Diversity Discussion

  1. Of which biological variations among Korean Americans should the nurse be aware? 
  2. Describe how stereotyping Puerto Ricans as similar to other Hispanic Americans can lead the nurse to errors in patient care. 
  3. Describe the geographical location of Jordan, and indicate how this region of the world and the political turmoil experienced by Jordanians may have a profound political impact on the health and well-being of recently immigrated Jordanian Americans. 
  • 500 words, formatted, and cited in current APA style with support from at least 2 academic sources

Bibliography

Conduct a literature search of articles discussing the role of agency problem in managemant decisions. Submit an annotated bibliography that contains at least five sources you found. At least three of the articles must be peer-reviewed, research articles. Use APA style to list each article.

Contingency Planning with AI 

For this activity, you will be utilizing artificial intelligence (AI) to assist you with generating preliminary identification of potential threats at a healthcare organization for the purpose of obtaining a starting point of examples of contingency plans that you may need to consider.

You will be first validating that the AI response(s) is/are valid concepts by comparing them against course material and relevant resources. Consider whether the AI’s suggestions align with best practices in healthcare data security and if they address the specific challenges outlined in the case scenario. Next, you will be summarizing the AI (ChatGPT) results in your own words, with an emphasis on your analysis and critical thinking. The last step will be to highlight how the AI’s suggestions fit within the context of the case scenario and your understanding from the course.

The last step will be to provide an outline in your own words, drawing on the insight you have learned throughout this course, to provide an outline of how you would develop the contingency plan.

Recommend utilizing your textbook as a resource to support your answer.

Case Scenario to Address

You are part of a large hospital’s Privacy & Security Team. Your team has just discovered that the network is encountering some challenges with data encryption and unauthorized access to patient information. The Chief Information Officer has asked your team to develop an effective contingency plan that will be designed to protect patient data and ensure system availability in the event of future cyber-attacks. The plan needs to provide strategies that provide for routine backups to the system, data encryption, a set of rapid response protocols to mitigate the threat, and an employee training plan.

Suggested ChatGPT Prompt to Use

As a privacy and security specialist, you have been asked to draft an outline of a proposal for a contingency plan to protect the hospitals patient data that addresses system back-ups, rapid response protocols for possible threats, a training plan for employees on security, and suggestions for data encryption methods.

Your deliverable will be a minimum of a half-page paper that is double-spaced, with a maximum page length of one-and-a-half pages. Carefully review the expectations listed here:

Preparation: You have validated the AI response(s) by comparing them against course materials and relevant resource. At this point, you should have determined if AI’s suggestion(s) align with best practices in healthcare data security and if they address the specific challenges within the case scenario provided.

1. Clearly show within your paper, a summary using your own words, what the response from the AI (ChatGPT) is that you are summarizing (this does not need to be in APA formatting to fulfill this activity) along with your analysis of the case.

Important Note: While AI can generate useful content it is critical that you are able to understand and interpret the situation to ensure that you are able to create a strong contingency plan. Your paper should be entirely in your own words.

2. Clearly note within your paper, using parenthesis, where you are utilizing examples from the textbook – you should be summarizing in your own words, for this informal activity APA formatted references are not being required, only that you are making note of textbook (or other resource by providing name of resource and section) summarized support.

3. Have fun with this experiment!

Note: The purpose of this AI Activity is to demonstrate useful ways you can utilize ChatGPT (or other AI) to brainstorm preliminary ideas and that you need to validate that the generated response is accurate.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M6 Contingency Planning with AI

M6 Contingency Planning with AI
CriteriaRatingsPts
This criterion is linked to a Learning OutcomeParameters Parameters
Paper
-Free of grammatical & spelling errors
-Minimum ½ page, Maximum is 1 ½ pages
-Uses standard double-spacing without extra spaces between paragraphs
-This is an informal paper that indicates name of sources in parenthesis to credit (APA not required)
6 pts Meets or Exceeds Student submission clearly encompasses deliverable parameters –Free of grammatical & spelling errors -Minimum ½ page, Maximum is 1 ½ pages -Uses standard double-spacing without extra spaces between paragraphs -This is an informal paper that indicates name of sources in parenthesis to credit (APA not required) 4 pts In Progress Student submission mostly meets deliverable parameters -1 grammatical & spelling error -Is slightly short or over page requirement (1/4 page) 2 pts Little Evidence Student submission only partially meets parameters 0 pts No Evidence Student submission clearly does not meet the required Parameters6 pts

This criterion is linked to a Learning OutcomeEffective Use of AI Effective Use of AI
The student effectively summarizes AI-generated content in their own words, demonstrating a clear understanding and critical analysis of the AI’s suggestions.
7 pts Meets or Exceeds Student submission -Provides an effective summary of AI-generated content in their own words, demonstrating a clear understanding and critical analysis of the AI’s suggestions 4 pts In Progress Student submission: -Provides an a summary of AI-generated content but may lack depth in analysis or critical thinking 2 pts Little Evidence Student submission: -Provides a summary of AI-generated content is unclear, lacks originality, or shows minimal critical engagement 0 pts No Evidence The student fails to accurately summarize AI content or does not demonstrate effective use of AI in their response7 pts

This criterion is linked to a Learning OutcomeContingency Proposal Contingency Proposal
The contingency plan is comprehensive, addressing all required elements—system backups, rapid response protocols, employee training, and data encryption methods—with clear, insightful proposals tailored to the scenario.
7 pts Meets or Exceeds Student submission: The contingency plan is comprehensive, addressing all required elements—system backups, rapid response protocols, employee training, and data encryption methods—with clear, insightful proposals tailored to the scenario 5 pts In Progress Student submission: The contingency plan addresses most required elements but may lack detail or clarity in some areas 2 pts Little Evidence Student submission: The contingency plan is incomplete, lacks detail, or does not fully address the key elements 0 pts No Evidence Student submission: The contingency plan is poorly developed, fails to address the key elements, or is missing entirely7 pts

A Case for Back-up & Recovery

For this assignment, you will need to review the Case Study presented and outline a contingency plan that addresses possible security threats and breaches, provides a strategy to minimize the disruption to hospital operations while protecting patient information.

