Management change is my crisis

Berry bug blaster is the company 

https://m.youtube.com/watch?v=-gIpE8kxFPk The video explores how to conduct an effective needs analysis in order to determine what a comprehensive organizational training program should focus on.

Design a communications training program to improve your Virtual Organization’s communication process during your stated crisis.

Assemble your training plan in the format of your choice: a 1,150- to 1,400-word paper, a 15- to 20-slide Microsoft® PowerPoint® presentation with speaker notes, or a 10-to 12-minute video, or another multimedia application of equivalent content.

  • Identify three goals for your training program.
  • What essential communication skills are required in order to effectively communicate during the crisis.
  • List and describe at least three activities that will be used into the training program to reach the training’s three goals.

Incorporate the following components:

  • What is a needs and task analysis? What role would they play in developing a comprehensive training program for your organization.
  • What are some of the organization’s communication obstacles? What challenges do they cause?
  • Explain what research methodologies that would be used to assess the organization’s training needs. Why would they be effective?
  • How would you justify the cost of the training program? What would be the return on the investment (ROI) for the organization?
  • Justify your choice of a training facilitator, internal or external, or both? What are the advantages and disadvantages of your selection?
  • Select and describe the tools that will be used for assessing the training’s effectiveness.
  • Predict the short- (18 months) and long-term (3 years) outcomes of the training program.

Include a minimum of six sources of which four are academic sources. Consider using textbooks/resources that you have used in your degree program. Most textbooks are not academic sources because they are not peer-reviewed.

Format your assignment according to appropriate course-level APA guidelines.

Submit your assignment.

Assignments 1) Post Assessment 2) Case study

1) Assignment 1  ( 2 Pages )

 Post-Assessment:

Mr. Fahad Naseem, and Mr. Ronald Joseph FBI Agent.

 Mr. Fahad Naseem was arrested in connection with the kidnapping and killing of journalist Daniel Pearl and admitted sending ransom e-mails using his Laptop. The laptop and handwritten versions of the e-mails were found in his possession. 

  • On the Contrary-A, Naseem later retracted his confession and the defense attorney asserted that logs from Mr. Naseem’s Internet Service Provider (ISP) indicated that Mr. Naseem’s account was not active and connected to the Internet at the time the e-mails were sent. 
  • On the Contrary-B

Naseem’s defense attorney claimed that the compromised Laptop produced in court had a different serial number from the one that was initially recorded in police records; hence, documentation relating to the computer and evidence in the case was inconsistent. 

  • On the Contrary-C

Documentation presented in court indicated that the Federal Bureau of Investigation (FBI) agent, Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002. In contrast, documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002, and the court denied the appeal, including the following explanation.

  • On the Contrary-D

The lead investigator Mr. Shaikh Naeem recovered the Laptop labeled (connection No. 66) retrieved from the accused, Mr. Fahad Naseem, on November 2, 2002, was provided to Mr. Ronald Joseph, FBI agent, who examined, conducted the forensic investigation, formulated his report, and conveyed evidence to the Consulate General of the United States of America. 

  • The report’s content asserted that the Black Soft Computer came with “Proworld” written on the exterior of the Laptop, and upon opening the case, a Dell Latitude Cpi laptop was discovered. 
  • The Laptop was identified in the report produced by this witness to be of model PPL with Serial number ZH942 located inside the Laptop as an IBM travel star hard driver [sic], confirmed to have been removed from the Laptop.
  • During examination, the label on the hard drive was identified as a system with 4.3 GB storage capacity, and serial number OKLA24302 on the outside of the laptop.  
  • After examining Exhibits, Mushernama who recovered the Laptop asserted that without a doubt whatever, the compromised Laptop is the same equipment that was seized from the accused, Mr. Fahad Naseem on November 2, 2002. 
  • On the Contrary-E

The forensic investigation report confirmed that the same Laptop was recovered on April 2, 2002 by the defense team. Availability of the Laptop at the American Consulate on April 2, 2002 is not unnatural and impossible because Marianne Pearl filed a complaint with the police on April 2, 2002, hours when the case was in the at the hands of the Investigating Agency.

Questions 1. As an Aspirant and Hopeful Digital Forensic Investigator:

1:1. Submit concluding evidence to the public and the court substantiating that Mr. Fahad Naseem is guilty of kidnapping and killing Mr. Daniel Pearl, the journalist.

1:2. Submit concluding evidence to the public and the court demonstrating that Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002, whereas documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002.

1:3. Submit concluding evidence to the public and the court attesting that Mr. Naseem’s Laptop’s availability at the American Consulate on April 2, 2002, is unnatural and unrealistic occurrences. 

Academic Integrity/Plagiarism

At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:

  • Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities.
  • Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations.
  • Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation

Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.

Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The potential penalty for academic dishonesty includes a failing grade on an assignment, a failing grade for the entire course, or charges against the student with the appropriate disciplinary body.

Reference

Casey, E (2011). Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, Elsevier.

2 ) Assignment 2 ( 2 Pages )

Many people think of the Internet as separate from the physical world. This is simply not the case–crime on the Internet is closely tied to crime in the physical world. There are a couple of reasons for this cautionary note. A crime on the Internet usually reflects a crime in the physical world, with human perpetrators. and victims and should be treated with the same gravity. To neglect the very real and direct link between people and the online activities that involve them limits one’s ability to investigate and understand crimes with an online component.

Students think about the impact of auction and check fraud in this modern era of digital shopping. This about how a combination of evidence from the virtual and physical worlds is used to apprehend a criminal.

Case Study

Case Example inspired by a case in (Casey, 2011)

A buyer on Amazon complained to police that he sent payment to a seller but received no merchandise. The seller requested that the buyer also send a cashier’s check for shipping and additional costs. Over a period of weeks, several dozen similar reports were made to the Internet Fraud Complaint Center against the same seller. To hide his identity, the seller used a Gmail account for online communications and several mail drops to receive checks. Logs obtained from Gmail revealed that the seller was accessing the Internet through a subsidiary of AT&T. When served with a subpoena, AT&T disclosed the suspect’s Google account and associated address, credit card, and telephone numbers. Investigators also obtained information from the suspect’s bank with a subpoena to determine that the cashier’s checks from the buyers had been deposited into the suspect’s bank account. A subpoena to Amazon for customer order history and complaints and supporting evidence from each of the buyers helped corroborate direct connections between the suspect and the fraudulent activities. Employees at each mail drop recognized a photograph of the suspect obtained from the Department of Motor Vehicles. A subpoena to the credit card number and a search of real estate property indicated where he conducted most of his fraud. A 3rd company revealed the suspect’s Social Security the suspect’s name turned up an alternate residence the opportunity to uncover crimes in the physical Internet.

Students respond to the following questions related to this case in your Cybertrail_YourLastName.docx document.

Question 1 – Following the Cybertrail

Comment on the interconnectedness of the digital world. To what extent does cyber-criminal have anonymity in their transactions? Be detailed in your response. 

Question 2 – Following the Cybertrail

By what means of your expertise in Digital Forensic Evidence provide a critical forensic investigation approach that will play a key role in protecting consumers in this scenario from digital fraud such as this?

Identifying the Need

Read § 7.5 – Long Reports in Last, et al, Technical Writing Essentials.

For this exercise, decide what situation you want to deal with in your recommendation report. Then write a statement of 150-200 words in which you

  • Identify what the situation is that needs a solution and what your role is in finding that solution. For example, are you an office manager who has been asked by your boss to find a replacement for the office printer? Are you a homeowner who needs a better way to clean your floors? Is your cell phone about to die?
  • Explain why it is important to find the thing (tool, appliance, device, software, etc) that will fill the need. Why is it urgent? Who will suffer if a solution isn’t found, or will benefit if one is? Are there considerations of health, safety, money?
  • Identify and list a range of things that can potentially solve the need. Think in broad terms here and think of things that possibly might work. Don’t be too literal and don’t exclude things that might only be remote possibilities. The goal here is to generate as large a list as possible. Think in terms of types or categories rather than specific brands and models.

multiple regression

The EMMA dataset was previously used to build a simple regression model that predicts “Total customer value” (Y) from “Tenure” (X). . . 

1.Connect to the VCL and run the SAS program, EMMA to output a simple regression analysis. Scroll through the output. What is the simple regression equation?  (This should match your answer from last week)

2.Edit the program code to change the prediction of customer value from a simple regression model to a multiple regression model by using TENURE, AGE, ORDERS as your predictors

3.Note that one of the three predictors is not a statistically significant predictor (How do you determine which one?). 

4.Adjust the model* so that it includes only the two variables that are statistically significant

5.What is the equation of your final multiple regression model with the two predictors? 

6.What is the predicted value for a 25 year old, that has placed 2 orders?   (does not require SAS coding)

7.What is the goodness of fit measure for your model?   Is it a good model?  (explanation does not require SAS coding)

*Helpful hint:  

/*  The SAS code for a multiple regression model to predict Y from several variables has the following form */

proc reg data=edc.emma;

      model Y = variable1 variable2 variable3 variable4 variable5 ;

  run;

NURS 6053 WEEK 3 ASSIGNMENT

 

Assignment: Developing Organizational Policies and Practices

Competing needs arise within any organization as employees seek to meet their targets and leaders seek to meet company goals. As a leader, successful management of these goals requires establishing priorities and allocating resources accordingly.

