Examine the role of self-esteem, religion as a coping mechanism, and body assessment as protective factors for physical dissatisfaction in women with breast cancer experience.

Enriching a Socio-cultural Model of Body Image

Examine the role of self-esteem, religion as a coping mechanism, and body assessment as protective factors for physical dissatisfaction in women with breast cancer experience.

Which psychological processes (if any) play the most important causal role in behaviour change, and which arise as a consequence of behaviour change? How do addiction treatments and behaviour change interventions influence these psychological constructs, and how might those interventions need to be modified in the future?

PhD RESEARCH

“Determinants and psychological correlates of sustained behaviour change and recovery from addiction”

 My supervisor says the proposal should reflect the following:

About the Project 

Although difficult, many people who are addicted to alcohol or drugs eventually recover from their addiction, often without any formal treatment. Similarly, many heavy drinkers are able to ‘cut down’ their alcohol consumption, sometimes without help and often in response to life changes. There is some preliminary evidence that both types of recovery / behaviour change are accompanied by important psychological changes such that involve executive functions, automatic cognitive processing biases, and subjective beliefs about alcohol. These observations raise a number of additional questions, answers to which could contribute important information about the process of behaviour change and how treatments might be optimized in order to bring about those psychological changes. For example, which psychological processes (if any) play the most important causal role in behaviour change, and which arise as a consequence of behaviour change? How do addiction treatments and behaviour change interventions influence these psychological constructs, and how might those interventions need to be modified in the future? This research would involve a series of cross-sectional and longitudinal investigations of people who have yet to change their behaviour, people who are currently attempting to change, and people who have successfully changed their behaviour or recovered from addiction. It may also involve work to build on and clarify the observations from these studies, such as experimental field studies, or development and preliminary evaluation of novel interventions.

 

Show two years of financial history including revenue, expenses, calculated profit, and calculated profit margins. Show three years of future financial projections for revenue, expenses, calculated profit, and calculated profit margins. Show calculation formulas in cells where appropriate rather than “inputting” numbers. Identify key assumptions and conclusions regarding financial projections.

Nordstrum, Inc. – Financial Model Spreadsheet – Week 2

Overview: The financial model assignment will give you an opportunity to explore the company you will be using for your final project and it will also give you practice in creating a simple spreadsheet. You will be expected to utilize spreadsheets as exhibits in your final project external capital funding proposal.

Prompt: Choose one of the following companies, which you will use in your final project proposal:
1. Alteryx

2. L.S. Starrett Company

3. Nordstrom, Inc.

Draft a one-page spreadsheet showing financial history and projected performance for the company you have chosen. The rows should include revenue, expenses, calculated profit, and calculated profit margin. The columns should be years: two years of history, plus three years of your reasonable future projections. Include a few sentences of key assumptions and conclusions. The spreadsheet must have accurate calculations and the cells of the spreadsheet should show your calculation formulas. Your spreadsheet should look professional on screen and when printed (including a heading and meaningful number formatting). Submit this assignment as an Excel spreadsheet file, not a PDF document.

Specifically, the following critical elements must be addressed:
Show two years of financial history including revenue, expenses, calculated profit, and calculated profit margins.

Show three years of future financial projections for revenue, expenses, calculated profit, and calculated profit margins.

Show calculation formulas in cells where appropriate rather than “inputting” numbers.

Identify key assumptions and conclusions regarding financial projections.

Present data in a professional manner with headings and meaningful number formatting.

Referring to pages 112-115 in your text, identify and explain your preferred learning style and discuss at least 3 examples of how you have been using your learning style during the internship. Develop a personal plan for experiential learning using the Integrative Processing Model.

Journal Entry: Learning Style and Experiential Learning

Directions

Referring to pages 112-115 in your text, identify and explain your preferred learning style and discuss at least 3 examples of how you have been using your learning style during the internship. Develop a personal plan for experiential learning using the Integrative Processing Model (see pages 116-126 and use step 6 to develop your plan. Additionally, review the examples on pages 128-133).

With clear references to the criteria for fear appeals discussed in this unit, what makes these posters work for scaring their audience?

Successful fear appeals

1. Unit 6 discusses fear appeals, and the criteria for successful fear appeals. These two ads are WWII propaganda and are examples of successful fear appeals. With clear references to the criteria for fear appeals discussed in this unit, what makes these posters work for scaring their audience?

