Posts

Write cognitive objectives with varying levels of abstraction for a knowledge test.

Training knowledge test

Purpose

  • Write cognitive objectives with varying levels of abstraction for a knowledge test.
  • Write knowledge test items using the guidelines for effective test item writing.

In this assignment, you will practice writing cognitive objectives and items for a knowledge test. Specifically, you will write three cognitive objectives and five items on different types of academic integrity violation to evaluate training participants’ knowledge.

You will turn in your responses in a single MS Word document.

Background

You are working as an intern for the Office of Student Conduct this semester. One of your main tasks is to evaluate an existing training program for students. This is an online training program for students to become familiar with the university’s academic integrity policy.

The training program covers the content from EKU’s Academic Integrity Policy.

Develop a Cybersecurity Strategy that presents five or more specific actions (strategies) that the company should take to implement your recommended risk mitigations.

You have been assigned to support the Padgett-Beale Merger & Acquisition (M&A) team working under the direct supervision of Padgett-Beale’s Chief Information Security Officer (CISO). The M&A team is in the planning stages for how it will integrate a new acquisition, Island Banking Services, into the company as its financial services arm (PBI-FS). Initially, PBI-FS will function as a wholly owned subsidiary which means that it must have its own separate cybersecurity program.

Your first major task (Project #1) will be to help develop a Cybersecurity Strategy & Plan of Action for PBI-FS. Island Banking Services never had a formal cybersecurity program so you’re starting from scratch. You will need to research best practices as well as relying heavily upon what you learned in your undergraduate studies in Cybersecurity Management and Policy. The CISO has provided detailed instructions for this task. (These appear after the Background section below.)

Your Gap Analysis should address operating issues relating to confidentiality, integrity, and availability (CIA) of information, information systems, and information infrastructures owned or used by PBI-FS. Your analysis should also consider and use the People, Process, and Technology framework.

Step 1: Identify 10 or more significant cybersecurity issues/challenges/risks which the background information and M&A profile indicate currently exist at PBI-FS / Island Banking Services. You are allowed to “read between the lines” but must be able to map your analysis and findings to specific statements from these documents. These items will become your “Gaps” for the Gap Analysis. Use one or more cybersecurity frameworks or standards (e.g. NIST CSF; People, Processes, and Technologies; Confidentiality, integrity, availability) to organize your analysis.

Note: there was significant criminal behavior found at Island Banking Services. Your analysis must address internal weaknesses which allowed this to occur without being discovered by the employees who were not involved in the crimes.

Step 2: Using your Gap Analysis (step 1) create a Risk Register in which you list 10 or more specific and separate risks. For each risk, assign a category (confidentiality, integrity, availability, people, process, technology) and a severity (impact level using a 1 – 5 scale with 5 being the highest potential impact).

Step 3: Review the laws and regulatory guidance which apply to the Financial Services industry and companies like Island Banking Services. For each entry in your risk register, identify and record the laws, regulations, or standards which provide guidance as to how the identified risks must be addressed or mitigated. Record this in your risk register.

Step 4: Review laws and regulations which apply to all companies, i.e. Sarbanes Oxley, IRS regulations for Business Records, SEC regulations and reporting requirements, etc. Review your Risk Register and either map these requirements to existing entries in your risk register or insert new entries for significant legal or regulatory requirements which you were not able to map to your previously identified risks. (Include risk related to non-compliance.)

Step 5: Review section 1.2 Risk Management and the Cybersecurity Framework in the NIST Cybersecurity Framework v1.1 (https://‌nvlpubs.nist.gov/‌nistpubs/‌CSWP/‌NIST. ‌CSWP. ‌04162018.pdf)

Using this information, determine the best strategy for addressing (“treating”) each of your identified risks. Remember the four types of risk mitigation strategies (accept, avoid, control, transfer).

Consider the business impact for each of your mitigation strategies (e.g. if you applied an “avoid” strategy across the board, the company would not be able to operate in the financial services industry because it would need to shut down all operations).

Record your risk mitigation strategy for each risk in your risk register. For each of your “control” entries, include the corresponding control category and subcategory (if applicable) from the NIST Cybersecurity Framework (see Tables 1 and 2 in version 1.1). Examples: ID.AM Asset Management or PR.AC Identity Management and Access Control. Remember to cite your sources.

Step 6: Develop a Cybersecurity Strategy that presents five or more specific actions (strategies) that the company should take to implement your recommended risk mitigations. Include information from your gap analysis, legal and regulatory analysis, risk analysis and proposed risk mitigations. Under each strategy include information about how the strategy will affect or leverage people, policies, processes, and technologies (hardware, software, infrastructure). Include examples and other pertinent information about Island Banking Services and Padgett-Beale. You should have at least one technology related strategy which includes an updated Network Diagram. This diagram must show the to-be state of the IT infrastructure including recommended mitigating or “control” technologies, e.g. intrusion detection, firewalls, DMZ’s, etc. (start with the diagram provided in this assignment file).

Note: Your strategy will be presented to the Board of Directors by the executive who is leading the Merger & Acquisition Team so make sure that you write in appropriate language and include sufficient detail to explain your recommended strategy.

Step 7: Develop and document a proposed plan of action and implementation timeline that addresses each element of the cybersecurity strategy that you identified previously (in step 6). Provide time, effort, and cost estimates for implementing your recommended actions (include appropriate explanations of your reasoning). Include the resources (people, money, etc.) necessary for completing each task in the timeline.

