Blog

proper assessment for the client, based on the micro, mezzo, and macro levels of social work practice.

Psychology 3
Paper , Order, or Assignment Requirements

Maintaining the perspective that people are in constant interaction with their environment and the social systems therein (the Person in Environment perspective) is a key concept in the field of social work. Social work recognizes that the concerns or problems individuals face might be due to many causes. This view also supports another goal of social work which is to empower clients who are marginalized and oppressed to collaborate in the resolution of their problems or concerns as experts of their life experiences. As such, looking at a problem and assessing the needs of individuals depends on a review of the challenges they have encountered on the micro, mezzo, and macro levels. Assessing the situation on all three levels will provide a holistic map for goal planning. For example, you might assess a client’s individual strengths and challenges, the support or lack of support received from family, friends, and others in the client’s life regarding the issue, and the societal resources available to address the problem.
For this Discussion, review this week’s Learning Resources. Select either the course-specific case study for Abdel or Pedro. Then, consider what information you need to gather and what questions you need to ask in order to complete a proper assessment for the client, based on the micro, mezzo, and macro levels of social work practice.
By Day 3
Post a brief explanation of the information you need to gather and the questions you need to ask, in order to complete a proper assessment for the client in the case study you selected, based on the micro, mezzo, and macro levels of social work practice. Be sure to reference in your post which case study you selected.
Support your posts and responses with specific references to the Learning Resources. Be sure to provide full APA citations for your references.

300-350 words

Analyze health needs, disparities, and healthcare delivery systems within the context of cultural, social, legal, political, and economic forces.

Deliverable 2 – The Healthcare Delivery System
Paper , Order, or Assignment Requirements

Analyze health needs, disparities, and healthcare delivery systems within the context of cultural, social, legal, political, and economic forces.

Instructions
You have recently been promoted to Health Services Manager at Three Mountains Regional Hospital, a small hospital located in a mid-size city in the Midwest. Three Mountains is a general medical and surgical facility with 400 beds. Last year there were approximately 62,000 emergency visits and 15,000 admissions. More than 6,000 outpatient and 10,000 inpatient surgeries were performed.

After the first series of training, your CEO decided that employees would benefit from an online self-check after completing the training. You are tasked with developing a PowerPoint presentation with a list of questions that ask about liability protections for the physicians and the facility. Correct answers should be provided in the notes so that employees can check their responses.
Please prepare a PowerPoint presentation (or feel free to use other shareable Webware/software that you prefer) with questions that check employee understanding about the liability protections for physicians and the facility.
1. The PowerPoint presentation should be a minimum of 8 slides and a maximum of 12. (Here is a library resource for help creating a PowerPoint presentation.)
2. On each slide, provide a question that can be utilized to ascertain basic understanding. Open-ended questions are preferable.
3. Use the notes area on each slide to provide the answer with a thorough explanation of why that answer is correct.
4. Include a slide that provides links to 3-5 resources for employees who want more information.
5. Your final slide should be the reference page for sources cited in the Notes.

Compare and contrast among agile coaches, Scrum Masters, project managers, and technical leads.

Week 4 Assignment 2
Paper , Order, or Assignment Requirements

The following Website may be helpful when completing this assignment:
• DSDM Consortium, located at http://www.dsdm.org/
The following resources may be helpful when completing this assignment and are located in Week 4 of the course shell:
• “Product Development with Scrum” (You may also view the article at http://www.agilelogic.com/files/ProductDevelopmentWithScrum.pdf.)
• “Agile Project Management and the Real World” (You may also view the article at www.diglib.org/wp-content/uploads/2011/01/01PMGLynema.pdf.)
• “Lean Software Development” (You may also view the article at http://www.projectperfect.com.au/info_lean_development.php.)
There are a number of frameworks that have been used for agile development and project management. The purpose of this assignment is to discuss how projects are planned and executed in SCRUM, Dynamic Systems Development Model (DSDM), and Lean Software Development. Using real-world examples in your assignment is highly desired. One way to do that is to relate any projects at your workplace or from your research and think about how you, as a project manager, would run the same project under those frameworks.
Write a five to six (5-6) page paper in which you:
1. Analyze the manner in which projects are planned and executed under the following frameworks and provide one (1) example for each:
1. SCRUM
2. DSDM
3. Lean Software Development
2. Highlight three (3) benefits and three (3) trade-offs for each of the following frameworks:
1. SCRUM
2. DSDM
3. Lean Software Development
3. Determine the potential obstacles for using the following frameworks and analyze the major risks and issues associated with each of them.
1. SCRUM
2. DSDM
3. Lean Software Development
4. Suggest key strategies from the perspective of a project manager to avoid the obstacles you have identified in Question 3. Recommend key actions that you can take in order to mitigate the risks associated with those frameworks. Provide three (3) real-world examples to support your suggestion.
5. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. You may use the resources above or others of your choosing.
Your assignment must follow these formatting requirements:
• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
• Compare and contrast among agile coaches, Scrum Masters, project managers, and technical leads.
• Analyze and differentiate among the different agile project delivery frameworks.
• Use technology and information resources to research issues in advanced agile project management topics.
• Write clearly and concisely about advanced agile project management topics using proper writing mechanics and technical style conventions.

