Economy and Colonialism. Relate what you have read in Chapter 8, of Cultural Anthropology, regarding colonialism and the expansion of capitalism in modern industrial societies to the article, “Marketers Pursue the Shallow Pocketed.” Is the information being discussed in this article another example of colonialism? Why or why not? Identifytwo potential positives and two negatives direct marketing of the poor has on people and their economies. What theory of development is most applicable to the expansion of global markets to poor, low income, and indigenous communities?

Economy and Colonialism. Relate what you have read in Chapter 8, of Cultural Anthropology, regarding colonialism and the expansion of capitalism in modern industrial societies to the article, “Marketers Pursue the Shallow Pocketed.” Is the information being discussed in this article another example of colonialism? Why or why not? Identifytwo potential positives and two negatives direct marketing of the poor has on people and their economies. What theory of development is most applicable to the expansion of global markets to poor, low income, and indigenous communities?
Your initial response should be at least in length. Please support your claims with examples from the text, required material, and/or scholarly articles. Respond to at least two of your classmates’ posts by Day 7.

Six months after the merger described in Change and Culture Case Study I, the new administration initiated a significant reduction in force. A decision was made to redesign patient care delivery. The administration’s first job redesign recommendation was that of auniversal worker. The universal worker would deliver many support services. Aware that this model often failed when implemented in other organizations, your administrator charged you with making redesign work this time. Resource: Week Four article by Peter Senge ·How would you begin the process of job redesign? Do not consider only the universal worker. ·What work processes and performance expectations must be considered once the design is completed?

Six months after the merger described in Change and Culture Case Study I, the new administration initiated a significant reduction in force. A decision was made to redesign patient care delivery. The administration’s first job redesign recommendation was that of auniversal worker. The universal worker would deliver many support services. Aware that this model often failed when implemented in other organizations, your administrator charged you with making redesign work this time.
Resource: Week Four article by Peter Senge
·How would you begin the process of job redesign? Do not consider only the universal worker.
·What work processes and performance expectations must be considered once the design is completed?
·Based on the article by Peter Senge in Week Four, what steps and structures will you put in place to make the organization a true learning organization, and thereby encourage workers and managers to adapt and excel in spite of the changes?
·How can you plan and control the intraorganizational and interorganizational communications that must occur to implement the job design changes?
·How can management ensure individual job satisfaction for this position?
Cite at least five references.
Format your paper consistent with APA guidelines.

Cultural Relativism.Cultural Anthropology gives three distinct meanings of cultural relativism: a moral stance that requires anthropologists to suspend moral and ethical judgments when interacting with a culture different from their own, a methodological strategy that allows the anthropologist to pay specific attention to the uniqueness of a culture, and an epistemological position that cultures are unique and therefore knowledge about different cultures is almost inherently not comparable. (Sec. 1.3). In your forum contribution: a. Discuss what you see as the strengths and weaknesses of each of these three kinds of relativism.

Cultural Relativism.Cultural Anthropology gives three distinct meanings of cultural relativism: a moral stance that requires anthropologists to suspend moral and ethical judgments when interacting with a culture different from their own, a methodological strategy that allows the anthropologist to pay specific attention to the uniqueness of a culture, and an epistemological position that cultures are unique and therefore knowledge about different cultures is almost inherently not comparable. (Sec. 1.3).
In your forum contribution:
a. Discuss what you see as the strengths and weaknesses of each of these three kinds of relativism.
b. Identify one belief or practice in another culture that you find puzzling, strange, or troubling, and then discuss the extent that cultural relativism is a useful approach to understanding and interacting with the people who hold it.
c. Discuss the extent that cultural relativism would be a useful approach to understanding and interacting with people in your own society that did (or do) the same.
d. Explore the extent to which whether one is studying in one’s own country or in another makes a difference in the applicability of cultural relativism to one’s research.
Your initial response should be at least 150 words in length. Build on the ideas and terminology in the text and your own ideas to support your answers. Please support your claims with examples from the text, required and recommended material, and/or scholarly articles. Respond to at least two of your classmates’ posts by Day 7.

