Professional Accountability

The purpose of this assignment is to evaluate personal and professional accountability in the context of social media. Social media plays a significant role in modern society and is now a common tool used by individuals and organizations alike to evaluate a person’s values, authenticity, and reputation. Additionally, social media is now considered a mainstream part of the process for recruiting and hiring candidates for employment. Inappropriate or unprofessional conduct on social media can pose legal problems for nurses as well as damage public trust in nursing.

For this assignment, log-in to each social media platform for which you have an account. Review your profile and most recent activity including pictures and posts. If you do not have a social media account, access one of the following social media platforms in order to view the social media posts and activities of others: Facebook, Instagram, Twitter, YouTube, TikTok. Reflect on the information and content you and others post on a daily basis.

In 500-750 words, summarize your findings. Include the following in your summary:

1. Describe the posts, conversations, and images you evaluated.

2. Does the activity on social media appear to align with your personal values and the professional values of your discipline?

3. Would family, friends, and colleagues consider the posts, conversations, and images authentic and representative of who you are as unique individuals?

4. Does the activity on social media respect the human value and dignity of others as reflected in Christian values?

5. Discuss why nurses have a responsibility to uphold a standard of conduct consistent with professional values, regulatory requirements, and workplace policies in both personal and professional interactions. Include a discussion of how personal conduct can violate the Health Insurance Portability and Accountability Act (HIPAA) of 1996 or be considered unethical and unprofessional. Provide an example to support your answer.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.

American Association of Colleges of Nursing Core Competencies for Professional Nursing Education

This assignment aligns to AACN Core Competencies 6.1, 8.1, 8.5, 9.1, 9.3, 9.4, 9.5, 10.2.

Cybersecurity in Government Organizations

 

Project 2: Compare / Contrast Two State Government IT Security Policies

For this research-based report, you will perform a comparative analysis that examines the strengths and weaknesses of two existing IT Security Policies published by state governments for their operating departments and agencies (agencies and offices of the executive branch under the leadership of the state governors). (You will select two policies from the table under Research > Item #1.)

Your specific focus for this analysis will be how these state issued policies guide the implementation of (a) Risk Analysis (aligned with NIST SP 800-30 and SP 800-37) and (b) System Authorization processes aligned with the 7 domains of the Certified Authorization Professional certification.

Your analysis must include consideration of best practices and other recommendations for improving cybersecurity for state government information technology operations (i.e. those operated by or for state agencies and offices). Your paper should also address the question: why should every state in the nation have a comprehensive IT security policy for state agencies and offices that implements risk assessment processes and system authorization processes to reduce and mitigate risk?

 

Read / Review:

1. Review the 7 domains of the Certified Authorization Professional (in the course textbook):

· Information Security Risk Management Program

· Scope of the Information System

· Selection and Approval of Security and Privacy Controls

· Implementation of Security and Privacy Controls

· Assessment/Audit of Security and Privacy Controls

· Authorization/Approval of Information System

· Continuous Monitoring

2. Review the NIST best practices guidance in NIST SP 800-30 and NIST SP 800-37 (read chapters 1 & 2 in each document).

Research:

1. Select two state government IT Security Policies from the list below.

State IT Security Policy
Illinois https://www2.illinois.gov/sites/doit/support/policies/Documents/Overarching%20Enterprise%20Information%20Security%20Policy.pdf
Massachusetts https://www.mass.gov/policy-advisory/enterprise-information-security-policy
Michigan https://www.michigan.gov/documents/dmb/1340_193162_7.pdf
Minnesota https://mn.gov/mnit/government/policies/security/#/list/appId//filterType//filterValue//page/1/sort//order/
Nebraska https://nitc.nebraska.gov/standards/8-Chapter.pdf
North Carolina https://files.nc.gov/ncdit/documents/Statewide_Policies/Statewide-Information_Security_Manual.pdf
Oklahoma https://oklahoma.gov/content/dam/ok/en/omes/documents/InfoSecPPG.pdf
South Dakota https://bit.sd.gov/docs/Information%20Technology%20Security%20Policy%20-%20Contractor.pdf
Virginia https://www.vita.virginia.gov/media/vitavirginiagov/it-governance/psgs/pdf/SEC519-Information-Security-Policy.pdf

 

2. Download and review your selected state governments’ IT Security Policy documents. If the IT Security policy document refers to a separate System Authorization Policy, download and then include that supporting document in your review and analysis for this project.

3. Analyze the System Authorization processes listed in the two IT Security Policy documents.

a. How well do these align with the best practices listed in the CAP Certification Body of Knowledge?

b. How well do the Risk Assessment processes align with guidance provided in NIST SP 800-30 and NIST SP 800-37?

4. Continuous your analysis from step 3 and use it to compare the System Authorization activities listed in the state IT security policies.

a. Develop five or more points that are common across the two documents. (Similarities)

b. Identify and review at least three unique items in each document. (Differences)

5. Research best practices for IT Security and/or IT Security Policies for state governments. Here are several sources which you may find helpful:

a. https://www.nist.gov/cyberframework/perspectives/state-local-tribal-and-territorial-perspectives

b. https://www2.deloitte.com/insights/us/en/industry/public-sector/nascio-survey-government-cybersecurity-strategies.html

c. https://www2.deloitte.com/content/dam/insights/us/articles/4751_2018-Deloitte-NASCIO-Cybersecurity-Study/DI_2018-Deloitte-NASCIO-Cybersecurity-Study.pdf

6. Using your research and your comparison of the two policy documents, develop an answer to the question: Why should every state government have an IT security policy for state agencies and offices under the state’s executive branch? Make sure that you address: (a) leadership, (b) compliance with laws and regulations, and (c) best practices for good government (especially with respect to cybersecurity practices) .

Write:

Write a five to eight (5-8) page research-based report in which you summarize your research and discuss the similarities and differences between the two IT security policy documents. You should focus upon clarity and conciseness more than length when determining what content to include in your paper. At a minimum, your report must include the following:

1. An introduction or overview of IT Security Policies for the executive branch of state governments (covering state agencies and offices in the executive branch including the governor’s office). Explain the purpose of an IT security policy and how states use security policies. Answer the question: why should every state in the nation have a comprehensive IT security policy for state agencies and offices? (Make sure that you address the importance of such strategies to small, resource-poor states as well as to large or wealthy states.)

2. A separate section in which you provide and discuss five or more specific examples of the common principles and policy sections/statements (similarities) found in both IT security policy documents.

3. A separate section in which you discuss the unique aspects of the first state’s IT security policy document. Provide five or more specific principles or guidelines or other content that is unique to the policy document.

4. A separate section in which you discuss the unique aspects of the second state’s IT security policy document. Provide five or more specific principles or guidelines or other content that is unique to the policy document.

5. A section in which you discuss your evaluation of which state government has the better of the two IT security policy documents. You should also present five or more best practice recommendations for improvements for both IT security policy documents. (Note: you may have different recommendations for the individual policies depending upon the characteristics of each document.)

7. A summary section in which you address the need for IT Security Policies at the state government level. Provide a convincing answer to the question: why should every state in the nation have a comprehensive IT security policy for state agencies and offices? Make sure that you address: (a) leadership, (b) compliance with laws and regulations, and (c) best practices for good government.

Submit for Grading

Submit your work in MS Word format (.docx or .doc file) using the Project 2 Assignment in your assignment folder. (Attach the file.)

Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your 5-8 page research-based report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.

3. Your paper should use standard terms and definitions for cybersecurity.

4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Paper_Template(TOC+TOF,2021).docx.

5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count.

6. You should write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

7. You must credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

Useful theories in managing staff

Assume you are the manager of a department in an organization. Select two of the theories you learned about this week that you believe will be most useful in managing your staff. (Be sure to review the supplemental readings as well). Select different theories or different combinations of theories than your classmates select. Address the following:

  • Assess why you find the two theories you selected most practical or helpful.
  • Evaluate how the two theories might interact with each other.
  • Analyze whether you anticipate needing different motivational methods applying your selected theories according to the ages, races, national origins, cultures, genders, and educational backgrounds of your subordinates. Provide appropriate citations to support your conclusions.
  • Justify three best practices that emerge from your selected theories (three best practices total. You do not need three best practices for each theory).

Explain how this PSA addresses the Maslow’s Hierarchy of Needs

PSA ASSSIGNMENT

You are to view the complete PSA (Public Service Announcement)

https://www.youtube.com/watch?v=fev32zxoh00 and then answer the following questions.

Your answers must be college level answers and college level writing, submit your work to the

designated drop box on or before the assigned drop box expires. Please proof read, utilize

proper English, capitalization, punctuation and sentence structure. Answer all questions

completely, not just a section of the question.

 

1. Looking at Maslow’s Hierarchy of Needs, please explain how this PSA addresses the

needs that Maslow believed we all want fulfilled during our lifetimes. Exactly what needs

does Maslow address in the PSA (give examples)?

 

2. Looking at Aristotle’s three persuasive appeals, how do they become relevant in this PSA

– please address all three levels.

 

3. Discuss how the Elaboration Likelihood Model of Persuasion helps (or if you want to

disagree then how it hinders) our mental process of this form of persuasion.

 

4. When constructing sound arguments you need three major elements: claims, evidence

and warrant. Identify all of these & then identify the claim (fact, value or policy) and

give evidence (example) of your choice.

 

5. Can you identify any of the logical fallacies that are stated in chapter on persuasion? If

yes, what is that fallacy and give an example of each one you list.

 

6. What is your opinion on this PSA – does it persuade you to not to text & drive. Please do

not just state “It’s good, I won’t do it” or “I liked it”. This is to be a college level answer,

you need to critically think about your answer and analyze why you are answering the

questions the way you are.

how the three-dimensional art can stimulate the Naturalistic intelligence from Gardner’s theory

Discussion:

Discuss how the three-dimensional art can stimulate the Naturalistic intelligence from Gardner’s theory.

Charvita Tolbert

The hypothesis of multiple intelligences developed by the psychologist Howard Gardner postulates that individuals have distinct ways of utilizing knowledge and that humans do not possess all forms of intellect from birth. Stated differently, even beyond the completion of our formal education, we are constantly learning and developing throughout our lives. Gardner separates intellect into eight distinct categories rather than characterizing it with a single general skill (Eberle, 2020). Individuals possess a multitude of skills in several forms of intellect, despite the fact they might be exceptional in one particular area (like arithmetic intellect). The theory of multiple intelligence by Howard Gardener stresses on the naturalistic intelligence of an individual which enables to appreciate the natural environment of the world. The theory also emphasizes on the way human perceive and comprehend natural surroundings (Thambu,Prayitno, & Zakaria, 2021). It has been observed that people who possess natural intelligence have capability to excel in profession related to nature and science. In this respect, naturalistic intelligence posses the strength to stimulate three-dimensional art. There are various ways through which three-dimensional art can be expresses in order to acquire the attention of viewer. For instance, the integration of natural material in art work can be used for three dimensional art such as wood, plants, and stone. In this way, the art can get the appreciation from viewer for using natural material in artistic way to display the texture and color of things from real world. The other most effective way of exposing the issues of the world through three dimensional art work (Thambu,Prayitno, & Zakaria, 2021). It assists to create awareness about the environment and stresses to preserve the natural environment from air and water pollution as well deforestation which can destroy the natural environment of the world. In this way, it helps to build connection between individual and the real world. Naturalistic intelligence can be further foster through artistic work related to history and culture which bring one more near to natural world (Eberle, 2020). The depiction of fabled species in form of sculpture and traditional symbols are a great source of attraction for spectators to comprehend the connection of history and culture with the real world.

Jessica

According to Gardner, naturalistic intelligence is the ability to identify, classify and manipulate elements of the environment, objects, animals or plants. When looking deeper into Gardner’s theory, I was able to read about the various intelligences that Gardner focuses on. These are listed as; linguistic, logical-mathematical, spatial, musical, bodily-kinesthetic, interpersonal, naturalistic, and existential. When looking specifically at naturalistic intelligence, this involves sensitivity and appreciation for the natural world. People that have a high naturalistic intelligence may prosper in activities like gardening, wildlife, observation, and environmental science. Three-dimensional art is important because it adds depth, texture, and tangible aspects that one is able to manipulate in a form of artistic expression. Some examples of three-dimensional art are; sculptures, installations, and other physical creations that provide different perspectives. When looking at how three-dimensional figures can assist in naturalisitc intelligence it can play a role in the sense of encouraging observation, facilitating exploration, expressing environmental concepts, promoting sensory engagement, and enhancing spatial skills. When looking at nature in general, majority of things within nature are three-dimensional. For hands-on learners this is a great form of intelligence. Being able to see things in a three-dimensional angle is very helpful in the sense of engaging students.