Discuss why you think that public servants should be perceived at a higher level of morals and ethics compared to people in the public sector with whom we do business with every day. Should there be a difference?

Discuss why you think that public servants should be perceived at a higher level of morals and ethics compared to people in the public sector with whom we do business with every day. Should there be a difference?

From the Discussion Preparation, compare and contrast primary individual factors of health demand, elasticity, principle, and agent that influence medical care demand, and explain the significant ways in which each affects the medical care demand curve. Provide at least one example of these factors to support your rationale.

  • From the Discussion Preparation, compare and contrast primary individual factors of health demand, elasticity, principle, and agent that influence medical care demand, and explain the significant ways in which each affects the medical care demand curve. Provide at least one example of these factors to support your rationale.
  • Be sure to respond to at least one of your classmates’ posts

Look for popular press articles that discuss segmenting/targeting/positioning of products/brands.  In your post, summarize the article and then discuss which principle(s) of marketing are illustrated by it.  

Look for popular press articles that discuss segmenting/targeting/positioning of products/brands.  In your post, summarize the article and then discuss which principle(s) of marketing are illustrated by it.  Please include a link to the article. Please see the below Examples for reference.(Please don’t copy paste the same examples).And also give comments to example 1 and example 2.

Tasks to be done:

1) Look for popular press articles that discuss segmenting/targeting/positioning of products/brands.  In your post, summarize the article and then discuss which principle(s) of marketing are illustrated by it.  Please include a link to the article (1-2 paragraphs).

2) Give comments by reading Example 1 and Example 2(1 paragraph each)

Example 1:

I read an article about how Uber is launching a marketing unit/department to target customers. The campaign allows advertisers and marketers to connect with customers at various parts of their journey/stops. For example, when a customer is checking the route they are on, an advertisement will show up. Uber is using segmentation, specifically through geographic distinctions. An advertiser will be able to target a potential customer based on that customers current location and where they are going to. Uber will be able to collect this information about its users and help marketers practice one-to-one marketing. An example of this is a restaurant can specifically target people who are in the vicinity of their restaurant.

https://www.cnn.com/2022/10/19/tech/uber-advertising-division/index.html

Example 2:

As a result of America’s housing market slowing, realtors are finding creative ways to market homes and close deals. Mortgage rates in America are approaching 7%, which is the highest they have been in two decades.

Realtors are working diligently to pitch homes in a way that they will still appeal to potential buyers despite the high mortgage rates. One way they are doing this is by pitching something called a buy-down incentive. In this arrangement, the seller of the home will take care of a portion of the interest rate that the buyer would have been responsible for in the initial years of the mortgage.

Additionally, sellers are using adjustable rate mortgages to encourage selling homes. Adjustable rate mortgages are a type of loan where the interest rate changes depending on where benchmark mortgage rates are currently at.

However, even with these nontraditional mortgage options, some sellers must find other unique ways to continue selling homes during this time. Realtors have come up with creative ways to market homes such as free pilates lessons and craft beer passes.

This article discusses the promotion of a product (the house) through negotiating price by using nontraditional mortgage options and using nontraditional promotions, such as craft beer passes and pilates classes.

https://www.nbcnews.com/business/consumer/buying-house-interest-rates-are-high-realtors-get-creative-rcna53041

Chose an economic issue in health care that is driving change in the industry. For example: pandemic responses, staffing shortages, drug prices, the emergence of pharmacy provided health care, aging population, chronic disease, et cetera. Choose an issue of interest to you.

Chose an economic issue in health care that is driving change in the industry. For example: pandemic responses, staffing shortages, drug prices, the emergence of pharmacy provided health care, aging population, chronic disease, et cetera. Choose an issue of interest to you. An upcoming assignment will require you to delve deeper into the subject.

  • Provide a one-page description of the economic issue and how or why it is driving change in health care.

