Solving a business problem | Human Resource Management homework help
Create an 810 slide PowerPoint presentation that defines a business problem, explains how the problem affects an organization, and describes possible solutions. Recommend the best solution for the problem and organization, and justify the recommendation. The ability to effectively solve complex business problems is critical to sustaining organizational quality, essential to achieving strategic goals (Deutsch, 2013). Van Aken, Berends, and Van Der Bijthe (2012, p. xiv) note that in solving business problems the “focus is on designing what can be, or what should be, in order to improve the performance of a specific business system on one or more criteria.”
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency 1: Explain the underlying principles of successful business.
Explain how a business problem affects an organization
Explain how a solution to a business problem will result in increased sustainability.
Competency 3: Solve business problems using critical and creative thinking.
Describe solutions to a business problem.
Explain the advantages and limitations of solutions to a business problem.
Recommend a solution to a business problem.
Support a recommended solution to a business problem with relevant evidence.
Competency 5: Communicate in a manner that is scholarly, professional, and consistent with expectations for the field of business.
Write in a well organized, clear, and succinct manner.
Reference
Deutsch, C. (2013). The seeking solutions approach: Solving challenging business problems with local open innovation. Retrieved from http://timreview.ca/article/664
van Aken, J., Berends, H., & van der Bij, H. (2012). Problem solving in organizations: A methodological handbook for business and management students (2nd ed.). Cambridge, MA: Cambridge University Press.
Preparation
Begin your preparation work for this assessment by selecting a business-related topic. This can be a business topic you would like to research to gain new insight that will be helpful to you in your current work environment, or it might simply be a business topic you are interested in. Some examples of business topics include:
Workplace diversity.
Management techniques.
Globalization.
Marketing trends.
Change management.
As you choose your topic, think about how knowing more about that topic will improve your career or advance your organization’s mission. Selecting an appropriate topic will enable you to develop a sound argument that is supported by expert knowledge.
Once you have your topic, think about a problem or challenge associated with that topic. For example, if your topic is workplace diversity, the associated problem might be the challenge faced by organizations in creating a productive, healthy, and supportive work environment.
Next, research your topic and problem. Locate 37 reputable resources on the topic. The resources you choose will help you to define the focus of your research and writing. For example, if your topic is workplace diversity and your problem is how organizations can create a productive and supportive work environment, your research may lead you to focus on how company policies can influence the work environment. Your research should also help you develop possible solutions to the problem.
Now, suppose the topic and problem you have selected are also primary concerns for your organization’s leadership. You have been asked to research the topic and problem and prepare a presentation for the executive board that includes your evaluation of the problem and your recommendation for a solution.
Requirements
Develop a PowerPoint presentation on the business topic and problem you selected. Use the notes feature of each slide to expand your bullet points and reference your resources. PowerPoint presentations generally shouldn’t have sentences such as a white paper or plan would, but instead should have bullet points that are organized and clearly convey the intent of the presentation. You should still follow APA rules for attributing sources that support your analysis and conclusions.
Your presentation should include one or more slides covering each of the following areas, and you could use slide titles more explicitly related to your chosen topic than are shown below. A template with this structure is provided in Resources for you to use to create your presentation if desired.
Title slide.
Introduction (optional).
The Problem.
Define the business problem.
How the Problem Affects an Organization.
Explain how the business problem affects an organization and consider the consequences of not solving the problem.?
Possible Solutions.
Describe solutions to the business problem, and explain how each is relevant to the organization.
Advantages and Limitations of Possible Solutions.
Explain the advantages and limitations of solutions to the business problem, including aspects of costs, efficiencies, and effectiveness.
Recommended Solution.
Recommend a solution to the business problem, and explain how the solution is right for an organization in terms of cost, needs, organizational culture, and effectiveness.?
Organizational Sustainability in Profits and Satisfaction.?
Explain how your recommended solution to the business problem will result in increased sustainability with regard to profit and/or customer and employee satisfaction.
Conclusion: Supporting Evidence.
As a summary, justify and support your recommended solution to the business problem with relevant evidence and sound reasoning.
Reference Page.
Example assignment: You may use the assignment example, linked in the Resources, to give you an idea of what a Proficient or higher rating on the scoring guide would look like.
Additional Requirements
Based on the intended audience, your presentation should be well organized and written in clear, succinct language. Follow APA rules for attributing sources that support your analysis and conclusions.
Academic Integrity and APA Formatting
As a reminder related to using APA rules to ensure academic honesty:
1. When using a direct quote (using exact or nearly exact wording), you must enclose the quoted wording in quotation marks, immediately followed by an in-text citation. The source must then be listed in your references page.
2. When paraphrasing (using your own words to describe a non-original idea), the paraphrased idea must be immediately followed by an in-text citation and the source must be listed in your references page.