 Expand AllPanels Collapse AllPanels

Case Study

DeVry Hospital, a 200-bed acute-care facility, has been encountering security incidents involving a ransomware attack, in addition to a major breach of patient records. The Chief Privacy & Security Officer is requesting a contingency plan that will minimize the potential for security threats and provide for continuity of the necessary hospital operations to care for patients.

Action Plan

As a member of the security team, you have been asked to outline a contingency plan to counteract the identified ransomware attacks, data breaches and prepare the hospital for natural disasters and potential system failures. You plan should include clear procedures for mitigating the security breaches.

Steps you will complete the following as part of your proposed contingency plan:

  1. Provide a risk assessment that identifies and prioritizes potential security threats.
  2. Propose possible strategies to prevent security incidents. This should involve system updates, possible employee training that may be needed and security protocols.
  3. Outline a procedure for regular data backups with a clear data recovery plan in case of a system crash.
  4. Recommend a process for completing a post-incident review to ensure a thorough investigation is completed to identify any potential gaps in the existing contingency plan.

Your deliverable method can be either in the form of a half-page to full page proposal or PowerPoint slides that outline each of the strategies you are proposing with an action plan for implementing them. For PowerPoint slides, the slides should outline your key points/recommendations and utilize the Notes section under your slides to provide complete sentences for your report as if you were presenting to a board for approval to implement.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M6 A Case for Back-up & Recovery

M6 A Case for Back-up & Recovery
CriteriaRatingsPts
This criterion is linked to a Learning OutcomeParameters Parameters
Paper Option
-Uses standard double-spacing without extra spaces between bullets or paragraphs
-Minimum length 1/2 page, maximum length 1 page
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

PowerPoint Option
-No more than 5 bullets per slide
-Keep slides uncluttered so easy to follow
-Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes)
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list on a reference slide IF applicable
5 pts Meets or Exceeds Student submission clearly encompasses all of PowerPoint presentation parameters -Minimum of 5 content slides, Maximum of 8 content slides -Includes a title slide -Includes a reference slide if needed -Presentation developed from perspective as if being presented to the board -No more than 5 bullets per slide -Keep slides uncluttered so easy to follow -Includes use of graphical representations to give visual emphasis & credibility to presentation -Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes) -Free of grammatical & spelling errors -Uses APA in-text citations and reference list on a reference slide IF applicable 3 pts In Progress Student submission clearly encompasses all paper or PowerPoint parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable 1 pts Little Evidence Student submission does not clearly meet the paper or PowerPoint parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable 0 pts No Evidence Student submission clearly does not meet the required Parameters5 pts

This criterion is linked to a Learning OutcomeRisk Assessment Risk Assessment
-Provides risk assessment that identifies potential security threats
-Includes prioritization of potential security threats
7 pts Meets or Exceeds Student submission provides clear identification of potential security threats through risk assessment and includes prioritization of potential security threats 5 pts In Progress Student submission mostly provides identification of potential security threats through risk assessment and inclusion of prioritization of potential security threats – may be missing pertinent information 2 pts Little Evidence Student submission is off topic for control mechanisms or does not identify potential security threats through risk assessment and inclusion of prioritization of potential security threats 0 pts No Evidence Student submission does not clearly meet the expectations for identifying potential security threats through risk assessment and inclusion of prioritization of potential security threats7 pts

This criterion is linked to a Learning OutcomeSecurity Incident Prevention Security Incident Prevention
Provides strategies to prevent potential security incidents that includes consideration of
-system updates
-possible employee training
-needed security protocols
CO6
7 pts Meets or Exceeds Student submission on Security Incident Prevention clearly identifies strategies to prevent potential security incidents that includes consideration of -system updates -possible employee training -needed security protocols 5 pts In Progress Student submission on Security Incidence Prevention mostly identifies strategies to prevent potential security incidents that includes consideration of -system updates -possible employee training -needed security protocols 2 pts Little Evidence Student submission on Security Incidence Prevention does not consider all of these factors -system updates -possible employee training -needed security protocols 0 pts No Evidence Student submission on Security Incidence Prevention clearly does not meet expectations or nothing submitted7 pts

This criterion is linked to a Learning OutcomeTraining Programs Training Programs
-Findings of review on training program deficiencies encompasses assessment on proper use/protocols on electronic health record and HIPAA compliance
CO6
7 pts Meets or Exceeds Student submission on Training Programs clearly addresses findings of review on training program deficiencies and encompasses assessment on proper use/protocols on electronic health record and HIPAA compliance 5 pts In Progress Student submission on Training Programs mostly addresses findings of review on training program deficiencies and encompasses assessment on proper use/protocols on electronic health record and HIPAA compliance but may be lacking details 2 pts Little Evidence Student submission on Training Programs is off topic or does not clearly address findings of a review covering training program deficiencies relating to use/protocols on electronic health record and/or HIPAA compliance 0 pts No Evidence Student submission clearly does not meet expectations on addressing training program review findings or nothing submitted7 pts

This criterion is linked to a Learning OutcomePost Incident Review Process Post Incident Review Process
Proposes a process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan
CO6
9 pts Meets or Exceeds Student submission of Post Incident Review clearly proposes a process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan 6 pts In Progress Student submission of Post Incident Review mostly identifies a process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan 3 pts Little Evidence Student submission of Post Incident Review is off topic or does not clearly give a proposed process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan 0 pts No Evidence Student submission does not clearly meet expectations to provide proposed process to follow post-incident review9 pts

Total Points: 35

Module 6: Module 6: A Case for Back-up & Recovery

For this assignment, you will need to review the Case Study presented and outline a contingency plan that addresses possible security threats and breaches, provides a strategy to minimize the disruption to hospital operations while protecting patient information.

