Month: December 2017

Role of Risk Manager in Heath Care Assignment And Sample Answer

Assignment Instructions

In order to be successful, a risk management plan must be communicated and applied throughout the organization.

  • Prepare a paper that examines the role of the risk manager in integrating the risk management program within the organization and ensuring compliance.
  • Evaluate challenges that a risk manager might confront in developing, communicating, and implementing a risk management program.

Include at least three references, of which one must be a scholarly article.

Sample Answer – Role of Risk Manager in Heath Care

In most organizations, there is an overwhelming expectation to conduct their operations with minimal exposure to risks or any forms of liabilities. In order for such organizations to remain successful in terms of avoiding or minimizing exposure to liabilities, they require practicing proper risk management procedure. There should be sufficient time for such organizations to establish structural and organizational policies, which can protect them from experiencing any form risk especially financial liabilities (Kolb & Schwartz, 2009). Even though it is not possible to completely eradicate financial liability risk, effective application of risk management procedures will bring the exposure down to acceptable levels. There are various traditional methods, which various organizations implement in order to practice fundamental risk management. They include; implementing protective policies and procedures to the organization, establishing form practices of employment, development of materials for training and board orientation, and acquiring insurance coverage (Kolb & Schwartz, 2009).

In modern times, efforts geared towards quality improvement and risk management in healthcare organizations do find it necessary to support patient safety (Youngberg, 2010). It is significant to note that a risk manager performs crucial roles in an organization. Some of these crucial roles include education, patient safety, loss prevention, and identification and analysis of risk (Youngberg, 2010). Risk manager should conduct an analysis of customer satisfaction and then initiate activities, which would improve performance in respect to the findings. He/she should, also, be active in conducting analyses to establish the root-cause of events. In this regard, he/she should design systems, which would assist in implementation of improvements (Kolb & Schwartz, 2009). He/she should engage in continuous identification of opportunities in order to sustain improvement. The risk manager should, also, perform consultative roles as far as various services and departments in the organization are concerned. Such consultative services are crucial for organizational compliance, accreditation and regulatory purposes. All these activities are significant for performance and quality improvement. The manager should, also, oversee programs, which aim at upgraded patient care outcomes (Kolb & Schwartz, 2009).

In line with the roles of a risk manager, risk identification as well as control should be put on the forefront (Okoroh & Gombera, 2006). These two aspects entail adverse event reporting as well as prevention of loss and reduction. The risk managers of the contemporary times should be on the fore front to ensure effective policy review, claims management and risk financing. Risk management should, also, entail compensation of workers, mandatory event reporting, accreditation compliance, regulatory and corporate compliance, security and safety, and patient relations (Okoroh & Gombera, 2006). Some of the overlapping roles of the risk manager include strategic planning, accreditation issues, board reports, patient education, addressing patient complaints, engaging in proactive assessment of risk, and performing root-cause analysis (Kolb & Schwartz, 2009). It is worth noting that charitable and nonprofit organizations can get exposure to risks through various areas. These areas include the misappropriation of physical assets, fundraising activities, investments, possible loss of charitable or nonprofit status, tax liabilities, misuse of funds, and fraud. Therefore, for risk managers to be effective in their roles, they should establish and implement effectual internal controls (Youngberg, 2010).

There are various challenges, which a risk manager may encounter during the development, communication and implementation of a risk management program. Following the current market interconnectedness and various other factors, it is significant to note that any form of risk can pop up anywhere in the world (Youngberg, 2010). This accumulates a lot of pressure of work for risk managers due to being uncertain of potential occurrences. Risk managers of today have to deal with the challenge of maintaining the reputation of their organizations. All organizations acknowledge the significance of this exercise especially during compliance or regulatory disputes. Therefore, challenges arise whenever they ensure reputational risk mitigation in all functional areas (Kolb & Schwartz, 2009). They, also, experience the challenge of global reach especially due to the Middle Eastern volatility and the expansion of upcoming markets in China, India, Brazil, and Russia (Okoroh & Gombera, 2006). There is the challenge of cultural change where risk managers have to deal with the introduction of a culture that is more risk enabled across a global organization. Another challenge, which the risk managers do face, is the compliance records. In most cases, accountability of the compliance records of an organization is the responsibility of the corporate counsel. This is mostly common on a global scale including the United States (Okoroh & Gombera, 2006).

In conclusion, most organizations have an overwhelming expectation to conduct their operations with minimal exposure to risks or any forms of liabilities. Even though it is not possible to completely eradicate financial liability risk, effective application of risk management procedures will bring the exposure down to acceptable levels. It is significant to note that a risk manager performs crucial roles in an organization (Youngberg, 2010). Some of these crucial roles include education, patient safety, loss prevention, and identification and analysis of risk. Some of the overlapping roles of the risk manager include strategic planning, accreditation issues, board reports, patient education, addressing patient complaints, engaging in proactive assessment of risk, and performing root-cause analysis. Risk managers of today have to deal with the challenge of maintaining the reputation of their organizations. They, also, experience the challenge of global reach especially due to the Middle Eastern volatility and the expansion of upcoming markets in China, India, Brazil, and Russia.

Download full sample answer or order a unique answer at an affordable price.

The Story of One Hour by Kate Chopin

The Story of One Hour by Kate Chopin was first published in 1894. Kate started writing fiction in 1889 and was known for her feminist views in her books. The short story focuses on one hour in the life of Louise Mallard during the times of the Victorian Society. The story starts when Louise’s sister Josephine tells Louise about the death of her husband Brently in a train accident, and the events that follow. Louise is a woman with a bad heart, and dies when she finds out her husband is still alive despite being told that he had died in an accident (Chopin 5).

The author shocks readers at the end of the short story and creates a debate on why Louise died. Did Louise die of a heart attack because of her short lived joy and excitement when she believed her husband was dead?  The tone of the story changes drastically from sorrow to joy and to sometimes being ironic or cynical. Louise is told by her sister that her husband has died in a train accident. The sister and Richards are carefully about how they break the news due to Louise’s heart condition because the bad news may kill her. The tone of the story is one of sorrow as Louise cries in her sister’s arms. When she returns to her room, she takes time to think about what the death of her husband means. Suddenly she starts to see life from a different perspective from the one she is living.

Louise has never imagined life without her husband and does not believe that is even a possibility. In Victorian Society, women belonged to men, where they were weak and helpless. Women could not survive without their husbands or fathers. The tone of the story changes when Louise suddenly realizes she is free and independent. She no longer belongs to her husband. This thought gets her excited as she desperately tries to fight the feeling of joy. She tries to fight this because feeling this amount of joy and excitement was forbidden in society. Suddenly she acknowledges all the excitement and joy of freedom and start acting like she is possessed. She sees her life different, free full of hope and she unexpectedly utters the word free. She says it over and over again in disbelief.  She becomes overwhelmed and begins to praying hoping this feeling will last forever.

The tone of the story suddenly changes to shock when Brently returns and just as quickly as it came, takes away her independence. The dramatic change of losing her freedom, joy and happiness kills her. It is obvious that Louise was oppressed in her marriage even though she acknowledges that her husband was a kind man who loved her very much. Despite this, she feels joy when she is told that he is dead. His death releases her from her oppression. However sadly, this is short lived when her husband comes back and she suddenly dies. The short story is full of drama and is ironical. The story shows how something drastic can change somebody’s life. Louise was an oppressed woman whose whole life suddenly changed with joy and hope due to her husband’s death. The story is also subtle and yet cruel. The impact of the story is powerful especially at the end when Louise’s husband Brently returns. Overall the story is able to depict different emotions over one hour of someone’s life and how one event can change someone’s life completely.

 

The JCAHO and Sentinel Events Assignment And Sample Answer

The JCAHO and Sentinel Events Assignment Instructions

The Joint Commission has established polices regarding the reporting of sentinel events by health care organizations.  Visit The Joint Commission’s website and review the Sentinel Event Policy and Procedures by Accreditation and/or Certification Program for two different types of organizations (e.g. ambulatory health care, long-term health care, hospitals, etc.).

Prepare a composition that discusses the following:

  • The importance of sentinel event reporting
  • General requirements of The Joint Commission’s Sentinel Event policy
  • The role of The Joint Commission in ensuring patient safety
  • The process of conducting a root cause analysis
  • Comparisons and contrasts on some of the organization-specific sentinel event examples that are subject to review by the Joint Commission between two different healthcare organizations (e.g. differences between an ambulatory health care and a hospital).
  • The role and responsibilities of the risk management function in ensuring organizational compliance with The Joint Commission’s Sentinel Event policy

The JCAHO and Sentinel Events Sample Answer

The Joint Commission performs essential responsibilities in the health sector. The commission ensures that the public receives the best health care quality. To support this mandate, the commission performs reviews of the activities of the hospital especially in response to sentinel events. This happens in the process of accreditation that entails for-cause surveys, as appropriate, full accreditation surveys, and random validation surveys (Natarajan, 2006). According to Natarajan (2006), a sentinel event is a startling incidence, which may involve serious psychological or physical injury, and to the worst extent, death. In the event that the patient suffers serious injury, then the situation should indicate a victim’s loss of function or even limb. The reason why such events bear the name “sentinel” is because they demand immediate analysis and quick response (Moore, 2008). Therefore, the joint commission continues collaborating with various stakeholders to ensure that the health care sector offers the safest and most effective care to patients.

The importance of sentinel event reporting

Sentinel event reporting has a lot of significance. It necessitates root cause analysis (Moore, 2008). This entails identification of causal or fundamental factors, which underlie the performance variation. Therefore, reporting gives details of probable occurrence or even actual occurrence of a given sentinel event. The main focus of the root cause analysis is mostly on the processes and systems and never on the individual performance (Natarajan, 2006). The report gives details of common causes in regards to the organizational processes as well as systems. It, also, gives details of special causes in regards clinical processes. Reporting is, also, essential because it leads to the development of an action plan. The processes involved in the analysis of the root cause lead to the establishment of an action plan. An action plan is essential in the sense that it identifies the approaches, which the organization should implement in order to decrease the likely occurrence of similar events some other time in the future (Ladema & Jorm, 2008). Therefore the report should give details regarding strategies, time lines, pilot testing, oversight and implementation that should comprise the action plan (Moore, 2008).

