Personal Information Essays Prompts

25+ documents containing “Personal Information”.


Sort By:

Reset Filters

Healthcare Information Technology

My company is a long term care facility- Respiratory therapist

This is in 2 parts, Part one is three discussion questions, and the second part is a research paper. All details are attached. If I can have the same writer for the last paper, it will be great.

Risk Assessment
PAGES 12 WORDS 3324

I just wanted to send out a clarification on the Risk Assessment Paper due December 9th before everyone beats themselves silly, neglects their other coursework and loses sleepless nights trying to produce a Chief Information Security Officer-level risk assessment. I love the enthusiasm if that's how you are approaching it but I also understand that a 15 page Risk Assessment is probably something most of you have never done before and this course does not train you specifically on how to do it.

The scenario that you are assessing is deliberately very generic and I know to some of the more technical members of the class this can be a little frustrating. I've received numerous requests for more details about things that were left out, such as whether the operating systems used are 32 or 64 bit and other engineering specs. My answer is this: make whatever assumptions about what's really going on within the fictional company that you want and as long as you align your risk assessment and recommendations for risk mitigation to those assumptions, I am fine with it. Creatively embellish the scenario; just make sure you use and analyze whatever you add in your risk assessment report.

I'm also not focusing on a specific format and provided examples of formats that are being used just to give you a framework if you were interested in following it. I'm open to whatever format you are comfortable with. I'm really just looking to see that you got something from the material and can incorporate your knowledge of the CISSP body of knowledge to conduct a risk analysis effectively. I fully realize this is alien terrain for most of you.

The few things that you will be hit for points on that I can't help are:

not meeting the minimum page count of 15 pages
not citing your work correctly using APA style manual format
plagiarizing other's work

To complete:

The deliverable is a 12- to 15-page scholarly report, not counting the title page, abstract, or references. A successful report should leave the reader with confidence in understanding the answers to all the questions listed below. Graphics may be used to illustrate key points.

Organization Information

Briefly describe the health information technology system/application and the organization type (hospital, clinic, public health agency, health care software company, government health information website, private virtual health information site, etc.).


Is the health information technology system/application clinical, administrative, educational, or research related?


What were the key reasons for the development of this health information technology system/application, i.e., what made the organization believe this system/application was needed? How did this organization determine those needs? Did the organization use specific tools to conduct needs assessments, staff opinions, or workflows?


How did the organization determine that this specific system/application could fulfill its predetermined needs?


Who manages this health information technology system/application and where are they located within the organization?s administrative structure?
Information System Application Design and Development

Many health care systems have multiple independent entities that work together toward the common goal of providing high-quality care. How did?and do?the various stakeholders make decisions related to this health information technology system/application? Were the end users involved in the development of this health information technology system/application?


How are individuals trained to use the health information technology system/application?


How are security issues addressed? How does this health information technology system/application support a legally sound health care record?


Where did initial funds for this health information technology system/application come from?


Who manages the budget for this health information technology system/application?


Have organizational or political issues impacted the ongoing funding for this health information technology system/application?


What are the arrangements for planned or unplanned downtime?


How are health information technology system/application upgrades scheduled or planned?


How has the health information technology system/application changed in response to health care reform and related legislation?


What suggestions could you make regarding changes needed to support health care reform and related legislation?
Innovative Aspects of the System

How does the health information technology system/application utilize technology innovations?


What technology innovations would you recommend for this organization? What innovations presented in this course, or found through your own research, could this organization benefit from?


What innovations could further promote evidence-based practice and efficiency within this organization?

The proper role of information systems in marketing and what information is necessary for decision making. Explore how decisions are made and what kinds of support information systems gives managers in the decision-making process.

Within this topic, among other information you discover in your research you should address:

the role of IS for this function within an organization
the benefits of IS for the functional users (operational level)
use of the data at all levels of the organization (knowledge, management, strategic)
How IS has affected processes for this functional perspective
What are the biggest impacts, both positive and negative, for the functional perspective

Be sure to provide real world examples. Use referred articles, news reports, and case studies to inform your work. Vendor information is useful - be careful to use it in the appropriate context.

Minimum Research Paper Requirements

Paper must be 6-10 pages in length, double-spaced. This does not include the cover page or references page.
APA style for the paper and references is required.
An abstract is required.
Graphics may be used to illustrate points but should be used only when appropriate.

Please write a comprehensive article review on 1987 John Zachman Article, A framework for information systems architecture, attached, http://old.zachmaninternational.com/images/stories/ibmsj2603e.pdf

A comprehensive article review should be 6 pages. It consists of a brief discussion of the salient points of the article followed by analysis and review. Address the pros and cons of the article and the positions taken by the articles author(s). Also provide additional research sources on the topic to review the article adequately. It is the review of the related literature that enables you to critically evaluate the article in question.

Please address the following:

a. Contributions of the article to the body of knowledge: Describe the central points or findings of the author(s) in this article.
b. Prior research ??"Briefly discuss the body of literature that motivated the authors. In essence, explain how prior research led the author(s) to conduct the study or present the argument presented. One way to accomplish this is to perform a literature search to determine if there are/were any relevant articles not been cited by the author(s).
c. Significance ??"explain why you think that the article is a significant contribution to the field of study. This is not an opinion, but an analysis based on the validity of the findings as well as critiques from others about the article. Cite references wherever possible to establish that there is a consensus among researchers that the article is or is not significant.
d. Methodology ??"discuss the research design used by the author(s). Validate whether you find that the research design or approach was appropriate or could be improved. (Methodology means the approach the author(s) use to demonstrate the thesis of the article.)
e. Further research ??"identify possible areas in which the article could be extended. Does the article call for further research on anything specific? Identify limitations of the article and formulate them as potential research questions.

Thank you.
There are faxes for this order.

Customer is requesting that (Oriented) completes this order.

Please answer each question, one question per page. Place all references to the specific question at the end of the page the question is being answered on.

Question 1
List and describe the four basic functions of an information system. List and describe three types of enterprise systems.

Question 2
There are two fundamental requirements for managing business performance: being able to measure and knowing that your indicator is measuring the right thing. Explain each of these requirements and why they are challenging.

Question 3
What is an advantage of virtualization? List and explain one type of virtualization.

Question 4
What are three of the major data functions performed by a DBMS? Briefly explain the functions.

Question 5
Why are internal threats a major challenge for organizations? How can internal threats be minimized?

Question 6
Why do social networks and cloud computing increase IT security risks? How can those risks be reduced?

Question 7
Implementing security programs raises many ethical issues. Identify two of these ethical issues.

Question 8
List and define 4 of the basic types of e-business transactions. Explain

Question 9
Identify and explain the three major types of BI. Explain data mining. List three characteristics or objectives of data mining.

Question 10
What are the four main points of IT strategic plans? Define them.

Kindly provide a review of the assigned case study. Also, address the following questions: 1. How legitimate are the concerns voiced by the industry's critics? 2. To what extent is the industry a threat to individual's privacy? 3. As a privacy advocate, what legislative changes would you favor? 4. In Derek Smith's position, what would you recommend to the US Congress regarding regulation of the personal data industry?
There are faxes for this order.

Part 1.

Write four (4) page paper on upcoming legislative trends or new laws that will have an impact on the information technology culture in 2011-2012.

Part 2.

As the CISO of the Boston Red Sox, you are instructed by the CEO John Henry to find out how to ensure the Boston Red Sox IT infrastructure is in compliancy of applicable state and federal legislation. Mr. Henry asked that you do the research and provide the analysis in a one-page white paper.

Write a one-page (1) white paper on approach to evaluating infrastructure to ensure state and federal legal compliancy. What are the initial steps that you must consider? What tools are available? What resources are available to help you ensure compliancy?

http://owl.english.purdue.edu/owl/resource/546/01/

Thank you.

Customer is requesting that (jonsmom2) completes this order.

How Personal Can Ethics Get?