Explain strategies for managing human and financial resources to promote organizational health. Identify how poor collaboration can result in inefficient management of human and financial resources supported by evidence from the literature.

 
Competency 1: Explain strategies for managing human and financial resources to promote organizational health.
Identify how poor collaboration can result in inefficient management of human and financial resources supported by evidence from the literature.
Competency 2: Explain how interdisciplinary collaboration can be used to achieve desired patient and systems outcomes.
Reflect on an interdisciplinary collaboration experience noting ways in which it was successful and unsuccessful in achieving desired outcomes.
Identify best-practice interdisciplinary collaboration strategies to help a team to achieve its goals and work more effectively together.
Competency 4: Explain how change management theories and leadership strategies can enable interdisciplinary teams to achieve specific organizational goals.
Identify best-practice leadership strategies from the literature, which would improve an interdisciplinary team’s ability to achieve its goals.
Competency 5: Apply professional, scholarly, evidence-based communication strategies to impact patient, interdisciplinary team, and systems outcomes.
Communicate via video with clear sound and light.
The full reference list is from relevant and evidence-based (published within 5 years) sources, exhibiting nearly flawless adherence to APA format.
 
Using Kaltura, record a video (5–10 minutes) where you reflect on an interprofessional collaboration experience, proposing recommendations for how to improve interprofessional collaboration that can be shared with leadership and colleagues. Support these recommendations with references to the literature.
The interprofessional project that you reflect on may be one that you collaborated on at your current or former place of practice, or you may choose to imagine you collaborated on the interprofessional project presented in the Assessment 01 Supplement: Collaboration and Leadership Reflection Video [PDF] Download Assessment 01 Supplement: Collaboration and Leadership Reflection Video [PDF]resource and reflect on that.
Be sure that your assessment addresses the following criteria. Please study the scoring guide carefully so you will know what is needed for a distinguished score:
Reflect on an interdisciplinary collaboration experience, noting ways in which it was successful and unsuccessful in achieving desired outcomes.
Explain aspects of the collaboration that helped the team make progress toward relevant goals or outcomes.
Explain aspects of the collaboration that could have been improved.
Identify how poor collaboration can result in inefficient management of human and financial resources, citing supporting evidence from the literature.
Discuss the ways in which the interdisciplinary team did not collaborate effectively.
Discuss the negative implications for the human and financial resources of the interdisciplinary team and the organization as a whole.
Cite the literature for support.
Identify best-practice leadership strategies from the literature that would improve an interdisciplinary team’s ability to achieve its goals, citing at least one author from the literature.
Identify at least one leadership best practice or strategy that you believe would improve the team’s ability to achieve their goals.
Identify the strategy and its source or author and provide a brief rationale for your choice of strategy.
Cite the literature for support.
Identify best-practice interdisciplinary collaboration strategies to help a team achieve its goals and work together, citing the work of at least one author.
Identify at least one best practice or strategy for interdisciplinary collaboration to help the team achieve its goals and work more effectively together.
Identify the strategy, its source, and reasons why you think it will be effective.
Communicate in a professional manner, is easily audible, and uses proper grammar. Format reference list in current APA style.
Submit an APA-formatted reference list for any sources that you cited specifically in your video or used to inform your presentation.
The Example Kaltura Reflection will show you how to cite scholarly sources in the context of an oral presentation.
Notes:
Refer to the Campus tutorial Using Kaltura [PDF] as needed to record and upload your reflection.
If you require the use of assistive technology or alternative communication methods to participate in this activity, please contact DisabilityServices@Capella.edu to request accommodations.
If, for some reason, you are unable to record a video, please contact your faculty member as soon as possible to explore options for completing the assessment.
 
