Posts

How common is this disorder? Does it run in specific ethnic bloodlines?

Choose a genetic disorder that can be inherited from a parent. Write a paper on SICKLE CELL ANEMIA. Include the following in your paper:
Summarize the Chromosomal Theory of Inheritance and how chromosomal abnormalities can lead to genetic disorders.
Describe the relationship between chromosomes and DNA.
Identify an example of a genetic disorder and describe the genetic disorder, including symptoms, impact on the quality of life, and life expectancy. How common is this disorder? Does it run in specific ethnic bloodlines?

Why the cities should consider going to medic engines and eliminating rescue ambulances.

Why Cities Should Consider Medic Engines instead of rescue Ambulances Outline

  1. You are the fire chief. The city manager, a former fire chief has asked for a staff report and PowerPoint presentation on whether the city should consider going to medic engines and eliminating the rescue ambulances. The previous city he worked in used a third party service to staff BLS ambulances services through a private company, saving thousands of dollars and eliminating worker compensation claims by 75%, and reducing overtime by 30 %. Explain the advantages/disadvantages and the potential cost saving if any or cost increases in your report/presentation

Introduction

  • The fire menace in cities
  • The city served
  • Overview data on past incidences
  • Overview data on fire department staffing and operational cost
  • The need for functional fire departments
    • Fire fighters
    • Medic engines
    • Rescue ambulances

Collaborations

  • Emergence of ‘Blue-Light Collaboration
  • Collaborations in the contemporary city disaster response
  • Community involvement
  • Importance of blue light collaborations
  • Incorporating police officers into fire stations
  • Cross-service trainings for firefighters
  • Emergency trainings prevents overlapping roles during disasters
  • Provision of life-saving during disasters
  • Effectiveness of Collaborations
  • Stakeholder involvements
  • Outsourcing and cost reduction

Advantages of Medic Engines

  • Utilizing fire station software for gathering responses from fire departments, health departments, and incident scenes
  • Shorter time for training personnel e.g paramedics
  • Lower training costs for the paramedics
  • Quicker response compared to ambulances
  • Increase in on-duty shifts
  • Better service delivery to a larger geographical location
  • The size of the city (population and area size)

Disadvantages of Medic Engines

  • Startup costs may be higher in the absence of substantial savings
  • Recurring costs (staff benefits and equipment) may rise up to $700,000 annually

Potential Cost of Medic Engines

  • Initial start-up costs
  • A medic engine costs around $500,000 while an ambulance goes for around $ 70,000
  • Fuel consumption rounding to about 2-5 miles per gallon of diesel fuel
  • Preventative and maintenance cost approximating to $4500 per annum
  • Paramedic training course cost of $1,200 per trainee

Cost Cutting

  • Reduction in Overall staffing
  • Peak demand staffing
  • Rightsizing of the staff and population coverage
  • Progressive Communication centers
  • Utilizing response data in planning
  • Reduces hiring costs for paramedics by about $ 38,702 per annum per ambulance
  • Better resource allocation and utilization

What role can nurses play in promoting health status through policy changes directly affecting this social determinant?

For this week’s project, you’ll answer three questions related to your opportunity as a nurse and an advocate. The first two questions relate to influencing a bill is traveling through the legislative process. The third question refers you to the social determinants of health as described in your course textbook reading and asks you to think specifically on your role as a nurse in influencing social determinants of health.

In a brief paper (no more than 2 typed pages, 1 inch margins, 12 font Times New Roman or Courier New), answer the questions below. Write each question as a new topic area and then follow with a paragraph or two to answer the question. You may find it necessary to search for answers to the questions outside of the assigned reading. Be sure to use APA guidelines for writing style, spelling and grammar, and citation of sources.

Answer the following questions:

What parts of the lawmaking process does a nurse have an opportunity to influence the final bill passage?
List at least two ways that this influence can take place. In your opinion, would one way be preferable over the other?
Reviewing the social determinants of health, select one to respond to this question:
What role can nurses play in promoting health status through policy changes directly affecting this social determinant?
Submission Details:
Submit your response in a 2-page Microsoft Word document (500 words).
Name your document SU_NSG4068_W2_Project_LastName_FirstInitial.doc.
Submit your document to the Submissions Area by the due date assigned.
Cite sources in the APA format on a separate page.

What effect will each of the following have on the demand for small automobiles such as the Mini-Cooper and Fiat 500?

n 2001 an outbreak of hoof-and-mouth disease in Europe led to the burning of millions of cattle carcasses. What impact do you think this had on the supply of cattle hides, hide prices, the supply of leather goods, and the price of leather goods?
What effect will each of the following have on the demand for small automobiles such as the Mini-Cooper and Fiat 500?
Small automobiles become more fashionable.
The price of large automobiles rises (with the price of small autos remaining the same).
Income declines and small autos are an inferior good.
Consumers anticipate that the price of small autos will greatly come down in the near future.
The price of gasoline substantially drops.
What effect will each of the following have on the supply of auto tires? LO3.3
A technological advance in the methods of producing tires.
A decline in the number of firms in the tire industry.
An increase in the prices of rubber used in the production of tires.
The expectation that the equilibrium price of auto tires will be lower in the future than currently.
A decline in the price of the large tires used for semi trucks and earth-hauling rigs (with no change in the price of auto tires).
The levying of a per-unit tax on each auto tire sold.
The granting of a 50-cent-per-unit subsidy for each auto tire produced
Label each of the following scenarios with the set of symbols that best indicates the price change and quantity change that occur in the scenario. In some scenarios, it may not be possible from the information given to determine the direction of a particular price change or a particular quantity change. We will symbolize those cases as, respectively, “P?” and “Q?”. The four possible combinations of price and quantity changes are:

P ↓ Q? P? Q ↓

P ↑ Q? P? Q ↑

On a hot day, both the demand for lemonade and the supply of lemonade increase.

On a cold day, both the demand for ice cream and the supply of ice cream decrease.

When Hawaii’s Mt. Kilauea erupts violently, the demand on the part of tourists for sightseeing flights increases but the supply of pilots willing to provide these dangerous flights decreases.

In a hot area of Arizona where they generate a lot of their electricity with wind turbines, the demand for electricity falls on windy days as people switch off their air conditioners and enjoy the breeze. But at the same time, the amount of electricity supplied increases as the wind turbines spin faster.

