Briefly describe a recent news item about a global event – something that impacts more than one country – and provide a complete citation and not just the website.

Briefly describe a recent news item about a global event – something that impacts more than one country – and provide a complete citation and not just the website. Author, the title of the article, the name of the news source, and the date. Then provide an interpretation and analysis of why the event happened and/or its effect on international politics using two of our perspectives: Realist, Liberal, Marxist, or Constructivist. Remember, divide your essay into three paragraphs. For example, your first paragraph introduces the topic, your second analyzes it from a Realist perspective, and the third assesses it from a Constructivist view.

Complete an eight- to ten-slide PowerPoint presentation about the job-based and person-based structure needed for the registered nurse’s position.

Job Analysis Research
In conducting a job analysis, there are two areas: (1) job-based and (2) person-based structure. For this assignment, identify the needed knowledge, skills, and abilities (KSAs); the tasks, duties, and responsibilities (TDRs); and any other specifics for a registered nurse’s position.

We will be using research efforts to complete the assignment. Refer to https://www.bls.gov/ooh/ to identify and collect needed data/basic information about a registered nurse’s position. Utilize to the A-Z Index to access information on registered nurses.

Then, use the following website to create your own structure-based analysis: www.onetonline.org. Follow the steps listed below for the www.onetonline.org website to access the needed information.

Search www.onetonline.org.
Go to the Occupation Search section.
Enter the keyword (registered nurse) or the O*NET-SOC code.
Click the arrow.
Identify/record code for registered nurses.
Click Registered Nurses.
View the report.
Click the Custom tab at the top of the page. (Note: You will customize/select your own job analysis specifics based on the job and person-based specifics.)
Check the appropriate boxes (see below for required information).
Click GO.
Once the data is collected, complete an eight- to ten-slide PowerPoint presentation about the job-based and person-based structure needed for the registered nurse’s position.

The following information should be identified in the PowerPoint presentation:

education,
credentials,
KSAs,
tasks,
work activities and detailed work activities,
technology skills,
tools used,
wages, and
an explanation of what a job analysis is and its purpose.
As you create the content slides for your presentation, be sure to use the speaker notes function to explain the content in detail for each of the slides. Imagine you are presenting to your company leaders.

Note: Keep the 6×6 PowerPoint rule in mind (i.e., slides should only include six to seven lines of content with no more than six to seven words per line). Any illustrations should relate to the content being discussed. Be creative!

Include a title slide and references slide in your presentation; however, please keep in mind that these do not count toward meeting the minimum slide requirement.

Define the different environments you expect the databases to be working in and the security policies applicable.

Please review the Steps 1-3 document that I have included. Write this paper as a continuation of the first three steps. Please be sure to include in-text citations where required. The more the better.
Step 4: Describe Defense Models
Now that you have established security standards for the RFP, you will define the use of defense models. This information is important since the networking environment will have numerous users with different levels of access.
Provide requirements in the RFP for the vendor to state its overall strategy for defensive principles. Explain the importance of understanding these principles. To further your understanding, click the link and read the resources that I provided you.
Read the resources on enclave computing environment that I provided you.:
Explain how enclave computing relates to defensive principles. The network domains should be at different security levels, have different levels of access, and different read and write permissions.
Define enclave computing boundary defense.
Include enclave firewalls to separate databases and networks.
Define the different environments you expect the databases to be working in and the security policies applicable.
Step 5: Provide a Requirement Statement for System Structure
In the previous step, you identified defense requirements for the vendor. In this step of the RFP, you will focus on the structure of the system.
Provide requirement statements for a web interface to:
1. Allow patients and other health care providers to view, modify, and update the database.
2. Allow integrated access across multiple systems.
3. Prevent data exfiltration through external media.
State these requirements in the context of the medical database.
In the next step, you will outline operating system security components.
Step 6: Provide Operating System Security Components
In this step, you will provide the operating system security components that will support the database and the security protection mechanisms.
Read these resources on operating system security. Then:
1. Provide requirements for segmentation by operating system rings to ensure processes do not affect each other.
2. Provide one example of a process that could violate the segmentation mechanism. Ensure your requirement statements prevent such a violation from occurring.
Specify requirement statements that include a trusted platform module (TPM), in which a cryptographic key is supplied at the chip level. In those specifications:
1. Describe the expected security gain from incorporating TPM.
2. Provide requirement statements that adhere to the trusted computing base (TCB) standard.
3. Provide examples of components to consider in the TCB.
4. Provide requirements of how to ensure protection of these components, such as authentication procedures and malware protection.
Read the resources on trusted computing that I provided you.

Differentiate the technologies needed to support data collection, storage, deficiency analysis, compliance with regulatory agencies and reporting throughout various networks.

You have just been hired for your “dream job” at a local employer. Your boss has requested your input for the type of computer system you would like to have.
Using the Internet, search and develop your “dream computer system.” This can be a laptop or PC.
It should include the components discussed in this chapter including processor speed, keyboard, memory, RAM, internal and external hard drives, Graphic Card, mouse, headset, monitor type and screen size, etc. It may be helpful to organize this information in a table for easier viewing.
You must justify your choice of components based on their strengths and weaknesses and why they are suited to your needs.
Include required brand names and suggested manufacturer costs.
Refer to the Unit 2 Reading and Unit 2 Discussion Board for select readings and You Tube™ videos on computer components (Ram, CPU, drive, etc.).
Assignment Instructions: Part Two
Instructions:
In your new position, imagine that as part of your role within healthcare leadership, you are involved in several committees for the organization. One of your responsibilities is to review technology infrastructure supporting various types of patients, both in-network and out-of-network.
Starting with the selected components of your “Dream Computer”, explain how data and information is stored on your “system” and how you go about retrieving said information.
Differentiate the technologies needed to support data collection, storage, deficiency analysis, compliance with regulatory agencies and reporting throughout various networks. Please indicate the relevant computer components– including software and hardware, as outlined in Part One.
Within your technology infrastructure analysis, compare and contrast computer networks in terms of:
(1) approach (i.e., Internet, intranet, and extranet);
(2) communication technologies (Network- LANS, WANS, WLANS, and VPNs); and
(3) Internet standards (i.e., TCP/IP, XML, and SGML).
Refer to the Unit 2 reading and Unit 2 Discussion Board for select readings and You Tube™ videos on database management, database concepts and data warehousing.
Requirements
Submit a 3-4 page paper utilizing proper grammar, punctuation, and support your research with appropriate references.
Must have title and reference page not included with the total number of pages.
APA style and in-text citations throughout the paper.