The sentinel event reporting is, also, essential because it gives details of the survey process (Ladema & Jorm, 2008). In most cases, the Joint Commission endeavors to assess the compliance of an organization whenever it organizes for an accreditation survey. During the process, the Joint Commission only requires the surveyors to avoid addressing sentinel events that are not yet known. Reporting, also, enables the public to know the progress of the organization in terms of minimizing and ending sentinel events (Ladema & Jorm, 2008). By collaborating with the joint commission, it becomes easy to understand the manner in which such events happen, and what should happen to eradicate such events in the future. Reporting an event as early it happens provides an ample opportunity to engage the staff of the Joint Commission in consultations. These consultations usually happen during the stage of analyzing the root cause and development of an action plan. Sentinel event reporting, also, provides for addition of the lesson learned during the event to be included in the sentinel event database of the Joint Commission (Moore, 2008).

General requirements of The Joint Commission’s Sentinel Event policy

It is worth noting that the Sentinel Event Policy of the Joint Commission has various requirements. Sentinel policy requires every accredited organization to provide a definition of the sentinel event (Hellings & Schrooten, 2007). This provides assistance especially regarding mechanisms of identification, reporting and management of such events. In such cases, the definition, which an organization provides should include only events whose review is provided for in the Sentinel Event Policy. The Sentinel Event Policy, also, requires that, during the occurrence of the sentinel event, the accredited organization should be prompt in conducting an analysis to establish the root cause (Hellings & Schrooten, 2007). It should, also, be prompt in developing an action plan, and implement essential improvements in order to reduce the risk. It should, also, be consistent in monitoring the effectiveness of all the essential improvements. The Sentinel Event Policy requires that reporting an event should happen through the system for event reporting, and it should happen up to the corporate level (Moore, 2008). It, also, requires that a credible analysis of the root cause of the event should happen through Root Cause Meetings. These meetings should happen within fourteen days of the occurrence of the event (Moore, 2008). All the attendees of such meetings should comprise of groups coming from different disciplines.

The role of The Joint Commission in ensuring patient safety

The Joint Commission ensures the safety of the patients through a number of ways. First, it has a mandate to practice continuous improvement of health care for the benefit of the public. It conducts an assessment of organizations, which provide health care and motivates them to maintain high quality, effective and safe health care at all times (Natarajan, 2006). The Joint Commission, also, encourages the physicians to engage in quality health care and patient safety. This is because their skills, knowledge as well as experiences are significant for positive health care and experiences of the patients (Natarajan, 2006). The Joint Commission, also, guarantees patient safety by enhancing and encouraging the involvement of physicians in accreditation.  In the same respect, the Joint Commission, also, ensures that nurses adhere to standards, rules and laws in order to guarantee desirable patient safety during their practice (Hellings & Schrooten, 2007).  The Joint Commission, also, encourages and motivates patients to ensure their own safety.

Download full sample answer or order a unique answer to this or any other assignment at an affordable price.

Motivating Operations – Behavioral Psychology Essay

In behavioral psychology, practitioners hold that motivation is a key contributor to the development of certain types of behavior in individuals, in the case of both children and adults. As such it is imperative that psychologists examine and understand the various motivations of behavior to enable the design the appropriate environments that foster the development of alternative and better behaviors. Motivation is that internal state or condition that energizes behavior and provides it with direction. Motivating operations refer to events that play a role in increasing and decreasing the probability of behavior. Motivating operations serve two main purposes: to alter the effectiveness of a particular stimulus as a reinforcer and to change the present frequency of all behavior that is reinforced by that particular stimulus.  Generally, motivating operations affect how much an individual “wants” something and how hard he or she will “work” to obtain it. In behavioral psychology, Motivating operations influence the effectiveness of any intervention that is based on the manipulation of consequences (Pearson Education Inc., 2010).

There are two types of motivating operations, unconditioned motivating operations (UMOs) and conditioned motivating operations (CMOs). UMOs are unlearned and are mostly as a result of an individual’s nature or history. For example, when an individual is feeling cold, he looks for ways to keep warm. The cold (motivating operation) increases the reinforcing value of warmth. Once the individual gets warm, then becoming warm abolishes the value of warmth as a reinforcer. CMOs on the other hand are learned or acquired. Conditioned Motivating Operations are usually neutral before they are either associated with another existing MO or a form or reinforcement or punishment. For instance, a man to change the channel on the TV but the remote doesn’t work. This increases the reinforcing value of buying batteries for the device, after which the remote works thus abolishing the need for batteries as a reinforcer (Ikkandi, 2011).

An example of motivating operations as a function of behavior can be explained by examining the case of Jimmy, a sixth grade student. Jimmy’s father has promised to buy him a new computer game if he gets good grades at the end of the school term. In this case the computer game is the motivating operation. In order to obtain what he has been promised Jimmy will definitely work harder, complete his assignments and engage in activities that will earn him extra credits in school i.e. influence his behavior.

Ethical Principles of Psychologists: The Monster Study

In the early 1900s many speech therapists and pathologists believed in the mainstream theory that held that stuttering was caused by cerebral imbalances. In 1939 Wendell Johnson, a psychologist at the University of Iowa, decided to investigate the cause of stuttering in children. Johnson conducted the research through Mary Tudor who was one of the students in his graduate class. The subjects of the experiment were twenty two (22) orphan children selected from institutions in Iowa none of whom were aware of the objective of the research but were made to believe that they were going to receive speech therapy. The subjects of the research were divided into two groups: the treatment (I) group and the control (II) group. Ten of the twenty two orphans selected originally had speech problems and had been marked as stutterers before the experiment begun. Five of the ten stutterers were placed in the treatment group (IA) who were made to believe that there was no problem with their speech at all while the other five students with speech problems were placed in the control group (IB) and were told that indeed they had challenges in speaking. The remaining twelve children participating in the study were randomly selected from the population of normally fluent orphans. Six of the children were placed in group IIA and were informed that they were beginning to develop speech problems such as stuttering. The other six subjects in group IIB who were fluent speakers were treated as such and praised for their good oratory skills. The Monster Study was characterized by ethical malpractices contrary to the standards and codes that guide the practice of research in psychology today.

The above experiment was conducted between May and January 1939 and involved talking sessions with each of the children. The children in group IIA who originally didn’t have stuttering problems began to develop other psychological problems though they didn’t stutter. They were afraid to engage in conversation or read aloud in class and this led to a decline in their academic performance. Other children developed anxiety and self esteem issues. Psychologists termed Wendell’s study as the “monster study” because they felt that he had no regard for the welfare of the orphan children by exposing them to such a study. Essentially, Wendell was trying to induce stuttering to children with normal speech through negative speech therapy and to test whether stutterers would improve their speech through positive reinforcement (Gretchen, 2003). This experiment has been deemed unethical by many psychology researchers worldwide.

 

The Monster study violated some of the General Principles outlined American Psychological Association to provide guidance to psychologists in their work. The manner in which experiment was contrary to Principle A: Beneficence and Nonmaleficence which encourages psychologists to ensure that their research benefits their subjects and does no harm to them. This study eventually led to some of the children developing psychological problems showing that it was indeed harmful to some of the research subjects. Principle C: Integrity, which states that “psychologists seek to promote accuracy, honesty and truthfulness in … psychology”, was also not upheld in the Monster Study. The participants of the monster study were made to believe that they were going to receive speech therapy during the experiment. However, the researchers’ objectives were to induce stuttering to children with normal speech and try to correct the speaking problems in the stutterers. In this case Wendell and Tudor deceived their subjects and led to long term negative impacts in the health of some of the children. Another principle violated in this experiment was Principle D: Justice, which upholds that psychologists should be fair in their practice and ensure that all persons can access and benefit from the psychologists’ work equally. In this experiment, Wendell worked with subjects drawn from orphanages in Iowa. His choice of test subjects is questionable being that he chose extremely vulnerable individuals who were actually easily available and accessible in the institutions. To be fair and/or minimize bias in the experiment, some of the children should have at least been randomly selected from normal families or households.

Besides the General Principles discussed above, there were some standards for research were also violated in the Monster Study. In any experiment conducted by a psychologist, he or she is required to obtain informed consent from the individuals participating in the experiment. This means that each of the subjects should only agree to participate after having been fully and truthfully briefed on the intentions of the experiment and what is required of them as subjects. Wendell and Tudor deceitfully engaged the children who participated in the study without accurate knowledge of its objectives. In this case since the subjects were also young and may not have understood the intentions of the experiment, the researchers should have considered the children’s best interests before involving them in the study. Another standard that wasn’t achieved in Wendell’s study was that of privacy and confidentiality. In various documents reporting about the Monster study, remarks made by Tudor to the students and some of the names of the students have been mentioned and exposed to the public domain. Disclosures of research findings to the public also require consent from the participant (American Psychological Association, 2014).

In spite of the aforementioned ethical violations the Monster study can still be redesigned to achieve the desired results using a more ethical approach. The first step should be to diversify the population pool of the test subjects to ensure fairness, equal participation and eliminate the bias that was evident in the initial experiment. For instance, children participating in the experiment should be drawn from both orphanages and households with a strong family bond where the children have been exposed to a good and loving environment. Secondly, the true and objective of the experiment should be communicated to the children in a language that they can understand. Parents and other legal guardians should also be informed of the research objectives prior to the commencement of the study so that they can give their consent. Lastly, rather than using negative and degrading remarks on the children in groups IB and IIA, the researchers should have employed other means to prove their hypothesis. For instance, to correct the stuttering problem as a researcher I would try speaking to the children slowly and in short sentences, pausing before responding and avoid interrupting the children as they speak to produce the desired changes. I would refrain from negative comments that most definitely harm the child in the long run. In addition, other than trying to induce stuttering to fluent children, I would focus on investigating other causes of speech impairment such as genetics, delayed child development, neurophysiology and family dynamics (Scholastic’s Parent and Child, 2014).

Swiss Cheese Model and the Role of Risk Management in Preventing Accidents

Assignment Instruction

Review the Swiss cheese model of accident causation by James Reason described in the textbook. In addition, you may access the article online (see reading material). Reflect on the “Swiss cheese model” and evaluate the role of risk management in preventing accidents. Explain the implications of accidents on organizational performance. Include at least three academic references, of which one must be peer-reviewed from an academic journal.

 

Sample Answer

Swiss Cheese Model and the Role of Risk Management in Preventing Accidents

The Swiss Cheese model of accident causation is a widely used model used in various industries such as health and aviation. The model was first described by James Reason in his book ‘Human Error’ and uses human factors to explain accidents (Reason, 1990). The model suggests that in any system there are various levels of defense. For example in a health care environment, drugs are checked before they are administered or there is checklist done before any operation is carried out on a patient. Each of these levels has little holes which are known as latent conditions. These conditions are caused by issues such as lack of training, poor management decisions, poor designs or limited resources.