From the Discussion Preparation, compare the health care-based factors in the issues that you reviewed that, in your opinion, cause the cost curve of health care to shift. In your response, provide at least one example showing the manner in which the cost curve shifts.

ease respond to the following:

  • From the Discussion Preparation, compare the health care-based factors in the issues that you reviewed that, in your opinion, cause the cost curve of health care to shift. In your response, provide at least one example showing the manner in which the cost curve shifts.
  • Be sure to respond to at least one of your classmates’ posts.

Your task is to read King’s “Letter from Birmingham Jail” and participate in discussion.

Your task is to read King’s “Letter from Birmingham Jail” and participate in discussion.

Frederick Douglass’s slave narrative (1845) and King’s “Letter” (1963) are both recognized as examples of effective rhetoric. Effective rhetoric addresses a specific problem/situation by demonstrating a keen awareness of audience in order to achieve its purpose.

Though separated by more than 100 years, Douglass’s and King’s texts make their appeals to remarkably similar White audiences. Think of these similarities as you read King’s text.

(Note: writing conventions, including spelling and punctuation, change over time. Recently updated guidelines dictate that we now capitalize both Black and White, Blackness and Whiteness. Use lower case when referring to actual color, such as a white apron or a black dress.)

Douglass wrote for White Northerners sympathetic to the abolitionist cause. These Whites supported abolition (or were abolitionist-leaning) to the extent that they were willing to purchase Douglass’s Narrative, subscribe to an abolitionist newspaper (such as Garrison’s Liberator), attend an abolitionist meeting/event, and/or donate money for abolitionist activities. None of this meant, however, that the White supporter of abolishing slavery wanted a Black family to move into their neighborhood or for a Black woman to teach their children at an integrated school. In other words, it was entirely possible to be both anti-slavery and racist.

Douglass knew this and wrote accordingly. He argued for abolishing slavery by demonstrating its harmful effects on both the oppressed and the oppressor. A 19th century White American could thus accept Douglass’s argument without also accepting that Blacks and Whites are created equal and thus entitled to the same rights and protection under the law.

Fast forward 118 years to a jail cell in Birmingham, Alabama. A Black preacher scribbles in the margins of a newspaper, responding to public criticism from White southern clergymen. These clergymen want King to leave Birmingham, to stop his marches against segregation and racist policies and to take his fellow “agitators” home with him. Their attitude angers and disappoints King, who responds to each of their criticisms, point-by-point, in his “Letter.”

Frederick Douglass also received pushback from White Christians. In his Narrative, he exposes the hypocrisy of Christian slaveholders. He does this in a subtle and sometimes sympathetic way, and yet his portrayal of slave masters proclaiming religious faith while separating families and starving Black people so angered his readers that Douglass felt compelled to add an Afterword that distinguished between Christianity in general and a distorted version of Christianity practiced by certain individuals in order to justify their (often vile and violent) mistreatment of Black people.

One might reasonably conclude that Douglass struck a nerve. Most people do not like to be called out for their hypocrisy, and Douglass’s readers preferred to proclaim their support for the abolition of slavery without the concomitant requirement to actually think and behave according to their professed Christian beliefs.

This is how laws get changed but (racist) attitudes remain.

INSTRUCTIONS:

For your discussion post, sketch a psychological portrait of the White clergymen who constitute King’s audience. What can you reasonably assume about these men from King’s “Letter”? On what do you base your assumptions? Be specific as you read King’s “Letter” for an understanding of exactly who and what King faces in the fight for equality and justice that he is leading exactly 100 years after Lincoln signed the Emancipation Proclamation.

 

 

Tip: Some students summarize King’s letter in their post. Note that I am asking you to draw a psychological portrait of the men King is addressing in his letter and that I am not using “draw” or “portrait” literally. Such a portrait–written description–would identify feelings or states of mind that the person being analyzed may or may not be aware of. Imagine observing these men when they don’t know you are there and then writing a brief summary of your findings that amounts to an armchair “psychoanalysis.” This is not an easy task. All I am asking is for you to take a stab at it and avoid summarizing

 

After analyzing the company’s IT operations and its risk statements about those activities, you will construct and document your own IT focused risk analysis including both its primary operations and all supporting business processes. Your risk analysis will also address information risks and technology risks which you identify in your research about the company.

Project 2 –Risk Analysis

Description

For this project, you will continue your research from Project #1 by reviewing and then analyzing your chosen company’s risk statements as published each year in the company’s Annual Report to Investors (also published in the company’s annual filing of SEC Form 10-K). After analyzing the company’s IT operations and its risk statements about those activities, you will construct and document your own IT focused risk analysis including both its primary operations and all supporting business processes. Your risk analysis will also address information risks and technology risks which you identify in your research about the company.

 

Note: before beginning this assignment, you should review NIST SP 800-30 R1: Guide for Conducting Risk Assessments. Pay special attention to Appendix D: “Threat Sources: Taxonomy of Threats Sources Capable of Initiating Threat Events” and Appendix H: “Impact: Effects of Threat Events on Organizations, Individuals, and the Nation.”

 

Conduct Additional Research for Your Chosen Company

  1. Extend the research that you did for Project #1 by reviewing the company’s website to learn more about the company’s business areas and operations.
  2. Retrieve the Hoovers profile for the company. You should use the same company and profile that you used for Project #1. The base URL for Hoover’s is http://ezproxy.umgc.edu/login?url=http://www.mergentonline.com/Hoovers You will need to login to the library using your UMGC SSO login credentials.
  3. Review the SWOT and Technologies in Use sections of the Hoover’s profile.
  4. Retrieve the Form 10K for the company using the URL provided in Project #1.
  5. Identify 3 or more additional sources of information about the company and how it uses Information Technologies to conduct its business operations. These sources can be news articles, data breach reports, etc.
  6. Using the information obtained from your sources, identify the types of information and business operations which drive this company’s need for cybersecurity products and services. (What information or information infrastructures need to be protected?)

Analyze the Information and Information Technology Risks for Your Company

  1. Retrieve the Form 10K for the company you reviewed for Project #1.
  2. Read and analyze the Risk Factors section in the company’s most recent Form 10-K (pay close attention to Item 1.A). This Form 10-K contains a professionally written risk analysis that has been written for a specific audience (investors and shareholders). Pay close attention to what the company includes as risk factors and how the writers chose to present this information.
  3. Analyze the risk factors, as stated by the company, to determine which ones are related to information and information technology used in its business operations or which are otherwise affected by the use of information in digital form and Information Technology systems and infrastructures (e.g. financial risks associated with digital currency transactions).
  4. Review the SWOT Analysis from the Hoovers report. Identify information or IT related risk factors presented in this analysis.
  5. Review the Technologies in Use section of the Hoovers report. Choose 5 or more specific technologies in use by the company which contribute to the company’s risk factors. You may need to research specific vulnerabilities or recent attacks against these technologies. Use the product name followed by “vulnerabilities” in an Internet search engine to retrieve vulnerabilities reports.
  6. Complete your research by reviewing news stories and cybersecurity analyst reports of how this company or the technologies it uses can be attacked or compromised in ways that adversely impact its IT security posture. (Use recent news stories and blogs from IT security analysts at companies such as Sophos, SC Magazine, Norton, Mandiant, etc.). If you need additional suggestions for sources, check the UMGC library’s LibGuide for Cybersecurity Resources https://libguides.umgc.edu/cybersecurity

Develop and Document Your Risk Profile

  1. Begin by copying Table 1 from this assignment file into a new file (for your assignment submission). This table will become your Risk Profile Table. (Delete the example text.)
  2. Transfer your identified risk factors and technology vulnerabilities into the Risk Profile table (one item or risk factor per row).
    1. Enter a unique Risk ID for each row.
    2. Enter a brief but unique title for each risk factor or technology vulnerability
    3. Enter a description that briefly explains what the risk or vulnerability is. Identify the information, digital assets, and/or business operations (processes) affected by this risk, e.g. people, processes, or technologies that need to be protected from threats and attacks (including insiders and external threats).
    4. In the category column, categorize the type of risk or threat that could affect the item. You can use the basic “People, Processes, Technologies” framework or create a set of categories of your own choosing.
    5. In the impact column, rate the potential for loss or harm should this risk materialize (an attack occurs). You can use “low, medium or high” but remember that rating everything at the same level is not helpful when executives with limited budgets need to allocate funding for risk remediation (which you will address in Project #3).
  3. When you are finished, you should have identified and documented 15 or more risks related to the company’s business operations, use of the Internet, the company’s IT systems and infrastructures (including “technologies in use”), and the types and collections of information used by the company.

Write

  1. An introduction section which identifies the company being discussed and provides a brief introduction to the company (you may reuse some of your narrative from Project #1). Your introduction should include a brief overview of the company’s business operations.
  2. A separate analysis section in which you describe this company’s needs or requirements for IT security. What are the likely sources of threats or attacks for each type of information or business operation? What information and/or business operations need to be protected? Make sure to identify and discuss the sources of information used in your analysis.
  3. A separate analysis section in which you present your risk profile in table format. Provide an introductory paragraph that explains the risk profile, e.g. what information is contained in the table and what sources were used to obtain this information. In your introductory paragraph, identify the sources used to provide the information presented in the table. This attribution will take the place of in-text citations in the description column and makes the table easier to read.
  4. A separate closing section which provides a summary of the risk analysis, the identified risks, and potential impacts of risks upon the company’s operations as a whole.

Submit Your Work for Grading and Feedback

Before you submit your work, check the rubric (displayed in the Assignment Folder entry) to make sure that you have covered all required content including citations and references.

 

Submit your work in MS Word format (.docx or .doc file) using the Project #2 Assignment in your assignment folder. (Attach the file.)

Additional Information

  1. Your 8 to 10 page Risk Analysis should be professional in appearance with consistent use of fonts, font sizes, colors, margins, etc. You should use headings and sub-headings to organize your paper. Use headings which correspond to the content rows in the rubric – this will make it easier for your instructor to find required content elements and will help you ensure that you have covered all required sections and content in your paper.
  2. The stated page length is a recommendation based upon the content requirements of the assignment. All pages submitted will be graded but, for the highest grades, your work must be clear, concise, and accurate. Exceeding the recommended length will not necessarily result in a higher grade. Shorter submissions may not fully meet the content requirements resulting in a lower grade.
  3. The INFA program requires that graduate students follow standard APA style guidance for both formatting and citing/reference sources. Your file submission must be in MS Word format (.docx). PDF, ODF, and other types of files are not acceptable.
  4. You must include a cover page with the course, the assignment title, your name, your instructor’s name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s minimum page count.
  5. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
  6. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow APA Style guidance. Use of required readings from the course as sources is expected and encouraged. Where used, you must cite and provide references for these readings.
  7. When using Security and Privacy controls from NIST SP 800-53, you must use the exact numbering and names (titles) when referring to those controls. This information does not need to be treated as quotations. You may paraphrase or quote from the descriptions of the controls provided that you appropriately mark copied text (if any) and attach a citation for both quoted and paraphrased information.
  8. Consult the grading rubric for specific content and formatting requirements for this assignment.
  9. All work submitted to the Assignment Folder will be scanned by the Turn It In service. We use this service to help identify areas for improvement in student writing.

 

 

 

Table 1. Risk Profile for [company]

 

Risk ID Risk Title Description Risk Category Impact Level
001        
002        
003        
004        
005        
006        
007        
008        
009        
010        
011        
012        
013        
014        
015        

 

1. How are men portrayed in the fairy tales we have read – positively or negatively? Questions to consider in the essay: What does this representation say about masculinity and/or becoming or being a man? Are stereotypes being reinforced or challenged? Choose one fairy tale to focus on.

Choose ONE of the questions to answer:
1. How are men portrayed in the fairy tales we have read – positively or negatively? Questions
to consider in the essay: What does this representation say about masculinity and/or becoming or
being a man? Are stereotypes being reinforced or challenged? Choose one fairy tale to focus on.
2. How are women portrayed in the fairy tales we have read – positively or negatively?
Questions to consider in the essay: What does this representation say about femininity and/or
becoming or being a woman? Are stereotypes being reinforced or challenged? You can focus on the
princess, the villain, or look at relationships between women. Choose one fairy tale to focus on.
3. Surprisingly, many of these fairy tales contain extreme violence. Write about the role of violence in
these stories. Why is there so much violence? OR answer the question about whether “Snow White”
or “Cinderella” ends with an act of revenge or justice. Choose one fairy tale to focus on.
4. What do these stories say about love? Questions to consider in the essay: If love is in these
stories, how is that love represented? If not, what else is going on? Are stereotypes being reinforced
or challenged? Choose one fairy tale to focus on.
5. We often think of fairy tales as ending with “happily ever after.” While the stories we read did not
end with the phrase “happily ever after,” do they have a happy ending? Choose one fairy tale to
focus on.
Be sure to address the significance or “so what” in your essay. Some guidelines to consider:
● Make sure your essay has a thesis in the introduction (last sentence). Your thesis must make
an argument. Include the title of the story in your thesis.
● Make sure your essay proves/supports your thesis. Provide at least 3 quotes from the text for
support. Make sure you follow MLA in-text citation (with quotation marks, a signal phrase, and
page numbers).
● Analyze the quotes you have selected — show how/why they support your thesis.
● Avoid plot summary. I have read the fairy tales. Essays that contain mostly plot summary will
receive a lower grade. Analyze – don’t describe!
● Make sure your essay is organized. Take time to plan your essay before you start writing.
● Make sure the language is solid. Your writing needs to be clear and free of grammar
mistakes. Take time to proofread your essay.
● The essay must be at least 625 words; include a word count at the end. Essays must have
12-point font, one-inch margins, and be double-spaced. The essay is due Friday October
28th by noon. Post it in Google classroom as a word or Google doc.
● Use the format below for the first page:
Your Name
Instructor’s Name
Class
Date
Title of Your Essay*
(*NOT the title of the story you are writing about; instead reflect the main idea of the essay)
Indent (hit tab key) and Begin your essay

Analyze the potential effectiveness resulting from professional or nurse-provided social support versus enhancement of social support provided by personal relationship and social networks for parents of children with chronic mental illness.

Discussion Topic: Analyze the potential effectiveness resulting from professional or nurse-provided social support versus enhancement of social support provided by personal relationship and social networks for parents of children with chronic mental illness.

Select one Student Learning Outcomes from the following list:

1- Critique nursing’s conceptual models, grand theories, and mid-range theories.

2- Examine the influence that nursing models and theories have upon research and practice.

Provides an explanation of how the selected Student Learning Outcomes is explored or related to the Discussion Topic.

Requirements:

Formatted and cited in current APA 7

Use 3 academic sources. Not older than 5 years

Not Websites are allowed.

Plagiarism is NOT allowed

Write a 700-word executive summary that includes the following: A summary of the Process Evaluation (using either Lean or SPC or Six Sigma) A summary of the Evaluation of Control Chart and Process metrics based on SPC methods

 

Statistical Process Control Methods

 

Process Evaluation

Evaluate your process using 1 of the following:

  • Use the lean concept to find ways to eliminate waste and improve the process
  • SPC or Six Sigma to reduce defects or variances in the process

 

<Write your evaluation here>

 

Evaluation of Control Chart and Process Metrics

Complete the following in Excel:

  • Calculate the defined process metrics including variation and process capability.
  • Develop and display a control chart for the process.

 

Evaluate the control chart and process metrics using Statistical Process Control (SPC) methods. Determine whether the process could benefit from the use of Six Sigma, Lean, or other tools. (Include all calculation and charts.)

 

<Write your evaluation here>

 

Executive Summary

Write a 700-word executive summary that includes the following:

  • A summary of the Process Evaluation (using either Lean or SPC or Six Sigma)
  • A summary of the Evaluation of Control Chart and Process metrics based on SPC methods
  • A summary of your evaluation of whether the process would benefit from the use of Six Sigma, Lean, or other tools
  • A description of the SPC project and recommendations for improvements

 

<Write your executive summary here>