Your company is planning to implement a team-based approach to designing and creating packaging materials for clients. The purpose is to increase productivity and reduce cost. What training issues should your company address? Name two or three specific suggestions for how they should deal with them. Explain why skills training programs are important for long-term vitality of businesses.

report, address the following questions. Support your responses with materials from this week’s readings.
Your company is planning to implement a team-based approach to designing and creating packaging materials for clients. The purpose is to increase productivity and reduce cost.
What training issues should your company address? Name two or three specific suggestions for how they should deal with them.
Explain why skills training programs are important for long-term vitality of businesses.

Use the Internet and Strayer library to research various techniques that an organization uses to determine if someone has breached its security. Next, examine various techniques that an organization can use to determine whether or not it has been the object of a security attack. Determine which method is the most effective. Provide a rationale for your response.

“Security Mechanisms” Please respond to the following:

Use the Internet and Strayer library to research various techniques that an organization uses to determine if someone has breached its security. Next, examine various techniques that an organization can use to determine whether or not it has been the object of a security attack. Determine which method is the most effective. Provide a rationale for your response.
Use the Internet to research a recent (within the past five [5] years) cyber /security / hacking attack on an organization. Next, examine (1) how the company discovered the attack and (2) the major repercussions of the attack. Recommend the two (2) most appropriate methods to prevent these types of attacks. Provide a rationale for your response.

Identify the various ethical, legal, and safety considerations applicable to your topic of interest. What are two major challenges that you see in protecting patient privacy regarding health care information, and specifically your chosen technology, in today’s health care climate?

Identify the various ethical, legal, and safety considerations applicable to your topic of interest.
What are two major challenges that you see in protecting patient privacy regarding health care information, and specifically your chosen technology, in today’s health care climate?
The paper should include:
3 professional references,
be 3-4 pages long,
contain an introduction and conclusion,
in-text citations,
a cover page, and
a reference page
This paper must follow all proper APA formatting requirements.

Review the Learning Resources this week to identify neurological disorders such as frontal lobe dysfunction and biological disorders such as HPA axis dysfunction, and consider definitions of and conditions for these types of disorders. Select either frontal lobe dysfunction or HPA axis dysfunction to focus on for this Discussion. Define the dysfunction that you selected. Explain how and why the dysfunction that you selected contributes to abnormal and criminal behavior. Explain the forensic psychological implications of the dysfunction that you selected.

To prepare:

Review the Learning Resources this week to identify neurological disorders such as frontal lobe dysfunction and biological disorders such as HPA axis dysfunction, and consider definitions of and conditions for these types of disorders.
Select either frontal lobe dysfunction or HPA axis dysfunction to focus on for this Discussion.
Define the dysfunction that you selected.
Explain how and why the dysfunction that you selected contributes to abnormal and criminal behavior.
Explain the forensic psychological implications of the dysfunction that you selected.

 
Post the following:

Define the dysfunction that you selected.
Explain how and why the dysfunction that you selected contributes to abnormal and criminal behavior.
Explain the forensic psychological implications of the dysfunction that you selected.

Note: Your posts should be substantial supported with scholarly evidence from your research and/or the Learning Resources, and properly cited using APA style. Personal anecdotes are acceptable within meaningful responses but cannot stand alone as a response. 

Ethics plays a major role in the auditing process and profession. Discuss the ethical theories that can be utilized to deal with issues that can arise during the audit process. Address the following topics: Explain how you could establish a framework using these theories to support an audit.

Ethics plays a major role in the auditing process and profession. Discuss the ethical theories that can be utilized to deal with issues that can arise during the audit process. Address the following topics:
Explain how you could establish a framework using these theories to support an audit.
Highlight the key principles of the American Institute of CPAs (AICPA’s) Rules of Conduct.
Compare and contrast their rules against the rules used in international audits under the International Ethics Standards Board for Accountants (IESBA).
What does independence mean in an auditing context?
Compare and contrast in fact and in appearance, and illustrate their differences.

Have you had an experience when evidence-based research had a significant impact on the quality of your patient care that resulted in policy making? Please discuss and state the issue and policy.

