Evaluating Funding Requests: Juvenile Boot Camp Programs

Centervale councilman Pete Parsimonious has received funding requests for two competing juvenile corrections boot camp programs and requires your assistance on how to evaluate program success through appropriate research. There is a general perception that one of the two programs is only marginally successful while the other succeeds through much lower recidivism rates. Of course, the director for each program cites the outstanding success of his or her program in the funding application but fails to provide any research data to support these claims.

The intent of this assignment is to help you refer to empirical-based observations that can be quantitative (e.g., expressed as numbers) or qualitative (e.g., expressed as objects, words, or pictures)—specifically, the assignment will help you understand why one boot camp excels over the other in statistical terms particularly relating to lower recidivism rates.

Tasks:

  1. Conduct research related to juvenile justice boot camp programs using the Argosy University Online Library resources, the National Institute of Justice Data Collections, or the National Criminal Justice Reference Service Databases.
  2. Look for potential pitfalls in boot camp programs. Select two articles from your research that have taken different approaches to evaluate boot camp programs.
  3. Based on the programs you read about, prepare a memo. In the memo:
    1. Describe the research approaches and types of data that were utilized in each of the two studies.
    2. Identify any ethical issues Parsimonious should be concerned about as a city councilman making a recommendation to invest public funds in a program of this type. Provide the reason for your choice.
    3. Discuss whether either of these approaches should be recommended to Parsimonious and support your position based on the effectiveness and impact of the program. You might also comment on the setbacks or failure issues if reported in the studies you have chosen.
    4. Be sure to cite the resources you used in the APA style.
Grading Criteria
Maximum Points
Described the research approaches and types of data used in each of the studies.
16
Analyzed and justified the ethical issues that Parsimonious should be concerned about.
20
Analyzed and justified the approach that should be recommended to Parsimonious and stated any setback or failure issues reported in the research studies.
28
Cited resources in the APA format.
16
Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in the accurate representation and attribution of sources; and displayed accurate spelling, grammar, and punctuation.
20
Total:
100

3-2 pet

  

Provide an example of how each of the following technologies can create a competitive advantage for a logistics network : RFID, cloud computing, and the Internet-of-Things. Which do you think will be the greatest advantage for your current employer or your favorite retailer? Support your answer with cost, service and risk issues

Reply to the students response in 150 words and provide 1 reference

The following technologies can create several competitive of advantage for a logistics network. Below I will highlight the benefits of each.

RFID- Radio Frequency Identification is defined as a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person. RFIS is widely popular in warehouse setting for hand held picking devices. I have implemented RFID devices into warehouse operations and the results were excellent. Wireless hand-held picking devices helped optimize picking, improve real time ERP inventory and provides more flexibility in the operation.

Cloud Computing – Cloud computing is defined as a general term for anything that involves delivering hosted services over the Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). The name cloud computing was inspired by the cloud symbol that’s often used to represent the Internet in flowcharts and diagrams. Software-as-a-Service is popular with software such as Google Apps and Dropbox. The competitive advantage with SaaS comes from the product offering a company can deliver. Most client companies do not want the overhead to support a server that has cloud computing and would prefer to utilize a 3rd party service.

Internet of things – is defined as the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data. As I mentioned last week, autonomous cars can be defined as Internet of Things. The competitive advantage comes from the safety and fuel efficiencies. The internet connectivity of the GPS and sensors make driverless cars a product internet of things. 

Source:

https://internetofthingsagenda.techtarget.com/definition/RFID-radio-frequency-identification

2-3 Man

 

reply to students response to question in 150 words min . Be sure to answer in detail and refer to specific concepts and provide 1 reference

question

Describe a device that qualifies for label as an “Internet of Things” device. Present your top reason why this device can benefit society AND your top reason why it could be harmful.

students response

 

