Posts

To what extent is it justifiable to curb Human rights in order to prevent terror attacks?

CRITICAL PERSPECTIVE ON TERRORISM AND COUNTER TERRORISM

ESSAY QUESTION :To what extent is it justifiable to curb Human rights in order to prevent terror attacks?

Discuss your growing understanding of qualitative and quantitative methods; use examples from research reports/studies to highlight how these different methods approach social issues; find through the library one qualitative study and one quantitative.

Research methods

TASK
Discuss your growing understanding of qualitative and quantitative methods; use examples from research reports/studies to highlight how these different methods approach social issues; find through the library one qualitative study and one quantitative (they can be on the same or different topics) . For this essay you are expected to reference various sources to help inform your discussion of these two methods (use the readings, your text book and the library data base

 

Demonstrate an understanding of how to identify the information requirements of an organisation and design an effective and appropriate Marketing Research project to meet those requirements .

Research Methods for Marketing

This assessment enables you to partially demonstrate the learning outcomes required for the successful completion of the module, specifically:
To demonstrate an understanding of how to identify the information requirements of an organisation and design an effective and appropriate Marketing Research project to meet those requirements including:

Developing effectively worded research aimsand objectives

Developing appropriate and justified research and analysis methodology to achieve those aims and objectives

Identifying and addressing ethical issues and considerations associated with the proposal

Developing an appropriate research instrument for the proposal

Developing an appropriate timetable for the proposal

Identifying and addressing limitations associated with the proposal

Communicating this information clearly and effectively in a written report

The Individual Proposal
This individual proposal will build upon Assessment A where working in a group you designed and presented a research proposal based upon the information needs of a business presented in your allocated scenario where you represent a marketing research agency ‘pitching’ to win a research contract from that organisation.

The Individual Proposal is an individuallyproduced 3000 word research proposal that explores the research problem contained in the allocated scenario. You will write a fully considered, justified and feasible research proposal for the key decision maker in the organisation that has written the brief. The intention is to plan a piece of applied research which will meet the organisation’s information requirements. It is up to you how to go about achieving this, drawing on your learning from the module. Your proposal needs to contain at least one example research instrument (e.g. survey, moderator’s guide), to be included as an appendix. It is important that you work independently on your proposal to avoid leaving yourself open to charges of academic misconduct such as collusion or plagiarism.

Using your experience in perceiving either Blume’s “The Eternal City” or David Alfaro Siqueiros’s “Echo of a Scream”, discuss how education and experience changed your perception of the art. Were your values identified at all? If so, how?

GED120 – INTRODUCTION TO HUMANITIES

(S) The Humanities Through the Arts

Lee A. Jacobus & F. David Martin, 2018

McGraw-Hill Education

ISBN.13: 978-1-260-15418-4

Using your experience in perceiving either Blume’s “The Eternal City” or David Alfaro Siqueiros’s “Echo of a Scream”, discuss how education and experience changed your perception of the art. Were your values identified at all? If so, how?Change Question

Compare and contrast Old Comedy and New Comedy. Describe characteristics of each. Give examples.Change Question.

GED120 – INTRODUCTION TO HUMANITIES

(S) The Humanities Through the Arts

Lee A. Jacobus & F. David Martin, 2018

McGraw-Hill Education

ISBN.13: 978-1-260-15418-4

Compare and contrast Old Comedy and New Comedy. Describe characteristics of each. Give examples.Change Question

By focusing on rape, considering different theoretical approaches and explanations, critically discuss whether the causes of these forms of violence are social or psychological.

Rape

Question: By focusing on rape, considering different theoretical approaches and explanations, critically discuss whether the causes of these forms of violence are social or psychological.

 

Suppose you are a therapist and an individual with dissociative identity disorder seeks your professional help. What method would you utilize to treat this individual? For how long would you likely continue treatment?

Reading Assignment

Session 4 Assignment 1

  1. Suppose you are a therapist and an individual with dissociative identity disorder seeks your professional help. What method would you utilize to treat this individual? For how long would you likely continue treatment?
  2. Imagine you are a provider in medical, hospital, or clinic setting. What are important considerations when working with patients who exhibit symptoms commonly associated with somatic symptom disorder? How do these symptoms differ from a person with a factitious disorder or from a patient with a medical condition?

 

Session 4 Assignment 2 Case Studies:

Clinical Case Elizabeth (p. 228)

Some therapeutic questioning methods that are used by therapists can unwittingly create (iatrogenic) alters in clients who do not have dissociative identity disorder.  How would you guard against this type of questioning of a client?

 

Clinical Case Maria (p. 232)

In reviewing Maria’s case, what are possible underlying reasons for her disorder to have developed when she was a child?  Consider the psychodynamic approach, the neurobiological model, and the cognitive model.

(350 words or more)

The fair and equitable standard gives modern expression to a general principle of due process in its application to the treatment of investors and encapsulates the minimum requirements of the rule of law. Critically discuss by making reference to relevant case law.