2. Go to the website below and find another poster, provide the link to it, and make a case for which persuasive technique from aside from fear appeals, it is using to persuade.

Materials published by the U.S. Congress are in the public domain. These posters are courtesy of Northwestern University poster archives.

https://images.northwestern.edu/catalog?f[institutional_collection_title_facet][]=World+War+II+Poster+Collection+at+Northwestern+University+Library

Describe in detail the recent cybersecurity issue that you selected. How was the enterprise impacted? What could have been done to prevent the incident?

Discussion

In 2017, one of the biggest cyberattacks ever to occur was caused by the failure of the management and IT staff at a well-known, very large enterprise to take the necessary action to prevent the hacking the personal information of over 800 million customers. The ability of the black hats to penetrate the technology portal at mega-giant Equifax and steal personal information was determined to be the simple failure to apply a patch to fix a known risk referred to as the Apache Struts vulnerability. An alert had been promulgated and the employees at Equifax knew of the vulnerability, and even ran some scans, but never applied the patch that would have prevented the reconnaissance and penetration of the data farm at Equifax. The credit-reporting agency had two months to apply the fix before the cyber criminals began stealing the data.

Discuss
For this assignment, research a recent cybersecurity issue that had a considerable impact on an enterprise.

Describe in detail the recent cybersecurity issue that you selected.
How was the enterprise impacted?
What could have been done to prevent the incident?

Compose a scholarly paper that explores five topics relating to information systems utilized by management in today’s global On-Demand economy. Select five IS-related solutions from the list provided in this activity.

Research Project Submission 1 Due

In this course, you will compose a scholarly paper that explores five topics relating to information systems utilized by management in today’s global On-Demand economy. Before you begin to develop your paper, you will select five IS-related solutions from the list provided in this activity.

Working on this Research Project paper will help you better understand the Information Systems (ISs) managers frequently use in various types of organizations. You will also enhance your professional growth by researching five IS-related solutions using primary sources outside of the course textbook.

Summary of Steps

Select five (5) solutions from the thirteen (13) choices provided in the blue box titled IS-Related Solutions List.
Download the APA Style Template (DOCX). Download APA Style Template (DOCX).
Edit the template following the instructions in this assignment.
Delete the embedded tips and notations from your final copy of the document before submitting.
Submit your document for grading.
IS-Related Solutions List

Note: You must select your five (5) IS-related solutions from the list below.

Digital Dashboard with Key Performance Indicators (KPIs)
Transaction Processing System (TPS)
Decision Support System (DSS)
Cloud Computing
Database Management System (DBMS)
Enterprise Data Warehouse (EDW)
Electronic Records Management (ERM)
Mobile Infrastructure
Search Engine Optimization (SEO)
Customer Relationship Management (CRM)
Transportation Management System (TMS)
Computer Integrated Manufacturing (CIM)
Supply Chain Management (SCM)
Detailed instructions for this assignment are below and in the Detailed Instructions and the Research Project Requirements sections, which describes the complete project.

Overview

Project Submission 1 requires you to select a title for your project, choose five IS-related solutions on which to conduct research during later modules, and build a three-page, ‘barebones’ template in current APA style format. The template that you create in this module will become a working document and end up as your final paper submission in Module 8.

Conduct research on various methodologies and solutions relating to the implementation of effective cybersecurity programs that may be utilized to thwart outside-agency attacks on an enterprise’s networks.

Case Study: Cybersecurity (PLG1)

Overview

One of the responsibilities placed on managers in today’s On-Demand Economy is that of ensuring that the business processes are held to a high degree of cybersecurity. Because the concept of data-on-demand is an operational necessity that places the enterprise’s and customers’ resources at risk to potential fraudulent hacks, all employees, including those that sit in the loftiest of office spaces, must be trained, made aware of the various methods and practices that can lead to vulnerabilities, and held to very high standards of compliance with standard cybersecurity practices.

The growth of mobile technologies and the IoT have played a significant role in the On-Demand Economy environment. A downside to the proliferation of such technologies is the cracks and doors into the corporate and agency networks that have been opened along the data path, allowing for an increased level of black hat intrusions and reconnaissance.

