteria menu and place orders. Your department has been asked to create a proposal for the functionality needed for this application, using the concepts of user-centered design.

Hand holding a phone that is showing an app for ordering food online

Directions

The Director of Operations provided requirements for you to consider as you create the proposal. At a minimum, a student must be able to review the menu, place their order, and schedule a time for pickup at the cafeteria. The director envisions access through kiosks, desktops, laptops, or mobile phones, but has not chosen a specific platform at this time. Within your proposal, you will need to describe methods that could be used to obtain user requirements to help guide the choice of platform, as well as the design of the initial functionality. You are also tasked with determining what the impact of this application would be on the cafeteria workers and what would have to be created for them to view and schedule the online orders. While you are not creating a prototype for the functionality of the application, you should consider the ease of use, effectiveness, efficiency, learnability, and memorability as you create your proposal.

Within your proposal, you must address all of the following:

  • Explain how principles and processes of human-computer interaction (HCI) will inform your design process. Consider cafeteria staff as well as students.
  • Students
    • Select the methods (e.g., surveys, interviews, focus groups, or observations) you would use to gather user requirements from students and explain why those methods would be appropriate choices. Requirements should focus on functionality such as:
      • Reviewing the menu
      • Placing an order
      • Scheduling a time for pickup at the cafeteria
  • Construct the materials needed to implement the method(s) you have selected. You must include specific questions or behaviors appropriate to your selected method.
  • Describe how you would use the data gathered from each method you decide to use. You will need to address the following:
    • What are the essential tasks?
    • What are the “nice to have” tasks?
    • What information could you get from observations, surveys, interviews, or focus groups?
  • Staff
    • Select the methods (e.g., surveys, interviews, focus groups, or observations) you would use to gather user requirements for cafeteria staff and explain why those methods would work best to understand the functionality needed for the cafeteria workers. Requirements should focus on how the implementation of this app will impact the staff (e.g., prioritizing orders, receipt, scheduling, menu options).
    • Construct the materials needed to implement the method(s) you have selected. You must include specific questions or behaviors appropriate to your selected method.
    • Describe how you would use the data gathered from each method you decide to use. You will need to address the following:
      • How is this system going to change the workflow?
      • What information could you get from observations, surveys, interviews, or focus groups?
  • Justify the data you would use to select a delivery platform. In addition to the information from the students and staff, you will need to consider the following:
    • Cost associated with implementing on varying platforms (existing vs. new)
    • Features provided to support accessibility and ease of use for end users
    • Maintenance of the application (How often does the menu change? How will you continually upload a new menu?)

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

In a normal business day, you will be required to think about the organizational needs for data protection versus privacy protection. Understanding the data (whole records and pieces of records) and the categorization of data is important when evaluating these needs.

Consider your case study from the previous week. This week, the story takes a twist: “Headline! Data Breach at Strand Memorial Hospital!” Information on the breach has been published in an article detailing that the stolen USB drive contained sensitive patient data, including social security numbers and insurance information in plain text.

For your initial post, answer the following question:

As a practitioner, would you approach this issue from a security perspective (protect the data through encryption) or a privacy perspective (protect the data by not moving it outside of the network in the first place)? Justify your response.

POST 1

Approaching this issue should be done from a security standpoint. This is a clear breach of security in the hospital, where information got outside of the facility that was not supposed to. Handling an issue like this needs to be addressed at the most basic levels first. According to the book, there are three main ways to safeguard the organization’s information (1):

  • Deciding which users can get into a system—HR employees may be the only employees who are allowed to reach sensitive information stored on an HR server.
  • Monitoring what the user does on that system—Certain HR employees might be allowed to view documents, but other HR employees might be able to actually edit those documents.
  • Restraining or influencing the user’s behavior on that system—An HR staffer who repeatedly tries to view restricted information might be denied access to the entire system.

The use of USBs in the hospital setting should not be allowed. The sensitive nature of the information, mixed with the HIPAA laws, make USBs a recipe for disaster. “Attackers may also use their USB drives to steal information directly from a computer. If an attacker can physically access a computer, he or she can download sensitive information directly onto a USB drive” (2). This sums up the exact scenario described above, and the mitigation recommendations are as follows (2):

  • Do not plug an unknown USB drive into your computer. If you find a USB drive, give it to the appropriate authorities (a location’s security personnel, your organization’s information technology [IT] department, etc.). Do not plug it into your computer to view the contents or to try to identify the owner.
  • Take advantage of security features. Use passwords and encryption on your USB drive to protect your data, and make sure that you have the information backed up in case your drive is lost.
  • Keep personal and business USB drives separate. Do not use personal USB drives on computers owned by your organization, and do not plug USB drives containing corporate information into your personal computer.
  • Disable Autorun. The Autorun feature causes removable media such as CDs, DVDs, and USB drives to open automatically when they are inserted into a drive. By disabling Autorun, you can prevent malicious code on an infected USB drive from opening automatically.
  • Use and maintain security software, and keep all software up to date. Use a firewall, antivirus software, and anti-spyware software to make your computer less vulnerable to attacks, and keep the virus definitions current (see Understanding Firewalls for Home and Small Office Use and Recognizing and Avoiding Spyware for more information). Also, keep the software on your computer up to date by applying any necessary patches (see Understanding Patches and Software Updates for more information).

Note that encryption and password protection are recommendation in the second bullet point.

POST 2

In the above scenario I would approach this from a security perspective. Privacy is a major concern especially dealing with HIPPA requirements, but my belief is that if the data is encrypted as soon as it is created, the issue of where the data resides is a less of a concern. In this case, if the data on the lost or stolen thumb drive was encrypted, then the data would have been protected, and thus privacy concerns addressed. Privacy breaches can me mitigated through robust security practices.

Cheers,

Ryan

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Discussion: Diagnostic Labels as Powerful Communications

A diagnosis is powerful in the effect it can have on a person’s life and treatment protocol. When working with a client, a social worker must make important decisions—not only about the diagnostic label itself but about whom to tell and when. In this Discussion, you evaluate the use and communication of a diagnosis in a case study.

To prepare: Focus on the complex but precise definition of a mental disorder in the DSM-5 and the concept of dimensionality both there and in the Paris (2015) and Lasalvia (2015) readings. Also note that the definition of a mental disorder includes a set of caveats and recommendations to help find the boundary between normal distress and a mental disorder.

Then consider the following case:

    Ms. Evans, age 27, was awaiting honorable discharge from her service in Iraq with the U.S. Navy when her colleagues noticed that she looked increasingly fearful and was talking about hearing voices telling her that the world was going to be destroyed in 2020. With Ms. Evans’s permission, the evaluating [social worker] interviewed one of her closest colleagues, who indicated that Ms. Evans has not been taking good care of herself for several months. Ms. Evans said she was depressed.

    The [social worker] also learned that Ms. Evans’s performance of her military job duties had declined during this time and that her commanding officer had recommended to Ms. Evans that she be evaluated by a psychiatrist approximately 2 weeks earlier, for possible depression.

    On interview, Ms. Evans endorsed believing the world was going to end soon and indicated that several times she has heard an audible voice that repeats this information. She has a maternal uncle with schizophrenia, and her mother has a diagnosis of bipolar I disorder. Ms. Evans’s toxicology screen is positive for tetrahydrocannabinol (THC). The evaluating [social worker] informs Ms. Evans that she is making a tentative diagnosis of schizophrenia.

    Source: Roberts, L. W., & Trockel, M. (2015). Case example: Importance of refining a diagnostic hypothesis. In L. W. Roberts & A. K. Louie (Eds.), Study guide to DSM-5 (pp. 6–7). Arlington, VA: American Psychiatric Publishing.

Study Guide to DSM-5(r), by Roberts, M.; Louie, A.; Weiss, L. Copyright 2015 by American Psychiatric Association. Reprinted by permission of American Psychiatric Association via the Copyright Clearance Center.

By Day 3

Post a 300- to 500-word response in which you discuss how a social worker should approach the diagnosis. In your analysis, consider the following questions:

  • Identify the symptoms or “red flags” in the case study that may be evaluated for a possible mental health disorder.
  • Should the social worker have shared this suspected diagnosis based on the limited assessment with Ms. Evans at this time?
  • Explain the potential impact of this diagnosis immediately and over time if the “tentative” diagnosis is a misdiagnosis.
  • When may it be appropriate to use a provisional diagnosis?
  • When would you diagnosis as other specified and unspecified disorders?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Discussion 2: Dual-Role Relationships

Consider this scenario:

You receive a hotline call at your mental health agency from a client requesting a same-day appointment. You are the only social worker available to work with clients at the time, as your coworker is out of town on vacation for 10 days. A 15-year-old boy struggling with depression (no suicidal ideation) and addiction calls asking for help. While you are gathering information over the phone, you realize that he happens to be the son of a friend. Do you continue the process, planning on providing him with services, or do you refer him to another mental health clinic that is over 30 miles away? Do you make him wait until your coworker returns? Do you contact his parents and tell them he called?

In certain geographical areas there may be limited resources and in turn a lack of opportunities for clients to obtain assistance. In some rural or otherwise isolated areas there might be situations that make it difficult to maintain ideal boundaries due to dual-role relationships. Dual-role relationships exist when a professional fills multiple roles at the same time, a situation that may be unavoidable in certain circumstances.

Understanding the significant impact of a dual-role relationship with a client is important in order to avoid harming the client. Further, recognizing the impact on the client and the relationship will assist in the creation of strong professional boundaries. In these situations, a social worker might feel his or her ability to maintain these boundaries is compromised or may even experience a value dilemma due to the existence of dual-role relationships.

Consider the importance of boundaries in a therapeutic relationship. Think about ways a social worker might violate the NASW Code of Ethics as it pertains to dual-role relationships. Is there ever a situation in which dual-role relationships are acceptable, or even preferable?

By Day 4

Post an explanation of how you might respond to the situation with the 15-year-old boy on the hotline. Include ways your decision may impact the client. Support your position with references to this week’s resources, professional experience, and additional research. How will you address a possible dual-role relationship?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Corporations have to be in compliance with the laws, regulations, and standards that govern their business. For example, educational institutions have to be in compliance with FERPA; health organizations have to be in compliance with HIPAA; and professionals that develop information security programs have to consider a range of information security laws (Sarbanes-Oxley Act, Gramm-Leach-Bliley Act).

Research the laws, standards, policies, and regulations that you might need to be in compliance if you were developing your project for a real-world scenario.

In your initial post, explain these and provide links to websites that provide information on them. Also describe any security requirements that are relevant and should be addressed in the project design.

Then, review the laws, standards, policies, regulations, and security concerns shared by your classmates. Were there any that you felt that they left out? Were there any that they shared that you should consider for your own project?

Peer Review #1

Vishnu Persaud posted

Hi Class

The Air Quality Monitoring project will need to ensure that users’ personal data is protected and kept private. The web interface component is also accessible for even people with disabilities. There 2 regulatory measures come to mind that is aligned with this project. Here are the following:

  • The Privacy of Act of 1974 requires that the system prohibits disclosure of an individual’s records without their consent (Department of Justice, 1974)
  • The web interface will also adhere to the Americans with Disability Act (ADA) which will impact the development of the application abstraction for the end-users (United States Department of Justice Civil Rights Division, 2010)

In addition, to the regulations, there 2 top security measures which will be implemented to ensure that users’ data is secure and protect. The first being 2-factor authentication for accessing the web interface, and the second requirement will be periodic penetration testing to identify any vulnerabilities with the existing security measures.

References

Department of Justice. (1974). Privacy Act of 1974. Retrieved from The United States Department of Justice: https://www.justice.gov/opcl/privacy-act-1974#

United States Department of Justice Civil Rights Division. (2010). ADA Standards for Accessible Design. Retrieved from https://www.ada.gov/2010ADAstandards_index.htm

Peer Review #2

LaShaye Sykes posted

Hello Future Graduates,

Since my project has to do with the medical and the patient population (COVID stats tracking), if I were developing it for the real world I would need to be in compliance with

HIPPA

“The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that required the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge” (Health insurance portability and Accountability act of 1996 (HIPAA) 2018).

Hippa Privacy rule

“The Privacy Rule standards address the use and disclosure of individuals’ health information (known as “protected health information”) by entities subject to the Privacy Rule. These individuals and organizations are called “covered entities.” The Privacy Rule also contains standards for individuals’ rights to understand and control how their health information is used” (Health insurance portability and Accountability act of 1996 (HIPAA) 2018).

I would need to ensure the app has encryption, the user entity type is covered, and that the app is limited with what it can provide for PHI. Although the app would not share identifying patient information, it will be synced with the CDC and other governmental entities and we do not want that information hacked.

The US mobile privacy framework is built around best practices. “US regulators have made it clear that app developers are primarily responsible for providing protections and transparency regarding the use of data” (Mobile privacy in the US 2020).

Reference

Centers for Disease Control and Prevention. (2018, September 14). Health insurance portability and Accountability act of 1996 (HIPAA). Centers for Disease Control and Prevention. https://www.cdc.gov/phlp/publications/topic/hipaa.html.

Golden Data. (2020, September 8). Mobile privacy in the US. Medium. https://medium.com/golden-data/mobile-privacy-in-the-us-c4a619e07e2b.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

In this module, you learned about the pervasive nature of the IoT and how it has become a major aspect of every day. Using IoT at home is becoming more and more popular, especially through technologies such as Amazon’s Alexa. You may or may not already have IoT in your home, but for the purpose of this activity you will reflect on the smart home of your dreams.

Prompt

For the purposes of this activity, imagine the smart home of your dreams. What IoT technologies would you like to have in your smart home?

Guidelines for Submission

  • Create a graphic representation that shows the ways you would incorporate IoT technology into your home and how they would connect with each other, assuming that cost is not a factor.
    • You can use a visual design tool of your choice (including pen and paper) to represent your dream home.
  • Provide an explanation of how and why each IoT technology is used.
    • This explanation could be within your graphic representation or you can choose to write about it.

Your graphic representation and your explanation should be submitted in the same document. You may use any tool you like to create the diagram, including pencil and paper.

We have included a link to a video and some popular tools that can be used to help you create your diagram. These are not required resources, but are available to use if needed.

  • Microsoft: Add a drawing to a document
    This document provides step-by-step instructions for creating drawings using the tools available through Microsoft Office.
  • draw.io – Quick Start Video (1:35)
    This video provides a demonstration of the tools and capabilities of draw.io.
  • This Visio 2016 tutorial includes information that may be helpful to you when creating your graphic. You will want to focus mainly on the information presented in Section B: Navigation, and in Section C: Using Shapes, Connectors, and Arrows.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

search

Make your question private.

Looking for maximum security? Make your question 100% private.

TIME REMAINING: 2 DAYS, 00:36:15

Client/server development

Joseph9710

I’m working on a computer science project and need an explanation to help me study.

In this project, you will demonstrate your mastery of the following competencies:

  • Analyze user interface/user experience design fundamentals
  • Develop user interface/user experience for embedded and cloud-based systems

Scenario

Kiva is very pleased with the way you have gotten to know their needs and customer base; now they are ready for you to take the next steps! They need you to create a digital wireframe for the Kiva borrower’s interface, explain your design decisions, and make a plan for development of a cloud-based system in service of Kiva’s lenders. Recall that Kiva crowdfunds loans and unlocked capital for the underserved, improving the quality and cost of financial services and addressing the underlying barriers to financial access around the world, so your understanding of work in this space is very valuable.

Previously, you explored Kiva’s Data Snapshots page and analyzed the data found in the Kiva Snapshots CSV file that was provided. This allowed you to start considering how you would address the following two user stories:

  1. As a Kiva borrower, I want to access information about Kiva and about borrowing from Kiva with my flip-phone (which is an embedded device), so that I can stay informed, request loans, and track my loan payback process.
  1. As a Kiva lender, I want to explore borrower requests, analyze my and others’ lending data, and follow borrower loan payments (in a cloud application) so that I can forecast how I will loan funds and plan the recycling of previous paid funds.

You will continually reference these user stories, along with the work you have already completed, as you develop the wireframe for the UI design of the embedded system and a plan to build the cloud application using UI and UX best practices.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

In the blog post, API vs Web Service: What’s the Difference?, the authors state that “All web services are APIs, but not all APIs are web services.” For your initial discussion post:

  • Create an explanation for this statement that you could share with someone new to the information technology field.
  • Make sure you include information that describes what web services and APIs are, and also clearly explains why “All web services are APIs, but not all APIs are web services.”

In your response to your peers, provide feedback on their explanations.  