The fair and equitable standard gives modern expression to a general principle of due process in its application to the treatment of investors and [the standard] encapsulates the minimum requirements of the rule of law.  Critically discuss by making reference to relevant case law.

Follow the link to watch Porter’s 3-minute video on Value-based Healthcare and reflect in a half-page what you learned from this video.

Module 4 assignments

Read Chapter 8 on Internal Environment

Do Chapter Questions 2, 3, 4, 5, 7.

Read Ch. 9 on Financial Analysis.

Do Chapter 9 Questions 2, 3, 4, 8, 9.

Read chapter 9 case “Quality Home Health” p 236-7 and do case related questions p. 236-7.

Read chapter 9 case “Moab Regional Hospital” and do case question 1 only on page 239.

Follow the link to watch Porter’s 3-minute video on Value-based Healthcare and reflect in a half-page what you learned from this video.

Website to textbook:

Textbook Title: Strategic Healthcare Management. Health Administration Press, 2nd Edition

Link to video:

 

James Anderson works in a team that supports smart water company customers who are struggling to keep up with the payments. He’s just received a call from an uncle of one of the customers, who is asking for details about a customer’s difficulties so that he can help the customer. What do you think James should do in this situation?

Security and threat management

“Launch of “Smart Care” – A Smart Healthcare System”
Smart Care is a start-up established in the South Wales Valleys to offer Smart Health Care digital services across Europe. You have recently joined the company as an employee-partner and asked to do a security and threat analysis and submit a report with recommendations regarding secure launch and operation of Smart Care. The features of Smart Care are following:

• Telemedicine operations
• Smart hospitals
• Augmented Reality/ Virtual Reality patient appointments
• Remote Patient monitoring devices
• Drone-assisted medicine delivery to smart homes

Figure 1: Smart Care at the centre of Digital Health Care Services ecosystem
Figure 1 shows the operating landscape of Smart Care. The main Smart Care participants include patients, healthcare service providers, pharmaceutical companies, regulatory bodies and Government entities. Once you have moved from the Boardroom to the Breakroom, you have scribbled down the following requirements that you aim to complete as a set of activities as part of the more complex process:

Question 1: Identify data assets, their owners, their sensitivity level and specify data handling controls: (marks 18%; approximately 250 words)
a) Identify data assets (minimum five non-overlapping data assets for each participant, namely, doctors, patients and regulatory body) (marks 3%; approximately 30 words)
b) Identify data asset owner for all identified 15 data assets (marks 3%; approximately 30 words)
c) Evaluate data asset classification levels (i.e., sensitivity as high, moderate, and low) for CIA Triad. (marks 3%; approximately 15 words)
d) Identify adequate data handling controls for operations, namely, access control (confidentiality), encryption (confidentiality and integrity) and monitoring (integrity and availability) for high, moderate, and low sensitive data. (marks 9%; approximately 175 words)

Question 2: As a result of a joint-venture with a US organisation, Smart Care is expected to grow as a medium-sized organisation (50 to 249 employees).
You are required to write few sections of an Information Security Management Policy document. (marks 40%; approximately 1150 words)
a) Asset Management (marks 10%; approximately 300 words)
b) Physical Security Controls (marks 10%; approximately 300 words)
c) Disaster Recovery Plan for Business Continuity (marks 20%; approximately 550 words)

Question 3: Solve the following problems: (marks 42%; approximately 1000 words)
A. James Anderson works in a team that supports smart water company customers who are struggling to keep up with the payments. He’s just received a call from an uncle of one of the customers, who is asking for details about a customer’s difficulties so that he can help the customer. What do you think James should do in this situation? (5 marks; approximately 150 words)

B. Catherine runs a large smart transport company. She’s recently advertised for new staff. She’s been inundated with applications and doesn’t have a long time to review them all. She is travelling with a colleague to a conference tomorrow, so she’s planning to take a laptop on the aeroplane, along with the paper CVs she’s received. That way, they can both sort through everything on the journey. How would you advise her to take appropriate actions to protect personal data of applicants? Provide technical advice. (5 marks; approximately 150 words)

C. Meet Mr Khan. He’s got an appointment to visit his doctor, but unfortunately, it doesn’t turn out quite how he expected. As Mr Khan arrives at the surgery, he’s surprised to find personal details about his appointment on display in the waiting room, for all to see. Then when he eventually talks to the doctor, it turns out she’s referring to the wrong patient file. It’s all very annoying. The doctor is unable to find his file anywhere. List the data mismanagement issues and identify possible solutions to avoid this type of situation in the future. (6 marks; approximately 200 words)

D. Know your enemy: identify misclassified threats from the following figure and suggest corrective measure. (14 marks; approximately 300 words) Figure Source: Information Security Essentials – Understanding the Threats (USW)

E. Discuss one example related to Social Engineering Threats in each of the following categories in the smart emergency services scenario: identify a relevant security control and mention its ISO 27001 Standard category: (technical; physical; legal and administrative): (12 marks; approximately 200 words )
a. Authority
b. Liking
c. Reciprocation
d. Social Validation