Smart watch is one of the most popular examples of what we can call as an “Internet of Things” device. Christensson defined it as a digital watch that provides many other features besides timekeeping. Examples include monitoring your heart rate, tracking your activity, and providing reminders throughout the day. Like a smartphone, a smartwatch has a touchscreen display, which allows you to perform actions by tapping or swiping on the screen. Today, modern smartwatches include several apps, similar to apps for smartphones and tablets. These apps provide additional functionality, such as displaying weather information, listing stock prices, and displaying maps and directions. Most smartwatches can also be used to make phone calls and send and receive text messages. This can be supported by Laudon’s statement in the book which explained that the impact of smart, Internet-connected products is just now being understood. Smart products offer new functionality, greater reliability, and more intense use of products while providing detailed information that can be used to improve both the products and the customer experience. They expand opportunities for product and service differentiation.

Basically, it has benefited the society by adding another step of convenience because you just do not need to take out your smartphone every time. Also going handsfree is the best part associated with usage of smartwatches.

However, I must consider as well that it poses harmful risk to us. I can clearly see issues with data being transferred, it is a concern of how data is stored on the smartwatches and how safe our private information is. HP actually conducted a test on the ten most popular smartwatches, which they exposed some vulnerabilities with the data being stored on the smartwatches (Khandelwal, 2015). Out of the ten, not a single smartwatch was found to be 100 percent safe, HP exposed three out of ten phones allowed unlimited login attempts, also completely didn’t offer two-factor authentication or the ability to lock the account after 3 to 5 failed password attempts. In conclusion, the data stored on our smartwatches might be at risk.

Reference:

Christensson, P. (2017, August 5). Smartwatch Definition. Retrieved 2019, Jun 12, from https://techterms.com

Laudon, K. Laudon, J. “Management Information Systems: Managing the Digital Firm, Fifteenth Edition” Chapter 3. (2018) p. 65

Kerner, S. M. (2015). Smartwatches Are Not All That Smart When It Comes to Security. Eweek, 1.

Prepare a Job description

  

Bachelor Courses:

· Object Oriented Programming language (JAVA)

· C programming & Data Structures

· Computer Organization

· Network Analysis

Master’s Courses:

· Analysis, modelling and design

· Systems development and implement

· Applied Programming

· Database Development and Admin

Provide Job duties or responsibilities for Mainframe Developer with 4 years of experience relating to above mentioned courses 

Below, please provide a detailed list of job duties associated with the requested position, the percentage of time to be spent on each, what technological environments will be used, and what Bachelor’s or Master’s-level coursework is relevant/necessary in order to be able to complete these duties. The more descriptive and specific you can be, the more helpful this document will be in demonstrating the Bachelor’s degree requirement

1. EXAMPLE TEXT] Responsible for using highly specialized knowledge of application integration, business process integration and B2B partner integration, using web Methods to assist Clients. (20% of his time)

· Involving in studying the requirements and preparing the design documents using GEAR and TBI methodology for the integrations identified.

· Participating in architecture planning discussions to support the process requirements and to plug into the existing global messaging backbone.

· Designing required UDM’s/Canonicals based on the OAGIS standards to support the process models. 

· Involving in implementing 58 N-N regular and reconciliation integrations to support processes that includes GL Validation, Requisition, Purchase Order, Goods Receipt, Invoice, Request for Payment, Payments, Suppliers, Exchange Rates, Commodity codes etc. 

· Participate in Framework development effort for error handling and monitoring mechanism.

· Participate in Configuration and Change management activities for the integration that myself and the team developed.

· Supporting the integrations partially post go-live and transferred knowledge to the offshore production support team.

· Environment: WebMethods Integration Server 6.1, Broker, SAP adapter, JDBC adapter, wmFlatFile.

· Bachelors Level Coursework: Big Data Analytics, Data Structures, Problem Solving and Computer programming, Discrete Structures and Graph Theory, OOPS through JAVA, Computer Graphics through C++, Web Technologies, DataBase Management Systems, Operating Systems, Parallel and Distributed Systems.