Valerie Young was a marketing manager at an international
cosmetics and fragrance company, Wisson,
which is headquartered in Chicago. Wisson underwent a
major reorganization due to cost cutting. Valeries department
was downsized from 25 to 10 people the year
before. They did survive as a small team though, and
their role within the organization was unique??"acting as
an agency, delivering designs for bottles and packaging
and developing the fragrances for their brands.
Valeries manager, Lionel Waters, had been with the
department for 14 years. He was hired by Wissons
CEO at the time, after he had worked for big names in
the fragrance industry. He had launched one of the most
successful female fragrances in the industry several years
before. Waters joined the company in order to start new
product lines for the company in the mass fragrance
market. He then hired two close friends as executives
with salaries well above industry standards and gave
them each six weeks annual vacation. Teams were
formed around them quickly and after three years, each
team had its own line of fragrances that were launched
worldwide.
Nature of Work Valerie was hired to contribute organizational,
financial, and marketing skills. The rest of
the team was mainly comprised of creative individuals
who had basically no interest whatsoever in the dry
theoretical world of calculating numbers and strategies.
Valerie had not worked in the beauty industry before,
but was eager to learn everything about the world of
scents and how they were developed. At that time, the
department worked with many different perfumers from
several fragrance companies. The perfumers themselves,
or their representatives, came to present their
creations for new projects, or the Wisson teams went to
their suppliers offices in France to conduct so-called
fragrance sessions.
It takes time to develop a fragrance product that will
end up being a perfect creation on the counters of the
worlds department stores. The name, concept, design
of the bottle and packaging, advertising, and, last but not
least, the fragrance has to be put together to create an
innovative and uniquely new product. Fragrance development
itself takes a tremendous amount of time.
First, the perfumers are briefed about the new
project so that they can base their creations on already
firm ideas about the end product. Then, for every new
project in the department, at least 300 to 400 samples are
submitted by the perfumers. The majority of those
samples are usually discarded right away after smelling
for the first time because the scent did not match the
concept or simply did not smell good enough. Some are
set aside, smelled again and again, and during that
process, the perfumers get feedback about what to
change. Sometimes Valeries team got 20 reworked
submissions for one scent and it often happened that
after all that work, the original was picked as the best
choice. In the final phase, three to four fragrances remain
and only those few go on to the market research
testing phase.
During Valeries first year at the company, the team
worked with as many as eight different fragrance companies
to have a good diversity of new scent ideas. After
a while, they began using only perfumers from two
fragrance companies for their projects. She was wondering
why they stopped working with the other perfumers,
because their submissions were not bad at all
and they also successfully supply Wissons competitors.
Why were these perfumers not good enough for Wisson?
It did not take long for the team members to realize
that Waters was not to be questioned. The team
then went forward and developed great relationships
with the perfumers of the two remaining fragrance
houses.
The Incident And then one day, it all became clear to
Valerie. She had some copies to make and walked to the
copy room in the office area. As she was putting her
originals in the copy machine, she saw that there was a
paper jam, and the person who caused it left without
taking care of it. She started to open the drawers of the
paper supply and checked the output tray. There were
some sheets that someone must have forgotten and she
was going to throw them in the recycling container next
to the copy machine. As soon as she grabbed the sheets,
she saw that they looked like her bosss private companys
stationary (he had a consulting company on the
side). So Valerie looked closer and realized that what
was in her hand were invoices from Waters to the two
fragrance companies Wisson worked with that listed
commissions and fees totaling almost $35,000 per
month! So that was the reason Wisson stopped working
with other companies??"they probably refused to pay
Waters kickbacks!
Valerie was stunned. She was left shocked and
speechless. Almost as if it were like a reflex action, she
took all her papers and the invoices and walked back to
her office. Sitting there for a while, she tried to calm
down. So many questions were running through her
528 P a r t 5 Integrating Cases
head: Does anyone else know about this? Are other
people on our team involved? Is this normal in the industry?
Should I talk to anyone about it?
All kinds of thoughts were spinning inside her, and
she spent the rest of that workday walking around as if
she was in a cloud. Fortunately her boss was not in that
day. He was probably on vacation, just like the 20 other
weeks per year of time off he grants himself.
When Valerie came home the night of her discovery,
she told her boyfriend about it. This is one of those
situations when you have to tell somebody; otherwise
you think you are going to explode. Her boyfriend was
not directly affected by this, so she could confide in him
and be sure of his honest opinion. First, he did not quite
understand what she was saying because it sounded so
outrageous, but then he realized what had happened.
He asked her if she had told anyone else about it, and
when she assured him that she had not, he recommended
that she keep this information to herself for the
time being, not because he is not an ethical person
himself, but because he knew that her career in Chicago
could be in danger if something happened to her boss.
After all, her boss was in charge of the department and if
he were gone, the already small team might not survive
either.
Valeries Dilemmas Valerie did not have a U.S. green
card, only a special working visa, which allows non??"U.S.
citizens with unique skills to work in this country for a
certain amount of time. This kind of visa is completely
dependent on the fairness of the company someone is
working for, and means that Valerie could lose the right
to work, or even the right to stay in the United States if
she did not have this job any longer.
And that was not all. She had just been accepted for
the masters of science program at the University of
Chicago and was looking forward to starting it. Her
tuition would be reimbursed by the company if she got
As and Bs in her classes. This was a huge opportunity to
gear her career toward greater challenges and successes.
But what about ethics? What about her own values?
In this situation, there was so much more at stake than
just right or wrong. The decision she had to make would
influence other peoples lives as well as her own. Her
colleagues had become her friends, and even though her
boss disregarded good management and leadership
principles, these individuals formed friendships among
themselves, particularly since they had been reduced to
only a handful of people. Instead of joining his team in
building up not only professional but also friendly relationship
with his employees, Waters preferred to look
for only one goal??"to enrich himself. He did not care
about relationships with other fragrance companies either.
Perfumers are somewhat like artists; they sometimes
work well under pressure and they are often
inspired by their customers as well. To have the greatest
diversity of fragrance submissons, Waters should have
worked with perfumers from more than only two
companies. This would have given Wissons products a
big competitive advantage.
Waters was a constant example of how not to be
ethical in handling business and employees. Instead of
being a leader who would help activate ethics mindfulness
in others, he was the polar opposite. He seemed to
have made it one of his goals to spend as much of the
companys money as possible. Launch events went
overboard with extravagances and expenses; on one
occasion, just to show off his horseback riding talent, he
rented an entire stable outside of Chicago for one hour.
The cost: $25,000??"and he expensed it to the company.
Usually he showed up late for meetings or canceled
them entirely even when the attendees were already in
the office. Or, he would tell someone something really
important came up, and then relate a completely different
version to somebody else. Waters team did all the
work and had to make most decisions without him because
he was rarely around. Mondays and Fridays he
usually stayed home or at his other office, and with some
traveling and all that vacation time, there was never
much opportunity to actually work with him. So they
learned to be efficient and productive by themselves
without the person who was supposed to be their team
leader, teacher, and supervisor. It finally deteriorated to
the point that even the most positive colleagues realized
that Waters contributed nothing to either the work level
or to morale, both of which were already low. And that
was without even being burdened with the things Valerie
now knew!
Could she let her boss get away with this? Was she
not obligated to report this? After all, in the companys
policies it was clearly stated:
Personal payments, bribes or kickbacks to customers
or suppliers or the receipt of kickbacks, bribes or
personal payments by employees are absolutely
prohibited.
How could she even work with Waters any longer
under these circumstances? She felt her anger toward
him growing stronger. What kind of person was this
man? Was he just a greedy human being? Didnt he
make enough money already? He has always acted as if
he were the most nave person in the office, and now
shes discovered this! She wished she had never seen
those papers. It would have been much easier for her to
continue her work and conduct business as usual.
Valeries Decision and Rationale What Valerie had to
do, or not do, somehow became an easy decision for her.
It was clear that she was unable to report this before she
had another job or even before she graduated from the
masters program, which was her ultimate short-term
Integrating Cases 529
goal. Getting another job is not easy without a green
card. The Immigration and Naturalization Service has
made it more difficult for non??"U.S. citizens to work in
the United States, so companies hesitate to hire people
like Valerie because it means a lot of paperwork and
expenses for them. Also, workers with Valeries type of
visa have only 30 days to find a new job in the event they
lose theirs; otherwise, they are required to leave the
country.
Basically, Valerie did not really have a choice if she
did not want to become a martyr for the ethics cause. She
decided to wait for a while before bringing these findings
to light, at least until she was close to graduating from the
masters program so that she could receive her degree. It
seemed that the highly ethical stance would be to report
this right away, but it also seemed silly to sacrifice herself
and her own future for the sake of outing someone who
had been so unethical. Did she act morally and ethically
correctly? She felt that she put her own interests before
ethics for now, and that bothered her deeply, but she
knew she was going to do what had to be done as soon as
her circumstances allowed for it.
Valeries discovery changed everything, and nothing.
She still had to set up meetings with their long-time
perfumers, and participate and act as if she knew nothing
about what happened. She did try talking to Waters
about involving other fragrance companies again. Her
stated reason to him was that Wisson only receives approximately
100 submissions per project now, instead of
the 300 to 400 in prior years. He was not willing to
discuss that topic at all though, which obviously did not
surprise her. She wondered whether the perfumers
knew about these sweet deals too, or if they believed that
their hard work won them their projects. Every time
Waters said something regarding the importance of
keeping the fragrance development as this teams responsibility,
she said to herself, Yes, and I know why!
What Next? When the timing is right, and Valerie
makes this crucial information public, of course,
Waters and his future will be affected. He will certainly
lose his job, could possibly face criminal charges, and his
reputation in the industry will be destroyed. For the
team, the question will be if it can survive without him.
The teams do have a very strong brand manager among
them, who has an excellent reputation within the Wisson
organization. Perhaps he will be able to take over the
team and restart this department the right way.

Please answer these questions.

1. Discuss the ethical concepts and dilemmas that are facing Valerie
2. if you were Valerie, what would you do? why?
3. Discuss the types of stressors are being experienced by Valerie.
4. Discuss Valerie's manager, Waters, in relationship to his ethics in handling business and employees.
5. Discuss the aspects of the corporate culture that contributed to the dilemma.

