access to healthcare 1

Access to Healthcare

Community health centers provide primary health care services to more than 22 million people across the United States. Each health center provides for the unique needs of patients in its immediate community. Many of the patients that are seen at health centers represent uninsured or underinsured patients and/or those with limited access to healthcare. This assignment will help you identify service delivery needs and provide quality recommendations for improving access to healthcare.

Read the following case study from your textbook:

  • Case 20: Big Brother is Watching: Utilizing Clinical Decision Support as a Tool to Limit Adverse Drug Events (ATTACHED)

Then, do the following:

  • Conduct research on “community health centers” by reviewing the National Association of Community Health Centers website at About Our Health Centers – NACHC (http://www.nachc.org/about/about-our-health-centers/)
  • Choose a geographic region or location and research the types of services delivered at the community health centers in that area.
  • Describe the location including the demographics such as race and ethnicity, gender, socio-economic status, age, education level, morbidity and mortality statistics, and other common or relevant health statistics.
  • Identify the other social services that are available to your selected community to strengthen and sustain the community health system in the location you have chosen.
  • Identify and discuss the barriers to access to healthcare.
  • Explain how healthcare providers can improve access to quality care and reach their target population.

Write a 3 to 5 page paper in Word format. Apply APA standards to citation of sources.

o support your work. Provide examples of how particular strategies were previously implemented and worked. Address the policy, systems, and environmental changes that may be needed to help support change in the community health center.

develop a computer and internet security policy for the organization as a chief security officer

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area.

There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance.

Your plan should reflect the business model and corporate culture of a specific organization that you select.

————————— Paper should follow below guidelines——————

Follow APA6 guidelines.

Be approximately four to six pages in length, not including the required cover page and reference page.

Your paper should include an introduction, a body with fully developed content, and a conclusion.

References:

Include at least 3 scholarly references in addition to the course textbook.

At least two of the references cited need to be peer-reviewed scholarly journal article

Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.

sales written assignment 1

Answer each of the following questions as completely as possible. Answer all parts of multi-part questions. Each response should beat least 250 word, double-spaced pages.

These are critical thinking questions, but you must support your answers with facts from your reading and viewing materials.

Before submitting your work, proofread it for correct spelling, grammar, complete sentences and paragraphs, and clarity of expression. Be sure to keep a copy of each assignment for yourself.

1.(a) What factors might persuade a successful salesperson to turn down a promotion into sales management? Why might that person make such a choice, and why might it prove to be the preferable option?

(b) If your company needed salespeople in the field immediately and couldn’t take the time to put new employees through the trainee phase, what steps could you take to bring those new salespeople up to speed quickly? What risks would you be taking in the process?

2.You’re under a great deal of pressure to produce sales results. One of your long-time customers is considering a purchase from your company, but she’s not aware that a competitor has a product that would meet her needs more fully. You know about that competing product, but you decide not to tell her because you need the sale. If your customer later finds out about that other product, what will you say and do to retain—or regain—her confidence in you as a sales counselor?

discussion question 1697

You will choose one topic and answer two questions and share your opinion with your classmates. Clearly indicate your topic in your thread before giving your answers. You must create a thread in order to read other students’ posts.

You must post before Wednesday no later than 11.59pm and comment two other students posts before Sunday 11.59pm. You must create a thread before being able to read other threads. You will choose one topic only (Boeing or Uber)

Topic 1 (use the documents posted on Blackboard and your own research using google):

1. Evaluate how well Boeing’s managers performed at each stage of the decision-making process. How could they have improved the process?

2. Do you think the board’s decision on the Dreamliner was the best decision it could have made? Explain.

Topic 2 (use the documents posted on Blackboard and your own research using google):

1. Discuss Uber’s success and crises in terms of risk, uncertainty, and how its managers are handling the company’s challenges. What is the current news on this company?

