Journal Reflection #3 (Cahper 5-7)
What are some of the specific risks and challenges of single parents? How do these challenges differ between adolescent parents, divorced parents, and parents who are single by choice? What are some of the protective factors that can help mitigate these challenges?
Author: admin
-
Title: Navigating the Challenges of Single Parenting: A Reflection on Cahper 5-7
-
“Improving Performance Management, Retention, and Market Equity: A Case Study of Deloitte, Shek Inc., and Zenyah”
Case Discussion Questions 1
Which aspects of Deloitte’s new performance management system do you find most radical?
If you were a manager at Deloitte, how would you have reacted to such a system? Would your answer change if you were an employee?
What are your thoughts regarding measuring performance with four simple questions? Do you think these are the right questions? How would you know if a particular question is effective?
How would you motivate managers to conduct frequent check-in meetings with employees? How would you counter the argument that these meetings take a lot of time?
How transparent is this system? Do you think Deloitte’s decision not to share individual ratings with employees is warranted?
Click to learn more …
Read the Deloitte University Press report titled “Performance Management Is Broken: Replace ‘Rank and Yank’ With Coaching and Development.”
https://dupress.deloitte.com/dup-us-en/focus/human-capital-trends/2014/hc-trends-2014-performance-management.html
Case Discussion Questions 2
Exercise 10.2: Creating a Retention Management System
You are working at Shek, Inc., an organization providing private and group surfing and scuba diving lessons, adventure tours, and rental services to tourists in Hawaii. Your company has around 200 employees consisting of instructors, sales, marketing, and office personnel. The company has an annual turnover rate of 80%, which you suspect is too high.
Questions
How would you assess why employees are leaving? After you choose your method of measurement (survey, interviews), develop questions to include in your instrument. How would you analyze the data to identify the top reasons for employee departures?
Let’s assume that you found out the following top three reasons for turnover in this company:
Management is very authoritarian and not supportive of employees.
Employee schedules vary a lot and often are announced with very short notice.
Employees feel they are working all the time with little downtime.
Case Discussion Questions 3
Exercise 11.2: Conducting a Market Review
A video game company named Zenyah with 8,000 employees recently hired your consulting firm to develop a more externally equitable pay structure. Zenyah began as a start-up 10 years ago and has grown very rapidly ever since. Lately, the company has been having difficulty recruiting and selecting talented candidates for key software development, marketing, and sales jobs, which is likely due to the external labor shortage for individuals qualified for those jobs. As such, Zenyah has asked your consulting firm to conduct a market review for the following benchmark jobs:
Computer programmer
Systems software developer
Applications software developer
Market research analyst
Marketing manager
Advertising sales agent
Advertising and promotions manager
Sales representative
As part of the contract, Zenyah has requested that your consulting firm conduct new job analyses on the benchmark jobs, as it suspects that the job descriptions are out of date and inaccurate. As a starting point, you decide to use O*NET (ONETonline.org) to draft initial job description summaries that you can use to compare to the job description summaries that appear in the market review sources.
Questions
Using O*NET, write three- to five-sentence job description summaries for each benchmark job.
Using Salary.com and CareerOneStop.com as free market review sources, gather pay data for as many of the benchmark jobs as you can, and enter the data into a table. Be sure to match the job description summaries you created for Zenyah with the job description summaries in the market review sources to ensure you are making an appropriate comparison. -
Title: Exploring Databases in the Walden Library for Evidence-Based Practice in Psychiatry
Where can you find evidence to inform your thoughts and scholarly writing? Throughout your degree program, you will use research literature to explore ideas, guide your thinking, and gain new insights. As you search the research literature, it is important to use resources that are peer-reviewed and from scholarly journals. You may already have some favorite online resources and databases that you use or have found useful in the past. For this Discussion, you explore databases available through the Walden Library.
Review the information presented in the Learning Resources for using the Walden Library, searching the databases, and evaluating online resources.
Begin searching for a peer-reviewed article that pertains to your practice area and interests you.
