Report on Stimulation Game

Mimic Pro Simulation | Join this section: https://home.stukent.com/join/915-DDF Over the course of the term, there will be 7 rounds. The simulation will inform content in your written report. The simulation is a mandatory component of the course and all students must participate. The purpose of the simulation is to give “real” experience with Landing Page Optimization, SEO, Pay Per Click Advertising and Email Marketing. The simulation aims for students to have the following takeaways: o To understand the basic components that make up a great landing page through content (calls to action, unique value propositions, compelling content, etc.) and proper SEO strategies (titles, H1’s, content, etc.). o To understand the metrics to creating successful online ad campaigns using targeted keyword research, ad copy and understanding key performance indicators. o To understand proper techniques and strategies in email marketing to drive more online traffic and sales. You can learn more about Mimic Pro once logged into the simulation. It is recommended you watch the two YouTube videos that outline Round 1 and Round 2 to 7. PROJECT COMPONENTS Written Report Prepare a report that that would feasibly be written to the Chief Marketing Officer (CMO) of Kent’s Camera Castle (KCC) that outlines your overall strategy and best practices used in the simulation. This report also may ask for additional strategies or tactics based on your experience in the simulation. 1. Overview (~1 page) a. Objectives – what were you trying to achieve in the simulation? What were your priorities? b. Target Audience – who are you trying to reach? Who are you writing your ads for? c. Product selection – what are your products and why have you selected these products to sell? 2. Digital Marketing Tactics & Performance (~3 pages) Summarize your approach (and results, if available) of the following digital tactics for KCC. Make sure to include (a) key decisions, (b) strategic detail (e.g., top performing ad words, bidding approach, etc), and (c) key recommendations you suggest for KCC in their ongoing online marketing activities. In this discussion, also make sure to summarize your group’s performance in the simulation. Use of charts, graphs, and metrics/key performance indicators are encouraged. a. Pay Per Click Advertising b. Landing Page Optimization i. Layout ii. Onsite SEO c. Email marketing. Explain best practices employed for a successful email campaign. Justify list choice, content, and email strategy. d. Budget – why did you choose to allocate your budget in that way? Justify your decisions. 3. Conclusion (~ 1 page): A short summary and conclusion should be included as the end of the report. a. Provide a summary of Kent’s Camera Castle and the digital tactics implemented b. Include recommendations of what digital activities Kent’s Camera Castle should continue c. Discuss: If you were to do the simulation again, what would you do differently? d. Include Five Lessons Learned: Identify and explain at least 5 “lessons learned” regarding digital marketing. 4. Professionalism: The report must have proper report format (see below), a professional tone, be free of language and grammar errors, and good flow and structure. Make sure to cite all references. Report Format • Your report should be no more than 6 pages long, excluding the title page, table of contents, mockups/visuals, charts/diagrams. Page length suggestions are written above and can be used as a guideline. • Single spaced, 11-12pt font, 1” margins; APA referencing and citation format • Formal business / professional tone • You may include Appendices if needed. Content may include: written reports, keyword research/charts, etc. Notes on Professionalism o In addition to content, your work must be professionally presented. This means that the writing tone and style are readable, the word choice is effective and sentence structure is varied. o Grammar, spelling, and punctuation must be free of errors. Craft your sentences to convey your ideas clearly. Use marketing terms and knowledge learned in the course. If the text is unreadable and ineffective, if you use poor word choice and minimal sentence variety, and if there are frequent and distracting grammar, spelling, and punctuation errors, you will lose points according to the degree of professionalism demonstrated. o You must properly cite all content, consistently using one of the citation methods listed here: library.douglascollege.ca/guides/cite-sources o The Learning Centre offers students editing and writing assistance for all projects and assignments. You can access this service in person or online.

Hacking Theory

Paper details:

Assignment 2: Hacking Theory Write a paper in which you: Explain the various forms of social engineering tactics that hackers employ and provide a recent example of each. Describe the five social norms of hacker subculture and provide an example of each. Search Internet news sources and find a recent article (less than 1 year old) on hacking. Describe the tone in regard to hacking and explain what the article conveys in regard to stigmas and labels surrounding the hacker. Go to https://research.strayer.edu to locate at least three (3) quality references for this assignment. One must have been published within the last year. Note: Wikipedia and similar websites do not qualify as quality resources. Your assignment must follow these formatting requirements: This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details. Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Describe the technologies and processes involved in digital forensics. Explain the ethical concerns that information technologies raise in society and the impact of information technologies on crime, terrorism, and war. Use technology and information resources to research issues in information technology in criminal justice. Write clearly and concisely about information technology in criminal justice topics using proper writing mechanics and technical style conventions.