Personal Skills in Business and
PAGES 7 WORDS 1957

The paper should demonstrate your understanding of Communication at work (chapter 1) and interpersonal skills (chapter 5). The paper should integrate both of the selected communication areas and show how they apply to personal and organizational life.

In addition, reading materials should be used to illistrate either how the conceots discussed in your papaer have been applied, or how they could potentially be used to improve effective communication and interpersonal relationships in management.
There are faxes for this order.

Personal Values Development
PAGES 6 WORDS 1786

Perfer user-Freelancewriter:

I sent you some papers on my ethics and one of my job issues, to give you a little background on me for the Personal Values Development. If you cannot completed both papers I do understand and you can pass one on to another writer.

Perpare a paper on Personal Values Development examining your personal values, ground rules and/or ethics development. Focus on the development aspect rather than on a particular position on any issue. Do this by identifying:

A) what your vaules are
B) the sources(people, institutions, events, etc.) that helped shape your my values
C) the criteria and decision-making factores you utilize to revise them
D) the implications/application of my values my work situation

Nature of Ethics
The definition of ethics is a very difficult thing to pin down, since in the modern world it means so many things to so many people. Of course, the basic, main meaning of the word is clear enough. Through one?s life, and especially when growing up, a person learns what ethics are. This usually entails that one?s parents give guidelines according to which life in society should be lived in order to make life as easy as possible for every individual person and for society itself. So on the one hand ethics come from how a person was raised. This in itself is very individual, since some parents do a better job of raising ethical children than others. A child could in this way grow up to be either ethical in a social sense, or unethical. Either way, every person forms an individual set of ethics, even though this set of ethics could be negative, or not compatible with the general ethics accepted by society.
An individual on his or her own also derives an ethical system. Using a parent's guidelines while growing up, a child also uses his or her experiences in society to shape personal ethics. When a person is very young, for example, it is easy to succumb to peer group pressure in order to form ethics that are not really in keeping with what is required by general society. Peer group ethics may require a person to steal and to murder, and this is not ethical in the general, social sense. This could happen even if parents were extremely conscientious and ethical in raising their children.
In the job situation, ethics are again subjected to the individual situation. Business ethics in certain companies are for example not necessarily values that would be acceptable when applied to society in general.


The law profession is an example of this. Lawyers are often obliged by professional ethics to keep conversations with their clients confidential, even though such a person confessed to a murder or some other unlawful act.
The lawyer in question must then defend the client, even though he or she knows that the client is guilty. If individual ethics clash with professional ethics, it is difficult to keep doing the job with enthusiasm.
In the workplace, ethics as a concept is more complicated than ethics in general life. The reason for this is that each profession entails its own set of specific ethics. This helps the job to run smoothly, and it gives workers a guideline according to which they must work. I therefore believe that it is very important to be in a work environment where one's personal ethics do not collide with those required by the job. I also believe that the rules of ethical behavior, both socially and professionally, should be followed absolutely and without fail.
I do think that circumstances dictate the ethics of a situation, but these should never interfere with the basic principle. I would for example not let my relationship with a person interfere with what I believe is right. If I think I need to report the unethical behavior of a family member, friend, or co-worker for example, I would not hesitate to do so. I do not think this is only good for the workplace and society, but also for the person committing the act of unethical behavior. When a person's ethical system breaks down, this endangers the person's future ability to function well in society. In the end curbing, such behavior by reporting the wrongdoer is then better than turning a blind eye for the sake of my relationship with the person.


It is therefore important to me to maintain a strong basis of ethics in both the business and social world. I do not think society or the workplace can function properly without a strong set of ethics. This belief comes from the way I was raised, my family members, and from my life experience during the 45 years that I have lived as a black man. I was raised to have a strong set of values, because often this is all that separates us from those committing crimes against humanity in the name of justice.
My ethics have helped me through my years as a teenager and as a young man. Because I was given a strong set of ethics in my parental home, I was able to withstand peer pressure and not be drawn in by things like gangsterism, drugs or any other self-destructive things. This is why I believe that not behaving in an ethical way endangers a person's safety and way of life. The function of ethics is therefore to protect public safety.
My family members also help me to keep up my ethical behavior, as they support this point of view. Family support helps a great deal when there are ethical problems and issues at stake. My family has supported and helped me to keep up my ethical lifestyle, and to keep from succumbing to peer pressure not only when I was young, but also now. Like me, my family would also turn in anyone they perceive as behaving unethically. Knowing this also helps to keep us from breaking the rules.
I have also seen from experience how things work out better if I keep up a certain standard of ethical behavior. The danger of breaking the rules is not only that one gets caught; it is also about the destructive effect of breaking the rules. Drinking too much for example results in a loss of self-control, which may in turn be destructive when fights break out between people.

I manifest my ethics both in my relationship with myself and with others. For myself, I am very aware of my conscience at all times. I therefore try to make decisions and do things that do not bother me in an ethical sense, and I try to do what I think is the right thing at all times. This then translates to my relationships with others as well. My family, friends and co-workers know me as a person who would never help another person commit an unethical act. Instead, I would report this person regardless of my relationship with him or her.
Ethics are important, both socially and professionally. When a business is perceived as ethical, the public trusts it, which is good for business. In society, an ethical person is also seen in a favorable light, which is beneficial in all contexts of life.














References:
Audi, Robert. (2004). The good in the right: a theory of intuition and intrinsic value. Princeton, N.J.: Princeton University Press.

Post, James E., Anne T. Lawrence, and James Weber. (2002). Business and society: corporate strategy, public policy, ethics. Boston: McGraw-Hill/Irwin.

ETHICAL DILEMMA IN THE WORKPLACE: SENIORITY POLICY


Introduction:

Ace Hardware is a large national chain of independent hardware and home

improvement franchise retail outlets. At the particular retail store in question, the

policy of employee seniority, as it relates to all matters other than vacation allocation,

is either applied inconsistently, or ignored outright, resulting in antagonism between

co-workers, erosion of respect for management, and ultimately, undermining

employee morale in general.


Occupational Situation:

Manager Mike Riley has been with the organization since 1994 and has been

in charge of day-to-day operations since 1998. Several employees have worked at

Ace almost as long as Mike, while two others, Brian Knight and Kevin Brady, were

hired more recently, by Mike, since his promotion to Management. Brian and Mike

grew up in the same neighborhood, attending the same high school where they were

good friends before losing touch while Brian served four years in military service.

Kevin was first introduced to Mike by Brian, who had befriended him shortly after

they met playing in the same weekend softball league.

According to company policy, vacation time, work shift preferences, and

choice of assignments are to be awarded based on seniority, provided employees

fulfill their obligations with respect to minimum scheduled hours and satisfactory job

performance. Corporate directives have issued very specific instructions as to the

proper allocation of vacation time among and between co-workers in good standing,

based strictly on seniority. As a result, Mike has always honored vacation requests


appropriately, according to the relative seniority of employees. On the other hand,

corporate headquarters has never specifically enforced its other policy elements of

seniority, particularly as it relates to honoring shift change requests and preferences

for specific work assignments.

Joe Leonard and Marie Delacruz have been with the company since 1995 and

1997, respectively, both having worked side-by-side with Mike before his promotion

to Manager in 1998. Whereas Brian and Kevin both maintain social friendships with

Mike outside of work, Joe is quite a bit older than any of his co-workers and spends

all of his personal time away from work with his family and rarely, if ever, maintains

any social contact with Mike outside of work. Likewise, Marie is a single, working

mother who attends nursing school in the evenings; she has little interests in common

with Mike and his friends. Joe and Marie both perform quite satisfactorily, in fact,

they helped train Brian and Kevin after Mike hired them.

Initially, Mike honored Ace company policy in entertaining employee requests

for shift and assignment preferences in accordance with seniority. Gradually, as he

and Brian rekindled their old friendship, Mike started giving Brian preferential

treatment, often disregarding Ace policy on employee seniority, to the detriment of

Marie and Joe whenever their wishes conflicted with those of Brian. More recently,

Mike joined the same softball team where Brian and Kevin first met, which greatly

exacerbated the problem.

Since then, Mike has allocated work shift and assignment preferences with

complete disregard of seniority as between Brian, Kevin, Marie and Joe. Mike?s

unofficial policy seems to be that softball-related scheduling issues take precedence

over any matters where the wishes of other employees conflict with those of Brian or


Kevin. To make the situation even worse, Mike simultaneously uses the convenient

excuse of ?seniority? to justify his decisions anytime Carlos Ramirez, his most recent

hire, puts in a request that conflicts with the preferences of his other employees,

including Joe and Marie. Mike?s unofficial policy seems to be that seniority is

respected, but only whenever it does not conflict with his softball team?s schedule.

As a result, Joe and Marie have become quite dissatisfied working for Mike,

and a thinly veiled atmosphere of antagonism exists on their part toward Mike, Brian,

and Kevin, collectively.


Solution:

Human resource experts have implicated unfair, differential treatment of

employees by management as a very significant source of employee dissatisfaction

and morale (Ross, 2002), which seems to have been borne out in this particular

situation. Even from a more general industrial psychology perspective, the

inconsistent application of established rules is even more detrimental to employee

morale than the absence of any such guiding principles in the first place (Gerrig &

Zimbardo, 2001).