When these latent conditions are arranged in a line over successive levels of defense, they will create an opportunity for an incident to occur. They will also increase the probability of making active errors. When a combination of the latent conditions and active errors breach all the levels of defense a patient safety incident or accident will occur. The initial mode was made up of five basic structural elements; decision makers, line managers, preconditions, productive activities, and defenses (Perezgonzalez, ZiZhang, & Abdul, 2011).

Decision makers are the senior managers who formulate strategies with goals and objectives to maximize the system’s performance. Line managers are departmental managers whose role is to implement the strategy within their departments such as training. Preconditions are the qualities of the workforce, the status of machines and the environment. For example, motivated staff or proper equipment that works. Productive activities are the actual performance within the operational departments. Defenses are the safety measures put in place to deal with foreseeable incidents such as wearing safety clothing. Accidents will occur when weaknesses exist at all the above levels of the system. This may occur because a chain of events has occurred from the first level to the last level of the system. Most accidents can be traced back to the weaknesses in a system (Carthey & Clarke, 2010).

The main objective of any business is to maximize profits. However, how much risk should a business take to achieve these objectives? In a health care organization medical errors can be averted through proactive risk management. Every health care organization has a risk management program; however, the question lies in whether the program is reactive or proactive. Reactive is preventing a recurrence of accidents that have occurred, whereas proactive is preventing accidents before they occur. Proactive risk management may avoid losses and expenses that would impact on the profits of the organization (Hopkin, 2013).

Accidents affect businesses and society as a whole in terms of lost lives and suffering for families and employees. The role of risk management is therefore to prevent accidents. Risk management can be implemented in the following ways. It involves carrying out a risk assessment. This involves identifying hazards and those people at risk. The organization could eliminate all risks by substituting dangerous risks with less dangerous risks. This is done through evaluating and prioritizing the risks. The next step in risk assessment is deciding the on the preventive action and taking action. It can combat risks at their source through implementing safeguards or safety measures. It can also minimize risks by designing suitable systems within the organization. This includes training, rules, procedures and supervision. Finally the organization must monitor and review its risk management.

Every organization is confronted by accidents which result in both negative and positive outcomes. Negative outcomes are normally easier to document as they are observable. They constitute the highest costs to the organization’s bottom line. They include loss of lives, faulty products, suffering for families and employees of those injured. Positive consequences of accidents can be viewed as providing an opportunity for organizations to learn and innovate. The positive outcomes are effective in the long term when the numbers of accidents reduce. Organizations that have an effective approach to accidents are more likely to become profitable in the long run as they will innovate and implement risk management policies that prevent or reduce the accidents.

Organizations incur high costs due to accidents which include salary costs, productivity losses, retraining, compensation costs, repairs, medical expenses and occupational death and injuries.  Accidents also increase costs on staff welfare, insurance, legal suits, are time consuming for management and give a negative image for the organization. The positive implication of accidents on organization performance is long term as they learn the importance of health and safety training, first aid training, and provision of safety equipment to employees for those in accident prone area.

Download full sample paper on Swiss Cheese Model and the Role of Risk Management in Preventing Accidents or order a unique paper at an affordable price. 

Critical Review Of A Research Paper – Recruiting Project Managers

Background

This critical review is on the following research paper “ Recruiting Project Managers: A Comparative Analysis of Competencies and Recruitment Signals from Job Advertisements ”. The study is about the competencies organizations use in Project Manager Job advertisements to recruit project managers. Organizations find it a challenge to recruit the ‘right’ project manager. Choosing the ‘right’ manager, results in achieving the project objectives.    The role of the project manager is critical in project management because the managers need to have a broad understanding of the different areas that require coordination. The final outcome of the project is dependent on the project manager and thus has an impact on project management  (Meredith & Mantel, 2006, p. 139).

Selecting a project manager is one of the crucial decisions required for any project. Organizations therefore need to know which signals to use in job advertisements in order to attract potential applicants for the position of the project manager. At the same time, these signals need to reflect the standards prescribed by project management professional bodies.   The objective of the study was to provide a systematic approach to understanding the use of project manager competencies from the job advertisements, academics, and standards provided by project management professional organizations.

The study was done by Dr. Kamrul Ahsan a senior lecturer in Victoria University, Melbourne; Marcus Ho from Auckland University of Technology, New Zealand; and Sabik Khan from Trust Bank Limited, Bangladesh. The study addresses the following research questions which are clearly stated. They include: One, what are the most frequently used competencies to attract potential project managers to organizations? Two, do the competencies sought by recruitment job advertisements reflect the competencies prescribed by project management literature and professional bodies? Finally whether there are differences regionally and between industries in the use of project management competencies to attract potential project managers.

Literature Review

The researchers reviewed relevant research studies and provided a rationale for the importance of the study. The literature review highlights the research gaps and provides reasons why the research was necessary. The literature review focused on the project management profession and the role of the project manager. It looked at what makes a competent project manager and the competency frameworks from project management literature. Finally it reviewed project management recruitment and job advertisements.

The last five decades has seen a growth in the use of project management across different industries. This has led to the development of project management as a profession just like other professions like law and engineering (Hodgson, 2002). This has led to the growth of project management professionals with the Project Management Institute (PMI) having over 3.3 million members with 400,000 of these having Professional Management Professional (PMP) credentials as of 2011.

Research studies indicate that even though the development of project – based organizations has received attention in theory and practice (Sydow, Lindkvist, & DeFillippi, 2004; Turner & Keegan, 1999; Turner & Keegan, 2001). There is little research that has been done on the role of the project manager.  The role of a project manager has changed from an administrator to a managerial and leadership role. This means that the project manager needs a different set of skills, capabilities and competencies hence the need for this study. The professionalization of project managers continues to remain diverse as an occupation and profession.

Research studies indicate that the types of projects and competencies of project managers vary in depth and are very broad (Muller turner). According to Muller $turner, there is a correlation between project management leadership competencies and the success of the project. The different types of projects also require different types of leadership style. The International Project Management Association (IPMA) and Project Management Institute (PMI) are the two major project management professional bodies. These organizations have developed various project management competency frameworks. The three dimensions of project management competencies are knowledge, performance and personal.

The literature also looked at the recruitment of project managers which is critical for an organization to attract and retain talented personnel. The critical role of the competencies of project managers to an organization is vital to the success of its projects because of the complexity of project work. The matching of the project manager to the requirements of the project and objective of the organization is vital. The research indicated a gap in linking the project management competencies to the project management professional body standards and the job advertisements in recruiting the ‘right’ project manager.

Sample

The study population is made up of project manager job advertisements on print and online media. Print media includes newspapers, professional magazines and journals. Online media includes online job boards, company career web pages and social media. The researchers chose online job boards because these were bigger and more detailed than those found in published print media. The online job advertisements provided a lot of content for analysis. They are easy to navigate, manage, and access the target job advertisements. They are also easy to categorize by country, industry, role and responsibilities. The size of the sample was 795 job advertisements which were analyzed using the 15 KSAs (Knowledge, Skills and Ability) developed from the literature review. The job advertisements were representative as they covered different industries from Australia and New Zealand.

Data Collection

The researchers justified their choice of data collection. The data on job advertisements for project managers was collected from online job boards. This is because online job boards provide more details on the job competencies and requirements than print media. Print media is restricted due to the limited space provided and it is also costly when the job advertisements use a big space.

The researchers described the format of their data collection tools. The first step the researchers followed was to create variables that would be the basis of the data collection. They then identified the most cited variables from the project management literature in regards to the competencies required of a project manager. This process identified 60 variables which were grouped under the 15 KSAs. The variables were tallied and ranked based on how frequent they appeared on the job advertisements.

The next step was to identify the job website, and the researchers chose ‘Seek’. This is the largest online job board in the Australian region, and hosts 60% of the Australian job sites. The researchers did not consider other job boards as many recruiters post the same jobs simultaneously.

There was evidence of a pilot study because before the researchers embarked on data collection they ensured that the KSA variables they would use covered the most sought-after project manager competencies. The pilot study involved the analysis of 40 job advertisements. The merging and grouping of the key variables was conducted through the literature review, content analysis from the 40 job advertisements, and group consensus among the researchers. The initial 60 variables were checked and amendments made where necessary. The pilot study was a success as the researchers’ added variables to the initial 60, and other variables were discarded in the process. This ensured a robust variable set for the study.

The strengths of the data collection process were that the researchers could identify the strength of the selected variables and adjust them accordingly before embarking on the major data collection. The weakness of the process was that it was time consuming as it was done manually without the use of any software. This process was painstaking, time consuming and laborious. The researchers used 795 jobs advertisements which were reduced to 762 after screening due to lack of content or duplication. This is what was tabulated for analysis.

Data Analysis

            The data was analyzed using content analysis which is a research technique that allows for inferences to be  made based on text an in consideration of the context it was written. It uses two integrated approaches; qualitative analysis for conceptual framework and quantitative to allow for measurability. The researchers used statistical analysis after identifying the final 762 job advertisements. The analysis was done according to job advertisements under country category, under industry category, and across industries and countries category. (Holzmann & Spiegler, 2010)

The data was in qualitative form before it was statistically analyzed. Each job advertisement was printed and marked with a reference number and filed under country and industry. The researchers used the initial 60 variables and scanned each advertisement for key words, phrases that fell under the predefined variables. Variables were placed in columns and job advertisements in rows. A binary code was used where ‘1’ was a positive response and ‘0’ was the alternate answer. Researchers also recorded demographics that included the name of the company, job titles, salary, benefits and project size.

Study Results

There is a section on the results and analysis which includes the study results. This section has different sub sections that give the results under different themes. These are; job advertisements under KSA classifications; sought-after KSAs across industries and countries’ KSAs under country category; and KSAs under project industry category. Under each sub section there is a report of the results.

The qualitative data was the final 762 job advertisements that were analyzed. There is no example of any of these job advertisements. The analysis of the quantitative data was through the use of tables and graphs for each sub section. There were five tables that represented; the top 15 most cited KSAs from literature; the top five KSAs from job advertisements; the top KSAs across industries and countries; a comparison between cited and sought-after KSAs; and the top five sought-after KSAs for the top five project industries. The results also included a graph indicating the project manager KSAs comparison for Australia and New Zealand. The second graph indicated the KSAs demanded in different project industries.