Step 8: Develop a set of 5 or more high-level summary of recommendations regarding the next steps to take in mitigating the risks that you identified in steps 1-7. These recommendations should logically flow from your analysis and be supported by your Cybersecurity Strategy and Plan of Action.

List and discuss specific interventions utilized to meet the requirements for the chosen core measure

• Introduction and purpose of the paper. Core measure identified
• Identifies & discusses evidence base practice related to core measure topic. Statistical evidence will be included.
• List and discuss specific interventions utilized to meet the requirements for the chosen core measure
• Identifies and discusses how implementation of this core measure will affect YOUR nursing practice.
• Conclusion

Describe what is meant by ERP systems.

Here is the video (copy and paste into your browser):
https://uhdmediasite.uhd.edu/Mediasite/Play/aa5994862511414b8212f65deecdbec01d

1) What are your overall impressions?
2) Describe what is meant by ERP systems.
3) Describe how the video relates to specific topics in the textbook.
4) Do you agree with what Dr. Word is proposing?
5) Could a possible minor in MIS be of benefit in your career? -My major is general business

create a 2-3 page culturegram over a country of your choice

If a marketing plan is to be successful, it will need to fit into the economic, political, legal/regulator, social and cultural environment of a specific country. In Week 2, we will create a 2-3 page culturegram over a country of your choice in the Week 2 – Developing a Culturegram assignment. You will focus your culturegram on different areas: economic and financial factors, national culture and social systems, political environment, and legal and regulatory systems, geographic profile and map, and business culture

What were the cultural differences and similarities of the medical care Lia received?

In the book, The Spirit Catches You and You Fall Down, how did Lia’s healthcare demonstrate or not demonstrate cultural competence. please provide examples. What were the cultural differences and similarities of the medical care Lia received?
How could the United States healthcare team have better handled Lia’s epilepsy and supported her and her family?
What were the defects of the US healthcare system?
What were the positive and negative ways the healthcare team decisions affected Lia’s care?
Who in the healthcare team stood out related to Li’a care and why? What qualities did they manifest?
How was the overall communication between Lia’s family and the healthcare professionals?
Do you feel there was a trust bond between Lia’s family and any particular healthcare professional/s?
What cultural barriers did you notice surfaced during the book?
Why is it important to have a culturally competent healthcare team?
What specific cultural competency factors should have been addressed as a healthcare professional that would have been more helpful and effective in Lia’s care?
Formatting
This book reflection should combine personal and professional examples related to this book.
APA 7th please and thank you.

How are the two Gospels different from one another? (the comparison table will help in this)

Read the article provided called, “Different Ways of Looking at the Birth of Jesus: Narrative strategies in New Testament infancy narratives,” and the biblical accounts in Matthew and Luke and compare them “horizontally.” There is a comparison table provided that helps you find where some of the differences between Matthew and Luke’s Nativity narratives are. Here is a little video from Prof. Helen Bond: https://www.youtube.com/watch?v=uc7_U_mRryg&feature=youtu.be Here is a little video explaining the differences in the genealogies between Matthew and Luke: https://www.youtube.com/watch?v=LvWwMC-I-mo&feature=youtu.be Write an 1100-1250 word (double spaced) essay-response (with an opening, body, conclusion, headings, sub-headings, etc.). I am looking for 3 things:

1. How are the two Gospels different from one another? (the comparison table will help in this)

2. What, in your opinion, best explains these differences?

3. Which Nativity narrative is more historically accurate?

Compose your own company profile and post it to the discussion board

Compose your own company profile (ConnectiveRx https://www.connectiverx.com/) and post it to the discussion board

What’s unique about them?
Their history?
Their mission?
Their work culture?
How do they present their stories?
What is the tone?
Do you like working here? YES, Why
What do you value in an employer?

Punctuation has to be on point and the writing engaging. This is going to be posted in a discussion board, you DON’T need to cite references

What is the difference between screening and assessment for substance abuse?

1. What is the difference between screening and assessment for substance abuse?
2. Think of examples of your own experience with each of the motivational stages during at various times your life. The example does not necessarily need to involve substance abuse. Think about times in your life when you have tried to make a change. List one example for each stage: precontemplation, contemplation, preparation, action, and maintenance. What barriers did you experience that made moving from one stage to another difficult? What was helpful to you as you moved from one stage to the next? What implications does this have for your counseling practice?

Chapter 2

3. The chapter described several counselor qualities and behaviors that are very important in developing a therapeutic alliance and contribute to the quality of the treatment environment. List and discuss the qualities and behaviors that you believe are essential for a counselor to possess. How do you compare? In other words, in reviewing the list, what qualities do you believe you have? What qualities do you need to develop?

What struggles have you encountered along the way, and how do they relate specifically to your social location?

This assignment asks you to critically examine your social location. Our social location is comprised of numerous factors including race, social class, gender, age, sexual orientation, political affiliation, and the physical location in the world where we reside. First, discuss your social location given the parameters previously mentioned. Next, tell me a bit about how you ended up taking this class at the University of Texas at Dallas. First of all, consider yourself lucky. Only about 7% of the world’s population has a college degree. You are all well on your way to earning one.

How was your trajectory set up from an early age? Was it a given that you would attend college? Is your path traditional or non-traditional given your social location relative to others who share it? What kinds of expectations do your family and peers have of you? Do you find these difficult to achieve? Or, has your opportunity structure allowed for a smooth transition through the life cycle up to this point? What struggles have you encountered along the way, and how do they relate specifically to your social location?

This paper should be approximately 2-3 pages in length. It should be double spaced using Times New Roman, 12 pt. font. Include a title that speaks to the content of your paper.