Change is often difficult but also necessary for the long-term success of any organization. Persuade an audience of decision makers at an organization of your choosing to commit to a cultural change.

Changing Corporate Culture Project Overview

Change is often difficult but also necessary for the long-term success of any organization. For example, during the COVID-19 pandemic, many businesses had to quickly pivot away from business as usual to adapt to a new reality. Formal sit-down restaurants started offering takeout, hotels changed their check-in and cleaning processes, sports venues operated without spectators, and schools switched to a distance-learning model. Even more challenging than these operational changes, however, is a change in culture. Our textbook defines 
culture as “the shared values, norms, rules, and behaviors of an identifiable group of people who share a common history and communication system” Because values, norms, rules, and behaviors normally evolve over a considerable period of time, changing the culture represents a significant challenge. Your task is to persuade an audience of decision makers at an organization of your choosing to commit to a cultural change. Your task is to convince your organization to make 
one of the following changes.

· Take an active stance on issues of social justice in your community.
· Commit to environmental sustainability.
· Focus on diversity, equity, and inclusion in hiring and promotion practices.
· Make your organization welcoming to people with disabilities.
· Provide a living wage and retirement benefits to all colleagues.
· Allow colleagues paid time off to engage in volunteer work.
· Include nonmanagement colleagues on the organization’s Board of Directors or leadership team.
These are not all of the possible topics. If you have a different idea, please check with your instructor first to make sure it is appropriate.

Important Note: Although reusing and recycling is great for the environment, it is 
not allowed here. You must use an original idea and original research for this assignment. You may not resubmit an assignment from another class.

In choosing an organization, you have a few options.
· Your current employer
· A previous employer
· An organization you have never worked for that is aligned with your career goals
· A fictional organization that may be similar to your current or previous employer or to an existing organization you might wish to work for in the future
Similarly, as you approach this assignment, you have some leeway in imagining your role in your chosen organization. You may choose to inhabit your current job title, or you may imagine yourself in a different role, or even create a brand-new job title. Take some time to think about your topic, organization, and role, because you will be creating the entire assignment based on these choices.

To Do:

 You will write a three-paragraph memo to convince your instructor to approve your topic. (Please choose a topic).
You will write a memo addressed to your instructor in which you share your plans for your Course Project. In order to convince your instructor to approve your topic, you must explain what your topic is, why you have chosen it, and how you plan to complete it successfully. You may find it helpful to divide your memo into three paragraphs: the what, the why, and the how. The recommended length of this assignment is one page. See Appendix B, Formatting for Letters and Memos, to learn more about the memo format and to see a sample memo.

Please ensure that all criteria is met.

Criteria

Description

Document Design

Message is properly formatted in the style of a memo and includes all of the required elements.

Audience Awareness

The tone is appropriate for the audience and purpose. The message demonstrates courtesy and professionalism throughout.

Content

The message clearly and convincingly explains the what, the why, and the how. The message is organized into paragraphs to enhance readability.

Writing Mechanics

Rules of grammar, usage, spelling, and punctuation are followed.

Think about the strategic business models in the laptop industry and how they are different from Apple. Put yourself in the role of any company within the laptop industry, and explain a strategic business move that you would recommend. Why would you recommend this move?

Part II: Recall “Mini Case 1: Apple: What’s Next?” on page 471.
Think about the strategic business models in the laptop industry and how they are different from Apple. Put yourself in the role of any company within the laptop industry, and explain a strategic business move that you would recommend. Why would you recommend this move?
When making your recommendation, let’s vary the competitors in order to diversify our discussion forum.

Would you feel comfortable consulting with a patient’s commander, who is not medical personnel? What would it take to justify breaking confidentiality for the greater good of the patient? Why or why not?