References

RapidAPI Staff. (2019, February 28). API vs web service: What’s the difference? Retrieved from https://blog.rapidapi.com/api-vs-web-service/ 

https://rapidapi.com/blog/api-vs-web-service/

Scott Rissmiller posted Jul 7, 2021 9:23 PM

The phrase “All web services are APIs, but not all APIs are web services” seems simple at first but can be more complicated when understanding what APIs and web services do. In order to understand what they are and what their differences are. Simply put, a webservice allows two machines to talk to each other though it must occur through a network, while an API or Application Programming Interface provides a set of provides the tools such as protocols that will allow applications to communicate with each other (RapidAPIStaff, 2021). The major difference is between an API and a web service is while web services must communicate through a network, but some APIs don’t.

References

RapidAPI Staff. (2021, April 20). API vs web service: What’s the difference?

Retrieved from https://blog.rapidapi.com/api-vs-web-service/

PI Staff. (2019, February 28). API vs web service: What’s the difference? Retrieved from https://blog.rapidapi.com/api-vs-web-service/
Thomas Talbot posted Jul 7, 2021 3:49 PM

When one hears the saying that “All web services are APIs, but not all APIs are web services” it might be confusing. This is completely understandable. First, one must know the definitions of both API and Web Service.

API stands for Application Programming Interface. An API is an application that interfaces with an external service, therefore allowing the two applications to talk with one another. Many people use APIs everyday without even realizing it. Some examples of APIs are Facebook, Facebook Messenger, Instagram, travel websites, PayPal, weather snippets, streaming services, financial institutions, or the ability to login to other websites using your social media account (Bush, 2019).

Some characteristics of APIs are:

  • Developer-friendly, broadly understood and easy to access (“What is an API? (Application Programming Interface)”, n.d.).
  • They are monitored and managed for security, performance, and scale access (“What is an API? (Application Programming Interface)”, n.d.).
  • They are designed and created for specific types of audiences access (“What is an API? (Application Programming Interface)”, n.d.).
  • Allow for programmers to generate programs faster as the interface is already created for them.

Another manner in which to explain an API to an individual would be to compare the API to employees at a movie theater. The employee at the desk will sell you a ticket to see a movie. Once you have the ticket in hand, you will see the next employee and hand them the ticket, thus allowing you in to see the movie.

A Web Service is a manner in which two electronic devices communicate with one another over a network (RapidAPIStaff, 2021).

Some characteristics of Web Services are:

  • They usually use the XML messaging system (“What are Web Services?,” n.d.)
  • They are not tied exclusively to one type of Operating System or computer programming language (“What are Web Services?,” n.d.)
  • They can be used over internet or intranet connections

A Web Service could also be described as one computer talking to another computer to seek out information or to make a request for the other computer to complete a task.

When looking at the difference between an API and a Web Service it could simply be described as a human vs. a computer requesting an assist from another entity. However, APIs do not always need a network connection to work while all Web Services require a network in order to function (RapidAPIStaff, 2021).

References

Bush, T. (2019, December 10). 5 Examples of APIs We Use in Our Everyday Lives. Retrieved from https://nordicapis.com/5-examples-of-apis-we-use-in-our-everyday-lives/

RapidAPIStaff. (2021, April 20). API vs Web Service: What’s the Difference? Retrieved from https://rapidapi.com/blog/api-vs-web-service/

What is an API? (Application Programming Interface). (n.d.). Retrieved from https://www.mulesoft.com/resources/api/what-is-an-api

What are Web Services? (n.d.). Retrieved from https://www.tutorialspoint.com/webservices/what_ar… 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Once you graduate and obtain your first job out of your Master of Social Work program, you may be asked to identify the gaps in services at your new agency. You may be asked to create a new group or help to identify a new evidence-based intervention that can be introduced to the clients. Understanding how to research the current literature, and then choose and evaluate an intervention, is an important component of being a successful social worker. For this course, you have researched new and interesting interventions that are currently being used with children, adolescents, adults, and the elderly. Further, you have explored the importance of connecting theory to practice.

For this Assignment, use will practice steps in Evidence-Based Practice. 1) You will think of a practice problem. 2) You then conduct a literature review on available research. 3) You will evaluate the evidence to determine which intervention to use. 4) You will consider client values and your clinical expertise. 5) You will think about what you hope the client gains from this intervention (i.e., decreased depression, increased quality of life, decreased PTSD symptoms) and consider how you might measure this change.

To prepare:

  • Choose a population of interest to you.
    • Children
    • Adolescents
    • Adults
    • Elderly/Aging
  • Choose a presenting problem (depression, family conflict, homelessness, etc.) related to the population of interest.
  • Conduct a literature review focused on the presenting problem within the population of interest.

Submit an 8- to 10-page scholarly paper supported with a minimum of six peer-reviewed articles as references. In the paper, you should:

  • Briefly describe the population and presenting problem you are focusing on for this assignment.
  • Provide a review of the articles you reviewed from this project and explain what you learned from conducting this research.
  • Briefly describe at least 2 evidence-based interventions currently used for your chosen population when addressing this particular problem. Provide supporting references when explaining the evidence behind the interventions.
  • Explain which of these interventions you might choose to use and why.
    • Consider client values and your clinical expertise and how those might affect your decision of which intervention to use.
  • Describe how you might apply the specific skills and techniques of the chosen intervention.
  • Briefly explain how you could measure the outcomes of this intervention.
  • Explain any cultural considerations that you need to take into account when working with this population or the particular presenting problem.
  • Discuss how the Code of Ethics applies when working with this particular presenting problem and population.
  • Explain how you would apply a trauma-informed lens when working with this population.

Support your Final Project with specific references to the resources. Be sure to provide full APA citations for your references.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

For this milestone, you will begin developing the Python code for a  couple of your dashboard widgets in an IPYNB file in Jupyter Notebook.  Specifically, you will begin coding the interactive data table and the  geolocation chart. You will need to make sure that both of these  components receive data from the MongoDB database. You will use the CRUD  Python module from Project One to help you retrieve this data and pass  it to the dashboard widgets. Recall that the MVC design pattern is a  separation of application logic into a stack of software components,  such as MongoDB for model storage, the web server for implementing  application controller logic, and the web browser for production of the  view.

You will continue building on this work to complete Project Two, which will be due in Module Seven.

Prompt

You have been asked to create a data table on the dashboard which shows an unfiltered  view of the Austin Animal Center Outcomes data set. You have also been  asked to add a geolocation chart to the dashboard, which will help the  client visualize the data. For more details about the dash components  for data tables and the geolocation chart, refer to the Module Six  resources.

  1. Open the ModuleSixMilestone.ipynb file,  which contains the starter code for the Grazioso Salvare dashboard.  Upload this file into Apporto and open it using the Jupyter Notebook  application. Be sure to review all of the starter code that you have  been given. Pay special attention to the import commands and the  comments describing what each section of code does.
  2. Update the code to create an interactive data table on the dashboard which shows an unfiltered view of the Austin Animal Center Outcomes data set. To populate the data onto your table, you will utilize your previous CRUD Python module,  from Project One, to run a “retrieve all” query and bring in the data  from MongoDB. This data retrieval will serve to access the “model”  portion of your MVC pattern: the MongoDB database. Be sure to hardcode  in the username and password for the “aacuser” account.

    Note: It  may take a few minutes for the data table to fully render and display,  depending on the speed of your internet connection.

    Tip: Be sure to consider your client  when creating the interactive data table. Consider optional features  that will make the table easier to use, such as limiting the number of  rows displayed, enabling pagination (advanced), enabling sorting, and so  on. Review the Module Six resources on data tables to help you select  and set up these features.

  3. Add a geolocation chart that displays data from the interactive data table to your existing dashboard. 
    • You are being given the function that sets up accessing the data for  the geolocation chart and calls the Leaflet function: update_map:  def update_map(viewData):     dff = pd.DataFrame.from_dict(viewData)     # Austin TX is at [30.75,-97.48]     return [         dl.Map(style={'width': '1000px', 'height': '500px'}, center=[30.75,-97.48], zoom=10, children=[             dl.TileLayer(id="base-layer-id"),             # Marker with tool tip and popup             dl.Marker(position=[30.75,-97.48], children=[                 dl.Tooltip(dff.iloc[0,4]),                 dl.Popup([                     html.H1("Animal Name"),                     html.P(dff.iloc[1,9])                 ])             ])         ])     ]
       
    • You will need to structure this function into your dashboard code by putting the correct statements in the layout. These statements are important so that your layout has a place for the geolocation chart. Here is an example statement:  html.Div(             id='map-id',             className='col s12 m6',             )
       
    • You will also need to add in the correct callback routines for the geolocation chart.  These will look similar to the callback routines used for user  authentication and your data table. Here is an example callback routine:   @app.callback(     Output('map-id', "children"),     [Input('datatable-id', "derived_viewport_data")])
       
    • Note: The Leaflet geolocation chart will show the first row of the  data table by default. As long as your chart shows the location of the  dog in the first row, that is sufficient for checking that your  geolocation chart is set up correctly. 
  4. Finally, run the IPYNB file and take a screenshot  of your dashboard as proof of this execution. Your screenshot should  include 1) the interactive data table populated with the Austin Animal  Center Outcomes data from MongoDB and 2) your geolocation chart showing  the location of the first dog in the table. Additionally, your unique  identifier (created in the Module Five assignment) should also be  visible in the screenshot.

 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Discussion 2: Elder Abuse

Each year on or around June 15, communities and municipalities around the world plan activities and programs to recognize World Elder Abuse Awareness Day, a day set aside to spread awareness of the abuse of the elderly (Center of Excellence on Elder Abuse & Neglect, 2013). The abuse of older adults is a growing concern and statistics suggest that the number of elders experiencing abuse is an alarmingly high number. Research suggests that close to half the people diagnosed with dementia experience some form of abuse (Cooper, C., Selwood, A., Blanchard, M., Walker, Z., Blizard, R., & Livingston, G., 2009; Wiglesworth, A., Mosqueda, L., Mulnard, R., Liao, S., Gibbs, L., & Fitzgerald, W., 2010, as cited on http://www.ncea.aoa.gov/Library/Data/index.aspx). Elder abuse takes on many forms and can include physical, emotional, psychological, and economic abuse. The legendary American actor, Mickey Rooney, spoke to the United States Senate, describing his own experiences of pain and neglect at the hands of his stepson, asking legislators to take seriously the abuse of the elderly.

For this Discussion, go to the Walden Library and find a scholarly article that presents some of the most important psychosocial issues related to elder abuse.

By Day 4

Post a summary of the article you found. How does the article reinforce the importance of assessing potential abuse and neglect when working with the elderly? Describe prevention and/or intervention strategies on the micro, mezzo, and macro levels that can be used to address the issue of abuse and neglect of the elderly.

Support your posts with specific references to the Learning Resources. Be sure to provide full APA citations for your references.

By Day 6

Respond to at least two colleagues by suggesting alternative strategies.

Colleague 1: Antoinette

RE: Discussion 2 – Week 6

COLLAPSE

Hello All,

Post a summary of the article you found. How does the article reinforce the importance of assessing potential abuse and neglect when working with the elderly? Describe prevention and/or intervention strategies on the micro, mezzo, and macro levels that can be used to address the issue of abuse and neglect of the elderly.

Psychological distress and abuse of older persons in society cause geriatric syndromes associated with premature mortality. In their article, Dong, Chen, Chang, and Simon (2013) stated that elders’ psychological well-being is crucial for healthy aging. Elder abuse range from physical assault, sexual and emotional abuse, neglect, and financial exploitation is leading to psychosocial concerns and stressful life events. Older adults experience negative effects physically and mentally attributed to abuse from caregivers and relatives. Whereas the United States government, through special agencies like the adult protective services (APS), has taken the initiative to enhance senior citizens’ well-being, evaluating the intervention programs and policy associated with prevention against elder psychological distress and abuse.

The article reinforces the gerontological literature on the rising cases of older adults experiencing abuse and psychological distress from caregivers and relatives. The sociodemographic of the older population contribute to the prevalence of elder abuse. Dong, Chen, Chang, and Simon established that elder abuse and psychological distress contribute to serious consequences of anxiety, depression, and posttraumatic disorder. Efforts to create workable intervention and prevention strategies to assist victims of elder abuse and increase awareness to the community on the risk of physical and mental health of senior citizens.

The persistent and severe forms of abuse subject to elders strain the relationship but require intervention support through residential care policies to improve the conditions of sheltering elders. The growing need for interdisciplinary collaboration against elder abuse and psychological distress needs caregiver support to establish wellness programs and a mandatory helpline for reporting abusers for protective services for older adults. Conclusively, abuse and psychological distress of older adults cause severe damage to physical and mental health like

dementia and depression. It is the responsibility of governmental agencies and society to ensure comfort for older persons to facilitate graceful aging.

References

Dong, X., Chen, R., Chang, E.S. & Simon, M. (2013). Elder Abuse and Psychological Well-Being: A Systematic Review and Implications for Research and Policy – A Mini Review. Gerontology, 59, 132 – 142. https://doi.org/10.1159/000341652

Colleague 2: Melinda Haupt

RE: Discussion 2 – Week 6

COLLAPSE

The article I found is about a study based on Norwegian nursing homes. “Elder abuse is a public health problem that is gaining attention due to its serious impacts on people’s health and well-being, and it is predicted to increase along with the world’s rapidly ageing population. Staff-to-resident abuse in nursing homes is a complex and multifaceted phenomenon associated with multiple factors on different levels of the ecological model. This study aimed to explore individual, relational, and institutional characteristics associated with perpetrated staff-to-resident abuse in nursing homes” (Botngard, 2021). I found this article interesting. Within my local community/area, we have seen more financial abuse within elderly population than physical, mental, and/or emotional. The study looked at general information such as gender, age and education status. They then asked questions about mental health such as harming yourself, feeling exhausted and then moved to childhood and currently feelings about work environment. They also asked questions about the residents and workload. The point of the questions is to find out the risk of elderly abuse. The study reported “This study of risk factors associated with staff-to resident abuse in Norwegian nursing homes showed that various factors in the ecological model increase the likelihood of staff perpetrating psychological abuse, physical abuse, and neglect. The predictors most strongly found to be associated with all three types of abuse were 1) being a registered nurse/social educator or licensed practical nurse, 2) reporting symptoms of psychological distress, 3) considering leaving the job, 4) reporting poor attitudes towards persons with dementia, 5) and experiencing care-related conflicts and resident aggression. Other predictors were poor quality of childhood (neglect) and lack of support from a manager (psychological abuse)” (Botngard, 2021).

Within this study continuing education was stated as more no’s than yes in the survey. This makes me question if a good prevention to reduce elder abuse in all forms is to require a course every year to reduce the risk. This would be good for all macro, mezzo and micro levels. Macro level should require it such as the state. Then Mezzo the facility or community needs to require it. Which then helps the micro level reduce the risk. Another, invention/prevention, I have been thinking about. As stated above, in my local community/area, we have had many reports and criminal charges for elder abuse for financial abuse. Elder financial abuse is a type of elder abuse in which misappropriation of financial resources or abusive use of financial control, in the context of a relationship where there is an expectation of trust, causes harm to an older. My thought for the prevention of this, is the make people away of these issues and how to report. Many of the local cases there was someone who noticed it but did not say anything due to lack of evidence, lack of education on how to report, and no one person should micro-manage the money. Example: the most recent financial abuse that was criminally charged, was the group home house supervisor was the only one to handle financial transactions. This should be a red flag for everyone and anyone involved because someone even if it is one or two other people in a different position double check and triple check the transaction and bank statements to hold everyone accountable. An old saying that I learned within the first residential setting I worked it was, “we double and triple check each other works to keep the honest people honest.”

Botngård, A., Eide, A. H., Mosqueda, L., Blekken, L., & Malmedal, W. (2021). Factors associated with staff-to-resident abuse in Norwegian nursing homes: a cross-sectional exploratory study. BMC Health Services Research, 21(1), 244

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Discussion: Treating External Factors

An ounce of prevention is worth a pound of cure.
—Benjamin Franklin (1706-1790)
American Politician

Couples are impacted by many external factors that may negatively affect their system. Couples are impacted by common life stage transitions (e.g., children introduced to the system by birth or adoption, empty nests when children become adults, blended families), as well as uncommon life events such as infidelity, substance use, financial challenges, gambling problems. When working with couples it is important to remain aware of any external factors the couple is experiencing to help understand the impact on the dyad.

For this Discussion, search the Walden Library for an article that discusses treating couples where an external factor noted above has negatively impacted the couple to the point they are considering divorce.