References: Cite at least 3 professional or scholarly sources of evidence to support the assertions you make in your video. Include additional properly cited references as necessary to support your statements.
APA Reference Page: Submit a correctly formatted APA reference page that shows all the sources you used to create and deliver your video.
You may wish to refer to the Campus APA Module for more information on applying APA style.
Portfolio Prompt: Remember to save the final assessment to your ePortfolio so that you may refer to it as you complete the final Capstone course.
 
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and scoring guide criteria:
Competency 1: Explain strategies for managing human and financial resources to promote organizational health.
Identify ways poor collaboration can result in inefficient management of human and financial resources, supported by evidence from the literature.
Competency 2: Explain how interdisciplinary collaboration can be used to achieve desired patient and systems outcomes.
Reflect on an interdisciplinary collaboration experience, noting ways in which it was successful and unsuccessful in achieving desired outcomes.
Identify best-practice interdisciplinary collaboration strategies to help a team to achieve its goals and work together more effectively.
Competency 4: Explain how change management theories and leadership strategies can enable interdisciplinary teams to achieve specific organizational goals.
Identify best-practice leadership strategies from the literature that would improve an interdisciplinary team’s ability to achieve its goals.
Competency 5: Apply professional, scholarly, evidence-based communication strategies to impact patient, interdisciplinary team, and systems outcomes.
Communicate via video with clear sound and light.
The full reference list is from relevant and evidence-based (published within 5 years) sources, exhibiting nearly flawless adherence to APA format.

Where do you see Business Intelligence and related technology 5 or 10 years from?  What new technologies are being developed in the computer industry and how can those technologies be utilized for business and process analysis?

This week we examine how Business Intelligence is constantly changing due to new and exciting technology such as improvements in artificial intelligence and automated decision support systems.
Where do you see Business Intelligence and related technology 5 or 10 years from?  What new technologies are being developed in the computer industry and how can those technologies be utilized for business and process analysis?
Write an aper in APA format, using a minimum of 3 peer reviewed sources.  Write about future trends in Business Intelligence and Analytics?  The rubric for this assignment can be viewed when clicking on the assignment link.

At present, the research question is good, but there is no detail in the proposal that really addresses who you will answer that question. What economic models are you attempting to demonstrate the presence of, or transformation from one economic system to another? What data will you use, specifically. It is not enough to say, coins, glass, pottery, and metalwork will answer the question. They have not done so for other scholars to date – why is that?

Here’s my professors’ comments, and attached with more in article comments.
At present, the research question is good, but there is no detail in the proposal that really addresses who you will answer that question. What economic models are you attempting to demonstrate the presence of, or transformation from one economic system to another? What data will you use, specifically. It is not enough to say, coins, glass, pottery, and metalwork will answer the question. They have not done so for other scholars to date – why is that? Is it that there is too little data? Is it that they have not considered the problem with an economic perspective? Have previous scholars focussed on too narrow or limited a range of data?
I would also note there is not specification of the chronological range of your proposed research. That is really important, as it specifying the geographical parameters. Hadrian’s Wall is a well defined area, but the kingdom of Northumbria is much larger and varies in size depending on what date you are talking about.
The other aspect that is still absent, is a demonstration that you have a good command of the underlying conceptual issues. For example, while the research context talks a bit about Hadrian’s Wall and late Roman material culture, there is no mention of the kingdom of Northumbria or its origins. To support your research question, you also need an argument or link that connects the late Roman garrison of Hadrian’s Wall to the kingdom of Northumbria. At present, they are two separately floating concepts. Similarly, you do not really talk much about economics or economic impacts until your methodology section. The current state of research and understanding of economics for Hadrian’s Wall and Northumbria need to be addressed in the Research Context section.
As I think I’ve tried to explain previously, the Research Context section should be a succinct and very critical review of the current state of research as it relates to your research question. It should not be general, but quite specific. What are understood/argued at present, and on what basis. What is the problem with that current knowledge/state of research? For example, at present, very few scholars credit the late Roman frontier or army of Central Britain as having any impact or effect on the formation of Northumbria (I am the exception in this regard), with a more typical view divorcing any Roman cultural impact/significance on early Northumbrian culture (e.g. Rollason and Halsall); even Christianity as seen as something taken up by Northumbrian royalty from outside influences (e.g. Oswald and Dal Riata/Iona). Why is this view problematic? How will your research challenge this view? How will your view be unique/different and advance scholarship?
Having established a good critique of current research, Methods allows you to specify which sites and datasets you will make use of. What theoretical and or conceptual frameworks will you apply to enhance interpretation. What specific methods in GIS or statistical analysis will be used with your data? What is the timeline for your overall research project?
Given that your research question names economic impacts or contributions, your Research Context needs to critique current research from this perspective, and your Methods should also demonstrate how your data will conform to economic analysis and modelling.