2. Identify some risky decisions you have made. Why did you take the risks? How did they work out? Looking back, what did you learn?

what were the primary motivations and factors that led to the u s shift from isolationism and continental expansion to imperialism by the late 19th and early 20th centuries

  • The length of the paper should be 5-6 pages (approximately 1500-1700 words not including citations).
  • The paper must be typed in Times New Roman 12-point font and double-spaced.
  • For background information please see Roark chapter 20. You must provide at least 4 outside sources(besides Roark and Johnson texts), two of which must be primary sources.
  • All sources must be correctly cited using the Chicago Manual of Style. You must also provide a separate Bibliography at the end of your paper. You should refer to Diana Hacker (Links to an external site.). The Chicago style is clearly explained and a model paper (with correct citations and bibliography) is provided as well.
  • The First Draft is due on Feb. 5 by 11:59 p.m. You must have a completed draft of the writing assignment (not just an outline or a page or two) with citations and a bibliography.

chaitanya nd shanki computer security discussion 4 replies and discussion 5

Task 1:

Please read below student posts and reply each in 150 words.

Vinusha – Cyber Stalking state laws

Rhode Island Cyberstalking and Cyberharassment law:

Stalking is a major concern all across the globe and with the advancement in technology digital forms of stalking has become one of the serious issues. Some of the common platforms used by cyber stalkers are Emails, Blogs, Websites, Facebook, Twitter etc.., Cyberstalking is a criminal offense in many states and California was the first state to enact a specific stalking law in the year 1990. Since that time, all the 50 states has enacted stalking laws.

According to Rhode Island Cyber law, section 11-52-4.2 extensively addresses the cyberstalking and cyberharassment issues. Any individual using internet or any other electronic device to contact any person for the sole reason of seriously alarming, annoying or bothering the person with no legitimate purpose is defined as the cyberstalking or cyberharrasment as per the section 11-52-4.2. Series of actions performed over a period of time that would cause a reasonable person to suffer substantial emotional distress, or be in fear of bodily injury is also termed as cyberstalking or cyberharassment according to § 11-52-4.2.

Cyberstalking and Cyberharassment charges can impact reputation, employment, and also freedom. Individual who intentionally cyberstalks are charged with first misdemeanor offense under RI law. Accused can be charged with an imprisonment of a year and a fine up to 500$. A second or subsequent conviction can be charged as felony. Felony offense can be punishable by imprisonment for not more than 2 years or by a fine of more than 6000$ or both. According to the Rhode Island restraining order, section 11-52-4.3 a subsequent conviction of felony can also be charged with imprisonment for not more than 5 years, by a fine of 10,000$ or both. Stalking law is strictly enforced in Rhode Island. In addition to the mentioned penalties, individuals who are convicted under RI cyber stalking law will also be stripped from their gun rights.

Pranitha – Cyberstalking refers to harassment over the internet(world wide web) utilizing diverse modes of transmission including electronic mail (e-mail), chat rooms, newsgroups, mail chains. Cyberstalkers typically have a tendency to attain personal facts pertaining to their victims, together with home addresses, mobile and domestic phone numbers and commonly harass the victims. To save such acts Cyberspace law is developing daily which encompasses all instances and constitutional provisions that impact human beings with many groups in cyberspace globally. The distinct additives of cyberspace law often encompass jurisdiction and freedom of expression.
Cyberstalking in the main may be charged and falls under New Jersey’s cyber harassment regulation when the crime includes generally the movements which take region in a digital format this is supposed to annoy the sufferer. This crime kind of crime may be described as making threats to inflict injury or harm on the victim or the sufferer’s property, and knowingly/intentionally sending substances intended to emotionally disturb the sufferer or put the sufferer in high quantity of fear of physical or emotional damage which can be directed in opposition to the sufferer. Few instances encompass posting abusive messages and posts on a social media platform or sending threatening textual content messages to a sufferer which might emotionally hassle them.

Stalking is a crime of the fourth degree but increases to a crime of the third degree when the offense occurs in violation of a restraining or similar court order so more awareness about it must be spread by Organizations and government to prevent it.