How is the way the problem exists locally similar to or different from the way it exists globally?

OUTLINE AND WHAT NEEDS TO BE COVERED IN PAPER

NEEDS AT LEAST 2 CITATIONS TO BACK UP POINTS MADE

  1. Global Impact: So that the funder can understand the significance of the social problem, you will explain the local and global impacts using a sociological perspective.
  2. Provide an example of how the social problem manifests itself on a local as well as global scale. In what other country or countries does this problem present itself and how?
  3. Compare and contrast the existence of the problem locally versus globally. How is the way the problem exists locally similar to or different from the way it exists globally?
  4. Based on your comparison of the local and global manifestations of the social issue, what conclusions can you draw about the influence of globalization on this specific social issue? How similar or different are the social issues and their repercussions, and what does that mean in relation to the impact of globalization?
  5. Select a key sociological theoretical perspective that best explains why there are similarities and differences in how the social issue presents on a local and global scale, justifying your selection.
  6. Apply SYMBOLIC INTERACTIONISM perspective to explain why there are similarities and differences in how the social issue presents on a local and global scale.
  7. Potential Solution
  8. Compare at least one successful attempted solution with at least one attempted unsuccessful solution to the problem. From your comparison, why did the successful solution succeed, and why did the unsuccessful solution fail? Support your findings with resources from your own research.
  9. Based on your previous research, what suggestion do you have for responding to the identified social issue? Specifically, what do you suggest as an action in responding to the social issue?
  10. Explain why your suggestion is likely to be successful, substantiating with research. Explain how the suggestion takes into account your previous research of attempted solutions and identified best practices.

 

 

Do proposed strategies align with the organizations strengths and improve weaknesses?

HLSC 3P94: Health Administration

Fall 2019

How to Write a Case Analysis

Part 1. Situational Analysis

The purpose of the situational analysis is to demonstrate that you have a clear understanding of the organization and the current situation outlined in the case. There are two components of the situational analysis: an overview and a SWOT analysis.

  1. a) Overview (1/2 page)
  • Describe the organization with respect to:
    • Structure
    • Mission/vision/values
    • Goals/objectives
    • Culture
    • Key stakeholders
  1. b) SWOT Analysis (2-3 pages)
  • Describe the main problem that is apparent in this case with evidence from the case to support that this is the issue
  • Create your SWOT by outlining
    • Strengths/Weaknesses:
      • Internal to the organization
      • 3-4 points for EACH
    • Opportunities/Threats
      • External to the organization
      • 3-4 points for EACH
    • Include your SWOT in a chart format added as an appendix, but in the body of the text you must have a paragraph detailing each section (Strengths, Weakness, Opportunities, Threats)
  • Each point requires proof from the case and/or research to justify its classification as a strength, weakness, opportunity, threat and explain why it is relevant to the situation

When looking at strengths/weaknesses, consider the following:

  • Advantages/disadvantages of proposed change
  • Leadership (structure, knowledge, etc.)
  • Personnel
  • Finances
  • Reputation
  • Quality of services
  • Capabilities (or lack thereof)
  • Time frame/deadlines
  • Historical results of change
  • Culture
  • Structure
  • Partnerships

When looking at opportunities/threats, consider the following:

  • Change patient needs
  • Changing resource availability
  • Changing technology
  • Economic conditions
  • Political climate
  • Partnerships
  • Industry trends

Part 2. Strategic Analysis (3-4 pages)

The purpose of the strategic analysis is to critically appraise the changes that need to be made within the organization to make improvement. Using the information from the SWOT, create recommendations to help move the organization forward based on theories learned in class. When making your own recommendations your goal is to match strengths with environmental opportunities and eliminate or minimize weaknesses to avoid or manage environmental threats. You must use research evidence to support your recommendations.

  1. Analyze the changes proposed within the case:
  • Summarize the proposed changes outlined in the case (your recommendations must be different from the plan identified in the case)
  • Offer a brief assessment of whether the proposed plan is likely to be successful
  1. Create your own recommendations (4) to move the organization in the desired direction
  • Offer four recommendations that have evidence to support their implementation
  • Relate your recommendations to your SWOT (i.e. each recommendation should match a point highlighted in your SWOT)
    • Do proposed strategies align with the organizations strengths and improve weaknesses?
    • Do proposed strategies capitalize upon opportunities and minimize threats?

Additional Details: You should include a minimum of 10 references.  Readings from class can be used but students will be rewarded for conducting a more comprehensive search of the literature to be included in the paper.  APA referencing style must be used.

what are the cybersecurity implications (good or bad) for the selected critical infrastructure sector?

Technology Review #2: Emerging Application of Technology in a Critical Infrastructure

Objective

The purpose of this technology review is to identify, discuss, and evaluate the cybersecurity implications of an emerging application of technology in the context of a critical infrastructure sector. Your selected technology may be hardware, software, or systems that rely upon both hardware and software. Your research will also include an examination of the cybersecurity implications of using this technology in critical infrastructures. This type of research is also referred to as a survey of the literature. Allowable sources for your literature survey are journal articles, papers published in conference proceedings, and research studies published in dissertations.

Overview

Your audience is a group of senior executives who will be meeting to decide which emerging applications of technologies should be selected for a security-focused, Internal Research & Development projects during the next budget cycle. Each of these executives is responsible for developing products and systems that support next generation systems in the nation’s critical infrastructure sectors.

The high-level visibility for your deliverable means that you need to start from a strong foundation of suitable research-based journal articles, papers published in conference proceedings, and doctoral dissertations. The basic question that must be answered about the selected technology is: what are the cybersecurity implications (good or bad) for the selected critical infrastructure sector?

In addition, the executives have expressed the following information needs, which must be met by the deliverable for this assignment:

  • characteristics of the critical infrastructure,
  • characteristics of the technology,
  • use of the technology to support or improve cybersecurity,
  • use of the technology to reduce or manage risk,
  • use of the technology to increase resistance to threats/attacks,
  • use of the technology to decrease vulnerabilities in an existing technology application,
  • use or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their goals.

Instructions

Format your deliverable as a “descriptive or informative” annotated bibliography. The UMUC library provides information about how to complete this type of assignment. See http://sites.umuc.edu/library/libhow/bibliography_apa.cfm (sub-heading “To get started”). APA style is recommended but, you may use another professional format for your annotated bibliography.

