Month: July 2014

Evidence Based Policing

Mini Paper 3 Evidence Based Policing Instructions

Mini-Papers are single page reflections on a question or exercise. The paper is an opportunity for the student to demonstrate their comprehension of the course material and to apply it to the situation presented. The paper is also an opportunity for the student to demonstrate composition skills. Feedback will be provided for both content and composition.

Evidence Based Policing

Read Evidence Based Policing by Lawrence W. Sherman (attached here). Reflect on this article along with what we have already learned regarding proactive police leadership, the paradigms of policing (traditional, community and problem-oriented policing), and police results and performance measures (Thibault et al, 2011, pp. 79-84).

For this mini paper, present your thoughts on Sherman’s theory of evidence based policing. In no more than one page (see formatting below), address the following (do not forget to include APA citations for your answers):

Assume that you are chief of a large city police department and you want your agency to employee evidence based policing as a method to measure your agency’s effectiveness. Describe how you will introduce the concepts of evidence based policing into your department’s policing efforts to measure and increase effectiveness. Include specifics regarding policing style, management style to facilitate implementation and specific techniques that will be used.

Format: In an MS Word document, One full page, headed with the student’s name. Narrative must be double spaced, with 1 inch margins, written in #12 Times New Roman font. References from the reading materials must be cited in the narrative (page number). APA citations are REQUIRED and the reference list should appear on a separate page.

Reference

  • Sherman, L. (1998). Evidence based policing. Police Foundation. Washington DC.
  • Thibault, E. A., Lynch, L. M., & McBride, R. B. (2011). Proactive police management (8th ed.). Upper Saddle River, NJ: Pearson Hall.

Operating Systems, the Future of Computing, and Computer Security

Discussions

Supporting Activity: Computer Security

Write a 200- to 300-word short-answer response to the following:

  • Describe the types of malware and the potential impact they can have on a system.
  • Explain the countermeasures to various types of malware.

Supporting Activity: Mainframes

Write a 200- to 300-word short-answer response to the following:

  • What are the advantages and disadvantages of the use of mainframes? In what type of  organizations would they be most likely to be implemented?

Supporting Activity: Mobile Oss

Write a 200- to 300-word short-answer response to the following:

  • What are mobile OSs you have personally used? Describe the advantages and disadvantages of their effects. Share a resource you have found regarding mobile OSs.

 Supporting Activity: Windows Script Exercise

Write a 200- to 300-word short-answer response to the following:

  • How would you classify this type of script?
  • What resources could you use to develop scripting skills?
  • What scripting applications might benefit you personally in the future?

Supporting Activity: Mac Script Exercise

ForMac OS® (which uses a UNIX® shell), UNIX®, or Linux® users, create and run a simple script from the textbook reading.

Write a 200- to 300-word short-answer response to the following:

  • What type of script did you choose? What resources could you use to developing scripting skills? What scripting applications might benefit you personally in the future?

U.S. GAAP Vs iGAAP – Similarities and Differences

The writing assignment will demonstrate writing across the curriculum by responding to the following topic in a 600-750 words in length paper.

Topic: Briefly describe some of the similarities and differences between U.S. GAAP and iGAAP with respect to balance sheet reporting. Your paper must be formatted according to APA 6th edition. Save your document as “LastnameFirstinitial-ACCT301-8”.

The assignment will be evaluated according to the following Writing Assignment Grading Criteria:

Guidelines Writing Assignment Grading Criteria Content (60%)

• Response demonstrate a clear understanding of the key elements of assignment questions.

• Responses thoroughly cover the elements in a substantive manner.

• Response demonstrates critical thinking and analysis.

• Content is complete and accurate.

• Introduction and conclusion provides adequate information on the given topic. Organization (20%)

• Paper structure is clear and easy to follow.

• Ideas flow in a logical sequence.

• Introduction provides a sound introduction to the topic and previews major points.

• Paragraph transitions are logical and support the flow of thought throughout the paper.

• The conclusion thoroughly reviews the major points. Writing Style, Grammar, APA Format (20%)

• Sentences are well constructed, complete, clear, and concise.

• Words used are specific and unambiguous.

• The tone is appropriate to the content and assignment.

• Grammar, spelling and punctuation are correct.

• APA guidelines (6th edition) are followed, such as headers, citations, references, etc.

• Effective use of aids, such as sections, summaries, table of contents, indices, and appendices (if appropriate)

 

Rise in Violence

You are a member of the training division in a maximum-security prison facility. There are about 8,000 inmates, and another 350 staff members, of which 220 are corrections officers. Because of the recent economic downturn, the number of prisoners incarcerated for property crimes, such as grand thefts and burglaries, has been on the rise. About 3,000 of the 8,000 inmates are violent offenders. Traditionally, the violent offenders establish a structure of control amongst the inmates, and often abuse the property crime offenders who are not used to violence. You have been tasked by the warden and the prison counsel, the mayor, and the city council to provide a method for dealing with an anticipated rise in violence as the demographic of the prison population puts more less experienced inmates in the facility. You must identify types of personnel who you would involve in the evaluation. There will be a number of inmates whose mental health will make them prone to violence, and some who will be more likely to be victimized by that violence. An example that may be considered is not to put a minority in a cell block with large numbers of members of white supremacy gangs. Other issues might include identifying persons who have demonstrated leadership through force, and segregating them to prevent them from affecting the population’s mood.

In a 3–5 page position paper, respond to the following questions based on the scenario:

  • Describe how corrections officers responding to an incident in the cell block might identify a potentially mentally ill inmate from one that is just acting out.
  • Explore the mental illness of post traumatic stress disorder (PTSD), schizophrenia, and bipolar disorder. Given the confines of the cell block, how you would best approach an inmate who is suffering from one of these three conditions?
  • Explain what you believe should be included in training corrections officers and staff to safely handle mentally ill inmates in a restricted environment (keep in mind: safety first, followed by reasonable empathy).

 

It is critical that, when you make a statement of fact in your presentation, you cite the reference that you used to obtain the information from. Do this in the text of the paper, and then include the reference in your References page. As always, your paper will be submitted in the current edition of APA format. No abstract is required because this is a short position paper, but a title page, reference page, and appropriate running header with page numbers are necessary.