2. {Basic description   of job duty}{(xx% of time)}

· {Sub-bullet – specific tasks involved}

· {Sub-bullet – specific tasks involved}

· {Sub-bullet – specific tasks involved}

· Environment: {List of relevant  environments}

· Bachelors Level Coursework: {List of classes relevant to this job duty}

3. {Basic description   of job duty}{(xx% of time)}

· {Sub-bullet – specific tasks involved}

· {Sub-bullet – specific tasks involved}

· {Sub-bullet – specific tasks involved}

· Environment: {List of relevant environments}

Bachelors Level Coursework: {List of classes relevant to this job duty}

Discussion

1Q)

 

Using Social Media and Networking 

After reviewing the assigned reading materials, complete the following activities:

1.  Develop a product service idea.

A. Describe the product/service including the benefits of using the product/service

B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible social media to use in marketing the product/service. Describe your recommendations and discuss the advantages and disadvantages of each.

2Q)  I  need 300 words response of below post.

 

Describe the product/service including the benefits of using the product/service

I’d like to talk about a Private Investigation service that I feel is equally important unlike any other service in order to ensure we have the right set of eyes on any criminals of wrongdoers.

As a private operator, make your check in the business by keeping a sharp “eye” on other people’s activities. Clients fuse legal advisors gathering confirmation for a case or to accumulate portion, or individuals searching for information about a colossal other (Bowden, 2016).

It demonstrates an advantage to any person who is hoping to keep an eye on any suspicious movement among their loved ones or even outsiders to guarantee they are protected and sound (Bowden, 2016). Presently a days there has been an expanded number of stalkers online where individuals haphazardly take after and afterward carry out different wrongdoings inferable from which having a private investigator will demonstrate accommodating.

Discuss the potential customers for this product/service

This Private Investigation offers a wide range of services to all its clients. Services are as discussed below:

Surveillance Investigation. Extraordinary compared to other motivations to enlist a private specialist is for his or her experience and aptitude in current reconnaissance. Surveillance suggests an adjacent impression of a man or assembling to screen their activities to gather evidence and meet the objectives of the case (Bowden, 2016). Perception is troublesome and takes significant lots of realistic application remembering the ultimate objective to be feasible (Momoko, 2018). It is never endorsed that some person other than approved private inspectors perform perception as most states have laws balancing it (stalking and Harassment). Our private agent staff is approved to participate in perception and have the strategies and experience principal (Syrdal, 2018).

These services are targeted to all the individuals no matter which field they belong to as this is a common area where everyone needs assistance and support.

Based on the nature of the product/service, recommend at least 3 possible social media to use in marketing the product/service. Describe your recommendations and discuss the advantages and disadvantages of each.

Twitter and Facebook are the two major and ideal social media platforms in order to promote and spread the service worldwide.

Talking about Twitter, they have around 550 Million registered user and twitter is one of the fastest growing networks with a growth rate of 44% from 2012-2013. It also tracks a record count for 215 million active users per month with the largest penetration in the United States (Bowden, 2016).

On the other hand, Facebook has over 1.15 Billion users out of which around 23% of them login each day. As per the poll, about 47% Americans have recommended Facebook as their number 1 influencer of purchases providing the users a large opportunity of communicating with customers in a non-obtrusive way (Syrdal, 2018).

The social media advantage is that it gives the user a completely different customer demographic besides promoting the business in a far cheaper way than any other traditional advertising mechanism. Also getting acquainted to the social media platform helps widen the business horizons to a large audience (COKER, 2017).

3Q)     I  need 300 words response of below post.

 

Product idea and using Social Media and Networking

1.      Develop a product service idea

Development and new product services are essential parts of all businesses.  For company growth and status of improvement to focus on new liability, new service development is the key to get success in the market. According to the lifecycle of products and services, you can make a decision about your new product launching.

According to my point of view, now day’s people are getting the problem in limited shopping. When we go to grocery store, Walmart, Target we get confused to make a decision about things which might or might not be essential. To overcome this problem I think about online app service. In this service, people can put their budget in-app and they can mention they’re a necessary section for example food, clothes, home accessories etc. this app will suggest some lists about their products and combining this suggestion people can buy their essential products within the certain range of limit.

A.     Describe the product/ service including the benefits of using the product/ service

According to my app, I call it “InstaFresh” you can do your shopping for your family and relatives in your budget. For example, Joyee, the one guy who wants to buy food grocery for his family. There are 4 members of his family. He has $50 budget for this week. So now by using the InstaFresh app, he is able to make his relatively medium shopping with satisfaction. Joyee needs to put their limit (50$) in the app and what type of shopping he wants to do. According to this information, the app will suggest him 3 types of listings. These listing are in the range of his limit.  So in the end, he can make choices to choose list or to combine his list. In this way, he can easily make choices and decisions.

B.     Discuss the potential customers for this product/service

This app is related to clothes, food, home accessory so customers will be all people who want to buy these products, means I can make this service as a standalone system or else I can give authority to use this system to other companies like Walmart, Target, Foodmaxx etc.

2.      Based on the nature of the product/service, recommend at least 3 possible social media to use in marketing the product/service. Describe your recommendations and discuss the advantages and disadvantages of each.

This service is totally based on shopping strategies so we can make it easy by using search technology.  I can locate this application on a computer network using different libraries like spiders.  Hybrid search engine and web directory these are helpful search engines for this app. These search engines can easily share their information and people are ready to use it easily. We can also do marketing using the social media and networking platforms. Nowadays, there are multiple social media and networking platforms which is aid us marketing in multiple ways. For instance, Facebook, Twitter, Instagram, Pinterest, Snapchat etc. which are amongst the most successful social networking websites and apps.

Facebook: Facebook can be considered the epitome of social networking websites because there are approximately 2.2 billion users who are actively using Facebook and this number is growing daily. So, there are so many users from different regions and places which will lay the foundation for my InstaFresh business which can ship groceries in very less time. 

Facebook has three tools (pages, ads, and groups) that can be used by anyone. Each of these options has its own purpose, and they can be combined for greater reach.

Advantages: Pages are free and easy to set up. Ads have powerful targeting parameters. Groups are free and have high levels of engagement.

Disadvantages: Groups can be very time consuming. It can be hard to get a foothold and build a fan base with a page.

Instagram:

With more than 700 million active monthly users, the platform isn’t just for personal use anymore. Instagram is a full-fledged, global platform that allows brands to humanize their content, recruit new talent, showcase products, and inspire their audience.  Instagram unveiled its new business tools feature. The tool allows users to identify themselves as a business, making it easy for their audience to contact them. Business profiles also provide more in-depth insights and make it easier for you to promote content. Note: Your business must have a Facebook business page to switch to an Instagram business profile.

LinkedIn: 

With LinkedIn, you can reach your ideal customers on the world’s largest professional network. We can market to who it matters. We can establish our brand with a free Company Page and attract followers and expand the business. We can also get innovative ideas from the followers and other companies.

LinkedIn’s Sponsored Content helps surface relevant content for quality prospects in our target B2B market, effectively merging our inbound strategy with cost-effective lead generation. LinkedIn Sponsored InMail delivered a 40% conversion rate. Frankly, it blew every other campaign out of the water. Attract followers and build brand awareness by posting content on a free Company Page.

short paper

Network Architecture Paper:Compare the TCP/IP protocol suite and the OSI model and list their differences and similarities.

The paper must use APA 6th ed., 7th printing formatting and contain a title page, 2 pages of content, and a minimum of two peer-reviewed references.

Please access the Purdue Owl Online Writing Lab as an APA resource.  Your assignment will be graded based on the rubric, which can be viewed when clicking on the assignment link.

Assignment Resource(s):

Watch Video

TCP/IP and the OSI Model Explained!
Duration: (36:35)
User: n/a – Added: 11/17/13
This is the big picture explanation of the TCP/IP protocol and how it maps to the OSI model. The big picture covers the OSI model layers and their functions, TCP/IP layers, functions, PDUs and addressing. Then it shows how the many different network devices are mapped to the TCP/IP protocol.

Discussion

1q)    Search “scholar.google.com” for a company, school, or person that has been the target of a network
or system intrusion? What information was targeted? Was the attack successful? If so, what changes
were made to ensure that this vulnerability was controlled? If not, what mechanisms were in-place to protect against the intrusion.

I need 250 words of above Post and  Indicate at least one source or reference .

2Q) I need Reply of below Post by 200 words.

 

 In 2015, Primera Blue Cross was a target of a network or system intrusion. Yes, the attack was successful, and the company did not even notice the breach for 9 months. The attackers gained unauthorized access to the company computers and stole approximately 11 million customers information even though it was encrypted such as their names, social security numbers, date of birth, phone numbers, email addresses, bank account details, mailing addresses, and clinical information (Granville, 2015). After this attack, to ensure that the vulnerability was controlled the company provided giving various services for free to the customers who were affected by this attack such as identity theft protecting and credit controlling (Jones, 2016).

   According to Bhatti et al, 2015 the chief compliance officer focused on the overall security chain of the company by tracking access and logging the information of the employees who accessed the records of the customer’s personal health but still this attack occurred. Later after the attack, to remove the infected software from their system Primera Blue Cross hired the FireEye cybersecurity firm.  Potential damage will occur when the network credentials are stolen in order to prevent this it is important that the Primera Blue Cross deploys active and context-aware access management mechanism. By doing this the company would have the rights to remove the access to the servers or applications to which the attacker gets connected (Toulouse et al, 2015).

 

For Madam Propesa

Cultural Competency Organizational Assessment and Solutions

Scenario: Cross, Bazron, Dennis and Isaacs (1989) defined cultural competence as “a set of congruent behaviors, attitudes and policies that come together as a system, that system, agency or those professionals to work effectively in cross-cultural situations”. Cultural Competency is vital to sustainability of a health care organization and the ability to provide high quality health care to the community in which serves. Cultural competency consists of a blend of ethics, values, morals, a health care organizations mission statement and the recognition of all employees, patients and visitors are and shall be treated equally.

A new community health center has opened in your county offering basic health care services and preventative care and education to migrant workers, illegal residents and recent immigrants. To ensure the health center promotes and establish a culturally competent environment, as the health center’s chief privacy and compliance officer (CPO) (CCO), you have been tasked to develop a cultural competency training tool kit.

Deliverables: The final product to submit is robust cultural competency training tool kit for departmental and organizational wide use. Your final submission must include the following listed below.  A 1-2 page proposal for language assistance as an effort to offer additional pay for bilingual employees willing to serve as a designated language interpreter

    • Process identifying language interpreters
    • Determine supplemental pay
    • Schedule of interpreters (be sure schedule does not interfere with regular work schedule)
    • Process to locate identified interpreters when needed
  • Design an actual forty-five (45) minute to one (1) hour virtual training session for departmental and organizational use on the topic of Cultural Competency (the intent is for a future mandatory automated training; therefore audio is required)
    • Presentation can include clip art, links to additional sources
    • Must include recorded audio of each presentation’s slide
    • Topics must include at minimum cultural competency discussion: employees, patient care, importance, alignment with mission, vision of and values of the organization, define and discuss cultural competency, compare and contrast cultural competency and diversity, ethics, health disparities, impact on decision making, measures to establish and maintain a cultural competent organization and environment
  • Using Microsoft Excel, Word or a survey software, design a tool for attendees to assess the cultural competency training
    • Identify a list of cultural competency related domains and accompanying knowledge, skills and abilities for attendees to measure the effectiveness of the virtual training session
    • Integrate data analytics to assess, evaluate and/or recommend local state and federal cultural competence (and/or related) regulatory compliance measures.  

References & Resources:

Cross TL, Bazron BJ, Dennis KW, Isaacs, M.R. Towards a Culturally Competent System of Care: Vol I. Washington, DC: National Technical Assistance Center for Children’s Mental Health, Georgetown University Child Development Center; 1989.

Cultural Competence in Health Care: Emerging Framework for Practical Approaches: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&cad=rja&uact=8&ved=0ahUKEwiBhp2H4pPLAhXBmx4KHTvKCdcQFggoMAE&url=http%3A%2F%2Fwww.commonwealthfund.org%2Fusr_doc%2Fbetancourt_culturalcompetence_576.pdf&usg=AFQjCNEtpXTbWj-AcrxWSKLsi9-bUYNBjw&sig2=eY9aOlw6Z3V17ABOGj6Sww

Diversity & Cultural Competency in Health Care Settings: http://www.matherlifewaysinstituteonaging.com/wp-content/uploads/2012/03/diversity-and-cultural-competency-in-health-care-settings.pdf  

Tools for Assessing Cultural Competence Training: https://www.aamc.org/download/54346/data/tacct.xls

Movie “Language Barrier”:  http://www.youtube.com/watch?v=qaVKy-2HWIo&WT.z_nav=healthcare-professionals%2Fresources-for-health-care-professionals%2Fhealth-equity%3BBody%3BBreaking%20Down%20the%20Language%20Barrier%20%E2%80%93%20Translating%20Limited%20English%20Proficiency%20into%20practice

 

 

 

Information Systems 2

Assignment 1: Models for Competitive Dynamics

Competition has, since the 90s, led to wider gaps between industry leaders and laggards. There are more “winner-take-all” environments and greater churns among industry sector rivals. We have witnessed sharp increases in quality and quantity of IT (Information Technology) investments. We’ve seen striking competitive dynamics, particularly in sectors that spend the most on IT. Some of the competitive dynamics models include the Destroy Your Business (DYB) strategy, the Grow Your Business (GYB) strategy, the Information Systems (IS) and strategic advantage, and the social business strategy.

Write a four to five (4-5) page paper in which you:

  1. Compare and contrast the DYB and GYB strategies in terms of the ability to sustain a business in the marketplace over the long term, to be competitive against rivals, and profitability.
  2. Examine the “cannibalization” strategy and determine if it is or is not a better strategy compared to the DYB strategy for growth, competitiveness, and market leadership. Provide two (2) business examples.   
  3. Determine whether or not changes in business strategy should entail reassessment of IS. Provide three (3) reasons to support your position.
  4. Examine how firms can use social IT in alignment with organizational strategy and IS strategy. Consider collaborative capabilities, what, how, and who should use social IT for a social business strategy.
  5. Use at three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Demonstrate an understanding of the integration of enterprise systems with inter-organizational partners.
  • Use technology and information resources to research issues in enterprise architecture.
  • Write clearly and concisely about enterprise architecture topics using proper writing mechanics and technical style conventions.

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills,

Data Analysis (Cluster Analysis) APA format, no plagiarism 3-4 pages

Attached Files:

Included with this assignment is an Excel spreadsheet that contains data with two dimension values.

The purpose of this assignment is to demonstrate steps performed in a K-Means Cluster analysis.

Review the “k-MEANS CLUSTERING ALGORITHM” section in Chapter 4 of the Sharda et. al. textbook for additional background.

Use Excel to perform the following data analysis.

  1. Plot the data on a scatter plot.
  2. Determine the ideal number of clusters.
  3. Choose random center points (centroids) for each cluster. (Note:  Each student will select a different random set of centroids.)
  4. Using a standard distance formula measure the distance from each data point to each center point.
  5. Assign each data point to an initial cluster region based on closeness.
  6. For each cluster calculate new center points.
  7. Repeat steps 4 through 6.

You will use Excel to help with calculations, but only standard functions should be used (i.e. don’t use a plug-in to perform the analysis for you.)  You need to show your work doing this analysis the long way.  If you were to repeat steps 4 through 6, what will likely happen with the cluster centroids?  The rubric for this assignment can be viewed when clicking on the assignment link.

Here is a link to an example spreadsheet using a smaller data set.  It contains two tabs.  The first tab is the raw data.  The second tab contains the analysis that was performed.  Make sure that you use a different starting center points from the example.

Example Excel Analysis