 Expand AllPanels Collapse AllPanels

Case Study

DeVry Hospital, a 200-bed acute-care facility, has been encountering security incidents involving a ransomware attack, in addition to a major breach of patient records. The Chief Privacy & Security Officer is requesting a contingency plan that will minimize the potential for security threats and provide for continuity of the necessary hospital operations to care for patients.

Action Plan

As a member of the security team, you have been asked to outline a contingency plan to counteract the identified ransomware attacks, data breaches and prepare the hospital for natural disasters and potential system failures. You plan should include clear procedures for mitigating the security breaches.

Steps you will complete the following as part of your proposed contingency plan:

  1. Provide a risk assessment that identifies and prioritizes potential security threats.
  2. Propose possible strategies to prevent security incidents. This should involve system updates, possible employee training that may be needed and security protocols.
  3. Outline a procedure for regular data backups with a clear data recovery plan in case of a system crash.
  4. Recommend a process for completing a post-incident review to ensure a thorough investigation is completed to identify any potential gaps in the existing contingency plan.

Your deliverable method can be either in the form of a half-page to full page proposal or PowerPoint slides that outline each of the strategies you are proposing with an action plan for implementing them. For PowerPoint slides, the slides should outline your key points/recommendations and utilize the Notes section under your slides to provide complete sentences for your report as if you were presenting to a board for approval to implement.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M6 A Case for Back-up & Recovery

M6 A Case for Back-up & Recovery
CriteriaRatingsPts
This criterion is linked to a Learning OutcomeParameters Parameters
Paper Option
-Uses standard double-spacing without extra spaces between bullets or paragraphs
-Minimum length 1/2 page, maximum length 1 page
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

PowerPoint Option
-No more than 5 bullets per slide
-Keep slides uncluttered so easy to follow
-Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes)
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list on a reference slide IF applicable
5 pts Meets or Exceeds Student submission clearly encompasses all of PowerPoint presentation parameters -Minimum of 5 content slides, Maximum of 8 content slides -Includes a title slide -Includes a reference slide if needed -Presentation developed from perspective as if being presented to the board -No more than 5 bullets per slide -Keep slides uncluttered so easy to follow -Includes use of graphical representations to give visual emphasis & credibility to presentation -Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes) -Free of grammatical & spelling errors -Uses APA in-text citations and reference list on a reference slide IF applicable 3 pts In Progress Student submission clearly encompasses all paper or PowerPoint parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable 1 pts Little Evidence Student submission does not clearly meet the paper or PowerPoint parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable 0 pts No Evidence Student submission clearly does not meet the required Parameters5 pts

This criterion is linked to a Learning OutcomeRisk Assessment Risk Assessment
-Provides risk assessment that identifies potential security threats
-Includes prioritization of potential security threats
7 pts Meets or Exceeds Student submission provides clear identification of potential security threats through risk assessment and includes prioritization of potential security threats 5 pts In Progress Student submission mostly provides identification of potential security threats through risk assessment and inclusion of prioritization of potential security threats – may be missing pertinent information 2 pts Little Evidence Student submission is off topic for control mechanisms or does not identify potential security threats through risk assessment and inclusion of prioritization of potential security threats 0 pts No Evidence Student submission does not clearly meet the expectations for identifying potential security threats through risk assessment and inclusion of prioritization of potential security threats7 pts

This criterion is linked to a Learning OutcomeSecurity Incident Prevention Security Incident Prevention
Provides strategies to prevent potential security incidents that includes consideration of
-system updates
-possible employee training
-needed security protocols
CO6
7 pts Meets or Exceeds Student submission on Security Incident Prevention clearly identifies strategies to prevent potential security incidents that includes consideration of -system updates -possible employee training -needed security protocols 5 pts In Progress Student submission on Security Incidence Prevention mostly identifies strategies to prevent potential security incidents that includes consideration of -system updates -possible employee training -needed security protocols 2 pts Little Evidence Student submission on Security Incidence Prevention does not consider all of these factors -system updates -possible employee training -needed security protocols 0 pts No Evidence Student submission on Security Incidence Prevention clearly does not meet expectations or nothing submitted7 pts

This criterion is linked to a Learning OutcomeTraining Programs Training Programs
-Findings of review on training program deficiencies encompasses assessment on proper use/protocols on electronic health record and HIPAA compliance
CO6
7 pts Meets or Exceeds Student submission on Training Programs clearly addresses findings of review on training program deficiencies and encompasses assessment on proper use/protocols on electronic health record and HIPAA compliance 5 pts In Progress Student submission on Training Programs mostly addresses findings of review on training program deficiencies and encompasses assessment on proper use/protocols on electronic health record and HIPAA compliance but may be lacking details 2 pts Little Evidence Student submission on Training Programs is off topic or does not clearly address findings of a review covering training program deficiencies relating to use/protocols on electronic health record and/or HIPAA compliance 0 pts No Evidence Student submission clearly does not meet expectations on addressing training program review findings or nothing submitted7 pts

This criterion is linked to a Learning OutcomePost Incident Review Process Post Incident Review Process
Proposes a process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan
CO6
9 pts Meets or Exceeds Student submission of Post Incident Review clearly proposes a process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan 6 pts In Progress Student submission of Post Incident Review mostly identifies a process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan 3 pts Little Evidence Student submission of Post Incident Review is off topic or does not clearly give a proposed process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan 0 pts No Evidence Student submission does not clearly meet expectations to provide proposed process to follow post-incident review9 pts

Total Points: 35

For this assignment, you will need to review the Case Study presented and outline a contingency plan that addresses possible security threats and breaches, provides a strategy to minimize the disruption to hospital operations while protecting patient information.