 

In 3-5 paragraphs

You are a new corrections officer in a very effective cell block unit. Your coworkers are professional in almost every aspect of their work. You have been in the same cell block with them through your probationary period and now you are out on your own, managing your section of the cell block. Early one evening, you get dispatched to an adjacent cell block to assist other corrections officers with an unknown incident. Upon arrival, you find a total of five other corrections officer teams. Your concern is that something serious is happening. As you approach the cell block hallway intersection, you can see movement in the hall mirror that is used for monitoring what is around the corner. You can also hear laughter just around the corner. As you approach your fellow corrections officers, you see one senior officer hand a roll of aluminum foil to a male inmate who appears to be about 45 years of age and very animated. The inmate asks the corrections officer if he is sure that the foil will work and the corrections officer says yes. The man unrolls the foil and begins to wrap it around his head and face, poking out eyeholes and a mouth hole to breathe. The other officers are laughing.

You find out that the inmate is known as Karl, and that he is delusional in that he believes that large “Grays” (aliens from another planet) can read and steal his thoughts. Karl tells the officers that he has been looking for a method to keep the Grays from getting his thoughts. The corrections officers told him that the foil is special antialien foil. They tell him that it is in the corrections officers’ hats as well, and it protects them from aliens reading their minds. You find out that the corrections officers have been entertaining themselves with Karl for the past year and a half. Nobody has made any attempt at getting Karl a mental health referral, and they have been encouraging his delusions for their amusement. Although it is not clear to you what the exact nature of Karl’s problem is, it is evident that he is the victim of declining mental health. In addition to the incident, it is clear that the other inmates locked in nearby cells are not happy with what the corrections officers are doing to Karl.

Please include answers in your main posting for the following questions. You must provide meaningful feedback to the main postings of at least two of your classmates:

 

  • What professional ethical issues exist for corrections officers to engage in this behavior?
  • How could this behavior adversely impact your cell block corrections officer’s unit?
  • What action do you feel compelled to take concerning this situation both with Karl and your colleagues? Why?

Modifying a Database Design in Vision 

This assignment contains two (2) Sections: Visio Diagram and Design Summary. You must submit both sections as separate files in order to complete this assignment.

Use “Appendix A: Designing Databases with Visio Professional: A Tutorial,” to help you complete Section 1: Visio Database Design. (Note: This tutorial focuses on the use of Microsoft Visio. Open source applications are not covered in Appendix A; however, the use of open source applications within labs is permitted.)  Click here to download Appendix A.

After reviewing your database design from Lab 1: Creating a Database Design in Visio, the college has provided more information for the database that they want developed:

  • For each student, the college needs to track the student  ID, student names, addresses, start date, phone numbers and types (such as mobile, home, work), email addresses and types (such as personal, school, work), gender, and birth date.
  • For each course, the college needs to track the course ID, course name, department, quarters offered, sections, and instructor teaching each course.
  • For each instructor, the college needs to track the instructor ID, name, address, phone numbers and types (such as mobile, home, work), email addresses and types (such as personal, school, work), gender, birth date, and the courses that each instructor is qualified to teach.
  • Additionally, the college needs to track the final grades for each student after each course has completed.

Section 1: Modified Visio Diagram 

(Microsoft Visio or equivalent)

1.  Use Microsoft Visio (or open source equivalent) in which you:

a.  Modify the database diagram from Lab 1 with the entities and attributes that the scenario identified (i.e., a college tracking students, courses, and instructors).

b.  Create the appropriate relationships between each entity within the diagram.

Section 1 of your assignment must follow these formatting requirements:

  • Submit the Visio diagram as a Visio file.

Section 2: Design Summary 

(Microsoft Word or equivalent)

1.  Write a one to two (1-2) page paper in which you:

a.  Discuss the degree to which you believe the Visio diagram reflects the database design.

b.  Describe any assumptions that you had to make about the business rules to in order to create the Visio diagram and the associated relationships.

Section 2 of your assignment must follow these formatting requirements:

  • Submit the design summary as a Microsoft Word file.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the role of databases and database management systems in managing organizational data and information.
  • Recognize the historical development of database management systems and logical data models.
  • Compose conceptual data modeling techniques to capture the information requirements.
  • Use technology and information resources to research issues in database systems.
  • Write clearly and concisely about relational database management systems using proper writing mechanics and technical style conventions.

Imagine you are the leader of the IT team at the national headquarters for a company supplying western wear to an international market. T

Imagine you are the leader of the IT team at the national headquarters for a company supplying western wear to an international market. The owner, Sam Yosemite, tells your IT team to provide support to four (4) new satellite offices but his instructions are vague and incoherent. You only know that the employees in the new offices (numbering about 20 staff for each) will have to be self-sufficient and mirror nearly all the applications used at headquarters, but on minimal budgets. The satellite offices will be in operation for a combined total of 24 hours each day. Each office will operate based on its own set of local business hours, which do not overlap among other satellite offices. Your IT staff is solely responsible for providing support to the satellite offices. Your boss needs to keep the costs for licensing and support low or risk cutting into the budget for the IT staff salaries.

Write a three to four (3-4) page proposal paper which covers the following:

  1. Differentiate between best uses of Active Directory (AD) versus New Technology File System (NTFS) permissions.
  2. Analyze how you would utilize NTFS permissions for security and appropriate access.
  3. Compare and contrast the advantages and disadvantages of different application server options.  Be specific in your configuration specifications.
  4. Choose an application server option that best suits the needs described by the scenario and explain why the application server option you chose is best.
  5. Determine the best way configure and deploy file server(s).
  6. Determine how to configure and deploy printers.
  7. Use Visio or a similar tool to depict graphically the physical and logical layout of your plan. Note: The graphically depicted solution is not included in the required page length.
  8. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.  Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.  The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Excel, Visio, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Explain the various types of application servers and roles.

Give two reasons why it is important to upgrade your browser when a new version becomes available.

Please provide detailed and elaborate responses to the following questions. Your responses should include examples from the reading assignments, if possible. Your answer to each question should be at least 300 words in length and utilize APA guidelines.

1. Give two reasons why it is important to upgrade your browser when a new version becomes available.

2. Compare and contrast POP e-mail to Web-based e-mail systems in terms of control, security, and accessibility.

3. How is e-commerce different from traditional retailing? What are some distinguishing features of digital markets and digital goods? What is your experience in purchasing online? Do you prefer to shop online or via a traditional outlet? Why?

4. How is the Internet changing the economics of information and business models? Name and describe one business model for e-commerce. What is the difference between pure-play Internet and clicks-and-mortar business models?

PART II: Essay Question

to search for information that supports your arguments. Directions: In a paper of at least 2 to 3 pages in length, please respond to the following questions. Be sure to utilize APA guidelines. Please feel free to use the

Many of us have become accustomed to electronic payment systems. These systems will continue to increase as businesses and banks present more opportunities to use them. In your own words, please compose a response to each of the following prompts:

Name and describe various categories of e-commerce.