W1 Assignment 2 Discussion
 
To support your work, use your course and text readings and articles from the South University Online Library. As in all assignments, cite your sources in your work and provide references for the citations in APA format.
Nursing Research
Using the South University Online Library, mine information about nursing research.
Based on your research, respond to one of the following discussion questions.
Discussion Question 1

Is research used in your facility? If so, what type of research and how is this different than other nursing roles? Find out if there is a research committee at your facility. Is research an important component of clinical practice?

Discussion Question 2

Have you had an experience when evidence-based research had a significant impact on the quality of your patient care that resulted in policy making? Please discuss and state the issue and policy.

 textbook, Nursing Research: Reading, Using, and Creating Evidence:

Explain strategies for managing human and financial resources to promote organizational health. Identify how poor collaboration can result in inefficient management of human and financial resources supported by evidence from the literature.

 
Competency 1: Explain strategies for managing human and financial resources to promote organizational health.
Identify how poor collaboration can result in inefficient management of human and financial resources supported by evidence from the literature.
Competency 2: Explain how interdisciplinary collaboration can be used to achieve desired patient and systems outcomes.
Reflect on an interdisciplinary collaboration experience noting ways in which it was successful and unsuccessful in achieving desired outcomes.
Identify best-practice interdisciplinary collaboration strategies to help a team to achieve its goals and work more effectively together.
Competency 4: Explain how change management theories and leadership strategies can enable interdisciplinary teams to achieve specific organizational goals.
Identify best-practice leadership strategies from the literature, which would improve an interdisciplinary team’s ability to achieve its goals.
Competency 5: Apply professional, scholarly, evidence-based communication strategies to impact patient, interdisciplinary team, and systems outcomes.
Communicate via video with clear sound and light.
The full reference list is from relevant and evidence-based (published within 5 years) sources, exhibiting nearly flawless adherence to APA format.
 
Using Kaltura, record a video (5–10 minutes) where you reflect on an interprofessional collaboration experience, proposing recommendations for how to improve interprofessional collaboration that can be shared with leadership and colleagues. Support these recommendations with references to the literature.
The interprofessional project that you reflect on may be one that you collaborated on at your current or former place of practice, or you may choose to imagine you collaborated on the interprofessional project presented in the Assessment 01 Supplement: Collaboration and Leadership Reflection Video [PDF] Download Assessment 01 Supplement: Collaboration and Leadership Reflection Video [PDF]resource and reflect on that.
Be sure that your assessment addresses the following criteria. Please study the scoring guide carefully so you will know what is needed for a distinguished score:
Reflect on an interdisciplinary collaboration experience, noting ways in which it was successful and unsuccessful in achieving desired outcomes.
Explain aspects of the collaboration that helped the team make progress toward relevant goals or outcomes.
Explain aspects of the collaboration that could have been improved.
Identify how poor collaboration can result in inefficient management of human and financial resources, citing supporting evidence from the literature.
Discuss the ways in which the interdisciplinary team did not collaborate effectively.
Discuss the negative implications for the human and financial resources of the interdisciplinary team and the organization as a whole.
Cite the literature for support.
Identify best-practice leadership strategies from the literature that would improve an interdisciplinary team’s ability to achieve its goals, citing at least one author from the literature.
Identify at least one leadership best practice or strategy that you believe would improve the team’s ability to achieve their goals.
Identify the strategy and its source or author and provide a brief rationale for your choice of strategy.
Cite the literature for support.
Identify best-practice interdisciplinary collaboration strategies to help a team achieve its goals and work together, citing the work of at least one author.
Identify at least one best practice or strategy for interdisciplinary collaboration to help the team achieve its goals and work more effectively together.
Identify the strategy, its source, and reasons why you think it will be effective.
Communicate in a professional manner, is easily audible, and uses proper grammar. Format reference list in current APA style.
Submit an APA-formatted reference list for any sources that you cited specifically in your video or used to inform your presentation.
The Example Kaltura Reflection will show you how to cite scholarly sources in the context of an oral presentation.
Notes:
Refer to the Campus tutorial Using Kaltura [PDF] as needed to record and upload your reflection.
If you require the use of assistive technology or alternative communication methods to participate in this activity, please contact DisabilityServices@Capella.edu to request accommodations.
If, for some reason, you are unable to record a video, please contact your faculty member as soon as possible to explore options for completing the assessment.
 