In addition to the list of sources and annotations, you must provide an introductory paragraph.

See the rubric for additional requirements for this assignment.

Note: If you have problems accessing any of the library databases, contact the UMUC librarians via the contact methods listed on the library’s home page https://sites.umuc.edu/library/index.cfm . They will be able to assist you with login issues and/or search engine questions (but will not do your research for you).

Choose a Critical Infrastructure Sector

“There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof” (Department of Homeland Security, 2016, p.1).

Choose a critical infrastructure sector to focus your technology review. For definitions of critical infrastructures, see https://www.dhs.gov/critical-infrastructure-sectors. You may wish to choose your emerging application of technology first and then select an appropriate critical infrastructure in which your selected technology can be applied or deployed.

Choose an Emerging Application of Technology

Choose an emerging application of technology that can be used in the computers, digital devices, and other electronic / electrical technologies (including networks and network infrastructures) that are deployed in or used to build, operate, support, or maintain a critical infrastructure sector (e.g. utilities, pipelines, transportation, smart cities, etc.).

Suggested technologies include:

  • Autonomous Vehicles (ground, sea, or air): Transportation Systems Sector
  • Deep Space Communication Networks: Communications Sector
  • Implantable Medical Devices: Healthcare and Public Health Sector
  • Precision Agriculture (integrated systems using satellite imagery, GPS, Sensors, Robots): Food & Agriculture Sector
  • Robot inspectors for physical infrastructures (buildings, roads, railways, pipelines, etc.): Multiple Sectors
  • Smart Grid (also called Advanced Metering Infrastructure): Energy Sector
  • Wearable Sensors for Hazardous Materials Detection (e.g. CBRNE): Emergency Services Sector

You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment.

If you decide to research a technology that is not on the suggested technologies list (see above), you must first request and receive your instructor’s permission.  Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment.

Find Appropriate Sources (“Survey the Literature”)

You may find it helpful to begin by reading the tables of contents for recent issues of the Communications of the ACM, IEEE Computer Magazine, IEEE Pervasive Computing, and IEEE Security & Privacy. These professional journals frequently publish highly readable, research-based articles about the cybersecurity implications of new and emerging technologies in the context of critical infrastructure sectors.

Next, brainstorm keywords that you can use to find additional articles, papers, and other scholarly publications (“sources’) which discuss and/or evaluate your selected emerging application of technology in the context of your chosen critical infrastructure.

Allowable source types are: (a) professional journals, (b) conference proceedings, (c) dissertations or theses, and (d) technical magazines (published by either the ACM or IEEE). Each of your selected sources must have a reference list containing at least 3 references for authoritative papers. (See http://sites.umuc.edu/library/libhow/scholarlyjournals.cfm)

Your selected sources must come from publications indexed in one or more of the following library databases:

Since the point of this search is to find information about emerging applications of technology for a critical infrastructure, your sources must have a publication date of 2015 or later (2015, 2016, 2017, 2018, 2019, 2020). For papers indexed in Science Direct, you may also use papers that are marked “In Press.”

To complete this part of the assignment, you may need to review 15 – 20 sources (search results) in order to find 10 papers or articles that are usable for this assignment. The sources you choose must provide technical information about your selected technology (see selection requirements for each paper).

Create Your Bibliography (List of Sources)

Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on the ones that give details about your technology and how it can be used in an emerging application of technology. Next, write the reference list entry (APA, MLA, or another appropriate professional citation style) for each source. Alphabetize your list of reference list entries. After you have the correctly ordered list, number your entries from 1 to 10. Note: different reference entry formats are used for different types of sources. Review the UMUC Library’s “Get Help > Citing and Writing for samples and explanations of the formatting rules. If you are using APA format, your list should look something like the following.

  1. (date). Article title. Publication name, vol(issue), #-#.
  2. (date). Paper title. Published in the Proceedings of conference-name, pp. #-#.
  3. Author …

Write Your Annotations

In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry for each source. For this assignment, the annotation should be a combination of factual information from the source and your evaluation (opinion) of that information. To accomplish this, you should read the abstract, introduction section, and closing sections for each article or paper. For dissertations, look over the Introduction and the Literature Review (usually Chapters 1 & 2). From this information, develop a one to three paragraph informative or descriptive summary of the source that includes: (a) a description of technology and its characteristics, (b) planned uses of the technology in the critical infrastructure, and (c) your thoughts and opinions as to how you could use this paper to justify selecting the technology for an Internal Research & Development study.

In each annotation, you should provide at least one specific example of a characteristic and/or application of the technology, e.g. an emerging technology, which impacts cybersecurity.

For example, for an annotation for an article about robots used to inspect dams and bridges, you could focus upon the need to secure the WiFi communications used to operate the device (“command and control” links). Improving the security of the WiFi transmissions would reduce the risk that attackers could take control of the robot or otherwise interfere with its operations.  This in turn will decrease the probability of loss of availability caused by a successful attack. Decreasing the probability of a negative event will decrease the risk associated with that event

Note: Remember that the security posture of a system or product is framed in terms of risk, threats, vulnerabilities, etc. Improvements to the security posture (positive security implications) will result in reduced risk, increased resistance to threats or attacks, and decreased vulnerability.  Negative impacts on the security posture will result in increased risk, decreased resistance to threats / attacks, and increased vulnerability (weakness).

As you write the annotations for each article / paper / dissertation, make sure that you include YOUR thoughts and ideas about the security implications of this technology. Use standard terminology per the resources in this course and in your previous coursework.

As you brainstorm the security implications of this technology (if these are not specifically discussed by your source), you should consider use of the technology to improve cybersecurity. Then consider applications or uses which will negatively impact the security posture of the identified critical infrastructure. It is very important that you consider BOTH SIDES OF THIS ISSUE.

Putting It All Together

  1. Consult the grading rubric for specific content and formatting requirements for this assignment.
  2. Your 5-8 page annotated bibliography should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.
  3. Your paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts Review for recommended resources.
  4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.
  5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count.
  6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
  7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

 

Do you have passwords that can be cracked in your password file? Why? Why not?

Turn-In Requirements:
Lab reports will be 5 to 8 pages in length (single-spaced in font size 12). The title page does not count as one of the pages for the report. The bibliography will not count as one of the page requirements. Appendices will not count as pages for the report. All references will be properly cited throughout the report.