This paper should be 3 pages long apa format must have a reference and cover page must have at least four sources and doubled space 
Read the introduction, preamble, and general principles sections of the Code of Ethics at  to an external site..  
Then review:
Air Force Instruction (AFI) 44-172 –> pages 27-28 –> Sections 3.3.1 through 3.4.9 (High Interest List & HIL Procedures) (it is uploaded into the documents section for you). This must be one of the sources
Using the class material reviewed until this point, please complete the following major paper assignment.  Feel free to use additional and credible resources and cite your work.  Remember, APA format is a critical part of your grade.
Would you feel comfortable consulting with a patient’s commander, who is not medical personnel? What would it take to justify breaking confidentiality for the greater good of the patient? Why or why not? Would you consult with anyone else before deciding to do so? Which ethical standards would be in conflict when deciding to do so? How would you resort to the AFI to help you in your decision-making? What if the patient’s commander is a Lt Colonel, who’s never met the patient (a Private), and you don’t know about their level of agreeableness with mental health treatment? You may want to refer to the Military Rank Charts attachment as a reference. Lastly, how would you document this encounter in your note?

You are a medical professor in charge of creating college assignments and answers for medical college students. You design and conduct lectures, evaluate student performance and provide feedback through examinations and assignments. Answer each question separately. Include and Introduction. Provide an answer to this content

This paper should be 3 pages long apa format must have a reference and cover page must have at least four sources and doubled space 
Read the introduction, preamble, and general principles sections of the Code of Ethics at  to an external site..  
Then review:
Air Force Instruction (AFI) 44-172 –> pages 27-28 –> Sections 3.3.1 through 3.4.9 (High Interest List & HIL Procedures) (it is uploaded into the documents section for you). This must be one of the sources
Using the class material reviewed until this point, please complete the following major paper assignment.  Feel free to use additional and credible resources and cite your work.  Remember, APA format is a critical part of your grade.
Would you feel comfortable consulting with a patient’s commander, who is not medical personnel? What would it take to justify breaking confidentiality for the greater good of the patient? Why or why not? Would you consult with anyone else before deciding to do so? Which ethical standards would be in conflict when deciding to do so? How would you resort to the AFI to help you in your decision-making? What if the patient’s commander is a Lt Colonel, who’s never met the patient (a Private), and you don’t know about their level of agreeableness with mental health treatment? You may want to refer to the Military Rank Charts attachment as a reference. Lastly, how would you document this encounter in your note?

. Do not write who you are in the answer.

Identify 2–3 concepts from the course that you are able to say helped you the best in understanding the research methods. 

Review and reflect on the knowledge you have gained from this course. Based on your review and reflection, write at least 3 paragraphs on the following:

Identify 2–3 concepts from the course that you are able to say helped you the best in understanding the research methods. 
Has this course given you tangible considerations that you can apply in your life? Explain your answer.
What approaches could have yielded additional valuable information?

Explain the characteristics and complexities associated with assessment and treatment of co-occurring disorders. 

 

Explain the characteristics and complexities associated with assessment and treatment of co-occurring disorders. 
Describe challenges associated with the case of Elena. 
If you were creating a 30-day treatment plan for Elena, identify two short-term goals based on challenges that Elena is facing. Include an action step that you would include in her treatment plan. 
Post your completed Treatment Plan.

  
Elena is a 44-year-old hearing-impaired Latina female who was admitted to the inpatient treatment facility for alcohol dependence where you are a counselor working with people with addictions. During her admission, Elena expressed reluctance to undergo treatment, stating that her family did not approve of counseling or psychiatric services because they see it as a sign of weakness. During her admission, she began crying and had difficulty stopping. She stated that her husband left her and that her two teenage children were home alone. Elena was inebriated, under emotional distress, and ended up being carried to her assigned room by two staff members.
Your psychosocial intake assessment revealed Elena is also manifesting signs and symptoms of a major depressive disorder. You know that Elena needs help with her alcohol addiction, but you also know that her depression might be a cause or an effect of alcoholism.
Addressing the needs of diverse populations and co-occurring disorders can be a challenging aspect of addiction counseling. This week, you evaluate strategies for addressing the complexities of co-occurring disorders, also known as co-morbid disorders, and you create a 30-day addiction treatment plan for Elena as presented in the case study above.