The results indicated that education under the knowledge category was the most cited competency at 28%. Communication was the most sought-after competency across all industries at 61.68%. From project literature leadership was the most frequently cited competency. For competencies under country category, Australian project management jobs looked for more KSAs in their advertisements than New Zealand. In addition Australians were more concerned about time and cost management than New Zealand. There were some differences in job requirements between the two countries. Under the project management industry category, most of the job advertisements were from 8 major industries with 52% from ICT and 25% from construction. Arts and media had the least job advertisements. Overall the most common competencies were communication and education.

Discussion and Conclusions

The researchers did not compare their findings to other research studied because this particular study was the only one of its kind in project management literature. The study provided answers to the three research questions set out at the beginning of the study. The most frequently used competencies to attract potential project managers to organizations were all skills based. These were communication, technical, stakeholder management and time and cost management. Under the knowledge category, the top two competencies were education background and project management certification. The ability category was the least emphasized in the job advertisements.

Similarities exist between the competencies sought-after by recruitment job advertisements ad those prescribed by project management literature and project management professional bodies. However, there are differences on the emphasis of competencies across industries and regions. Although the study indicates that communication is the most cited competency across all industries, the results indicate that the KSAs vary between industries. This means that the role of the project manager is different under each industry.

The limitation of the study includes the focus of the study on Australia and New Zealand. Differences may exist if the study included job advertisements from other regions such as the United States or Europe. The other limitation was that there was no similar study that had been carried out that would provide a comparison.

The researchers drew accurate conclusions based on the study finding.  The most significant finding was that attention is required on the variations in KSAs that exist across industries and regions as regards the role of the project manager. These differences can for the basis of a comprehensive understanding of project management.

Download full critical review of Recruiting Project Managers: A Comparative Analysis of Competencies and Recruitment Signals from Job Advertisements research paper or order a unique critical review of any article at an affordable price.

Functional Behavior Assessment (FAB)

Functional behavior assessment (FBA) is a process of understanding problematic behavior, the causes how to maintain or do away with them. It answers many questions why a child behaves in a certain manner and the steps to take in changing the behavior as well as determining the purpose or function a certain behavior serves in a child (Cipani & Schock, 2011).

Early psychologists clearly showed that behavior occur in predictable and lawful manner: directly and functionally related to environmental phenomena. Several research bodies have proved the importance of utility of functional analytic approach for persons with attention deficit, behavioral, and emotional disorders as well as developmental disabilities. Functional assessment assumes all behavior is purposeful hence; its major objective is altering the environment the child belongs rather than punishing the child with the misbehavior. It teaches them the most acceptable and adaptive way of getting what they want centrally to diagnostic model that enquires for the cause and its treatment medically. Interpretation of behavior assessment tests’ responses are as samples of behavior that generalize different situations while traditional interprets data as results of internal body processes.

Major components to observe in Functional behavior assessment are; identification of the problem, generating events or antecedents that predict the likeliness of behavior occurrence and maintaining the repercussions that would increase future occurrence of the behavior.  It is a preferable method since it includes interviews, record reviews and direct observation of the child’s behavior rather than team preference based approaches, which deals with a group of children instead of an individual. The method of assessment also ranges from precise and systematic to somewhat informal. The way forward in curbing the behavior is because of hypothesis statement acquired through analyzed and summarized information that describe the behavior and the environment (Haynes, O’Brien, & Kaholokula, 2011).

Functional behavior assessment focuses way beyond behavior as it tries to solve the problem and its results are unbiased. It lays a legal basis in development of BIP(behavior intervention program) that identifies environmental, social and biological factors which initiate, maintain or end the targeted behavior in schools. Through Functional behavior assessment, legal personnel are able to execute contextual aspects that contribute to a certain behavior and select appropriate interventions. This is through analysis of past events that affect current behavior and information on environmental and social context (Jackson, 2012).

Multinational Company Employee Management

Introduction

A multinational company is the kind of a company, which has its employees and assets operating in more than one country. This paper explores the manner in which multinational companies and corporations manage their employees in foreign countries. Multinational operations in foreign countries involve a whole set of challenges that such companies rarely encounter at their domestic levels. Due to the pervasive nature of multinational firms, they possess unique advantages that differentiate them from other firms, which operate at local levels (Caligiuri & Stroh, 1995). Most multinational companies around the world enjoy a lot of successes and it for this reason they become subjects, which require close analysis. There are several critics who are always in opposition of multinational firms accusing them of being cultural dictators, agents of capitalism, and dogs of capitalism (Caligiuri & Stroh, 1995). Therefore, in order to streamline a holistic management criterion of multinational firms, the executive management requires having various sets of theoretical tools more than they have for their domestic companies. Conducting comprehensive studies to establish certain facts is essential. The issues involved in the study may be of fundamental sociopolitical, organizational, strategic, and economic orientation (Feely & Harzing, 2003). All these issues are significant in the sense that they affect international expansion of business. Besides, management of employees in multinational firms requires proper comprehension of labour relations, interest groups and government of their respective countries.

Management of employees in multinational firms requires more than the normal procedures in the domestic firms in order to make the entire process a success. A number of issues do arise; for instance, performance incentives can lead to issues of conflict in multinational firms. Both management and employees can present differing views regarding a just and fair compensation and rewards for various levels of performance (Feely & Harzing, 2003). Another set of issues entails the influences of culture on employees and the manner in which management understands and defines desirable performance. Due to the differences in the nature of cultural influences from one country to another, it becomes essential for multinational companies to embrace performance management policies for each country. For proper employee management in multinational companies, the executive management requires having language, technical and cross-cultural training programs to facilitate employees (Sumetzberger, 2005). They should, also, address the differentiated and complex nature of rules and regulations from one nation to another.

There are several human resource implications that arise from inevitable inter-country cultural differences. One of them entails the essentiality to adopt human resource practices, which conform to the local norms. Such practices may include plans for interviews, recruitment and payment (Sumetzberger, 2005). Besides, for purposes of successful operations, the management should draw human resource staff members from citizens of host country to manage such foreign subsidiaries. According to Peterson et al. (1996), whenever a human resource staff shares similar cultural background as the employees, he/she is like to be sensitive to the expectations and needs of such employees at the place of work. The overall result of this kind of sensitivity is successful management and improved overall employee performance. Human resource management in multinational companies, also, does consider economic factors. Different countries have varying economic systems, which result into variations in inter-country human resource practices (Xiaoyan & Lan, 2013). Labour costs comprise another set of factors that human resource management considers in order to manage employees in multinational companies. Human resource practices may differ following difference in the costs of labour. In situations where there are high costs of labour, there would be intense focus on efficiency in order to improve employee performance (Sumetzberger, 2005).

For multinational companies, international staffing is a key element of success or failure. Besides, categorization of international managers is a significant idea. There are four main categories on international managers that include the locals, the expatriates, the home-country nationals, and the third country nationals (Caligiuri & Stroh, 1995). Multinational firms ensure that the locals fill most of the managerial positions both in foreign subsidiary and headquarter operations. They ensure that expatriates just fill minor positions, which require technical competencies for efficient operations. This kind deployment benefits multinational firms in a number of ways. Allowing host-country citizens to occupy management positions of foreign subsidiaries enables multinational companies to decrease operation costs. Furthermore, engagement of local citizens in foreign subsidiaries enables multinational firms to manage and overcome language barriers in their operations (Sumetzberger, 2005). In respect to language management strategies, the company management normally evaluates the following three essential dimensions: the language diversity that the company expects to interact with as it conducts its operations, the number of levels in various functions that may provoke the company to engage in cross-lingual communication, and, finally, the refinement and intricacy of the requirement language skills (Feely & Harzing, 2003). These dimensions are significant in the sense that they assist multinational firms to examine their language requirements in reference to their potentials in order to note their strong and weak spots. They are, also, essential for providing the multinational organizations with the methods to match their foreign language abilities against the strategic aspirations that they have (Feely & Harzing, 2003).

In regards to international staffing policy, most multinational firms do employ a geocentric approach when recruiting top executives of the company (Xiaoyan & Lan, 2013). This approach provides room for the best management candidates around the globe with the view that they are available in any of the nations where the firms conduct their operations. Since a geocentric approach aims at the qualified people for significant positions in the entire company irrespective of their nationality, it promotes efficient management of human resources. Through this approach, the multinational firms are capable of building a consistent culture throughout the whole global management team (Sumetzberger, 2005). The use of expatriates either third-country or home-country nationals is essential for multinational firms. This is common in situations where employers encounter difficulties finding the relevant and needed technical competencies among the local candidates.

In conclusion, management of employees in multinational firms requires more than the normal procedures in the domestic firms in order to make the entire process a success. A number of issues do arise; for instance, performance incentives can lead to issues of conflict in multinational firms. There are several human resource implications that arise from inevitable inter-country cultural differences. One of them entails the essentiality to adopt human resource practices, which conform to the local norms. For multinational companies, international staffing is a key element of success or failure. Besides, categorization of international managers is a significant idea (Sumetzberger, 2005). There are four main categories on international managers that include the locals, the expatriates, the home-country nationals, and the third country nationals. In regards to international staffing policy, most multinational firms do employ a geocentric approach when recruiting top executives of the company. The use of expatriates either third-country or home-country nationals is essential for multinational firms especially for handling technical assignments.

Changes Mental Illness – Psychology

The field of psychology has changed dramatically over time with the development of new theories and techniques of screening and assessment especially for mental illness. Due to the growth of this knowledge, treatment of individuals and groups has improved. This essay will focus on the changes made in what is considered a mental illness.

The changes in the diagnosis of mental illness have led to the development of numerous definitions and criteria that are considered as mental illness. In the United States, mental disorders are classified in the DSM or the diagnostic and statistical manual of mental disorders. This manual is the standard that mental professionals such as psychologists and psychiatrists use to diagnose mental disorders. The manual includes three sections that cover diagnosis classification, criteria sets and descriptive tests (American Psychological Association, 2000).

There are many classifications of mental disorders that exist which have changed over the past millennia. Over the years there has often been little agreement on what disorders should be classified as mental disorders. Some systems use a small number of categories whereas other systems use many categories to diagnose mental disorders. The differences in these systems lies in the primary objective of the diagnosis which may be clinical, research or statistical. The development of the DMS manual started in the 1800’s with seven categories of mental illness. The manual has changed overtime to the current detailed version of DMS-5. The international classification of diseases has a section on mental disorders that indicates the criteria.