By Day 4

Post an analysis of the article you found. In the analysis, identify which theory was utilized to treat this issue. Then, discuss if the treatment was effective or ineffective in helping the couple work through the issue. Finally, explain whether or not you believe there is some other intervention that would be beneficial for this situation.

Be sure to support your postings and responses with specific references to the resources.

Read a selection of your colleagues’ postings.

By Day 6

Respond to two of your colleagues’ postings in one or more of the following ways:

  • Ask a probing question.
  • Share an insight from having read your colleague’s posting.
  • Offer and support an opinion.
  • Make a suggestion.
  • Expand on your colleague’s posting.

Return to this Discussion in a few days to read the responses to your initial posting. Note what you have learned and/or any insights you have gained as a result of the comments your colleagues made.

Colleague 1: Marcus

Post an analysis of the article you found. In the analysis, identify which theory was utilized to treat this issue. Then, discuss if the treatment was effective or ineffective in helping the couple work through the issue.

Hello Everyone,

We are more than halfway through our semester. The article that I am focusing on is pornography addiction and relationship anxiety. Pornography addiction and relationship anxiety can cause issues in marriages and couples who are in courtship. Individuals who engage in pornography are often struggling with low self-esteem and use it for self-gratification especially if they are not satisfied sexually with their spouse. Some individuals who engage in internet pornography may also struggle with depression. One study from Leonhardt et al., (2018) reports that lower levels of self-esteem and higher levels of depression are heavily associated with the reasons individuals are addicted to internet pornography. While others use pornography to help them express their sexuality and for erotic experience (Leonhardt et al., 2018). The article that I found is exploring different studies of research to understand the perceptions of pornography addiction from religiosity and those who have struggled with relationship anxiety. Religiosity perception of pornography addiction may make individuals feel ashamed and experience the negative outcomes of the perceptions which cause an increase in relationship anxiety and depression according to research studies. Leonhardt et al., (2018) also reported that relationship anxiety construct of surrounding anxiety and perception that society has on pornography that brings discomfort to the individual which can affect their self-esteem. The identified theory from this article is called “Sexual addiction theory” which was originally coined by Patrick Carnes (1983). The perception of addiction in terms of this article is referring to compulsivity and distress surrounding pornography (Leonhardt et al., 2018). The understanding of the perception of pornography addiction and the moral disapproval of religiosity surrounding the addiction can help couples identify the spouse who is addicted that they may have relationship anxiety in their marriage or courtship. The growing research studies on the compulsivity and distress from porn addicts’ behavior may be a psychological condition known as hypersexual Disorder or sexual addiction in the relationship. From a clinical perspective, individuals with a pornography addiction that is out of control may have sexual compulsive behavior, distress because it affects their relationships a great deal and commitments in their lives, which can cause relationship anxiety and depression. The person may experience discomfort and communication anxiety with their partner or spouse because they feel ashamed of their addiction.

Finally, explain whether or not you believe there is some other intervention that would be beneficial for this situation.

Mindfulness meditation can aid in managing sexual fantasies, urges, and compulsive behavior. Mindfulness meditation is effective at reducing anxiety for couples who are struggling with pornography addiction and the discomfort from each other when the partner or spouse is struggling with helping each other recover from the addiction. According to Dickinson et al., (2017), “Mindfulness programs are effective in reducing anxiety in populations with chronic disorders” (p.1044). The researcher from this article reported using Mindfulness-meditation to help individuals with anxiety and other cognitive distortions/processes with Aphasia and their study have shown the effectiveness of Mindfulness-meditation at work-study. Mindfulness exercises are to help the porn addict to focus on the here and now from a non-judgmental approach and they are being aware of the cognitive processes of their sexual thoughts, urges, and fantasies so they can learn how to control those thoughts during the training (Dickinson et al., 2017). The mindfulness meditation will be beneficial for that spouse or partner struggling with sexually compulsive behaviors and hypersexuality when desiring to watch porn, they can use these skills to control those cravings and urges to watch porn when their spouse is not around.

References:

Dickinson, J., Friary, P., & McCann, C. M. (2017). The influence of mindfulness meditation on communication and anxiety: A case study of a person with aphasia. Aphasiology, 31(9), 1044–1058. https://doi-org.ezp.waldenulibrary.org/10.1080/02687038.2016.123458

Leonhardt, N. D., Willoughby, B. J., & Young-Petersen, B. (2018). Damaged Goods: Perception of Pornography Addiction as a Mediator Between Religiosity and Relationship Anxiety Surrounding Pornography Use. Journal of Sex Research, 55(3), 357–368. https://doi-org.ezp.waldenulibrary.org/10.1080/00224499.2017.1295013

Colleague 2:Tomeka

An analysis of the article you found.

The article focus on depression specifically and its relationship to infidelity in relationships. As it states in Abbasi & Alghamdi, Daines (2006, p.48) defines infidelity as “interactions in a relationship in which at least one of the people engaging in it understands there to be a violation of agreed or implicit sexual and/or emotional boundaries within their couple relationship” (2017). As a way of initiating relationships, Facebook has become a vital part of it (Abbasi & Alghamdi, 2017). Facebook use and depression have shown a significant link between each other per empirical research (Abbasi & Alghamdi, 2017). According to the article I found, “More than half of all couples in therapy have some form of infidelity in their past, and approximately 25% of all couples present in couple therapy with infidelity as a primary concern” (Gorman, et al., 2008, p40). “38% of the women who discovered their partners cheating became depressed within one month following their discovery, even though these women had no previous history of depression” (Gorman, et al., 2008, p40). Antidepressants have been used to help couples cope, but therapy was found to be more helpful without taking medication. (Gorman, et al., 2008). The therapist should be conscious of and evaluate for potential side effects of discouragement two or three presents with an embarrassing social issue such as infidelity (Gorman, et al., 2008). “In the case of infidelity, the betrayed partner often describes his or her pain as more unbearable than the loss of a partner through death” (Gorman, et al., 2008, P42).

In the analysis, identify which theory was utilized to treat this issue.

“Infidelity is not just another presenting problem that couples bring into therapy but the way it is treated can significantly impact the outcome of therapy” (Gorman, et al., p45). Traditional behavioral couple therapy (TBCT) and integrative behavioral couple therapy (IBCT) were utilized. An infidelity questionnaire was given to nineteen couples; Two-thirds of the couples received traditional behavioral couple therapy while the remainder received integrative behavioral couple therapy (Gorman, et al., 2008). “Findings suggest that couple therapy treatment is enormously helpful and that couples with infidelity in their relationships at pretest improved as a result of therapy, and at the end of therapy were indistinguishable from distressed couples who had not identified infidelity in their dyads” (Gorman, et al., 2008, p45).

Then, discuss if the treatment was effective or ineffective in helping the couple work through the issue.

Both therapies were found to be effective. Couple therapy in general is an effective treatment option for depression (Gorman, et al., 2008). Couple therapy seemed the most effective method for treating the couple’s relationship and recovering from the marital stressors of infidelity (Gorman, et al., 2008, p55). The relationship between couples improved using couple therapy (Gorman, et al., 2008). Therapies were found to be effective not only in the United States but in other cultures as well (Gorman, et al., 2008). Acceptance, tolerance, and change were three categories that an IBCT therapist found useful techniques under. As a primary intervention of acceptance, empathic joining around a problem is used (Gorman, et al., 2008). The goal that was accomplished was to make closeness among accomplices and advance the resilience of offensive practices (Gorman, et al., 2008). A technique called unified detachment was likewise used to help accomplices in removing themselves from their concern with the goal that it very well may be examined on a scholarly instead of enthusiastic level (Gorman, et al., 2008).

Finally, explain whether or not you believe there is some other intervention that would be beneficial for this situation.

As stated in the reading, couple therapy is always effective in treating couple relationships. Many other couple therapies could have been used that the article mentioned such as Conjoint Couple Therapy and Pharmacology, Emotionally Focused Couple Therapy, Cognitive and Cognitive-Behavioral Couple Therapy. The main thing is finding out as much information at the beginning of the session to determine which couple therapy would hopefully keep the couple engaged and be helpful when trying to resolve the main issues they have. For example, I would use emotionally focused couple therapy is offhand I realize the couple is dealing with conflict, distress, and/or poor communication.

Gorman, L., & Blow, A. (2008). Concurrent depression and infidelity: Background, strategies

for treatment, and future research. Journal of Couple & Relationship Therapy, 7(1),

39–58. https://doi-org.ezp.waldenulibrary.org/10.1080/153…

Gurman, A. S., Lebow, J. L., Snyder, D. K. (2015). Clinical handbook of couple therapy. New

York, NY: The Guilford Press.

Abbasi, I. & Alghamdi, N. (2017). When flirting turns into infidelity: The

Facebook dilemma. The American Journal of Family Therapy, 45:1, 1-

14,DOI: 10.1080/01926187.2016.1277804

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I’m working on a health & medical writing question and need a sample draft to help me learn.

Reflect on what you consider healthcare to be. Briefly describe your definition of health based on your personal and/or professional experience. View Rebecca Onie’s TED Talk, What If Our Healthcare System Kept Us Healthy?, and address the following questions:

  •  Does your professional definition of healthcare change after watching this video? Why or why not?
  •  If traditional healthcare were to stray into the realm of socioeconomics as Rebecca Onie’s organization did, what effects on health delivery modelswould you anticipate? Explain.Use the journal as an opportunity to familiarize yourself with the final project requirements and case study. Journal activities in this course are private between you and your instructor. Only the instructor can view and comment on your assignments.RubricGuidelines for Submission: Your journal assignment should be 2 to 4 paragraphs in length. Submit assignment as a Word document with double spacing, 12- point Times New Roman font, and one-inch margins.
  • overview:The days of open-ended insurance plans no longer exist. Managed care insurance plans have replaced traditional insurance plans. The process of change increases the risks that a healthcare manager faces. The process of changes also raises several questions. Why do patients receive multiple bills after healthcare services are rendered? Why do patients have to pay for office visits if they already pay their insurance premiums every pay period? How do hospitals keep their doors open for decades—even over a century in many cases? Module Five will take a look behind the curtain to examine the intricate world of healthcare finance, and we will explore the answers to these complex questions.The goals and performance of for-profit organizations and not-for-profit organizations are similar. Healthcare managers need to understand the operating differences that face the organizations, such as why not-for-profit organizations are worthy of tax preferences and have the ability to seek donors and benefit the community. In this module, you will have the opportunity to explore these concepts and gain skills that are necessary in becoming an effective healthcare manager.Module Five assesses the different payment models in U.S. healthcare, provides and overview of for-profit compared to not-for-profit organizations, and takes a look at the impact and complexity of healthcare insurance. In Module Five, you will apply some of the concepts you have studied in the course thus far as you analyze your chosen public health issue for your second final project milestone. Module Six will examine how consumer behavior is influenced in the U.S. healthcare system and the impact of those behaviors on health economics.
  • https://www.ted.com/talks/rebecca_onie_what_if_our…

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I’m working on a economics multi-part question and need a sample draft to help me learn.

The Case for Incentivising Health is based on Australian data, but the challenges of combating chronic disease there are similar to the challenges present in the United States. Read the case carefully and consider the list of main considerations those working in the preventative health space could think about when developing programs, policies or interventions to change behaviors listed on page five. Address the following questions:

  •  Which of these cues do you consider to have the most impact in terms of changing healthcare behaviors of the patient?
  •  Which of these cues would you most readily respond to as a patient?
  •  Which cues do you think are most likely to be adopted by providers and insurance companies?Support your responses with examples from your own experience, the case, or references to the textbook or other scholarly sources.Use the journal as an opportunity to familiarize yourself with the final project requirements and case study. Journal activities in this course are private between you and your instructor. Only the instructor can view and comment on your assignments.RubricGuidelines for Submission: Your journal assignment should be 2 to 4 paragraphs in length. Submit assignment as a Word document with double spacing, 12- point Times New Roman font, and one-inch margins

overview:The health of a population is determined by several factors, including behavior and access to healthcare. The concepts in this module will provide an overview of social variables while introducing the inputs to health and setting a framework to measure the outcomes. The range of personal, social, economic, and environmental factors that will be presented influence and impact health status and access to quality health services.

Consumers of health services make decisions based on their personal goals and constraints. Barriers to health services include availability, cost, and insurance coverage. To incentivize the stakeholders to consume healthcare services, healthcare managers need to develop strategies to identify and mitigate barriers.

In Module Four, we will explore behavioral economic concepts used to modify behavior and improve access to health services (with consideration to providers’, payers’, and patients’ perspectives) by identifying and removing barriers to healthcare. In Module Five, we will begin discussions regarding how to finance and deliver health services in an effective and efficient manner.

http://www.aia.com.au/content/dam/au/en/docs/key_m… link to use for paper

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

In this module, you learned about some of the common attacks affecting businesses and organizations and the defenses they must put in place to reduce the risk to their systems and to any private information that should not be publicly accessed. Security controls take many forms and can be categorized into three main groups: administrative, technical, and physical controls. As you also learned, you can have a control in each group protecting the same asset, meaning you have layered your defenses.

In this activity, you will read about how First American Financial Corporation (FAF) exposed over 85 million records on its public website in 2019. Not only were these records exposed, but the company was not aware of the breach until it was notified by renowned security expert Brian Krebs.

For this week’s activity:

  • Read the case study and the articles provided in the Supporting Materials section.
  • Consider ways in which First American Financial Corporation could have proactively defended against the record breach.
  • Respond to the provided case study questions.

Prompt

Case Study: In 2019, one of the largest data breaches in history occurred when First American Financial Corporation, a real estate title insurance company, exposed over 885 million records on its public website. Included in these records was information such as Social Security numbers, bank account information, images of driver’s licenses, mortgage statements, tax documents, and wire transfer records dating all the way back to 2003. The company was not aware of the problem until it was notified by security expert Brian Krebs, an outside source.

A real estate developer outside of FAF first noticed this concern when they found that anyone who knew the URL for a valid document could then access any other document simply by changing a number in the URL. The company’s website, firstam.com, was leaking hundreds of millions of private documents not intended to be viewed by just any user. This means that any individual who had previously been emailed a link from FAF could possibly gain access to a plethora of sensitive and private documents. No authentication was required in order to access these documents, nor were they protected in any other way. This left a lot of personal and private information exposed for those with malicious intent to use in nefarious ways, for example, identity theft.

When FAF was notified of the breach, it shut down its website and immediately conducted an internal review. The initial findings noted that there was a “design defect in an application that made possible unauthorized access to customer data” (Newman, 2019). The identified defect could be referred to as a business logic flaw, which is “a category of vulnerabilities specific to an application and business domain . . . [It] allows an attacker to misuse the application by circumventing the business rules of the application” (Conikee, 2019). Only a user with an appropriate link would be able to access these documents. However, a user would not be asked to verify their identity. Therefore, access was easy and unauthenticated.

References

Conikee, C. (2019, July 26). 3 takeaways from the First American Financial breach. DarkReading. https://www.darkreading.com/breaches/3-takeaways-f…

Newman, L. H. (2019, May 24). Hack brief: 885 million sensitive financial records exposed online. Wired. https://www.wired.com/story/first-american-data-ex…

Supporting Materials

These articles will provide you with greater insight into the scenario provided and help you prepare for your response to the case study questions:

Case Study Questions

  • How did this breach occur? Briefly summarize the incident.
  • Which pillars of the CIA triad were explicitly violated, given the scenario?
  • What kinds of security controls could First American Financial Corporation have put in place to defend against this kind of data breach? Why?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I will need my initial discussion post first and then two classmates replys done on their discussion posts.

Complete the Self Assessment activity. Based on your completed skills assessment and other textbook worksheets, what field might be a good fit for you? What field might not be a good fit? Are your ideas feasible? Explain.

Note: In your discussion thread title, include your name and the title of your idea or business.

To complete this assignment, review the Discussion Rubric document.

Aimee Darwin Rental Properties is the title thread What my field might be a good fit for me was being a landlord. what field I am not good at is selling items. Yes my ideal is feasible because my husband has background in doing a small business in construction.

here is my 1st classmate response needed.

2-1 Discussion – Aliza Hunter – Cannabis Executive and Business Owner

Aliza Hunter posted Jul 6, 2021 4:28 PM

Good Afternoon Everyone!

I hope you all had a safe and enjoyable 4th of July!