Since Ace corporate headquarters already requires that relative seniority

among co-workers be recognized in matters pertaining to vacation time,

management?s only beneficial option is to adhere strictly to this principle in all

situations where relative seniority provides an appropriate method for approving

employee requests. Conversely, continuation of the situation currently prevailing at

the Ace Hardware outlet in question is likely to undermine relations, both between

employees and management, as well as among the employees, themselves.


REFERENCES



Ross, A. (2002) No Collar: The Humane Workplace and Its Hidden Costs.
Basic Books

Gerrig, R., Zimbardo, P. (2001) Psychology and Life 16th ed.
Allyn & Bacon

It Risk Management -- Cyber
PAGES 15 WORDS 4384

Ones paper will consist of a 2,500-to-3,500-word paper written in APA pertaining to a quality management or risk management topic. The student must incorporate theorists, tools, techniques, models, and costs. Further, the student must create either a quality management plan or risk management plan depending on the topic chosen. Therefore, when selecting the topic, please make sure you choose an example that is applicable to an organization.

Ones grade on the writing assignments will be based on the following rubric:

Writing Style (i.e., professional writing with consideration given to spelling, grammar, format, references and word use): 30%

Content (i.e., addressing all portions of the presented topic, using main points and sub-points as needed): 70%

One should ensure all resources are properly cited and referenced. Please make sure to use at least 15 credible sources. Please note that Wikipedia and other general internet sources are not allowed. Further, the sources must be within the past 5 years.

All writing assignments should adhere to the APA writing style. Additional information on APA is available by accessing:

o APUS Online Library:
o Click on the Online Library link; then click on the link labeled Tutorial Center; and then feel free to access APA resources.
o The Owl APA online site: http://owl.english.purdue.edu/owl/resource/560/01/
o The APA Writing Style site: http://apastyle.apa.org/


There are faxes for this order.

INSTRUCTION:
NEEDS LOTS OF GROOMING!!!!!
1. Personal Interest essay
2. TOPIC: My Personal Interest in a Career in Information Technology (IT)
3. MLA FORMAT with two cited sources. Arial/12/double space
4. I will include the articles of the cited sources. Please make sure I am not plagiarizing. Min quotations: 2, Min parentetical citations: 4
5. My draft does not flow. Please paraphrase the parenthetical citations in the essay to flow with my personal experiences. This essay is to show why I have interest in information technology.
I need a better Thesis statement in the document, if you think mine is not adequate.
6. Also you can include some of these other experiences in document to help with the writing:
A. Military Training (U.S. NAVY)
Attended Fire Control A school in 1984, this course gave me the knowledge and skills of basic electronics theory and basic electronic maintenance.
In the Navy, I?ve been trained to operate and configure high frequency (HF), very high frequency (VHF), ultra high frequency (UHF), and satellite secure and non-secure communications equipment.
I have attended Command/Control/Communication/Computer and Intelligence (C4I) system engineering courses. The courses taught me the basic understanding of applicable system hardware and connectivity, applicable system software, primary system support organizations, system documentation and data communications. Examples of systems are shipboard Global Command and Control System-Maritime (GCCS-M) and Advanced Tomahawk Weapons Control System (ATWCS) Tactical data Processor (TDP) ship platforms.
B. Military Life Experiences
Previous assignments in the Navy I was tasked to design, build, and maintain small to medium size networks on board ships. Money and manpower was a big factor in getting those jobs completed. Also, I am known as the ?C4I supervisor? while I am aboard ship. I am mainly a technical advisor on in problems that occur in the C4I architecture onboard ship. Examples are:
Connectivity of Ultra High Frequency (UHF) circuits
Connectivity of Extremely High Frequency (EHF) circuits
Connectivity of Unix based and Microsoft network computers
Connectivity all routers and switches
-----------
(DRAFT)

My Personal Interest in a Career in Information Technology (IT)

Outside the military, I do not have any reason to develop plans for weapon systems or to conduct attack exercises. The skills I acquired in information technology are transferable to civilian situations, however.
I have given 20 years of my life to military and have been dedicated to the armed forces, which placed me in a wide variety of situations quite different from what others might encounter. In these twenty years, I''ve also been exposed to the other side that is information technology; I''ve been allowed to learn new skills and apply them in new situations through this new technology.
My own future has been decided after an analysis of the way the military is currently structured and after making a projection into the future of what this means to me. I know that I was able to do this because of my experiences in the Navy and on the job. I know how the military operates and how it "thinks," and I have been trained to take all the evidence before me and shape it into something meaningful and accurate. In the following pages, I will describe some experiences I obtain in the military that pertain to information technology and why my personal interest in this topic is so important to me to continue to grow and learn more when I transfer into the civilian sector.
I have attended Command/Control/Communication/Computer and Intelligence (C4I) system engineering courses and these courses have taught me the basic understanding of applicable system hardware and connectivity, applicable system software, primary system support organizations, system documentation and data communications that is a part of intelligence. Officials said, that among the devices being hurried into the development pipeline is foliage-penetrating radar sensors, micro-drones and microwave antipersonnel guns that stun, rather than injure or kill (Freedburg, 1378). These are all the new technology used for the security, maintenance and knowledge for the sake of nation. The list of technologies that emerged from American military research is endless are now becoming very common like the computer mouse, flat-screen displays, night-vision goggles, and satellite global positioning, to name a few. Since research funds started drying up after the Cold War, some defense experts predict that a major increase in U.S. government-sponsored research would reverse the decline in commercial spin-offs (Freedburg, 1378). Without the information systems, the U.S. military would have just been blasting away at the landscape in a big, set-piece barrage right out of World War II. Navy Secretary Gordon England griped to his staff about the piles of paperwork on his desk and asked whether it could all be computerized (Loeb, 16). Everything needs to be computerized, properly organized and properly stated so that there is no guarantee of a mistake (Loeb, 16). Perhaps this is why I am so interested in the information technology.

Information technology is becoming the norm, and this means that companies are developing systems, which cover the spectrum of a business, and which provide IT answers to a number of problems. The Internet is becoming more integral to the operation of companies as well as individuals, and the movement of information form one place to another is still a key to competitiveness and advantage. The trend for companies may be toward network systems that offer massive storage capabilities without the necessity for the company itself to house that storage, and several companies are pushing in this direction for both companies and individuals. How well they do may depend on other developments in the industry, such as the development and implementation of systems with higher bandwidth.
These solutions require a better trained work force and I may be helpful to the civilian sector. Information technology has interested me with all the new technology; I believe I can be of great help. After analyzing my experiences in the Navy and on the job I have learned to know take all the evidence before me and shape it into something meaningful and accurate. I am seeking new knowledge to go with the experience and skills I have already obtained. Combined with the skills and knowledge obtained from my training and experience in the armed forces, this will allow me to continue on and complete a Bachelor of Science degree in Information Technology. This degree will then allow me to begin a new career in information technology.

Works Cited

Freedberg , Sydney J. "IT Changes Everything" National Journal. 34.19 (2002): 1378.

Loeb, Vernon W. "Afghan War Is a Lab for U.S. Innovation; New Technologies Are
Tested in Battle." The Washington Post. 26 Mar. 2002: 16.



------------

Title: IT CHANGES EVERYTHING.
Subject(s): TECHNOLOGY -- United States; SEPTEMBER 11 Terrorist
Attacks, 2001; DEFENSE industries -- United States; TERRORISM -- United
States
Source: National Journal, 5/11/2002, Vol. 34 Issue 19, p1378, 3p, 3bw

Author(s): Freedberg Jr., Sydney J.
Abstract: Discusses military technology in the U.S. and its
relation to the September 11, 2001 terrorist attack. Application of
information technology on airline flight schedules; Development of
bomber planes during World War II; Details of possible training given to
hijackers from Afghanistan; Utilization of satellites by the U.S.
military in the prevention of terrorism.
AN: 6697408
ISSN: 0360-4217
Full Text Word Count: 2238
Database: Academic Search Premier
Section: SPECIAL REPORT
IT CHANGES EVERYTHING



IT''S HARD FOR THE GOVERNMENT TO USE NEW INFORMATION TECHNOLOGIES,
BECAUSE CHANGING A BUREAUCRACY IS NOT SO EASY.

For more than 50 years, since the twin triumphs of World War II and the
Marshall Plan, nothing has summed up American power in the world so much
as piles of stuff.

Be it weapons or widgets, rockets or refrigerators, the United States
prevailed in war and peace because it could produce the most of the
latest stuff. It was global domination through mass production.

But like so much else, this supremacy by manufacture didn''t save us on
September 11, 2001. Terrorists armed with nothing more sophisticated
than box cutters hijacked the high-tech, high-flying products of U.S.
industrial might--Boeing airliners--and flew them into the high-rise
engineering wonder of the world-the World Trade Center. And in an ironic
twist, when U.S. retaliation came, Special Forces soldiers had to ride,
literally, to victory on the backs of borrowed horses and on the
lethality of air strikes conducted by the oldest aircraft in the
Pentagon''s inventory--the 50-year-old B-52 bomber.