Analyze access controls used to secure information systems (IS).Explore best practices for controlling access to data and systems.

SEC 3302, Advanced IS Security 1

Course Learning Outcomes for Unit IV
Upon completion of this unit, students should be able to:
1. Analyze access controls used to secure information systems (IS).Explore best practices for controlling access to data and systems.

2. Examine encryption types used for the physical security protection of an organization.

2.1 Explain the general principles of security for a network.
Required Unit Resources
Chapter 4: Secure Networks
In order to access the following resource, click the link below. You can access the transcript for the video by
clicking on the three dots below the video on the right, then clicking “Open transcript.”
Professor Messer. (2021, April 7). Secure networking – SY0-601 CompTIA Security+ : 3.3 [Video]. YouTube.


Unit Lesson
Principles of Secure Networks
Today, employees bring their own electronic devices to work, use personal hot spots, and tether their
cellphones to laptops. How do you keep your corporate network secure in light of all this?
It should be noted that network security, like information technology (IT) security, has to constantly adapt in
response to challenges such as these. As attackers learn more ways of exploiting weaknesses, security has
to learn ways to protect its infrastructure. Basically, as technology improves, security has to keep up. Chapter
4 covers some of the attacks that occur on networks. It also discusses defenses against these attacks. We
cannot cover them all in this lesson, but they are important to learn, so please read the chapter. You are also
encouraged to research further into the topic to learn more.
While the previous unit addressed protecting communications through the use of cryptography, this unit is
more concerned with how networks themselves are maliciously attacked. Messages in modern
telecommunications can be attacked both through their means of conveyance and through the route they
take. A secure network environment must be created that will prevent these attacks. The principles of
availability, confidentiality, functionality, and access control should be utilized to effectuate this security, as
described in the textbook.
UNIT IV STUDY GUIDE
Securing Networks

SEC 3302, Advanced IS Security 2

UNIT x STUDY GUIDE
Title
Because access control is so important, we will return to that subject in Chapter 5. For now, let’s jump right
into some of the attacks that networks encounter and how they work.
Denial-of-Service (DoS) Attacks
One consideration when securing a network is that security involves more than just intruders. Securing a
network requires a balance between keeping your system and data secure and allowing users the access
they need. As mentioned above, the first goal of a secure network is availability. Authorized users have to be
able to access their data, services, and applications. Availability can be affected by conditions like poor
coding or the complications that arise when a large site links to a small site and overwhelms the smaller site.
But there are also intentional attacks that impact access. One of the most well-known is the DoS attack, which
can grind a system to a halt and cause an enormous amount of financial damage.
DoS attacks operate by stopping a service, such as a web service, or by degrading service. A service-
degrading attack can be especially damaging because it cannot be easily identified. A slow degradation of
services may not even be immediately recognized as an attack and may cause damage for a long time before
being discovered. Even worse, the entity who is attacked may spend valuable resources upgrading systems
unnecessarily when they see that their service is not allowing sufficient and reliable access to customers.
DoS attacks can be direct or indirect. They may utilize tactics such as flooding, spoofing, or backspatter, and
they may do their damage through the use of intermediaries, bots, and handlers. These concepts are covered
in your readings and should be reviewed.

SEC 3302, Advanced IS Security 3

UNIT x STUDY GUIDE
Title

Unlike other system attacks, DoS and distributed DoS (DDoS) attacks do not focus on stealing

information or other assets. Instead, these attacks are intended to prevent legitimate users from
accessing servers and services by flooding the servers with more traffic than they are set up to

handle so that they become more and more sluggish until they are either unable to respond or they
crash from the overload. DoS attacks may originate from one machine or system; for DDoS attacks,