After completing the skill assessments and other worksheets I found as if the field I am working towards currently is a great fit for me. I have discovered that there are many flaws within local dispensary operations as well as critical weaknesses in how they treat their current consumers. Because of our remote location, there is a considerable shortage of products available to consumers, leaving them to purchase within the black market, which is what we are trying to eliminate. Because I am a self-starter and highly motivated, I as well as my husband and close partners, are working on bringing a business plan to life, eliminating some or all these issues. I understand that this journey will take many hours and an incredible amount of responsibility to complete, ensuring future substantial growth. My past employment as General Manager in different roles and industries has assisted in understanding just what this journey entails. I have been passionate to learn critical problem-solving in my time with SNHU and feel as if I have the tools necessary to begin the process, very confident in the pursuit.

To be honest, I would like to build a nationwide company that becomes a household name. As this industry continues to grow and as federal drug schedules change and lessen, the opportunity is present to build an empire. As far as values are concerned, this journey is not about the money….my pursuit is to create a culture, within the industry, of trust and devotion, not only to our team members but to our fellow executives as well. Employees and employers will know and fully understand how their role contributes to the success and future of the business. I am a manager with a passion for the people. Employees, employers, and consumers all have needs that must be satisfied to sustain a profitable business. An open-door policy and a strict and unwavering work ethic assists me in retaining employees as well as valuable consumer growth.

Currently, production and design are complete and operational for the dispensary location and products that we will be selling to the consumer. However, we are still working on the design and operational finalization for the security and transportation services that we will also be offering within the industry in our state. This is a business that my husband and I will be primary owners of, with assistance from our partners out of Bozeman, MT. The idea is that we will offer transportation and security of cannabis products and cash throughout the state of Montana for producers and owners. Transportation of product and cash will be between the grow operation and dispensaries, where products are sold directly to consumers. We are all deeply passionate about cannabis and what producers offer to the consumer in health benefits. We also know that those very same owners and grow operators are not able to get products to dispensaries on a consistent basis because of where we are geographically. It is a long drive across the state of Montana. Because traveling across the state is ridiculously time-consuming, we would allow the owner or operators to stay and complete necessary tasks within their business model, rather than move product and be away from the office for 3 or more days a week. The most exciting thing about this business venture is that the industry will be booming once recreational sales begin in January of 2022. This service will be highly valued as long as we can price our services correctly.

As you can see from my discussion post, a position that would not be fitting would be to work for anyone else or in any other industry.

Deirdra- Physical Therapy

Deirdra Crocker posted Jul 6, 2021 11:20 AM

Hello Class,

After taking the self-assessment activity as well as completing the in-textbook worksheets the field that may be a good fit for me would be in the healthcare industry opening a more affordable Physical Therapy clinic keeping the same high-quality services. My business idea is to have a clinic that is in a gym setting, that offers rehabilitation, and performance enhancement to athletes of all ages as well as the needs of the general public. After completing the “Think Like an Entrepreneur,” worksheet I was able to see that I have the ability to see the opportunities when other’s see problems. I can see that it can become a financial burden when people aren’t able to afford the services that they require to maintain a pain-free lifestyle. I am persistent and do not give up easily on things so being able to be in a clinic and see other’s succeed and meeting their physical goals would be a success in my eyes. I can also be innovative and think outside the box this would do well in a clinic because I would be thinking of new ways and exercises to get the patient’s care delivered to them. On the “Four C’s,” worksheet after answering the questions out of the 4 categories challenges showed to be the most important to me. This is important in a clinic because all clients have their own different issues going on, and sometimes you have to think and challenge your self the best way to give them the best service to get back to a healthy state. As far as challenges a field like physical therapy could end up feeling stale and I would have to look for new ways to get the client to continue their services by going and learning new educational techniques that will allow them to improve their care as the health care field changes on a daily basis.

Overall, I think being in the health care field is a great fit for me as I always have seen myself to be helping others. One field that wouldn’t be a good fit for me would be a big corporation that is very cut-throat because I am more of a person that likes compassion. I need to understand that things go on in people’s lives. A lot of times in a big corporation the money is the bottom line not the success of the people.

I think that my ideas are feasible once I have the knowledge that I need to open my own business. I think that there are many steps that you need to know and understand to be able to put your foot in the right direction. Not only have the knowledge you would need to have the financial stability to support you to get started and to support you at the beginning of your journey. I would like to open a clinic that has a more affordable approach whether clients have insurance or not there tends to be a financial burden left behind. This can really put people into positions whether to get the services or just suffer with the pain that they are having. This really enlightens me to be able to open a clinic that not only is more affordable but also still provides the high quality of services that people should receive whether or not they have the funds to pay for it. Another great reason for these services is because in the town that I live in there is a lack of physical therapy clinics, especially ones that serve athletes. In this area in general, there are not many places that provide rehabilitation or performance enhancement in a gym setting. Overall, I think this is a feasible idea as the physical therapy market is underserved, and we would be providing lower prices with high quality and convenience with great customer service.

Good luck to everyone!

Excited to see what you’re ideas are! We are all in this together!!!

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Here is the focus for the final project:

  • How would you approach setting up the network at the new location in Fayetteville, NC?
  • What considerations are key in informing the systems and resources necessary to meet the organization’s needs and support the business goals and objectives?

Keep in mind, however, that your work for Milestone Two involves only sections III and IV of the final project. Therefore, for Milestone Two, the main goal of your report is as follows:

  • Explain key considerations for identifying an internet service provider for the new location and recommend the appropriate provider to match the business case.
  • Address considerations and make recommendations regarding hardware and software selection, printer configurations, and bandwidth that address business needs.
  • Illustrate these considerations graphically in a network diagram (using Word, Draw.io, Visio, or Lucidchart).

Prompt

  1. Internet Service Provider: This section is based on research into actual providers at the new office location.
    1. Explain key considerations for identifying an internet service provider for the new location.
    2. Compare at least two internet providers available on the basis of speed, security, and reliability.
      • Be sure to address how these specifics would impact business goals and objectives.
    3. Based on your analysis, determine the appropriate internet provider for this location to meet the business goals and objectives. Be sure to explain your reasoning.
  2. Additional Configurations: In this section, you will address the accompanying considerations for the network based on the needs of the new office location.
    1. Identify hardware and softwaresolutions to meet the needs of the new office location. Be sure to explain your reasoning.
    2. Identify a printer configurationsolution to meet the distance printing needs of the new office location.
      • This could include such printer configuration considerations as tracking devices, automating driver distribution, and controlling access.
    3. Identify bandwidth and device solutions to meet the teleconferencing needs of the new office location. Be sure to explain your reasoning.
  3. Network Diagram
    1. Include a network diagram that illustrates the recommended technical network configuration of the hardware and software, taking into account the recommended LAN topology from Milestone One. Use a diagramming tool of your choice.
      • The diagram should identify the relationships between:
        • Subnets
        • Network objects and devices
        • Routing protocols and domains
        • Traffic flow and network segments
    2. Paste the diagram into the final Word document, rather than submitting a native file from your chosen drawing application.

The following resources support the diagram work on the project:

Microsoft: Add a Drawing to a Document
As part of your proposal, you need to include a diagram. This document provides step-by-step instructions for creating drawings using the tools available through Microsoft Office. You do not have to use Microsoft Office to create the diagram, but it is an option.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Competencies

In this project, you will demonstrate your mastery of the following competencies:

  • Record and present financial information by applying the appropriate framework and guidelines of accounting for business transactions
  • Determine asset accounts and their disclosure in the financial statements
  • Determine liability and equity accounts and their disclosure in the financial statements

Scenario

You are a certified public accountant (CPA) who is working with a small bakery to prepare their financial statements for three months of the current fiscal year. Because the company is a startup and so small, the accounting is done manually in Microsoft Excel. You have been given the accounts and information you need to prepare their financial statements, but you will need to use the accounting cycle to report accurate information to the finance department. The business owners have also asked you to summarize the company’s performance based on the financial statements.

Directions

Company Accounting Workbook

Use accepted accounting principles to follow and record your business transactions for a three-month period from the first step of the accounting cycle through the reporting process. You will build on your work from Milestones One and Two to complete your workbook using the Company Accounting Workbook Template (linked in the What to Submit section).

Your completed accounting workbook will consist of journal entries for each transaction and postings of transactions to account ledgers. You will develop a trial balance from ledger balances and adjust revenue and expense accounts, as necessary, to ensure that revenues and expenses are reported in the appropriate period under the accrual accounting method. The adjusted trial balance will be used to prepare the income statement, the statement of owner’s equity, and the balance sheet. After the preparation of the financial statements, closing entries will be entered to transfer earnings to equity and prepare temporary accounts for the new accounting period.

Use the instructions below to complete your workbook.

  1. Record Financial Data: Use accepted accounting principles to accurately capture business transactions for October, November, and December using the data provided in the accounting data appendix (linked in the Supporting Materials section). You will need to address the following:
    1. Accuracy: Prepare entries that are accurate in that they fully reflect the appropriate information.
    2. Completeness: Prepare entries that are complete for each month, including transferring posted entries to T accounts.
    3. Inventory Valuation: Prepare entries for the month of December to reflect the new line of products offered by the company, which includes using the data from the “Inventory Valuation” tab of the company accounting workbook.
  2. Accrual Basis: Apply the accrual basis of accounting and prepare adjusting entries to ensure accurate accounting for expenses that lack transactions in the current period.
    1. Unadjusted Trial Balance: Prepare the unadjusted trial balance portion of the “Trial Balance” tab of the company accounting workbook, ensuring that the total debits and credits match.
    2. Adjusting Entries: Prepare the “Adjusting Entries” tab of the company accounting workbook.
    3. Adjusted Trial Balance: Prepare the adjusted trial balance on the “Trial Balance” tab, ensuring that the debit and credit totals match.
  3. Financial Statements: Create financial statements using appropriate methods based on accepted accounting principles. Be sure to prepare these financial statements in the order listed, as there are important interdependencies among them.
    1. Income Statement: Prepare the income statement using the adjusted trial balance.
    2. Statement of Owner’s Equity: Prepare the statement of owner’s equity using the adjusted trial balance.
    3. Balance Sheet: Prepare the balance sheet using the adjusted trial balance.
    4. Closing Entries: Complete the “Closing Entries” tab of the company accounting workbook by closing all temporary income statement amounts to create closing entries.
    5. Post-Closing Trial Balance: Prepare the “Post-Closing Trial Balance” tab of the company accounting workbook in preparation for the next accounting period.

Summary Report

After you have completed preparing all the financial statements, analyze the statements and write a short report summarizing your findings. Use the template provided in the What to Submit section to complete your report.

  1. Summary: Write a summary of what the financial statements indicate about the company’s financial health and performance.
    1. Purpose: What kind of information would these financial statements provide to various aspects of the business?
    2. Analysis: What is the company’s cash position, its net income as a percentage of sales, and its current liabilities to current assets position?

What to Submit

To complete this project, you must submit the following:

Company Accounting Workbook Spreadsheet
Your workbook should be completed and submitted as a Microsoft Excel file based on the template provided.

Project Summary Report Word Document
Use this template to submit a 1- to 2-page Word document summarizing the financial statements you created.

Supporting Materials

The following resources support your work on the project:

Resource: Accounting Data Appendix Word Document
This resource includes all of the existing financial information needed to complete your project.

Tutorial: Infobase Microsoft Excel Tutorial
This tutorial from Infobase provides helpful information on how to use the basic features of Microsoft Excel. Use the table of contents to select the tutorials that best suit your needs.

Project Rubric

CriteriaExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)ValueRecord Financial Data: AccuracyPrepares accurate entries with no errorsPrepares accurate entries with minimal errorsPrepares entries that have significant inaccuraciesDoes not attempt criterion5Record Financial Data: CompletenessPrepares entries that are complete for each month, including transferring posted entries to T accounts, with no errorsPrepares entries that are complete for each month, including transferring posted entries to T accounts, with minimal errorsPrepares entries that are complete for each month, including transferring posted entries to T accounts, with significant errorsDoes not attempt criterion5Record Financial Data: Inventory ValuationPrepares entries for the month of December that reflect the new line of products offered by the company with no errorsPrepares entries for the month of December that reflect the new line of products offered by the company with minimal errorsPrepares entries for the month of December that reflect the new line of products offered by the company with significant errorsDoes not attempt criterion5Accrual Basis: Unadjusted Trial BalancePrepares the unadjusted trial balance accurately, ensuring the total debits and credits match with no errorsPrepares the unadjusted trial balance with minimal errorsPrepares the unadjusted trial balance with significant errorsDoes not attempt criterion5Accrual Basis: Adjusting EntriesPrepares adjusting entries with no errorsPrepares adjusting entries with minimal errorsPrepares adjusting entries with significant errorsDoes not attempt criterion10Accrual Basis: Adjusted Trial BalancePrepares the adjusted trial balance with no errorsPrepares the adjusted trial balance with minimal errorsPrepares the adjusted trial balance with significant errorsDoes not attempt criterion5Financial Statements: Income StatementPrepares the income statement using the adjusted trial balance with no errorsPrepares the income statement using the adjusted trial balance with minimal errorsPrepares the income statement using the adjusted trial balance with significant errorsDoes not attempt criterion15Financial Statements: Statement of Owner’s EquityPrepares the statement of owner’s equity using the adjusted trial balance with no errorsPrepares the statement of owner’s equity using the adjusted trial balance with minimal errorsPrepares the statement of owner’s equity using the adjusted trial balance with significant errorsDoes not attempt criterion15Financial Statements: Balance SheetPrepares the balance sheet using the adjusted trial balance with no errorsPrepares the balance sheet using the adjusted trial balance with minimal errorsPrepares the balance sheet using the adjusted trial balance with significant errorsDoes not attempt criterion15Financial Statements: Closing EntriesCompletes closing entries by closing all temporary income statement amounts to create closing entries with no errorsCompletes closing entries by closing all temporary income statement amounts to create closing entries with minimal errorsCompletes closing entries by closing all temporary income statement amounts to create closing entries, but there are significant errorsDoes not attempt criterion5Financial Statements: Post-Closing Trial BalancePrepares the post-closing trial balance in preparation for the next accounting period with no errorsPrepares the post-closing trial balance in preparation for the next accounting period with minimal errorsPrepares the post-closing trial balance in preparation for the next accounting period with significant errorsDoes not attempt criterion5Summary ReportExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative mannerWrites a report with a summary of what kind of information the financial statements provide and what these statements indicate about the company’s financial performance, including the company’s cash position, its net income as a percentage of sales, and its current liabilities to current assets positionShows progress toward proficiency but with errors or omissions; areas for improvement may include describing the kind of information the statements provide to different business aspects, and including all relevant details about the company’s financial performance, such as the company’s cash position, its net income as a percentage of sales, and its current liabilities to current assets positionDoes not attempt criterion10Total:100%

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Having developed a definition of popular culture in the last module, this week we’re turning to how popular culture applies to you personally. This could be related to your personal experiences (such as your fandom) or things you’ve observed about those around you (for instance, how your family members interact with popular culture). Based on the module resources and your own research, write an initial post that addresses the following:

  • Describe a popular culture artifact that either you or someone around you finds especially interesting. What resonates with you about the artifact? How does experiencing that artifact help contribute to your understanding of society?
  • Share a current issue related to popular culture that you have found interesting or that has personally impacted you. Post an article from a news source. How does popular culture help you better understand this issue?

In responding to your peers, provide feedback about the examples utilized and the feedback loop being created. Are there other feedback loops being created through these examples (i.e., is there more than one message being presented)? Make sure you support your response with information from the readings, this module, and any additional resources as needed.

To complete this assignment, review the Discussion Rubric PDF document.

Rubrics

1st classmate response needed 

Pop Culture Artifact & Connection To Society

Laura Mills posted Jul 4, 2021 10:26 PM

Hello Everyone!

       Welcome to the Module 2 discussion! I hope you all had a great first week in the course, getting to know what we will be covering, along with knowing what to expect for our final project. It was great reading some of your responses and getting to know some of you, which is one of my favorite things when starting a new course. In this discussion topic, we are looking at how personally and those around us use and interact with pop culture. I am excited to read responses to this because of how different it will be for us, and I am curious to read what subjects you are fans of in your personal lives. I hope you all enjoy this discussion, and I look forward to reading your responses!

       In this discussion, we are selecting a pop culture artifact that not only we love but that we have in common with other people. I am picked Taylor Swift as my pop culture artifact because I have been a big fan of her and her music since she came out with her first song on the TV channel CMT and her first album being in the country genre. Even today, it has not changed; I am still a huge Taylor Swift fan (or Swiftie) of her, her music, and how she wants to empower others. I also love that there is at least a song someone can relate to or connect to. It could be because of something that happened to them, or they love the song. She also seems to be a humble and wholesome person, which is why I have been a fan of hers all of these years later from when she first started.

