you are required to research and cite at least one outside source per question and must properly cite all references using APA format. You may use your textbook as a cited reference to complete this exam but, if you do, limit the textbook citations and be sure to use an additional outside source. In other words, use a peer-reviewed, reliable source in lieu of, or in addition to, your textbook. Be sure your source is a reliable one. Do not use Wikipedia, .com or .org sources, or the like You may not quote material from a source; you must paraphrase and cite appropriately 1) List five questions that would help you judge the value of a research study. You are not to develop hypotheses but questions that will help one judge if the research study was conducted in a scientific way, therefore, has merit. Support your answer with research. 2) Why do health psychologists focus on a behavioral component? Include in your answer some of the varied assessments used.
SHORTESSAYRESPONSE_.docx
SHORT ESSAY RESPONSE:
you are required to research and cite at least one outside source per question and must properly cite all references using APA format. You may use your textbook as a cited reference to complete this exam but, if you do, limit the textbook citations and be sure to use an additional outside source. In other words, use a peer-reviewed, reliable source in lieu of, or in addition to, your textbook. Be sure your source is a reliable one. Do not use Wikipedia, .com or .org sources, or the like
You may not quote material from a source; you must paraphrase and cite appropriately
1) List five questions that would help you judge the value of a research study. You are not to develop hypotheses but questions that will help one judge if the research study was conducted in a scientific way, therefore, has merit. Support your answer with research.
2) Why do health psychologists focus on a behavioral component? Include in your answer some of the varied assessments used.
3) How can health psychologists work to reduce the stressful nature of the work environment?
4) Is criminal profiling a science? Why or why not? Defend your answer with a case example and address counter points.
Imagine that you are an office manager tasked with coordinating and leading the dismissal meeting for an organizational layoff. Instructions Write a 6-8 page paper in which you: Propose three ways, proven to be effective, that a manager can cope with negative emotions that accompany an organizational layoff. Describe a detailed, step-by-step process for conducting a dismissal meeting.
Scenario
Imagine that you are an office manager tasked with coordinating and leading the dismissal meeting for an organizational layoff.
Instructions
Write a 6-8 page paper in which you:
Propose three ways, proven to be effective, that a manager can cope with negative emotions that accompany an organizational layoff.
Describe a detailed, step-by-step process for conducting a dismissal meeting.
Determine fair and equitable compensation, with justification, that the company may provide to the separated employee.
Create a chart depicting a fair and equitable timeline for the disbursement of the compensation.Use Microsoft Word or an equivalent application, such as OpenOffice.
Predict three ways an organizational layoff can affect a company’s future strategic direction.
Support your propositions, assertions, arguments, or conclusions with at least three credible, relevant, and appropriate sources synthesized in a coherent analysis.Cite each source on your source list at least one time within your assignment.
For help with research, writing, and citation, access the library or review library guides.
Write clearly and concisely in a manner that is well organized, grammatically correct, and free of spelling, typographical, formatting, and/or punctuation errors.
As a health care department manager, you have 10 employees under your supervision. The attendance policy at your facility requires employees to uphold good attendance. If an employee is late more than 5 times in 1 month, the department manager must begin corrective action. One employee has been late to work 10 times this month. How will you handle this employee? Describe what is involved in corrective action. Describe a plan of corrective action for this employee.
As a health care department manager, you have 10 employees under your supervision. The attendance policy at your facility requires employees to uphold good attendance. If an employee is late more than 5 times in 1 month, the department manager must begin corrective action. One employee has been late to work 10 times this month. How will you handle this employee?
Describe what is involved in corrective action.
Describe a plan of corrective action for this employee.
Would an employee be motivated or empowered to improve after corrective action is implemented?
Finalize your research question based on the feedback from the Research question and problem statement Explain why investigating your research question is important to the field. This section of the assignment is a finalized version of your previously submitted Research question and problem statement assignment.Identify your research design. Why is the research design well suited for your research question?
Finalize your research question based on the feedback from the Research question and problem statement Explain why investigating your research question is important to the field. This section of the assignment is a finalized version of your previously submitted Research question and problem statement assignment.Identify your research design. Why is the research design well suited for your research question? Further, why is the research design well suited in comparison to others?Attanched is my Design 1 and the Writing example of Design 2. Design 2 should related to my Design 1. Thank you.