Using proper APA formatting, cite the peer-reviewed article you selected that pertains to your practice area (psychiatry) and is of particular interest to you and identify the database that you used to search for the article. Explain any difficulties you experienced while searching for this article. Would this database be useful to your colleagues? Explain why or why not. Would you recommend this database? Explain why or why not. -
“Social Engineering: Types, Examples, and Prevention Strategies”
Module 3 Discussion Board 2 Week 5 Initial Post Due 6/9
For this module discussion, you are to post an initial response to the topic below of 350-500 words and 1 reply to another student adding new value to the discussion (125-175 words). Initial posts are to be substantive based on reading and research. Posts are to be unique for each student – not a repeat or paraphrase of what has already been stated. The initial post is due by end of day the Sunday following the chat session.. Reply posts to other students are due the following Sunday. Each module is approximately 2 weeks. 2 posts total during each 2-week period for this discussion.
Social engineering is a challenge for companies to control when confidential information is shared. What are 3 types of social engineering and describe 2 examples of how this can occur? What can companies do to prevent this from happening?
Reply to Samuel – 150 words
Samuel
Jun 10 8:29pm
Manage Discussion by Samuel
Reply from Samuel
Criminals rely a lot on these techniques called Social Engineering also named “Human Hacking” in where they manipulate people to access, share or send information that they shouldn’t to obtain private personal data or extract it from an organization. From stealing personal data to use a credit card to use an employee personal data to create a dangerous virus within a company are some of the techniques these cyber -criminals use. They use victims’ emotions to persuade them to act against their own.
A widely known social engineering technique used is Phishing, where criminals produce links, webpages or messages to make it look like they are of legit precedence. They also try to manipulate the victim to share information to a supposedly trusted entity.
With the social media boom, Angler Phishing has got the attention of cybersecurities organizations and is one of the most common cyber-attacks that harm peoples identities. Angler Phishing is when criminals pretendent to be working for a company as a customer service representative using social media platforms and making the victim share their personal data, often through a phone call.
An example of this would be a customer complaining on Twitter about a delivery of a specific product from a store. The scammer would pretend to be a customer representative working for that store and offer apologies. Once it has engaged with the customer, it would create a fake reward link and obtain personal information.
Another very famous and dangerous social engineering form used by criminals is the “Water Hole Atack” called like that referring to the wild, when a predator waits for their prey near a watering hole. In these cybersecurity assaults, criminals lure people to access a webpage they would normally use to persuade them to access a malicious link to infect the software with ransomware.
For instance, if a group of cybercriminals determine that a company employee is using a news webpage on a daily basis, they would attempt to infect that webpage with damaged code, hoping the target would access it.
These types of attacks are very difficult to prevent due to the nature of the problem. The criminals intend to affect the human mind instead of machines’ actions. What companies can do to prevent these attacks is to create awareness in it employees, possibly through training to help them understand the possible damage in which they can incur. Cybersecurity technologies always are very popular to help mitigate a possible attack, like double authentication to access private data and spam filters to help catch malicious link before it reach the victim. -
Title: Community Assessment Report: A Comprehensive Analysis of [Community Name] Introduction: The purpose of this community assessment report is to provide a comprehensive analysis of [Community Name] using an assets-based approach. This report will examine the social, economic,
**BOOK: Community and Public Health Nursing: Evidence for Practice 4th Edition by Demarco.**
Read the Community Assessment Instructions and Grading Rubric provided below. Pay close attention to the Epidemiologic Model (pp. 233-238) and Community Assessment Assets-Based Approach (pp. 241-242) of your textbook.
Prompts:
*Please follow the guidelines and rubric attached*
Write a formal report and submit it on this site. This should be written as a paper, not as a Q&A based on questions or rubric sections. Create a visual image in your reader’s mind of the community you are describing. Please use the sections of the rubric AS HEADINGS for your paper – attached is a sample formatted paper for your use.