 Expand AllPanels Collapse AllPanels

Case Study

DeVry Hospital, a 200-bed acute-care facility, has been encountering security incidents involving a ransomware attack, in addition to a major breach of patient records. The Chief Privacy & Security Officer is requesting a contingency plan that will minimize the potential for security threats and provide for continuity of the necessary hospital operations to care for patients.

Action Plan

As a member of the security team, you have been asked to outline a contingency plan to counteract the identified ransomware attacks, data breaches and prepare the hospital for natural disasters and potential system failures. You plan should include clear procedures for mitigating the security breaches.

Steps you will complete the following as part of your proposed contingency plan:

  1. Provide a risk assessment that identifies and prioritizes potential security threats.
  2. Propose possible strategies to prevent security incidents. This should involve system updates, possible employee training that may be needed and security protocols.
  3. Outline a procedure for regular data backups with a clear data recovery plan in case of a system crash.
  4. Recommend a process for completing a post-incident review to ensure a thorough investigation is completed to identify any potential gaps in the existing contingency plan.

Your deliverable method can be either in the form of a half-page to full page proposal or PowerPoint slides that outline each of the strategies you are proposing with an action plan for implementing them. For PowerPoint slides, the slides should outline your key points/recommendations and utilize the Notes section under your slides to provide complete sentences for your report as if you were presenting to a board for approval to implement.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

This assignment utilizes TurnItIn, which reviews citations, plagiarism, and artificial intelligence (AI) usage.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M6 A Case for Back-up & Recovery

M6 A Case for Back-up & Recovery
CriteriaRatingsPts
This criterion is linked to a Learning OutcomeParameters Parameters
Paper Option
-Uses standard double-spacing without extra spaces between bullets or paragraphs
-Minimum length 1/2 page, maximum length 1 page
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

PowerPoint Option
-No more than 5 bullets per slide
-Keep slides uncluttered so easy to follow
-Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes)
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list on a reference slide IF applicable
5 pts Meets or Exceeds Student submission clearly encompasses all of PowerPoint presentation parameters -Minimum of 5 content slides, Maximum of 8 content slides -Includes a title slide -Includes a reference slide if needed -Presentation developed from perspective as if being presented to the board -No more than 5 bullets per slide -Keep slides uncluttered so easy to follow -Includes use of graphical representations to give visual emphasis & credibility to presentation -Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes) -Free of grammatical & spelling errors -Uses APA in-text citations and reference list on a reference slide IF applicable 3 pts In Progress Student submission clearly encompasses all paper or PowerPoint parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable 1 pts Little Evidence Student submission does not clearly meet the paper or PowerPoint parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable 0 pts No Evidence Student submission clearly does not meet the required Parameters5 pts

This criterion is linked to a Learning OutcomeRisk Assessment Risk Assessment
-Provides risk assessment that identifies potential security threats
-Includes prioritization of potential security threats
7 pts Meets or Exceeds Student submission provides clear identification of potential security threats through risk assessment and includes prioritization of potential security threats 5 pts In Progress Student submission mostly provides identification of potential security threats through risk assessment and inclusion of prioritization of potential security threats – may be missing pertinent information 2 pts Little Evidence Student submission is off topic for control mechanisms or does not identify potential security threats through risk assessment and inclusion of prioritization of potential security threats 0 pts No Evidence Student submission does not clearly meet the expectations for identifying potential security threats through risk assessment and inclusion of prioritization of potential security threats7 pts

This criterion is linked to a Learning OutcomeSecurity Incident Prevention Security Incident Prevention
Provides strategies to prevent potential security incidents that includes consideration of
-system updates
-possible employee training
-needed security protocols
CO6
7 pts Meets or Exceeds Student submission on Security Incident Prevention clearly identifies strategies to prevent potential security incidents that includes consideration of -system updates -possible employee training -needed security protocols 5 pts In Progress Student submission on Security Incidence Prevention mostly identifies strategies to prevent potential security incidents that includes consideration of -system updates -possible employee training -needed security protocols 2 pts Little Evidence Student submission on Security Incidence Prevention does not consider all of these factors -system updates -possible employee training -needed security protocols 0 pts No Evidence Student submission on Security Incidence Prevention clearly does not meet expectations or nothing submitted7 pts

This criterion is linked to a Learning OutcomeTraining Programs Training Programs
-Findings of review on training program deficiencies encompasses assessment on proper use/protocols on electronic health record and HIPAA compliance
CO6
7 pts Meets or Exceeds Student submission on Training Programs clearly addresses findings of review on training program deficiencies and encompasses assessment on proper use/protocols on electronic health record and HIPAA compliance 5 pts In Progress Student submission on Training Programs mostly addresses findings of review on training program deficiencies and encompasses assessment on proper use/protocols on electronic health record and HIPAA compliance but may be lacking details 2 pts Little Evidence Student submission on Training Programs is off topic or does not clearly address findings of a review covering training program deficiencies relating to use/protocols on electronic health record and/or HIPAA compliance 0 pts No Evidence Student submission clearly does not meet expectations on addressing training program review findings or nothing submitted7 pts

This criterion is linked to a Learning OutcomePost Incident Review Process Post Incident Review Process
Proposes a process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan
CO6
9 pts Meets or Exceeds Student submission of Post Incident Review clearly proposes a process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan 6 pts In Progress Student submission of Post Incident Review mostly identifies a process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan 3 pts Little Evidence Student submission of Post Incident Review is off topic or does not clearly give a proposed process to follow post-incident review that ensures an investigation that identifies any gaps in current contingency plan 0 pts No Evidence Student submission does not clearly meet expectations to provide proposed process to follow post-incident review9 pts

Total Points: 35

Mod

Mod 5 reply

The minimum length for each of your replies to classmates in order to earn any credit is 150 words. 