Task 2:

Attacks on our national infrastructure are already happening. And the expectation is that they will continue to increase at an accelerated rate. For this week’s discussion, we’ll cover threats to our nation’s pipelines. To get started, read this article:

https://www.eenews.net/stories/1060054924

After reading the article, start a discussion thread and discuss how the types of threats discussed in the article could impact our economy, and how implementing Diversity and Commonality (as discussed in chapters 5) could help mitigate these threats.

words :300

mini case transfer of training 1

Mini-Case – Transfer of Training

Read the following mini case and answer the questions that follow:

Organizational Profile

Southern Credit Union operates in more than 10 medium-sized cities in a southeastern state. As a credit union, Southern is owned by their members who save and borrow money through the institution. A portion of the union’s profits is returned to members in various ways, including lower interest rates, lower fees and higher dividends on savings accounts. Southern’s front-line tellers provide routine banking services inside the credit union and at drive-through locations. Most front-line tellers are women, although the position has become more diversified recently. The New Accounts Department meets potential members to discuss the features of Southern’s savings and checking accounts. The Mortgage Services Department provides mortgage options for home loans. The Investment Services Department has financial advisors who meet with members to discuss alternative investment strategies and options for growing their money. Credit union members are a diverse group in terms of racial demographics, age and gender.

Key Issues

The president of Southern Credit Union, Tom Jenkins, is relatively new; in fact, there have been three different presidents over the last six years. Not surprisingly, camaraderie has been lacking among managers, employees and the ever-changing leadership team. After meeting with the board of directors and in anticipation of an upcoming audit from the National Credit Union Administration, Jenkins decides that Southern needs to revisit its sexual harassment policy and procedures and determine when the last training session was held. Jenkins meets with the HR director, Pamela Sanchez, and the training analyst, Heather Blackburn. They decide the sexual harassment policy is sufficient but realize that there has been no sexual harassment training in four years. Blackburn, who has been focusing on customer service training, is told by Jenkins to “make this happen by the end of next month.”

Training Staff

Heather Blackburn has been a training analyst for only five months. She graduated with a B.A. in communications 15 years ago; after graduation she worked as a bank teller at a regional bank. She moved to Southern Credit Union as a bank teller because the pay was higher and the credit union had a good regional reputation. Blackburn was a bank teller at Southern for eight years, then applied for an internal transfer to the training job because she liked working with people and thought the job would be interesting. She joined the local American Society of Training and Development (ASTD) chapter last month to learn about the training profession in general and specific training methods. She reports to the HR director, Pamela Sanchez.

Activities to Enhance Learning

Design of the Sexual Harassment Training

Jenkins’ request doesn’t give Blackburn much time to develop and conduct the sexual harassment training. She decides to train first-line supervisors, since they are most closely involved in the front-line employee interactions. She doesn’t have time to meet with anyone to get this training designed, so she sketches out a two-hour lecture. She wants to cover Southern’s sexual harassment policy, the complaint procedure, and some recent court cases (gathered from the Employment Law Information Network) as examples of quid pro quo versus hostile work environment harassment. She creates handouts for trainees and schedules training off-site for 50 Southern supervisors to minimize distractions from their branch locations. Three days before the training, Blackburn has all her lecture notes (in PowerPoint) prepared, handouts copied and the training room ready. She e-mails first-line supervisors about the mandatory training, tells them about the objectives of the training and gives them directions to the off-site training location.

The Training

As the supervisors enter the training room, they seem confused about the late notification of this training. As they talk among themselves, they wonder if one of the employees filed a sexual harassment complaint. Blackburn covers all the material she has prepared. She doesn’t get a chance to ask for questions at the end of the session, but tells the supervisors to e-mail her with any questions they have about the material and reinforces her willingness to ensure they understood the information. Blackburn feels good about her organization and preparedness, and feels like the two-hour lecture was successful. The supervisors leave quickly to get back to their branch locations; some have several hours to drive and much to handle when they return to their jobs.