There has been a tremendous improvement in the diagnosis of mental disorders over the years. However, the number of people with mental disorders has also dramatically increased over the years. Extensive research in the diagnosis of mental disorders can improve the area number of diagnosis. Research can offer explanations as to why the number of people with mental disorders is on the rise. Medical and mental health professionals believe that a thorough analysis of the social factors is critical to understanding the reasons for this high numbers. The DSM -5 manual is a useful tool; however, it omits a critical factor which is the social determinants of mental disorders.

Ethics as a Component of Organizational Culture

Introduction

Ethics is derived from the word the Greek word Ethos, which means character. Character in an organization is the decisions that employees or management have to make when under pressure especially when no one is looking at them. Character is not about how people behave, but in the context of an organization, it is part of organizational culture. It is a culture developed by a group of people that determines how they deal with problems both externally and internally. These people must adhere to a code of ethics which are standards of behavior that tell people how they ought to act, be they citizens, professionals, parents, family or friends (Bart, 2011).

A fire department has ethical rules which are behavioral guidelines on how all firemen are expected to conduct themselves. Firemen must promote an organizational culture of ethical integrity, high standards of professionalism, compassion, loyalty and honesty. Most fire departments have a code of ethics that includes the ethical rules or ethical conduct, medical code of ethics and an oath. The ethical rules define the Fire department’s values, moral duty and obligation of the firemen.

The following are some of the ethical rules that fire departments follow in their line of duty. Firemen must conduct themselves in a manner that creates respect for themselves as public servants. Fire fighters must always maintain public trust as they always have access to citizens’ homes and possessions while on the call of duty. Firemen are always in contact with the public, and should therefore show respect, courtesy and be impartial at all times. Firemen should not perform their duties while under the influence of alcohol or drugs. Firefighters will be expected to take an oath of service to show their commitment to providing high levels of customer service, and to place the safety and welfare of the public above everything else.

The ethical rules are reflected in the culture of the fire department through the respect of the profession. The citizens of any country hold the Fire department with very high esteem. Firemen are highly respected by the public because of the trust the public has entrusted in the firemen. This in turn leads to professional ethics and morality. The leadership of the fire department also reflects the culture of the department. The Fire Chief must lead by example by making ethical decisions. A fire department that is led by an ethical leader always leads to the success of that department. A fireman may make an ethical decision but fail the loyalty test when asked to do something unethical by the boss. Ethical leaders must ensure that they do not corrupt their legacy and whole organization by ensuring they do the right thing. Firefighters are faced with challenging situations everyday which test their character. Sometimes they must decide between loyalty and ethics, hence the importance of the ethical rules in a fire department (Bart, 2011).

The code of ethics reflects the culture of the fire department, and all members of the Fire services must adhere to it. It is referred to as the minimum standards and outlines the expected behavior and performance of the firefighters. The code of ethics also defines the way the firemen ought to act within the fire department. For example, it states that all firemen must be responsible for the actions and the consequences of the same. They must act in a professional manner exercising respect, competence and loyalty.     They must recognize that they serve due to public trust which requires honesty. The firemen must sign a code of ethics which becomes an acknowledgement of acceptance of their responsibility as firefighters.

The ethical rules of the fire department are not in conflict with my personal ethical rules because the ethical rules for firefighters are based on trust, honesty, integrity and team work. However, personal ethical rules may sometimes come into conflict with professional ethical rules. It is therefore important to understand the difference between personal ethical rules and professional ethical rules. For example, a judge is required to follow the law while exercising judgments on various cases. A judge may give the death penalty while following the law, but this may be in conflict if his personal ethics are against the death penalty. A doctor may prescribe the morning after pill professionally, but personally may be against it as he views it as terminating a life (Dion, 1996).

The easiest way to reduce the conflict between professional and personal ethical rules is that a person must always follow their professional code of ethics when acting in a professional capacity, even though it conflicts their personal ethical rules. In the case of ethical rules of firefighters, their ethical rules are first and foremost based on public trust. The public trust firefighters to come into their homes to save them irrespective of their possessions. Personal ethics are broad in nature, as every human being will want to be treated with respect and therefore will treat others with respect. People value honesty and courtesy on a personal level whether it is among friends or family members. In this respect, the ethical rules in the fire department are not in conflict with personal ethical rules (Dion, 1996).

The ethical rules for the fire departments are reinforced by particular expectations or behaviors reflected in the fire department culture. The ethical rules of the fire department are based on public trust and respect for the profession. The national firefighter code of ethics is a document that was developed for all fire service organizations regardless of size, type or position. It outlines the standards of behavior required of firefighters, and is designed in an effort to maintain the high level of respect the profession wishes to achieve. It is based on the expectations of the fire department. The code of ethics encourages all fire service organizations to support the standards in order to maintain a consistent organizational culture among all fire departments. The national firefighter code of ethics distinguishes the firefighter’s profession from other professions, and at the same time removes any behaviors that might compromise it in future. It is the minimum standards of expected behaviors of firefighters. It acts as a guide for all fire departments towards high levels of ethics and integrity.

In conclusion, the ethical rules in the fire department are reflected in the organizational cultures of all fire service organizations. The national firefighter code of ethics is based on particular expectations and behaviors reflected in the fire department culture. The ethical rules creates a legacy for all fire service organizations and ensure that all firefighters who leave the fire department, leave it in a better condition than they found it. Ethics is a component of organizational culture based on ethical integrity, professionalism, loyalty and honesty.

Multifaceted Assessment: Anne Marie’s Case

Many exceptionalities in children have a high comorbidity, which can make identification and intervention challenging for professionals. This is why, aside from legal and ethical requirements, multifaceted assessment is essential.

Review the following scenario:

Anne Marie is a thirteen-year-old girl who has always struggled socially and behaviorally. Although she has a few friends, she often argues with them, as well as with adults. Despite these challenges, she has always been successful academically, and so a formal evaluation was never conducted. However, Anne Marie’s parents are concerned that her behavior has become more pronounced this year and that she is spending even more time alone. Her parents are not sure if her problems are due to typical development (that is, puberty), a developmental disability such as an autism spectrum disorder, or an emotional disturbance.

Using the module readings, the Argosy University online library resources, and the Internet, research multifaceted assessment.

Incorporate what you learned in your readings and respond to the following:

  • Explain why it might be important to distinguish between typical development, developmental disability, and emotional disturbance for Anne Marie.
  • Evaluate the roles each of the following would play in addressing Anne Marie’s challenges:
    • Individuals with Disabilities Education Act (IDEA) 2004
    • Diagnostic and Statistical Manual of Mental Disorders (DSM)
    • Functional Behavior Assessment (FBA)
  • Identify any other information that might be important when assessing Anne Marie’s difficulties and designing an intervention for her. Discuss why this information would be important and how would you go about obtaining that information?

Write your initial response in 300–500 words. Apply APA standards to citation of sources.

By Saturday, post your response to the appropriate Discussion Area. Through Wednesday review and comment on at least two peers’ responses. Provide a statement of clarification, a point of view with rationale, challenge a point of discussion, or draw a relationship between one or more points of the discussion. The following are some possible discussion points:

  • How might intervention differ depending on whether Anne Marie is experiencing typical development, developmental disability, or emotional disturbance?
  • According to Piaget, Anne Marie is in which likely stage of development? What occurrence, during this stage, is important to consider in the context of an evaluation?

Freudian Construct Vs Rogerian Construct – Assignment Instructions

Consider the eras, life histories, and personalities of Freud and Rogers.

Identify two research articles published in the last 5 years: one that investigates a psychoanalytic or Freudian construct and one that investigates a client-centered, humanistic, or Rogerian construct.

Write a 1,050- to 1,400-word paper about Freud and Rogers that addresses the following:

  • Provide a summary of each article, highlighting the processes that contemporary psychologists use to develop the theories of Freud and Rogers.
  • Explain their views of human nature and their worldviews as expressed in their respective theories.
  • Which aspect of their theory do you think would be different if they were alive and working today?
  • Explain how social and cultural factors influenced the development of Freud’s and Rogers’ respective theories of personality.

Recent examples of expansionary fiscal policy

It probably goes without staying that a macroeconomy or national economy experiences periods of expansion (usually marked by increases in real GDP, employment, and production) and periods of decline  (usually marked by decreases in real GDP, employment, and production).  A prolonged period of decline across a national economy is called a recession.  While some people define a recession as t
http://www.nber.org/cycles/recessions.html

Two of the most intense recessions in the past several generations in the United States were the Great Depression of 1929-1933 and the Great Recession of 2007-2009.  Which recession or depression was the most destructive to the U.S. economy?  Why?

2. WEEK 2 DQ 2 – Recent examples of expansionary fiscal policy

Expansionary fiscal policy is defined as a policy which a government implements which involves an increase in government spending and/or a decrease in taxation levels.  Sometimes a budget deficit might be involved with expansionary fiscal policy.  The goal with expansionary fiscal policy is to stimulate a national economy during times of declining economic activity.

Can you think of any recent examples of expansionary fiscal policy which have been used by the United States government during or since the Great Repression of 2007-2009?  How did these stimulus programs impact the economy?  Where they successful?  Why or why not?

Team Buidling Strategy Plan

 Identification of Various Strategies Available to Build Teams

Various interventions are employed in putting together effectual teams. The first intervention is the setting of appropriate goals, or clarification of goals. It stresses on formulating objectives along with developing team, as well as individual, goals. The intervention ensures that specific team members have clear expectations regarding the goals. In addition, the intervention ensures that that the teams become increasingly action and task-focused.

The second intervention is role clarification, which stresses on heightening team member communication with respect to the roles assigned to particular members. The members enhance their appreciation of their own and colleagues’ roles in making their teams successful. When the intervention is implemented, teams are defined as being constituted by sets of overlying roles. Such roles are defined as the conducts expected of particular team members. Role clarification enhances individual, as well as team, characteristics.

The third intervention is conflict resolution, or problem-solving. Conflict resolution emphasizes the making out the chief problems related to particular tasks within teams. The intervention supports the involvement of team members in planning appropriate actions and solving the problems following their identification (Salas, Diazgranados, Klein, Burke, Stagl, Goodwin & Halpin, 2009). The members formulate goals, grow societal relations, clarify their specific roles, and help enhance organizational attributes via conflict resolution tasks.