Experiencing this artifact helps contribute to my understanding of society that Taylor talks about topics that I believe hold accountability in society and bring awareness and visibility to it. For example, in an interview she did with CBS Sunday Morning in 2019, she about how there is a difference between men and women being in the music business. Specifically, saying, “A man does something, it’s strategic. A woman does the same thing, it’s calculated. A man is allowed to react, a woman can only overreact” (CBS Sunday Morning, 2019, 2:06-2:15). This sexism that she brings up in the interview is something that I feel women can relate to in daily life or even their own professional life, whether in the music business or not. My overall point is that she opens up about topics that need to be visible in present-day society topics. Topics include support and equal rights for the LGBTQIA+ community, empowerment, politics, sexism, and hypocrisy.

A current news article I found that relates to pop culture that is interesting and useful is called “Pride Month is over. Here’s how to be an ally to the LGBTQ community the rest of the year” (Yasharoff, 2021). Here is the link: https://www.usatoday.com/story/life/2021/07/01/lgbtq-community-how-to-be-an-ally-year-round-show-support-donate/7809211002/ I chose this because Pride Month did just ended and the topic of the LGBTQIA+ community is a subject that Taylor Swift discusses. It is meaningful to me because I know people and being a fan of celebrities that are also a part of this community. They deserve visibility and all the love and support, so this article plays into that aspect. 

Pop culture helps me better understand this subject that, as I stated, Pride Month gives visibility to all of these different people. Whether they are public with how they identify or whom they love or not, it is a celebration for people being their unique selves. It also helps to learn how to be a better ally, supporter, and friend to the community. Everyone deserves to have the opportunity to choose how to identify with themselves and whom they choose to love, which is what I hope people gather from reading this linked article.

I want to hear your thoughts! Do you have a favorite Taylor Swift song? If so, which one is it and why? What is something you admire/like about Taylor Swift? Is there another celebrity that you feel possesses these same traits that Taylor Swift has? 

Reference:

CBS Sunday Morning. (2019, August 25). Taylor Swift on “Lover” and haters [Video]. YouTube. https://www.youtube.com/watch?v=nDzhoofkRJI

Yasharoff, H. U. T. (2021, July 2). Pride Month is over. Here’s how to be an ally to the LGBTQ community the rest of the year. USA TODAY. https://eu.usatoday.com/story/life/2021/07/01/lgbt… 

2nd response needed

2-1 Discussion: Popular Culture and You

Michael Oglesby posted Jul 5, 2021 3:52 PM 

Hello Class,

The popular culture artifact that has really caught my interest is the television show Narcos on Netflix. Narcos is a television show on Netflix that shows the rise of the cocaine trade and stories of various drug kingpins, the biggest being Pablo Escobar. Narcos doesn’t glorify drug kingpins, it also shows all the innocent people who unfortunately get caught in the crossfire in the war on drugs. Watching this show helped give me a better understanding of the war on drugs and how many lives it has changed for the worst. One of my good friends is from Colombia and he’s told me some stories about the violence he experienced, watching the show gave me some insight as to what he was going through. 

On March 11, 2020, the NBA announced the suspension of the season because a player had caught coronavirus.  This is significant to me because I wasn’t didn’t think coronavirus was a huge issue until it actually affected something important to me. All the major sports leagues ended up shutting down and coming back a couple of months later, but sports were effectively shut down for about 3 months and sports are important to me so I was pretty disappointed. The shutdown gave me a better understanding of why I should take the coronavirus serious, and after I took the best precautions I could to protect myself.

Here is a link to an article talking more about the shutdown:

https://www.nba.com/news/coronavirus-pandemic-causes-nba-suspend-season

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Scenario Two

You are working on a project at a business communications company, which includes employees who work at the central office and at a satellite office in a different state. The team is working with clients from a health services company on a public relations (PR) campaign. Throughout the campaign, the team will produce text-based documents and visual media for the PR campaign, and then the clients will review, make suggestions for revisions, and add content as needed. Quick turnaround is needed for tasks to be completed by the entire team (employees and clients). For the past six weeks since the project started, the employees and clients have been communicating largely through email with attachments, sending documents and media back and forth for review. However, the clients have been giving mostly short replies to emails, in which requested details are missing from the replies, the communication has been misunderstood by the clients, and/or individual questions are not fully responded to by the clients. Subsequently, the project team is not working productively with the clients and milestone deadlines are being missed or not fully completed with the desired goal. How can the team (employees and clients) better communicate fully, share documents and media, and stay on task to meet project deadlines? What are the key messages to communicate to the entire team and what strategies should be used to do this?

Directions

Address the requirements below as they relate to the business communication scenario that you have chosen.

Specifically, you must address the following rubric criteria:

Summarize the business communication problem or challenge in your selected scenario (internal and external).

Explain which part(s) of the communication process model may pose a particular communication challenge for the situation described in the scenario (internal and external).

Identify and describe appropriate best practices in business communications for addressing the internal and external business problem or challenge.

Identify internal and external strategies for developing effective messaging for the situation described in the scenario.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Scenario

Organization Y has always been results-driven. The CEO of Organization Y recognizes that the organization needs to evolve to become more innovative. As a means of improving innovative thinking, gaining efficiency, and increasing revenue, the organization is undergoing a change in organizational structure.

This functionally structured organization will begin the transition to a flatarchy. This means that many employees are changing roles and gaining new responsibilities over the next few months. The climate of the organization is subject to change substantially. In times of change, leadership will look to the mission, vision, and values of the organization to provide stability and support.

While the mission, vision, and values of the organization will remain constant, it is becoming apparent that the organizational climate, specifically workforce morale, is quickly beginning to slip. As manager, you are prompted to assess changes in the organizational climate and to present a proposal to leadership outlining your plan to shape and lead the organizational climate in support of the organization’s mission, vision, and values.

Organization Y

Mission:

To serve international clients with innovative products and outstanding customer service

Vision:

To become a global leader of innovative product design

Values:

  • INTERDISCIPLINARY COLLABORATION: We support collaboration across teams in the pursuit of innovation.
  • GROWTH: We promote continuous learning and invest in our team members.
  • INTEGRITY: We forge relationships with our stakeholders built on honesty and trust.
  • COMMUNICATION: We communicate openly and clearly to create an effective organization.
  • RISK TAKING: We constantly challenge the status quo to be at the forefront of the industry.

Directions

Proposal: The climate of an organization is subject to change, whereas the culture is deep-rooted in the organization’s shared assumptions, beliefs, values, and behaviors. As Organization Y changes structures, it is becoming apparent that the organizational climate, specifically workforce morale, is quickly beginning to slip. As manager, you assess changes in the organizational climate and present a proposal to leadership outlining your plan to shape and lead the climate in support of Organization Y’s mission, vision, and values. Specifically, use the Organizational Climate Assessment Summary to address the following in your proposal to leadership:

  • Evaluate the current state of the climate.
  • Assess how the organization’s structure impacts the climate. Consider comparing the organizational structures, and discuss how each structure supports the mission, vision, and values.
  • Recommend strategies to lead a healthy organizational climate during the transition.
  • Justify your strategies by explaining how these changes will support the organization’s mission, vision, and values and impact performance.
  • From a managerial perspective, describe the additional resources you will need to maintain a healthy organizational climate during the transition. Address the following to inform your response:
    • What is the role of functional systems (HR, finance, etc.) in supporting an organization’s mission, vision, and values?
    • What key skills should employees demonstrate to support the mission and vision during the restructuring of the organization?

What to Submit

For this project, you must submit the following:

Proposal

Your proposal must be 750 to 1,250 words in length (plus a cover page and references). Cite any and all sources appropriately

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

The deployment of applications to the Web and the cloud has produced unique database challenges and solutions. Some of these solutions include the refinement of multi-tiered architectures, while other solutions include the adoption of database management systems that do not use the relational model.

For your initial post, research Web-based database technologies and identify a database management system (other than SQL Server, MySQL, or Oracle) that is used to deploy applications to the Web and the cloud. Discuss the database management system and its unique capabilities. How does the database management system differ from those used for the lab exercises and the final project? What benefits does the database management system offer to organizations that are deploying applications to the Web and the cloud?

When responding to your peers, please discuss similarities and differences of the database management system to relational database management systems. Indicate whether you agree with the stated benefits and why, as well as any additional benefits or disadvantages you associate with the database management system.

Peer Review #1

Travis Ingerson posted

Cloud hosted computing solutions offer many advantages over on-premises computing solutions. Today, there are many cloud providers for various platforms, including web hosting, application development, and database. Microsoft Azure SQL database is Microsoft’s cloud hosted relational database management system hosted in their Azure cloud. Azure SQL database offers many of the same advantages that typical cloud products can, including easier scalability and redundancy (Scherocman, 2016). One of the major benefits with scalability is allowing users who don’t have a large database need to be able to put their database in SQL databases, where previously, the large costs associated with software licensing and hardware procurement was limiting their need. Further, small and large database needs no longer have to worry about planned or unplanned downtime as Microsoft Azure cloud manages updates, as well as having redundancy that is likely not achievable for many databases.

One of the neat things with Azure SQL database, as described by Matt Scherocman (2016), is the ability to easily migrate an on-premises database to Azure cloud. Further, as noted above, one of the positive additions with cloud hosted is there are no on-premises administrative work required, as system updates no longer interrupt with planned downtime. 

Peer Review #2

Keya Leak posted

The Web-based database management system is one of the essential parts of DBMS and is used to store web application data. A web-based Database management system is used to handle those databases that are having data regarding E-commerce, E-business, blogs, e-mail, and other online applications.

Amazon Web Services (AWS) is a cloud-based platform used for building solutions for businesses using inter-connected web services. It also provides a variety of pre-built services which can benefit businesses to build their custom cloud-based solutions. AWS is trusted by many firms, small or big because of the features it provides. AWS helps companies with a wide variety of workloads such as game development, data processing, warehousing, achieve, development and many more. If you start an organization, you will need servers that will depend on your demand. AWS provides a feature which allows you to choose servers according to your choice. These AWS features will save your time, money, and potential.

Benefits:

  • AWS is designed to allow application providers, ISVs, and vendors to host your applications quickly and securely – whether an existing application or a new SaaS-based application.
  • AWS enables you to select the operating system, programming language, web application platform, database, and other services you need.
  • With AWS, you take advantage of a scalable, reliable, and secure global computing infrastructure, the virtual backbone of Amazon.com’s multi-billion-dollar online business that has been honed for over a decade.
  • Using AWS tools, Auto Scaling, and Elastic Load Balancing, your application can scale up or down based on demand.
  • AWS utilizes an end-to-end approach to secure and harden our infrastructure, including physical, operational, and software measures. 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I don’t understand this Management question and need help to study.

In your post, consider the impact of one of the following topics and how it influences safety and quality:

  • The Affordable Care Act
  • Pay for performance/value-based reimbursement
  • Meaningful use
  • Core measures
  • Joint Commission accreditation
  • CMS reimbursement requirements

Select one of the topics listed above and indicate how that factor influences safety and quality in the healthcare industry.

In responses to your peers, share if you believe their arguments are sound. Use the literature and your learnings from previous modules to support your observation.

Post 1

The CMS reimbursement requirements has greatly impact the quality of health care due to facilities receiving inadequate reimbursement for services rendered due to failure to meet the requirement. This topic has forced facilities to prioritize quality areas and change process to meet the standards for optimal reimbursement. Preventable and sentinel events are no longer covered under the CMS reimbursement guidelines, as such facilities have adopted rigorous proactive approaches versus the previous reactive approaches. The HAI was noted to be absent on admission and occurred during utilization of services. CMS also made sure the facility could not bill the beneficiary for the difference in reimbursement due to the acquired infection. According to Stone et al., (201), the Healthcare Associated Infection (HAI) affect 2 million patients per year or about 5% of acute hospital admissions. Due to the change in payments a conceptual model was adopted including provider behaviors, organization culture, and environmental factors. Each domain was noted to affect clinical outcomes and in return reimbursement for services. The CMS reimbursement requirements affected facilities’ bottom line which in turn promoted meaningful change to alter clinical outcomes and ensure quality of delivery of services.

Post 2

I am sure many of us who are in this class have nightmarish thoughts when the term “JHACO” is heard. Healthcare workers typically attempt to be off of work when JHACO tours, or hides in various nooks and crannies within the hospital. However, JHACO accreditation is associated with higher quality of care and a higher level of patient safety. It has been shown that there was significant improvements in regulatory compliance when medical centers become accredited (Alkhenizan & Shaw, 2011). To further support this, patients treated in accredited medical institutions receiver a higher amount of quality care when compare to those that were not (Alkhenizan & Shaw, 2011).

Due to the Joint Commissions enforcement of quality measures and ability to report their findings to governmental agencies, it is in their best interest, both publically and financially, to follow all of the quality measures set forth (Kobayashi, et al., 2021). 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Technology is used to build technology. You may need an integrated development environment to build software. A network simulator can be useful when planning and testing a network infrastructure design. If developing a database, a relational database management system would be necessary. Collaboration and communication tools could be needed when developing an information technology project.

Consider the tools and technologies you could use to develop your project. In your initial post, describe the tools and technologies you may use to design, implement and test your project. Provide links to any websites with information on these tools and technologies.

Then, review the tools and technologies posted by your classmates. Imagine that you were going to be tasked to assist them with their project. Based on their recommendations, do you feel that the tools and technologies are appropriate? Would you recommend anything different?

Peer Review #1

Christopher Matt posted

In the early planning stages, especially, it is inevitable that you will miss things and need to adapt and redesign. This is also a fine time to exercise out-of-the-box thinking and for valuable learning. Its only week 2, day 2 and that reality has already set in. In my case, my technology solution is in joining other technologies, or the sum of the parts, so to speak. To recap, I am building a prototype of crypto-coin miner that can be plugged into an existing car. However, a further reaching goal, following the scope of this 10-week course also revealed itself. My goal for the class is implementing the miner into a new car. The equipment I decided on for this prototype includes a 7” touch screen. I purchased a plastic stand that houses the screen, as well as the Raspberry Pi and a fan.

I learned that my power requirements were underestimated. For the project, I am running the device (Pi and screen) from a USB port you would find in a typical newer car. What I didn’t’ realize is that these ports only supply about “0.5 amp of charging power, far less than required to charge the modern smart phones” “For reference, your phone’s power bank or portable chargers are available with a power output delivery of 1 amp or 2 amp” (Shah, 2017, p. 2) The screen is still reasonably low-powered, as “one 2.5A power supply can handle a Pi and the display together” (Watson, 2017, p. 2) Regardless, the car’s integrated USB port just doesn’t provide adequate power, alone. My answer was to add a small power bank that contains a battery capable of a 16,000 mAh charge. This provides a good “buffer” that can charge from the car and supply the needed continuous output.

Another drawback of the prototype being powered off the car’s USB port is that the miner will only run while the car is turned on (the USB outlets are not powered unless the car is on) This leads to the longer-term goal I mentioned previously. For the purposes of this project, the USB port limitation is fine. However, if the miner were to be installed in a new car (gasoline or electric), the car’s integrated screen would be used instead. The screen added for the prototype is purely for display or demonstration purposes. When the car is turned off, additionally, the miner may be able to be configured to continue to run without the display as it could be wired directly into the car’s battery.

When thinking about tools needed for the project, my primary need is research. In other words, Google is my main tool. To date, the research has been constant, as new problems and challenges arise but then are solved. For example, I am leaning heavily on customizing and tweaking the Debian Linux operating system to do what is needed for a working prototype. Since I am, admittedly, a novice when it comes to electricity, I found a strong need to research power options when devising the solution described above. Resources on such topics are endless, but the challenge then becomes finding the resources that are accurate, or most applicable to the project’s needs. Finally, I will mention a underrated tool: experimentation. The Linux tweaks I mentioned do require much trial and error before the best solution is accomplished.

Peer Review #2

LaShaye Sykes posted

My project is to create an application to track the current state of a new disease for the awareness of citizens. An app that is specific to their country but can be enabled to track diseases from any country, and the proximity of this disease to a person’s home country. This application can advise people of new diseases that are not being reported yet, prevent the unknown spread of a deadly disease, equip citizens with accurate data, and facts surrounding the current state of an infectious disease.