2) Download the SAM and SHADOW files to crack.
3) The recommended environment is Kali VM
4) Crack the Shadow file using John the Ripper (JTR) or Johnny.
5) Crack the SAM file using ophcrack (or SamInside).
6) Experiment with online hash cracking site Crack Station to see if you can produce similar results.
7) Next, find your computer’s password file
a. What is the filename?
b. Where is it located?
c. Can you copy it? Why? Why not?
d. Do you have passwords that can be cracked in your password file? Why? Why not?
e. How can you crack the passwords in your password file?
8) Provide a 5- to 8-page lab report, which must include:
a. A discussion about the password cracker programs you used and any issues you had running the software
b. The cracked passwords and a discussion as to why each individually may not have been a good password
c. Answers to the questions in Step 7.
d. A discussion on what makes a good password policy, an assessment of the policy enforced in your work or school environment, and how passwords are related to identity access management systems

Importance for research, practice and education – is the scientific value and contribution of the framework evident?

A conceptual framework for educational design at modular level to promote transfer of learning

Yvonne Botma,G.H. Van Rensburg,I.M. Coetzee &T. Heyns

Pages 499-509 | Published online: 02 Dec 2013

In this articleClose

Abstract

Students bridge the theory–practice gap when they apply in practice what they have learned in class. A conceptual framework was developed that can serve as foundation to design for learning transfer at modular level. The framework is based on an adopted and adapted systemic model of transfer of learning, existing learning theories, constructive alignment and the elements of effective learning opportunities. A convergent consensus-seeking process, which is typical of a qualitative approach, was used for expert review. The final conceptual framework consists of two principles: establishing a community of learning and the primacy of a learning outcome. The four steps entail the following: (1) activation of existing knowledge; (2) engaging with new information; (3) demonstrating competence; and (4) application in the real world. It is envisaged that by applying the framework educators in health care will design for transfer of learning, resulting in quality of care and optimal patient outcomes.

Keywords: conceptual frameworkmodular designtheory–practice gaptransfer of learning

Introduction

The unifying aim of all educators in health care is to enable students to render quality health care and to apply what they have learned in the classroom and simulation laboratories to real-world situations (Lauder, Sharkey, & Booth, 2004). This process of application in the real world is known as ‘transfer of learning’ or ‘theory–practice integration’. Holton, Bates, Bookter, and Yamkovenko (2007) state that transfer of learning is the degree to which students apply to their jobs the knowledge, skills, behaviours and attitudes they have gained in training. Transfer of learning is demonstrated by a competent student. Goudreau et al. (2009) summarise competency as follows ‘… thus allows one to deal with different situations by drawing on concepts, knowledge, information, procedures, and methods. It incorporates many elements, mobilises knowledge, and strategically marshals capabilities in accordance with the specific nature of the situation’ (p. 3). Facilitation of problem solving, reflection, decision-making, critical reasoning and relevant other skills is necessary to give students the opportunities to become (Jerlock, Falk, & Severinsson, 2003). However, transfer of learning does not always occur. Many organisations have found that about 10–20% of training is ever applied in the real world (Ford, 2009; Kirwan & Birchall, 2006). Failure to transfer learning occurs for several reasons, and these may be grouped as factors within the student, design of the learning sessions, and organisational climate or workplace environment. The relationship of these factors is illustrated in Figure 1. Student characteristics, educational design and workplace culture influence students’ motivation to learn and to transfer learning and, in this way, performance in the clinical environment.

Figure 1. Systemic model of transfer of learning, adopted and adapted from Donovan and Darcy (2011).

Display full size

In order to promote transfer of learning, the educator must consider these factors when designing at modular level. For many educators, it becomes a daunting task, and they do not know where to start. It is the purpose of this article, therefore, to provide the conceptual framework that could serve as the foundation to design module themes in such a manner that it will promote transfer of learning.

Methodology

Developing conceptual frameworks involves identifying specific concepts, defining these concepts and then linking, integrating and aligning these to form a framework (Brink, Van Der Walt, & Van Rensburg, 2006; Rycroft-Malone & Bucknall, 2010). Initially, the first author of this article developed a conceptual framework of how to seamlessly incorporate simulation as a teaching and learning technique because the higher education institution she is affiliated with acquired authentic learning spaces with a number of human simulators.

Conceptual frameworks can be abstract, broad or skeletal in order to provide tapered information on a specific theme (Rycroft-Malone & Bucknall, 2010, p. 27). An in-depth literature review was conducted with regard to learning theories, competence, educational design and simulation. The literature review was later extended to include transfer of learning and/or learning and the theory–practice gap. In other words, the focus of the initial conceptual framework was changed from simulation to transfer of learning, because simulation is but one technique to promote transfer of learning. This framework provides a frame of reference to organise the thinking, problem solving and application needed in the clinical and non-clinical educational modules or themes.

The efficiency and usefulness of the conceptual framework is to assist and guide educators to describe the principles of a particular field to enhance the transfer of learning in a context. The use of the conceptual framework is set out in a systematic manner, which leads to the potential to explore and investigate the transfer of learning in different contexts.

Influential theories

Learning theories have reshaped themselves from behaviourism to information processing to constructivism. Recognising that context and culture influence memory and cognition forced researchers to explain personal meaning and the nature of reality and its representations. Consequently, social and radical constructivism developed with the following four principles:

Learning is an active process according to which learners construct their own knowledge;
Cognition is an adaptive process;
Meaning making is a subjective process and does not render an accurate representation of reality; and
Social, cultural, language and biological/neurological processes influence knowing (Yilmaz, 2008).

Educators usually have an eclectic approach to learning theories because they seldom support only one theory but consider instead what each has to offer. Therefore, Piaget’s view of learning, Vygotsky’s theory of interactional learning and Ausubel’s concept of meaningful learning may all be considered relevant by an educator. Cognitive science and cognitive psychology confirm that the process of constructing knowledge is dependent on existing knowledge, the context or situation, and internalisation of information in an organised cognitive structure (Bruce, Klopper, & Mellish, 2011). This constructivistic approach interrelates well with Kolb’s experiential learning theory, which postulates that knowledge is created from understanding to transforming experience (Kolb, Boyatzis, & Mainemelis, 2000). Kolb’s model postulates that observations and reflections occur upon concrete experiences. These reflections are internalised and abstract concepts are formed with associated possible consequences of action. The possible associated consequences can be actively tested for validity and inform future actions in similar situations (Kolb et al., 2000). On the basis of these viewpoints of learning, it is clear that the focus of learning outcomes has shifted from content to competence (Braband, 2008; Brandon & All, 2010).