Retrospective Analysis of Personality

Retrospective Analysis of Personality
Paper , Order, or Assignment Requirements

In this assignment, you will take a retrospective look at your life history. First, choose an area of the brain and explain what it does, as well as how it would impact an activity from your daily life. Then, analyze the roles of nature and nurture in shaping the person you are today. Next, describe the influences of culture, environment, and biology on your gender-role behavior. Subsequently, discuss possible sources of inaccuracy and bias in any retrospective analysis. Finally, discuss the reasons why systematic scientific studies are considered more valuable than individual accounts

Write a three to four (3-4) page paper in which you:

Section 1 (1-2 paragraphs):

Choose one of the following areas of your brain and explain what it does:
Thalamus
Reticular formation
Brain stem (pons and medulla)
Cerebellum
Limbic system
One of the four lobes of the cerebral cortex
Explain how the area you described contributes to a specific activity from your everyday life. (Example: During horseback riding, the cerebellum integrates information from the motor systems and balance system.)
Section 2 (1-2 paragraphs):

All of us have been shaped by both nature (biology) and nurture (environment), making us the persons we are today. In most cases, it is difficult to completely disentangle the separate effects of nature vs. nurture with much certainty. However, we can make some educated guesses based on our knowledge of familial tendencies that we may have inherited, as well as knowledge of our environment and experiences. In this section, we ask for you to make some educated guesses about the roles of nature and nurture in your life.

Describe the role of nature (biology) in shaping what kind of person you are today. Provide a specific example of the role of nature.
Describe the role of nurture (environment) in shaping what kind of person you are today. Provide a specific example of the role of nurture.
Section 3 (1-2 paragraphs):

Describe the influences of culture, your environment, and biology on your gender role behavior.
Use specific examples from your own life to explain your answers.
Section 4 (1-2 paragraphs):

Discuss the fallibility of memory in terms of bias and inaccuracy when you reflect on your past.
Identify specific memory biases that could affect how you remember your past. Include factors related to cognition.
Use specific examples from your own life.

Section 5 (1 paragraph):

Describe why the science of psychology places more emphasis on results based on scientific studies than it does on personal experiences and anecdotes.

Specifically, how do you use technology in your communications, whether at work, home, or school?

Responding To Technology Discussion
Paper , Order, or Assignment Requirements

To those who transported goods with arms and legs, the wheel appeared to be high technology at one point in time. Today, technology is all around us—and we need to learn how to use the new technologies in ways that make our tasks easier. For this class, we will focus on digital information technologies we use for school and daily life.
Considering how different people use and respond to technology, answer the following questions:
• Describe how you use information in your daily life. Specifically, how do you use technology in your communications, whether at work, home, or school?
• How has the World Wide Web and accompanying technologies (cell phones, e-mail, social media, etc.) changed the way society works with, handles, and interprets information?
• Does computer ownership affect your ability to communicate?
Consider the following when answering:
• What is an operating system? What operating system is on your computer? (To answer this question, search for “operating systems” on the Internet. Based on the information that is displayed on the screen, identify which operating system is on your computer.)
• What is RAM? How much RAM do you have on your computer? (To answer this question, search for “system properties” within your computer system; this will tell you how much RAM you have in your system.) Can you update your RAM on the computer you have? (To find out this information, you can do either of the following:
1. Visit the website of the company that made your computer and search for this information.
2. Call a local store that sells computers and tell the executives there that you want to upgrade your RAM and you want to know if it is possible with the computer system you have.)
• What is software? What software packages do you have on your computer that will help you with college? (To find out about this, you can call a local store that sells computers and ask them to assist you in finding this answer. You can also look at the “Programs” or “All Programs” folder on your computer and list out the programs you have.)

How can Intel extract value from the BYOD initiative and turn this initiative into a new source of competitive advantage?

Hw Final
Paper , Order, or Assignment Requirements

• Since early 2009, the information technology (IT) division of a leading manufacturer of semiconductor chips had noticed a growing trend among the company’s 80,000 employees worldwide to bring their own smartphones and storage devices to their individual workstations. Recognizing that Bring Your Own Device (BYOD) was not a passing fad but a growing phenomenon, the company decided in January 2010 to formally implement this initiative. As the company’s chief information security officer prepares for a full rollout of BYOD, he revisits the issue of ensuring security of corporate data stored on devices owned by individual employees. He also wonders how Intel should respond to the demand for e-Discovery, wherein a litigant could seek access to internal documents stored on devices not owned by the company. He also reflects on a more fundamental and strategic issue: How can Intel extract value from the BYOD initiative and turn this initiative into a new source of competitive advantage?
Choice Point A PUBLICATION DATE: February 10, 2006 PRODUCT #: 306001-PDF-ENG
• The CEO of ChoicePoint, a leading company in the rapidly growing U.S. personal data industry, must reexamine the company’s business model after a serious breach of data security affecting some 145,000 U.S. citizens. He must decide on steps to strengthen data protection in the company and clarify his stance on regulating a largely unregulated industry. Your task, assist with an evaluation and recommendations.