To design the app I may use Adobe photoshop or InVision https://www.ishir.com/blog/7259/top-10-mobile-app-ui-design-tools-that-ui-ux-designers-love.htm. These would be easy-to-use tools that would provide me the ability to create phototypes or mock-ups. I could use an emulator or a simulator to test my project since I could have both a mobile app and the web app. “They are tools that are capable of emulating/simulating the behavior and working of mobile devices” (Mobile application 2019). I would have phones with different operating sytems so I can ensure that the project works across all platforms as expected. There is also the option of cloud-based testing which provides access to test the project without a real device. I would also use automated tools such as Test Complete, or Test IO which are automated tools that would help to implement and test my project https://www.testrigtechnologies.com/mobile-application-testing-tools-in-2020/. I would choose automated testing tools over manual since it would take less time, therefore, allowing me more time to focus on other tasks to make the app more efficient for users. Simply put “using test automation is the best way to reach an optimal level of test effectiveness, test efficiency, and testing coverage” (Shao, 2015).

 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Discussion: Trauma

Trauma is ubiquitous. While trauma is most commonly associated with Post-Traumatic Stress Disorder, trauma can manifest in a myriad of different ways and not every client who experiences trauma will be diagnosed with PTSD. Social workers intervene directly with trauma when working in Veteran’s services, domestic violence/sexual assault response programs, and child protective services. Social workers also work with trauma indirectly when working in mental health, substance abuse services, schools, refugee resettlement, and other forms of social service. Whether or not you are directly treating a traumatic episode as the presenting problem, trauma will be present in the clinical space. 

In this Week’s Discussion, you will demonstrate your skills related to explaining trauma and intervention to a client. This will require you explain the concepts in a manner that is understandable to the developmental and educational level of the client. No need to solicit a volunteer to assist you. Position yourself as though the client is directly behind the camera lens. The goal is to show, not tell. In other words, you are expected to demonstrate rather than discuss your skills. You should role-play as if you were speaking directly to a client.

By Day 3

(*Just need script for video) Submit a 4-5 minute video demonstrating your skills. In the role-play: 

  • Ask one question that you would use to elicit information about a client’s trauma experience. [Assume a response and move to the next part of the skill demonstration]
  • Explain to the client the effects of trauma generally and how trauma may be affecting the client specifically.
  • Explain to the client what intervention(s) you would recommend and why.
  • Explain the role you would take in any intervention given your scope of practice and to whom you would refer the client for additional intervention.

Include a transcript and/or edit closed captioning on your video to ensure your video is accessible to differing abilities. 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer


Overview

Working capital management is critical to an organization’s ability
to meet its short-term obligations. When proposing new projects or
investment ideas for corporations, it is critical to consider working
capital red flags such as excess credit use by the business or a low
cash balance. Managing such issues early on can help corporations
acquire a competitive advantage in the marketplace.

Prompt

Using the business you selected for Project Two, complete the
calculations for determining working capital, and describe their
relevance in assessing financial health.

Specifically, you must address the following rubric criteria:

  • Financial Statement(s): Explain the various
    financial statement(s) needed to calculate a business’s working capital
    and how each financial statement is used. Provide examples to support
    your claims.
  • Working Capital’s Role: Discuss how effective working capital management supports a healthy business.
  • Working Capital Interpretation: Use the appropriate formula to calculate working capital, then discuss the business’s current financial liquidity position.
    • For example, does the business have sufficient working capital on
      hand to address bills to suppliers? Will there be potential cash inflow
      at the end of the year?
  • Working Capital Management Direction: Discuss the current direction of the business regarding working capital management.
    • Keep in mind that financial statements reflect a specific moment or
      period of time and the value of the business’s working capital during
      that period. To get a better understanding of the direction in which a
      business is going, use the business’s balance sheets from Mergent Online
      to compare the business’s value today against its value from one year
      ago.

Guidelines for Submission

Your submission should be a 2 to 3-page Word document with 12-point
Times New Roman font, double spacing, and one-inch margins. Any sources
should be cited according to APA style.

Module Five Activity Rubric

Criteria

Proficient (100%)

Needs Improvement (70%)

Not Complete (0%)

Value

Financial Statement

Explains the various financial statement(s) needed to calculate a business’s working capital and how each statement is used

Shows progress toward

proficiency, but with errors or omissions; areas for improvement may

include explaining in more detail the various financial statement(s)

needed to calculate a business’s working capital and how each statement

is used

Does not attempt criterion

15

Working Capital’s Role

Discusses how effective working capital management supports a healthy business

Shows progress toward

proficiency, but with errors or omissions; areas for improvement may

include discussing in more detail how effective working capital

management supports a healthy business

Does not attempt criterion

20

Working Capital Interpretation

Uses the appropriate formula to calculate working capital and discusses the business’s current financial liquidity position

Shows progress toward

proficiency, but with errors or omissions; areas for improvement may

include discussing in more detail the business’s current financial

liquidity position or using the appropriate formula to calculate the

working capital

Does not attempt criterion

20

Working Capital Management Direction

Discusses the current direction of the business regarding working capital management

Shows progress toward

proficiency, but with errors or omissions; areas for improvement may

include discussing in more detail the current direction of the business

regarding working capital management

Does not attempt criterion

25

Articulation of Response

Clearly conveys meaning with correct

grammar, sentence structure, and spelling, demonstrating an

understanding of audience and purpose

Shows progress toward

proficiency, but with errors in grammar, sentence structure, and

spelling, negatively impacting readability

Submission has critical errors in grammar, sentence structure, and spelling, preventing understanding of ideas

20

Total:

100%

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Discussion: Theory Integration

Theory implementation highlights the situations you encounter that may necessitate the integration of other theories into your main theoretical orientation. Personal experiences, within your own past relationships, may sensitize or desensitize you to the relational issues presented by clients. The key, then, is recognizing the challenges to integrating theory and knowing how to mitigate these challenges in order to provide the best and most effective service to clients. However, always keep in mind that retaining professional integrity concerning your theoretical orientation is necessary.

To prepare for this Discussion, select one of the theories demonstrated in the videos this week (either Bowenian or structural) to use for this Discussion

.https://waldenu.kanopy.com/video/bowenian-family-t…

By Day 4

Post a brief description of your personal lens in treating couples and the theory you selected from the videos. Then, provide an explanation of one challenge you may encounter if you attempted to integrate the theory you selected with your lens of couples counseling in your professional practice. Then, explain how you might mitigate this challenge. Be specific.

Be sure to support your postings and responses with specific references to the resources.

Read a selection of your colleagues’ postings.

By Day 6

Respond to two of your colleagues’ postings and explain how your colleagues’ posts might help you refine and inform your own theoretical orientation.

Select and respond to a colleague who selected a different theory and title your posting as follows: “Integrating [X] theory into [Y] theory”

Colleague 1: Khalila

Post a brief description of your personal lens in treating couples and the theory you selected from the videos.

With Structural Family Therapy, Aponte analyzed how the structure of the relationship between family members impacts the challenges that the system experiences. He stated that structure is influenced by the member’s culture and values, the factors that mean most to them (Psychotherapy.net). To effectively assist a family using this theory, the professional must be able to apply and transform the knowledge from the theoretical frameworks to be able to relate on a personal level with their client while fulfilling your professional role.

My personal lens in treating families is to teach and encourage the individuals to compromise. Families are composed of individuals, who may share the same values but had different experiences, uniting (German, Lebow & Snyder, 2015). These differences shapes thoughts and behaviors which can lead to disagreements. These disagreements can escalate to more serious problems if not addressed appropriately. Aponte stated that change must take place to overcome challenges. Compromising can be this effective change to improve the structure of the relationship.

Then, provide an explanation of one challenge you may encounter if you attempted to integrate the theory you selected with your lens of couples counseling in your professional practice.

As I try to relate to my clients, a challenge may present itself if I relate more to one member than the other. Relationship structure between family members is composed of individual’s roles and boundaries with one another (Psychotherapy. net). When assisting a family, I may agree more with one member. By doing so, this also does not encourage the members to comprise because I may not agree that one member is contributing to the presenting problem. Lack of awareness can lead to “favoritism”. In family and couple therapy, the professional should not choose sides (Williams, 2012). Professionals should intervene to help the family structure improve. To effectively intervene, the therapist analyzes what/who influences the problem and decides whether to challenge or reinforce this influence to address their current problem (Psychotherapy.net). To compromise, I must challenge areas that need improvement while also reinforcing strengths/ positive attributions of each member.

Then, explain how you might mitigate this challenge. Be specific.

I might mitigate this challenge by increasing my self-awareness. I will remind myself of the role that I have when working with families and groups. In addition, I will actively engage and relate to all the members to help them fully understand the conflict and what has influenced it. For instance, if a family is experiencing financial problems and one member continues to spend excessively, I can ask questions to learn why that individual continues to spend. He/she may work a stressful job and like to treat themselves. By relating to the need to reward yourself as a method of self-care, I can also help both members identify strategies to compromise while still fulfilling self-care needs and financial boundaries. Utilizing open-ended questions can encourage the members to also talk to one another about their issue in a safe environment, free of judgment. These conversations, facilitated by the professional, can result in changed behaviors (German, Lebow & Snyder, 2015). This method of intervening can enhance the relationship structure between the family.

References

Gurman, A. S., Lebow, J. L., Snyder, D. K. (2015). Clinical handbook of couple therapy. New York, NY: The Guilford Press.

Psychotherapy. net . Structural family therapy – With Harry Aponte. (n.d.). https://waldenu.kanopy.com/video/structural-family-therapy.

Williams, M. (2012). Couples counseling: A step by step guide for therapists. Boston, MA: Viale Publishing.

Colleague 2: Diana

A brief description of your personal lens in treating couples and the theory you selected from the videos.

Harry Aponte explains that structure is fundamental to all systems, it explains human relationships and how we need to structure to understand people, which in return helps to understand family dynamics (Psychotherapy.net, n.d.). I selected the Structural Family Therapy (SFT), which helps to understand the function of the family. For instance, SFT can be used to breakdown emotions and different behaviors from children, to parents, and any other identified family member. According to Gurman, A. S. et al. (2015), family is depicted as a system that comprises “subsystems”, which arise in families because of differences (eg. generational differences)

Provide an explanation of one challenge you may encounter if you attempted to integrate the theory you selected with your lens of couples counseling in your professional practice.

SFT is used as a tool to breakdown and better understand families and how they function. A challenge that may be encountered utilizing this theory is that the “couple” is not full focus. Studies suggests that when structural theorists consider couple functioning, they do so after having first articulated a view of family functioning (Gurman, A. S. et al., 2015). The couple is not viewed as the family; therefore, it is not primary for this theory. Based on Gurman et al. (2015), the couple is viewed as a family subsystem, no more and no less, and assessment of how well or poorly a couple is functioning is based on the theory’s notion of what constitutes adaptive functioning for all family subsystems.

Explain how you might mitigate this challenge.

From a personal perspective, to mitigate this challenge, as the social worker, it is my responsibility to inform the clients the nature of the service that they are receiving and educate them on how the SFT is designed to function. Social workers have responsibility to explain the nature of the relationship/service when working with couples as well as explain roles.

Reference:

Gurman, A. S., Lebow, J. L., Snyder, D. K. (2015). Clinical handbook of couple therapy. New York, NY: The Guilford Press.

Psychotherapy.net. (Producer). (n.d.). Structural family therapy [Video file]. [With Harry Aponte, LCSW]. United States: Psychotherapy.net.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

For this week’s activity, you will explore IT careers that relate to system requirements and implementation planning.

For your initial discussion post:

  • Select three possible careers that relate to system requirements and implementation planning.
  • Discuss what those roles are and how they relate to the concepts taught in this course.
  • Explain what you may or may not like about those roles.

In your response to your peers:

  • Discuss whether or not you are interested in the same roles.
  • Explain what kind of skills you think would be needed to excel in those professions. 
  • You can also explore the internet and such career websites as O*NET OnLine, CareerOneStop, and Dice. After you’ve discussed your career exploration with your peers, you might also want to become familiar with CompTIA certifications

POST 1

Hello class,

Three possible careers that relate to system requirements and implementation are a implementation specialist, software engineer, and system analyst. All careers seem to be interesting to me because it involves understanding technology and computers. Implementation specialist is a person that helps companies tailor purchased software to a business needs and customizing it. A software engineer is someone who designs software by understanding the companies needs and wants, as well as deciding what is needed to complete the tasks. Finally a system analyst looks at existing systems for companies and helps point out bottle necks or problems that can be solved to make a company run smoother.

All of these jobs use concepts taught in this class whether it be a system requirement specification document, flow charts, or even a system test plan. These documents make each of these jobs easier to accomplish in a organized manner. I would enjoy each of these jobs because the work would be different for each and every project no matter what job I took. I also like the idea of creating something new for companies or fixing existing systems because it leads to a job well done.

System analyst

https://www.bls.gov/ooh/computer-and-information-technology/computer-systems-analysts.htm

implementation specialist

https://www.zippia.com/implementation-specialist-jobs/

POST 2

Hello to all,

For this discussion we are asked to do the following,

  • Select three possible careers that relate to system requirements and implementation planning.
  • Discuss what those roles are and how they relate to the concepts taught in this course.
  • Explain what you may or may not like about those roles.

Systems Engineer:

According to Indeed, systems engineers are responsible for overseeing all aspects of a project or a system. Their job requires them to develop a system that creates a product from the beginning to the end. (Indeed, 2021). The systems engineer relates the to the concepts taught in this course because people in this field deal with designing and implementing systems, ensuring security, and monitoring system components. The description and the duties of this job are what we are currently learning about in this course. I believe that I would like this role. What I like about this role is that I will be designing and implementing systems. I have found an interest in the responsibilities of the systems engineer and from this course.

Requirements Analyst

The role of a requirements analyst would be to determine the needs of a project. They would be dealing with managers, stakeholders, and software development teams. The responsibilities of a requirements analyst include analyzing requirements for a project, and to determine how to create a system that can be implemented by developers (ZipRecruiter, 2021). This position is relative to the concepts taught in this course because we have learned about system requirements, this position would be part of the implementation team and the requirements analyst would be part of creating and implementing the system. I do not think this would be a job that I would be interested in because I do not want to be part of the planning team, I would much rather be part of the developing team in a project.

Implementation Analyst:

The implementation analyst is responsible for lending help on setting up computer systems and software. According to study.com, they may be responsible for assessing the technological needs of a company and determining which software and hardware they should use for their system. This position relates to the course because like the systems engineer and the requirements analyst, there are many positions to be filled for a system implementation. This position would oversee the system components to determine that the system would produce the expectations of a company. I would not be interested in this position because like I mentioned earlier, I would much rather be part of the developing team.

References

Indeed (2021)., “Learn About Being a Systems Engineer”

https://www.indeed.com/career-advice/careers/what-does-a-systems-engineer-do

Study.com (2003-2021)., “Implementation Analyst: Job Description & Salary”

https://study.com/articles/implementation_analyst_job_description_salary.html

ZipRecruiter, Inc. (2021)., “What Does a Requirements Analyst Do?”

https://www.ziprecruiter.com/e/What-Does-a-Requirements-Analyst-Do

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

6-1 Discussion: Data Breach

Previous Next 

In this blog post, The Capital One Data Breach: Time to Check Your Credit Report, the author discloses that 100 million Americans and 6 million Canadians were affected by this most recent, highly publicized data breach. With reports of such malicious breaches in security becoming more and more prevalent, the susceptibility for threat has become a high priority among organizations and security experts in assessing risks and vulnerabilities.

For your initial post, consider the growing number of highly sophisticated and targeted attacks of late. For this post, consider what causes a data breach, what methods are used to breach, and the ways in which a breach could be prevented.

  • Are there any measures that are too extreme?
  • Do we halt all bring your own device (BYOD) programs in the workplace—even cell phone usage?
  • To what lengths should an employer go to protect their customers?
  • How can you justify this decision?

In your response to your peers, provide thoughtful feedback to their posts. Explain why you agree or disagree with their positions and provide an additional justification that supports your reasoning.

https://www.consumer.ftc.gov/blog/2019/07/capital-…

POST 1

Data breaches can occur for a number of reasons. They can be caused by peoples’ habits to flaws and misconfigurations in computer systems. They can be carried using a number of different methods such as malware or phishing scams. There are many ways that a data breach can be prevented. The first thing to do is to ensure that all employees are trained in security best practicies. This should help eliminate issues that could arise from human habits. It is also importatn to make sure that all systems are configured correctly and that they are patched with latest updates regularly. It is also important to design and develop security policies that can be implemented. It is important to know that any security measure introduced should not make the system unusable. The goal is to strike a balance between security and usability.