Certainly, both sides in this new kind of war used the heavy-metal
gadgets that have long defined the cutting edge, most obviously
long-range jet aircraft (whether owned or stolen) laden with explosive
materials (whether smart bombs or jet fuel). But such tangible uses of
technology were just the starting point, their availability almost taken
for granted. The critical margin of victory for both sides was something
altogether more ethereal: It was information.

It was the terrorists'' understanding of air transportation, not their
box cutters, that was their deadliest weapon on September 11. Thanks to
21st-century information technology, everything they needed was readily
available: from manuals and simulators for their pilot training to
flight schedules on the Web. They also could glean from news articles
that standard procedure called for U.S. aircrews to collaborate with,
not confront, hijackers in order to save passengers'' lives.

Likewise, it was information that enabled America''s lightning campaign
in Afghanistan to work so well. Networking software allowed U.S.
planners to coordinate nearly nonstop missions over Afghan skies using
planes from Central Asian airstrips, aircraft carriers at sea, and bases
in the United States. Digital communications gear let Special Forces on
the ground transmit precise coordinates to the circling bombers. And an
$18,000 upgrade kit let old-fashioned, free-falling bombs steer
themselves to those coordinates by tapping into Global Positioning
System satellites in space. New technology did make the crucial
difference, but it was a new kind of new technology: small, quiet, and
relatively cheap computers that told all the big, loud, and expensive
machines exactly where to go for maximum effect. Without the information
systems, the U.S. military would have just been blasting away at the
landscape in a big, set-piece barrage right out of World War II.

A crucial caveat: It was having the right information, in the hands of
just a few of the right people, that made the difference. It was not
simply a matter of having a lot of data. On 9/11, Mohamed Atta and a
band of 18 disciplined and trained hijackers, armed with some key but
easily available information, wreaked great terror on America.
Similarly, small Special Forces teams made up of just six soldiers each
helped destroy an entire regime because of their precise knowledge of
the enemy''s location in Afghanistan, and because of their ability to
transmit that knowledge to the bombers. Said Kenneth Watman, director of
warfare analysis and research at the Naval War College in Newport, R.I.,
"The real working end of this problem is the information end, not the
shooting end."

And it''s not the quantity of information that counts, as anyone who has
used e-mail or searched the Web knows--it''s how you use the masses of
data to achieve your goal. "Being submerged in data that way is not very
productive," said Watman. "You''ve got to have some sort of intelligent
scheme for putting things together."

And that''s where government tends to fall down. A bureaucracy built for
the Industrial Age has real trouble adapting to an age of information.
The private sector is still struggling to master the e-economy, but
e-government lags far behind even these first steps. The White House''s
six-month-old Office of Homeland Security has only just hired a chief
information officer to help manage the flood of e-mailed proposals from
would-be contractors.

It is not that government never gets the information flowing smoothly.
The FBI''s National Crime Information Center can electronically alert
almost every police chief and sheriff in the country, and some
jurisdictions have computer terminals in every squad car. Other
government and private groups--from disaster planners to hospitals to
medical associations--have their own extensive networks, too. But each
network is often too narrow to catch anything unusual: It simply moves
information up and down within one organization, not side to side
between them. Retired Navy Capt. John Gannon (now with the consulting
firm Intellibridge) recalls that in his former job as director of the
federal interagency National Intelligence Council, "I had responsibility
for coordinating 11 agencies of the U.S. government. I could not
communicate with those 11 agencies through one e-mail system."

The greatest tragedy to result from this information arteriosclerosis,
of course, was 9/11. "It was the biggest single failure of our federal
government," said Rep. Curt Weldon, R-Pa. "You had agencies that were
tracking individuals that other agencies weren''t aware of, because there
was no cross-pollination of data sets." The State Department and the
Immigration and Naturalization Service, because they did not get a CIA
watch list until too late, let suspected terrorists into the country. A
warrant was issued for the arrest of the apparent ringleader, Mohamed
Atta, in April 2001 by Florida state police who had ticketed him for
driving without a license. But the Florida police had no access to
federal intelligence information.

So September 11 gave a new impetus to the long-running struggle to pool
information across government. The INS is now trying to merge its
database of offenders and fingerprints with the FBI''s. A Customs Service
pilot project in Arizona automatically checks vehicles crossing the
border against both state and federal registers of licenses, and it even
suggests which ones have suspicious crossing histories. A follow-on
experiment will share the data with every government entity that works
an Arizona border post: Arizona agencies, Customs, the Transportation
Department, and even the Agriculture Department. Even more ambitious,
the military''s Special Operations Command has taken over an experimental
Army project to "fuse" information from different Pentagon and civilian
spy agencies'' secret, and currently separate, data systems.

Again, the objective is not simply to accumulate mounds of information.
The idea is to fuse together different kinds of data to get different
perspectives on a problem from many angles. The simplest example is what
the military calls "hyper-spectral" reconnaissance--looking at the same
thing with different kinds of sensors. To an infrared camera, a heated
metal plate looks like a running tank engine; to an optical camera, a
wooden mock-up looks like a real tank. But if both sensors can be
pointed at the same suspected target and compared, then the enemy is
less likely to fool U.S. targeters.

The idea goes well beyond combining different types of cameras. Disaster
planners now build electronic maps that, for example, can show how close
fire stations are to chemical plants, or which hospitals can handle an
overflow of casualties in a nearby mall''s parking lot. Rep. Weldon
proposes a "National Operations and Analysis Hub" that can collate
transcripts of intercepted phone calls, spy camera imagery, agents''
reports, and more into a single coherent picture of the world.

It sounds like an impossible technical challenge. But in fact, large
private corporations have used the technology for years in data mining
and marketing, Weldon said. But getting the government to make use of
the technology, he said, "[has] been a battle with the agencies all
along."

So what''s the holdup? A big part of the problem is the resistance to
change. Even the most seemingly mundane uses of information technology
require some fundamental rethinking about how a bureaucracy does things.
In February, for example, Navy Secretary Gordon England griped to his
staff about the piles of paperwork on his desk and asked whether it
could all be computerized. By April, a "paperless" system was in place:
Preliminary estimates are that for each routine decision, processing
time was cut by 78 percent, the number of staff to handle it by 71
percent, and the cost by 75 percent.

But those savings didn''t result from simply speeding up the bureaucratic
rounds. In a traditional office, a physical piece of paper goes from
official to official to official, each one seeing the preceding
handlers'' comments and making his or her own before passing the
memorandum along. And if one handler along the way really objected, he
or she just sat on it. It was what engineers call a linear or "serial"
process, where one broken link breaks the entire chain. With the new
network, the originators of any proposal post their draft document on an
intranet, so anyone can review and comment simultaneously without
waiting. That''s called a "parallel" process--except that in geometry,
parallel lines never intersect, and yet in this network, everyone sees
each other''s comments and responds. It''s all about interaction and
intersection. The end result is faster, more flexible, more responsive
to everyone''s input--and distinctly unsettling to traditional
bureaucracies.

Now, this is what can happen inside just one small military secretariat.
It is fairly disruptive, but also more productive. Even more
destabilizing, and also more valuable, are those networks that link
different agencies. Knowledge is power, and is a jealously guarded
bureaucratic commodity. But when a new network fuses information from
multiple organizations, it creates new knowledge--new power--along the
boundaries between them. In the language of the Information Age
apostles, power shifts from the center to the edges.

Then those edges begin to blur. Eleven years ago, Desert Storm had an
air campaign and then a ground campaign, clearly distinct and
elaborately pre-planned; today in Afghanistan, aircraft and teams of
ground troops work together from minute to minute on their own
initiative. For the wars of tomorrow, the Pentagon''s Joint Forces
Command is experimenting with new task force headquarters that would
deploy only a minimum of staff to a war zone. These headquarters would
instead use networks to tap into centers of specialized
expertise--military and civilian--back home, much as a small e-business
start-up relies on contractors around the world. And a Chicago think
tank, the Emergency Response & Research Institute, has proposed "virtual
disaster networks" that can expand during a crisis to draw in whatever
resources are needed to confront a given fire, flood, earthquake, or
terrorist act. The local fire chief on the scene could link
electronically to neighboring counties, National Guard units, state
officials, the Federal Emergency Management Agency, and appropriate
experts anywhere on Earth--perhaps chemists for a Bhopal-style chemical
leak or nerve gas attack, or physicians at the Centers for Disease
Control and Prevention for an anthrax or smallpox outbreak.

What''s the organizational diagram for this future? There isn''t one.
Instead, there''s an ad hocracy that pulls together everything it needs
to solve the current problem, then dissolves. "Maybe a better word than
''organization'' would be ''collaborative community,''" said Dave Ozolek, an
experimenter at Joint Forces Command.

In this dizzying future, "the technology [is] simply the enabler,"
Ozolek added. "It''s not just buying a commercially available product and
getting everybody up on the same screen: It also requires organizational
change and cultural change."