Bob noticed his supervisor, a young married man, taking his divorced co-worker Joanna home two nights in succession, and decided something was going on between them. Without any malicious intent, Bob introduced the matter into the local grapevine and, as so often happens, the rumor got out of hand. Is Bob’s behavior unethical?  Why or why not?

Discussion 1Ethics in the Workplace
 
Analyze three of the following ethical scenarios:
 

Lorna is an administrative assistant in the human resources department. Her good friend, Bill, is applying for a job with the company, and she has agreed to serve as a reference for him. Bill approaches her for advice on preparing for the interview. Lorna has the actual interview questions and considers making him a copy of the list so he can adequately prepare. Is this unethical behavior?  Why or why not?

 

Betty is a high-producing, devoted employee who, at her boss’s request, will often volunteer to work overtime in an emergency. One morning, after arriving late to work, she told her boss that she got caught in traffic, when in fact, she overslept. Is making up an excuse for being late to work unethical behavior in Betty’s case? Why or why not?

 

Suzy and Tom work on an assembly line making computer parts. While there are safety protocols in place to prevent workplace injuries, these policies slow down the pace of work. Since employees are paid per computer part that gets assembled, Suzy and Tom decide not to follow the safety procedures so that they can speed up the pace of assembly. Is this unethical behavior? Why or why not?

 

Bob noticed his supervisor, a young married man, taking his divorced co-worker Joanna home two nights in succession, and decided something was going on between them. Without any malicious intent, Bob introduced the matter into the local grapevine and, as so often happens, the rumor got out of hand. Is Bob’s behavior unethical?  Why or why not?

 

Jennie was recently hired to work as a receptionist for the front lobby. As a receptionist, she is responsible for making copies for the associates. Her son Bruce comes in and needs to make some copies for a school project. He brought his own paper and needs 300 copies for his class. If he does not bring the copies with him, he will fail the project. The company copier does not require a security key, nor do they keep track of copies made by departments, so Jennie allows her son make the copies at her work. Is this unethical behavior? Why or why not?

Your initial post should be at least 250 words in length.

Identify the various ethical, legal, and safety considerations applicable to your topic of interest. What are two major challenges that you see in protecting patient privacy regarding health care information, and specifically your chosen technology, in today’s health care climate?

Identify the various ethical, legal, and safety considerations applicable to your topic of interest.
What are two major challenges that you see in protecting patient privacy regarding health care information, and specifically your chosen technology, in today’s health care climate?
The paper should include:
3 professional references,
be 3-4 pages long,
contain an introduction and conclusion,
in-text citations,
a cover page, and
a reference page
This paper must follow all proper APA formatting requirements.

Have you had an experience when evidence-based research had a significant impact on the quality of your patient care that resulted in policy making? Please discuss and state the issue and policy.

W1 Assignment 2 Discussion
 
To support your work, use your course and text readings and articles from the South University Online Library. As in all assignments, cite your sources in your work and provide references for the citations in APA format.
Nursing Research
Using the South University Online Library, mine information about nursing research.
Based on your research, respond to one of the following discussion questions.
Discussion Question 1

Is research used in your facility? If so, what type of research and how is this different than other nursing roles? Find out if there is a research committee at your facility. Is research an important component of clinical practice?