Within a healthcare setting, the needs of the workforce, resources, and patients are often in conflict. Mandatory overtime, implementation of staffing ratios, use of unlicensed assisting personnel, and employer reductions of education benefits are examples of practices that might lead to conflicting needs in practice.

Leaders can contribute to both the problem and the solution through policies, action, and inaction. In this Assignment, you will further develop the white paper you began work on in Module 1 by addressing competing needs within your organization.

To Prepare:

  • Review the national healthcare issue/stressor you examined in your Assignment for Module 1, and review the analysis of the healthcare issue/stressor you selected.
  • Identify and review two evidence-based scholarly resources that focus on proposed policies/practices to apply to your selected healthcare issue/stressor.
  • Reflect on the feedback you received from your colleagues on your Discussion post regarding competing needs.

The Assignment (4-5 pages):

Developing Organizational Policies and Practices

Add a section to the paper you submitted in Module 1. The new section should address the following:

  • Identify and describe at least two competing needs impacting your selected healthcare issue/stressor.
  • Describe a relevant policy or practice in your organization that may influence your selected healthcare issue/stressor.
  • Critique the policy for ethical considerations, and explain the policy’s strengths and challenges in promoting ethics.
  • Recommend one or more policy or practice changes designed to balance the competing needs of resources, workers, and patients, while addressing any ethical shortcomings of the existing policies. Be specific and provide examples.
  • Cite evidence that informs the healthcare issue/stressor and/or the policies, and provide two scholarly resources in support of your policy or practice recommendations.
  • Due to the nature of this assignment, your instructor may require more than 7 days to provide you with quality feedback.

jorLizwkr

  Reply to this discussion use references

Be sure that the responses to the  Post of peers include 2 peer reviewed references with content that demonstrates critical analysis and synthesis of references used.  

General Healthcare Technology Trends

Technology is becoming more advanced in healthcare and is contributing to improved patient outcomes. Some technology trends that are spreading in my current organization are the Voalte and Rover app on the new mobile smartphones and the Electronic Health Record (EHR). “EHRs are real-time, patient-centered records that make information available instantly and securely to authorized users” (HealthIT, 2019c, para. 1). Having access to patient records digitally saves time and allows all interdisciplinary and intradisciplinary team members authorization to the patient records creating opportunity for adequate patient care and improved patient outcomes. Voalte is an all-inclusive HIPAA-compliant platform that provides an end-to-end communication via direct calling, alarm and alert notifications, and secure text messaging (The Loop, 2020). Rover is an app that joins forces with EPIC an EHR system and allows healthcare workers to record documentation in real time and administer medication at patient bedside (HealthIT, 2019c).

Potential Challenges Associated with These Technology Trends

A big challenge with EHRs would be lack of interoperability. The inefficiency of data sharing can create a challenge for clinicians and patients to access patient information in a timely manner. This challenge leaves clinicians without information they need to make key decisions, follow up with patients, and develop strategies to improve overall outcomes (Bresnick, 2017). As for Voalte and Rover, security issues could be a potential challenge. “More specifically, 91% of medical apps had mishandled and/or weak encryption, putting them at risk of exposing IP and patient data” (Muncaster, 2020, para. 5). Healthcare is a popular place for cyber hackers and unfortunately, 2 out of 5 healthcare organizations are troubled with application security concerns (Muncaster, 2020). 

 Benefits and Risks

Benefits associated with EHRs are enabling quick access to patient records, aid clinicians to more efficiently diagnose patients, reduce medical errors, and provide safer care, enhance privacy and security, and improve productivity and work-life balance (HealthIT, 2019b). However, a breach in security can be a risk to the EHR system because healthcare organizations are a prime source for cyber hackers. A legislation benefit for EHRs is the HITECH ACT which provides the Department of Health and Human Services with the authority to establish programs to improve health care quality, safety, and efficiency through the promotion of health IT like EHRs (HealthIT, 2019a). Benefits of the Voalte platform can reduce miscommunication that the Joint Commission has reported as the top root cause for sentinel events and allow more direct communication via healthcare team members to promote patient safety, improve quality of care, and provide a quiet hospital environment (Miller, 2016).

Technology Trends Will Make an Impact

Technology is advancing daily and will continue to grow and develop. Technology trends in healthcare allow less risk and more reward. Technology and today’s society accommodate one another. This day and age everyone uses social media and mobile devices that contain mobile apps. Voalte and Rover mobile app will impact patient satisfaction, engagement, and health outcomes (Skiba, 2017).