With the constructivist approach, the educator becomes a facilitator of learning. For this reason, the responsibility of the educator–facilitator is to create learning opportunities for students to process new information and link it to existing mental frameworks through individual or social activity. However, prior knowledge needs to be retrieved before the student is able to link the new knowledge to it. Through this process, the new information is comprehended, and meaning making occurs or knowledge is constructed.

Learning opportunities are created within a complex system that consists of the educator, student, teaching context, teaching and learning activities, outcomes and student assessment tasks (Biggs, 1996) and should take the clinical environment into consideration. The starting point for creating learning opportunities is to clarify the learning outcome or competence (Biggs, 1996) that the professional person must demonstrate. Kouwenhoven defines competence as the capacity to demonstrate up to a predetermined standard the key occupational tasks that characterise a profession (Kouwenhoven, 2010). According to Braband (2008), students are competent when they have the capacity to apply their knowledge and skills with an appropriate attitude in various environments and circumstances. In other words, when foundational knowledge (content), procedural knowledge (how to do) and conditional knowledge (when to do) become functional knowledge (Biggs, 1996).

The elements of learning opportunities that promote competence are activation of existing knowledge to serve as a foundation for new knowledge; application of knowledge in real-world settings; active engagement of students in real-time and real-world situations; practicing of assessment, critical thinking, communication and leadership skills through collaborative learning processes; multiple authentic formative assessments to ensure mastery of the complete competence; and objective assessment measures that are clearly aligned with expected competencies (Carraccio, Wolfsthal, Englander, Ferentz, & Martin, 2002; Merrill, 2002). It is the responsibility of the educator to ensure that all teaching and learning activities are aligned with the outcome, reality and assessment tasks whilst it is students’ responsibility to actively engage with the learning material in order to internalise the theory and skills and in this way construct new knowledge (Reaburn, Muldoon, & Bookallil, 2009).

Development, evaluation and refinement of conceptual framework

From an extensive literature review, a conceptual framework was drafted by the first author, who is a member of a community of practice with a focus on scholarship of teaching and learning. This first author of this article presented the initial conceptual framework and supporting literature exploration to the rest of the team for a purposive review. In an attempt to refine and finalise the conceptual framework, a process of expert review was utilised. The community of practice consists of educators in health care that have experience in: personal research, supervising postgraduate students, developing guidelines and being active practitioners who facilitate learning.

The purpose of the critical review was to assess whether the framework could be accepted as it was described; found acceptable but with recommendations for change or improvement; or found not to be acceptable at all. The group entered into a process of expert evaluation by critiquing the conceptual framework based on criteria set by Tastle, Wierman, and Dundum (2005). These criteria entailed:

Clarity, simplicity and consistency – are constructs concrete and precise with clear descriptions?
Appropriateness, relevance and comprehensiveness – are all aspects of transfer of learning addressed?
Applicability, practicality and usability – are there potential barriers in terms of implementation- and cost implications?
Adaptability and transferability – are constructs transferable to various contexts and circumstances?
Credibility – is the framework based on an extensive and critical literature review?
Importance for research, practice and education – is the scientific value and contribution of the framework evident?
Trustworthiness/validity – has a correct interpretation of the available evidence been drawn up to support the implementation of the framework?

To facilitate a well-informed review, a process was followed that involved reading, re-reading and internalising the initial framework and supportive literature, followed by academic debate. The criteria listed immediately above were kept in mind. Agreement and consensus building are complex processes that require a thorough understanding of what is to be reviewed or assessed. The review was approached in a qualitative manner through a convergent process. Convergent processes include consensus formation regarding topics or aspects of topics that need to be addressed, their significance and the most effective means to address them. Tastle et al. (2005) describe consensus as a function of shared team feelings towards an issue. Although these authors suggest a rating scale to capture these feelings [views] and to measure the extent to which a person agrees or disagrees with the issues put forward, the principle of consensus formation could also be applied to a qualitative approach to the review process.

The review discussions were based on an understanding of convergence amongst the members as experts and focused on the key constructs of a well-structured conceptual framework. These constructs were regarded as clear, appropriate, applicable, adaptable, practical and credible and have value as proposed by Polit and Beck (2008). Polit and Beck’s (2008) criteria are in accordance with those of Tastle et al. (2005) that were initially used for review. The review process enabled the members of the community of practice to refine and finalise the conceptual framework. Changes were made to the extent of the framework so as not to limit it to the clinical environment. Focus was placed more on principles of transfer of learning rather than specific activities. It was agreed that these changes would make the framework more useful in a broader context of teaching and learning.

Conceptual framework

On the basis of the principles of constructivism as a learning theory, constructive alignment and the elements of effective learning opportunities, a conceptual framework was developed to guide educators on how to design themes for modules that would promote transfer of learning.

The conceptual framework consists of four steps – the activation of existing knowledge, engagement with new information, demonstration of competence and application in real-world practice. (Refer to inner circle in Figure 2). Criteria for successful implementation can be identified for each of these steps. (Refer to the four squares in Figure 2). These four steps or phases are dependent on two principles – the primacy of learning outcomes and the demand that learning takes place within a community of learning. The four steps have as their objective the transfer of learning.

Figure 2. Conceptual framework for educational design at modular level to promote transfer of learning.

Display full size

Principles

Establish a community of learning

Fellow students, facilitator(s) and experts in the field constitute a community of learning that assists in developing students’ communication, critical thinking skills and the ability to elaborate and defend their views to others of different opinions (McLoughlin, 2001). Interaction amongst members of the learning community may occur face to face or through the use of electronic media (Kala, Isaramalai, & Pohthong, 2010) and helps to build cognitive bridges (Brandon & All, 2010). The quality and quantity of engagement and interaction are amongst other factors dependent on the degree of the presence of the facilitator (Reaburn et al., 2009).