No wonder few want to do it. Change is just too hard. At least troops
fighting in Afghanistan have a strong incentive: If they can get the new
way to work, it will save lives, maybe their own. Back home in
Washington, the only certainty is that sticking to the old way will save
your job.

So it should be no surprise that the history of government technology
projects is littered with overruns, delays, and projects killed outright
because different offices could not agree on what to do. And sometimes
the inherent flaws in some bureaucracies are so deep that a given agency
has to be brought up a level or two before extensive change can be
contemplated. Consider the Immigration and Naturalization Service
officers who issued visas recently to two terrorists who had died six
months earlier, on 9/11. The problem there was not the lack of
sophisticated network technology, it was a failure by humans to connect
the names in the newspaper to the names on the visa applications. As
tricky as the technical questions can be, said a senior IT consultant to
the federal government, "the big problem is the lack of management skill
in government."

With the rise of modern information technology, the tools exist to
change literally everything the government does, from counter-terrorism
to office management. The question is what government will do with them.

--------------------------------------------

Afghan War Is a Lab for U.S. Innovation; New Technologies Are Tested in
Battle
[FINAL Edition]
The Washington Post
Washington, D.C.
Mar 26, 2002

--------------------------------------------------------------------------------

Authors: Vernon Loeb

Pagination: A.16

ISSN: 01908286

Subject Terms: War
BombsMilitary weapons
Military strategy

Geographic Names: Afghanistan


Abstract:

Ten were quickly dispatched to U.S. forces in Central Asia, and three
weeks ago the first one was fired by an F-15E at a tunnel in eastern Afghanistan
at the start of Operation Anaconda, the offensive against suspected al
Qaeda and Taliban holdouts.

The thermobaric bomb resulted from a problem bedeviling Pentagon planners.
Many al Qaeda fighters were burrowed deep inside vast cave complexes in
Afghanistan''s mountains. Short of a ground invasion to roust them cave
by cave -- a proposition that would likely lead to a large loss of American
lives -- getting at the terrorists was problematic.

One $30 million Global Hawk crashed in late December after a mission
over Afghanistan. And two friendly fire incidents that left three U.S.
soldiers dead and more than two dozen wounded apparently took place after
target coordinates were miscommunicated from U.S. ground forces to pilots
firing satellite-guided bombs.
Copyright The Washington Post Company Mar 26, 2002

Full Text:

Within weeks of the attacks on New York and the Pentagon last September,
dozens of government scientists and engineers at the Defense Threat Reduction
Agency in Fairfax County began working virtually around the clock to develop
a powerful new bomb.

Their mission: come up with a device that could penetrate al Qaeda''s
cave complexes deep in the mountains of Afghanistan and kill the people
inside.

By mid-December, the scientists were ready to go. In the Nevada desert,
65 miles north of Las Vegas, they detonated the world''s first "thermobaric"
bomb, which creates massive amounts of shock wave pressure from its blast.

Ten were quickly dispatched to U.S. forces in Central Asia, and three
weeks ago the first one was fired by an F-15E at a tunnel in eastern Afghanistan
at the start of Operation Anaconda, the offensive against suspected al
Qaeda and Taliban holdouts.

The crash development of the weapon is just one example of how the war
on terrorism is proving to be a potent laboratory for military innovation.
Thirty new technologies, from armed aerial drones to dosimeters that measure
exposure to toxic chemicals, have been rushed into use at home and abroad,
the offspring of a $688 million effort over the past eight years to stimulate
innovation at the Pentagon.

Among the devices being hurried into the development pipeline are foliage-penetrating
radar sensors, micro-drones and microwave antipersonnel guns that stun,
rather than maim or kill, officials say.

The results of the scientists'' work likely will reverberate far beyond
the campaign against terrorism. As the German blitzkrieg tactic of sudden,
swift land attacks or the American Manhattan project that developed the
first atomic bomb during World War II demonstrated, major wars lead to
military innovations that revolutionize how conflicts are fought.

"Many of the weapons that remain the centerpiece of our military posture
trace their origins directly to previous conflicts: the tank in World War
I, radar on the eve of World War II, and of course the nuclear bomb, which
defined an entire age," said Loren B. Thompson, a defense consultant at
the Lexington Institute, a public policy research organization.

Eight days after the Sept. 11 attacks, Ronald M. Sega, who directs research
and engineering at the Pentagon, called a dozen defense technology officials
together to talk about what projects should be accelerated to support the
impending war.

Sega said three emerged from a crowded field of 150 projects: the thermobaric
bomb, a bunker-busting, air-launched cruise missile, and a "nuclear quadrapole
reasonance" sensor to detect the presence of bulk explosive materials in
trucks and shipping containers.

He said all three have been deployed, either in Afghanistan or the United
States.

The thermobaric bomb resulted from a problem bedeviling Pentagon planners.
Many al Qaeda fighters were burrowed deep inside vast cave complexes in
Afghanistan''s mountains. Short of a ground invasion to roust them cave
by cave -- a proposition that would likely lead to a large loss of American
lives -- getting at the terrorists was problematic.

"We looked at thermobarics and said, ''Hey, we could do this really quickly
and provide a significantly improved capability,'' " said Stephen M. Younger,
director of the Defense Threat Reduction Agency.

The thermobaric bomb releases and then detonates a fine cloud of high-explosive
chemicals, creating devastating shock waves that destroy everything --
and everyone -- inside a cave, bunker or building. The term thermobaric
is derived from the effects of temperature -- the Greek word for heat is
"therme" -- and air pressure -- the Greek word for pressure is "baros"
-- on the target.

Only one has been dropped in Afghanistan on what Gen. Richard B. Myers,
the chairman of the Joint Chiefs of Staff, called a "tactically significant"
cave. Although the device detonated as envisioned, a problem with the laser-guidance
system caused it to fall short of the cave entrance, negating its effectiveness,
a defense official said.

In addition to the thermobaric bomb, the Afghan war will be remembered
for its tactical advances -- the fusion of Special Operations Forces spotting
targets on the ground and long-range bombers firing at them from the air,
for example. It also has marked the first use of armed unmanned drones,
with the CIA using surveillance Predators to launch Hellfire antitank missiles,
and the first operational flight of the Global Hawk, an unmanned surveillance
plane that flies higher and longer than the Predator.

Air Force officers working out of a special operational cell at the
Pentagon called Checkmate figured out how to feed surveillance video from
a Predator directly into an AC-130 gunship''s computers for real-time targeting.

Navy pilots flying EA-6B Prowlers off aircraft carriers found themselves
playing a new role in jamming enemy ground communications. Army Special
Forces troops devised new ways of communicating target coordinates to incoming
fighter and bomber pilots.

There can be dangerous and costly consequences to such experimentation,
however.

One $30 million Global Hawk crashed in late December after a mission
over Afghanistan. And two friendly fire incidents that left three U.S.
soldiers dead and more than two dozen wounded apparently took place after
target coordinates were miscommunicated from U.S. ground forces to pilots
firing satellite-guided bombs.

But even with such setbacks, defense officials and analysts say the
pace and scope of innovation in wartime -- and the immediate feedback on
how the new weapons are performing on the battlefield -- are invaluable.
In this respect, they say Operation Enduring Freedom, as the Pentagon calls
the Afghanistan war, is already proving its worth.

"The most important innovation of Operation Enduring Freedom was the
netting together of forces that traditionally weren''t regarded as having
much to do with each other: strategic bombers and Special Forces, ground
forces and Navy electronic aircraft," Thompson said.

Indeed, the war has been a near-perfect laboratory, according to Michael
Vickers, a military analyst at the Center for Strategic and Budgetary Assessments,
a defense think tank. Vickers, a former Army officer and CIA operative,
said the success came because the al Qaeda network and the Taliban government
sheltering it were overmatched opponents.

"When great powers fight smaller wars -- precursor wars in between the
old military world and the new military world -- you can experiment more
because there''s no doubt you''re going to win," he said. "You experiment,
and there is real feedback. You don''t get that very much in the military."

In Afghanistan, Vickers drew a distinction between technical innovation,
such as development of the thermobaric bomb, and what he considers even
more important organizational and tactical innovation, such as linking
Special Forces on the ground with bombers in the air.

"This was a new way of war, a new operational concept," Vickers said.
"And it was a pretty significant innovation, because we got fairly rapid
regime change with it. This wasn''t on the shelf. This was the way we planned
to overthrow governments."

But even this tactical advance was highly dependent upon new military
technology, largely information technology linking the ground and air forces.

According to one Air Force case study documenting the fusion between
soldiers and bombers, one lethal attack took place last fall after a commander
with the anti-Taliban Northern Alliance asked U.S. Special Forces troops
to help him maneuver through a valley occupied by a large Taliban garrison
and troop concentration.

Using satellite communications, the Army troops called the Air Force
operations center in Saudi Arabia to request an aircraft. The operations
center immediately told an "on-station" B-52 to contact the soldiers.

Using a device called a Viper -- a portable laser range finder, digital
map display and Global Positioning System receiver -- the soldiers calculated
the coordinates of the Taliban garrison and troops and radioed them to
the B-52 crew.