Money & Medicine Documentary

After watching the film, post your response. POTENTIAL ideas for your reflection may include any or all of the following (3-4 pages): What did you learn from watching this film that you did not know before? What facts did you find most surprising? Where in the healthcare system (in 2012 when the film was made) is there waste? How did you feel about the choices the patients in the film made? Which issues in the film are addressed by the Affordable Care Act? How does this film inform your future practice as a social worker-both in terms of policy and clinical work?

Security Models Summary

Project 1 Scene 1 You have just taken a position as the chief information security officer at your organization. John Williams, the chief technology officer and your new boss, stops at your office door. “I know you’re busy, but I’d like you to come by my office when you get a chance.” Excited about the prospect of something new, you grab a pen and paper and walk to John’s office. Scene 2 John says, “Thanks for coming over so quickly. I’ll get right to the point. As the CISO, I’m sure that you’re aware of the recent Office of Personnel Management breach, and the impact that this has had on our industry. John continues, “I’m sure that you also realize the heavy burden on our department to protect our organization’s assets and information. I would like to make sure that a similar situation doesn’t happen here. My first step toward preventive measures is to develop new policies and procedures that better protect our data.” John sits at his desk and begins typing while he says, “That brings me to why I asked you here. While I begin my review of current policies and procedures, I would like you to help me by drafting a custom security plan that best fits our organization.” John continues, “You should start by analyzing our security weaknesses, or vulnerabilities, then continue with reviewing existing security models and analyzing which attributes are best suited for our organization. “You will look at the pros and cons of each model, which attributes are best suited for us, and the reasoning behind your conclusions. You will need to submit your completed report to me with a drafted security plan in two weeks.” As a new employee, you realize that this is a great opportunity to show your new boss how you can make a positive contribution to your organization. You know you have enough time to complete your analysis if you start right away. Most companies and agencies implement security models to protect the confidentiality, integrity, and availability (CIA) of information and data. As security vulnerabilities and threats continue to evolve, security systems need to adapt to effectively protect data and systems. In this project, you will evaluate existing security models and their attributes and ultimately recommend a custom security plan to your assigned organization. You will also evaluate the pros and cons of implementing particular model attributes based on the type of organization and employees in relation to CIA. Upon completion of this project, you will have written a report on the importance of security models in organizations like yours and identified the vulnerabilities of your organization. This is the first of four sequential projects. There are 14 steps in this project. Begin by reviewing the project scenario, then proceed to Step 1. When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission. 5.1: Define and appropriately use basic cybersecurity concepts and terminology. 6.2: Create an information security program and strategy, and maintain their alignment. 7.3: Evaluate enterprise cybersecurity policy. 9.2: Rank the vulnerabilities of a system from a disaster-management perspective. Step 1: Review Assigned Organization All four projects for this course will be completed from the vantage point of a specific industry and an organization assigned to you by the instructor. Familiarize yourself with the organization your instructor has assigned to you by reviewing the organization description. The descriptions include an overview and key information about the organization, as well as information about a breach or attempted breach. For the purposes of this course, you will assume this organization is your employer. You may wish to briefly research your assigned organization to gather additional information about the organization and its security posture. Step 2: Cybersecurity Background Summary In Step 1, you familiarized yourself with your assigned organization. Now it is time to write a cybersecurity overview. Write a three-page background summary that includes a general overview of cybersecurity and a section on enterprise cybersecurity.

Analysis paper. A narrative of the Lord’s Wonderful Dealings

Convention-based or Context-based Argument. In your introductory paragraph, you will need to present a claim that references a central idea (an overall message about the text that you wish to convey). To support your claim, use your understanding of the conventions (or context if you take that route) related to the text. For example, what does an understanding of certain conventions of Native American creation stories found in “Hajíínéí” reveal about Native American Tradition?