Compare and contrast electronic payment systems. Which type do you use most often? Which type is most applicable for organizations you interact with regularly?

Explain how Internet technology supports business-to-business e-commerce.

III

Directions:

Please provide detailed and elaborate responses to the following questions. Your responses should include examples from the reading assignments, if possible. Your answer to each question should be at least 300 words in length and utilize APA guidelines. Please feel free to use the LIRN Library to search for information that supports your arguments.

1. List and describe the different file format types used for bitmap graphics.

2. There are a variety of techniques used by content providers to protect digital media from unlicensed duplication and use. Discuss Content Scrambling System as a DVD DRM technology.

3. Describe the TIFF and JPEG bitmap graphic formats.

4. Discuss graphics conversion as it relates to vector-to-bitmap and bitmap-to-vector conversion.

5. Contrast a Web page that uses streaming video with one that uses the alternative of downloading the entire video file before playing it. Discuss the advantages and disadvantages of each.

6. With regard to DRM technologies and copy protection, how do you know if you are breaking the law?

Population Growth Math

To study the growth of a population mathematically, we use the concept of exponential models. Generally speaking, if we want to predict the increase in the population at a certain period in time, we start by considering the current population and apply an assumed annual growth rate. For example, if the U.S. population in 2008 was 301 million and the annual growth rate was 0.9%, what would be the population in the year 2050? To solve this problem, we would use the following formula:

P(1 + r)n

In this formula, P represents the initial population we are considering, r represents the annual growth rate expressed as a decimal and n is the number of years of growth. In this example, P = 301,000,000, r = 0.9% = 0.009 (remember that you must divide by 100 to convert from a percentage to a decimal), and n = 42 (the year 2050 minus the year 2008). Plugging these into the formula, we find:

P(1 + r)n = 301,000,000(1 + 0.009)42

= 301,000,000(1.009)42

= 301,000,000(1.457)

= 438,557,000

Therefore, the U.S. population is predicted to be 438,557,000 in the year 2050.

Let’s consider the situation where we want to find out when the population will double. Let’s use this same example, but this time we want to find out when the doubling in population will occur assuming the same annual growth rate. We’ll set up the problem like the following:

Double P = P(1 + r)n

P will be 301 million, Double P will be 602 million, r = 0.009, and we will be looking for n.

Double P = P(1 + r)n

602,000,000 = 301,000,000(1 + 0.009)n

Now, we will divide both sides by 301,000,000. This will give us the following:

2 = (1.009)n

To solve for n, we need to invoke a special exponent property of logarithms. If we take the log of both sides of this equation, we can move exponent as shown below:

log 2 = log (1.009)n

log 2 = n log (1.009)

Now, divide both sides of the equation by log (1.009) to get:

n = log 2 / log (1.009)

Using the logarithm function of a calculator, this becomes:

n = log 2/log (1.009) = 77.4

Therefore, the U.S. population should double from 301 million to 602 million in 77.4 years assuming annual growth rate of 0.9 %.

Now it is your turn:

  • Search the Internet and determine the most recent population of your home state. A good place to start is the U.S. Census Bureau (www.census.gov) which maintains all demographic information for the country. If possible, locate the annual growth rate for your state. If you can not locate this value, feel free to use the same value (0.9%) that we used in our example above.
    • Determine the population of your state 10 years from now.
    • Determine how long and in what year the population in your state may double assuming a steady annual growth rate.
  • Look up the population of the city in which you live. If possible, find the annual percentage growth rate of your home city (use 0.9% if you can not locate this value).
    • Determine the population of your city in 10 years.
    • Determine how long until the population of your city doubles assuming a steady growth rate.
  • Discuss factors that could possibly influence the growth rate of your city and state.
    • Do you live in a city or state that is experiencing growth?
    • Is it possible that you live in a city or state where the population is on the decline or hasn’t changed?
    • How would you solve this problem if the case involved a steady decline in the population (say -0.9% annually)? Show an example.
  • Think of other real world applications (besides monitoring and modeling populations) where exponential equations can be utilized.

Palamon Capital Partners/ TeamSystem S.p.A.

Answer the following:

  1. What is private equity investing? Who participates in it and why?
  2. How is Palamon positioned in the industry? How does private equity investing compare with public market investing? What are the similarities and differences between the two?
  3. Why is Palamon interested in TeamSystem? Does it fit with Palamon’s investment strategy?
  4. How much is 51% of TeamSystem’s common equity worth? Use both a discounted cash flow and a multiple-based valuation to justify your recommendation.
  5. What complexities do cross-border deals introduce? What are the specific risks of this deal?
  6. What should Louis Elson recommend to his partners? Is it a go or not? If it is a go, what nonprice terms are important? If it’s not a go, what counterproposal would you make? to his partners? Is it a go or not? If it is a go, what nonprice terms are important? If it’s not a go, what counterproposal would you make?

Order unique answers written by our professional writers at an affordable price. 

Deconstructing Mixed Methods Research   

As a scholar practitioner, it will be important for you to have the skills to deconstruct both quantitative and qualitative research to apply the results to the world of counseling practice. In some instances, researchers take a mixed methods approach and combine both quantitative and qualitative data in one study. Thus, as a scholar practitioner, you need to be able to view a study through both a quantitative and a qualitative lens.

In this Application, you discover the complex nature of mixed methods research and the types of designs utilized when quantitative and qualitative approaches are combined, and you deconstruct a mixed methods research article.

The assignment: (2–3 pages)

For this assignment, you will examine the mixed methods research article by Torres, “Latino Definitions of Success: A Cultural Model of Intercultural Competence,” which is provided in the Learning Resources. Using the six frameworks for mixed methods provided in the Hanson article, “Mixed Methods Research Design in Counseling Psychology,”

  • Briefly describe the type of design used by Torres and the timing of the data collection.
  • Briefly describe the theoretical lens that underlies the study.
  • Briefly describe the data analysis procedures used in the study.
  • Explain the rationale for using the mixed method design in this study.

Support your Application Assignment with specific references to all resources used in its preparation. You are required to provide a reference list and to appropriately cite, in APA style, all references used within your assignment.