Fordham University Psychology Development Discussion
Book: Book: QUESTION 11.Which group of psychologists is known to approach their research with questions about what is working instead of what is not working?industrialorganizational psychologistsB. clinical psychologistsdevelopmental psychologistsvocational psychologists0.5 points QUESTION 21.What task differentiates positive youth developmentalists from resilience researchers?Positive youth developmentalists design and conduct programs based on resilience research.Resilience researchers use the empirical data for creating resilience programs.Resilience researchers have oversight of the development of programs related to their work.Positive youth developmentalists develop research on resilience and related constructs.0.5 points QUESTION 31.Although scholars agree on what needs to be present for a person to be considered resilient, what debate is currently taking place?the universality of protective factorsthe definition of protective factorsthe existence of resilient adultsthe ability to study resilience0.5 points QUESTION 41.Which of the following is something that resilience researchers look out for when examining a childs postthreat functioning?a return to normal functioningsustained friendshipsdevelopment of new coping strategiesphysiological signs of stress0.5 points QUESTION 51.What major force is often ignored in the conceptualization of resilience outcomes?number of childhood risk factorsfamilyculturesocioeconomic status0.5 points QUESTION 61.What is important about having awareness of unconscious or conscious stereotypes while conducting resilience research?Understanding whether stereotypes are unconscious or conscious can help with determining who should be conducting research.Awareness of stereotypes can allow for researchers to further investigate those specific assumptions.The stereotypes can lead to asking less questions that allow groups to show their true strengths.If the groups being researched are aware of the stereotypes, then their behaviors can become unpredictable.0.5 points QUESTION 71.Which term is used for meeting the social, educational, cultural, and occupational expectations of society?internal adjustmentexternal adaptationinternal regulationexternal modification0.5 points QUESTION 81.Which two primary characteristics accounted for the resiliency of at-risk children in the Werner and Smith study involving children born on the island of Kauai?an outgoing disposition and several sources of supporta wealthy family member and several sources of supporta positive outlook and a wealthy family membera healthy lifestyle and a parent who was home during the day0.5 points QUESTION 91.In the study of children on the Hawaiian island of Kauai, what factor affected one third of children who were considered as at-risk for academic and social problems?onset of neurodevelopmental disordersdevelopment of intellectual disabilitiesability to access educational resources outside of schooldeficits in family support and home environments0.5 points QUESTION 101.People do best in life when developing coping skills during ______.the beginning of their careerchildhood, particularly the first 10 yearsearly adulthood, when they become independentthe stages that they need the most care from others0.5 points QUESTION 111.What is something that a person who has low self-awareness can do to build resilience?Ask others to give advice on what the person should do.Ignore negative traits or circumstances to avoid the need to build resilience.Observe their friends who have high self-awareness.Learn to recognize their own strengths.0.5 points QUESTION 121.Which of the following is an outcome targeted by positive youth development programs?rewarding bondingeffective critical thinking skillsgreater occupational successincreased cultural awareness0.5 points QUESTION 131.African-American and Mexican youth have shown better self-esteem and academic performance, respectively, due to ______.decreased conflict within communitiesstrong religiositygreater multi-cultural competencea strong ethnic identity0.5 points QUESTION 141.What do the authors imply that slogans aimed at empowering women can result in?Women may feel empowered by the slogans depending on which ethnic groups are represented in the messages.Young women may view the slogans as patronizing gestures.Men may perceive the slogans as slights against their competence.Women may feel as though their failures cannot be attributed to the systems of the world.0.5 points QUESTION 151.What unintended consequence can occur from articles that attempt to be helpful toward populations that are struggling?Over-emphasis on the success of struggling groups can take away from their issues that need to be addressed.There can be too much attention toward these struggling groups, making it hard to find mutually agreed-upon decisions.There might be stigmatization or the creation of deficit models that make recovery difficult.Struggling groups can feel patronized from receiving help from outside of their group.0.5 points QUESTION 161.Within the Chickering model, what is the primary developmental goal for college students?developing mature interpersonal relationshipsdevelopmental competencemoving through autonomy toward interdependencemanaging emotions0.5 points QUESTION 171.Which of the following is the best example of someone undergoing the task of developing an identity?A person becomes more engaged with their career and coworkers.A person starts to build a broader social circle.A person passes down meaningful information about life to others.A person begins to follow their own political stances instead of their parents stance.0.5 points QUESTION 181.According to the MacArthur study of successful aging, what are the three components of successful aging?avoiding disease, contributing to the next generation, and remaining financially independentavoiding disease, engaging with life, and maintaining functioningengaging with life, contributing to the next generation, and avoiding dementiaengaging with life, maintaining functioning, and remaining financially independent0.5 points QUESTION 191.Which of the following has been shown to be a secondary theme linked to successful aging?positive experiences as a childhigher levels of educationpolitical stancesnumber of family members0.5 points QUESTION 201.What might the studies on MacArthur studies and Valiant study indicate about successful aging?People tend to age successfully if they are born in eastern countries.Transcendence is key to successful aging and is seen across cultures.Living around multiple family members is an underlying factor in successful aging.Successful aging may be due to having positive emotional experiences in early life.
Research report #1: data breach
Research Report #1: Data Breach Incident Analysis and Report
Scenario
Padgett-Beale Inc.s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the companys security policies, processes, and plans. The auditors found that the majority of PBIs operating units did not have specific plans in place to address data breaches and, in general, the company was deemed not ready to effectively prevent and/or respond to a major data breach. The insurance company has indicated that it will not renew PBIs cyber insurance policy if PBI does not address this deficiency by putting an effective data breach response policy and plan in place. PBIs executive leadership team has established an internal task force to address these problems and close the gaps because they know that the company cannot afford to have its cyber insurance policy cancelled.
Unfortunately, due to the sensitivity of the issues, no management interns will be allowed to shadow the task force members as they work on this high priority initiative. The Chief of Staff (CoS), however, is not one to let a good learning opportunity go to waste
especially for the management interns. Your assignment from the CoS is to review a set of news articles, legal opinions, and court documents for multiple data breaches that affected a competitor, Wyndham Worldwide. After you have done so, the CoS has asked that you write a research report that can be shared with middle managers and senior staff to help them understand the problems and issues arising from the insurance companys findings and the court case against Wyndham Worldwide.