References: Cite at least 3 professional or scholarly sources of evidence to support the assertions you make in your video. Include additional properly cited references as necessary to support your statements.
APA Reference Page: Submit a correctly formatted APA reference page that shows all the sources you used to create and deliver your video.
You may wish to refer to the Campus APA Module for more information on applying APA style.
Portfolio Prompt: Remember to save the final assessment to your ePortfolio so that you may refer to it as you complete the final Capstone course.
 
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and scoring guide criteria:
Competency 1: Explain strategies for managing human and financial resources to promote organizational health.
Identify ways poor collaboration can result in inefficient management of human and financial resources, supported by evidence from the literature.
Competency 2: Explain how interdisciplinary collaboration can be used to achieve desired patient and systems outcomes.
Reflect on an interdisciplinary collaboration experience, noting ways in which it was successful and unsuccessful in achieving desired outcomes.
Identify best-practice interdisciplinary collaboration strategies to help a team to achieve its goals and work together more effectively.
Competency 4: Explain how change management theories and leadership strategies can enable interdisciplinary teams to achieve specific organizational goals.
Identify best-practice leadership strategies from the literature that would improve an interdisciplinary team’s ability to achieve its goals.
Competency 5: Apply professional, scholarly, evidence-based communication strategies to impact patient, interdisciplinary team, and systems outcomes.
Communicate via video with clear sound and light.
The full reference list is from relevant and evidence-based (published within 5 years) sources, exhibiting nearly flawless adherence to APA format.

Define the sociological concept/term Provide a visual representation (a picture) of that concept/term Write a brief write-up tying the concept and the picture together. The write-up should explain how and why your visual “clipping” represents the sociological concept. The length of the write-up should be at least a paragraph (at least 5 lines).      

Concept: REMARRIAGE
Sub titles ( might be helpfull when you write)
    Four out of five people who divorce remarry, most within four years
    The divorce rate for first marriage is 41%
    The divorce rate for second marriage is 60%
    The divorce rate for third marriage is 73%
 
    Remarriage often creates blended families
 
FORMAT

Define the sociological concept/term
Provide a visual representation (a picture) of that concept/term
Write a brief write-up tying the concept and the picture together. The write-up should explain how and why your visual “clipping” represents the sociological concept. The length of the write-up should be at least a paragraph (at least 5 lines).

 
 
 

At present, the research question is good, but there is no detail in the proposal that really addresses who you will answer that question. What economic models are you attempting to demonstrate the presence of, or transformation from one economic system to another? What data will you use, specifically. It is not enough to say, coins, glass, pottery, and metalwork will answer the question. They have not done so for other scholars to date – why is that?

Here’s my professors’ comments, and attached with more in article comments.
At present, the research question is good, but there is no detail in the proposal that really addresses who you will answer that question. What economic models are you attempting to demonstrate the presence of, or transformation from one economic system to another? What data will you use, specifically. It is not enough to say, coins, glass, pottery, and metalwork will answer the question. They have not done so for other scholars to date – why is that? Is it that there is too little data? Is it that they have not considered the problem with an economic perspective? Have previous scholars focussed on too narrow or limited a range of data?
I would also note there is not specification of the chronological range of your proposed research. That is really important, as it specifying the geographical parameters. Hadrian’s Wall is a well defined area, but the kingdom of Northumbria is much larger and varies in size depending on what date you are talking about.
The other aspect that is still absent, is a demonstration that you have a good command of the underlying conceptual issues. For example, while the research context talks a bit about Hadrian’s Wall and late Roman material culture, there is no mention of the kingdom of Northumbria or its origins. To support your research question, you also need an argument or link that connects the late Roman garrison of Hadrian’s Wall to the kingdom of Northumbria. At present, they are two separately floating concepts. Similarly, you do not really talk much about economics or economic impacts until your methodology section. The current state of research and understanding of economics for Hadrian’s Wall and Northumbria need to be addressed in the Research Context section.
As I think I’ve tried to explain previously, the Research Context section should be a succinct and very critical review of the current state of research as it relates to your research question. It should not be general, but quite specific. What are understood/argued at present, and on what basis. What is the problem with that current knowledge/state of research? For example, at present, very few scholars credit the late Roman frontier or army of Central Britain as having any impact or effect on the formation of Northumbria (I am the exception in this regard), with a more typical view divorcing any Roman cultural impact/significance on early Northumbrian culture (e.g. Rollason and Halsall); even Christianity as seen as something taken up by Northumbrian royalty from outside influences (e.g. Oswald and Dal Riata/Iona). Why is this view problematic? How will your research challenge this view? How will your view be unique/different and advance scholarship?
Having established a good critique of current research, Methods allows you to specify which sites and datasets you will make use of. What theoretical and or conceptual frameworks will you apply to enhance interpretation. What specific methods in GIS or statistical analysis will be used with your data? What is the timeline for your overall research project?
Given that your research question names economic impacts or contributions, your Research Context needs to critique current research from this perspective, and your Methods should also demonstrate how your data will conform to economic analysis and modelling.