The fourth intervention is the management of interpersonal relations. The intervention is widely christened the consequences intervention. It stresses on heightening teamwork competencies like communication and mutual supportiveness. Over time, it ensures that team members attain higher and higher cooperation and trust levels among themselves. However, the intervention compromises daily team activities, possibly occasioning temporary losses. The last intervention entails the celebration of team attainments. The celebrations assist team members bond, increasing the effectiveness of their teams. Even then, the celebrations and the bonding may be injurious to creativity, which is assistive in solving emerging crises.

Challenges/Barriers to Building Teams

Organizations face diverse challenges in their efforts to put together effective teams. First, some organizations are incapable of finding staff members with the capability of working effectually within team settings. Their extant team members lack teamwork as a competency. Second, some organizations face the challenge posed by the heightening necessity to have teams working across organizations and in virtual spaces.

Organizations are faced with the growing need to have their staff in different spaces work together as teams. Such teams are incapable of building strong relations among their members. Third, globalization has made the collaborations between members of particular teams increasingly difficult (Salas, Diazgranados, Klein, Burke, Stagl, Goodwin & Halpin, 2009). The challenge is amplified when taken together with virtual working spaces that do not allow for one-on-one communication.

Determining the Best Strategy

In the Riordan Manufacturing case, the most favorable intervention for putting together a team for producing Cardiac Valve is the one with the potential for heightening team member communication with respect to the roles assigned to particular members. The most favorable intervention is the one with the potential for helping the team’s members enhance their appreciation of their own and colleagues’ roles in making their teams successful. As well, the most favorable intervention is the one with the potential defining the team as constituted by sets of overlying roles. Thus, the most favorable intervention is role clarification, which stresses on heightening team member communication.

Determination of Team Success

The success of the Cardiac Valve-producing team will be evaluated in the light of diverse aspects. The aspects will include changes in the team and its members’ performance, affective, cognitive, and process outcomes. The other aspects will include the team’s responses to negative affects like mistrust.

Explain the benefits of accurately documenting the As-Is process.

Resource: Need for a Lean Initiatives Paper

Create an As-Is Process Flowchart for a process that requires improvement for your selected organization.

Write a 900-word paper in which you describe at least three problem analysis tools that you applied to develop the process flowchart.

Explain the benefits of accurately documenting the As-Is process.

Format your paper consistent with APA guidelines.

DQ Questions 600 words

Does your organization utilize any quality improvement approaches? What benefits could your organization gain from using a mapping technique? How have these improvement techniques been implemented?

In your organization, what types of cycle time efforts have been initiated? Have these improvements impacted your organization’s financial condition? How?

Breach of Contract Example

Walt Shoddy, the owner of Shoddy Shoe Repair, was contemplating retirement. He therefore contracted to sell the business to Pauline Parker. Shoddy Shoe Repair was located in Hoosierburg, Indiana, which has a population of 5,233. Besides containing a provision entitling Parker to use the Shoddy Shoe Repair name for the business, the parties’ contract included a clause that prohibited Shoddy from opening up a competing shoe repair shop in Hoosierburg for a period of one year from the date of the parties’ contract. Two months after the date of the contract (and one and one-half months after the sale of the business to Parker had been completed), Shoddy grew tired of retirement. As shoe repair had been his life’s work, he opened up a shoe repair shop in Hoosierburg. Parker has sued him in an effort to obtain an injunction against his operation of the competing business, alleging a violation of the parties’ contract. How is the court likely to rule? Explain your reasoning.

Assume that you recently graduated and landed a job as a financial planner with Cicero Services, an investment advisory company.

Assume that you recently graduated and landed a job as a financial planner with Cicero Services, an investment advisory company. Your first client recently inherited some assets and has asked you to evaluate them. The client presently owns a bond portfolio with $1 million invested in zero coupon Treasury bonds that mature in 10 years. The client also has $2 million invested in the stock of Blandy, Inc., a company that produces meat-and-potatoes frozen dinners. Blandy’s slogan is “Solid food for shaky times.”

Unfortunately, Congress and the President are engaged in an acrimonious dispute over the budget and the debt ceiling. The outcome of the dispute, which will not be resolved until the end of the year, will have a big impact on interest rates one year from now. Your first task is to determine the risk of the client’s bond portfolio. After consulting with the economists at your firm, you have specified 5 possible scenarios for the resolution of the dispute at the end of the year. For each scenario, you have estimated the probability of the scenario occurring and the impact on interest rates and bond prices if the scenario occurs. Given this information, you have calculated the rate of return on 10-year zero coupon for each scenario. The probabilities and returns are shown further below.

You have also gathered historical returns for the past 10 years for Blandy, Gourmange Corporation (a producer of gourmet specialty foods), and the stock market.

The risk-free rate is 4% and the market risk premium is 5%.

a. What are investment returns? What is the return on an investment that costs $1,000 and is sold after 1 year for $1,060?

b. Graph the probability distribution for the 5 scenarios during the next year for the 10-year zero coupon bonds. What might the graph of the probability distribution look like if there were an infinite number of scenarios (i.e., if it were a continuous distribution and not a discrete distribution)?

c. Use the scenario data to calculate the expected rate of return for the 10-year zero coupon Treasury bonds during the next year.

d. What is stand-alone risk? Use the scenario data to calculate the standard deviation of the bond’s return for the next year.

e. Your client has decided that the risk of the bond portfolio is acceptable and wishes to leave it as it is. Now your client has asked you to use historical returns to estimate the standard deviation of Blandy’s stock returns. (Note: Many analysts use 4 to 5 years of monthly returns to estimate risk and many use 52 weeks of weekly returns; some even use a year or less of daily returns. For the sake of simplicity, use Blandy’s 10 annual returns.)

f. Your client is shocked at how much risk Blandy stock has and would like to reduce the level of risk. You suggest that the client sell 25% of the Blandy stock and create a portfolio with 75% Blandy stock and 25% in the high-risk Gourmange stock. How do you suppose the client will react to replacing some of the Blandy stock with high-risk stock? Show the client what the proposed portfolio return would have been in each of year of the sample. Then calculate the s average return and standard deviation using the portfolio’s annual returns. How does the risk of this two-stock portfolio compare with the risk of the individual stocks if they were held in isolation?

g. Explain correlation to your client. Calculate the estimated correlation between Blandy and Gourmange. Does this explain why the portfolio standard deviation was less than Blandy’s standard deviation?

h. Suppose an investor starts with a portfolio consisting of one randomly selected stock. As more and more randomly selected stocks are added to the portfolio, what happens to the portfolio’s risk?

Bacterial Growth

As a medical research technician, you have been assigned the task of modeling the growth of five different strains of the E. coli bacteria. These bacteria are grown in Petri dishes and exposed to the same environmental conditions (food source, pressure, temperature, light, etc.). Each hour, you count and record the number of bacterial cultures in each of the sample Petri dishes. The results for the first 7 hours of observations are recorded in the chart below:

Bacterial Sample Hour 1 Hour 2 Hour 3 Hour 4 Hour 5 Hour 6 Hour 7
1 16 64 256 1024 4096 16,384 65,536
2 97 291 873 2619 7857 23,571 70,713
3 112 784 5488 38,416 268,912 1,882,384 13,176,688
4 7 63 567 5103 45,927 413,343 3,720,087
5 143 286 572 1144 2288 4576 9152

Directions: Assuming that the growth pattern for each bacterial sample follows a geometric sequence, determine the following:

  1. Determine the rate at which the culture grows in a hour. This rate will be the factor r by which the number of bacterial cultures has increased since the last recorded observation.
  1. Write a formula that represents the growth of this bacteria based upon your observations. Your formula will be based upon the basic format for a geometric sequence:

  1. Using the formula you’ve developed, determine the number of cultures you would expect to see in the Petri dish on the 8th, 10th, and 12th hour of your observations.
  1. Compute the total number of bacterial cultures observed after 24 hours of growth assuming that the growth follows a geometric series.
  1. Repeat steps 1–4 for all five bacterial samples.

In a Microsoft Word document, prepare a report that includes answers to the following:

    1. Report the results of the calculations you performed above.

    1. Which strain of E. coli exhibited the highest growth rate?

    1. Which strain of E. coli exhibited the lowest growth rate?

    1. Assuming that all five of the E. coli strains present a high toxicity danger to humans, which do you suppose would be the most manageable based upon growth? Why?

    1. Consider how you’ve modeled the growth of the E. coli strains using the concept of geometric sequence. Is this a realistic approach to modeling bacterial growth?

    1. What other factors do you think should be considered when modeling the growth of bacteria such as E. coli?

  1. Conduct an Internet search for research on E. coli. Look for information related to growth rate, environmental conditions conducive to growth, methods of controlling growth, etc.

Cyberbullying : An In-Depth Analysis of Cybercrime

In the present world, the interaction of people has improved due to the advancement in technology. People are able to communicate easily irrespective of their distances and location in the world. Computers and mobile phones have provided the avenue for the increased interaction. People as social beings are interacting virtually through social media and other technological tools (Tardanico, 2012). However, people with malicious intentions use the technological tools to bully other people. This is referred to as cyberbullying.

Cyber bullying is a premeditation and malicious antagonistic activity that is demonstrated by a perpetrator towards a victim (Hendricks, 2012). Many young people spend more time texting and on the internet and, therefore, they are culpable to be victimized by their friends and others who have malicious intent and are intent on intimidating and harassing the teens or preteens. The cyber bullies anonymously attack their victims by forging their information on various social sites to cover their tracks.  Bullying in schools has traditionally taken the form of aggression acts that are repetitively perpetrated by students on their fellow students (Kowalski et al., 2014). With the introduction of computers and smart mobile devices, bullying has taken a new turn.  The acts of cyberbullying have led to suicides among many teens who cannot take the stress and pressure associated with being maligned by their peers or anonymous people.  As a result, cyberbullying is a vice that should be stopped completely.

Evolution of Cyberbullying

Cyberbullying has evolved from the use of text to the advanced use of various apps on smartphones that lead to the character assassination of the victims. In the 1990s, more people had cell phones and to some extent, some children owned cell phones especially those in middle and high schools. In 2010, more than three-quarters of the teen populations had phones and 2014 evidenced 78 % of teens owning a cell phone. More teens have access to the internet as compared to the last decade. Computers and other mobile devices have evolved greatly, and more information can be shared on the net than before. Cyberbullying got national attention in 2007 after Megan, who was a teenager from Missouri, was hoaxed and repeatedly attacked online by her reportedly fictitious boyfriend and her friends (Mirsky & Omar, 2015). The perpetrators of the cyberbullying were the mother and sister to a classmate of Megan. Such instances have shown the extent to which society has sunk in terms of cyberbullying. A middle school student that targeted the principle and an algebra teacher reportedly created a website. It had threatening and uncouth statements about them.