Applied Behavioral Analysis

As a practicing independent Behavior Analyst, you have received an email from a staff member representing a provider of education and/or human services requesting your services. Specifically, this staff member has asked you to meet with other staff and/or administrators to develop a behavior intervention plan for a third grade student at a local elementary school. This student is demonstrating significant problem behaviors in the form of disruptive behaviors in his classroom and in other settings within the school (lunch, recess, specials, etc.). Disruptive behaviors have been termed “aggressive” and “non-compliant” by school staff. Please detail responses to the following: Specify the referral problem. Be creative and describe the type of provider that has requested your services, the client, and provide operational definitions for the problem behaviors indicated in the scenario. In a script or narrative format, provide information to the members of the “planning” meeting including the following: Describe the specific purposes of a Functional Behavioral Assessment (FBA) and discuss why conducting the FBA prior to the development of a behavior intervention plan is important. Describe, in specific detail, how Antecedent stimuli and conditions could be potentially important for the assessment of the target behaviors in the scenario. Please include discussion of the influence of Discriminative Stimuli and Motivating Operations in triggering the target behaviors. Describe, in specific detail, how Consequence stimuli and conditions could be potentially important for the assessment of the target behaviors. Be sure to indicate the influences of Positive Reinforcement, Negative Reinforcement, and Automatic Reinforcement in maintaining the target behaviors. Describe three (3) Indirect Functional Assessment procedures that you may be implementing during the process of the Functional Behavioral Assessment. Be sure to specify how they will be used and what the purpose of each tool is. Describe three (3) Direct Descriptive Assessment procedures you may be implementing during the process of the Functional Behavioral Assessment. Be sure to specify how they will be used and what the purpose of each tool is. Describe, in specific detail, at least two (2) ethical obligations and/or concerns that would be necessary to address within the current case scenario. (You may use either or both APA and BACB guidelines as reference). Tips for developing your responses: The staff that you are presenting to think that, as a Behavior Analyst, you will be able to develop a behavior plan on the spot during this meeting that is both easy to administer and effective at modifying the behavior of the client in question. The staff clearly knows nothing about behavioral assessment processes. It is your job to assist them in understanding the process of Functional Behavioral Assessment and its necessity before any interventions can be developed and implemented. Be sure to discuss antecedent stimuli and consequence stimuli based on the function (purpose) that the target (problem) behavior serves and not the choice of intervention. The goal is to identify variables that are related to the occurrence of the problem behavior, not to develop an intervention. Be mindful of making solid choices of the procedures you will be highlighting based on the scenario presented as well as a rationale for your choices. The Functional Behavioral Assessment Screening Form The Functional Behavioral Assessment Form Assignment should be a minimum of 3-5 pages not including the title and reference pages. Use APA Format.

Relationship between unionized employees and management

INSTRUCTIONS: There is not a question. However, you may respond to this post by taking a viewpoint on what the poster stated below and expounding on this by adding value and or a different perspective.”I currently work in a labor-management union situation that is currently in negotiation of a contract so this question, and the information regarding unions, is something that I have been hearing about a lot.” The pro’s to this environment is that the NLRB governs the relationship between unionized employees and management and work to bring the two to common ground in regards to wages and environment as well as benefits both short and long-term (Pozgar, 2016). In my situation, this relationship is something that is important and consistently present. Our management team works very closely with union representation in order to ensure that company policy honors the union contract and that decisions surrounding employee performance are represented. The biggest con for me is that the union works very hard to protect every employee, even the ones that should not be protected. Union sometimes makes it very difficult to terminate employees that should be. It is often difficult to include immediate termination items in agreements and different classifications of violations accumulate separately instead of together. This means that an individual may be on their final warning for attendance, but has also accumulated warnings regarding behavior that may only total to a moderate level. Management can’t consider both of these items in termination. It is one or the other. So even though the quality of the specific employee is poor overall, they are protected under the union agreement. To me this really damages the business views of the company. They are impacting productivity of the other employees as the load has to be carried, and they are impacting the experience of the patients, but management often has their hands tied. In regards to the collective bargaining and providing quality care, union represented employees have a voice to communicate working conditions and to work with the employer to improve and/or change the situation for the benefit of the patients. It’s not only important to keep the employees happy, it is important to listen to the represented individuals as they often can identify issues with the business process very early and reduce the impact to the business and the patient. Considering union representation for new employees is also important. The hiring process for the business can be extensive in order to ensure that quality individuals are being accepted into the union so the benefits are greater. This can include a verification of past employment and extensive interviews of the individual references. Reference Pozgar, G. D. (2016). Legal Aspects of Health Care Administration (12th ed.). Burlington, MA: Jones & Ba