The primacy of learning outcomes

Researchers in cognitive psychology have shown that deep learning occurs when learners solve authentic problems, in such a way realising the relevance of what they have learned (Merrill, 2002). For this reason, the educator should identify what a person at entry level into a profession should be able to do. Once that has been identified, it becomes the completion of the following stem sentence: ‘On completion of this module/theme the student will be able to …’.

Four steps

Step 1: activate existing knowledge

As stated earlier, knowledge construction occurs when new information is integrated into existing mental schemas. Clark and Harrelson (2002) state that instructional events that activate relevant prior knowledge in long-term memory and stimulate internalisation in working memory supports knowledge construction. However, in practice, many educators immediately start with new learning material without identifying the students existing knowledge. It is therefore essential to determine whether the students have had any relevant experience and what that experience entailed. Information-orientated pretests are unproductive in activating prior experience (Merrill, 2002). In order to incorporate new information, existing schemas need to be recalled and modified. Existing knowledge and its related schema is often activated through story telling of lived experiences and guided reflection (Biggs, 1996). Doolittle and Camp (1999) state that it may be necessary to deconstruct an existing ‘incorrect’ concept and then to (re)construct the appropriate concept before continuing with the desired teaching and learning activities (Doolittle & Camp, 1999). This description fits with Mezirow’s transformative learning as cited by Clapper (2010, p. e10); namely, that ‘it is a process of using a prior interpretation to construe a new or revised interpretation of one’s experience in order to guide future action’ (Clapper, 2010). The motivation to learn increases when students realise the relevance of the theoretical content.

Step 2: engage with new information

Learning is enhanced when the learning activities are aligned with the outcome or expected competence (Biggs, 1996). The engagement phase is student centred and outcome focussed because deep learning is promoted when students are actively engaged with the aim of making sense of the information by seeking integration between content and tasks (Pascoe & Singh, 2008; Rust, 2002; Sefton, 2006). Students demonstrate engagement when they discuss information, think about it, or use and apply the information to solve real-life problems or challenges. Sefton (2006) recommends that students develop these skills progressively throughout the educational programme. Furthermore, students should know their learning style and preferred learning techniques to become life-long learners (Biggs, 1996; Boud & Falchikov, 2006; Fink, 2003; Pascoe & Singh, 2008).

Content and skills should be pared down to what is essential to meet the learning outcome (Brandon & All, 2010; Pascoe & Singh, 2008). Forbes and Hickey (2009) advise that educators should ask themselves whether the information will be used in the majority of situations in the specified context. When planning engaging learning activities, the facilitator should take into consideration that learning occurs best when more than one sense is involved – for example, when students see and hear (Clark & Harrelson, 2002). Engagement should occur in all domains of learning and students should be offered opportunities to observe and practice how to perform certain skills correctly, because personal experiences are necessary for enhanced functioning within one’s professional environment (Doolittle & Camp, 1999). The emphasis during the engagement phase is on mastering content, becoming proficient in certain tasks and being actively engaged in the process of learning through various student-centred teaching methods. After the engagement phase, students should be given the opportunity to demonstrate what they have learned.

Step 3: demonstrate competence

All learners within a professional programme progress from a novice to competent practitioner (Benner, Sutphen, Leonard, & Day, 2010). Novices are characterised by strict adherence to rules or plans with little situational perception and little ability to make discretionary judgments. At this level, students need much guidance and support. At a competent level, students have a broader understanding of the situation and can make more intuitive decisions (Roberts, Gustavs, & Mack, 2012). Expertise is acquired through extensive involvement in activities that are specifically designed to improve performance (Ward, Hodges, Starkes, & Williams, 2007). Educators should, however, recognise that this involvement is still part of the learning cycle and students also learn through their mistakes (Allan, Smith, & O’Driscoll, 2011). When students are not skilled in what they need to do the specific incompetency should be identified and strategies implemented that give the student the opportunity to deliberately practice to become competent in those identifies areas (Clapper & Kardong-Edgren, 2012).

Step 4: apply in real world

Health care systems are workforce- and service orientated rather than learning oriented (Allan et al., 2011). Therefore, the workplace climate or organisational culture influences learning and is not always conducive to learning. Maben, Latter, and Clark (2006) describe the pressures and constraints of the system and professionals as organisational and professional sabotage. The sabotage may be due to time pressure, role constraints, staff shortage and poor skills mix, work overload, task orientation and high patient turnover. It is therefore essential to plan during the educational design phase how to support students in the workplace in order to enhance transfer of learning, thus applying it in the real world.

Discussion

Following the principles and the steps in this conceptual framework may enable students to apply what they have learned independently in different contexts over an extended period of time. In other words, the students will demonstrate their functional knowledge when they know when and how to use the content and skills that they have learned appropriately.

Known learning theories have been used to underpin the framework that could assist educators to design at modular level in order to enhance transfer of learning or bridge the well-described theory–practice gap (Allan, 2011; Maben et al., 2006). Although the initial conceptual framework was widely used in the institution where the first author works, the refined conceptual framework needs to be applied outside that institution in clinical and non-clinical contexts. The rigour of the review process was enhanced by the fact that none of the experts are associated with the higher education institution of the first author. Furthermore, an independent skilled moderator facilitated the review process and thus reduced bias.

It is envisaged that by applying the framework, educators in health care will design for transfer of learning, resulting in quality of care and optimal patient outcomes. Furthermore, the principles and steps of the framework may culminate in a standardised educational design template used during the design process. This conceptual framework should become an integral part of curriculum development and could be applied in any professional educational context.

It is recommended that the conceptual framework be evaluated once it has been implemented to determine whether transfer of learning occurred. Strategies to strengthen educators and clinical facilitators in applying the principles underlying the framework will become key to the value and contribution of this framework. The conceptual framework can be utilised to guide and contribute to the methodological approach for future research in the transfer of knowledge.

Conclusion

In order to address the challenge that educators face in designing for transfer of learning the conceptual framework was developed that could serve as the foundation to educational design. This framework provides principles and steps that could assist in developing modular themes in such a manner that students are able to apply in practice what they have learned in theory. Existing mental schemas are recalled in preparation for the creation of new knowledge. Competence and expertise are developed within a community of learning during the engagement phase during which students are actively involved with learning activities that are well designed and aligned with the outcome and their learning needs. Students are afforded the opportunity to demonstrate their competence through various techniques of which simulation is an example. The framework further emphasises that learning in the workplace is part of the educational design and educators must consider how to support students in the workplace. Student support in the workplace can no longer be relegated to the service provider. The approach described in this article could assist educators in health care in applying overlapping principles of learning theories.