Identify which law or laws would have required OPM to report their breach, and the steps the organization needs to take to report the issues.

Overview
A major security breach that happened within the federal government is the Office of Personnel Management (OPM) data breach, which exposed a large amount of personally identifiable information (PII) of federal and state employees. The effects of this breach are still being explored, and the full extent is still not known. This breach has become an important learning experience. Examining laws that suggest controls to minimize the possibility of data breaches is a crucial part of developing an adversarial mindset and will help with future instances of data breaches. There are numerous articles and research papers on the OPM breach, but the article provided in the prompt explores the breach from the employee perspective and discusses the steps that could have been used to help minimize the possibility of a data breach.
The critical controls defined by the Center for Internet Security (CIS) are used as guidelines for processes that a company can incorporate for data security. The controls are used to determine compliance to a standard put forth by the organization. They are meant to be used as an adaptive tool that will allow an organization to evaluate compliance to a known risk-mitigation level.
You have been preparing for this assignment by summarizing privacy laws and determining who is responsible for ensuring compliance to the law within an organization. It is important that you complete this assignment in your own words. Express your own ideas on how the laws and controls can be applied to this breach. It is the responsibility of a security analyst to be able to explain breaches and the controls used to mitigate issues.
Listed below are the privacy laws you are familiar with and the critical controls you will be learning about to help you complete this activity.
Privacy Laws
Americans With Disabilities Act, Section 508
Cable Communications Policy Act (1984)
Census Confidentiality Act
Children’s Internet Protection Act (CIPA)
Children’s Online Privacy Protection Act (COPPA)
Computer Security Act
Driver’s Privacy Protection Act (1994)
E-Government Act (2002)
Electronic Communications Privacy Act (1986)
Federal Information Security Management Act (FISMA)
Freedom of Information Act (1966)
Gramm-Leach-Bliley Act
Health Insurance Portability and Accountability Act (HIPAA)
Health Information Technology for Economic and Clinical Health (HITECH) Act
Mail Privacy Statute (1971)
Payment Card Industry Standards
Privacy Act (1974)
Red Flags Rule
Sarbanes-Oxley Act
State Data Breach Notification Laws
U.S. Constitution
USA Patriot Act
Wiretap Act (1968, Amended)
CIS Controls
Inventory and Control of Hardware Assets
Inventory and Control of Software Assets
Continuous Vulnerability Management
Controlled Use of Administrative Privileges
Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Maintenance, Monitoring, and Analysis of Audit Logs
Email and Web Browser Protections
Malware Defenses
Limitation and Control of Network Ports, Protocols, and Services
Data Recovery Capabilities
Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches
Boundary Defense
Data Protection
Controlled Access Based on the Need to Know
Wireless Access Control
Account Monitoring and Control
Implement a Security Awareness and Training Program
Application Software Security
Incident Response and Management
Penetration Tests and Red Team Exercises
Prompt
Before you begin working on this assignment, read the article Inside the Cyberattack That Shocked the US Government and review the CIS Controls website. Then address the following:
Briefly summarize (in one to two paragraphs) the major issues with the OPM breach and how it occurred.
Select two of the privacy laws provided above and describe how they relate to the OPM breach.
Determine to what extent jurisdiction plays a role in the application of your selected laws.
Identify which law or laws would have required OPM to report their breach, and the steps the organization needs to take to report the issues.
Select four of the CIS controls provided above that could have been monitored to help minimize the possibility of the breach. Explain why monitoring these controls would have helped minimize the breach.