Recognition and awards

There are many ways to retain existing employees through recognition and rewards. Recognizing top performers with cash bonuses and praise can help employees feel appreciated and become loyal to the organization.

  • Define a spot recognition program and provide an example of an appropriate spot bonus.
  • Identify at least three potential drawbacks or problems with implementing a spot recognition program.
  • What are some ways to mitigate the problems identified by implementing a spot recognition program?
  • Identify at least one recognition or reward that can be used to motivate a millennial but may not be as appealing to a baby boomer; explain your thoughts.
  • Share your experiences in your narrative.

After reading a few of your classmates’ posts, reply to those from whom you learned something new or posts to which you have something constructive to add. For example:

  • Discuss what you learned.
  • Ask probing questions or seek clarification.
  • Explain why you agree or disagree with your classmate’s main points, assertions, assumptions, or conclusions.
  • Suggest research strategies or specific resources on the topic.

You must complete one original post and at least one reply to a classmate. Join the discussion early and post often.

Managing a cross-cultural security force in a global environment

Instructions

This assignment is an essay assignment of two questions to test knowledge and assimilation of the course objectives. You may use any of the texts, readings from this course and outside material that is academic in nature. 

  • Summarize two main strategies for managing a cross-cultural security force in a global environment.
  • Select a technology which has globally impacted the security industry and apply how it is utilized to a particular security facility or function.

 Technical Requirements

  • Your paper must be a minimum 2-3 pages per question for a total of 4-6 pages (the Title and Reference pages do not count towards the minimum limit).
  • Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content.
  • Type in Times New Roman, 12 point and double space.
  • Students will follow the current APA Style as the sole citation and reference style used in written work submitted as part of coursework. 
  • Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
  • All submissions will be graded using the assignment rubric.

Discrimination

After reading Chapter 9 notes, Respond to the following prompt in at least 200 words

Prompt: What are two areas in American society where you think prejudice and discrimination are most prevalent? Make two recommendations for how you would address and reduce discrimination in those areas. 

After completing your response to the following prompt, complete reflection response on  Personal Growth and Overcoming Challenges.

Objective: To critically engage with the content of the video and reflect on how its messages relate to your own experiences, values, and potential areas of personal growth. 

Instructions: Watch the video link to YouTube video https://www.youtube.com/watch?v=geD6kYpGlmw and then write a 1-2 page reflection response addressing the following points: 

Reflection Prompts: 

  • Key Message of the Video: 
  • What is the central message or theme of the video? Summarize it in your own words. 
  • Why do you think this message is important, and how does it resonate with you personally? 

Emotional Impact: 

  • How did the video make you feel? Did it inspire you, motivate you, or perhaps make you reflect on something deeply personal? 
  • Did the video highlight any aspects of yourself that you would like to work on or improve? 

Submission Guidelines: 

  • Write 1-2 pages (approximately 500 words). 
  • Use a clear and organized structure: Introduction, Body (addressing the prompts), Conclusion.
  • To get full grade both parts should be on separate Word documents. 

Exploring Lewin’s Change Model within Publix Supermarket: A Comprehensive Approach to Organizational Development


Write a 9 -10 page research paper (excluding the title and reference pages) on the topic “Exploring Lewin’s Change Model within Publix Supermarket: A Comprehensive Approach to Organizational Development”. The first 5 pages have been provided. Add 4-5 more pages to the given Paper. It should be no more than 10% plagiarism. Please note that this refers only to direct quotes within the body of the text and does not include the reference list or cover sheet. Anything more than 10% will be subject to evaluation and loss of points if plagiarism is detected.

Discussion

Numerous communities implement guidelines that help people achieve health through proper nutrition. The Dietary Guidelines for Decreasing Added Sugars and Added Salt constitute one of the guidelines I know about through institutions World Health Organization (WHO) and Centers for Disease Control and Prevention (CDC). These guidelines instruct people to decrease their added sugar and added salt intake to decrease their risk of developing obesity alongside diabetes and high blood pressure and heart disease.

The information about these recommendations came to me through health awareness campaigns and food packaging. My eating habits remained mostly unstudied until I learned about the health consequences of consuming salt and sugar, yet immediately afterward, I adjusted my dietary patterns. The change to fruit-flavored water served as a replacement for carbonated beverages with added sugar and led me to reduce my consumption of snack foods produced in processing facilities. The start of home cooking led me to exchange refined salts with herbs and spices to improve taste.

The dietary requirement of whole grains and, vegetables and legumes benefits my digestive system and cardiovascular health so I follow this rule. Different guidelines I implemented into my nutritional routine helped me develop better food decisions prior to achieving health objectives which also led to long-term benefits.