"Less than 20 minutes after the Special Forces operator was contacted,
the B-52 crew passed over the target area and dropped a series of munitions
on the Taliban garrison and troop concentration," the case study said.
"The airstrike resulted in heavy Taliban casualties, the destruction of
numerous fighting positions and artillery pieces, and significant damage
to a command bunker."

One senior Navy official told of how Special Forces called in a carrier-based
Navy warplane on four al Qaeda fighters in a sports utility vehicle who
stopped and took cover under a bridge as soon as they heard the approaching
jet.

With the Special Forces troops shining a laser designator on the enemy,
the official said, the Navy pilot was able to "bounce" a laser-guided bomb
and kill the enemy without damaging the bridge.

"They didn''t know where it [was] coming from," the official said. "A
lot of it was technology per se that enabled us to just kick these guys
every time they put their head up."

Reproduced with permission of the copyright owner.
Further reproduction or distribution is prohibited without permission.

END OF DOCUMENT

Nursing and Personal Experience
PAGES 8 WORDS 2440

To begin to identify a concept, choose a phenomenon (based on a clinical observation, a clinical case in the literature, a personal experience, etc.) you are interested in Write down all of the words you can think of which are relate to or describe the phenomenon. Identify or brainstorm a term (concept) that can summarize, label or name this phenomenon. For example, you observed that a woman with breast cancer was troubled by her treatment decision. She was very confused with the variety of treatment options and she did not understand the meaning of each treatment option. In this phenomenon, you will find words such as ?lack of information?, ?uncertainty?, ?decision making?, and ?risk taking?, et al to describe this phenomenon. Your group will choose one of these concepts as the focus of your ?concept identification? paper.
Then, look up the concept in a large unabridged dictionary and list the definitions you feel most closely describe the concept of interest. At the same time identify synonyms and related terms of this concept.
Search the literature for journal articles and books (see ?how to search scholarly articles in electronic databases?) related to the concept to get sense of the beliefs and thoughts of others in the discipline regarding the concept. Each student should find at least 2 highly relevant articles that address the key characteristics of the concept. Carefully read the scholarly articles and look for all statements that proved a clue/cue to how the author defines or describes

Formatting - times new roman, size 12, double spaced lines. Pick one of chosen identity s. I picked Religion mine is (Muslim).use 4 sources from wartburg college library. First part of the assignment you should discuss why you choose this as one of your identity markers. Why does this part of your identity play an important role to you? How does it help other people know the real you? Second part of the assignment use the information from your sources to inform yourself and the reader as to what others have said about the impact of your chosen identity marker. Choose information that helps the reader understand you - that helps you understand you. We are mostly doing this project to learn about ourselves and how we intellectually came be. In your conclusion you should look at what this assignment has taught you about yourself regarding the identity marker. I chose this identity because I am an Muslim that grew up in America so I have a different view of things. At home it was a complete different world. I was taught to respect everyone and to love what you had. My religion at home I followed so I couldn't eat pork and don't drink or smoke till today. The only thing I don't do is pray. But I believe in Allah. And last of all don't write at a high level mine is about 12th grader level

Rubric
Assignment: Personal Leadership Development Plan.
Please submit this sheet at bottom of your assignment.
CONTENT Total%__________% Earned
Assess your practice for leadership attributes. 2
Summarize your strengths and areas for growth. 3
Describe a plan which includes your personal and professional vision statement. 3
Present two (2) professional short term goals you want to accomplish this semester. 2
Present two (2) long term professional goals you want to accomplish within the next (2) years. 2
Provide a description or outline for developing your expert power and credentials. 3
Present what you need or want to learn to improve your practice and the strategies needed to meet your learning needs. 2
PRESENTATION STYLE
Format APA, 3-4 pages, at least two peer reviewed references cited in the paper, grammar, spelling, and clarity. 3
TOTAL 20
COMMENTS:
Total Score:______ /20 My personal vision is to provide a caring and nurturing environment for my family which includes my Husband and three children. To instill values and ethical behavior to my children and empower them to navigate their way throughout life. Additionally I want to be a caring friend and colleague to the people that are a part of my life journey, to live my life with integrity and always see the glass half full.


Information I would like to include in the paper
Some of my leadership attributes: compassionate, listener, respect, fair, empathy.
Short term goal: I am currently a telemetry nurse my goal for this semester is to obtain a position in an (ICU) intensive care unit. Get involve in professional nursing organizations, join the ANA (American nursing association), and the AACN (American Association of Critical Care Nurses).
Long term goal: to complete my BSN degree within the next 2 years, and apply for the CRNA (certified register nurse anesthetist) program.
I want to develop my expert power by obtaining certain credentials: CMC (Certification in Cardiac Medicine). If I get the ICU position I will get CCRN ( Certification for Adult, Pediatric and Neonatal Critical Care Nurses).

.
References have to be peer reviewed and can't be more than 5 years old.

Thank Your

Prepare a paper on Personal Values Development examining your personal values, ground rules and/or ethics development( persian/iranian and muslim values and cultures). Focus on the developmental aspect rather than on a particular position on any issue. Defining what your values ( persian/iranian valuesa and cultures). are; the sources (people, institutions, events, etc.) that helped shape your values, and the criteria and decision-making factors you utilize to revise them. Also, discuss the potential impact of your values and your performance in your work place ( auto shop/dealer).
There are faxes for this order.

INSTRUCTIONS/SPECIFICATIONS:

There are four (4) articles on information literacy that I will subsequently be sending you by email. Please review these articles and then write a 700-1050-word paper critically analyzing the topic from a perspective that discusses Scholarship, Practice, and Leadership. The paper should demonstrate the following components:

1) An articulate comparison and contrast of the authors perspectives, building a greater understanding of each in the process.
2) The synthesis of a minimum of one current, peer-reviewed external source into the comparison. The fourth attachment I will be sending you is actually the external peer-reviewed article.
3) Appropriate use of APA formatting and style, scholarly tone, and substantiated evidence from the literature. You will be required to create an informed statement, not a personal opinion, regarding the subject. The paper should be written in third person, not first person.

This paper should not a report on information literacy. Rather, it is an exploration of how this topic influences Scholarship, Practice, and Leadership within a selected industry; in this case, Higher Education. The paper therefore should discuss the application of information literacy within the higher education discipline.
There are faxes for this order.

This paper need to be IS topic but related to Accounting firms which will be affected by the information System or technology in the future. Efficiecy and security issue, etc?

Using courses you have previously taken and/or are currently taking, compile a list of specific skills and knowledge you have learned. Using your list, determine how these skills and knowledge might enhance your personal portfolio. Why are these skills and knowledge important for employment in your field? Why might they be attractive to potential employers?
Classes taken-
Foundations in integrative studies- Understand the distinctions between multidisciplinary, transdisciplinary, and interdisciplinary. Encourages interdisciplinary thinking. Understand the criticisms lodged against interdisciplinary studies.
Nonverbal communication- seeing and understanding what nonverbal cues are and how to read them.
Personal finance- fully grasping what it means to save and invest. Spending money wisely as a college student. What to look for when buying stocks and investments. All these are variables that will be used in the near future
Communication in organization- key elements that are used and needed in everyday life, personally and professionally to keep on track and keep moving forward.
Career and professional development- where I want to be professionally in five years. What type of work force do I want to enter.
Field of Employment: home healthcare and marketing/liaison
Incorporate all this into the paper. All this must be in your own words. No citations or references

Your portfolio will be comprised of two main components: your personal philosophy of supervision and two supervision forms.

Formulate and describe your personal model of supervision. This will include an 8-10 page paper (does not include title, bibliography, resource pages) with 7-10 references, and you will integrate the information from your resources to:

Analyze how your counseling approach relates to and differs from how you approach supervision.

Examine and discuss the specific supervision model(s) you draw from and how you conduct (or will conduct) supervision within this framework.

Discuss your own developmental level as a supervisor and how this impacts your view of supervision and your personal supervision model.

Discuss the significance of being a multiculturally competent supervisor who will have supervisees from diverse backgrounds and cultures and how your own cultural background might impact the supervisory relationship and process.



(Please use the Discrimination Model of Supervision)
There are faxes for this order.

Read the case study from the book Organizational Behavior by Hellriegel/Slocum 2011 custom Edition.

Then write a five page paper answering the following questions:(1) Discuss fully how personal differences and preferences can impact organizational ethics. (2) discuss fully how organizational policies and procedures can impact ethics. (3) Discuss fully the ethical dilemmas that Valerie is facing. (4) Recommend fully what Valerie should do. Provide a detailed explanation.

This paper should be double spaced, Times New Roman font (size 12), one inch margins on all sides, APA format.

Type the question followed by your answer to the question.

In addition to the 6 pages, a title page is to be included, with sources.