The digital age has enabled not only texts to be longer and accessed by many people but also pictures. Some teens have been bullied with pictures that are defamatory and have led to some of the teens committing suicide. Jessica Logan is a teen who committed suicide after nude pictures of her were posted on the internet and were circulated throughout among her fellow students in Cincinnati (Carpenter & Hubbard, 2014). A mother and her child perpetrated the act. Such an act to a teen is rather traumatizing, and she lacked the courage to face the students after the posting of the nude pictures. The cyberbullying incident led to the Jessica Logan Act that seeks to encourage schools to prohibit cyberbullying. The ABC news has highlighted the plight of cyberbullied victims recently by airing a documentary titled Bullied to Death in America’s Schools”. The documentary shows the various sad actions that have led to the deaths of teenagers due to cyber bullying. The documentary pointed to the fact that some 14 teenagers had lost their lives by committing suicide. Cyberbullying is an international problem. It is not simply limited to the North America. Bylluing is characterized by an imbalance of power. Therefore, to tackle bullying effectively several measures that would help in tackling the imbalance of power should be implemented.

People are victims of cyberbullying exhibit certain characteristics. The U.S. Secret Service detailed the characteristics of people who are victims of cybercrime after undertaking extensive investigation. The Secret Service claims that bullying is one of the major factors that make people engage in criminal activities. The shooters who engaged in 12 of the 15 campus shootings in the 1990s had a history of being bullied. Previously, bullying mainly involved intimidation, manipulation, and physical aggressiveness against a weaker individual. It was common in schools. Confiscation of an individual’s lunch money was one of the most common forms of bullying (Peterson, 2012).

However, in the contemporary world, victims of cyberbullying are usually humiliated in public. This makes certain victims of cyberbullying to formulate a plan by committing a stronger negative action against the bully. The campus shootings discussed above may have been motivated by an individual being bullied. In the contemporary world, a rumor can circulate in a school of community within a matter of seconds due to various technological tools. The spread of the information may be so fast that millions of people across the globe may have viewed the information prior to its removal. For instance, some years ago a Freshman from Rutgers University jumped from the George Washington Bridge after his sexual activities with another male student were videotaped and put in the internet. People who put the video may have thought they were simply having fun or bashing the student for engaging in homosexual activities. However, the impact of the activities was severe to both the victim and themselves (Peterson, 2012).

There has been a significant increase in bullying in the U.S. in the last 30 years. This may be linked to the increase in the number of suicides and homicides cases in certain areas. The motive of bullying is usually about something that the victims cannot change. For instance perpetrators of bullying may dislike individuals due to their hair color, sexual orientation, race, ethnicity, and appearance.

There is a significant difference in the physical, psychological, and behavioral characteristics of victimization vary in elementary, middle and high school. Bullying in elementary school usually involves name calling and hitting each other. Students in middle school usually have mobile phones, which the parents have purchased for them. The students may use their phones to engage in cyberbullying. Children in high school have access to various electronic devices. They may use computers for educational programs. They also interact with various websites. As such, limited access to electronic devices in elementary schools make bullying of students be restricted to physical and verbal bullying of other students. Students in middle and high school have access to various electronic devices. Therefore, they may start engaging in cyberbullying (Peterson, 2012).

Technology and Evolution of Cybercrime

Computers had the monopoly of posting more content through emails and social sites in the past, but that has changed drastically. The digital age has brought about portable devices that can be carried around quite easily and used for any one’s convenience. The mobile devices have evolved greatly to incorporate various features like cameras and apps that can instantly post any information on the social media that includes Gmail, Yahoo, Facebook, Twitter among many other which have millions of users (Kowalski et al., 2012). Many apps have access to social media sites, which are linked to the camera, and pictures can be posted instantly without the use of a computer. Also, smartphones have led to a revolution in communication not only in using text messages and calls but also in using pictures taken at a specified time. Therefore, cyberbullying can bring on board many users who know the person and who can post negative comments about him or her. As such, one person can start the cyberbullying while bringing others into it. For example, malicious content can be posted about someone in school and everyone in the school can be able to see the content and even make comments to the victims who as explained above had led to many undesirable actions that have led to death (Schneider et al., 2012). The stressful conditions that occur have often led to suicides or the victim withdrawing him or herself from her peers. Some people may even hack into other accounts and use them in bullying their fellow students without the knowledge of the account user. Various incidences have been reported in social media where unrated content has been posted on their walls that have led to a barrage of unwarranted comments from users of the specific social sites.

The internet and technological tools are suitable for non-violent forms of bullying. Students in a learning institution may be classified into four categories. These include students who are neither bullies nor victims of cyberbullying, students are only victims of cyberbullying, students who are perpetrators of cyberbullying, and students who are both perpetrators and victims of cyberbullying. A significant proportion of students do not have any involvement with cyberbullying. However, students are either victims or perpetrators of cyberbullying are less likely to notify their parents or other adults about cyberbullying. Parents of the above students do not also know the internet activities of the students. People who are high internet users are more likely to be both cyberbullies and victims of cyberbullying than low internet users.

Technology has helped in democratizing bullying since one does not have to physically overpower the victim. One can simply log on, create a fake identity, and start bullying others. Instead of whispering behind the victim, the insults can be posted on social networking sites for everyone to read. Instead of an individual having to silently listen to a phone conversation, the individual can watch incriminating videos of the individual on a computer screen. In addition, instead of a popular clique in school refusing to let a certain student sit with them during lunch, people in the clique may use various technological tools to ensure that the victim is not in anybody’s list.

Despite the fact that a significant number of 14 to 24 year olds acknowledge the fact that digital abuse is a serious problem to people in their age bracket, very few of them believe what they post online can hurt them in the future. In the contemporary world, a significant number of 14 to 24 year olds engage in naked sexting. Sexting refers to sending nude sexually suggesting pictures using a phone or online. Time Magazine ranked sexting as the number one buzz word in 2009 (Stephey, 2009). Females are more likely to send naked pictures of themselves to other people. On the other hand, males are more likely to receive the nude pictures of the females. According to a study undertaken by MTV and AP in 2009, 61% of people who send naked pictures have been pressured by other people to also send them nude pictures. In addition, approximately 20% of people who receive sext messages pass them along to other people (AP-MTV, 2009).

The snowballing effect of sexting may be severe. For instance, an 18 year old Ohio girl committed suicide after her ex-boyfriend shared nude photos that she had sent him to other students. The students distributed it to other people. When the girl reported to authorities in an attempt to stop the distribution of the photos, the harassment of the girl by other students increased. The parents of the girl filed charges against the ex-boyfriend, several classmates, and the school for failing to prevent the harassment.

Legislation Related to Cyberbullying

Despite the fact that cyberbullying does not involve physical contact or audible insults, it may be very traumatizing to the victim. Use of of social media and mobile communications makes the offensive statements be viewed by all friends, family, and acquaintances of the victim. Therefore, the embarrassment and shame make cyberbullying have severe consequences.

Until recently, there were no laws that focused on addressing cyberbullying. However, legislators have not been blind to the significant increase in the number of cyberbullying incidences, which have been highlighted by the media. Some of the instances have resulted in tragic consequences such as suicides and shootings in school. This has led to the passing of laws in some states. However, the laws usually leave the implementation of various measures prescribed in the letter of the law in the hands of school officials. Therefore, in most instances, cyberbullying is treated as a civil case instead of a criminal case. In 2014, 49 of the 50 states had laws on cyberbullying. 20 of the states specifically stated cyberbullying in the laws. In addition, there are very few state policies that address cyberbullying that occurs outside the school. However, there are various laws that enable schools to intervene in instances where cyberbullying occurs outside the school but interrupts leaning in the school (Michelson, 2015).

Currently, there are no federal laws on cyberbullying. However, this does not imply that Congress has not tried to pass legislation on the crime. In 2008, Congress’ attempt to pass the Megan Meier Cyberbullying Prevention Act failed. However, federal civil right laws that prevent discriminatory harassment apply to federally funded schools (Kenley, 2012).

It is difficult to understand state laws on cyberbullying. Most state laws on cyberbullying claim that cyberbullying should be tackled at the school level. They require schools to implement policies that would help in stopping the occurrence of cyberbullying. The state laws acknowledge that it is the authority of schools to discipline students who engage in cyberbullying. As such, there are very few criminal codes that specifically deal with cyberbullying (Kenley, 2012).

Limitations and/or Gaps Related to Legislation on Cyberbullying

Most U.S. states have enacted laws that require schools to create or update their policies to help in tackling cyberbullying. However, schools can only the students who engage in cyberbullying. Certain states allow students to discipline students who engage in cyberbullying if there is evidence to suggest that the cyberbullying interrupts the school environment. However, the laws have various limitations. This is due to the fact that the American criminal justice system is very protective of an individual’s right to freedom of speech. Therefore, courts rarely term cyberbullying as sufficiently disruptive. This implies that in most instances, schools do not have the authority to discipline students who engage in cyberbullying (Michelson, 2015).

Japanese, Canadian and British authorities have various statutes that facilitate the prosecution of children who engage in various criminal activities related to cyberbullying. These include nuisance, communication threats and use of obscene communications. In the U.S. several individuals have been charges in instances where there is severe bullying. However, authorities are usually unable to prosecute the cases. This is due to the fact that criminal statutes for the laws specify the types of contacts that the perpetrator should have with the victim to be prosecuted for the alleged crimes. The laws have added electronic communication in an attempt to tackle this problem (Holt, Bossler & Seigfried-Spellar, 2015).

However, law enforcement agencies can only prosecute people only in severe cases of cyberbullying. Most cases of cyberbullying do not reach the high levels required for them to be termed as criminal harassment or stalking. This is because criminal harassment and stalking require the victims to fear that they would be physically harmed. Therefore, since cyberbullying does not involve physical violence of the victim it is difficult to prosecute the perpetrators (Michelson, 2015).