Stock Investment Analysis – Fidelity Large Cap Stock Fund

Write a four to five (4-5) page paper on Stock Investment Analysis for Fidelity Large Cap Stock Fund in which you:

  1. Assess the year-to-date performance of the FLCSX fund, including the key drivers of the fund performance, and how the performance of the fund compares to the S&P 500.
  2. Evaluate the volatility risks in the fund, providing an assessment of the fund manager’s performance based on the risk measurements for the fund. Make a recommendation to the fund manager for improving the performance. Provide a rationale for your recommendation.
  3. Compare your assessment of the fund performance to the Morningstar rating for the fund, indicating your agreement or disagreement with the rating. Provide support for your position.
  4. Assess the top 10 holdings in the fund, indicating the level of diversification in the fund. Identify a company that may impose increased risk and any changes that you would recommend in the fund composition to improve the fund performance. Provide support for your rationale.
  5. Use at least three (3) quality academic resources in this assignment. Note: Wikipedia and other Websites do not qualify as academic resources.

Review the investment information for the Fidelity Large Cap Stock Fund (FLCSX) at http://fundresearch.fidelity.com/mutual-funds/summary/315912402.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Analyze stock prices and valuations.
  • Use technology and information resources to research issues in financial risk analysis.
  • Write clearly and concisely about financial risk analysis using proper writing mechanics

The Persuasive Speech

Speech #4:  The Persuasive Speech
Purpose:  To persuade your audience on a Question of Policy; that a specific course of action should or should not be taken.
Specific Purpose Statement Examples:
  • The audience will agree that same-sex marriages should not be legalized.
  • The audience will agree that a security fence should be constructed along the U.S.-Mexico border.
  • The audience should create a living will to provide for their family.
  • The audience should vote for a total ban on human cloning.
  • The audience will agree that school districts should not allow soft-drink companies to stock their products in school vending machines.
 
Assignment Description:  The goal of this speech is to persuade your audience for or against a Question of Policy.Questions of Policy inevitably involve Questions of Fact and Questions of Value BUT Questions of Policy always go beyond both to decide whether something should or should not be done.  In other words, Questions of Policy attempt to persuade an audience that a specific course of action should or should not be taken.  Questions of Policy deal with specific courses of action.
Speakers may see either passive agreement or immediate action from the audience, though you are encouraged to seek the latter (immediate action) if there is appropriate action for the audience to take.  In either case, be prepared to deal with all three (3) basic issues of policy speeches – need, plan, and practicality.
This speech will require considerable research and skillful use of the methods of persuasion.  Special emphasis is given to evidence and reasoning.  This assignment also stresses audience analysis and adaptation.  Identify with and adapt to your target audience.
At the end of this speech, the audience should know your attitude or personal viewpoint on the topic, but we still need to know what the “experts” have to say on your topic as well, based on your research.  Select topics that are interesting to you or that you feel passionate about.  The goal is to invoke a reaction (mental or behavioral) from your audience.  This speech requires a balance of emotional appeal and researched information, organized into a cohesive, logical, and documented outline.  Emphasis is placed on citation of sources.
  • Make your message clear and avoid jargon.
  • Make your message accurate and use research.
  • Make your message vivid and memorable, using descriptive words.
  • Make your message interesting, keeping your audience’s interests in mind.
  • Make your message relevant, considering ways to relate the topic to your audience.
Points:  200
Time Requirements:  7-10 minutes
Audience requirements:  You need at least 6 people, ages 16 and up (no pets or mannequins) to serve as your audience, including your video camera operator.  Having less than the required 6 audience members will result in failing the assignment.
Delivery Method:  This speech should be delivered extemporaneously, which means that it is prepared in advance, which includes rehearsing it.  Use a conversational speaking style that talks naturally “with” us, not “at” us.  Keep movements and gestures natural.  Since using at least one visual aid is required, practice working with it prior to the presentation. 
Speaking Outline:  This speech should be delivered from a brief set of notes (keywords, brief phrases, etc.), called a Speaking Outline. These notes should not be written word-for-word, except for quotes.  Speaking notes are acceptable in any format:  index cards, sheets of paper, notebook, binder, etc., and should follow basic outline format (labeled headings, notation, indentation, etc.).  You are not to read your speech and you should use as much eye contact as possible.  Regardless of the format your speaking outline takes when delivering your speech, you will need to submit this outline to your instructor by the assigned due date.
Organization:  The strategic order that is most common for this type of persuasive speech is the Problem-Solution pattern, although other variations are sometimes used.  The three basic issues of a Policy Speech (need, plan, and practicality) parallel the problem-solution-action approach.
Preparation Outline:  A Preparation Outline is written in full sentences, is properly labeled and follows proper outline format . Use good organization as you prepare your speech.  You should submit a well organized Preparation Outline of your speech by the assigned due date.  This outline should include:
  • A labeled Introduction that fulfills the functions of an effective beginning
1.      Gains the interest and attention of the audience
2.      Reveals the topic of your speech
3.      Adapts and relates your topic to your target audience
4.      Establishes credibility and goodwill
5.      Previews the body of the speech
  • A Body with Main Points developed and arranged properly and logically
1.      Written in full sentences
2.      Uses proper outline format (notation, indentation)
3.      Outline is cohesive, logical, supported, and documented
4.      Main Points include the Need, the Plan and the Practicality
·         Need:  Is there a need for the policy?  Prove the existence of the problem.  The burden of proof always rests with the speaker who advocates change.  Prove that a change is necessary.
·         Plan:  Explain your plan for solving the need.  What is your solution?
·         Practicality:  Show that your solution will work.  Will it solve the problem?
5.      Sources, evidence, and supporting material cited (written) in the outline
6.      Includes a balance of emotional appeal and researched information
7.      Connectives employed effectively between Main Points
  • A labeled Conclusion that fulfills the functions of an effective ending
1.      Summarizes and reemphasizes the main ideas of the speech
2.      Motivates an audience response (action to be taken by the audience)
3.      Memorable closing statement that reinforces, unifies and creates a lasting impression
  • A Bibliography or Works Cited list of your sources using MLA or APA format
 