Title Page is to contain the title of assignment, and the date

Ethical and Legal Implications in IT
- Evaluate the ethical and legal impact of information technology on society, especially in regard to information assurance and security.
- Identify relevant IT industry regulations and standards for information security
- Identify the legal implications of collecting electronic consumer data
- Identify relevant privacy rules and their impact on businesses
- Identify commonly practiced business ethics that impact information assurance and security

Self in Society and Personal
PAGES 3 WORDS 1046

-Title
-Abstract
-Define the concept of "the self" in the social world.
-Apply the concepts of "the self" to your own life, including self-concept, self-esteem, and self-efficacy.
-Describe at least two social experiences or events that have impacted your own personal development.
Conclusion

Personal Experience
PAGES 4 WORDS 1532

there are are a series of dialogue questions that need to be answered and addressed in no more than four pages. The admissions committee is interested in your capacity for self-reflection and your ability t think critically, as well as your writing ability.
I will be faxing the questions along with material that I have written in response to the questions. What I ned is for you to add any information that you think is critical to the answers. Due to the fact these question need to be answered in 4 pages the material that I submitted via fax has to be reworked/rewritten.

They are looking for the following:
knowledge of Psychology and how it was acquired
Clinical Experience or Clinical potential
self exploration and experience in therapy
understanding of different cultures and society

This is a Masters Degree in Clinical Psychology to become a MFT ( Marital Family Therapist)

Please contact me with any questions. Do you work on weekends and when am I able to receive the paper it must be in November 1st. Which means I need it ASAP

There are faxes for this order.

image
5 Pages
Essay

Healthcare Information Technology Electronic Medical Record: User

Words: 1472
Length: 5 Pages
Type: Essay

Healthcare Information Technology My company is a long term care facility- Respiratory therapist This is in 2 parts, Part one is three discussion questions, and the second part is a research…

Read Full Paper  ❯
image
12 Pages
Research Paper

Risk Assessment

Words: 3324
Length: 12 Pages
Type: Research Paper

I just wanted to send out a clarification on the Risk Assessment Paper due December 9th before everyone beats themselves silly, neglects their other coursework and loses sleepless nights…

Read Full Paper  ❯
image
12 Pages
Essay

Health Information Technology Project

Words: 3806
Length: 12 Pages
Type: Essay

To complete: The deliverable is a 12- to 15-page scholarly report, not counting the title page, abstract, or references. A successful report should leave the reader with confidence in understanding…

Read Full Paper  ❯
image
8 Pages
Research Paper

Marketing and Information Systems

Words: 2196
Length: 8 Pages
Type: Research Paper

The proper role of information systems in marketing and what information is necessary for decision making. Explore how decisions are made and what kinds of support information systems gives…

Read Full Paper  ❯
image
6 Pages
Essay

Information System Management, Zackman's Approach

Words: 1959
Length: 6 Pages
Type: Essay

Please write a comprehensive article review on 1987 John Zachman Article, A framework for information systems architecture, attached, http://old.zachmaninternational.com/images/stories/ibmsj2603e.pdf A comprehensive article review should be 6 pages. It consists of…

Read Full Paper  ❯
image
10 Pages
Research Paper

Functions of an Information System. List and

Words: 3167
Length: 10 Pages
Type: Research Paper

Please answer each question, one question per page. Place all references to the specific question at the end of the page the question is being answered on. Question 1 List…

Read Full Paper  ❯
image
10 Pages
Essay

Systemic Challenges That Choicepoint Is

Words: 3320
Length: 10 Pages
Type: Essay

Kindly provide a review of the assigned case study. Also, address the following questions: 1. How legitimate are the concerns voiced by the industry's critics? 2. To what extent…

Read Full Paper  ❯
image
5 Pages
Research Paper

Computer Science Legislative, Ethical, and

Words: 1588
Length: 5 Pages
Type: Research Paper

Part 1. Write four (4) page paper on upcoming legislative trends or new laws that will have an impact on the information technology culture in 2011-2012. Part 2. As the CISO of…

Read Full Paper  ❯
image
3 Pages
Essay

Personal Can Ethics Get Valerie

Words: 925
Length: 3 Pages
Type: Essay

How Personal Can Ethics Get? Valerie Young was a marketing manager at an international cosmetics and fragrance company, Wisson, which is headquartered in Chicago. Wisson underwent a major reorganization due to cost cutting.…

Read Full Paper  ❯
image
7 Pages
Research Paper

Personal Skills in Business and

Words: 1957
Length: 7 Pages
Type: Research Paper

The paper should demonstrate your understanding of Communication at work (chapter 1) and interpersonal skills (chapter 5). The paper should integrate both of the selected communication areas and show…

Read Full Paper  ❯
image
6 Pages
Essay

Personal Values Development

Words: 1786
Length: 6 Pages
Type: Essay

Perfer user-Freelancewriter: I sent you some papers on my ethics and one of my job issues, to give you a little background on me for the Personal Values Development. If…

Read Full Paper  ❯
image
15 Pages
Research Paper

It Risk Management -- Cyber

Words: 4384
Length: 15 Pages
Type: Research Paper

Ones paper will consist of a 2,500-to-3,500-word paper written in APA pertaining to a quality management or risk management topic. The student must incorporate theorists, tools, techniques, models, and…

Read Full Paper  ❯
image
3 Pages
Essay

My Personal Interest in a Career in Information Technology (IT)

Words: 805
Length: 3 Pages
Type: Essay

INSTRUCTION: NEEDS LOTS OF GROOMING!!!!! 1. Personal Interest essay 2. TOPIC: My Personal Interest in a Career in Information Technology (IT) 3. MLA FORMAT with two cited sources. Arial/12/double space 4. I will include…

Read Full Paper  ❯
image
8 Pages
Research Paper

Nursing and Personal Experience

Words: 2440
Length: 8 Pages
Type: Research Paper

To begin to identify a concept, choose a phenomenon (based on a clinical observation, a clinical case in the literature, a personal experience, etc.) you are interested in Write…

Read Full Paper  ❯
image
4 Pages
Essay

Religion's Role in Personal Identity Formation

Words: 1372
Length: 4 Pages
Type: Essay

Formatting - times new roman, size 12, double spaced lines. Pick one of chosen identity s. I picked Religion mine is (Muslim).use 4 sources from wartburg college library.…

Read Full Paper  ❯
image
3 Pages
Research Paper

Leadership Development Personal Leadership Development

Words: 1002
Length: 3 Pages
Type: Research Paper

Rubric Assignment: Personal Leadership Development Plan. Please submit this sheet at bottom of your assignment. CONTENT Total%__________% Earned…

Read Full Paper  ❯
image
5 Pages
Essay

Persian Values My Personal Values

Words: 1418
Length: 5 Pages
Type: Essay

Prepare a paper on Personal Values Development examining your personal values, ground rules and/or ethics development( persian/iranian and muslim values and cultures). Focus on the developmental aspect rather…

Read Full Paper  ❯
image
3 Pages
Research Paper

Literacy Information Literacy as the

Words: 1453
Length: 3 Pages
Type: Research Paper

INSTRUCTIONS/SPECIFICATIONS: There are four (4) articles on information literacy that I will subsequently be sending you by email. Please review these articles and then write a 700-1050-word paper critically analyzing…

Read Full Paper  ❯
image
20 Pages
Essay

What Information System Holds in Accounting Industry's Future

Words: 7679
Length: 20 Pages
Type: Essay

This paper need to be IS topic but related to Accounting firms which will be affected by the information System or technology in the future. Efficiecy and security issue,…

Read Full Paper  ❯
image
3 Pages
Research Paper

Personal Portfolio of Skills: Enhancement

Words: 895
Length: 3 Pages
Type: Research Paper

Using courses you have previously taken and/or are currently taking, compile a list of specific skills and knowledge you have learned. Using your list, determine how these skills and…

Read Full Paper  ❯
image
8 Pages
Essay

Supervision Portfolio / Personal Philosophy and Supervision Forms

Words: 2593
Length: 8 Pages
Type: Essay

Your portfolio will be comprised of two main components: your personal philosophy of supervision and two supervision forms. Formulate and describe your personal model of supervision. This will include an…

Read Full Paper  ❯
image
6 Pages
Research Paper

Personal Can Ethics Get? Discuss

Words: 1920
Length: 6 Pages
Type: Research Paper

Read the case study from the book Organizational Behavior by Hellriegel/Slocum 2011 custom Edition. Then write a five page paper answering the following questions:(1) Discuss fully how personal differences and…

Read Full Paper  ❯
image
5 Pages
Essay

Security it Security, Privacy and

Words: 1471
Length: 5 Pages
Type: Essay

Ethical and Legal Implications in IT - Evaluate the ethical and legal impact of information technology on society, especially in regard to information assurance and security. - Identify relevant IT…

Read Full Paper  ❯
image
3 Pages
Research Paper

Self in Society and Personal

Words: 1046
Length: 3 Pages
Type: Research Paper

-Title -Abstract -Define the concept of "the self" in the social world. -Apply the concepts of "the self" to your own life, including self-concept, self-esteem, and self-efficacy. -Describe at least two social experiences…

Read Full Paper  ❯
image
4 Pages
Essay

Personal Experience

Words: 1532
Length: 4 Pages
Type: Essay

there are are a series of dialogue questions that need to be answered and addressed in no more than four pages. The admissions committee is interested in your…

Read Full Paper  ❯