critical analysis 12

write one paper of critical analysis about the topic in attachment please read it before writing

project 6 policy review and recommendations powerpoint presentation

Using the case study and instructions provided. I need a minimum 12 slide powerpoint presentation. Use the grading rubric below.

Policies

Clearly describes the current IT cyber security policy.

Basically describes the current IT cyber security policy.

Weakly describes the current IT cyber security policy.

Little description of the current IT cyber security policy. (Or, inappropriate or excessive copying from other authors’ work.)

No description of the current IT cyber security policy.

ID at least 2 IT security policies to implement based upon the case study. Clearly discusses the rationale for selection of these policies.

ID at least 2 IT security policies to implement based upon the case study. Basically discusses the rationale for selection of these policies.

ID at least one (1) IT security policy to implement based upon the case study. Weakly discusses the rationale for selection of the policy.

May ID at least one (1) IT security policy to implement based upon the case study. Little discussion of the rationale for selection of the policy. (Or, inappropriate or excessive copying from other authors’ work.)

No policies identified or discussion of the rationale for the IT security policies.

New Technology

Clearly describes functionality of new technology selected for implementation.

Basically describes functionality of new technology selected for implementation.

Weakly describes functionality of new technology selected for implementation.

Little description of functionality of new technology selected for implementation. (Or, inappropriate or excessive copying from other authors’ work.)

No description of functionality of new technology selected for implementation.

Clearly describes challenges associated with the current cyber security policy based on the new technology.

Basically describes challenges associated with the current cyber security policy based on the new technology.

Weakly describes challenges associated with the current cyber security policy based on the new technology.

Little description of challenges associated with the current cyber security policy based on the new technology. (Or, inappropriate or excessive copying from other authors’ work.)

No description of challenges associated with the current cyber security policy based on the new technology.

Clearly explains the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. Must address two (2) or more IT policies.

Basically explains the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. Must address two (2) or more IT policies.

Weakly explains the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. Must address at least one (1) IT policy.

Little explanation on the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. May address only one (1) policy. (Or, inappropriate or excessive copying from other authors’ work.)

No explanation on the cyber security vulnerabilities that could be introduced by the new technology that may not be mitigated by technological configuration management. Doesn’t address any policies.

Recommendations

Clearly discusses revision and modification to each IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. Must address two (2) or more IT policies.

Basically discusses revision and modification to each IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. Must address two (2) or more IT security policies.

Weakly discusses revision and modification to each IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. Must address at least one (1) IT policy.

Little discussion on revision and modification to each IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. May address only one (1) policy. (Or, inappropriate or excessive copying from other authors’ work.)

Doesn’t discuss revision and modification any IT cyber security policy to ensure new technology doesn’t compromise organization cyber security posture. Doesn’t address any policies.

Clearly addresses the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies.

Basically addresses the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies.

Weakly addresses the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies.

Little address of the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies. (Or, inappropriate or excessive copying from other authors’ work.)

Doesn’t address the inter- and intra-organization leadership, managerial and policy challenges and effects associated with the new policies.

Clearly discusses challenges in communicating new policies across the organization.

Basically discusses challenges in communicating new policies across the organization.

Weakly discusses challenges in communicating new policies across the organization.

Little discussion of the challenges in communicating new policies across the organization. (Or, inappropriate or excessive copying from other authors’ work.)

No discussion of the challenges in communicating new policies across the organization.

Finds and Applies Knowledge

Used at least 5 authoritative or scholarly sources in paper. One must be NIST SP 800-53. No APA style errors in sources.

Used at least 3 authoritative or scholarly sources in paper. One must be NIST SP 800-53. No more than 1 APA errors in sources.

Used at least 2 authoritative or scholarly sources in paper. One must be NIST SP 800-53. No more than 2 APA errors in sources.

May have used 1 authoritative or scholarly source in paper. May use NIST SP 800-53. May not have used APA style formatting.

No authoritative or scholarly sources used in paper. NIST SP 800-53 not mentioned.

All sources cited. No errors in citing material in paper.

All but 1 source cited. Had no more than 5 citing errors in paper.

All but 2 sources cited. Had no more than 10 citing errors in paper.

All but 3 sources cited. Had less than 15 APA citing errors in paper.

No sources cited or had more than 15 APA citing errors in paper.

Organization, Execution and Appearance

Has separate title slide with title, student name, class and date. All slides have titles; not wordy and is easy to read; no spelling or grammar errors; and no distracting material.

Basic title slide with title, student name, class and date. Slides have less than 5 errors to include: missing titles, wordy; hard to read slides; spelling or grammar errors; distracting material.

Weak title slide with title, student name, class and date. Slides have less than 10 errors to include: missing titles, wordy; hard to read slides; spelling or grammar errors; distracting material.

Missing title slide with title, student name, class and date. Slides have less than 15 errors to include: missing titles, wordy; hard to read slides; spelling or grammar errors; distracting material.

Missing title slide with title, student name, class and date. Slides have more than 15 errors to include: missing titles, wordy; hard to read slides; spelling or grammar errors; distracting material.

Provides at least 12 PowerPoint Slides

Provides at least 10 PowerPoint Slides

Provides less than 10 PowerPoint slides

Provides less than 10 PowerPoint slides

Provides less than 10 PowerPoint slides

Overall Score

wills and estate law assignment

Find the intestate succession law in your state. For your assignment:

  1. List the persons to whom an estate is distributed if someone dies intestate.
  2. Cite the section correctly (you may have to research the proper way to cite a state Code).
  3. Find the following in your state:
    1. The homestead exemption amount or the homestead allowance;
    2. The exempt property amount and the type of property exempted; and
    3. The family allowance.
  4. Why do you think the legislature of your state chose to make these available to families of the deceased? Do you think these statutory amounts are “fair” or not? Explain your answers.
  5. MY STATE IS ALABAMA

define and discuss member roles and functions as it pertains to the group process of od intervention

Write 1 page paper (APA Format) on the following: Define and discuss ‘Member Roles and Functions’ as it pertains to the Group Process of OD Intervention.

organizational development and benefits

It is important that health care organizations train and mentor potential successors for critical positions. One way organizations do that is through succession planning. Define succession planning, explain its importance to organizational vitality, and discuss the succession planning process.

The initial post should be at least 500–700 words.

Note: Use APA style to cite at least 2 scholarly sources from the last 5 years.

african history 9

The “Origin of Negro Slavery” is a chapter from historian Eric Williams’ classic text, Capitalism and Slavery. In this chapter, Williams advances an argument about the origin of the enslavement of Africans in the Americas. Write a short essay (NO MORE THAN TWO TYPED PAGES) discussing the following:

  • What is the Eric Williams thesis? What is his main argument?
  • According to Eric Williams, what were the principal factors driving plantation slavery in the Atlantic World?
  • What type of evidence supports his argument? Provide at least three pieces of evidence from the chapter.
  • Which interpretations of the origins of new world plantation slavery is Williams critiquing? In other words, what and who is Williams disagreeing with?
  • Do you agree or disagree with Williams? Why or why not?

the persuasion imperative

There may have been a time when a boss gave orders and subordinates followed them. If you’ve watched the AMC series “Mad Men”—based on Madison Avenue marketing executives in the 1960s—you’ve seen an image of deference to authority, respectful obedience to those higher up in the hierarchy, and a paternalistic relationship between boss and employee.

With time comes change. Organizations are no longer male dominated as they were in the 1950s. Laws and policies are in place that better protect employees against the sometimes-capricious whims of supervisors.

Another sign of shifting cultural values is the way managers use their power. Commandments are out. Persuasion is in.

When IBM manager Kate Riley Tenant needed to reassign managers and engineers to form a database software team, she had to persuade IBM employees from all corners of the globe, none of whom directly reported to her. According to Tenant, it’s a big change from when she started in the field 20 years ago. “You just decided things, and people went off and executed,” she said. Now, “not everybody reports to you, and so there’s much more negotiation and influence.”

John Churchill, a manager with Florida-based Gerdau Ameristeel Corporation, agrees. The question now, he says, is “How do I influence this group and gain credibility?”

At IBM, the challenge of persuading employees across reporting relationships has become so significant that the firm developed a 2-hour online course to help managers persuade other employees to help with projects crucial to its business. IBM’s tips for managers include the following:

  • Build a shared vision
  • Negotiate collaboratively
  • Make trade-offs
  • Build and maintain your network

Despite meeting initial resistance, after completing the training program, Tenant was able to persuade most IBM managers and engineers to join the team.

This doesn’t mean authority has lost all its power. Robert Cialdini, a social psychologist who has studied persuasion for decades, lists authority as one of his keys to influence. Even more important may be the so-called “bandwagon effect” (or what Cialdini called “social proof”)—Cialdini and others have found that people are often deeply persuaded by observing what others are doing. From his research, no message more effectively got hotel guests to reuse their towels than citing statistics that others were reusing their towels.

So, if you’re a manager who needs to persuade, present the vision behind the request and be collaborative, but it also wouldn’t hurt to tell those you’re trying to persuade about others who have already agreed to your request.

Based on the above reading and the knowledge gained from your assigned readings, respond to the following questions:

  • Are the precepts of the IBM training program consistent with your reading this week? Why or why not?
  • Are there other keys to persuasion and influence that might be added to the IBM program?
  • If you had a manager who wanted you to do something against your initial inclination, which of IBM’s elements would work best on you? Why?
  • Do you think generational values explain the changing nature of the employer–employee relationship? You should base your response upon what you learned in Week 1 about values.

need 2 pages

i need 2 pages.

please check attached file for details,

i can afford only $5-$7

needs to be completed 1

please cite everything correctly and no palferism I must scan before I upload

marketing metrics

Popular marketing metrics such as customer acquisition, satisfaction, and retention, can sometimes turn out to be poor indicators of customers’ true perceptions and, ultimately, marketing success. Explain how these metrics could mask important marketing problems for hospitals.

350 words