Please use the sample format for the paper. -
“Analyzing Sample Test Statistics: Determining Reliability and Effectiveness of Assessments in Nursing Education”
Data from assessments can be used to determine if learners are meeting course outcomes or learning objectives. Assessments can be utilized in many ways, such as learner practice, learner self-assessment, determining readiness, determining grades, etc. The purpose of this assignment is to analyze sample test statistics to determine if learning has taken place.
To address the questions below in this essay assignment, you will need to use the information from your textbook chapter readings and the data provided in Table 11.1 (“Sample Test Statistics”) in Chapter 11 of The Nurse Educator’s Guide to Assessing Learning Outcomes.
In a 1,000-1,250-word essay, respond to the following questions:
Explain what reliability is and whether this test is reliable based on the information in Table 11.1 (“Sample Test Statistics”). What evidence supports your answer?
What is the range for this sample? What information does the range provide and why is it important?
What is the difference between standard deviation and standard error of measurement? How would the instructor use this information?
Explain the process of analyzing individual items once an instructor has analyzed basic concepts of measurement. Consider the three Ds (difficulty, discrimination, and distractors) in your response.
If one of the questions on the exam had a p value of 0.100, would it be a best practice to eliminate the item? Justify your answer.
If one of the questions on the exam has a negative PBI for the correct option and one or more of the distractors have a positive PBI, what information does this give the instructor? How would you recommend that the instructor adjust this item?
You are required to cite two or three sources to complete this assignment. Sources must be published within the last 5 years and appropriate for the assignment criteria and nursing content.
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Succe -
Title: Efficacy of Treatment Strategies for a Client with PTSD: Integrating Classic and Contemporary Psychology Theories
Take your case report from PSY 622 develop part VII of the final project:
Discuss the efficacy of treatment strategies appropriate for this particular client. How do classic and contemporary psychology theories support these conclusions?
Make sure this section of your assessment reflects the most current in clinical practices. You will also want to take into account ethical practices and the roles that may be taken by any individuals involved in the treatments. Remember to consider who hired you (the law firm in the final project) and, therefore, to whom you are responsible to disclose information.
I have attached the rubric, the scenario, the case report from 622, and the previous two milestones that goes along with this one. -
“Exploring the Impact of Social Media on Consumer Behavior: A Comprehensive Analysis”
Assessment Task
To complete an original extended dissertation, meeting the required
learning outcomes and word count, in any appropriate academic format.
Candidates may choose to adopt a ‘five chapter’ approach to writing the
dissertation, but it is not compulsory. The five chapters are:
1.
Introduction
2.
Literature
Review
3.
Methodology
4.
Findings
5.
Conclusion. -
Title: The Impact of Culture on Agile and Waterfall Approaches in Project Management
Unit 2 – IP
Assignment Details
Analyze how culture impacts Agile and waterfall approaches. Address the following:
Interpret cultural and organizational environments of the waterfall method.
Interpret cultural and organizational environments of the Agile/Hybrid method.
What role does executive management need to play to shape these environments?
What are some of the corporate principles necessary in these environments? -
“Ethical Dilemmas in Prescription Drug Use for Low-Income Patients: Exploring Care-Based and Rights-Based Solutions” Title: Ethical Dilemmas in Prescription Drug Use for Low-Income Patients: Exploring Care-Based and Rights-Based Solutions
Develop, in detail, a situation in which a health care worker might be confronted with ethical problems related to patients and prescription drug use OR patients in a state of poverty.
Your scenario must be original to you and this assignment. It cannot be from the discussion boards in this class or any other previous forum.
Articulate (and then assess) the ethical solutions that can found using “care” (care-based ethics) and “rights” ethics to those problems.
Assessment must ask if the solutions are flawed, practicable, persuasive, etc.
What health care technology is involved in the situation? What moral guidelines for using that kind of healthcare technology should be used there? Explore such guidelines also using utilitarianism, Kantian deontology, ethical egoism, or social contract ethics.
Say how social technologies such as blogs, crowdfunding, online encyclopedias can be used in either case. What moral guidelines for using that kind of healthcare technology should be used there? Develop such guidelines also using utilitarianism, Kantian deontology, ethical egoism, or social contract ethics.