Research
1. Read / Review the readings for Weeks 1, 2, 3, and 4.
2. Research the types of insurance coverage that apply to data breaches. Pay attention to the security measures required by the insurance companies before they will grant coverage (underwriting requirements) and provisions for technical support from the insurer in the event of a breach. Here are three resources to help you get started.
a. https://www.aba.com/Tools/Function/Documents/2016Cyber-Insurance-Buying-Guide_FINAL.pdf (see page 4)
b. https://www.travelers.com/cyber-insurance
c. https://wsandco.com/cyber-liability/cyber-basics/
3. Read / Review at least 3 of the following documents about the Wyndham Hotels data breach and liability lawsuits.
a. https://hotellaw.jmbm.com/ftc-v-wyndham-what-every-hotel-owner-needs-to-know-about-data-security-after-the-wyndham-case.html
b. https://hotellaw.jmbm.com/files/2015/08/FTC-v-Wyndham-Worldwide-3rd-Circuit-opinion-8-24-15.pdf
c. https://www.ftc.gov/news-events/press-releases/2015/12/wyndham-settles-ftc-charges-it-unfairly-placed-consumers-payment
d. https://www.lexology.com/library/detail.aspx?g=4e7666a0-72b6-413b-b444-62d07426a71c
e. https://www.lexology.com/library/detail.aspx?g=86006108-0b85-4357-a0d6-a73d97d9ecbd (pay close attention to the final paragraph!)
f. https://www.lexology.com/library/detail.aspx?g=68f8a12e-a5c8-4aff-8934-c7d667ab4394 (best practice recommendations!!!)
Note: If Lexology.COM asks you to register for access, switch to another browser or clear your cookies / cache for that website.
4. Find and review at least one additional resource on your own that provides information about data breaches and/or best practices for preventing and responding to such incidents.
5. Using all of your readings, identify at least 5 best practices that you can recommend to Padgett-Beales leadership team as it works to improve its data breach response policy and plans.
Write
Write a three to five page report using your research. At a minimum, your report must include the following:
1. An introduction or overview of the problem (cyber insurance companys audit findings regarding the companys lack of readiness to respond to data breaches). This introduction should be suitable for an executive audience and should explain what cyber insurance is and why the company needs it.
2. An analysis section in which you discuss the following:
a. Specific types of data involved in the Wyndham Worldwide data breaches and the harm
b. Findings of the court regarding actions Wyndham should have taken
c. Findings of the courts regarding liability and penalties assessed against Wyndham
3. A review of best practices which includes 5 or more specific recommendations that should be implemented as part of Padgett-Beales updated data breach response policy and plans. Your review should identify and discuss at least one best practice for each of the following areas: people, processes, policies and technologies. (This means that one of the four areas will have two recommendations for a total of 5.)
4. A closing section (summary) in which you summarize the issues and your recommendations for policies, processes, and/or technologies that Padgett-Beale, Inc. should implement.
Submit For Grading
Submit your research paper in MS Word format (.docx or .doc file) using the Research Report #1 Assignment in your assignment folder. (Attach your file to the assignment entry.)
Additional Information
1. To save you time, a set of appropriate resources / reference materials has been included as part of this assignment. You must incorporate at least five of these resources into your final deliverable. You must also include one resource that you found on your own.
2. Your research report should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts for recommended resources.
3. Your research report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings to organize your paper. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the professional appearance requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use.
4. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
5. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).
Assignment 2: strengths, weaknesses, opportunities, and threats
Refer to the Scenario for the Assignments.
First, conduct a SWOT analysis of your technology integration. This analysis should cover the four (4) categories Strengths, Weaknesses, Opportunities, and Threats. You will submit this analysis with your paper.
A SWOT analysis provides a clear baseline regarding the strengths, weaknesses, opportunities, and threats of your chosen technology. There are many templates available online that you might wish to research before beginning your analysis work. Education World has a very short article that may also help to organize your thoughts: http://www.educationworld.com/a_admin/greatmeetings/greatmeetings018.shtmlhttp://www.educationworld.com/a_admin/greatmeetings/greatmeetings018.shtml.
Next, write a six to eight (68) page (or 1,5002,000 word) paper to address the following:
Provide an Introduction in which you present the scope of your analysis and how the two technologies you have selected work together to enhance the learning environment. (Note: Place this at the beginning the paper as the Introduction.)
Provide a short description in one or two (1 or 2) paragraphs, of a class or module to frame your SWOT analysis. As you move through the analysis, keep in mind that your selected technologies must help to support instructional goals and learning outcomes.
Using each portion of your SWOT analysis, include three to five (3-5) examplesof how your technologies provide strengths, weaknesses, opportunities, or threats. You must support these examples with clear rationale and research. These are NOT to be written as simple bullet points without detailed information.
Provide a hypothetical timeline (of between six [6] months and a year) for the project development and implementation.
Provide a summary of the main points of your analysis and at least three (3) recommendations for the implementation of the new technologies in a summary paragraph.
Provide at least five (5) peer-reviewed references, published in the last three (3) years.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. In addition, you should only have 10% quotes in your paper.
Include these Key Sections
Title page
Introduction
SWOT analysis
Proposed timeline for implementation
Summary
The specific course learning outcomes associated with this assignment are:
Examine different types of technological resources for educational purposes.
Evaluate how technology can change the content and methods of education.
Analyze how technology can support the learning of diverse students.
Use technology and information resources to research issues in integrating technology into education.
Write clearly and concisely about integrating technology into education using proper writing mechanics.
Grading for this assignment will be based on answer quality, logic/organization of the paper, and language and writing skills.
The Scenario for Assignments 13:
You will be using this scenario as the guide for your assignments in this class for the quarter.
Assume that your supervisor has appointed you to lead a committee tasked with providing a research-based proposal for integrating emerging technologies into an educational need for your organization (i.e., K12, higher education, corporate or military training). You will develop the plan in stages, which will culminate in a final project that is due in Week 10. Keep in mind that the proposal must be focused on education or training with an emphasis on new technologies. You will need to include a sample outline of how these technologies will be applied in your institution.
Using the list provided here, you must propose the integration of at least two (2) emerging technologies You are welcome to select two (2) from this list or select one (1) from here and research one (1) additional technology of your choosing. The two technologies combined must help to support your learning goals and create an engaging environment for your learners.
Etale Digital Age Learning, located at www.etale.org, provides access to educational documentaries across a wide range of topics.
Edmodo, located at www.edmodo.com. Similar to what Facebook and Twitter do for social media, Edmodo is designed specifically for educational needs to keep materials, connections, and all members of the school community in touch.
Integrate Twiddla, located at www.twiddla.com, into a training session or lesson for K-12 students. (Twiddla is an online tool that allows students to set up a Web-based meeting playground. Students have the ability to set up conference calls, too.)
Evernote, located at www.evernote.com, helps to organize different kinds of media in one place. With everything in one place, this tool is especially useful for sharing ideas for team teaching and collaboration across districts or locations.
Softchalk, located at www.softchalk.com, provides a cloud-based solution for collaboration, lesson planning, as well as a way to link content from multiple courses in one place in the cloud.
Blogger, located at www.blogger.com, or KidsBlog, located at http://kidzblog.en.softonic.com/, both provide user-friendly tools to create blogs.
SocialMention, located at http://socialmention.com/, is a social media search engine that highlights content useful for many different kinds of instruction and topics.
Padlet, located at https://padlet.com, is a collaborative web board where you can make online class bulletin boards, poster projects, do brainstorming, and other online documents.
G Suites for Education, located at https://edu.google.com/, includes Google Classrooms and Google Docs, Google Forms, Google Cloud, and other Google tools where you can create and post assignments, collaborate with your students, and communicate with parents.
Week 2 assignment cultural competence in the classroom | EDU692 | Ashford University
Nikhil Goyal is a successful high school student who, like many students his age, hates school. But unlike most students his age, Nikhil wrote a speech about it and delivered it to a global audience his presentation Why Kids Hate School?: Nikhil Goyal at [email protected]Links to an external site.. In his presentation, Nikhil shares the story of another student, Nick Perez. The central theme of the presentation is relevance and, specifically, how schools often lack relevance to the lives of their learners.
In this assignment, you will reflect on the story of Nick Perez and analyze it based on what might have happened differently if Nicks education targeted the learning of 21st century skills through culturally relevant learning opportunities. Additionally, you will recommend a culturally relevant learning experience that might have been able to meet Nicks needs in high school. Review the Instructor Guidance for this week for additional information and use the Ladson-Billing (1995; summarized in the Instructor Guidance) resource and Chapters 4 and 8 of Wardle (2013) to define a culturally relevant learning experience; apply this framework to the creation of solutions. Then, create your paper to meet the content and written communication expectations stated below.
In your paper, include the following: (3 points)
1. Discuss the learning experiences and cultural competencies that you believe were valued at Nicks school, based on the information presented in the video and which learning experiences and cultural competencies would be most applicable and interesting to Nick using his interest in computers as a form of his cultural identity (think about the way that he described his life at home and at computer camp). Include examples using at least two of the following four characteristics of cultural competence:
o Awareness of ones own cultural worldview (including biases)
o Knowledge of different cultural practices and worldviews
o Positive attitudes and open-mindedness toward cultural differences
o Ability to work successfully with others from different cultures
2. Determine which of the 4C skills (i.e., creativity and innovation, critical thinking and problem solving, communication, and collaboration that are presented in The 4Cs Research SeriesLinks to an external site.) you perceive are most likely relevant to Nicks current position as a programmer in an advertising firm and which of these skills you perceive are not adequately addressed in typical classroom environments today (2 points).
3. Summarize how the acquisition of learning and innovation skills through culturally relevant instruction can lead to greater student success in the classroom and in the real world. Include examples using at least three of the following nine areas of culturally relevant instruction (2 points):
o Maximizing academic success through relevant instructional experiences
o Addressing cultural competence through reinforcing students cultural integrity
o Involving students in the construction of knowledge
o Building on students interests and linguistic resources
o Tapping home and community resources
o Understanding students cultural knowledge
o Using interactive and constructivist teaching strategies
o Examining the curriculum from multiple perspectives
o Promoting critical consciousness through opportunities to challenge predominant elements of the students social norms
If you are enrolled in the MAED Program, it is imperative that you keep copies of all assignments completed in this course. You will return to them for the portfolio that you will create in your final MAED course. This portfolio is a culminating project that will demonstrate that you have met program outcomes.
Review this weeks Instructor Guidance for additional information about completing this assignment. Contact your instructor for clarifications about this or any assessment in the course before the due date using the Ask Your Instructor forum. Then, also using the Grading Rubric as a guide for your performance on this assignment, construct your assignment to meet each of the content and written communication expectations.
Review your assignment with the Grading Rubric to be sure you have achieved the distinguished levels of performance for each criterion and submit the assignment for evaluation no later than Day 7.
Cultural Competencies in the Classroom
· Must be two to three double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing CenterLinks to an external site..
· Must include a separate title page with the following:
o Title of paper
o Students name
o Course name and number
o Instructors name
o Date submitted
· Must use four sources including the course text and at least three scholarly, peer-reviewed, credible sources.
o The Scholarly, Peer Reviewed, and Other Credible SourcesLinks to an external site. table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
· Must document all sources in APA style as outlined in the Ashford Writing Center.
· Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.(1 point)
Required Resources
Text
Wardle, F. (2013). Human relationships and learning in the multicultural environment [Electronic version]. Retrieved from https://content.ashford.edu/
Discrimination in Curricula and Pedagogy
Chapter 4: Addressing Racism and Discrimination in Curricula and Pedagogy
Chapter 8: The Impact of Diversity on Learning
Multimedia
Jammer jhed. (2012, December 13). The landfill harmonic orchestra. Retrieved from the Landfill Harmonic OrchestraLinks to an external site..
Teachers Lounge (2014, February 11). Why kids hate school?: Nikhil Goyal at [email protected]Links to an external site. [Video file]. Retrieved from https://youtu.be/0Iz4APbOOcI
Web Pages
Framework for 21st century learningLinks to an external site.. (2007). Retrieved from http://www.p21.org/our-work/p21-framework
This article provides information about 21st Century Learning and will assist you in the Discussions and the Assignment this week, as well as in future weeks.
Recommended Resources
Article
Ladson-Billings, G. (1995). But thats just good teaching! The case for culturally relevant pedagogy [PDF]. Theory Into Practice, 34(3), 159-165. Retrieved from https://nationalequityproject.files.wordpress.com/2012/03/ladson-billings_1995.pdf
The full-text version of this article is available through the Proquest database in the Ashford University Library. This article provides information about issues related to cultural relevance, funds of knowledge, and teaching may assist you in the Discussions and Assignment this week, as well as future Assignments.
Week 5 final | Education homework help
Week 5 – Final Paper
Global Societal Problem, Argument and Solution
[WLOs: 1, 2, 3, 4, 5] [CLOs: 1, 2, 3, 4, 5]
Prepare: Prior to beginning work on this assignment, please review this Sample Final Paper GEN499 for additional guidance on the expectations of this assignment.
The topic of your essay needs to be a global societal problem from the following list:
Climate change
Pollution
Religious conflict and violence
Rise of artificial intelligence
Lack of education
Unemployment and lack of economic opportunity
Government accountability and corruption
Food and water security
International drug trafficking
Poverty and income inequality
Reflect: Based on the topic that you have chosen, you will need to use critical thinking skills to thoroughly understand how this topic can be a global societal problem and determine some logical solutions to the problem.
Write: This Final Paper, an argumentative essay, will present research relating the critical thinker to the modern, globalized world. In this assignment, you need to address the items below in separate sections with new headings for each.
In your paper,
Identify the global societal problem within the introductory paragraph.
Describe background information on how that problem developed or came into existence.
Show why this is a societal problem.
Provide perspectives from multiple disciplines or populations so that you fully represent what different parts of society have to say about this issue.
Construct an argument supporting your proposed solutions, considering multiple disciplines or populations so that your solution shows that multiple parts of society will benefit from this solution.
Provide evidence from multiple scholarly sources as evidence that your proposed solution is viable.
Interpret statistical data from at least three peer-reviewed scholarly sources within your argument.
Discuss the validity, reliability, and any biases.
Identify the strengths and weaknesses of these sources, pointing out limitations of current research and attempting to indicate areas for future research. (You may even use visual representations such as graphs or charts to explain statistics from sources.)
Evaluate the ethical outcomes that result from your solution.
Provide at least one positive ethical outcome as well as at least one negative ethical outcome that could result from your solution.
Explain at least two ethical issues related to each of those outcomes. (It is important to consider all of society.)
Develop a conclusion for the last paragraphs of the essay, starting with rephrasing your thesis statement and then presenting the major points of the topic and how they support your argument. (For guidance on how to write a good conclusion paragraph, please review the Introductions & Conclusions (Links to an external site.) from the Ashford Writing Center (Links to an external site.).)
The Global Societal Problem, Argument, and Solution Paper
Must be 1,750 to 2,250 words in length (approximately between seven and nine pages; not including title and references pages) and formatted according to APA style, as outlined in the Ashford Writing Centers APA Style (Links to an external site.) resource.
Must include a separate title page with the following:
Title of paper
Students name
Course name and number
Instructors name
Date submitted
For further assistance with the formatting and the title page, refer to APA Formatting for Word 2013 (Links to an external site.).
Must utilize academic voice. See the Academic Voice (Links to an external site.) resource for additional guidance.
Must include an introduction and conclusion paragraph. Your introduction paragraph needs to end with a clear thesis statement that indicates the purpose of your paper.
Must use at least eight scholarly sources.
Source Document Requirements:
Multimedia sources (such as videos) may be used, but no more than two such sources may be used. If multimedia sources are used, they must be authored and distributed by credible sources, such as universities, law schools, medical schools, or professors, or found in the Ashford University Library.
Government sources may be used, but no more than two such sources may be used. Examples include whitehouse.gov, state.gov, usa.gov, cdc.gov, and so forth. These websites can be used to make a stronger point about your proposed solution within the argument.
Where documents are used for source materials, those must be peer-reviewed, scholarly journal articles, and academically published books. Popular media sources (e.g., newspapers, magazines, television and radio shows, etc.) must not be used. Materials from advocacy groups (e.g., Greenpeace, Human Rights Campaign, National Organization for Women, etc.) must not be used.
Sites such as ProCon.org and Wikipedia must not be used.
Religious texts must not be used.
The Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, contact your instructor. Your instructor has the final say about the appropriateness of a specific source for an assignment. The Integrating Research (Links to an external site.) tutorial will offer further assistance with including supporting information and reasoning.
Must document in APA style any information used from sources, as outlined in the Ashford Writing Centers Citing Within Your Paper (Links to an external site.).
Must have no more than 15% quoted material in the body of your essay based on the Turnitin report. References list will be excluded from the Turnitin originality score.
Must include a separate references page that is formatted according to APA style. See the Formatting Your References List (Links to an external site.)resource in the Ashford Writing Center for specifications.
Good Critical Thinking Tips:
Your paper should include academic sources that explain multiple sides of the issue.
Your interpretations of the evidence should be objective and state the conclusions and theses presented in the evidence clearly and fairly.
Your paper should place the various forms of evidence in relation to one another and demonstrate why one form or perspective is stronger than the other positions that one could take on the issue.
Your paper should point out the limitations of current evidence and attempt to indicate areas for future research.
Writing Tools:
Threat modelling with stride | Information Systems homework help
Purpose
This project provides an opportunity to apply the concepts of using a Threat Modeling methodology, STRIDE, against a fictitious Healthcare organizations application.
Learning Objectives and Outcomes
You will gain an overall understanding of risk management, its importance, and critical processes required when developing a threat model as a part of risk management for an organization.
Required Source Information and Tools
Web References: https://www.webtrends.com/blog/2015/04/threat-modeling-with-stride/
Deliverables
As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation, identifying the threats and vulnerabilities facing your organization.
Submission Requirements
All project submissions should follow this format:
Format: Microsoft Word or compatible
Font: Arial, 10-point, double-space
Citation Style: APA style. Any work copied from Internet or other sources will automatically receive a 0.
Scenario
You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors.
Company Products
Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.
HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics over the Internet. Information transmitted over this network include patient health information, xrays, bloodwork, and diagnoses.
HNetPay is a Web portal used by many of the companys HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart. The Web portal is hosted on a Windows IIS Web server. Data from the portal is stored in an Oracle database on a Unix server.
HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the companys products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites. You have already run a Nessus scan and used nmap to determine vulnerabilities.
Information Technology Infrastructure Overview
Health Network operates in a production data center that provide high availability across the companys products. The data center host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees. Employees are allowed to work from home, using their company-issued laptops. There is also a wireless network available at work.
Project
For the project, you must create a threat model, using STRIDE (remember to use the information in the article at the Web link, to understand these sections). To do so, you must analyze the data and create a threat model document that contains the following sections:
1. A section titled Attacker Viewpoint discussing framing the threat from the mindset of the perceived attacker. Address the following questions: 5 points.
a. Who is likely to attack the system?
b. What are they likely to attack to accomplish their goal?
2. A section titled Asset Viewpoint discussing the organizations assets from the information provided in the scenario, above. Be sure to also address the following questions (I recommend placing this in a table). 15 points
a. What is the asset?
b. What value does the asset have to the organization?
c. How might that asset be exploited by an attacker?
3. A section, titled STRIDE, that will identify the following security threats for six different categories, as discussed in the article in the Web reference you were asked to read, as they apply to this scenario. Include the following: 60 points
a. Spoofing address any spoofing threats that might be present in the applications or systems. Include the ramifications (impact) of a spoofing attack.
b. Tampering address any data or databases that might be subject to data tampering (applications, for instance, that might be vulnerable to cross site scripting attacks or SQL injection in the healthcare organization scenario, above).
c. Repudiation address where repudiation attacks might be possible in the organization.
d. Information disclosure address where there may be the likelihood for a data breach in the organizations assets listed in the scenario that would allow the attacker to access private information (or, worse, patient health information). Discuss the laws and regulations that would be impacted and the ramifications (impact and penalities) that would be incurred by this organization in that event.
e. Denial of Service discuss the potential for service interruptions for those systems or applications connected to the Internet. Which systems are vulnerable? What would be the impact to the organization for each connected system, if it were to be unavailable?
f. Elevation of Privilege discuss the systems and applications that might be subject to an attacker elevating his privilege levels (think of a patient database – what would happen if the attacker was able to gain Administrator access to the database?).
4. A section, titled Risk Mitigation Plan, that summarizes your findings for the boss and discusses the security controls that you recommend for each of the potential attacks that you have identified. This can be summarized using the table Ive provided for you below for each of your threats. Remember to assign the implementation of the recommended security control to a role within the organization (you can use a generic role, such as System Administrator, Database Admin, Security Officer, etc. your textbook and other supplemental readings listed different organizational roles responsible for managing risk) 20 points.
Risk Mitigation Plan:
Asset
Threat
Impact
Recommended Security Control
Responsible Role
Week 4 assignment effective lesson planning and design | EDU 650 Teaching, Learning & Leading in the 21st Century | Ashford University
Chapter 9 of the textbook focuses on the importance of designing effective lessons. For this assignment, you will create a presentation using PowerPoint, Prezi (Links to an external site.)Links to an external site., or another presentation tool of your choice to analyze effective practices in designing effective instruction for students.
Scenario: You have been asked by a colleague or administrator to support other educators in designing effective instruction. It has been observed that most of the educators have been planning instruction using a traditional model. The objectives of the presentation are to explain the backwards design model of designing instruction, to provide an overview and rationale of the process, to compare and contrast the two models, and finally to provide an example that other educators could use as a model for their own planning.
The presentation will consist of three parts:
Part 1: Effective Lesson Design and Backwards DesignIn this section of the presentation, you will need to discuss the following topics:
a. What are the most important elements of effective lesson design?
b. Why are good learning objectives critical to planning effective instruction?
c. Provide an example of a good learning objective aligned with the Common Core State Standards. What makes this a good learning objective?
d. What are some common pitfalls in planning effective lessons? How can we avoid these pitfalls?
e. What does backwards design mean?
f. How does the Common Core State Standards Initiative (Links to an external site.)Links to an external site. play a role in designing effective instruction?
Part 2: Compare and Contrast Backwards Design and the Traditional Model
In your presentation, include a visual representation using a chart, diagram, concept map, info graphic, or any other visual that compares and contrasts the backwards design model with the traditional model of lesson planning.
Part 3: Backwards Design Activity
In this section of your presentation, you should demonstrate the process of planning a brief lesson (not an entire unit) for any grade level through a backwards design approach. Your example should be a specific example that starts with planning for stage one (identifying desired results), then stage two (assessment evidence), and lastly, stage three (the learning activities). Your activity must be aligned to a Common Core State Standard (Links to an external site.)Links to an external site..
Optional: If you are interested in honing your professionalism and speaking skills, consider delivering your presentation to an audience and videotaping it (you can include a YouTube (Links to an external site.)Links to an external site. link in the slides) or creating a screencast of the presentation using Screencast-o-matic (Links to an external site.)Links to an external site. or Jing (Links to an external site.)Links to an external site. and recording yourself presenting the information. If you choose to record yourself or do a screencast, be sure to have relevant information on the screen (such as your presentation slides) while you are speaking and include the link in your presentation for your instructor. This could be a great addition to your professional portfolio and to any professional networks in which you are involved (i.e., LinkedIn, Twitter, or any professional organizations). Such a presentation can provide you an opportunity to demonstrate your knowledge, skills, and professionalism to others and to gain meaningful feedback.
In your presentation, you should cite your sources both in your slides and in your references using APA format as outlined in the Ashford Writing Center. You must cite the course textbook as well as at least one other peer-reviewed source. The presentation should be 12 to 20 slides in length, not including title and reference slides. Be sure to also save a copy of your assignment for your Final Project and for future professional development.
Prior to writing, download and use this template: Effective Lesson Plans
Required Resources
Text
Newman, R. (2013). Teaching and learning in the 21st century: Connecting the dots (2nd ed.). Retrieved from https://content.ashford.edu/
Chapter 9: Designing Effective Lessons
This chapter focuses on the specific ways to design and plan effective lesson plans. It introduces the understanding by design lesson planning strategy and examines how a teacher can craft an instructional plan using the backward mapping approach.
Chapter 10: Engaging and Connecting Students to the Learning
This chapter examines how individuals organize information in their brains and how they make meaning of situations and events. It also focuses on the theory of learning called constructivism and looks at the works of Vygotsky and Piaget.
Multimedia
Michael Pershan. (2012, July 6). What if Khan Academy was made in Japan? (Links to an external site.)Links to an external site. [Video file]. Retrieved from http://www.youtube.com/watch?v=CHoXRvGTtAQ
Rystad, M. (2013, April 7). Assessment for learning (Links to an external site.)Links to an external site. [Video file]. Retrieved from http://www.youtube.com/watch?v=HcLMlY6R7RM
This video explains multiple strategies for assessment for learning, or formative assessments, to inform instructional decisions.
TED Talks. (2011, March). Salman Khan: Lets use video to reinvent education (Links to an external site.)Links to an external site. [Video file]. Retrieved from http://www.ted.com/talks/salman_khan_let_s_use_video_to_reinvent_education.html
Websites
Common Core State Standards Initiative (Links to an external site.)Links to an external site. (http://www.corestandards.org/)
Official Common Core State Standards website.
Recommended Resources
Article
Darling-Hammond, L., & Adamson, F. (2010). Beyond basic skills: The role of performance assessment in achieving 21st century standards of learning (Links to an external site.)Links to an external site.. Stanford Center for Opportunity Policy in Education. Retrieved from https://scale.stanford.edu/system/files/beyond-basic-skills-role-performance-assessment-achieving-21st-century-standards-learning.pdf
This article discusses the key role of accountability measures in education and the role of performance assessments in twenty-first century learning.
International Society for Technology in Education. ISTE Standards Teachers. (Links to an external site.)Links to an external site. Retrieved from http://www.iste.org/docs/pdfs/20-14_ISTE_Standards-T_PDF.pdf
Text
Popham, W. J. (2010). Classroom assessment: What teachers need to know (6th ed.). Upper Saddle River, NJ: Prentice-Hall.
This text discusses the range of topics teachers need to know about assessment.
Websites
Jing (Links to an external site.)Links to an external site. (http://www.techsmith.com/jing.html)
Khan Academy (Links to an external site.)Links to an external site. (http://www.khanacademy.org)
PowToon (Links to an external site.)Links to an external site. (http://www.powtoon.com)
Prezi (Links to an external site.)Links to an external site. (http://prezi.com)
Screencast-o-matic (Links to an external site.)Links to an external site. (http://www.screencast-o-matic.com)
Sliderocket (Links to an external site.)Links to an external site. (http://www.sliderocket.com)
Smore (Links to an external site.)Links to an external site. (https://www.smore.com)
YouTube (Links to an external site.)Links to an external site. (http://www.youtube.com)
Psy 350 week 5 assignment final project biopsychological analysis of
Week 5 – Final Project
Biopsychological Analysis of a Neuropsychological Disorder
[WLOs: 3] [CLOs: 1, 2, 3, 4]
Prior to beginning work on this assignment, review your completed Week 1 Selection of Final Project Topic written assignment, Week 2 Final Project Annotated Bibliography written assignment, and your Week 3 Final Project Annotated Outline written assignment.
In your Final Project, you will synthesize an overview of the major theories relating to the pathology of a disorder, as well as provide a detailed discussion of the etiology (causes) and clinical interventions, using research to support your analysis. Your topic will be the same neuropsychological disorder that was selected and approved by the instructor in your Week 1 written assignment, and for which you provided an annotated bibliography in your Week 2 written assignment, and an annotated outline in your Week 3 written assignment.
For your Week 5 Final Project, you will expand on the subject content from your previous assignments. Be sure to include all the information covered in the Week 3 outline. In keeping with the focus of this class, the emphasis of your paper will be on the neuroscience aspects of the disorder, to include the following:
Explain the theories of etiology (causes) of the disorder with a focus on the neurobiology of the disorder.
Explain associated factors in development of the disorder (genetic, environmental, familial, lifestyle).
Describe the pathology of the disorder with an emphasis on the abnormalities of nervous system structure and function (brain structures, neural pathways, neurotransmitter/receptor systems), including any genetic and biochemical aspects.
Give examples of treatment options including both drug (pharmacological) and non-drug (pharmacological treatments), with rationales for use of these treatments based on current understanding of the neurobiology of the disorder.
Summarize diagnostic and research technologies employed in clinical diagnosis, clinical and behavioral health care, and basic science research.
Your research will include the references you identified in your Week 1, Week 2, and Week 3 assignments, with additional references as needed. Your references should include a minimum of six to eight peer-reviewed and/or scholarly sources, which provide evidence-based information regarding the biological and psychological features of the disorder and were published within the last five years. At least four of your references should be peer-reviewed publications of original research studies. For further information, please review the Original Research Study Tipsheet (Links to an external site.). To justify your assertions, provide in-text citations for all factual statements taken from your research, with corresponding references drawn from scholarly sources. All citations and sources are to be documented according to APA style, as outlined in the Ashford Writing Center, and should support and enhance your analysis of the selected disorder. Sources may include review articles, original research articles, information from governmental agencies (e.g., National Institutes of Health, Centers for Disease Control, Food and Drug Administration, Drug Enforcement Administration) and/or professional societies (e.g., professional society position papers or clinical practice guidelines). With the exception of the DSM-5, you may cite and reference course materials such as the textbook, required or recommended reading, or multimedia, but these will not fulfill the source requirement.
The Biopsychological Analysis of a Neuropsychological Disorder final project
Must be a minimum of 10 to 12 double-spaced pages in length (not including title and reference pages) and formatted according to APA style as outlined in the Ashford Writing Centers APA Style (Links to an external site.)
Must include a separate title page with the following:
Title of paper
Students name
Course name and number
Instructors name
Date submitted
For further assistance with the formatting and the title page, refer to APA Formatting for Word 2013 (Links to an external site.).
Must utilize academic voice. See the Academic Voice (Links to an external site.) resource for additional guidance.
Must include an introduction and conclusion paragraph. Your introduction paragraph needs to end with a clear thesis statement that indicates the purpose of your paper.
For assistance on writing Introductions & Conclusions (Links to an external site.) as well as Writing a Thesis Statement (Links to an external site.), refer to the Ashford Writing Center resources.
Must use at least six to eight scholarly or peer-reviewed sources.
The Scholarly, Peer-Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types and the Ashford University Quick n Dirty (Links to an external site.) video provides library search tips. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
Must document any information used from sources in APA style as outlined in the Ashford Writing Centers Citing Within Your Paper (Links to an external site.)
Must include a separate reference page that is formatted according to APA style as outlined in the Ashford Writing Center. See the Formatting Your References List (Links to an external site.) resource in the Ashford Writing Center for specifications.
Carefully review the Grading Rubric (Links to an external site.) for the criteria that will be used to evaluate your assignment.
Acc 340 final exam | Business & Finance homework help
1.
The S in the acronym AIS stands for:
A)
Standard
B)
System
C)
Symbol
D)
none of these
2.
Which of the following best describes a data warehouse?
A)
A repository of historical information from one accounting application
B)
A repository of historical information from a set of accounting applications
C)
A repository of information from many business applicationssome not accounting
D)
A repository of information from many businesses in the same industry
3.
One reason why AISs fail is because:
A)
They are not computerized
B)
They try to process non-accounting data
C)
They cannot produce good information from bad data
D)
They are incompatible with the existing processing procedures
4.
The hardware of a computer system includes the computer itself and other devices that help the computer perform its tasks. These other devices are commonly also called:
A)
Helper equipment
B)
IT devices
C)
Peripheral equipment
D)
Secondary equipment
E)
Accessory equipment
5.
All of the following are examples of peripheral equipment except:
A)
Input equipment
B)
Output equipment
C)
Communications equipment
D)
Primary memory equipment
E)
Secondary storage equipment
6.
POS devices, bar code readers, and OCR devices are examples of:
A)
Input devices
B)
Output Devices
C)
Processing Devices
D)
Transaction Devices
7.
Printers and monitors are examples of:
A)
Output devices
B)
Input devices
C)
Processing devices
D)
Storage Devices
8.
Which type of company is most likely to use MICR?
A)
Grocery store
B)
Bank
C)
Phone company
D)
Web site seller
9.
An older computer system, typically using a mainframe, centralized data processing, and COBOL software, is often called a:
A)
Supercomputer system
B)
Primary system
C)
Legacy system
D)
Traditional system
10.
A USB drive that uses flash memory is an example of a(n):
A)
Input device
B)
Output device
C)
Secondary storage device
D)
Web device
11.
Which of the following is not an example of a source document?
A)
Receiving report
B)
Purchase order
C)
Sales order
D)
Aging report
12.
Networked enterprises and globalization have enabled a new business model called business-without-boundaries. Which of the following statements describes this business model?
A)
Companies no longer have all of their employees in one location
B)
It is called offshoring and companies contract with firms in other countries to do such business processes as human resources, payroll, and accounting
C)
Companies are under a great deal of scrutiny to manage costs and generate revenue so they contract with foreign firms to do various business processes at a lower cost to the company
D)
all of the above statements describe this model
13.
Hacking involves:
A)
Stealing carbons of credit cards
B)
Destroying computer hardware
C)
Gaining illegal entry to computer files from remote locations
D)
Inserting a logic bomb in a computer program
14.
A computer virus is:
A)
A disease that computer programmers are very susceptible to
B)
A small processing routine that the user accidentally introduces into the system
C)
A misnomer, since unlike biological viruses, computer viruses cannot reproduce themselves
D)
Harmless
15.
An ideal control is:
A)
A control procedure that reduces to practically zero the risk of an error or an irregularity taking place and not being detected
B)
A control procedure that is anticipated to have the lowest possible cost in relation to its benefits
C)
A control procedure that should always be implemented into a company’s system due to the efficiency and effectiveness that will result from its implementation
D)
A control procedure that is always cost effective
16.
An approach used by many companies to reduce the risk of loss caused by the theft of assets by employees is to:
A)
Utilize polygraphs
B)
Acquire arbitrage loss protection
C)
Acquire fidelity bond coverage
D)
Institute punitive management
17.
Which of the following personnel policies would be the most useful in mitigating fraud or embezzlement?
A)
Fidelity bonds for key employees
B)
Careful hiring procedures for key employees
C)
Having a Code of Conduct
D)
Required vacations for key employees
18.
Logical access to the computer system would be best controlled by:
A)
Intrusion alarm systems
B)
Complex operating systems
C)
Restrictions on physical access to online terminals
D)
Password codes
19.
All of these are reasons why databases are important to AISs except:
A)
AIS databases store valuable information
B)
Many AISs are large and therefore potentially unwieldy
C)
The databases of some organizations are very complex
D)
The hard disk space used to store AIS databases is comparatively expensive
E)
all of these are reasons why databases are important to AISs
20.
All of the following are items within the data hierarchy except:
A)
Bit
B)
Character
C)
Data field
D)
Record
E)
all of these items are part of the data hierarchy