INDYAH:

When I was getting ready to go on the date, I decided to wear a nice sundress even though I typically wear a t-shirt and jeans most days. I also put on makeup and jewelry, even though those are not things that I normally wear. This part of the date is related to Goffman’s concept of self-presentation. In Goffman’s dramaturgical model, he proposes that social interactions are like a theater production, heavily staged (Garner & Hancock, 2014, p. 340). Within this model, “Goffman implies that there is an element of calculation in most self-presentations.” This means that people may try to control how others view them, even if it is in a subtle way. In my example, I am presenting myself as someone who regularly spends time on my appearance and style, when behind the scenes, I do not spend much time on it at all.

When I went to the date, I did not know what to expect, but from observing his behaviors and the things that he would say, I became more comfortable and gathered that the date would go well. He was a gentleman and very kind. We also had a lot in common. This is related to a theory utilized by Becker called grounded theory, where conclusions are drawn from observation (Garner & Hancock, 2014, p. 302). I went into the date with no expectations, but after observing my date’s behaviors and words, I was able to conclude that it would be a good experience.

The date started at a restaurant and ended at a karaoke bar. The entire night, I did not touch a door. Conversation flowed easily between the both of us. I listened to him speak about a lot of things and laughed at his jokes. He even paid for the entire date. We rarely spoke to anyone else besides each other, and we remained close throughout the night. This part of the date relates to two concepts. The first concept is Becker’s version of exchange theory. Garner and Hancock (2014) state that “within this framework, individuals and groups are seen as generally cognizant of both their interests and their options for engaging in the exchanges” (p. 303). This means that people know their desired outcome and have different ways that they can try to achieve it. In this case, the way that we engaged in conversation was mutual. We gave each other undivided attention. He even paid for my meal, and in exchange I listened to him intently. It could even be said that the motivation behind his actions, such as opening doors and paying for the date, was for me to be more comfortable and secure, which I displayed in my interactions listed.

The second concept related to this part of the date is Goffman’s concept of team performances. This concept stems from Goffman’s dramaturgical model in which he proposes that social interactions are like a theater production. According to Goffman, teams “refer to any set of individuals who co-operate in staging a single routine” (Goffman, 1959 as cited in garner & Hancock, 2014, p. 343). In this concept, two or more people work together in a scripted manner, playing off of the other’s role to have a certain impression on the audience. As a team in my example, I played a meeker role, allowing him to be more assertive. Although I typically open my own doors, pay for my own meals, speak more than I listen, and only laugh when I find something funny, these things were put aside for the sake of the team. This interaction impressed upon those around us that we may have been a couple. Additionally, Goffman speaks about the consequences of someone “giving the show away” (p.345). If the team is not on the same page, it will ruin the impression, as they are dependent on the other members. In this example, if I were to insist a split bill or engage in conversation with other men in the area, it would ruin the “performance.” He may no longer take on his assertive role, and we would no longer be viewed as a couple.

As the date went on, I became more comfortable physically. My body was almost always turned towards him. Throughout the night, I would touch his arm if the conversation called for it, or he might rest his hand on my waist as we are walking. We laughed all night, so I could tell we were enjoying each other’s company. This part of the date relates to two concepts by Goffman. This first is the importance of face-to-face interactions. Goffman argues that face-to-face interactions allow for others to understand our intentions through nonverbal cues, such as body language and facial expressions (Goffman 1982, as cited in Garner & Hancock, 2014, p. 354). In this example, we were feeding off of each other’s body language. It communicated that we enjoyed being around one another. The second concept is Goffman’s idea of personal territoriality. Goffman believes that bringing our bodies with us to social interactions makes us vulnerable to unwanted physical interactions, such as robbery, assault, sexual molestation, and more (Goffman, 1982 as cited in Garner & Hancock, 2014, p. 355). However, we assume these risks going into any face-to-face interaction. After observing the situation’s safety, we may view the other person as unthreatening. This is what happened in my scenario. After speaking with my date and determining that he is not a physical threat to me, I became more comfortable with him physically.

After the restaurant, we went to the karaoke bar. At the karaoke bar, we decided to play a game of pool. I did not know how to play, but he was pretty good at it. He showed me how to play, and we decided to make a bet. Whoever won the game would buy our drinks. I ended up winning, and he bought us each a drink. This part of the date relates to Goffman’s concept of frames. Frames are the way that we view situations. While Goffman believes that different individuals’ frames can be similar due to socialization, they typically vary due to a difference in perspective (Garner & Hancock, 2014, p. 350). While individuals can be experiencing the same situation, their differing perspectives will prevent them from experiencing it the same way (Goffman, 1974 as cited in Garner & Hancock, 2014, p. 351). In the situation listed above, my date lost the pool game. From his perspective, he lost a game that he knew how to play to someone who did not know how to play. This happened while he was on a date and probably trying to impress me. In this situation, it is expected for someone’s pride to be hurt or for them to be embarrassed. However, Goffman states that “in many cases some of those who who are committed to differing points of view and focus may still be willing to acknowledge that theirs is not the official or ‘real’ one” (Goffman, 1974 as cited in Garner & Hancock, 2014, p. 351). My date has been playing pool for a while, and I just learned that night. I picked the game up fast and beat him. His pride may have been hurt, but he was able to recognize that his perspective was not the only one, and that I may have just been excited to have successfully learned something new that day. When considering that, he decided to keep a good attitude despite losing the game.

Our next activity was to sing karaoke. I noticed that when I have an excessive amount of alcohol in my system, I am more confident, so before going up, I took two shots of liquor to shake off the anxiety and gain the courage to sing in front of everyone. I did this even though I was already feeling the effects of the drinks we had earlier in the night, and my date was not drinking anymore. This part of the date relates to Becker’s idea that deviant behavior precedes deviant motivation (Becker, 1963 as cited in garner & Hancock, 2014, p. 304). Becker believes that deviant activity begins with “vague impulses and desires,” such as curiosity about the effects of the substance. Once experienced, people can begin to develop deviant motives over time, such as using the substance to escape reality. In this case, my deviant motive was to use an excessive amount of alcohol in an inappropriate situation) to cure my social anxiety. My deviant behavior of drinking excessively in an inappropriate situation may have been a pattern that I picked up when drinking socially in the past. I could have noticed how greater amounts of alcohol made me feel more confident. Therefore, I decided to drink an excessive amount before going up to sing karaoke.

The night ended shortly after. I Ubered home, and went straight to bed. I initially did not want to go on the date. I have had bad experiences with first dates in the past, because I hate surface level conversations, and I felt like this would be the same. Your encouragement along with the stories that you told me about him made me more comfortable to try again. I was able to discuss deeper things with him based on the information you gave me. It also seemed like a good idea because you already know and like him. We can all hang out together at times. I would love to go out with him again. This closing thought about the date relates to Becker’s stages of using marihuana for pleasure, more specifically, learning to enjoy the effects. Becker stresses the importance of enjoying the experience of a high in becoming a marihuana user (Becker, 1963 as cited in Garner & Hancock, 2014, p. 309). When the initial experience fails to produce an enjoyable effect, the feeling can be redefined when trying again in a different context. This new context typically includes interactions with others who help by reassuring the novice user throughout the experience, turning their unpleasant experience into a pleasant one. While this is not exactly like the situation that I listed, it is similar. My previous experiences with first dates have been bad due to surface level conversations. However, by my friend encouraging me and giving me stories that would help me spark up deeper conversations, I was able to take an unpleasant characteristic of first dates (conversation) and turn it into a pleasant one. Then, like the path taken in Becker’s concept, I am looking forward to doing it again.

This thought also relates to Becker’s rational choice theory. Garner & Hancock (2014) explain that people try to make the best decisions for themselves and those that they care about. In this context, “their choice criteria include…solidarity with a group such as…peers…” (p. 303). My choice to go on a date with a guy that I met through a mutual friend was made with my friends in mind. I figured that going on this date would be better than finding a stranger who my friend may not like, or who may not have a good relationship with my friend group. Since my friend already knows and likes this guy that she is setting me up with, dating him might increase solidarity within my friend group.

References

Garner, R. & Hancock, B. H. (2014). Social theory a reader: Continuity and confrontation (3rd ed.). University of Toronto Press.

ANA:

When I was getting ready to go on the date, I decided to wear a nice sundress even though I typically wear a t-shirt and jeans most days. I also put on makeup and jewelry, even though those are not things that I normally wear. This part of the date is related to Goffman’s concept of self-presentation. In Goffman’s dramaturgical model, he proposes that social interactions are like a theater production, heavily staged (Garner & Hancock, 2014, p. 340). Within this model, “Goffman implies that there is an element of calculation in most self-presentations.” This means that people may try to control how others view them, even if it is in a subtle way. In my example, I am presenting myself as someone who regularly spends time on my appearance and style, when behind the scenes, I do not spend much time on it at all.

When I went to the date, I did not know what to expect, but from observing his behaviors and the things that he would say, I became more comfortable and gathered that the date would go well. He was a gentleman and very kind. We also had a lot in common. This is related to a theory utilized by Becker called grounded theory, where conclusions are drawn from observation (Garner & Hancock, 2014, p. 302). I went into the date with no expectations, but after observing my date’s behaviors and words, I was able to conclude that it would be a good experience.

The date started at a restaurant and ended at a karaoke bar. The entire night, I did not touch a door. Conversation flowed easily between the both of us. I listened to him speak about a lot of things and laughed at his jokes. He even paid for the entire date. We rarely spoke to anyone else besides each other, and we remained close throughout the night. This part of the date relates to two concepts. The first concept is Becker’s version of exchange theory. Garner and Hancock (2014) state that “within this framework, individuals and groups are seen as generally cognizant of both their interests and their options for engaging in the exchanges” (p. 303). This means that people know their desired outcome and have different ways that they can try to achieve it. In this case, the way that we engaged in conversation was mutual. We gave each other undivided attention. He even paid for my meal, and in exchange I listened to him intently. It could even be said that the motivation behind his actions, such as opening doors and paying for the date, was for me to be more comfortable and secure, which I displayed in my interactions listed.

The second concept related to this part of the date is Goffman’s concept of team performances. This concept stems from Goffman’s dramaturgical model in which he proposes that social interactions are like a theater production. According to Goffman, teams “refer to any set of individuals who co-operate in staging a single routine” (Goffman, 1959 as cited in garner & Hancock, 2014, p. 343). In this concept, two or more people work together in a scripted manner, playing off of the other’s role to have a certain impression on the audience. As a team in my example, I played a meeker role, allowing him to be more assertive. Although I typically open my own doors, pay for my own meals, speak more than I listen, and only laugh when I find something funny, these things were put aside for the sake of the team. This interaction impressed upon those around us that we may have been a couple. Additionally, Goffman speaks about the consequences of someone “giving the show away” (p.345). If the team is not on the same page, it will ruin the impression, as they are dependent on the other members. In this example, if I were to insist a split bill or engage in conversation with other men in the area, it would ruin the “performance.” He may no longer take on his assertive role, and we would no longer be viewed as a couple.

As the date went on, I became more comfortable physically. My body was almost always turned towards him. Throughout the night, I would touch his arm if the conversation called for it, or he might rest his hand on my waist as we are walking. We laughed all night, so I could tell we were enjoying each other’s company. This part of the date relates to two concepts by Goffman. This first is the importance of face-to-face interactions. Goffman argues that face-to-face interactions allow for others to understand our intentions through nonverbal cues, such as body language and facial expressions (Goffman 1982, as cited in Garner & Hancock, 2014, p. 354). In this example, we were feeding off of each other’s body language. It communicated that we enjoyed being around one another. The second concept is Goffman’s idea of personal territoriality. Goffman believes that bringing our bodies with us to social interactions makes us vulnerable to unwanted physical interactions, such as robbery, assault, sexual molestation, and more (Goffman, 1982 as cited in Garner & Hancock, 2014, p. 355). However, we assume these risks going into any face-to-face interaction. After observing the situation’s safety, we may view the other person as unthreatening. This is what happened in my scenario. After speaking with my date and determining that he is not a physical threat to me, I became more comfortable with him physically.

After the restaurant, we went to the karaoke bar. At the karaoke bar, we decided to play a game of pool. I did not know how to play, but he was pretty good at it. He showed me how to play, and we decided to make a bet. Whoever won the game would buy our drinks. I ended up winning, and he bought us each a drink. This part of the date relates to Goffman’s concept of frames. Frames are the way that we view situations. While Goffman believes that different individuals’ frames can be similar due to socialization, they typically vary due to a difference in perspective (Garner & Hancock, 2014, p. 350). While individuals can be experiencing the same situation, their differing perspectives will prevent them from experiencing it the same way (Goffman, 1974 as cited in Garner & Hancock, 2014, p. 351). In the situation listed above, my date lost the pool game. From his perspective, he lost a game that he knew how to play to someone who did not know how to play. This happened while he was on a date and probably trying to impress me. In this situation, it is expected for someone’s pride to be hurt or for them to be embarrassed. However, Goffman states that “in many cases some of those who who are committed to differing points of view and focus may still be willing to acknowledge that theirs is not the official or ‘real’ one” (Goffman, 1974 as cited in Garner & Hancock, 2014, p. 351). My date has been playing pool for a while, and I just learned that night. I picked the game up fast and beat him. His pride may have been hurt, but he was able to recognize that his perspective was not the only one, and that I may have just been excited to have successfully learned something new that day. When considering that, he decided to keep a good attitude despite losing the game.

Our next activity was to sing karaoke. I noticed that when I have an excessive amount of alcohol in my system, I am more confident, so before going up, I took two shots of liquor to shake off the anxiety and gain the courage to sing in front of everyone. I did this even though I was already feeling the effects of the drinks we had earlier in the night, and my date was not drinking anymore. This part of the date relates to Becker’s idea that deviant behavior precedes deviant motivation (Becker, 1963 as cited in garner & Hancock, 2014, p. 304). Becker believes that deviant activity begins with “vague impulses and desires,” such as curiosity about the effects of the substance. Once experienced, people can begin to develop deviant motives over time, such as using the substance to escape reality. In this case, my deviant motive was to use an excessive amount of alcohol in an inappropriate situation) to cure my social anxiety. My deviant behavior of drinking excessively in an inappropriate situation may have been a pattern that I picked up when drinking socially in the past. I could have noticed how greater amounts of alcohol made me feel more confident. Therefore, I decided to drink an excessive amount before going up to sing karaoke.

The night ended shortly after. I Ubered home, and went straight to bed. I initially did not want to go on the date. I have had bad experiences with first dates in the past, because I hate surface level conversations, and I felt like this would be the same. Your encouragement along with the stories that you told me about him made me more comfortable to try again. I was able to discuss deeper things with him based on the information you gave me. It also seemed like a good idea because you already know and like him. We can all hang out together at times. I would love to go out with him again. This closing thought about the date relates to Becker’s stages of using marihuana for pleasure, more specifically, learning to enjoy the effects. Becker stresses the importance of enjoying the experience of a high in becoming a marihuana user (Becker, 1963 as cited in Garner & Hancock, 2014, p. 309). When the initial experience fails to produce an enjoyable effect, the feeling can be redefined when trying again in a different context. This new context typically includes interactions with others who help by reassuring the novice user throughout the experience, turning their unpleasant experience into a pleasant one. While this is not exactly like the situation that I listed, it is similar. My previous experiences with first dates have been bad due to surface level conversations. However, by my friend encouraging me and giving me stories that would help me spark up deeper conversations, I was able to take an unpleasant characteristic of first dates (conversation) and turn it into a pleasant one. Then, like the path taken in Becker’s concept, I am looking forward to doing it again.

This thought also relates to Becker’s rational choice theory. Garner & Hancock (2014) explain that people try to make the best decisions for themselves and those that they care about. In this context, “their choice criteria include…solidarity with a group such as…peers…” (p. 303). My choice to go on a date with a guy that I met through a mutual friend was made with my friends in mind. I figured that going on this date would be better than finding a stranger who my friend may not like, or who may not have a good relationship with my friend group. Since my friend already knows and likes this guy that she is setting me up with, dating him might increase solidarity within my friend group.

References

Garner, R. & Hancock, B. H. (2014). Social theory a reader: Continuity and confrontation (3rd ed.). University of Toronto Press.

Business

Critical Reading Question 3 (the critical perspective)

Consider the following quote taken from the essay “Traditional and critical theory” by Max Horkheimer:

“Although [critique] itself emerges from the social structure, its purpose is not, either in its conscious intention or in its objective significance, the better functioning of any element in the structure. On the contrary, it is suspicious of the very categories of better, useful, appropriate, productive, and valuable, as these are understood in the present order, and refuses to take them as nonscientific presuppositions about which one can do nothing.”

Explain what you think this quote means. What is critical theory as opposed to traditional theory?

Next select two of the three concepts below. Each is drawn from one of this week’s readings. Explain how each concept is a critique of the other perspective I pair it with.

  1. Self-technology (from the Michel article) and the shareholder perspective
  2. Complaining (from the Ahmed book) and the stakeholder perspective
  3. Primitive accumulation (from the YouTube video) and the institutional perspective

Mindful Attention Awareness Scale

Mindful Attention Awareness Scale
Instructions:
The following is a collection of statements about your everyday experience. Using the scale from 1 (almost
always) to 6 (almost never), indicate how frequently or infrequently you currently have each experience.
Answer according to what really reflects your experience rather than what you think your experience should be.
Please treat each item separately from every other item.
1 = Almost always | 2 = Very frequently | 3 = Somewhat frequently |
4 = Somewhat infrequently | 5 = Very infrequently | 6 = Almost never

  1. I could be experiencing some emotion and not be conscious of it until some time later.
  2. I break or spill things because of carelessness, not paying attention, or thinking of something else.
  3. I find it difficult to stay focused on what’s happening in the present.
  4. I tend to walk quickly to get where I’m going without paying attention to what I experience along
    the way.
  5. I tend not to notice feelings of physical tension or discomfort until they really grab my attention.
  6. I forget a person’s name almost as soon as I’ve been told it for the first time.
  7. It seems I am “running on automatic,” without much awareness of what I’m doing.
  8. I rush through activities without being really attentive to them
  9. I get so focused on the goal I want to achieve that I lose touch with what I’m doing right now to get
    there.
  10. I do jobs or tasks automatically, without being aware of what I’m doing.
  11. I find myself listening to someone with one ear, doing something else at the same time.
  12. I drive places on “automatic pilot” and then wonder why I went there.
  13. I find myself preoccupied with the future or the past.
  14. I find myself doing things without paying attention.
  15. I snack without being aware that I’m eating.

Rought Draft Pricing Strategy

Packaging basics
An aspect of pricing that is as old as time is the principle of
combining goods or services in various combinations and then
offering a price for such a group. In industry parlance this is
known as packaging or bundling. Don’t be fooled by the name,
this topic extends well past the method in which a physical
good is wrapped and presented. Packaging encompasses a farranging set of tactics and considerations designed to entice
the buyer while rewarding the seller. A working vocabulary of
the common approaches used in bundling remains a fundamental building block of a professional’s pricing knowhow.
Generally speaking, bundling of discrete purchase options
into a single package benefits the seller. In the rational buyer’s
perfect world, each component piece of a purchase transaction would be separate and priced in consistent relative value
to the others. In such a world, the buyer would have access to
his most efficient deal, as he would choose only the options
that suited him. Imagine buying a car from a dealer who let
you customize every last option, choosing only what you really
need. Now remember every time you’ve bought a car: everything works on the idea of packages. Though there are quite a
few sunroofs out on the road that get little to no use, they were
all paid for – at high margin.
Making bundling work
We know that bundling is invariably in the seller’s favor, and
so we must wonder: how can bundling goods generate perceived value for the buyer? The answer is straightforward:
bundling presents an opportunity for the seller to propose a
discount.
Leveraging an intelligent bundling strategy, the seller can enlarge average deal size by dangling unnecessary but heavily
discounted items in front of the buyer.
The buyer will often be irrationally enticed by such offers,
sensing that the incremental power of each purchase dollar is
uniquely enlarged in the context of the bundled offer being
presented.
Tiered pricing
Bundling often presents itself in the form of tiered pricing. Particularly in the modern world of software, there is an increasing and justified investment in understanding the segmentation of the target market, and offering bundles at different
price points to each segment of this market.
In practice, this segmentation is often a ruse. A product that is
available for a monthly subscription may offer 4 different
plans for the express purpose of framing the intended plan in
a favorable, understandable light. The distractor plans will
typically serve to establish value of each component part by illustrating the price of at least one plan that is insufficient, and
at least one that is bloated and too expensive. This tactic can
work brilliantly, demonstrating the thoughtfulness of the bundle (all the things you seem to need, none you don’t) while –
as we know – serving to offer a bundled discount that is quite
favorable to the seller

Individual Mini Case

Mini-Case Assignment (Individual In-class Presentations)

Students will be responsible for selecting a country and developing individual mini-case analyses assessing the feasibility of business development in the country of their choice along with sensitivity to the gospel message.

Students will need to share their findings in a short (5-10 min) presentation supported by presentation slides (Prezi, Sway, Canva, PowerPoint, or any other presentation software of your choice) Your work should incorporate at least 10 external references and at least 1 full Bible verse. Make sure to incorporate your references within your presentation as well as include a reference page on the last slide. 

Questions to Address:

  1. What would make this country an attractive market in which to enter?
  2. Discuss formal institutions such as legal, political, and economic systems of the country. How do they differ compared to the US?
  3. Discuss informal institutions.
    1. Discuss cultural differences between the country of your choice and the US. Use Hofstede insights and high-/low- context cultural measures.
    2. What are some of the customs, traditions, and business etiquette norms that affect business practices?
  4. If you wanted to start trading with this country, businesses in what industry do you think will benefit the most from expanding into this country?
  5. Look into current news and analyze the 5 environmental forces, aka CREST, as they apply to your chosen industry and country. Do trends in CREST factors present opportunities or threats for expansion?
  6. If you were to want to start trading with this country in your chosen industry, what type of entry strategy would you suggest? Why?
  7. What opportunities and limitations are there for communicating the gospel of Jesus Christ? Will a Christian-owned business be at an advantage or a disadvantage? What would be a focus for prayer (hint: Operation World)?