BYOD programs can make productivity better, but it comes with security issues. Despite the security concerns, there is no reason to halt any BYOD program. It is important to develop a BYOD policy that protects the security of the systems it is accessing and the data it is trying to access. It is important that an employer does everything to protect their customers’ data. They should be willing to spend money to ensure their systems are secure and that their employees are following the best practicies. Those who do not follow the policies in place should be held accountable. It is important to maintain the security of the customers’ data because if a data breach occurs it could hurt the company’s reputation. This could lead to customers not wanting to trust the company any more. It could also affect the financial bottom line of the company.

POST 2

When it comes to data breaches it really isn’t a matter if they are going to happen. Its more a matter of when and how. Unfortunately, this is the reality we live in today. But even with the best cyber security solutions put in place there will always be a way for someone to get in. This is due to humans without properly trained employees a company will always be at risk. Humans have always been the weakest point in any cyber security solutions. This is why companies spend millions of dollars every year to train their employees on what to look out for and best practices while using a computer. On this note I don’t really think there any measures cyber security that are too extreme. To clarify this statement, I think there is definitely some companies that require more security than others. For example, the department of defense will have way more extreme solutions in place then say your local coffee shop. Cyber security measures are not cheap to implement and having “extreme” measures in place would have to look at on a per company basis.

In terms of not allowing employees to bring their own devices into work I think this can go either way. Like stated above if an employee’s place of work if your local coffee shop then I would say no they should be allowed to bring their cell phone to work. However, if you work in pentagon or in a datacenter for a major IT company, I will say that employees should have to leave their personal belongings at the door. This is murky waters though because some people will argue that this a breach in their rights and that they should be allowed to carry their cellphones around use then if they like. However, if a company like capital one has a breach again like they had that could put them out of business. So once again I would have to say putting a halt on BYOD would have to be once again would have to looked at on a per company basis.

I am a firm believer that if a company should protect their customers data with everything they have. We as consumers make purchase based off of the merit a company holds in society. I am the type of consumer who will pay extra money to shop from a company who I know has great customer service and good track record when it comes to keeping their customers information safe. Hence why I do not think there is any real extreme in this situation either. The justification here customers trust and pay for a company’s service and if that service involves them housing a customer’s personal information. It is that company’s job to keep that data out of the hands of people it does not belong too.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

One of the greatest risks to information security within an organization is its employees. The importance of user education, training, and awareness surrounding information security is becoming more prevalent. Organizations of all sizes are enacting and updating their training programs for employees and staff concerning personal accountability in maintaining security posture. Depending on the industry, legal or regulatory compliance may require annual information security training sessions. This is the case for the Department of Health and Human Services (HHS). They have to ensure that 100% of their internal employees and contractors receive annual cybersecurity awareness training. Some organizations break down their training materials by role, whereas others do not. The HHS has included both role-based training and general cybersecurity training meant for all employees, despite their assigned roles.

For this week’s discussion, first select one of the following lessons found within the HHS Cybersecurity Awareness Training program. To access this resource, click on Cybersecurity Awareness Training under Training Courses. This will not open a new tab in your browser. On the fifth slide, you will find the various lessons to choose from:

  • Lesson 1: Cybersecurity
  • Lesson 2: Securing Information
  • Lesson 3: Social Engineering
  • Lesson 4: Breaches and Reporting

Next, complete the lesson. In your initial post, address the following:

  • Name and briefly summarize the lesson you completed.
  • Recommend an additional deliverable to reinforce this training program and explain why you chose it.
    • For example, monthly newsletter, incentive program, etc.
    • You do not need to create this deliverable; only make a recommendation.

In response to two of your peers, answer the following:

  • Would your peers’ recommended deliverable appeal to you as an employee? Why or why not?
  • Do you think any elements were missing from the lesson your peer reviewed? Explain.
  • i will post the two peer post in another post.i need the original post to be a couple of paragraphs. I also need the peer responses to be roughly a paragraph each

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

The B&K Real Estate Company sells homes and is currently serving the Southeast region. It has recently expanded to cover the Northeast states. The B&K realtors are excited to now cover the entire East Coast and are working to prepare their southern agents to expand their reach to the Northeast.

B&K has hired your company to analyze the Northeast home listing prices in order to give information to their agents about the mean listing price at 95% confidence. Your company offers three analysis packages: one based on a sample size of 100 listings, one based on 1,000 listings, and another based on a sample size of 4,000 listings. Because there is an additional cost for data collection, your company charges more for the package with 4,000 listings than for the package with 100 listings.

Bronze Package – Sample size of 100 listings:

  • 95% confidence interval for the mean of the Northeast house listing price has a margin of error of $24,500
  • Cost for service to B&K: $2,000

Silver Package – Sample size of 1,000 listings:

  • 95% confidence interval for the mean of the Northeast house listing price has a margin of error of $7,750
  • Cost for service to B&K: $10,000

Gold Package – Sample size of 4,000 listings:

  • 95% confidence interval for the mean of the Northeast house listing price has a margin of error of $3,900
  • Cost for service to B&K: $25,000

The B&K management team does not understand the tradeoff between confidence level, sample size, and margin of error. B&K would like you to come back with your recommendation of the sample size that would provide the sales agents with the best understanding of northeast home prices at the lowest cost for service to B&K.

In other words, which option is preferable?

  • Spending more on data collection and having a smaller margin of error
  • Spending less on data collection and having a larger margin of error
  • Choosing an option somewhere in the middle

For your initial post:

  • Formulate a recommendation and write a confidence statement in the context of this scenario. For the purposes of writing your confidence statement, assume the sample mean house listing price is $310,000 for all packages. “I am [#] % confident the true mean . . . [in context].”
  • Explain the factors that went into your recommendation, including a discussion of the margin of error

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Discussion 1: Group Leadership Skills

Leading a group of individuals who have suffered trauma can be difficult because the shared stories may result in further trauma to some of the members. Assessing the members and deciding how they will introduce themselves at the first meeting can be a difficult task. Helping these members begin the group therapy process is the first step in facilitating the group.

For this Discussion, watch the video of the “Levy” group session.

By Day 3

Post your evaluation of the group’s social worker’s leadership skills, using at least two items from each of the three categories found in the Toseland & Rivas (2017) piece (facilitation of group processes, data gathering and assessment, and action). Suggest another way the social worker might have initiated the group conversation.

By Day 5

Respond to two colleagues who discussed a different leadership skill. Explain the importance of building these skills and how they relate to facilitating the group process.

Colleague 1: Caneisha

Facilitation of group processes

As a facilitator, one must display listening skills while facilitating group. In my observation, I observed the facilitator being mindful and acknowledging the emotions and feelings of each group member. The facilitator displayed active listening skills. Active listening skills was illustrated through the effect of the facilitator. Nodding of the head, emotion of understanding through the eyes, hand gestures, and repeating what the group participate stated. Effective attending skills include repeating or paraphrasing what a member says and responding empathically and enthusiastically to the meaning behind (Toseland & Rivas 2017). The group facilitator acknowledges each group member feelings. An example was after one group member was attacked verbally by another group member. The facilitator allowed conflict within group members to occur while ensuring the conflict does not intensify. The facilitator allowed group members to compare similarities amongst selves to allow group members to convey emotions and feelings. The facilitator allowed members to express their feelings and responded appropriately making sure not to let them escalate into the point of arguing. In facilitating group processes contribute to positive group outcomes when they improve understanding among group members, build open communication channels, and encourage the development of trust so that all members are willing to contribute as much as they can to the problem on which the group is working (Toseland & Rivas 2017).

Data gathering and assessment

Data-gathering and assessment skills are useful in developing a plan for influencing communication patterns as well as in deciding on the action skills to use to accomplish the group’s purposes (Toseland & Rivas 2017). The facilitator collected thoughts, feelings, and behaviors of each group member. After group member spoke, she thanked them for sharing their story. The facilitator responded by observing the actions of each group member. According to Toseland & Rivas (2017), the skills of identifying and describing a situation are essential to workers’ attempts to gather data by requesting information, questioning, and probing. Using these skills, workers can clarify the problem or concern and broaden the scope of the group’s work by obtaining additional information that may be useful to all members (Toseland & Rivas 2017). The facilitator gathers more data by my observation of asking group members questions. The facilitator included questioning and probing for each group member. For example, when Jake made a joke about purchasing alcohol, she inquired if he finds his self-drinking more alcohol than what he normally drinks. In addition, the facilitator engaged group members in identifying personal thoughts, feelings, and behaviors. The facilitator acknowledges group members trauma that was experienced while serving in the military. The facilitator expressed wanting to allow group members to discuss how they are adjusting back into civilian life.

Action

Group members through my observation were encouraged to express thoughts by providing them the opportunity to publicize their concerns. The facilitator used personal testimonies of group members by soliciting their opinions and by responding accordingly. The facilitator displayed empathy for the challenges the group members have faced from being deployed. This was and is an important factor. The group members will be given the opportunity to feel understood and heard. I believe as a facilitator, this is very important while conducting group. In acknowledging the feelings and emotions of group members, the facilitator was able to allow each group member to feel heard and understood. Each group member was permitted the opportunity to express their feelings and feel validated at the same time. Each group member through the actions of the facilitator, each group member was able to process personal experienced trauma.

Alternative to initiate the group conversation

Another way the social worker could have initiated the group conversation would be to allow group members to express their reason for being there and how they feel they can benefit from the group therapy. This will act as a guide to the direction of the group. The group can express and feel apart of the group. The group members will feel a part of the progress and process of the group. The group members will feel they are apart of the group and not just a participate of the group. To better explain this statement, the group members will feel that they are the ones who have created the group.

Reference:

“ References: Laureate Education. (Producer). (2013d). Levy (Episode 6) [Video file]. In Sessions. Baltimore, MD: Producer. Retrieved from https://class.waldenu.edu

“ Toseland, R. W., & Rivas, R. F. (2017). An introduction to group work practice (8th ed.). Boston, MA: Pearson. Chapter 4, “Leadership” (pp. 97-134). Chapter 5, “Leadership and Diversity”

Colleague 2: Danielle

Happy week 6!

I hope everyone is having a great start to their week. It has been horrible weather here in Rhode Island. We have had lots of rain with cooler temperatures. I am ready for fall, but I am not ready for snow quite yet. In working at the hospital, we don’t have a choice we have to be here for our patients and provide the best possible care despite the weather.

I really enjoyed this week’s material because it was information that not only will apply when we are working within group facilitation but also with anything in our life. We are often going to be part of a team or group when working in our role as a clinician. For example, I work often with two separate teams I have the primary care clinic where I am the only social worker here, but I am also on the social work department team which is made up of about 28 clinicians throughout the hospital bother master’s Level and bachelors.

Facilitation of Group Processes

In working to evaluate the group’s social worker’s leadership skills within the facilitation of group processes I want to highlight working to involve group members and focusing on group communication. Our textbook works to outline that all members should be involved and interested in what is being discussed within the group (Toseland, Rivas, 2017). This facilitator did a fantastic job at working to engage all members and everyone seemed to be receptive to the items in which they were speaking. To involve group members this also means that we must take the lead and continue to facilitate throughout the process (Toseland, Rivas, 2017). We also want to work to empower our patients to feel comfortable with understanding they should feel comfortable to speak and this is a safe space for them to share their thoughts & feelings (Toseland, Rivas, 2017).

From personal experience it can become difficult to facilitate groups. This morning on my way into work I was speaking with my friend who will be facilitating a group later this week for observation for her course. A specific item that we brought up was the difficulties that surround working to ensure your group members are engaged, sticking to the topics of discussion, and wanting to be there. As social workers or any facilitator it is important that we are quick on our feet and understand that not every group will be run the same way. That’s totally okay! No group should be the same simply due in part to the participants everyone will provide different contributions.

Data Gathering and Assessment

In the video of facilitation with the group within the data gathering and assessment portion of the social worker we can see that these are useful in working to influence the communication patterns and decide how to move forward (Toseland, Rivas, 2017). In this section the two items in which I observe from the social worker is working to identify, describe thoughts, feelings and behaviors in addition summarizing and partializing information (Toseland, Rivas, 2017). The facilitator works to gather data (not shared) by asking the individuals questions. The questions are used to keep the facilitation of conversation going but as a facilitator you can know and understand if a question negatively impacts the flow of conversation or continues to promote healthy conversation.

Action

Throughout my observation group members were encouraged to discuss and express their thoughts by providing them the opportunity to each individually speak if they so choose. It was understood that this was a safe space that individuals could speak. I have mentioned this previously, but it is vital that as a facilitator or group leader that you work to understand each group member, how the group functions, and continue to keep the conversations going. These are actions that as social workers we aren’t going to know how to facilitate over night, but we will learn! As we continue to practice these skills, we will get better at honing our craft.

Suggest another way the social worker might have initiated the group conversation.

I think that another way in which the social worker could have initiated the conversation would welcome everyone to the group and say thank you for attending. Next, you will take time to introduce yourself to the group, and maybe share a fun fact about yourself to alleviate the group from thinking you might be better than them. In running inpatient groups at a residential treatment facility while I am someone who has never been in treatment themselves or understand life of addiction from that standpoint it was beneficial for the clients to see and understand I am still a person. In addition, it allowed the group members to feel like they were part of all aspects vs. me just working to ask them who they are, and why they are here.

References:

Laureate Education. (Producer). (2013d). Levy (Episode 6) [Video file]. In Sessions. Baltimore, MD: Producer. Retrieved from https://class.waldenu.edu

Toseland, R. W., & Rivas, R. F. (2017). An introduction to group work practice (8th ed.). Boston, MA: Pearson. Chapter 4, “Leadership” (pp. 97-134). Chapter 5, “Leadership and Diversity”

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

I will need my initial post and two classmate responses done.  

Visit the website and read about business ideas that have failed. Think about why it is so important to screen a business idea before you complete a feasibility analysis; write a business plan; and spend a lot of time, energy, and money. Choose one failed venture and explain why, in your opinion, simple screening could have saved the entrepreneur from failure.

https://www.businessinsider.com/33-startups-that-d…

In your response to other posts, comment on their opinions. Do other students’ posts reveal new reasons to screen ideas?

To complete this assignment, review the Discussion Rubric document.

1st classmate response needed

2-1 Discussion: Why Screen Ideas?

Andrew Morrison posted Sep 9, 2021 4:53 PM

Hey Class, 

     The company that I chose to focus on for this discussion is Xmarks (failure #9) which started as a Firefox extension but then later spread to Microsoft’s Internet Explorer, Apple’s Safari, and Google’s Chrome. The extension let people synchronize their bookmarks, passwords, and open tabs. The company was founded by Mitch Kapor in 2006 as Foxmarks but was later renamed Xmarks after being acquired by Lastpass in 2010. In 2018, Lastpass announced that the Xmarks service would be shut down permanently. 

    Mitch Kapor had a great idea and had plenty of consumers that wanted and used his product. The product was really popular but the reason Xmarks failed was that they couldn’t find a way to make a profit. Xmarks offered the synchronization service for no charge, predicated on the hypothesis that a business model would emerge to support the free service. This never happened and so Xmarks shut down because they couldn’t pay the expenses that came with running a business. 

     This is the reason why it is so important to screen an idea before doing anything and they should have figured out a way to make a profit before launching their business idea. Your business will not last if you can’t make money to pay the bills and Xmarks thought that they could find a way to turn a profit but instead failed. If they would have screened their business idea before putting in all this work, they would have realized that there was no plausible way to make a profit. 

Andrew Morrison

References

Kingsbery, J. (2013, June 29). 33 startups that Died reveal why they failed. Business Insider. Retrieved September 9, 2021, from https://www.businessinsider.com/33-startups-that-died-reveal-why-they-failed-2013-6?op=1#failure-10-we-made-deadly-cultural-and-strategic-mistakes-10. 

Shankland, S. (2010, September 28). Xmarks shutting down bookmark sync service. CNET. Retrieved September 9, 2021, from https://www.cnet.com/news/xmarks-shutting-down-bookmark-sync-service/. 

2nd classmate response needed

2-1 Discussion: Why Screen Ideas?

Edward Carmichael posted Sep 9, 2021 8:45 PM 

The failed business idea I will pick is number 1 the condom key chain. I think this business failed because it was a bad idea. I believe this failed at the business plan level. They did not develop a strategy for selling the Condom key chain. The following should have been researched.