Case Study Assignment
Download the APA Style Template (DOCX) Download APA Style Template (DOCX) and review the Case Study Requirements section.

Conduct research on various methodologies and solutions relating to the implementation of effective cybersecurity programs that may be utilized to thwart outside-agency attacks on an enterprise’s networks. Your approach here should be to seek out scholarly source data relating to examples of the various cybersecurity measures that top management and IT departments might provide for employees and contractors, including data access enforcement, network intrusion detection and prevention systems, and real-time responses to incidents and attacks. You could focus your research on any one of the various types of defenses such as anti-malware applications, Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs), biometric access, rogue app monitoring, mobile kill switch, or remote wipe capability technologies.

Research a topic approved in advance by the instructor dealing with the development of American popular music. Include within their research social structures, economics, demographics, instruments, artists, etc.

Development of American popular music

Each student will research a topic approved in advance by the instructor dealing with the development of American popular music. The student should include within their research social structures, economics, demographics, instruments, artists, etc. A paper of no less than 1500 words will be written based upon your research, including appropriate documentation.
Each paper will be evaluated on its grammar, structure, and content. My approved topic is Early Rock and Roll with a focus on just one or two artists and/or bands during that time frame.

Using the MIN function, create a formula for the cell located in Column B, Row 8 that calculates the lowest value for the Jet Fuel pricing available from the five vendors. Using the MIN function, create a formula for the cell located in Column C, Row 11 that calculates the lowest value for the Avgas pricing available from the five vendors.

Module Review: Practical Exercise Due

In this practical exercise, you are hypothetically employed as the IT Department Manager at an imaginary Fixed Base Operator (FBO) located in Somewhere, Kansas. You have been tasked to create a simple spreadsheet utilizing the Microsoft Excel application that will be the primary component of a Decision Support System (DSS).

The DSS spreadsheet will be utilized by the corporate Finance Department Manager to reach structured decisions relating to aviation fuel purchasing contracts. To be able to arrive at those decisions, the manager needs data that represents the pricing for two distinct types of aviation fuel, Jet Fuel, and AVgas, that is available from the five different vendors with which the company has accounts. The DSS should present the lowest pricing in U.S. dollars for each of the two types of aviation fuel along with the vendors that offer that pricing.

The following are the dashboard requirements:

Submit the DSS in a Microsoft Excel spreadsheet.
Submit two “MIN” and two “IF” functions.
Format cells with TWO decimal places.
Format the spreadsheet per the steps below.

In Row 1, create a header row with the following labels in bold font:

Column A: Vendor Name
Column B: Jet Fuel Price
Column C: Avgas Price
In Column A, Rows 2 through 6, list the following vendors in non-bold font:

Yellow Plains Fuel
Okie Stokie Fuel
Best Ever Fuel
Smith Bros Fuel
Wild West Fuel
In Columns B and C, Rows 2 through 6, enter imaginary pricing values for all vendors and both types of fuel, keeping the range of values between $5.00 and $10.00 for each type of fuel. The numerical values for each type of fuel must be different.

Format the cells in Columns B and C, Rows 2 through 6 as Currency with TWO decimal places.

Label the cell in Column A, Row 8, “Best Jet Fuel Price” in bold font.
Label the cell in Column A, Row 9, “Jet Fuel Vendor” in bold font.
Label the cell in Column A, Row 11, “Best Avgas Price” in bold font.
Label the cell in Column A, Row 12, “Avgas Vendor” in bold font.
Using Functions and Formulas

Using the MIN function, create a formula for the cell located in Column B, Row 8 that calculates the lowest value for the Jet Fuel pricing available from the five vendors.
Using the MIN function, create a formula for the cell located in Column C, Row 11 that calculates the lowest value for the Avgas pricing available from the five vendors.
Using nested IF functions, create a formula for the cell in Column B, Row 9 that places the name of the vendor determined to have the “Best Jet Fuel Price.”
Select Align Right for the data in the cell located at Column B, Row 9.
Using nested IF functions, create a formula for the cell in Column C. Row 12 that places the name of the vendor determined to have the “Best Avgas Price.”
Select Align Right for the data in the cell located at Column C, Row 12.
Select All Borders for the cells in Columns A, B, and C, Rows 1 through 12.