Report on the Training

Blackburn happily reports back to Jenkins and Sanchez with her perceptions of how the first-line supervisor training went. Blackburn reiterates how she met Jenkins’ deadline, recounts the process she used to develop the training, and shows them the training materials and handouts. Blackburn plans to e-mail the supervisors in six weeks to remind them of key learning points and to see if they have any questions about the sexual harassment concepts, once they consider their own workplace situations. She will also ask them to rate their satisfaction with the training via a short e-mail survey. Jenkins is satisfied because he can tell the audit team that the training took place. The HR director, though, is quiet during the meeting; she wonders whether this effort was well executed and is concerned about the ultimate effectiveness of the training.

Activities to Enhance Learning

Discussion Questions to Accompany Mini-Case

Question: How was transfer supported or not supported in this organization before training?

Question: How was transfer supported or not supported in this organization during training?

Question: How was transfer supported or not supported in this organization after training?

Rubric

Criteria Ratings Pts

This criterion is linked to a Learning OutcomeQuality of Writing and Proofreading

2.5 pts

Written responses are free of grammatical spelling or punctuation errors. The style of writing facilitates communication.

2.0 pts

Written responses are largely free of grammatical, spelling or punctuation errors. The style of writing generally facilitates communication.

1.5 pts

Written responses contain a few errors in spelling, grammar and punctuation, etc. Some errors but not so many to indicate repetitive distractions.

1.0 pts

Written responses include some grammatical, spelling or punctuation errors. The errors distract the reader.

0.5 pts

Uses incorrect grammar and incorrect sentence structure consistently. The errors interfere with the communication process.

2.5 pts

This criterion is linked to a Learning OutcomeComprehension of material

3.0 pts

The writer understands significant ideas relevant to the issue under discussion. This is indicated by correct use of terminology, precise selection of information components required to make a point. Correct use of examples .

2.4 pts

Able to distinguish and comprehends a deeper meaning on most occasions. Ideas are reasonably clear. Some subjective evaluation is necessary to determine what the writer means.

1.8 pts

Comprehends the surface level meaning of the material and begins to relate issues to general knowledge and experience

1.2 pts

Demonstrates some basic comprehension of the material . Does not make connections with the bigger picture.

0.6 pts

Not comprehending or reflecting on what is read or viewed

3.0 pts

This criterion is linked to a Learning OutcomeLength, content and ability to interpret and answer assignment

1.5 pts

Work demonstrates that all tasks were completed Showed some originality and extra initiative in completing assignment.

1.2 pts

Work demonstrates that significant effort was made to attempt all aspects of the assignment. Ideas connected clearly.

0.9 pts

Work demonstrates that some effort was made to attempt all tasks that were assigned. Occasional sense of engagement of writer with the subject matter.

0.6 pts

Little effort was made to attempt all tasks that were assigned. Ideas were connected but weak

0.3 pts

Very little effort was given to the task assignment. No response was given.

1.5 pts

This criterion is linked to a Learning OutcomeRelevance of answers, opinions and ideas.

3.0 pts

Student is clearly expressing arguments, opinions and responses in answering assignments. Superior ideas and insights. Answers are clear and complex.

2.4 pts

Student is more consistent in expressing arguments, opinions and responses when answering assignments

1.8 pts

Student is learning to develop and express arguments, opinions and responses in answering assignments. More complex and insightful answers.

1.2 pts

Not developing their ability to express arguments, ideas or opinions. Ideas are not complex or insightful. May include some information that distracts from central purpose.

0.6 pts

Student is not able to express opinions, ideas, and responses due to inadequate writing skills. Ideas are unclear.

3.0 pts

Total Points: 10.0

do not have any plagiarism from internet!!!!

please see attached week 2

Please see attached assignments for Week 2 Learning Activity and DB Part 1 . Report You Need To Prepare: You must prepare a report addressed to Winnie and Ralph. Winnie and Ralph will use the report in a discussion with the GC owners. The report must address each of the following points:

1. Analyze whether Jack has a negligence claim against Client A.

2. Identify any potential defenses that Client A may raise in response to Jack’s negligence claim. The analysis must explain why the defense may be raised.