Spiritual Development

Post a Discussion in which you explain how considerations about clients’ worldviews, including their spirituality or religious convictions, might affect your interactions with them. Provide at least two specific examples. In addition, explain one way your own spirituality or religious convictions might support your work with a client, and one barrier it might present. Finally, share one strategy for applying an awareness of spirituality to social work practice in general. Furness and Gilligan (2010) stated, “There is a growing body of literature written predominantly for health professionals and more recently for social workers about the importance of developing and incorporating cultural and spiritual sensitivity and awareness in their work with others” (p. 2187). Spirituality, which may or may not include involvement with an established religion, contributes to human diversity and influences human behavior. An individual’s spirituality may be an important factor in his or her social environment. As a social worker, your awareness of a client’s spirituality may help increase your understanding of the client and his or her needs. Sensitivity to and respect for your client’s spiritual dimension reflects your appreciation of diversity. As you consider the potential impact of your clients’ spirituality on their perspectives aSpiritual Developmentnd behavior, you must also consider how your spirituality might influence your interactions with a client. For this Discussion, you consider the impact of spirituality on your interactions with clients. Learning Resources Note: To access this week’s required library resources, please click on the link to the Course Readings List, found in the Course Materials section of your Syllabus. Required Readings Zastrow, C. H., & Kirst-Ashman, K. K. (2016). Understanding human behavior and the social environment (10th ed.). Boston, MA: Cengage Learning. Chapter 3, Section “Relate Human Diversity to Psychological Theories” (pp. 130-132) Chapter 7, Sections “Review Fowler’s Theory of Faith Development,” “Critical Thinking: Evaluation of Fowler’s Theory,” and “Social Work Practice and Empowerment Through Spiritual Development” (pp. 350-354) Chapter 15, Section “Spotlight on Diversity 15.2: Spirituality and Religion” (pp. 694-696) Barker, S. L. (2007). The Integration of spirituality and religion content in social work education: Where we’ve been, where we’re going. Social Work & Christianit, 34(2), 146–166. Note: You will access this article from the Walden Library databases. Crisp, B. R. (2011). If a holistic approach to social work requires acknowledgement of religion, what does this mean for social work education?. Social Work Education, 30(6), 663–674. Note: You will access this article from the Walden Library databases. Day, J. (2010). Religion, spirituality, and positive psychology in adulthood: A developmental view. Journal of Adult Development, 17(4), 215–229. Note: You will access this article from the Walden Library databases. Furness, S., & Gilligan, P. (2010). Social Work, Religion and Belief: Developing a Framework for Practice. British Journal of Social Work, 40(7), 2185–2202. Note: You will access this article from the Walden Library databases. Oxhandler, H. K., & Pargament, K. I. (2014). Social work practitioners ‘integration of clients’ religion and spirituality in practice: A literature review. Social Work, 59(3), 271–279. Note: You will access this article from the Walden Library databases. Stirling, B., Furman, L., Benson, P. W., Canda, E. R., & Grimwood, C. (2010). A comparative survey of Aotearoa New Zealand and UK Social Workers on the role of religion and spirituality in practice. British Journal of Social Work, 40(2), 602–621. Note: You will access this article from the Walden Library databases. Document: Wagenfeld-Heintz, E. (2009). Faith and its application to the practice of social work. Journal of Religion, Spirituality & Aging, 21(3), 182–199. (PDF)(PDF) Faith and its application to the practice of social work by Wagenfeld-Heintz, E., in the Journal of Religion, Spirituality & Aging, 21/3. Copyright 2009 by Haworth Pastoral Press. Reprinted by permission of Taylor & Francis Informa UK Ltd- Journals via the Copyright Clearance Center. Plummer, S.-B., Makris, S., Brocksen S. (Eds.). (2014). Sessions: Case histories. Baltimore, MD: Laureate International Universities Publishing. [Vital Source e-reader]. “The Logan Family” (pp. 9-10) Document: Life Span Interview (PDF) You will use this document for your Life Span Interview Assignment In Week 10. Required Media Laureate Education (Producer). (2013). Logan family: Episode 3 [Video file]. Retrieved from https://class.waldenu.edu Note: The approximate length of this media piece is 2 minutes. Accessible player Optional Resources Use the link below to access the MSW home page, which provides resources for your social work program. MSW home page Atchley, R. C. (2006). Continuity, spiritual growth, and coping in later adulthood. Journal of Religion, Spirituality & Aging, 18(2/3), 19. Hodge, D. R., & Bushfield, S. (2007). Developing spiritual competence in practice. Journal of Ethnic and Cultural Diversity in Social Work, 15(3-4), 101–127. Linzer, N. (2006). Spirituality and ethics in long-term care. Journal of Religion and Social Work, 25(1), 87–106. Nelson-Becker, H., & Canda, E. R. (2008). Spirituality, religion, and aging research in social work: State of the art and future possibilities. Journal of Religion, Spirituality & Aging, 20(3), 177–193. Nelson-Becker, H. (2005). Religion and coping in older adults: A social work perspective. Journal of Gerontological Social Work, 45(1/2), 51–67.