SMART Goals

  • Review the resources and clinical skills in the PMHNP Clinical Skills List document. It is recommended that you print out this document to serve as a guide throughout your practicum. 
  • Review the “Developing SMART Goals” resource on how to develop goals and objectives that follow the SMART framework.
  • Review the resources on nursing competencies and nursing theory, and consider how these inform your practice.
  • Download the Clinical Skills Self-Assessment Form to complete this Assignment.  

The Assignment

Use the PMHNP Clinical Skills Self-Assessment Form to complete the following:   

  • Rate yourself according to your confidence level performing the skills identified on the Clinical Skills Self-Assessment Form.  
  • Based on your ratings, summarize your strengths and opportunities for improvement.   
  • Based on your self-assessment and theory of nursing practice, develop 3–4 measurable goals and objectives for this practicum experience. Include them on the designated area of the form.   

security

This assignment consists of cataloging your security policies. For the catalog, navigate to the https://www.instantsecuritypolicy.com/  custom security policies website to get started with building your catalog.

Scenario

An information security team’s designated role is to implement an information security policy, standards, baselines, procedures, and guidelines. The Chief Information Security Officer (CISO) decided that your team must develop a security policy catalog to cover all the hospital policies and procedures to keep the networks secure, maintain secure data transmission, and protect patients’ confidential records. Take into consideration the following information about the hospital infrastructure:

  • The hospital headquarters is home to 750 staff members with offices in Washington, DC; San Antonio, Texas; and New York City, New York. The hospital in Washington DC, will also maintain networking to their local satellite office.
  • The headquarters store the primary data and the main internet backbone to include LAN services, wireless LAN, wide area network (WAN), and virtual private network (VPN) tunnels.
  • The San Antonio hospital and the New York hospital host about 200 staff at each facility and half of these employees are traveling more than 80% of the time. The New York office focuses on Computed Axial Tomography Scans (CAT) and maintains media and web servers.
  • The satellite office has approximately 100 staff and is connected to the main WAN with a wireless point-to-point bridge to the Washington, DC headquarters data center.
  • The hospital allows doctors to do telehealth telecommunications. Remote and mobile staff are provided access to the hospital VPN client. The VPN client required staff to access reliable internet services to communicate across teams and patients effectively. The Information Technology team manages all hospital-owned laptops.

As the lead for your IT Security Team, prepare a security catalog related to protecting personal hospital devices, securing confidential data, managing passwords, data transfer policy, managing remote access, email policy, backup policy, VPN policy, acceptable use policy, incident response policy, physical security, periodical review of security standards, and disciplinary actions against employees for breaching security standards. As part of the catalog, you will include a policy statement. You will also select a security policy testing methodology to facilitate the assessment for technical errors.

Note: You may create or make all the necessary assumptions needed for the completion of this assignment.

Submission Requirements

Write a paper in Word in which you:

  • Create a security policy catalog comprising a set of security policies for a hospital organization.
  • Explain each security policy in detail with supporting justification for the policy.
  • Explain the proposed cybersecurity policy statement and reasons why the policy statement may be controversial.
  • Provide a justification for the determined security testing methodology you would use to facilitate the assessment of technical errors.

Interpersonal Communication Plan

Assignment Instructions

Overview

The purpose of the Interpersonal Communication Plan Assignment is to demonstrate course-related knowledge; commitment to establish and maintain healthy, healing, and helping relationships; and ability to communicate effectively, both verbally and nonverbally. You will develop a strategic plan and produce a 9–10 minute video recording of yourselfpresenting your plan. You will also create a PowerPoint presentation that highlights your main points and sources.

Instructions

You must incorporate all the required course texts and two scholarly, peer-reviewed journal articlespublished in the last ten years in a meaningful, effective, and significant way throughout your presentation. Attribution to sources—i.e. author and year—must be made by orally and in-text. Evidence of self-reflection, critical thinking, understanding of course-related concepts, and synthesis of the course literature is expected. Each main point must be sufficiently developed given the time limit. The main points must be logically connected with effective transitions and a progression of ideas throughout. All content must be applied and personalized. The video will be uploaded to YouTube and the PowerPoint presentation will be submitted to along with a link to the video. Your presentation must include the following sections/main points: 

  • Introduction:
    Introduce your strategic communication plan in an engaging and interesting way. Mention your name and the date of your recording (important!). Define interpersonal communication in a way that orients your audience (i.e. your instructor) toward the main focus of your plan. Give a brief preview of the presentation’s key points.
  • Behavioral blend and background:
    Briefly describe your behavioral blend as identified in your Uniquely You profile, emphasizing how it influences the way you communicate and relate to others. Also, share about how your background and identity influences your communication patterns, both positively and negatively. This section provides a backdrop for understanding you as a communicator and the challenges and opportunities you have faced.
  • Communication barriers:
    Disclose and discuss the most significant interpersonal communication barriers and issues that you have discovered throughout this course. Define, explain, and exemplify how these currently hinder you and negatively impact your relationships. 
  • Goal and strategies:
    Articulate a goal that you intend to reach by implementing this plan. This goal should be succinctly formulated as a single phrase and must not be overly broad (e.g. “become a counselor” or too vague (e.g. “enhance my communication”). Share why this goal is important within the context of your life and/or career. Then disclose strategies that will allow you to reach this goal and remove the barriers discussed previously. For example, if your goal involves becoming a more empathic communicator at your workplace, developing active listening and reflecting skills might be appropriate strategies. If your goal is to impactfully mentor youth in your community, using appropriate levels of assertiveness, genuineness, and self-disclosure might be important skills to master.
  • Implementation:
    Formulate specific action steps for applying the strategies described in the previous section. In doing so, describe specific concepts, principles, models, and/or techniques that have provided you with insight and understanding throughout this course. Actions may include techniques you will practice, ideas you will continually reflect on, things you will do differently, etc. Explain how implementing your plan will make your goal a reality. Address also how you will evaluate your progress and hold yourself accountable.
  • Conclusion:

Briefly review the main points of your strategic interpersonal communication plan and end with a memorable closing statement or quote.

The video must be of sufficient quality for a professional setting and show you speaking, ideally from the waist up. Your PowerPoint must not be featured in the video. Your delivery must demonstrate a willingness to communicate with attention to audience engagement, articulation, appropriate language, tone, absence of vocal fillers, eye contact, posture, and movement. Your presentation must not exceed 10 minutes, or you may not be able to upload your video file.

Your PowerPoint presentation must include between 15 and 20 slides that have a consistent look, font usage and style throughout. The slides must effectively and professionally communicate key points and provide visual support for your oral presentation, rather than “stand alone” with an over-abundance of text. Use images, graphic elements, and illustrations to add interest, but make sure these do not distract from the overall content. Use the last one or two slides for a complete APA-formatted bibliography.

To upload your video to YouTube, follow these instructions: 

  • Set up a personal user account on YouTube (if you do not have one already).
  • Download your video from your recording device onto your computer.
  • Upload your video file to YouTube. 
  • Once your video is successfully uploaded, YouTube will process it and make it available for viewing. Once completed, make sure your video is accessible. Use the “unlisted” setting (thereby keeping it unavailable to the general public). Since both uploading and processing can take an indeterminate amount of time, it is highly recommended that you allow a window of several hours prior to the deadline for any potential issues.
  • When submitting the assignment, copy the link to your YouTube video and upload your PowerPoint file. 
  • Once your final grade has been posted, you may delete your video from YouTube. 

If you experience technical difficulties with YouTube, do not contact the Liberty University Helpdesk; see the YouTube Help Center. 

corporate policies for system security

In this assignment, you will develop corporate policies for system security monitoring, patch management, and updates that cover both wired and wireless components. A web search will provide multiple examples of policy documents. The following resources may also be helpful as you draft your policy documents:

  • SANS. No date. https://www.sans.org/blog/cis-controls-v8/?msc=main-nav . https://www.sans.org/critical-security-controls/?msc=main-nav
    • This resource provides a list of case studies highlighting how security professionals have made improvements in their security controls.
  • SANS. No date. Security Policy TemplatesLinks to an external site.. https://www.sans.org/information-security-policy/
    • This resource provides a number of security policy templates that might be helpful in drafting your policy documents.

The specific course learning outcome associated with this assignment is:

  • Recommend best practices for monitoring, updating, and patching systems.

Instructions

Write a paper in which you:

  • Establish a system security monitoring policy addressing the need for monitoring, policy scope, and exceptions and supported by specific, credible sources.
    • Justify the need for monitoring.
    • Define the scope of the policy (the personnel, equipment, and processes to which the policy applies).
    • Provide guidelines for policy exceptions, if approved by the IT and Security departments.
  • Establish a system security patch management and updates policy addressing the need for patch management and updates, policy scope, and exceptions and supported by specific, credible sources.
    • Justify the need for patch management and updates, aligned with ISO/IEC 27002.
    • Define the scope of the policy (the personnel, equipment, and processes to which the policy applies).
    • Provide guidelines for policy exceptions, if approved by the IT and Security departments.
  • Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.
    • Cite each source listed on your source page at least one time within your assignment.

Theology

Text Philippians 2:6-11

What theological principle underlies Paul’s application for his original

audience? In other words, what theology drives his application? Give

evidence to support your conclusion.

c. Is that principle still valid today? Is it a timeless principle or relevant only to Paul’s time? Defend yo7r answer.

d. If your answer was “no,” why is that principle no longer valid? If “yes,” what

is (are) the corresponding situation(s) in our lives today in which the principle

should be employed?

e. Given this (or these) situation(s) that correspond to the Philippians’ context,

what does God expect people to do today? How ought we apply the principle?