Discuss the relationship and impacts of CSA, USA PATRIOT ACT, and FISA.

Chapter 2
For apps to be featured on the iPhone, developers must build it with Apple’s software development kit and then apply for approval. Apple rejected the Google Voice iPhone App, and further stated that it would not accept any applications that incorporated Google Voice functionality. Apple reasoned that this app duplicates the phone’s core features. It also rejected Google’s location-based app Google Latitude. If you were developing a collaborative platform, do you think the best model is this collaborative model, or is the open innovation model better – if your main goal is to maximize innovation? What if your main goal is to make money?
Chapter 3
2.Plaintiffs filed a class action lawsuit against investment banks alleging that they inflated prices on more than 300 IPOs, causing IPO investors to overpay for stock, and unlawfully benefited these banks through overcompensation of banking commissions and profits made through quick sales of this stock in their own accounts before prices settled into a more realistic valuation. How would you combat such abuses going forward?
3. Read the following laws and articles:
1. The Computer Security Act of 1987
2. The Patriot Act.
3. Jaeger, P. T., McClure, C. R., Bertot, J. C., & Snead, J. T. (2004). The USA PATRIOT Act, the Foreign Intelligence Surveillance Act, and information policy research in libraries: Issues, impacts, and questions for libraries and researchers. The Library Quarterly, 74(2), 99-121.
4. Politics
Discuss the relationship and impacts of CSA, USA PATRIOT ACT, and FISA. Also discuss the current status of these laws and the replacement of these laws.

What limitation do you able to identify.

As you read this observational study (Descriptive and Analytic Studies Facilitator Guide Askim, A. et al. (2016). Epidemiology and outcome of sepsis in adult patients with Streptococcus pneumoniae infection in a Norwegian county 1993-2011: an observational study. BMC Infectious Diseases, 16(223), pp. 1-9. doi: 10.1186/s12879-016-1553-8. Then answer 1-4 questions

Instruction
You must address each questions separately

1/ what limitation do you able to identify.
2/ are the study results valid?
3 are they reliable?
4/ Are they generalizable? Why or why not?

Writing instruction
1. You are expected to follow APA format and ensure your responses are evidence-based with APA 7th edition citations..
2. To avoid re-writing avoid copy paste and no quote. You must paraphrased and use your own words. Plagiarism will be check by Unicheck software.

Explain the pathophysiology/pathogenesis of the condition

This week we will examine conditions that occur secondary to alterations of the hematologic system.  The following conditions will be explored.  You will create a case study, the patient/client could be one you cared for at work or in clinical (please be confidential); or, you may create a patient/client. Please write in complete sentences.

Create a short case study to include:

  1. Patient/client (use initials)
  2. Age
  3. Gender/Gender identity
  4. Race/ethnicity
  5. Condition selected and location of the patient [hospital emergency department (ED), clinic, home care]
  6. Explain the pathophysiology/pathogenesis of the condition
  7. Clinical manifestations
  8. Evaluation (how are patient’s evaluated — diagnostics/labs)
  9. Treatment (Nursing intervention/education)
  10. Correlate the nursing intervention to a nursing theory
  11. Include Two scholarly articles within five (5) to ten (10) years that are appropriately cited and referenced

Create a company consult debrief that analyzes an existing web application with regard to its human-computer interaction (HCI) and recommends solutions for improving the application to meet the needs of the intended audience.

Create a company consult debrief that analyzes an existing web application with regard to its human-computer interaction (HCI) and recommends solutions for improving the application to meet the needs of the intended audience. This assessment will
give you a chance to demonstrate your skills in employing user-centered methodologies in the analysis of an existing web application, and you will make
recommendations for improving the application to meet the end user’s needs.

Describe the role of the Drug Enforcement Administration (DEA) as it pertains to the PMHNP.

In 2-3 pages:
Describe the role of the Drug Enforcement Administration (DEA) as it pertains to the PMHNP.
Explain your responsibilities when having a DEA number.
Explain how you apply for a DEA number.
Explain your state’s requirements for a safe prescribing and prescription monitoring program. Explain your responsibility as a PMHNP to follow these requirements.
Provide an example of a drug you may prescribe from each of the Schedule II-V drug levels

Share what you know about computer security and best practices to make recommendations to prevent similar incidents in the future.

Alleged computer hacker Gary McKinnon of the United Kingdom has publicly admitted to compromising computer systems belonging to NASA and the Department of Defense. Using information from your classroom, additional materials provided by your instructor, and your own independent research, discuss the impact of these widespread intrusions and comment on McKinnon’s self-proclaimed motivations. Describe McKinnon in the context of the frameworks and theories of cyber-crime and cybercriminals discussed in the classroom. Are the efforts to extradite McKinnon to the United States simply a political stunt, or are they an important precedent in prosecuting international cyber-crimes? Finally, share what you know about computer security and best practices to make recommendations to prevent similar incidents in the future. Your submission should be a minimum of four pages in length, and it should conform to APA formatting and citation standards.