Jacey works as a receptionist at a medical office. While performing all the office duties, as well as greeting patients as they check-in for appointments, she developed an idea that could make the check-in process faster and the paperwork more efficient and streamlined. She wants to share this information with her supervisor, so she scheduled a meeting at the end of the week. However, shes beginning to feel nervous about pitching her idea because shes worried that her supervisor will think shes working outside of her role and overstepping her position. Her co-worker tells her to stop being worried and focus on how this meeting could highlight her communication skills and professionalism at the office. Refer to the following resources to help write a response to the following prompts. You can also refer to the Virtual Library to help you generate ideas. Chapter 01: Aplia Assignment Improve Communication Skills for Workplace SuccessPresenting Ideas at WorkBuild an Unbeatable Professional Image 2. Initial Post: Create a new thread and answer all three parts of the initial prompt below Respond to the following prompts in your initial post. Discuss one recommendation to help Jacey prepare for the meeting with her supervisor. Describe one communication strategy that Jacey can use when presenting the idea to her supervisor. Explain how Jacey can best present a professional image to her supervisor during the meeting.
Jacey works as a receptionist at a medical office. While performing all the office duties, as well as greeting patients as they check-in for appointments, she developed an idea that could make the check-in process faster and the paperwork more efficient and streamlined.
She wants to share this information with her supervisor, so she scheduled a meeting at the end of the week. However, shes beginning to feel nervous about pitching her idea because shes worried that her supervisor will think shes working outside of her role and overstepping her position. Her co-worker tells her to stop being worried and focus on how this meeting could highlight her communication skills and professionalism at the office.
Refer to the following resources to help write a response to the following prompts. You can also refer to the Virtual Library to help you generate ideas.
Chapter 01: Aplia Assignment
Improve Communication Skills for Workplace SuccessPresenting Ideas at WorkBuild an Unbeatable Professional Image
2. Initial Post: Create a new thread and answer all three parts of the initial prompt below
Respond to the following prompts in your initial post.
Discuss one recommendation to help Jacey prepare for the meeting with her supervisor.
Describe one communication strategy that Jacey can use when presenting the idea to her supervisor.
Explain how Jacey can best present a professional image to her supervisor during the meeting.
Identify two policies that a business could implement to ensure the protection of sensitive corporate data from.
CLOSING CASE ONE
Five Ways Hackers Can Get into Your Business
Hackers dont care what size your business is; they only care if they can get past your defenses and relieve you of your valuables. Hackers actually like small businesses because they tend to have more to steal than an individual person but fewer cyber defenses than a large company. The hard reality is that most small businesses stand at least a 5050 chance of being targeted for attack by hackers. Did you know:
? Once every three minutes, the average company comes into contact with viruses and malware.
? One in every 291 email messages contains a virus.
? Three things hackers want most are customer data, intellectual property, and bank account information.
? The top five file names used in phishing scams are Details.zip, UPS_document.zip, DCIM.zip, Report.zip, and Scan.zip.
? The average annual cost of a cyberattack on a small or medium-sized business is $188,242.
Cyberthieves are always looking for new ways to gain access to your business data, business networks, and business applications. The best way to protect your business from cybertheft is to build a strong defense and be able to identify vulnerabilities and weak spots. The top five ways hackers will try to gain access to your businesses, according to John Brandon of Inc. magazine, are highlighted in Figure 4.19. (Please note there are far more than five ways. These are just the five most common.)
FIGURE 4.19
Five Ways Hackers Gain Access to Your Business
Read Closing Case One: Five Ways Hackers Can Get into Your Business. (Highlighted in Yellow above) and respond to Questions below.
Be sure to use the Rubric as a guide to the requirements.
Questions:
1. Identify two policies that a business could implement to ensure the protection of sensitive corporate data from.
2. Demonstrate how a business can use authentication and authorization technologies to prevent hackers from gaining access to organizational.
3. Analyze how a business can use prevention and resistance technologies to safeguard its employees from hackers and viruses.