Discussion Question 2

Have you had an experience when evidence-based research had a significant impact on the quality of your patient care that resulted in policy making? Please discuss and state the issue and policy.

 textbook, Nursing Research: Reading, Using, and Creating Evidence:

Identify which law or laws would have required OPM to report their breach, and the steps the organization needs to take to report the issues.

Overview
A major security breach that happened within the federal government is the Office of Personnel Management (OPM) data breach, which exposed a large amount of personally identifiable information (PII) of federal and state employees. The effects of this breach are still being explored, and the full extent is still not known. This breach has become an important learning experience. Examining laws that suggest controls to minimize the possibility of data breaches is a crucial part of developing an adversarial mindset and will help with future instances of data breaches. There are numerous articles and research papers on the OPM breach, but the article provided in the prompt explores the breach from the employee perspective and discusses the steps that could have been used to help minimize the possibility of a data breach.
The critical controls defined by the Center for Internet Security (CIS) are used as guidelines for processes that a company can incorporate for data security. The controls are used to determine compliance to a standard put forth by the organization. They are meant to be used as an adaptive tool that will allow an organization to evaluate compliance to a known risk-mitigation level.
You have been preparing for this assignment by summarizing privacy laws and determining who is responsible for ensuring compliance to the law within an organization. It is important that you complete this assignment in your own words. Express your own ideas on how the laws and controls can be applied to this breach. It is the responsibility of a security analyst to be able to explain breaches and the controls used to mitigate issues.
Listed below are the privacy laws you are familiar with and the critical controls you will be learning about to help you complete this activity.
Privacy Laws
Americans With Disabilities Act, Section 508
Cable Communications Policy Act (1984)
Census Confidentiality Act
Children’s Internet Protection Act (CIPA)
Children’s Online Privacy Protection Act (COPPA)
Computer Security Act
Driver’s Privacy Protection Act (1994)
E-Government Act (2002)
Electronic Communications Privacy Act (1986)
Federal Information Security Management Act (FISMA)
Freedom of Information Act (1966)
Gramm-Leach-Bliley Act
Health Insurance Portability and Accountability Act (HIPAA)
Health Information Technology for Economic and Clinical Health (HITECH) Act
Mail Privacy Statute (1971)
Payment Card Industry Standards
Privacy Act (1974)
Red Flags Rule
Sarbanes-Oxley Act
State Data Breach Notification Laws
U.S. Constitution
USA Patriot Act
Wiretap Act (1968, Amended)
CIS Controls
Inventory and Control of Hardware Assets
Inventory and Control of Software Assets
Continuous Vulnerability Management
Controlled Use of Administrative Privileges
Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers
Maintenance, Monitoring, and Analysis of Audit Logs
Email and Web Browser Protections
Malware Defenses
Limitation and Control of Network Ports, Protocols, and Services
Data Recovery Capabilities
Secure Configuration for Network Devices, such as Firewalls, Routers, and Switches
Boundary Defense
Data Protection
Controlled Access Based on the Need to Know
Wireless Access Control
Account Monitoring and Control
Implement a Security Awareness and Training Program
Application Software Security
Incident Response and Management
Penetration Tests and Red Team Exercises
Prompt
Before you begin working on this assignment, read the article Inside the Cyberattack That Shocked the US Government and review the CIS Controls website. Then address the following:
Briefly summarize (in one to two paragraphs) the major issues with the OPM breach and how it occurred.
Select two of the privacy laws provided above and describe how they relate to the OPM breach.
Determine to what extent jurisdiction plays a role in the application of your selected laws.
Identify which law or laws would have required OPM to report their breach, and the steps the organization needs to take to report the issues.
Select four of the CIS controls provided above that could have been monitored to help minimize the possibility of the breach. Explain why monitoring these controls would have helped minimize the breach.