Startup SME
A new start-up SME (small-medium enterprise) based in Marlyland with an Egovernment model has recently begun to notice anomalies in its accounting and product records. It has undertaken an initial check of system log files, and there are a number of suspicious entries and IP addresses with a large amount of data being sent outside the company firewall. They have also recently received a number of customer complaints saying that there is often a strange message displayed during order processing, and they are often re-directed to a payment page that does not look legitimate.

The company makes use of a general purpose eBusiness package (OSCommerce) and has a small team of six IT support professionals, but they do not feel that they have the expertise to carry out a full scale malware/forensic investigation.

As there is increased competition in the hi-tech domain, the company is anxious to ensure that their systems are not being compromised, and they have employed a digital forensic investigator to determine whether any malicious activity has taken place, and to ensure that there is no malware within their systems.

Your task is to investigate the team’s suspicions and to suggest to the team how they may be able to disinfect any machines affected with malware, and to ensure that no other machines in their premises or across the network have been infected. The team also wants you to carry out a digital forensics investigation to see whether you can trace the cause of the problems, and if necessary, to prepare a case against the perpetrators. What methods could you use to do this ? The company uses Windows Server 2012/2008 for its servers. Clients run Windows 7/8 internally. They only use a firewall from (Seek&Destroy). Patches are applied by the IT support team on a monthly basis, but the team has noticed that a number of machines do not seem to have been patched. The IT Team is not as skilled as it should be.

Deliverables
Your deliverable in this assignment is a 6-10 page word report discussing how you would approach the following:

• Malware investigation
• Digital Forensic Investigation
• Overall Security Analysis
• Recommendations

You should discuss a general overview of the methodology that you will use, and provide a reasoned argument as to why the particular methodology chosen is relevant.

Explain password authentication systems.

Sec Cookie C
Paper , Order, or Assignment Requirements

QUESTION 1

You use usernames and passwords when you sign in an email account, access secured information, or even shop online. Explain password authentication systems.

Your response should be at least 200 words in length.

QUESTION 2

A certificate is stored by the identity it belongs to. Explain certificate-based authentication including SSL/TLS, and smart cards and other hardware-based devices. Provide examples of how they are used.

Your response should be at least 200 words in length.

QUESTION 3

Definite structured data and unstructured data.

Your response should be at least 200 words in length.

QUESTION 4

Define data loss prevention (DLP) and list challenges regarding DLP.

Your response should be at least 200 words in length.

 

Discussion—Business Intelligence and Knowledge Management

Assignment 1: Discussion—Business Intelligence and Knowledge Management
Paper , Order, or Assignment Requirements

Business intelligence, knowledge management, and expert systems are powerful tools that allow corporations to analyze huge amounts of data that would typically go ignored in the past.
Using the readings for this module and the Argosy University online library resources, research how companies are using business intelligence, knowledge management, and expert systems.
Respond to the following:
• Does this increase in data and computing power always benefit companies that employ these tools?
• What are the costs of this massive expansion of information available to managers and other business users?
• Does more data always mean better decisions in the corporation?
Give reasons and examples in support of your responses.
Write your initial response in approximately 400–500 words. Apply APA standards to citation of sources.

Data Breaches and Regulatory Requirements

Case Study 2: Data Breaches and Regulatory Requirements
Paper , Order, or Assignment Requirements

The National Institute of Standards and Technology (NIST) provides an extensive amount of information, resources, and guidance on IT and information security topics. The Federal Information Security Management Act (FISMA) provides standards and guidelines for establishing information security within federal systems. However, there have been, and continues to be, numerous security incidents including data breaches within federal systems. Review the information about FISMA at the NIST Website, located athttp://csrc.nist.gov/groups/SMA/fisma/index.html. Additionally, review the information, located athttp://www.govtech.com/blogs/lohrmann-on-cybersecurity/Dark-Clouds-Over-Technology-042212.html, about the data breaches within government systems.

Select one (1) of the data breaches mentioned to conduct a case analysis, or select another based on your research, and research more details about that incident to complete the following assignment requirements.

Write a three to five (3-5) page paper on your selected case in which you:
1.
1. Describe the data breach incident and the primary causes of the data breach.

1.
1. Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements and guidelines, including management controls; include an explanation of the regulatory requirement (such as from FISMA, HIPAA, or others).

1.
1. Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed, to mitigate further data breach incidents.

1.
1. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.