The principality of sound outcomes and a community of learning is emphasised in this conceptual framework. A health care professional needs to demonstrate functional knowledge, which is the attainment of a sound learning outcome. As a result, it is envisaged that successful application of this framework could cultivate a culture of lifelong learning that is a desired outcome for students studying for a professional degree.

Notes on contributors

Yvonne Botma is an associate professor with an interest in educational strategies to enhance theory–practice integration. She teaches research methodology and trains clinical preceptors to support nursing students in applying their classroom knowledge in practice.

Gisela H. Van Rensburg is a professor in health studies and teaches research methodology at an open distance learning university. Her research focus is innovative student support strategies, including support of postgraduate students through group facilitation and various reflective practices.

Isabel Coetzee is a critical care nurse educator who promotes practice development in critical care units in public and private hospitals. She facilitates postgraduate students in critical care nursing to become competent nurse clinicians.

Tanya Heyns is keen on practice development, especially in emergency care rooms and critical care units as she teaches emergency care to postgraduate nursing students. She is a firm believer of appreciation and the strength of positive reinforcement.

References

  1. Allan, H. T. (2011). Using psychodynamic small group work in nurse education: Closing the theory–practice gap? Nurse Education Today,31, 521–524. doi:10.1016/j.nedt.2010.09.00610.1016/j.nedt.2010.09.006

[Crossref][PubMed][Web of Science ®]

[Google Scholar]

  1. Allan, H. T., Smith, P., & O’Driscoll, M. (2011). Experiences of supernumerary status and the hidden curriculum in nursing: A new twist in the theory–practice gap? Journal of Clinical Nursing,20, 847–855. doi:10.1111/j.1365-2702.2010.03570.x10.1111/jcn.2011.20.issue-5-6

[Crossref][PubMed][Web of Science ®]

[Google Scholar]

  1. Benner, P., Sutphen, M., Leonard, V., & Day, L. (2010). Educating nurses: A call for radical transformation. San Fransisco, CA: Jossey-Bass.

[Google Scholar]

  1. Biggs, J. (1996). Enhancing teaching through constructive alignment. Higher Education,32, 347–364.10.1007/BF00138871

[Crossref][Web of Science ®]

[Google Scholar]

  1. Boud, D., & Falchikov, N. (2006). Aligning assessment with long-term learning. Assessment & Evaluation in Higher Education,31, 399–413. doi:10.1080/02602930600679050

[Taylor & Francis Online]

[Google Scholar]

  1. Braband, C. (2008). Constructive alignment for teaching model-based design for concurrency. Lecture Notes on Computer Science,5100, 1–18.10.1007/978-3-540-89287-8

[Crossref]

[Google Scholar]

  1. Brandon, A., & All, A. (2010). Constructivism theory analysis and application to curricula. Nursing Education Perspectives,32, 89–92.

[Google Scholar]

  1. Brink, H., Van Der Walt, C., & Van Rensburg, G. (2006). Fundamentals of research methodology for health care professionals(2nd ed.). Cape Town: Juta.

[Google Scholar]

  1. Bruce, J., Klopper, H., & Mellish, J. (2011). Teaching and learning the practice of nursing(5th ed.). Cape Town: Pearson Education.

[Google Scholar]

  1. Carraccio, C., Wolfsthal, S. D., Englander, R., Ferentz, K., & Martin, C. (2002). Shifting paradigms: From Flexner to competencies. Academic Medicine: Journal of the Association of American Medical Colleges,77, 361–367.10.1097/00001888-200205000-00003

[Crossref][PubMed][Web of Science ®]

[Google Scholar]

  1. Clapper, T. C. (2010). Beyond Knowles: What those conducting simulation need to know about adult learning theory. Clinical Simulation in Nursing,6, e7–e14. doi:10.1016/j.ecns.2009.07.00310.1016/j.ecns.2009.07.003

[Crossref]

[Google Scholar]

  1. Clapper, T. C., & Kardong-Edgren, S. (2012). Using deliberate practice and simulation to improve nursing skills. Clinical Simulation in Nursing,8, e109–e113. doi:10.1016/j.ecns.2010.12.00110.1016/j.ecns.2010.12.001

[Crossref]

[Google Scholar]

  1. Clark, R., & Harrelson, G. L. (2002). Designing instruction that supports cognitive learning processes. Journal of Athletic Training,37, S152–S159.

[PubMed]

[Google Scholar]

  1. Donovan, P., & Darcy, D. P. (2011). Learning transfer: The views of practitioners in Ireland. International Journal of Training and Development,15, 121–139.

[Crossref]

[Google Scholar]

  1. Fink, L. (2003). A self-directed guide to designing courses for significant learning. San Fransisco, CA: Jossey-Bass.

[Google Scholar]

  1. Forbes, M. O., & Hickey, M. T. (2009). Curriculum reform in Baccalaureate nursing education: Review of the literature. International Journal of Nursing Education Scholarship6(1), Article 27. doi:10.2202/1548-923X.1797

[Crossref][PubMed]

[Google Scholar]

  1. Ford, L. (2009). Improving training transfer. Industrial and Commercial Transfer,41, 92–96. doi:10.1108/0019785091093913510.1108/00197850910939135

[Crossref]

[Google Scholar]

  1. Goudreau, J., Pepin, J., Dubois, S., Boyer, L., Larue, C., & Legault, A. (2009). A second generation of the competency-based approach to nursing education. International Journal of Nursing Education Scholarship, 6, 1–15. doi:10.2202/1548-923X.1685

[Crossref]

[Google Scholar]

  1. Holton, E. F., Bates, R. A., Bookter, A. I., & Yamkovenko, V. B. (2007). Convergent and divergent validity of the Learning Transfer System Inventory. Human Resource Development Quarterly,18, 385–419. doi:10.1002/hrdq10.1002/(ISSN)1532-1096

[Crossref]

[Google Scholar]

  1. Jerlock, M., Falk, K., & Severinsson, E. (2003). Academic nursing education guidelines: Tool for bridging the gap between theory, research and practice. Nursing & Health Sciences,5, 219–228.