Visual Aids:  At least 1 visual aid is required for this speech.  The accuracy, clarity, appropriateness, and usefulness of your visual aid will be part of your evaluation.  The audience should not feel that the visual aid has been thrown in at the last minute or that the speech would have been equally good or even better if no visual aid had been used.  Refer to Chapter 13 for types of visual aids and guidelines on preparing and presenting effective visual aids.  If using technology, always have a back-up plan.
Sources:  Four (4) sources are required for this speech presentation.  Consider the legitimacy, recency, credibility, balance, and accuracy of your sources.  Interviews from qualified sources can be especially helpful for this speech.  State WHO the source is and why they are qualified, not just the statistic/fact/quote/example from the source.  A web address is NOT a source; it is merely the location of the source.  A database (Wikipedia) is not a source; it is a compilation of information from many sources.  Cite the original source of the information.  Your sources must be cited out loud in your speech, written into your Preparation Outline where the supporting material from the source occurs, and listed in your Bibliography/Works Cited list.
Bibliography/Works Cited list:  Required for this speech.  List the sources using either MLA or APA format.  Include as part of your Preparation Outline.
Verbal Communication:  Give adequate attention to the verbal aspects of this speech.  Avoid the use of vocalized pauses.  Speak in well-formed, grammatically correct sentences.  Articulation, enunciation and correct pronunciation are important.
Nonverbal Communication:  The nonverbal aspects of public speaking that require attention in this speech include posture, natural gestures, appropriate attire, facial expressions, eye contact and purposeful body movements.
To Be Submitted by Due Date:  Your Speech #4 Video should be uploaded using Speech Capture in Connect.  Your speaking outline and your preparation outline should follow written work guidelines (see syllabus) and be sent as attachments (one per message) via Blackboard.  In addition, if you used PowerPoint or any other electronic visual aid, they should be submitted as well.
NOTE:  Please refer to the “Guidelines for Recording and Submitting Speech Videos” and “Using Speech Video Capture in Connect” documents prior to completing this assignment.  See syllabus for written work guidelines.
 

individual paper (Career Goal)

individual paper (Career Goal)

This paper is to address the student’s personal and professional development in the future. To be a complete paper, you have to address the questions below:
1. What is your professional or career goal? What is your career plan (e.g. career path, career
2. Use concepts and theories of individual characteristics (e.g., personality, ability, values) from the textbook to address what organization fits to you. Here I do not mean an exact organization. I expect you to address what organizational characteristics fit to your individual characteristics.
3. Use motivation theories (e.g. intrinsic vs. extrinsic motivation, expectancy theory, goal-setting theory, job design theory) to address your motivation for work and career development.
4. Associate concepts and theories from the textbook to address what are you weaknesses and strengths to be a team player.
5. Address your leadership potentials
6. Address how you deal with stressors from work and how you keep your life-work balance

How does American’s obsession with celebraties today compare with the worship of Goddesses in ancient cultures?

How does American’s obsession with celebraties today compare with the worship of Goddesses in ancient cultures?

How does American’s obsession with celebraties today compare with the worship of Goddesses in ancient cultures?
Include an annotated bibliography of possible sources should be completed. Create a clear concise thesis statement about the topic include an introduction and conclusion. Use credible sources. This means using books and peer-reviewed journals. Do NOT use internet pages or encyclopedias. Properly site your sources. Give credit where it is due, not just for quoted material, but for paraphrased material and detailed facts as well. You may either use footnotes or parenthetical notation, but follow the MLA format. Use at least five separate sources (books, journals), but do not rely on these sources to heavily for paper content. Provide a works cited page at the end of the paper, with material cited appropriately, in MLA citation. Works cited does not count as a page in the paper. Thesis statement should be the last sentence of the introductory paragraph, and should sum up the argument in a clear and concise fashion.
This term paper should be written in whole in the specified format and guidelines when received by me. When I receive, my completely written guideline followed paper it should contain aforementioned and stay within the expressed format. Myth and Culture- ? Evaluate myths and mythology in terms of its cross-cultural perspective, drawing upon how they express general truths about the human condition.
? Evaluate myths and mythology in terms of the social and behavioral sciences, particularly their importance in the areas of anthropology, archaeology, history, and religion.
? Display competence in terms of practical application of mythological studies to multiple fields of inquiry.
In this term paper

o Thoroughly research your paper topic, including at least five credible sources. An annotated bibliography of possible sources should be completed
o Create a clear, concise thesis statement about your topic.
o Create an outline for your research paper.
o Write a 10 page, double-spaced, 12-pt. font paper (not including a works cited page) surrounding your thesis statement, including an introduction and a conclusion.
o Proofread and carefully edit your paper before turning in the final draft

Proper research means:

1. Using credible sources. This means using books and peer-reviewed journals. Do not use internet pages or encyclopedias.

2. Properly cite your sources. Give credit where credit is due, not just for quoted material, but for paraphrased material and detailed facts as well. You may use either footnotes or parenthetical notation, but follow one of the following styles: MLA Format

How Is The Feminine Represented in Sandra Cisneros’s “Woman Hollering Creek” and Ana Castio’s “So Far From God”

How Is The Feminine Represented in Sandra Cisneros’s “Woman Hollering Creek” and Ana Castio’s “So Far From God”

Essay, English
How Is The Feminine Represented in Sandra Cisneros’s “Woman Hollering Creek” and Ana Castio’s “So Far From God”?
Project description
My Outline

1. Introduction: The major concern of the essay examines how females are represented in the Chicana literature.
2. Case Study
2.1 Woman Hollering Creek
a. Background Introduction
b. Historical Background: Gives account of the origin of Mexico and the border issue between the U.S. In addition, the section refers to the inhabitants, especially women, of how they define themselves in the borderlands.
c. “One Holy Night”: The vignettes is in the context of a foolish girl’s first love experience. She is a helpless and powerless figure in the story. Her grandmother, who sends the protagonist away and cuts off her education, is an executive of the male dominant society.
d. “Woman Hollering Creek”: The protagonist is a victim of domestic abuse. She is dependent and passive. Felice, the woman who saved the protagonist in the story, is an independent, confident and empowered woman. The protagonist represents the Chicana/Mexican woman who conforms to traditional roles, while Felice is the kind of woman who rejects a limitations set by male dominant society. Moreover, Felice gives a new meaning to La Llorona and teaches the protagonist a new way to be a woman.
e. “Never Marry A Mexican”: The story draws on the implication of the historical La Malinche, but the protagonist transforms La Malinche’s story into a triumph of unbalanced relationships and an encouragement for woman who doesn’t have a husband.
2.2 So Far From God
?Still working on the it, but the section will pretty much have the same outline as Woman Hollering Creek, chiefly focusing on how women are presented in the stories, and make comparisons between female characters.
3. Conclusion
Chicana females are described as vulnerable, powerless, and weak in the Chicana literature. The Chicana feminine has to endure inequality on gender roles. However, in some of the short stories in the essay, it is noted that find these female characters would act against the dominance of tradition, first to protect themselves, but ultimately to define themselves.
Letter from my professor
Yes, it’s a perfectly acceptable outline and plan. You need to ensure your essay is analytic, not descriptive, and engages with the secondary literature. I want to read your idea of what is happening, developed in the light of both primary and secondary material. Are Cisneros and Castillo doing what the critics say, or is there something else you can perceive? What is your thesis – i.e. what will be the argument you seek to defend in the essay? Make sure this is both clear and sophisticated. What is it about the Southwest as a region that gives rise to peculiar manifestations of oppression and resistance? Don’t forget, this is a module about regions. Is it necessary to identify a particular kind of ‘Southwestern’ masculinity, therefore, in the light of these remarks? How important is the border and the idea of borders as a metaphor?