Manipulating One-dimensional Arrays

 

 Allows user to enter numbers into an array of 20 integers. The numbers are inputted in such a way that the array is  kept sorted. The array may or may not be filled up. Include an error message to indicate a full array (e.g., “Cannot  accommodate any more inputs. The array is full.”). 

If the user does not want to continue entering numbers (or if the array is full), segregate the numbers into two (2)  other arrays, which means you will be manipulating three (3) arrays in this program. The second array will contain  all even numbers, while the third array will have all odd numbers. Note that the first array contains the original  sorted data. Also, determine and output the largest and the smallest numbers in each array, the sum, and the average. 

Make use of structured/modular programming. This means that it is expected that you will 

1. make use of parameter passing by value and with reference (using pointers), and 

2. reuse your functions (by calling them again but with different values passed to the parameters) 

I will be adding 3 screenshots (specifications) so that it will be easy to understand it. For anyone helping, it would so grateful, thank you in advance <3 

Japan

 

You will prepare 5 full pages written report on Japan about the selected country’s political, economic, legal, culture, social structure, and religious and ethical systems and what the implications for business each of these have. 

The layout of your country paper should be: 

a. Title page 

The title page should contain only the title of your paper and your byline. Do not include a running head, a page header, or a page number on the title page. Running heads and page headers are not to be used in any part of the paper. However, page numbering is required. Page numbering starts with the first page of the body of the paper and continues through the reference page(s). Page numbers should be placed in the upper right-hand corner of the page (exception: do not put a page number on the first page of the body of the paper). 

b. Introduction 

This section introduces and provides background on the subject of the paper. You may here cite articles from popular press publications (e.g., Business Week, Fortune, Wall Street Journal, The Economist, etc.). These citations may count toward the required ten (5) references from journals and/or books. 

c. Discussion 

This section will need to be further subdivided and clearly labeled into your selected country’s political, economic, legal, culture, social structure, religious and ethical systems and what the implications for business each of these have.  There are to be at least ten (5) references. Your textbook must be referenced. 

d. Conclusions 

This section contains your conclusions drawn from the articles/books you have reviewed about how to do business in this country. 

NO PLAGIARISM!!!!

Half-life calculation

 

Half-Life Calculation

Assignment Instructions

Imagine you are trying to help a colleague understand some basic concepts about psychopharmacology. Write a brief paper to address the following: 

  • Explain the concept of half-life for a drug.
  • Differentiate between half-life and steady state. 
  • Explain the difference between potency and effectiveness of a drug. 
  • Respond to the following scenario:
    • If a drug has a half-life of six hours, how long will it take for the drug to be eliminated from the body after administration of a single dose? Explain how you arrived at that particular cutoff score for complete elimination. Show your calculations on a timeline or graphs to illustrate the changes from 100 percent of the initial dose to your end point for complete elimination.

Additional Requirements

  • Length: 2–3 pages of content plus title, abstract, and reference pages.
  • References: Include at least one current, scholarly reference from a peer-reviewed academic journal or academic book. References should be no older than 5 years.
  • Formatting: Use current APA formatting, including correct in-text citations, proper punctuation, double spacing throughout, proper headings and subheadings, no skipped lines before headings and subheadings, proper paragraph and block indentation, no bolding, and no bullets. You must also use proper APA style to list your references. Refer to APA Style and Format (linked in Resources) for more information.
  • Avoid stigmatizing language.

Grant writing week 8 diss

 

What happens once a proposal is submitted? How are funded proposals selected?

Funders apply a variety of strategies to select the proposals they are going to fund, including using scoring matrices, internal review staff, external reviewers, and members of their boards.

Public funders use a different system than private funders. Federal grants, for example, provide scoring criteria and include point values for those criteria. Private funders have greater flexibility and may even require all members of their board of trustees to have conversations about the applications. Their decision-making process may seem more “personal” and could include back-and-forth communication with the applicant.

In preparation for this Discussion, carefully look at any “review process” information included with your RFP and/or funding source information. With this in mind:

By Day 3 of Week 8

Address the following in a Discussion board post:

  • An outline of the review process of the funding source/RFP you selected
  • What criteria are used?
  • What do you see as the benefits and challenges of this review process?
  • How can you use this understanding to better prepare your proposal?

Be sure to support your analysis and conclusions with citations and references in APA format from the Learning Resources and your own research.

References:

 

Gitlin, L. N., & Lyons, K. J. (2014). Successful grant writing: Strategies for health and human service professionals (4th ed.). New York, NY: Springer.

  • Chapter 16, “Learning About Your Institution,” pp. 227–241
  • Chapter 17, “Electronic Considerations,” pp. 243–248
  • Chapter 18, “Understanding the Review Process,” pp. 249–264
  • Chapter 19, “Responding to the Proposal Review,” pp. 265–275