Cyberbullying may be tackled using two strategies. The internet-real name is one of the strategies that would help in tackling cyberbullying. This requires individuals to provide their identification to the website operation prior to posting comments. Therefore, if there is a lawsuit, the website operation would provide the information to the relevant authorities. Howe, the major limitation of this strategy is that it suppresses free speech and increases the risk of identity theft. Enactment of laws that criminalize cyberbullying would also help in tackling cyberbullying. For instance, after Megan Meier committed suicide due to being bullied online by a mother of one of her former friends, several towns and cities in Missouri enacted laws that addresses cyberbullying in response to the suicide. However, the laws simply implied that the victims of cyberbullying and their families have limited legal rights to prevent cyberbullying (Holt, Bossler & Seigfried-Spellar, 2015).

Penalties for Engaging in Cyberbullying in California

California defines cyberbullying as any form of harassment, intimidation, or annoyance of an individual through electronic means. It is a crime under certain instances. According to the California law, there are two types of online or electronic conduct that are classified as criminal. These include posting personal information to cause feat and use of electronic devices to harass. According to the California law, any person who posts or transmits information on the personal identification data of another individual or a harassing message on another individual to case unreasonable fear for the safety of the individual or his or her family is committing a misdemeanor. The California penal codes 422, 653.2, and 653m prescribe the punishment that the perpetrator should be subjected to. The penal codes also detail the punishment for an individual who uses obscene language or threatens to injure an individual or the property of another individual (Michelson, 2015).

As such, California classifies both forms of cyberbullying as misdemeanor. An individual convicted of misdemeanor in California faces a punishment of imprisonment for a maximum period of one year, a maximum fine of $1,000 or both. California Assembly Bill 86 gives schools also have a right to suspend a student or recommend the expulsion of a student who engages in cyberbullying in California (Michelson, 2015).

Degree to Which the Penalties Are Adequate For Penalizing the Offender

The penalties on cyberbullying are not adequate in penalizing the offender. They require the involvement of schools. Schools can only suspend or expel students who engage in cyberbullying. This is despite the fact that cyberbullying may have severe consequences on the victim. The Megan Meier case highlights the severe consequences of cyberbullying. Simply suspending or expelling a student who engages in cyberbullying would is not a sufficient penalty is the consequences of cyberbullying on the victim are severe. It is also wrong for the criminal justice system to classify cyberbullying as a misdemeanor that attracts a punishment of a fine of not more than $1,000, a jail term of not more than one year, or both. The life of an individual who commits suicide due to cyberbullying is not worth a mere $1,000 if it is possible to quantify it in monetary terms.

Challenges Law Enforcement Face in Their Efforts to Prevent and Address Cyberbullying

The internet enables people in different locations to communicate as if they were net to each other. As such when one of the parties engages in a crime it would be difficult for law enforcement agencies to prosecute the individual to jurisdictional issues. Jurisdictional issues are some of the major challenges that law enforcement agencies face in their efforts to tackle cyberbullying. An act that is illegal in one state may not be illegal in another state. Living in a location where the activity is not even a crime complicates the issues. Law enforcement agencies can only arrest people who are within their jurisdiction. For instance, a police officer in California does not have the authority to arrest an individual in Texas. In addition, the FBI does not have the authority to arrest an individual in Italy (Kowalski, Limber & Agatston, 2012).

Law enforcement agencies also have different job responsibilities, missions, and cultures that provide different expectations on the definition of cyberbullying, how to prevent it, and the most appropriate responses to bullying. Schools and law enforcement agencies have different laws that control their operations. For instance, law enforcement agencies ensure that people uphold the law whereas schools have a school code of rules. This poses a huge challenge since schools play a critical role in addressing cyberbullying. Therefore, it is vital for schools and law enforcement agencies to have agreements that detail the measures both school personnel and law enforcement agencies should take to tackle law enforcement agencies (Kowalski, Limber & Agatston, 2012).

People engage in cyberbullying anonymously. Screen names and fake e-mail accounts block the identity of the bully. This makes it difficult for law enforcement agencies, the bullied individual and schools to determine the identity of the perpetrator (Kowalski, Limber & Agatston, 2012).

Download the full paper on An In-Depth Analysis of Cyberbullying or order a plagiarism free paper on an in-depth analysis of any cybercrime at an affordable price. 

Impact on the Organization

Impact on the Organization

For this assignment consider the following:

Many enterprise-architectural methodologies have come and gone in the last 25 years. Approximately 90% of organizations in the field use one of these four methodologies:

The Zachman Framework for Enterprise Architectures. Although self-described as a framework, it is more accurately defined as a taxonomy.
The Open Group Architectural Framework (TOGAF). Although called a framework, it is more accurately defined as a process.
The Federal Enterprise Architecture. It can be viewed as either an implemented enterprise architecture or a proscriptive methodology for creating an enterprise architecture.
The Gartner Methodology. It can be best described as an enterprise architectural practice.
Take one of these methodologies and provide a breakdown of key points.

Offer an example of a real-world company (using the Web) to show application of the framework.
Provide a clear explanation of how the specific example you are sharing uses the particular model you are discussing.
Remember to provide the Web sources used for the response.

Evaluating Emotional Intelligence and Resonant Leadership

Paper instructions – Evaluating Emotional Intelligence and Resonant Leadership

Kouzes, J., & Posner, B. 2008 The leadership challenge Instruction:Read chapter #1 and the Preface
George, B., & Sims, P. 2007 True North: Discover your authentic leadership. Instruction:Read chapters #1 and #2

Activity Description

Choose an area of domain (my area of domain is education) and describe and evaluate a leader from personal or professional experience. Address the following in your response:
•    Along with the specific situation when this person exhibited resonant leadership. How did the leader “…transform values into actions, visions into realities, obstacles into innovations, separateness into solidarity, and risks into rewards” (Kouzes & Posner, 2008, p. xi).
•    How did this person inspire people?
•    How did this person create an overall positive emotional tone that is characterized by hope?
•    How was this person in touch with others’ hearts and minds?
•    How did this person demonstrate compassion and empathy?
•    How was this person in tune with him/herself, others, and the organizational culture?
Length: 6 pages; minimum of 7 scholarly references required.  References cannot be more than 5 years old.

Additional Information:
•    Please do not use Wikipedia as your source of information.
•    The text cited in the bibliography should not be older than 5 years.
•    Please attempted to use the assigned readings as a source of information,

The paper should reflect scholarly writing and current APA standards.
Desired Style:  APA (6th edition)
Spacing:  Double Spaced

Texas-based Vision BanK Savings and Loan

Please discus question below:

Q 1: The Federal Home Loan Bank Board (FHLBB) operated the Federal Savings and Loan Insurance Corporation (FSLIC).The FHLBB’s duties included examining all FSLIC-insured institutions to determine whether they were being operated properly under applicable laws and regulations. As part of an investigation of Texas-based Vision Banc Savings and Loan, the FHLBB became suspicious of a large loan made to Sandsend Financial Consultants, Ltd. Hoping to trace the proceeds of the loan, the FHLBB subpoenaed Sandsend’s financial records from a second bank, West Belt. Sandsend requested a federal district court to void the subpoena. Should the court grant this request? Explain fully.

Q2: Sears, Roebuck & Co. adopted a new advertising program to boost sales of its Lady Kenmore dishwashers. The new ads claimed that these dishwashers “completely eliminated” the need for rinsing dishes before placing them in the dishwasher. The owner’s manuals accompanying the machines, however, recommended pre-rinsing. Interviews with consumers indicated that pre-rinsing was still required for truly clean dishes. In an action against Sears, the Federal Trade Commission (FTC) held that the advertising was misleading. The FTC’s remedial order required that Sears keep records to support all future advertising claims for all “major home appliances” and submit them to the FTC. Sears conceded that its dishwasher advertising was misleading but argued that the remedial order, which covered other appliances as well as Lady Kenmore dishwashers, was overly broad and unfair. Discuss fully whether the FTC’s broad order is legal.

Sears started a new ad program to increase sales of its dishwashers. The ads claim the dishwashers “completely eliminate” the need to rinse dishes. The manuals recommend pre-rinsing. Research showed the dishes also had to be pre-rinsed. The FTC held that the ad was false advertising and required Sears to keep records of all future advertising claims. Sears complained the action was unfair because it was enacted on other appliances. Was it unfair and overly broad?

King’s criteria to Socrates’ decision

Socrates reasons of not escaping when he had a chance do not compel the citizens to abide by the unjust sentence like the one that was levied to him. There was no any possible cause or reason that would make one to willingly face a death sentence. The laws of this kind are so unjust going by the Martin Luther king’s criterion of determining the just and unjust laws, he says that just laws are those that protect people’s lives, people’s liberty as well as their ability to pursue their happiness, this is quite contrary to the ruling in the Socrates’ case, Some people sometimes don’t even agree with the law, but despite this, they go along with the law because it is societal friendly or sometimes just because it is a law. Others also abide by the unjust laws because of their loyalty to the subjects dominating on the law. The king’s criterion outlays the unjust laws as those that do not protect the three fundamentals, i.e. the citizen’s lives, their liberty as well as their ability to pursue their happiness (Levinson, 2007). The unjust laws do not protect the God-given rights.

The kings criterion is therefore of no relevance to the Socrates decision to stay when he had an opportune moment of escaping the death sentence (Levinson, 2007). It is clear from the king’s criterion that the death sentence law was unjust; it was not protecting Socrates’ life, the law did not uplift Socrates personality. There is therefore no way that Socrates reasons could get support from the King’s criterion of determining if laws are just or unjust. Socrates reasons to stay might have been accompanied by some factors blinding him from having a clear insight of what the true picture is regarding his right as a citizen.

 

References

Levinson, P. (2007). The Plot to Save Socrates. New York: Tor Books.

Money and Our Monetary System

The monetary system in any economy facilitates trade and allows people to trade more efficiently, as compared to a barter economy. In the United States, the monetary authority is the Federal Reserve System (also reffered to as the Federal Reserve, or informally, an the “Fed”.)

For this assignment, use the information presented in the textbook and the Fed’s website (http://www.federalreserve.gov/) when addressing the qquestions below.

1. What are the requirements for something to be considered money? Why does the dollar have value?

2. What does the money supply consist of and what are the respective amounts in the total monwy supply for the United States?

3. What are the primary functions of the Fed? What role does the Federal Open Market Committee (FOMC) play in our economy?

4. What role do the financial institutions (commercial banks and other institutions) play in our financial system?

5. What is meant by the term “fractional-reserve banking” in our system? What are the implications for consumers?

6. What are the tools available to the FED for controlling the money supply? Which are used most often? Which are most effective?

7. How does the money multiplier help to determine the effects of monetary policy?

8. What are the pro and cons of using monetary policy, as opposed to the use of fiscal policy, for implementing economic policies and practices?