Healthcare The Patient Protection & Affordable Care Act of 2010

Healthcare The Patient Protection & Affordable Care Act of 2010
To complete the following assignment, go to this week’s Assignment link in the left navigation.
The Patient Protection & Affordable Care Act of 2010
With the passing of the P.P.A.C.A., the government has taken a step towards reshaping the U.S. health care system. In your paper, you should describe the key characteristics of the act, review some of the major historical developments that resulted in its passage, and explain the major influences that shaped its creation. In addition, you will compare and contrast information about the act from a popular lay media report (like a website or newspaper/magazine article) with other official information available from academic research and/or governmental sources. Based on what you read, you will take a position on what you think some of the biggest pros and cons of the act are. Finally, you should analyze how the act will affect the U.S. health care system in terms of cost, quality, access, and the provision of services.

You must use the Ashford library to conduct the research necessary to complete this assignment. Prior to beginning this assignment, you are strongly encouraged to complete the Research Tutorial (specifically, units 2-3 and 5-8), which is available through the Ashford University Library.

In a three to four page double-spaced paper (excluding title and reference page), respond to the following:
1. Describe the purpose and history of the act. What issues in the U.S. health care system was the act intended to address? How did those issues develop historically? Provide examples that illustrate the historical development of the act.
2. Describe the key features of the P.P.A.C.A.? How will the act impact the U.S. health care system?
3. Compare and contrast the lay media report(s) with what scholarly sources say about the act. What do the popular lay media say about the P.P.A.C.A.? How do popular lay media reports compare to official (governmental or academic research) information available about the P.P.A.C.A.?
4. Describe your personal opinion about the act. What is your opinion about the P.P.A.C.A. overall? What do you believe are some of the pros and cons of the act? How did you develop that opinion?
5. Analyze the expected effect of the act in terms of cost, quality, access and the provision of services. Which features of the P.P.A.C.A. do you think will have the biggest effect (positive or negative) on our health care system?
Your paper must utilize three sources, including one “lay” media source (like a website, television broadcast, or print media article) and two scholarly sources. One of the two scholarly sources must be obtained from an academic journal accessed through the Ashford Online Library and the other may be an academic reference or a governmental or professional website taken from the Health Care Administration Subject Guide (located in the Ashford Library). All sources must be documented in APA style, as outlined in the Ashford Writing Center.

Stem Cells Assignment Instructions

Please go to this website and read some general facts about stem cells : http://stemcells.nih.gov/info/basics/ Make sure to click around on the different links on this website to learn as much information about stem-cells as you can.

You may also want to look at the section on stemcells in Chaper 20 of your lecture textbook, but this is not required since most of this information is covered at the above website.Then, please post a post under this discussion board in which you either partially or fully answers one or more of the questions below. Your general personal opinion on this topic is also welcomed, but I would primarily like us to concentrate on discussing the biological details of this issue.

Also, let’s make sure that everyone’s beliefs are respected. Please be professional as you discuss this topic with your fellow classmates.

Questions:

  1. What are stem cells? How can they be used in disease treatment?
  2. What are the different types of stem-cells? How are the different stem-cells obtained?
  3. Is the use of some stem cells more controversial than the use of other types? Why? Is there a technique (s) now used that can reduce the controversy over using some types of stem cells- explain the technique (s) if you can?
  4. Are some stem cells already being used in treatment, and many in the general public just do not realize that these treatments incorporate stemcells? Give an example.
  5. What is the advantage of using patient-derived stem cells as part of treatment versus non-patient (donor) derived stem cell? What is the disadvantage?
  6. What is the current U.S. federal policy on stem cell use? How does this differ from stem cell policies of other countries?

Would you like help on your stem cells assignment or any other biology assignment ?  Uniquewritersbay.com has professional writers ready to help you. We provide high quality and original papers that will guarantee you a good grade. Click on the Order Now button below to place your Order.

Imagine you are an Information Security consultant for a small doctor’s office consisting of three (3) doctors, two (2) nurses, and one (1) receptionist.

Imagine you are an Information Security consultant for a small doctor’s office consisting of three (3) doctors, two (2) nurses, and one (1) receptionist. The office is physically located among several other professional office spaces. The doctors utilize mobile devices over a wireless network to document patient visits, with the electronic patient records being stored on a server located within the building. Additionally, each doctor’s office has a desktop computer that utilizes a wired network to access the server and electronic patient records. The receptionist station has a desktop computer that is used to schedule appointments, but cannot access patient records. In 1996, Congress enacted the Health Insurance Portability and Accountability Act (HIPAA) to help citizens maintain their health insurance coverage and improve the efficiency and effectiveness of the American health care system. You have been hired to ensure HIPAA technical safeguards are appropriately designed to preserve the integrity of protected health information maintained in the doctor’s office.

Write a three to five (3-5) page paper in which you:

  1. Analyze proper physical access control safeguards and provide sound recommendations to be employed in the doctor’s office.
  2. Recommend the proper audit controls to be employed in the doctor’s office.
  3. Analyze methods and provide sound recommendations to ensure integrity of the electronic protected health information.
  4. Suggest three (3) logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method.
  5. Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguard.
  6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the role of information systems security (ISS) compliance and its relationship to U.S. compliance laws.
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about topics related to information technology audit and control using proper writing mechanics and technical style conventions.

Human Elements in Projects and Organizations 

For this assignment, you will continue your work on the Human Elements in IT Strategy document by adding a section on the success factors for the IT organization. You will prepare a list of human element characteristics and success factors for the IT organization and its projects. The list should be comprised of characteristics that are common to successful IT organizations and surrounding factors that help contribute to IT organization and project success. Each of the characteristics and success factors should be accompanied by a summary of why it is important to success.

The project deliverables are as follows:

  • Update the Human Elements in IT Strategy document Title Page with the new date.
  • Update the previously completed sections based on instructor feedback.
  • Success Factors in the IT organization:
    • Success Factor Identification
      • Prepare a list of human element characteristics and success factors for the IT organization and its projects.
      • The list should be comprised of characteristics that are common to successful IT organizations and the surrounding factors that help contribute to IT organization and project success.
    • Success Factor Contribution
      • For each of the characteristics and success factors identified in the first step, summarize why it is important to the success of the IT organization and its projects.
      • Include at least 1 specific step that your organization can take to improve each characteristic and success factor.