[Crossref][PubMed]

[Google Scholar]

  1. Kala, S., Isaramalai, S.-A., & Pohthong, A. (2010). Electronic learning and constructivism: A model for nursing education. Nurse Education Today,30, 61–66. doi:10.1016/j.nedt.2009.06.00210.1016/j.nedt.2009.06.002

[Crossref][PubMed][Web of Science ®]

[Google Scholar]

  1. Kirwan, C., & Birchall, D. (2006). Transfer of learning from management development programmes: Testing the Holton model. International Journal of Training and Development,10, 252–268. doi:10.1111/j.1468-2419.2006.00259.x10.1111/(ISSN)1468-2419

[Crossref]

[Google Scholar]

  1. Kolb, D. A., Boyatzis, R. E., & Mainemelis, C. (2000). Experiential learning theory: Previous research and new directions. In R. Sternberg & L. Zhang (Eds.), Perspectives on cognitive, learning, and thinking styles(pp. 1–40). London: Lawrence Erlbaum.

[Google Scholar]

  1. Kouwenhoven, W. (2010). Competence-based curriculum development in higher education: Some African experiences. In M. Cantrell, M. Kool, & W. Kouwenhoven (Eds.), Access & expansion: Challenges or higher education improvement in developing countries(pp. 125–146). Amsterdam: VU University Press.

[Google Scholar]

  1. Lauder, W., Sharkey, S., & Booth, S. (2004). A case study of transfer of learning in a family health nursing course for students in remote and rural areas. Nurse Education In Practice,4, 39–44. doi:10.1016/S1471-5953(03)00017-910.1016/S1471-5953(03)00017-9

[Crossref][PubMed]

[Google Scholar]

  1. Maben, J., Latter, S., & Clark, J. M. (2006). The theory-practice gap: Impact of professional-bureaucratic work conflict on newly-qualified nurses. Journal of Advanced Nursing,55, 465–477. doi:10.1111/j.1365-2648.2006.03939.x10.1111/jan.2006.55.issue-4

[Crossref][PubMed][Web of Science ®]

[Google Scholar]

  1. McLoughlin, C. (2001). Inclusivity and alignment: Principles of pedagogy, task and assessment design for effective cross-cultural online learning. Distance Education,22, 7–29.10.1080/0158791010220102

[Taylor & Francis Online]

[Google Scholar]

  1. Merrill, M. D. (2002). First principles of instruction. Educational Technology Research and Development,50, 43–59. doi:10.1007/BF0250502410.1007/BF02505024

[Crossref][Web of Science ®]

[Google Scholar]

  1. Pascoe, M., & Singh, S. (2008). ‘By the end of this course you should be able to …’: Towards constructive alignment in the slp curriculum. The South African Journal of Communication Disorders,55, 91–110.

[PubMed]

[Google Scholar]

  1. Polit, D. F., & Beck, C. T. (2008). Nursing research: Generating and assessing evidence for nursing practice(8th ed.). Philadelphia, PA: Lippincott Williams & Wilkins.

[Google Scholar]

  1. Reaburn, P., Muldoon, N., & Bookallil, C. (2009, December). Blended spaces, work based learning and constructive alignment: Impacts on student engagement.In Same places, different spaces. Proceedings Ascilite Aucklandhttp://www.ascilite.org.au/conferences/auckland09/procs/raeburn.pdf

[Google Scholar]

  1. Roberts, T. V., Gustavs, J., & Mack, H. G. (2012). Becoming an expert: A review of adult learning theory and implications for vocational training in ophthalmology. Clinical & Experimental Ophthalmology,40, 519–526. doi:10.1111/j.1442-9071.2011.02716.x

[Crossref][PubMed][Web of Science ®]

[Google Scholar]

  1. Rust, C. (2002). The impact of assessment on student learning: How can the research literature practically help to inform the development of departmental assessment strategies and learner-centred assessment practices? Active Learning in Higher Education,3, 145–158. doi:10.1177/146978740200300200410.1177/1469787402003002004

[Crossref]

[Google Scholar]

  1. Rycroft-Malone, J., & Bucknall, T. (2010). Models and frameworks for implementing evidence-based practice: Linking evidence to action. Oxford: Blackwell.

[Google Scholar]

  1. Sefton, A. J. (2006). New approaches to medical education: An international perspective. Medical Principles and Practice: International Journal of the Kuwait University, Health Science Centre,13, 239–248. doi:10.1159/000079521

[Crossref][Web of Science ®]

[Google Scholar]

  1. Tastle, W., Wierman, M., & Dundum, U. (2005). Ranking ordinal scales using the consensus measure. Issues in Information SystemsVI, 96–102.

[Google Scholar]

  1. Ward, P., Hodges, N. J., Starkes, J. L., & Williams, M. A. (2007). The road to excellence: Deliberate practice and the development of expertise. High Ability Studies,18, 119–153. doi:10.1080/1359813070170971510.1080/13598130701709715

[Taylor & Francis Online][Web of Science ®]

[Google Scholar]

  1. Yilmaz, K. (2008). Constructivist suggestions constructivism: Its theoretical underpinnings, variations, and implications for classroom instruction. Educational Horisons, Spring, 161–172.

[Google Scholar]

 

What is the P/E ratio of this company? How does the P/E ratio compare to other companies in this industry?

For your second SLP assignment, continue to do research on the company you chose to write about for your Module 1 SLP. This time you will be doing research about the valuation of the company to try to determine if its stock price is overvalued or undervalued. You can use Google Finance, Yahoo Finance, or similar Web pages to find the financial information about this company.
Write a 2- to 3-page paper with the following items:
1. What is the P/E ratio of this company? How does the P/E ratio compare to other companies in this industry? Based on the P/E ratio, do you think the company is overvalued or undervalued?
2. Find the company’s balance sheet. Calculate the book value of each share. This can be done by taking the total assets and subtracting total liabilities. Then divide the number you get by the total number of outstanding shares. Is the number you get higher or lower than the current price of the share? Based on what you’ve found, would you say the stock is overvalued or undervalued?
3. Finally, do a search on what different analysts have to say about your company. Do they generally recommend buying the stock or selling the stock? What reasons to they give for their assessment? Find at least three analyst reports about this company.
NOTE: Module 1 SLP paper is attached for reference to ensure the same company is used.