3. Given the negligence claim and the potential defenses, draw a conclusion as to whether Jack or Client A should prevail in a lawsuit. The conclusion must be supported by the facts and the law.

critical thinking and decision making 1

Due: Sunday, End of Module by 11:55 p.m. EST

Write an essay on Free Trade vs. Fair Trade (4 – 5 pages). Learn more about the issue, and take a position on it. Present the issue to readers, and develop an argument for the purpose of confirming, challenging, or changing your readers’ views on the issue.

Write a focused paper and on the issue. The writer presents the issue so the reader understands it. Issues need more or less explanation and examples, depending on what the audience already knows.

Have a clear position. The thesis is positioned effectively, usually at the beginning or end of the essay, and repeated for emphasis and clarity as needed.

Have plausible reasons and convincing support. The writer must provide reasons for supporting the position. The writer must go beyond simply asserting reasons, by including examples, statistics, expert testimony, and/or anecdotes to support the reasons.

Anticipate opposing position and objections. An effective argument for a position includes recognizing and refuting opposing arguments, as well as anticipating and answering a reader’s questions.

Writing Requirements

  • 3–4 pages in length, in APA format (excluding cover page, abstract, and reference list

IMPORTANT: LESS THAN 15% PLAGIARISM

unit 5 questions 1

  • Answer the following Discussion Question
    • Cyber-intrusion impacts many individuals around the world every day. Based on what you have read in this unit and in the textbook readings, do you feel that law enforcement technology will ever be able to completely eliminate cyberattacks? Explain why or why not.
  • Respond to 2 classmate post. Please include the name of the person or question to which you are replying in the subject line. For example, “Tom’s response to Susan’s comment.”
    • Richard Munson: I believe that only the highest levels of law enforcement like the federal government will get close to catching cyber criminals in real time or soon after the crimes have been committed. This is because many times the victims do not know they have been targeted until after the crime has taken place. For instance, a person might have their credit card info stolen and used but not be aware until they get their statement from the credit card company some 30 days later. There is a fine line between protecting people’s privacy and harassing people in the way that credit card companies may put a hold on an account for a purchase they perceive as “risky”. Once my bank put a fraud alert and freeze on my bank account because I made a $20.00 purchase on PayPal and they did not bother to contact me about this. I had a pretty healthy bank balance at the time and took a business client out to an expensive dinner and was humiliated when my card came back as “stolen”, or possible fraudulent? It is overzealous acts like this that put financial institutions and law enforcement between a rock and a hard place when it comes to cybercrime.
    • Yolanda black: In an increasingly interconnected and technology-reliant world, cyber intrusion remains a major challenge for law enforcement officials globally. Despite this being a major issue with potentially serious repercussions, the nature of cyber-intrusion makes it a problem that is almost impossible to eliminate for law enforcement technology. One reason for this is that cyber-intrusion attacks can be executed remotely, which means that attackers need not be based in the country where they execute their crimes. Consequently, this means that it becomes much harder to track down and bring the criminals to justice since they may be in places where the US authorities even with their technology lack jurisdiction. For example, until recently, Ukraine did not even have a cyber crime law, which made it a haven for highly skilled cyber criminals who targeted US companies while remaining secure in the knowledge that even if they were caught they would never be extradited since their actions were not illegal in Ukraine. Another reason why cyber-intrusion is such a difficult crime to stop is that cyber-attackers often possess far superior skills than the law enforcement officials tasked with hunting them down. Many cyber-criminals spend years honing their skills and may often have access to top of the line equipment thus allowing them to execute their schemes easily without fear of getting caught. By comparison, most cyber crime divisions for law enforcement departments are usually under equipped or understaffed because these positions seldom ever pay well enough to attract the caliber of individuals required to effectively combat cyber-intrusion. Consequently, the skills mismatch between the cyber-intruders and the law enforcement officials trying to stop them makes it easy for the cyber criminals to escape justice.
  • Define target hardening in cyberspace, and define and explain SQL injection. Your response must be a minimum of 400 words.
  • Define and describe 18 U.S.C. 3771, the Crime Victims’ Rights Act, and assess the importance of each of the ten elements of that legislation. Your response must be a minimum of 400 words.