4. Explain why hackers want to gain access to organizational.
Your paper should include an introduction and responses to the four questions in a paper format. Please do not use bullet points for your responses and do not list the case questions. Instead, consider using subheadings and writing a paper that flows from paragraph to paragraph. Use APA format (double-spaced) and cite any resources.
image1.png
In order to support society and health, nutritional guidelines are created and communicated.Respond to the following in a minimum of 175 words:? Discuss some nutritional guidelines and/or recommendations that you are familiar with.When did you learn about them? How did you use them? Did they change any nutritionalchoices you made? Why or why not? Explain and provide specific examples to supportyour response.
In order to support society and health, nutritional guidelines are created and communicated.Respond to the following in a minimum of 175 words:? Discuss some nutritional guidelines and/or recommendations that you are familiar with.When did you learn about them? How did you use them? Did they change any nutritionalchoices you made? Why or why not? Explain and provide specific examples to supportyour response.
, Discuss what you found interesting, educational, insightful, etc.?
First, Summarize the article – This should be about two paragraphs.
Next, Discuss what you found interesting, educational, insightful, etc.?
Then, Discuss how the article you found relates to the material you read for this week.
Summarize your post. You should not type the questions, the discussion post should flow as one document. Think of my directions as writing prompts. Each paragraph needs at least 4-5 sentences.
https://www.wsj.com/articles/the-battle-over-the-yen-ddf2dbd2?mod=Searchresults_pos15&page=1
Who can be found guilty of a business crime, and what does mens rea and actus reus mean?Using the Strayer Library, research an example of a business crime committed in the last two years and discuss who was held criminally liable.
Respond to the following:
Who can be found guilty of a business crime, and what does mens rea and actus reus mean?Using the Strayer Library, research an example of a business crime committed in the last two years and discuss who was held criminally liable.
If management can be liable for crimes committed in the workplace, what US Constitutional protections exist to protect them?Can management monitor and listen to employees while at work, or is this a Fourth Amendment or tort invasion of privacy violation?Explain, given your understanding of the [Taylor v City of Saginaw] lawsuit in the reading.
Be sure to respond to one of your classmates’ posts. Please provide answers to the discussion questions that are researched, informed, and substantiated by citing source
What is the purpose of performing an asset classification, asset assessment and risk assessment as part of the security strategy?
Assignment 2
1. (24 points) Different formal security models describe different access models. Formal security models are useful reference models for evaluating the attributes of various implementations. The following phrases are used to describe some specific access models. Identify the security model each phrase is associated with and provide what the phrases mean in the context of the respective security model. Add some information about each security model along with each phrase.
Also (important) include a practical example that demonstrates the concepts for each security model. Be sure your practical example addresses both parts of the phrase.
a. (12 points) No read up, no write down.
Answer:
b. (12 points) Read up, write down. Or stated differently: No read down, no write up.
Answer:
2. (16 points) Clark-Wilson Mode
a. (4 points) List and briefly explain 3 major components of Clark-Wilson Model.
Answer:
b. (4 points) What is the difference between Clark-Wilson Model and Bell-LaPadula Model?
Answer:
c. (4 points) What are the benefits of Clark-Wilson Model?
Answer:
d. (4 points) What are the limitations of Clark-Wilson Model?
Answer:
3. (16 points)
Today, both security incidents and security vulnerabilities continue to rise for a variety of reasons.
What reasons can you provide for the continuing upwards trend in the number of incidents reported? You should provide at least four (4) reasons with supporting data and reasoned arguments to support your answer. Good answers will provide facts, reasoned arguments and references that go beyond anecdotal information.
Answer:
4. (12 points)
Consider threat, vulnerability, exploit, and risk.
What are they?
What is the difference between them?
Discuss.
Answer:
5. (12 points)
What is the purpose of performing an asset classification, asset assessment and risk assessment as part of the security strategy? Take each item in turn defining what it is and describing the purpose of it.
Answer:
6. (20 points)
a. (4 points) Describe the concept of Separation of Duties (SoD).
Answer:
b. (12 points) Provide 3 examples of the general benefits of following the principle of SoD for tasks?
Answer:
c. (4 points) What problems can SoD not help with?
Answer: