Identify disparities in health among populations for a Healthy People 2020 health issue.

Promoting Positive Outcomes through Targeted Communication within Cultural GroupsIdentify disparities in health among populations for a Healthy People 2020 health issue.For this assignment:Describe the chosen Healthy People 2020 topic area and specific health issue.Contrast causes of disparities related to this health issue within populations.Propose a public health communication strategy to reduce disparity and promote health.Outline a plan for the communication.Describe an evaluation plan for the communication.Create targeted communication for each population.Reflect on learning through this project.Submission Instructions:The paper is to be formatted per current APA, be clear and concise and students will lose points for improper grammar, punctuation and misspelling.The paper is to be 5 pages in length, excluding the title, abstract and references page.Incorporate a minimum of 3 current (published within last five years) scholarly journal articles or primary legal sources (statutes, court opinions) within your work.Journal articles and books should be referenced according to current APA style

Analyze what you learned from the Voices of Diversity video regarding perspectives and experiences of gender and sexuality. What idea, experience, or statement resonated with you the most, and why?

Discussion: Voices of Diversity: Gender and SexualityGrowing up, did you see positive and well-rounded portrayals of people like you on TV and in books? Are you typically referred to by the appropriate pronouns? Do you need to conceal aspects of your identity in the workplace out of fear? If you are a cisgender person who is heterosexual, you may not have thought much about the everyday challenges of the LGBTQ community. Many of the privileges you take for granted may not be available to them.As a profession, social work embraces diversity and strives to ensure equal rights for all through allyship and advocacy. One way to become a better ally is to understand the barriers in place for marginalized populations such as LGBTQ people. For this Discussion, you take that step by engaging in several activities designed to illuminate the LGBTQ experience.To PrepareView the Voices of Diversity: Gender and Sexuality video showing Social Work faculty sharing perspectives and experiences related to gender and sexuality.Reflect on the video, identifying ideas, experiences, or statements that resonate with you.Review the Learning Resources on practice with women and the LGBTQ population and on allyship.Access and complete the Privilege for Sale activity in the Learning Resources.By Day 3Write a post in which you:Analyze what you learned from the Voices of Diversity video regarding perspectives and experiences of gender and sexuality. What idea, experience, or statement resonated with you the most, and why?Then, describe your approach to the Privilege for Sale activity and any challenges you encountered in selecting privileges. Describe at least one insight you gained from the activity.Apply your learning to social work practice with the LGBTQ population and to allyship.

Analyze the techniques utilized by the extremist group for the purposes of recruitment and indoctrination of potential new members.

Extremist Indoctrination via CyberspacePrior to beginning work on this assignment, read Chapter 10 in Holt (2018), as well as the Soriano (2012) and Halverson (2012) articles. Review the instructions below and research a minimum of three additional scholarly or professional resources to support your statements. (Access the MSCJ Professional Sources(Links to an external site.) guide for assistance with finding appropriate resources.)In the modern era of the Internet, it has become an increasingly simple task to broadcast messages of intolerance, hate, and/or extremism. Terror groups, nationalistic extremist groups, and assorted other extremist organizations have developed into savvy cyberspace users for purposes of disseminating information and recruiting members. Extremist groups (including domestic terrorists, cyberbullies, fundamentalist organizations, and politically motivated organizations, etc.) now have the ability to easily manipulate images and video using cheap, readily available software that they can then upload to a multitude of social media sites and user groups. These images and propaganda are used to inflame tensions and recruit new members to the various groups’ causes. For this paper choose one domestic extremist group as the focus for your paper.Your paper you mustAnalyze the techniques utilized by the extremist group for the purposes of recruitment and indoctrination of potential new members.Analyze the various ways law enforcement can detect and prevent recruitment and indoctrination attempts by extremist groups such as the one chosen as they utilize cyberspace to further their purposes.Examine the methods of retrieving and analyzing data from the various sites utilized by the chosen extremist organization as they disseminate information pertaining to their causes.Evaluate the various legal issues that arise as a result of law enforcement efforts to curb attempts at indoctrination and recruitment by extremist organizations.The Extremist Indoctrination via Cyberspace paperMust be three to five double-spaced pages (750-1,250 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center(Links to an external site.).Must include a separate title page with the following:Title of paperStudent’s nameCourse name and numberInstructor’s nameDate submittedMust use at least three scholarly sources in addition to the course text.Must document all sources in APA style as outlined in the Writing Center.Must include a separate references page that is formatted according to APA style as outlined in the Writing Center.Required ResourcesTextHolt, T. J., Bossler, A. M., Seigfried-Spellar, K. C. (2018).Cybercrime and digital forensics: An introduction (2nd ed.). Retrieved from https://www.vitalsource.com/Chapter 9: Cyberbullying, On-Line Harassment, and Cyber stalkingChapter 10: Online Extremism, Cyber terror, and Cyber WarfareArticleHalverson, J. R., Way, A. K. (2012). The curious case of Colleen LaRose: Social margins, new media, and online radicalization(Links to an external site.). Media, War Conflict, 5(2), 139-153. http://dx.doi.org/10.1177/1750635212440917The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. It provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of this week’s discussion post.Kravets, D. (2009, September 30). Cyberbullying bill gets chilly reception(Links to an external site.). Wired. Retrieved from www.wired.com/threatlevel/2009/09/cyberbullyingbill/This online article provides an overview of the Megan Meier bullying legislation and the various ways the policy failed. It will assist you in the development of this week’s discussion post.Accessibility Statement does not exist.Privacy Policy(Links to an external site.)Morphy, E. (2008, December 9). The computer fraud act: Bending a law to fit a notorious case(Links to an external site.). Retrieved from www.ecommercetimes.com/story/65424.htmlThis online article provides detailed information on the prosecution of Lori Drew in the Megan Meier cyberbullying case. It will assist you in the development of this week’s discussion post.Accessibility Statement does not exist.Privacy Policy(Links to an external site.)Torres Soriano, M. R. (2012). The vulnerabilities of online terrorism(Links to an external site.). Studies in Conflict Terrorism, 35(4), 263-277. http://dx.doi.org/10.1080/1057610X.2012.656345The full-text version of this article is available through the EBSCOhost database in the University of Arizona Global Campus Library. This article examines the use of online technology in the process of radicalization. It will assist you in the development of your discussion post for this week.Recommended ResourcesArticleGiammona, C. (2013, April 14). California case another three-part tragedy of rape, cyber bullying and suicide(Links to an external site.). Retrieved from http://usnews.nbcnews.com/_news/2013/04/14/17747411-california-case-another-three-part-tragedy-of-rape-cyber-bullying-and-suicide?litThis website depicts the suicide of a California teenager after repeated instances of cyber bullying and may assist you in the development of this week’s discussion post.Accessibility Statement does not exist.Privacy Policy(Links to an external site.)TheVillageCelebration. (2012, December 18). The Village founder, Vickie Newton, targeted by internet stalker(Links to an external site.). Retrieved from http://www.thevillagecelebration.com/thevillage-founder-vickie-newton-targeted-by-internet-stalker/WebsitesThe Cybersmile Foundation(Links to an external site.). (www.cybersmile.org)This website provides additional information on cyberstalking and may offer assistance developing this week’s discussion post.Accessibility Statement does not exist.Privacy Policy does not existMSCJ Professional Sources(Links to an external site.). (http://ashford-mscj.weebly.com)This resource site will provide assistance in researching additional sources for the assessments within this course.Accessibility Statement does not exist.Privacy Policy does not exist.[emailprotected]: Working to Halt Online Abuse(Links to an external site.). (www.haltabuse.org)This website provides additional information on online abuse and may assist in the development of this week’s discussion post.Accessibility Statement does not exist.Privacy Policy does not exist.

How would the veil of ignorance or a different theory of justice address John Doe’s case?

Required ResourcesRead/review the following resources for this activity:Textbook: Chapter 13LessonMinimum of 1 scholarly source (in addition to the textbook)IntroductionSome people believe that you can tell who a person is by what they do when no one is looking. Let’s look at the following case. John Doe, a nurse, has downloaded an application to her phone that allows him to download copyrighted textbooks for a nursing course (that Doe is going to take) without his Internet Service Provider knowing it. The application is called “Cloak” as in cloak of invisibility (a hooded coat one wears to make it so others cannot see you). The application disguises his phone and makes it so the information on it is inaccessible. John is aware that other people who are of a lower socio-economic status (like him) also use this software program for the same reason (and to save money). John Doe knows that his religion forbids him from using this application to download in this manner. John Doe is focused on his own economic situation and does not consider the publisher, author, and others involved in the books. Think about a course of social action; what social values should be used to address this moral issue and conflict.Initial Post InstructionsCreate a personal ethical philosophy and explain from which philosophy or philosophies (it must include at least one of the following: virtue ethics, Kantian ethics, utilitarianism, virtue ethics, or social contract ethics) you created it and why the contents are important and meaningful for you. List its precepts.Take your personal ethical philosophy statement and use it to work through John Doe’s case. What is moral and immoral per your theory?How would the veil of ignorance or a different theory of justice address John Doe’s case?Follow-Up Post InstructionsRespond to at least one peer. When possible, respond to a peer who chose a different ethical theory than you did in your posting. Further the dialogue by providing more information and clarification.Writing RequirementsMinimum of2 posts (1 initial 1 follow-up)Minimum of 2 sources cited (assigned readings/online lessons and an outside scholarly source)APA format for in-text citations and list of referencesAnswers1:Hello Professor and Class,My personal philosophy is that I always make sure people are happy and put people before myself because in the long run when I am in need of help, they will remember the time I helped them and gave them happiness. “Kantian ethics provide a human-centric ethical framework placing human existence and capacity at the centre of a norm-creating philosophy that guides our understanding of moral conduct” (Ulgen, 2017). I believe Kantians ethics follows this philosophy I have because it is the moral thing to do in my mind to put people first and make sure happiness is covered all around. Helping and ensuring a person is a way of making that person the center and making sure they know they are existing.John Doe in my personal philosophy wouldn’t work out. Knowing it is against his religion, he went ahead and downloaded the app because he cant afford the books by himself. He cared more about himself and passing his classes than his religion and that I believe is morally right. The morally wrong thing to do is knowing other low income people have it and it works, then not downloading the help that he needs and failing his classes. Although downloading an app that disguises a phone is wrong, it’ll help John Doe in the long run.“The political philosopher John Rawls is well known for his thought experiment of the “veil of ignorance.” The thought experiment goes something like this: when designing rules for your society, you should be ignorant of what social position you yourself will occupy” (Gobry, 2015). This addressed John Doe’s case by doing what is best for himself. He knows he is low income and needs these books to be able to get through the classes but cant afford them. He knows other people have the same app and it works well for them. John Doe knows he needs this to succeed so he got the app so he won;t fail.

How much would they be willing to pay for a better fit?

The Decision As Heidi leaned back and gazed outside at the rain soaked plaza, she considered the pros and cons to the proposal. The proposal carried several risks that she could not fully quantify. First, there was the ability of Levi Strauss to implement new technologies. Second, the cost savings in the proposal were based on CCTC’s estimates in their proposal for the program. Would the program still be successful if the costs turned out to be very different?Third, market research indicated that women were not satisfied about fit. How much would they be willing to pay for a better fit? On another level, she wondered about the competition. If the program were successful, would their low cost rivals dive into this market as well? Did Levi’s have any advantage here? What if they did not move forward with the proposal? Would one of their rivals partner with CCTC?

Explain the basics of customer relationship management (CRM).

This post should be in RESPONSE TO THE FOLLOWING QUESTIONS and must be 150 words.DISCUSSION QUESTION:1. Explain the basics of customer relationship management (CRM).2. What is the purpose of CRM? What do companies gain from it?3. What do CONSUMERS gain from it?4. What are some potential disadvantages to the customer?Read the Chapter 7 Case: Real Choices at SubaruAnswer each question in 200 words.Summarize the case and identify the dilemma facing Subaru.Identify and discuss the market segmentation approaches you believe are most relevant for Subaru. Why are these important to the marketing strategy for Subaru’s product offerings?Identify and discuss the top three target markets for Subaru. Select the BEST target marketing strategy Subaru should implement and discuss.As Marketing Manager for Subaru, respond to the following – “In what ways could CRM help Subaru conduct successful target marketing and positioning of their products?”Correct APA Source Citing of the Textbook:In-Text Citation First in-text use is: (Solomon, Marshall Stuart, 2012). Subsequent in-text uses is: (Solomon et al., 2012)Reference Section: Solomon, M. R., Marshall, G. W.; Stuart, E. W. (2012). Brand you: marketingreal people, real choices. (4th ed.). Upper Saddle River, N.J.: Pearson, 2012. Print.

In the twenty-first century, what trends in the environmental forces (social, economic, technological, competitive, and regulatory) (a) work for and (b) work against Prince Sports in the tennis industry?

Read or view the case study “Prince Sports, Inc.” from Chapter 9, pages 239–241. Answer the following questions (located at the end of the case study) using the attached case study template.In the twenty-first century, what trends in the environmental forces (social, economic, technological, competitive, and regulatory) (a) work for and (b) work against Prince Sports in the tennis industry?Because sales of Prince Sports in tennis-related products depend heavily on the growth of the tennis industry, what marketing activities might the company use in the United States to promote tennis playing?What promotional activities might Prince use to reach (a) recreational players and (b) junior players?What might Prince do to help it gain distribution and sales in (a) mass merchandisers like Target and Walmart and (b) specialty tennis shops?In reaching global markets outside of the United States, (a) what are some criteria that Prince should use to select countries in which to market aggressively, (b) what three or four countries meet these criteria best, and (c) what are some of the marketing actions Prince might use to reach these markets?

What are some procedures you should implement to support an ethics culture?

InstructionsYou are opening your own small business and want to establish a culture of ethical behavior. What are some procedures you should implement to support an ethics culture? Your journal entry must be at least 200 words in length. No references or citations are necessary.

Analyze the technical evolution of digital piracy including the impact of new digital formats such as CD, DVD, MP3, and MP4 to intellectual property piracy.

Evolution of Piracy and Corresponding LegislationPrior to beginning work on this assignment, read Chapter 5 in the textbook and view the Digital (Links to an external site.)Piracy(Links to an external site.)(Links to an external site.) and Steve Wozniak: Digital Piracy(Links to an external site.) videos. You must include at least one additional scholarly and/or professional source for your paper. You may wish to review the recommended resources for this week for assistance with this research. You may also access the MSCJ Professional Sources(Links to an external site.) guide for assistance with finding appropriate resources.Theft of intellectual property, such as music and video recordings, has been commonplace for many years. During the 1970s and 1980s portable inexpensive recording devices made piracy of video and music relatively easy to accomplish. With the advent of the MP3 and MP4 formats utilized to compress large files for data storage and portability, piracy has flourished. Motion pictures, music, and data can now be easily accessed via small personal computerized devices such as cellular phones, tablets, and MP3 players. In addition, large files can be easily stored on digital flash drives often no bigger than a coin. This has enabled digital pirates to safely store movies, music, and data for transport to locations on a global scale.In this paper, you mustAnalyze the technical evolution of digital piracy including the impact of new digital formats such as CD, DVD, MP3, and MP4 to intellectual property piracy.Explain the growth of innovative file sharing such as peer-to-peer (P2P) and Internet Relay Chat (IRC) and their impact on the methods for detecting and preventing intellectual property piracy.Trace the evolution of legislation and organizations such as the World Intellectual Property Organization (WIPO), the Copyright Act of 1976, No Electronic Theft (NET) Act, and Directive 91/250/EEC/2009/24/EC designed to curtail and prevent digital piracy.The Evolution of Piracy and Corresponding Legislation paper:Must be three to five double-spaced pages (750-1,250 words) in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center(Links to an external site.).Must include a separate title page with the following:Title of paperStudent’s nameCourse name and numberInstructor’s nameDate submittedMust use at least three scholarly sources in addition to the course text.Must document all sources in APA style as outlined in the Writing Center.Must include a separate references page that is formatted according to APA style as outlined in the Writing Center.Required ResourcesTextHolt, T. J., Bossler, A. M., Seigfried-Spellar, K. C. (2018).Cybercrime and digital forensics: An introduction (2nd ed.). Retrieved from https://www.vitalsource.com/Chapter 4: Malware and Automated Computer AttacksChapter 5: Digital Piracy and Intellectual Property TheftArticleCISCO. (n.d.). What is the difference: Viruses, worms, trojan horses, and bots? (Links to an external site.)Retrieved from http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.htmlThis online resource, by Cisco Systems, contains detailed explanations of computer viruses, worms, Trojan horses, and bots. It will assist you in the development of this week’s discussion posts.Accessibility Statement is not availablePrivacy Policy(Links to an external site.)MultimediaLarkin, D. [Dom Larkin]. (2014, June 8). Digital Piracy(Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=RMaXj1Kjis8IgnorantPCFanboys. (2011, September 22).Steve Wozniak: Digital piracy(Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=jJRSjFqu-8QMr. Ford’s Class. (2014, January 21).Technology in 10: Malware, Viruses, Worms, and More (Season 1 – Episode 3)(Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=29LOaxPwPPURecommended ResourcesDissertationLough, D. L. (2001). A taxonomy of computer attacks with applications to wireless networks(Links to an external site.) (Doctoral dissertation, Virginia Polytechnic Institute and State University). Retrieved from https://theses.lib.vt.edu/theses/available/etd-04252001-234145/unrestricted/lough.dissertation.pdfThis dissertation examines in detail the variety of attacks that can be levied at computers and provides a taxonomy of such criminal activity. Special attention is given to attacks vie wireless networks.ArticleHinduja, S. (2003). Trends and patterns among online software pirates(Links to an external site.). Ethics and Information Technology, 5(1), 49-61. Retrieved from http://www.springer.com/computer/swe/journal/10676The full-text version of this article is available through the ProQuest database in the University of Arizona Global Campus Library. This article provides information on the trends and patterns of software pirates working on a university campus. It may assist you in the development of this week’s activities.MultimediaarXter. (2009, January 8). HARDtalk: The music industry – Digital music piracy(Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=rnpntZLnF7wImperva. (2014, January 30).Automated hacking tools – Meet the new rock stars in the cyber underground(Links to an external site.) [Video file]. Retrieved from https://www.youtube.com/watch?v=TE21JrVWlHUWebsitesMSCJ Professional Sources(Links to an external site.). (http://ashford-mscj.weebly.com)This resource site will provide assistance in researching additional sources for the assessments within this course.

explore conflict between religion and science,

Now that you are ending your travels with Religious News, you decide to write a two-page academic paper that showcases your newfound perspective on world religions and new religions. For this research paper you will:create a cover page (not included in total page count),explore conflict between religion and science,evaluate the importance of interfaith dialogue,explain some of the characteristics of New Age spiritualty, andexplain the three traditional types of change in religion.Your research paper must include at least two sources with proper in-text citations and a reference page that does not count towards the final page total.Remember to follow APA formatting and guidelines and to review the rubric before submittal.

× How can I help you?