The third part of Dream Country

The third part of Dream Country

Consider only the second third of the book: Parts 4, 5, and author’s note of Gibney’s Dream Country ; Please note that if you have a different version than mine, you may have different page numbers. Writing is the way we make sense of the ideas in our head and what we read about for class. These close- reading journals (due every week) will allow you to explore the ideas you read about. Each entry should be an honest reaction to and analysis of the materials we have read, NOT a summary of the material. All journal entries are due on D2L according to the dates indicated on the schedule. Each entry should be ~500-750 words. You may consider any of the text(s) from that week (you may, if you wish, reflect back on previous texts as A well to make cohesive connections). Your journals will be two-part; I will be looking for 1) a synthesis/ response and 2) an analysis/close-reading of a line. For the first part, concentrate on responding to the ideas and issues presented by the texts and making connections among the texts and to your own experiences. The main idea is to reflect on ideas that you find interesting. If you want, you may consider some of the Smart Questions I’ve posted in the ONLINE Discussion for that week or some of the Smart Questions your classmates have shared. For the second part, choose one line from one of the texts and conduct a Close Reading (see the last page of these Course Policies) of that text. choose a passage for Close Reading in the assigned reading for that week (if you did so for Discussion, choose a different one for the Journal). You can certainly connect that passage to your observations or speculations about character development, setting, plot, or your own speculations about what might be happening in the narrative arc of the story. Please be sure to list the page number for the text that you’ve chosen so that I can follow along when I read your entry. For your third Discussion, consider what you think about the way the author ties up the storyline. Like a lot of fiction, there’s a lot of action in this final third that ties up many of the threads that readers thought were dangling. On the other hand, many readers have pointed out that they feel like the story, particularly Kollie’s story, is unfinished. Why do you think Gibney made this choice? What is the significance of Angel’s character tying up the loose ends for us as readers? There is a video. https://minneapolis.learn.minnstate.edu/d2l/le/content/4570144/viewContent/38877114/View St. Catherine University chose this book as its “one read for racial justice” book just last fall. Do you think that these accolades are well-earned? Why or why not? One reason it’s become so important is that there’s not much fiction about this particular identity (Liberian/Liberian-American).

This reviewer writes that “Perhaps shamefully, I managed to make it to 40 without knowing much of anything at all about Liberia,” and I suspect she’s not alone. Here are some of the themes identified by the I’m Your Neighbor Books website: https://www.imyourneighborbooks.org/2019/01/28/dream-country/ Bi-racial Identity Community Cross-Group Friendship Cultural Identity Family Relationships Family Separation Historical Identity Immigration Migrant Life Race Racial Discrimination Refugee Life Repression Survival Trauma For Discussion this week, feel free to discuss one of the themes above or another theme you’ve noticed. If you are feeling stuck, use the Discussion Guide at the end of the book (or attached here for you as a PDF) and consider any of the questions listed there. You may even want to revisit one that you took on during either of your first two Discussion posts. You may also want to look at some of the “Selected Further Reading,” “Selected Video,” or the timeline in the end matter of the book. How does the historical foundation of this novel help you to understand the issues of identity that are brought up in it?

The reform of the jurisdictional threshold for application of the UK Merger Control Regime which came into effect on 11th of June 2018.

The reform of the jurisdictional threshold for application of the UK Merger Control Regime, which came into effect on 11th of June 2018. An investigation on the effect of the amended Turnover and Shares of Supply Tests on cross border mergers in terms of national security concept. How can this affect the role of legal advisors on advising cross border M&A parties in the UK?