multiple systems attack the target, as illustrated in the graphic above.
Defending against DoS attacks can be tricky, even when the attacks are detected. We have some tactics that
can get the system out of trouble, though each tactic has its strengths and weaknesses. One defense, known
as blackholing, drops all of the Internet Protocol (IP) packets from an attacker. While this will stop traffic, the
attacker can simply change IP addresses and restart the attack. Even worse, if an attacker knows blackholing
will be done automatically, they can spoof the attack packets from a known, legitimate corporate partner—
which will cut off that desired traffic.
Other tactics to fight DoS attacks include validating the handshake and rate limiting, which involves limiting a
certain type of traffic to a reasonable amount. Unfortunately, rate limiting can have the unintended impact of
limiting legitimate as well as illegitimate traffic.
Address Resolution Protocol (ARP) Poisoning
ARP poisoning is an attack that is specific to local area network (LAN) traffic. For the attack to work, the
attacker must have a computer on the local network. ARP tables are manipulated to reroute LAN traffic, which
effectuates an attack on both network confidentiality and functionality. In contrast, remember that DoS attacks
are an attack on the availability of a network.
The attack works by taking advantage of the fact that hosts on the same network have to know each other
before they can start exchanging packets using IP addresses. Hosts thereby build ARP tables, and after
validation, the hosts trust all ARP replies. This opens the door for spoofing, allowing the attacker to
manipulate the tables and create false entries for internal hosts and gateways. The stream of spoofed ARP
replies have to be continuous to keep the tables from self-correcting.
ARP poisoning can be prevented using methods like static ARP tables, which involves manually setting tables
that cannot be dynamically updated. A weakness with this method is that business changes will require a
huge amount of work to manage static ARP and IP tables. Another method would simply be to limit local
access by preventing foreign hosts from operating on the LAN. This is a form of network access control,
which we will now discuss further.

SEC 3302, Advanced IS Security 4

UNIT x STUDY GUIDE
Title
Access Controls
Corporate LANs require protection to ensure confidentiality of data sent across the network, but they must
also provide access controls so that only authorized users are allowed on the network. In modern companies,
an intruder can access wired LANs from a wall jack or Ethernet wires, and wireless LANs can be accessed by
radio through an unprotected wireless access point. After gaining this access, an intruder can use a packet
sniffer to detect, intercept, and read traffic. To prevent this from happening, access controls must be utilized in
both wired (Ethernet) networks and wireless networks.
Ethernet LAN security utilizes standards such as 802.1X (port-based access control), extensible
authentication protocol (EAP), and radius servers—each of which functions in different ways and contains
different authorization, audit, and authentication features. These standards and protocols are detailed in your
Chapter 4 readings.
Wireless networks are often attacked using one of three major attack forms:
1. unauthorized access to the network;
2. an attack using an “evil twin,” which is also known as a man-in-the-middle attack; or
3. wireless DoS attacks, which are similar to the DoS attacks we discussed earlier in that their main aim

is to negatively impact the availability of a network.
These attacks prevent the host from accessing a wireless network by utilizing tactics such as flooding the
frequency with electromagnetic interference (EMI) or radio frequency interference (RFI). These tactics make
data packets unreadable due to “noise,” or disturbances in the electrical signal. Another method is to flood the
access point (AP), which would result in the AP using all of its resources to send and receive attack packets
and thereby effectively deny access to any other host. Lastly, attack commands can be sent to APs or clients
that result in a continuous stream of spoofed messages, request-to-send (RTS) frames, or clear-to-send
(CTS) frames that prevent clients from connecting to the AP.
Conclusion
As we stated at the beginning of the lesson, there are clear goals that must be determined when considering
how to secure a networking environment. These goals consist of availability, confidentiality, access control,
and functionality. When dealing with common attacks, such as DoS, ARP poisoning, and attacks on wired and
wireless LANs, one must keep these goals in mind.

Course Learning Outcomes for Unit IV
Required Unit Resources
Unit Lesson

Principles of Secure Networks

Denial-of-Service (DoS) Attacks
Address Resolution Protocol (ARP) Poisoning

Access Controls
Conclusion

Identify a counselor’s ethical obligations when choosing and sharing resources for crisis and trauma support.