  1. Competitive Advantage: First you have to find out if you are selling something that everyone wants. They should have surveyed to see if people would buy the condom key chain.
  2. Understanding the Market:  Having the ability to listen and keep your customer in mind. Not just selling a product because you think it is a good idea. Also, I think that if this company had partners they were the wrong ones.
  3. Wrong Choice of business: Do not open a business because you think it is an easy way to make money. Do the research using consumer reports. And have a professional presentation, using a skilled word set and a good selling pitch.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

You are a software engineer for Grand Strand Systems, a software  engineering company that focuses on developing and testing back-end  services. You recently completed an assignment in which you developed a  mobile application for a customer and delivered the contact, task, and  appointment services (Project One).

You will now construct a summary and reflections report to be  submitted to your supervisor that summarizes your unit testing approach,  your experience writing the JUnit tests, and the overall quality of  your JUnit tests. This report will also highlight testing techniques and  the mindset you adopted while working on this project.

Directions

Summary and Reflections Report
Your supervisor  has asked that you submit a follow-up summary and reflections report to  explain how you analyzed various approaches to software testing based on  requirements and applied appropriate testing strategies to meet  requirements while developing the mobile application for the customer.  This report should be based on your experience completing Project One.  You must complete the following:

  1. Summary 
    1. Describe your unit testing approach for each of the three features. 
      1. To what extent was your approach aligned to the software requirements? Support your claims with specific evidence.
      2. Defend the overall quality of your JUnit tests. In other words, how do you know your JUnit tests were effective based on the coverage percentage?
    2. Describe your experience writing the JUnit tests. 
      1. How did you ensure that your code was technically sound? Cite specific lines of code from your tests to illustrate.
      2. How did you ensure that your code was efficient? Cite specific lines of code from your tests to illustrate.
  2. Reflection 
    1. Testing Techniques 
      1. What were the software testing techniques that you employed in this project? Describe their characteristics using specific details.
      2. What are the other software testing techniques that you did not use for this project? Describe their characteristics using specific details.
      3. For each of the techniques you discussed, explain the practical uses and implications for different software development projects and situations.
    2. Mindset 
      1. Assess the mindset that you adopted working on this project. In acting as a software tester, to what extent did you employ caution?  Why was it important to appreciate the complexity and  interrelationships of the code you were testing? Provide specific  examples to illustrate your claims.
      2. Assess the ways you tried to limit bias in your  review of the code. On the software developer side, can you imagine that  bias would be a concern if you were responsible for testing your own  code? Provide specific examples to illustrate your claims.
      3. Finally, evaluate the importance of being disciplined  in your commitment to quality as a software engineering professional.  Why is it important not to cut corners when it comes to writing or  testing code? How do you plan to avoid technical debt as a practitioner  in the field? Provide specific examples to illustrate your claims.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

2-1 Discussion: Data Gathering Methods

Available on Saturday, September 4, 2021 8:59 PM PDT

Subscribe

How often do you take the time to rate your experience when playing a game on your phone or tablet? Do you always go online to complete the survey at the bottom of the receipt you received at the store or restaurant you visited last week? If you are like most people, you probably do not have the time or interest needed to complete all of the surveys or other data gathering activities that you encounter throughout your day.

In the module resources, you read about a variety of data gathering methods and when each would be appropriate to use. For this discussion, think of a situation when you took the time to participate in a survey, observation, interview, or other data gathering activity. In your initial post, describe the activity and discuss the following:

  • Why did you participate?
  • What method was used?
  • Why do you think the designers chose that specific method?
  • How could the information you provided be used to improve user experience or to develop user requirements?

If you have not participated in any type of data gathering activity, read the blog post I’m Getting That Nielsen Survey Money, and use the author’s experience to develop your initial response.

In your responses to two of your peers, suggest another method that could have been used to gather data in the situation and explain why the method you are suggesting would be appropriate.

https://timeinthemarket.com/im-getting-that-nielse…

Aaron Carll posted Sep 6, 2021 7:26 AM

Hi Class,
I took the time to participate in a survey when I had to rely on the manufacturer’s technical support team to repair a new product in the field. I had called into the support team and was transferred three times before coming across a true technical support specialist. After the support was successful, I stayed on the line to complete an interview questionnaire by the manufacturer’s technical support quality control manager. The motivating factor for me was to inform the manager of the openmindedness the representative used to understand my issues and how I had eliminated all networking possibilities. The core issue was with the device. The interview was a semi-structured interview with some questions previously prepared and other questions that expanded or related to the answers I gave (Sharp et al., 2019).
I think the designers choose this method because technical support for individuals in the field is unique to the device’s environment. Not every network or setup is the same, and I think the method is related to how well the technical support team adapted and overcame different problems in unique environments. The information I provided could help future technical support representatives by improving the background information at the beginning of a support call. If they ask simple questions about the network environment, they will better understand how to proceed with troubleshooting an issue. For example, gathering the hostname, IP subnet scheme, and whether the system is on a workgroup or domain will help the representative prepare for the next steps in diagnosing a problem. Once a bit of background information is established, the representative can troubleshoot the device having issues. This will help the support team better develop the requirements of the support representative and improve the user experience of the field support technician.

References

Sharp, H., Preece, J., & Rogers, Y. (2019). Interaction Design (5th Edition). Wiley Professional Development (P&T).

Emily Robison posted Sep 6, 2021 4:26 PM

Hi everyone!

I honest don’t participate in these rate your experience or even the survey at the bottom of the receipt. One would think that it is easy to rate an app while you are using it because it pops up in your face while activity using the app. Click the stars of what you rate the app as then write a small thing about the app but, most times I feel no one wants to waste time doing that while in the middle of what they are doing. The bottom of the receipt you say you’ll do it then the receipts end up in the trash and nothing was every done with the survey and it is history.

I did just participate in a survey that was emailed to me from my car dealership. A few weeks ago I went for an oil change and the rep at the dealer that got my car all signed in asked me to watch for an email for a survey on how smooth things are running for customers. I participate because since the rep told me about it I kinda of got the sense that he needed me to fill it out. The method that was used was a quick questionnaire with a box at the end to give personal feedback. I think the used this method because it is most likely to be email to any customer that has service done on their car. The information that was given while doing the questionnaire would be able to provide feedback to develop user requirements by knowing what went good for each customer and what didn’t go so well. I think that the box that lets customers write issues or good experiences in their own words.

I hope everyone has a great week! 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer


**This project is reviewing and computing THREE years of vertical and horizontal analyses of KELLOGG’s financial statements.

*****In the vertical analysis, you will measure performance against one
variable: revenue in the income statement and assets in the balance
sheet from the most recent three years. The horizontal analysis measures
trends over the most recent three years and is a strong gauge of growth
and consistence.********

I have posted this assignment in the past and the project i recieved back was a whole entire paper filled with quotations and plagarism. For this reason, I want an analysis that doesn’t have ANY quotations or anything that can be copied from the internet. I will be submitting the completed work on a plagarism finder prior to accepting the document. If the document includes plagarism i will submit it to study pool and request a refund.

FIN 325Final Project Milestone Two Guidelines and Rubric Overview: The final project for this course is the creation of a financial statement analysis.A business’s financial statements offer important insights into its performance and financial healththat help guide internal managers’ and external investors’ resource allocations. For a financial analyst, being able to accurately read and interpret these statements is a critical tool in making sound recommendations to clients or company executives. Analysts also need to understand how the limitations of these statements and the legal and ethical obligations that underpin them impact business decisions.

Prompt: In this milestone, you will submit a draft of a portion of the analysis step (PartII), Section D: Vertical Analysis and Section E: Horizontal Analysis.You will review and compute three years of vertical and horizontal analyses of the approved company you selected in Milestone One. In the vertical analysis,you will measureperformance over the most recentthree years against one variable: revenue in the income statement and assets in the balance sheetfor those years. The horizontal analysis measures trendsover the most recent three years and is a strong gauge of growth and consistence.

Specifically,the following critical elements must be addressed:

II.Analysis. Use this section to present your findings based on quantitative and qualitative analysis of the financial statements. Include a copy of the financial statements and any ratios or analysis in an appendix as support for your discussion. In particular, this section should cover:

d)Vertical Analysis. Perform a vertical analysis of the income statement and the balance sheet from the most recent three yearsin order to answer the following questions. Be sure to include supporting calculations and a vertical analysis spreadsheet in anappendix.

1.Do any items in your vertical analysis stand out? Why or why not? Be sure to provide specific examples and explain what elements you consideredin arriving at your answer.

2.What does your vertical analysis suggest for managingthe company’s financial health? Be sure to justify your response. For example, are there things the company might want to look at more closely? Why or why not?

3.What does your vertical analysis suggest with respect to how potential investorswould view the company? Justify your response. For example, are there items that might make potential investors less likely to buy the company’s stock? Are there items that might make potential creditors wary about lending to the company? Why or why not?

e)Horizontal Analysis. Perform a horizontal analysis of the same key performance measures covered by your vertical analysis to examine trends for the company over the most recentthree-year time period. Use your analysis to answer the following questions and include supporting calculations and horizontal analysis spreadsheet in an appendix.

1.Do any items in your horizontal analysis stand out? Why or why not? Be sure to explain what elements you consideredin arriving at your answer.

2.What does your horizontal analysis suggest for managingthe company’s financial health? Be sure to justify your response. For example, are there things the company might want to look at more closely? Why or why not?

3.What does your horizontal analysis suggest with respect to how potential investorswould view the company? Justify your response. For example, are there any items that might make potential investors less likely to buy the company’s stock? Are there items that might make potential creditors wary about lending to the company? Why or why not?

Guidelines for Submission:Your paper must be submitted as a 2–3 page Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at leasttwosources cited in APA format.Include all relevant and supporting appendices,including financial statements and analysis

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

6-1 Discussion: Risk Assessment

Previous Next 

Chapter 10 of the course textbook discusses the importance of conducting risk assessments (RAs). Darril Gibson defines an RA as a point-in-time report used to compare current risks against the controls that are already in place. Although it is beneficial to conduct an RA often, there are challenges to conducting quantitative RAs. For this week’s discussion, you will consider the benefits and challenges of risk assessments with your peers.

In your initial post:

Using the internet, find an example of an adverse IT event that was likely a result of failed risk assessment and planning processes.

As you write your post, consider the following:

Would a qualitative or quantitative RA have been more effective in preventing the risk? Why?

What controls would have been best to implement? Why?

In what ways did senior management’s attitude toward risk influence how the RA was conducted?

How should the company change its RA in the future to prevent this risk from occuring again?

In your responses to your peers:

Further expand on the claims of the original poster, and those who already responded.

Then explain why it is difficult to conduct a quantitative risk assessment (RA) for an IT infrastructure. 

POST 1

One adverse IT event that I could remember and found on the web was the crash of the Obamacare website the day of launch. I believe a quantitative RA would have been more effective for this solution and preventing the risk of the website crashing. The reason why I chose this assessment is because quantitative RA’s provide a more detailed perspective into risk, severity level, and impact of the risk. One control that would have had a good impact would have been to assess the situation or plan for a huge serge of traffic. The company should of had the scalability to allow the users to keep coming.  The reports after the disaster were that the management were to busy making policies and making poor technical decisions instead of spending the time on the website. The company should of worried more about technical issues, website design, and website functionality instead of policies behind the scenes.   references:https://www.mcall.com/news/watchdog/mc-obamacare-website-failure-watchdog-20160224-column.html

POST 2

When asked to search about an IT event I immediately had one in mind as I recently discussed this event, the recent T-Mobile breach. I think this issue really brought forth a lot of issues. This attack was conducted over the course of a week. He had infiltrated the servers early in the attack and began selling information on the dark web as he collected it over time, he eventually gained credentials to further dig into the database and access other sensitive information.When asked of whether qualitative or quantitative RA would have been more effective, qualitative research would have been much more important here. Attacks are conducted all the time on various businesses but can be unsuccessful. Hackers are becoming smarter in their attacks and learning new methods of gaining access to these databases that result in higher quality attacks. Properly researching these areas of vulnerabilities would be the best to conduct.With the attack taking place over a week and the tools available to an Information Security team, there were plenty of opportunities they could have alerted to the intruder and had the attack stopped. From this attack, the question is asked, how secure is their information?This isn’t the first time that T-Mobile has been attacked as such. It’s hard to answer the question of changing its RA when it is an issue that has happened before. This is a demonstration of watching a company not take the proper steps of risk recovery. Now the risks of the customers is in question as they don’t know who’s data has been compromised. Even if they were to switch carrier, the information is out there and can linger with them for years to come.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Overview

A very important aspect of user testing is to ensure that every user is treated the same, and that both test materials and procedures are exactly the same from user to user. Creating a test plan to use during testing ensures that the users get the same tasks and the same prompts for help (if needed). Read Turn User Goals into Task Scenarios for Usability Testing and Things a Therapist Would Say (after clicking the link, choose either the Word or PDF version of the text), which will provide examples of ways to develop tasks and prompts to include in your test plan to effectively support users during testing.

Prompt

After reading the articles, complete the following activities:

For each of the situations given below, develop two user testing prompts that would be appropriate:

  • The user is stuck after finishing one portion of a task and doesn’t know what to do next.
  • The user has clicked on the system-furnished help but doesn’t seem to understand the message it has conveyed.
  • The user is quiet and has not done anything with the software for several minutes.

User testing is best when users are given tasks that are more personal to them. On a website selling shoes, a good task would be “Buy a pair of Nike LeBron 7 Big Kids Shoes for your nephew,” as opposed to “Buy a pair of shoes.” In other instances, rather than giving users specific tasks, you should ask them to do something more general. For example, instead of saying, “Go to the heading on the initial page that says SALE, then select the category ‘shoes,’ then find a pair for under $40,” you might say, “You are looking for a new pair of shoes on this store website but you don’t want to spend very much money. How would you proceed?”

For each of the general tasks below, develop a more personalized task that could be used in a usability test. It is okay to use names of specific websites.

  • Go to Fandango and find a movie.
  • Order something from a clothing website.
  • Figure out how to return an item you purchased.
  • Make an appointment to see a doctor.

Guidelines for Submission

Your written responses must be submitted as a Word document (.doc), and must address all of the tasks http://sensible.com/download-files

/https://www.nngroup.com/articles/task-scenarios-usability-testing/

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Southern New Hampshire Univer

Review the “Internet of Things: Convenience vs. Privacy and Secrecy” resource. Then create an initial post in which you consider the following questions:

  • As internet of things (IoT) devices become more widely adopted, to what extent are you willing to sacrifice your privacy for convenience?
  • Given your stance on privacy, what effect does the pervasiveness of IoT have on your choices as a consumer?

In your response posts, imagine that you are developing a new IoT device for a company. What aspects of privacy would influence your design based on the points your peers made in their initial posts?

Note: Privacy can be a highly personal topic. In your posts, remember to maintain professionalism. Focus on the topic and not on the person. 

Reply:

Philip Wheeler posted Nov 1, 2021 2:06 AM

Subscribe

Hey Class,

I hope everyone had a good first week of class. I am relatively private man and with this, I find IoT to be a very scary thing. With that being said I would much rather give up some of my basic data to ensure the efficiency and operability is still there. The biggest concern I have when it comes to the pervasiveness of IoT is not really towards my personal devices and the big data analytics that are conducted through that. I find it scary when we look at smart cities that have CCTVs and AI that is able to understand what people’s daily habits are. They are able to track phones and identify when someone’s cell phone is in a part of town that is less frequented. These aspects of IoT and what that can mean is extremely scary especially when we thing about if that kind of data could be compromised. A random person is able to track your every move and gets a notification when you are not in a normal area. I believe this is a step to far. I would love to hear everyone else’s opinion on smart cities and IoT with relation to privacy or the lack their of.

Have a great week

Phil

Eugene Ferguson posted Nov 1, 2021 11:35 PM

Subscribe

Currently this would present many different challenges in terms of location. The views expressed can be imagined in a business or personal environment or setting dependent upon a few factors.

While the focus of attention to detail provides the IoT with a stable interface, provided as personal assistance towards making leave easier in a sense to being our own personal secretaries. Pun intended of course. Many different orientation or interfaces provide distinguished access with adequate permitted interpretations by law, pursuant upon the understanding on providing a stable foundation on understanding where boundaries are within providing access or information on a secured network entity. With public access permitted to those relevant to the information, additional are of using sophisticated software and hardware to thwart off such attacks if they were to happen within the infrastructure or a government entity. Proprietary standards and laws based with in the SEC, FDIC and other insecurities offerings provide superior defense against system intrusions and other such attacks, of course with advancements in the infrastructure. With adequate security enhancements provided to such a system itself, those abilities can be viewed as a perk for those whom adhere to having there information safe and secure provided accessible with integrity and permissions based authority.less 

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized