Psychology PowerPoint (at least 5 slides) + outline

(Presentation 2) = same exact format with at least 3 articles about PTSD

(Compare, contrast and summarize the information from all 3 article together)

Format: 1 inch margins, size 12 font (TNR or Ariel), Double space all, Perfected references!!

Directions for Professional Article Summary and Evaluation

You must find a professional journal article on a topic of your choosing related to any class material. Outline must be written in APA format. Your review should have four parts:

First: Article Reference

Your article must be from a professional, peer reviewed,scientific (research based) journal. (If you’re not absolutely certain the article you want to review is from a pro journal/source, check with me)

You must provide a complete APA style reference for your article. This must include the full title of the article, the authors, and the journal, book or source for your article.

Second: The Summary (1 paragraph)

The summary should be a complete but condensed version of the article. It should mention each of the main points stated in the article, for instance, if there is a paragraph in the article that discusses the effectiveness of a specific medication for depression, there should be at least one sentence that summarizes that point.

The summary should be dry and factual. There should be none of your passion or voice in the summary and you should be careful not to present the passion or voice of the article author as if it were your own. This is not a report of on what you think is most relevant in the article, it is a factual summary of what the article is. There will be space for your opinion in the response section.

Third:  Critical Evaluation (1 paragraph)

This section should be a paragraph or so that evaluates the information offered in the article. The article is almost always making a claim of some sort. The author is almost always trying to convince you of something. Your job is to figure these things out and evaluate whether or not the article is convincing. Be skeptical but also be fair.

This section should include but is not limited to questions like:

• What claims are being made?• What evidence has been provided to support the claims (research study, expert opinion…)?• Is the evidence credible (are the tests relevant, can they be repeated, examine validity and reliability).• Did the author provide good examples and define terms well enough to make the point clear?• What contemporary theoretical perspective in psychology best explains the claims being made?

Fourth: Response (1.5 Paragraph)

Also about a page, This is the place for you to offer your personal opinion. Do you agree or disagree with the claim (why or why not), Can you apply what the article said to something in your own life or experience…..I want to know what you think/ feel ….about what you have learned.

PLEASE make sure all 3 articles are about PTSD.

So i would need a powerpoint of at least 5 slides and an outline ( not more than one page) that covers all that is mentioned above.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Discussion

we learn from the authors that, the use of mobile devices in our society today has indeed become ubiquitous. In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth. From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading.

Q1: In consideration with this revelation, identify and name these factors, and provide a brief discussion about them?

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

 Anaphylactoid Syndrome of Pregnancy (amniotic fluid embolism) Required elements   Description of the disorder

[ad_1]

Anaphylactoid Syndrome of Pregnancy (amniotic fluid embolism)

Required elements 

Description of the disorder

Priority Nursing Diagnosis and why

Nursing Assessment / Clinical Manifestations

Nursing Plan/ Goals/ Outcomes

Nursing Interventions

Nursing Evaluations

Patient and Family teaching

Conclusion/ Summary

Cites four (4) APA format references (at least 5 years old)

i want all the element above to be describe separate, each of the element in separate paragraph.

The post  Anaphylactoid Syndrome of Pregnancy (amniotic fluid embolism) Required elements   Description of the disorder appeared first on top grade professors.

[ad_2]

Source link

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Public Sector Case Study

You should go through CASE STUDY( Public Sector Case Study), and describe the risk that was exploited. Also, tell how you think that exploit could be avoided using proper technology and security policies.

Public Sector Case Study

In May 2013, Edward Snowden, a National Security Agency (NSA) contractor, met a journalist and leaked thousands of documents detailing how the U.S. conducts intelligence surveillance across the Internet. In June 2013, the U.S. Department of Justice charged Snowden with espionage. Not long afterward, Snowden left the United States and finally sought refuge in Russia. The Russian government denied any involvement in Snowden’s actions but did grant him asylum.

While this story reads like a spy novel, it raises a number of information security policy questions. For this discussion is not important whether Snowden was a traitor, a spy, or a whistleblower. The issue here is the security policies and controls that allowed a part-time NSA contractor to gain unauthorized access to highly sensitive material. This is particularly important because in April 2014, the Department of Defense announced adoption of the NIST standards. Would the Snowden breach have been prevented if the NIST standards had been adopted earlier?

Given the secret nature of the NSA, the full details of how this breach of sensitive data occurred may never come out. However, reports indicate that Snowden worked part time for an American consulting company that did work for the NSA in Hawaii. There he gained access to thousands of documents that detailed how the U.S. government works with telecommunication companies and other governments to capture and analyze traffic over the Internet. The details of the scope and nature of this global surveillance program were not publicly known and considered secret.

It’s clear from the reporting that Snowden had excessive access; that is to say, he was granted access beyond the requirements of his job. Additionally, reports indicated that he used other people’s usernames and passwords. He obtained these IDs through social engineering. Finally, consider the way in which he accessed and captured the information. Some reports indicate he used inexpensive and widely available software to electronically crawl through the agency’s networks. There are also indications that he removed the information on a USB memory stick.

FYI

Social engineering refers to the use of human interactions to gain access. Typically it means using personal relationships to trick an individual into granting access to something you should not have. For example, you might ask to borrow someone’s keycard to use the restroom but instead use the keycard to access the data center. Or perhaps you might ask for someone’s ID and password to fix his or her computer, and then later use those credentials to access customer information.

If he had used a Web crawler to automate the capturing of thousands of documents, Snowden would have been using software that is widely available over the Internet, and free of charge. Web crawler software simply starts browsing a Web page looking for links and then downloads related content. A Web page then links the Web crawler to another page and the process starts all over again. Thousands of Web pages are quickly scanned in a matter of minutes or hours, depending on the content. More sophisticated Web crawler software looks for specific documents to download. Snowden worked at the NSA for several months, accumulating thousands of documents and reportedly had access to 1.7 million documents in all.

There were clear NIST framework violations. For purposes of this discussion, the focus is on the network and social engineering. NIST publications outline other standards that were violated, such as effective security management and oversight.

The following four NIST framework network policies were clearly violated:

• Sharing of passwords

• Excessive access

• Penetration testing

• Monitoring

It’s never a good idea to share passwords. This would be a clear violation of security policy, especially by anyone handling classified data. Additionally, the level of access must be considered a policy violation. Any security framework generally prohibits granting access not related to the individual’s job function. It’s clear from the volume of material involved in the Snowden affair, and its classified nature, that the access he was granted was excessive for the role he performed.

The NIST framework outlines the guidance on penetration testing. Such testing would have clearly demonstrated the weaknesses of controls that allowed a Web crawler to scan and download thousands of documents. This type of testing and assessment would provide another opportunity to correct the network control deficiencies prior to a breach.

The NIST framework outlines the requirements for effective network monitoring. These requirements require logs to be reviewed in a timely manner. Log reviews are a detective control and essential in identifying potential hackers. Keep in mind Snowden scanned the internal network for months while downloading vast amounts of data. Hackers tend to probe a network for weaknesses prior to a breach. Assume that some of those links the Web crawler attempted to access resulted in an access violation. These violations would have been an indicator of a potential breach in progress. This type of monitoring would have provided another opportunity to correct the network control deficiencies and identify Snowden as an internal hacker.

Finally, consider the lack of controls that allowed Snowden to remove so many documents on a USB memory stick. This unusual activity could have been prevented, or, at a minimum, detected, given the volume of material extracted—especially given that many organizations have in place additional controls to monitor contractor activities.

Some of the specifics of the Snowden breach may never be known. Nonetheless, a security policy framework must be a comprehensive way of looking at information risks and ensuring there are layers of controls to prevent data breaches. This case is typical of a breach occurring over many months, indicating the breakdown of multiple controls. It represents both a lack of effective security policies and lost opportunities to detect a breach over several months.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Individuals with Disabilities Education Act (IDEA)

Special education teachers are part of the assessment team that determines eligibility for special education services. There are 14 major eligibility categories defined by the Individuals with Disabilities Education Act (IDEA). Special educators must have general knowledge of the guidelines for eligibility, the characteristics, causes, and effects on learning, and how often the disabilities occur within a defined population in order to contribute to team collaboration and consult articulately with staff and parents.

Use the “IDEA Disability Category Comparison Template” to outline information for the categories of disability under IDEA. The first category, Autism, is completed for you.

APA format is not required

IDEATEMPLATE
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

DEC 100 – Reflective Journal Response #3

The Other Wes Moore Ch. 5 and 6 Journal Prompts

 

The following is a list of questions related to the assigned reading in the novel, choose one or more of these prompts (or one of your own choosing) and write a reflective journal response (at least 350 words) using the chart that follows. You must include a quotation AND its location in the novel as part of your response. You will use the chart to complete the blog assignment and then upload the finished product to Moodle.

 

 

Possible Journal Prompts:

  1. Throughout the book, we learn about the neighborhoods that both Wes Moore’s lived in. We also learn about their school, religious, and families communities. What role does your community or neighborhood play in supporting you?

 

  1. Do you think Wes’s brother, Tony, is a good role model? Why or why not? Who is your role model. What makes her/him a good role model?

 

  1. How would your life be different if you did not have the support of peers, parents/family, or your community? How would your life be different if you had additional support from peers. parents/family or your community?

 

  1. Do you believe, to an extent, other people’s decisions determine our destiny and fate throughout life? Why, or why not? Give examples.

 

  1. Does not having a father impact a) the choices both Weses made, and b) the mothers’ styles of raising their children?

 

  1. Do you think having “positive” role models as a child serves as a deterrent to a life of crime? Is what constitutes a “positive” role model the same for everyone or does it vary? Who are the people in your life that have a positive influence on you? Explain why they are important to you and your future.

 

  1. When Sergeant Austin gave Wes a map to escape from Valley Forge on page 91, did you think he was being a supportive peer? Did your opinion change after reading what happens on pages 92-93?

 

Name:

Date:

Course AND section #:

APA-style Reference entry for the novel

 

 

Questions for reflection on the reading:

Type in your chosen response question(s) or one of your own choosing here.

 

 

Reflective Journal Response to the reading:

Respond to the question(s) you have listed above here. You must have at least 350 words IN THIS SECTION to earn the minimum grade of a C-.

 

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Week 5 Discussion Prompt 2

Evidence-based practice is extremely important in nursing. Throughout your master’s program, you will complete research on various topics. Knowing how to construct a strong problem statement and complete a critical analysis of the available information to write a literature review is essential. Follow the instructions in the bullets below to direct you where to find resources on problem statements and literature reviews.

This week, you will write a problem statement and perform a literature review in preparation for your ethical issues debate presentation. Share your problem statement in this discussion so that you can review each other’s work and provide peer-to-peer feedback. Also, describe what you think are the most important learning takeaways from the literature review resources you reviewed.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Array of Breaches + IAM

In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.

Write in essay format not in bulleted, numbered or other list format.

Write an essay of at least 500 words discussing discussing IAM in a federated cloud application.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one full sentence (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Psychotropic drug

This week, your assignment is an academic research project.  Using the Human Services Counseling Library Guide as your primary search tool, you’ll create an informational brochure about the psychotropic medication of your choice.  Your brochure should contain the following information:

a.  Drug name and category

b.  What does this medication treat?

c.  How does the drug work?  What functions in the brain does it impact?

d.  What are the benefits of the drug?  What are the dangers?

e.  What are the common side effects?

f.  What (if any) abuse potential does this drug have?

g.  Other information that you find interesting about the drug.

You can create this brochure electronically, or using materials at home.  Please use at least 3 academic sources, which you’ll also submit as a Bibliography.

In the Assignment Dropbox, you’ll submit BOTH your brochure (worth 100 points — if you create it at home, you can take photos of it or scan it, and upload those documents) and a separate bibliography (worth 20 points as this week’s assignment).  Be sure to upload both documents before clicking “submit”, because you will not be able to access your assignment after submitting it.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"

Change Implementation and Management Plan

It is one of the most cliché of clichés, but it nevertheless rings true: The only constant is change. As a nursing professional, you are no doubt aware that success in the healthcare field requires the ability to adapt to change, as the pace of change in healthcare may be without rival.

As a professional, you will be called upon to share expertise, inform, educate, and advocate. Your efforts in these areas can help lead others through change. In this Assignment, you will propose a change within your organization and present a comprehensive plan to implement the change you propose.

To Prepare:

· Review the Resources and identify one change that you believe is called for in your organization/workplace.

o This may be a change necessary to effectively address one or more of the issues you addressed in the Workplace Environment Assessment you submitted in Module 4. It may also be a change in response to something not addressed in your previous efforts. It may be beneficial to discuss your ideas with your organizational leadership and/or colleagues to help identify and vet these ideas.

· Reflect on how you might implement this change and how you might communicate this change to organizational leadership.

The Assignment (5-6-minute PowerPoint presentation):

Change Implementation and Management Plan

Create a narrated PowerPoint presentation of 5 or 6 slides with video that presents a comprehensive plan to implement the change you propose.

Your Change Implementation and Management Plan should include the following:

· An executive summary of the issues that are currently affecting your organization/workplace (This can include the work you completed in your Workplace Environment Assessment previously submitted, if relevant.)

· A description of the change being proposed

· Justifications for the change, including why addressing it will have a positive impact on your organization/workplace

· Details about the type and scope of the proposed change

· Identification of the stakeholders impacted by the change

· Identification of a change management team (by title/role)

· A plan for communicating the change you propose

· A description of risk mitigation plans you would recommend to address the risks anticipated by the change you propose

Required Readings

Marshall, E., & Broome, M. (2017). Transformational leadership in nursing: From expert clinician to influential leader (2nd ed.). New York, NY: Springer.

· Chapter 8, “Practice Model Design, Implementation, and Evaluation” (pp. 195–246)

Cullen, L., & Adams, S. L. (2012). Planning for implementation of evidence-based practice. Journal of Nursing Administration, 42(4), 222–230. Retrieved from https://medcom.uiowa.edu/annsblog/wp-content/uploads/2012/10/JONA-FINAL-Cullen-2012.pdf 

Kotter, J. (2007, January). Leading change: Why transformation efforts fail. Best of HBR. Harvard Business Review, 1–10. Retrieved from https://wdhb.org.nz/contented/clientfiles/whanganui-district-health-board/files/rttc_leading-change-by-j-kotter-harvard-business-review.pdf (Original work published 1995) 

Note: This article is considered seminal to the field.

Tistad, M., Palmcrantz, S., Wallin, L., Ehrenberg, A., Olsson, C. B., Tomson, G., …Eldh, A. C. (2016). Developing leadership in managers to facilitate the implementation of national guideline recommendations: A process evaluation of feasibility and usefulness. International Journal of Health Policy and Management, 5(8), 477–486. doi:10.15171/ijhpm.2016.35. Retrieved from http://www.ijhpm.com/article_3183_5015382bcf9183a74ef7e79b0a941f65.pdf 

Required Media

TEDx. (2013, January). Six keys to leading positive change: Rosabeth Moss Kanter at TEDxBeaconStreet [Video file]. Retrieved from https://www.youtube.com/watch?v=owU5aTNPJbs

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"