 
As a counselor, you may be familiar with recommending resources to clients, but you may not be prepared with the knowledge of similar resources for colleagues, other crisis response members, or for your own use. When faced with a crisis, it is important for counselors to be ready to recommend these kinds of resources on short notice while adhering to their ethical obligations as practitioners. 
Consider the demographics of the population in your local area (community, city, county, or state) that you intend to serve in your counseling practice. 
Create a resource packet to provide to clients and colleagues in your area who are experiencing a developmental crisis, cultural crisis, or loss. Your resource packet should include a variety of the following at the local and national level:

A list of 3–4 web resources
A list of 3–4 books
A list of 3–4 support groups
A list of 3–4 exercises or activities they can do on their own
Accessibility supports for individuals with disabilities
Culturally appropriate and supportive resources for your area
At least 2 resources for colleagues on supporting self-care and preventing vicarious trauma
Any other pertinent resources for clients or colleagues

Reflect on your reasons for choosing these resources to support individuals in your area. 
Summarize the cultural considerations that you made when choosing these resources, including commentary on the defining factors of your target population, such as their socioeconomic status, spirituality, gender identity, race, etc. 
Identify a counselor’s ethical obligations when choosing and sharing resources for crisis and trauma support.

Analyze and understand the market (Latin American market) and develop the effective strategy to enter the market for the company.

The purpose of this assignment is analyze and understand the market (Latin American market) and develop the effective strategy to enter the market for the company. As a team, please determine how Cartoon Network can mitigate the risk of investment on programming in the Latin American market. The writing assignment should include the followings: 

Determine what the best strategy is for mitigating the risk of investment and why (40%)

How can the behavior on the part of the opposite-gender police partners affect the culture of the patrol unit? Explain.

 
You are the Commander of the Patrol Division of a medium-sized metropolitan city. You have 33 patrols out on the 10 p.m. to 6 a.m. shift. It is by far the busiest shift for drunk driving, burglaries, domestic calls, and ATM robberies. The esprit de corps is very high. Lately, you have notice that one of the busiest sector units is dropping off in productivity. You ask around and find out that the partners in that car are a veteran officer, a married man, and a single young female rookie.
The rumor among the rest of the unit is that they are more than just professional partners. Last week, the chief called you into his office and asked about the drop in activity for the club sector of the city, where the patrol unit of concern is working. He got you to admit that there may be an unconfirmed problem. The chief told you that he wanted to know the complete situation and that you were to formulate a plan for dealing with the male/female patrol situation and then to come up with ideas to keep this pattern from emerging again in the future. The department currently has no policies about off-duty relationships of partners.
In a report to the chief of police, you will cite the findings of your investigation of the patrol partners concerned. You will provide at least 2 remedies for the situation so that it is discontinued. You will consider the lack of a fraternization policy in the department and suggest the minimum requirements of items that should be in a new policy for the department. You will include and indicate the types of discipline that should be applied to persons violating the new policy in the future.
Assignment Guidelines

Address the following in 2 pages:

How can the behavior on the part of the opposite-gender police partners affect the culture of the patrol unit? Explain.
What dangers could arise in an intimate relationship between partners as it pertains to the daily operations of patrol? Explain.

How can these dangers act as triggers of stress? Be specific.

Articulate at least 3 appropriate policy measures that should be in effect to help alleviate this type of situation.

Fully justify your policy measures with regard to the survival of a traumatic event.

What possible potential stressors could become present if the affair of the two officers reached the public? Explain.

Write a white paper on a company of your choice and discuss the market segmentation within that industry along with the target market for the company and the selection process for that target market. 

Write a white paper on a company of your choice and discuss the market segmentation within that industry along with the target market for the company and the selection process for that target market. 
COMPANY CHOSEN IS CHIPOTLE MEXICAN GRILLE 
Required Elements:

Include demographic, psychographic, geographic, and behavioral characteristics for the selected company.
A positioning statement for the company with careful consideration of their brand and strategy
es.

× How can I help you?