HRM and the Strategic Planning Process Case Study

Frank is the lead broker at a real estate firm that is located in one large city. The company has a nationally known real estate training program that costs $2,000 to attend. The program motivates real estate agents to sell more, gives tips on how to get leads, and recruits more agents to Frank’s brokerage firm.

Each real estate agent in his firm grosses a 3% commission with each transaction involved with buying or selling a house. After the broker’s cut, most agents net a commission of 2.1% with each transaction.

Frank’s motivation is to build his training program and the size of his brokerage firm by adding real estate agents. To do so, he decided to provide his real estate agents some incentives.

At noon on the first Monday of each month, agents sign up for four hours of floor time for the month via computer. Floor time at the downtown office allows each agent to be the sole person to accept phone calls, answer e-mails, or visit with walk-ins to get possible listings and generate more business. Floor time occurs from 6 a.m. to 10 p.m. each day. Agents love floor time so much that by noon each Monday sign-up day, all floor times for the month are taken.

There are other ways to get real estate leads such as contacting people who have de-listed their houses or are showing “For Sale by Owner” signs in front of their houses. But floor time in this firm accounts for a third of all leads.

Here is the new incentive policy:

Realtors can receive up to four hours of floor time per month if they have had a transaction in the last three months.

Realtors receive one additional hour of floor time per month for exceeding three transactions in a three-month period. If there are four transactions in a three-month period, Realtors receive one additional hour. If there are five transactions, Realtors receive two additional hours. Six transactions lead to three hours and so on.

Realtors receive one additional hour of floor time per month for referring one person to Frank’s training program. They receive two hours for two people, three hours for three people, and so on.

The system worked well for two months after initiation of the program. On the third month, floor time ran out. Agents who had rights to floor time but could not get it were promised extra floor time the next month. The real estate firm added 16 real estate agents (while losing only two) and brought in 18 agents to the training program due to referrals from other agents. The superstar real estate agent Trina was involved with nine real estate transactions during the three-month period.

Frank decided to change the standard one week before Realtors could sign up for the next floor time. Realtors can now receive up to four hours of floor time per month if they have had a transaction in the last two months (effective next sign-up). All other aspects of the incentive program will continue.

Stacey has been a Realtor with Frank’s brokerage firm for the last 15 years. She had been on vacation in February and was gone in late March, so she did not get the e-mail on the new incentive policy. She thought she could sign up for floor time because she had a transaction in the last three months. She went on the computer to sign up for floor time as usual on Monday, April 3, at noon. She was locked out. The computer said she had insufficient transactions over the last two months.

Stacey immediately called Frank at 12:05 complaining that she couldn’t sign up for floor time. Frank said that she should have been keeping up with all e-mail correspondence from the firm. She said it wouldn’t have made a difference. “I went on vacation knowing I was safe for floor time. Now you surprised me. The firm is going to get bigger and bigger, and it is only going to get tougher to get floor time.”

She was disgusted by the fact that her friend Trina received 20 hours of floor time in April. The incentive plan was also unfair to newcomers who get no floor time. Stacey said, “Trina is a machine. She has a staff that helps her get sales. She even hired a person to find Realtors to go to your training seminars. How can I compete against Trina who will capture all the floor time in the firm?”

Stacey also wondered about the training seminars. She got into the business of real estate to sell houses, not seminars.

Frank stated that he wants to give the spoils to those in the firm who produce the most. Trina happens to be one of the most productive Realtors in the city and state. Trina also nets 2.5% with each transaction because she passes the magical $3 million threshold each year. Besides, said Frank, floor time is only a small piece of the pie.

Questions:

  • What were Frank’s strategic purposes for the incentive plan? Did the incentive plan accomplish his purposes? Why or why not?
  • Which incentive option is Frank choosing?
  • Do you think that high-level performers should get the bulk of the rewards in an organization, or should the rewards be meted out in a more egalitarian fashion?
  • Let’s say Stacey represents most of the Realtors of the firm. How could Frank have improved the cooperative development of incentives with Stacey prior to incentive initiation?
  • Given Frank’s strategic purposes, what alternative incentive plans would be appropriate for this real estate firm? Consider incentive plans mentioned in the chapter.

Developmentally Appropriate Teaching Strategies

Read the articles “10 Effective DAP Teaching Strategies” and “Culturally Responsive Classroom Strategies.” In addition, view the Culture in the Classroom website and the Lisa Delpit Interview article.

After reviewing the required resources, identify and discuss three challenges involved with ensuring that teaching strategies are appropriate for culturally diverse children. Then, discuss these cultural challenges in the classroom using one sociological perspective (i.e., functionalism, conflict theory, symbolic interactionism, etc.) and another relevant perspective, such as Piaget’s preoperational stage of development. Finally, identify and discuss how the challenges related to differences in culture may be addressed by a teacher in a way that increases the child’s cognitive advancement and academic success.

You must use at least three scholarly sources other than the textbook and required resources for this assignment. The paper must include a summary of each of the challenges identified and each of the remedies to those challenges. In addition, you must include an explanation of the cultural challenges in the classroom using one of the sociological perspectives and Piaget’s theory of the preoperational stage of cognitive development.

Criteria: 

  1. Must be three to four double-spaced pages in length, not including title and reference pages, and formatted according to APA style as outlined in the Ashford Writing Center.
  2. Must include at least three scholarly sources, in addition to the textbook and required resources.
  3. Must include, on the final page, a reference list that is formatted according to APA style as outlined in the Ashford Writing Center.
  4. Must be well organized and reflect college-level writing.

IT Security Policy Framework

establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework.

You may create and / or assume all necessary assumptions needed for the completion of this assignment.

Write a three pages paper in which you:

  1. Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization.
  2. Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations.
  3. Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy Framework.
  4. Describe your IT Security Policy Framework implementation issues and challenges and provide recommendations for overcoming these implementation issues and challenges.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Identify the role of an information systems security (ISS) policy framework in overcoming business challenges.
  • Design a security policy framework.
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions.

 

Improving Patient Flow in Emergency Departments

 

As you learned from Chapter 4 of Hospital-Based Emergency Care and from this week’s articles, emergency departments face serious challenges that impact, and are impacted by, conditions throughout the hospital. Experts emphasize the need to making patient flow more efficient. As noted in the IOM Committee’s report:

Patient flow, defined as the movement of patients through this system, is an important indicator of the timeliness, safety, and quality of the care received. Efficient patient flow ensures maximum throughput (the number of patients treated and discharged from the ED per day), minimizing delays at each point of the delivery process with no decrement in the quality of care. Impaired patient flow, on the other hand, results in bottlenecks that prolong delays for patients already in the system, as well as those awaiting entry (p. 133).
For this Application, you will interview at least one administrator or manager working in a local emergency department to learn how his or her ED has identified and addressed challenges involving patient flow. On the basis of this interview, you will select one of these challenges and do further research about best practices to address this problem.

  1. Setting Up the Interview
  • Read through the entire Application to gain an overview of this assignment.
  • As soon as possible, contact the emergency department at a local hospital and ask to set up an interview with an administrator or manager in this ED. This must be someone who can discuss process improvement efforts in this ED related to patient flow.

    The interviewee should hold one of the following (or comparable) positions for this ED:

o    Administrative director of the ED (usually non-physician)

o    Chief of Emergency Services or Emergency Department (physician)

o    Nurse Manager for ED

o    Lab Manager or Imaging Manager responsible for supporting ED
When contacting the department, identify yourself as a student in the Walden University MHA program and briefly describe your objective in interviewing the administrator or manager. Let your interviewee know that you will keep all identifying details (such as his/her name and the name of the hospital) confidential, if desired.

  1. Preparing for and Conducting the Interview

Review the “Input/throughput/output Model” of a patient flow through the ED, on page 134 in Hospital-Based Emergency Care (http://books.nap.edu/openbook.php?record_id=11621&page=134# ). Consider why this is the typical model, and what the pros and cons of this process flow are. Make sure you understand how it represents patient flow.
Make a list of various issues related to patient flow, as identified in Chapter 4 of Hospital-Based Emergency Care and your other Learning Resources. Note when and why bottlenecks typically occur, and identify other problems in efficient processing of ED patients. Also list strategies used to address these challenges.
With these thoughts in mind, develop a list of questions about the patient flow process (covering input, throughput, and/or output phases) to ask your interviewee. Through these questions, you should find out about challenges they have encountered regarding patient flow, and ways they have addressed it. Phrase these questions in your own words. At minimum, your questions should encompass the following:

o    What are crucial challenges this ED has faced in recent years related to patient flow?

o    On what basis were these challenges identified? Were quantitative data used to identify and confirm the existence of problems, and if so, which types of data?

o    Focusing on one of these challenges, what process improvement or reengineering efforts has this ED taken to address the challenge?Did the department follow Lean and/or Six Sigma or other comparable approaches in addressing this?

o    Did the ED use any internal or external best practices to make these changes? If so, which ones?

o    Did the organization or ED establish any metrics to determine if expected outcomes are being met? If so, what were the metrics?

o    Did the implemented changes achieve expected outcomes?
Conduct your interview with at least one of the administrators or managers of a local hospital’s Emergency Department (see list of possible interviewees by title above). Ideally, conduct this interview in person in the hospital. If this is not feasible, however, you may complete this interview by phone. If follow-up questions are needed, these may be conducted by phone and/or email.
If possible, arrange for a tour of your selected ED, so that you may observe firsthand the layout and other notable features of the ED that may impact patient flow.

  1. Completing the Application

Do further research through Walden Library and/or the web to learn more about the patient flow challenge identified by your interviewee. According to your research, what are best practices for this process improvement issue?
Write a 3- to 4-page paper in which you address the following:

o    Identify the name and organization of your interviewee (unless that person has requested anonymity).

o    Summarize the responses from your interviewee to your questions.

o    Based on the interview and additional research you conducted, what is the industry best practice for this performance improvement issue?

o    Which key stakeholders are likely to be affected by the performance improvement effort, and how?

o    Provide with any further conclusions about the ED’s operations or layout, and best practices as they relate to the challenges facing this ED.

The Application is due by Day 7 of this week

Your written assignments must follow APA guidelines. Be sure to support your work with specific citations from this week’s Learning Resources and additional scholarly sources as appropriate. Refer to the Essential Guide to APA Style for Walden Students to ensure your in-text citations and reference list are correct.
 

 Accounting Ethical Breaches Analysis

Many organizations have been in the news over the past few years due to accounting ethical breaches that have affected their customers, employees, or the general public. Identify a story in the news that depicts an accounting ethical breach. You may select from any type of organization about which you have information or a curiosity.

Write a four to five (4-5) page paper in which you:

1. Given the corporate ethical breaches in recent times, assess whether or not you believe that the current business and regulatory environment is more conducive to ethical behavior. Provide support for your answer.

2. Based on your research, describe the organization, the accounting ethical breach and the impact to the organization related to ethical breach.

3. Determine how the organizational ethical issue was detected and how management failed to create an ethical environment.

4. Analyze the accounts impacted and / or accounting guidelines violated and the resulting impact to the business operation.

5. As a CFO, recommend which measures could have been taken to prevent this ethical breach and how each measure should be implemented in the future.

6. Use at least four (4) quality academic resources in this assignment. Note: Wikipedia and other Websites do not quality as academic resources.

Your assignment must follow these formatting requirements:

 Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

 Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

 Examine accounting principles and concepts used in businesses.

 Prepare and record financial transactions in the accounting cycle according to GAAP and IFRS accounting methodology.

 Use technology and information resources to research issues in financial accounting.

 Write clearly and concisely about financial accounting using proper writing mechanics.

Business Rules and Data Models

Suppose a local college has tasked you to develop a database that will keep track of students and the courses that they have taken. In addition to tracking the students and courses, the client wants the database to keep track of the instructors teaching each of the courses.

Use the internet to research the types of information that a college would want to track in a database. Focus your attention on information that could represent entities within a database as well as attributes of such entities.

Write a two to three (2-3) page paper in which you:

  1. Describe the purpose of the database.
  2. Based on your research and / or common knowledge of a college and the information tracked by a college, describe the entities of the database and the attributes of each entity.
  3. Based on your research and / or common knowledge of a college and the information tracked by a college, describe the business rules that could impact the structure of the database.
  4. Determine the information that the conceptual model of the database would include and determine the information that the physical model of the database would include.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the role of databases and database management systems in managing organizational data and information.
  • Compose conceptual data modeling techniques to capture the information requirements.
  • Use technology and information resources to research issues in database systems.
  • Write clearly and concisely about relational database management systems using proper writing mechanics and technical style conventions.