32. Name: George TibiisDate: 20th January, 2020
Social History
Prepared By:
Presenting Problem
George Tiblis is a 16 year old refugee from Syria. His parents
and sister died in a bombing attack in his village located in
northern Syria about two years ago. He came to America as part
of a Christian mission rescue and was immediately put into
foster care. He lived with the foster family for a year and
managed to get a high school education but has had difficulties
with fitting in and adapting to the routine and lifestyle. He
made the decision of leaving his foster family and since then, he
has been staying in different shelters or sleeping in public
buildings, if not hitchhiking around the country.
When questioned, George confesses that he is depressed and has
not had an easy time adapting to the new American culture
introduced to him. He has had difficulty in making friends
because of his refugee status and country of origin, stating that
most of his peers view him as a threat because of the
stereotypical nature revolving around the Muslim religion and
terrorism. He claims that the teachers in his former school
would treat him differently from other children, a factor that
affected his academic performance. He has also not healed from
the deaths in his family, describing the event as horrific and
unfair. He blames himself for his family’s death, wishing there
is much he could have done to help them. George admits he
needs help but does not know where and how to get it.
Family of Origin
George lost his family in a bombing attack in his village in
Northern Syria. He describes the tragic event as horrific and
wishes that he could have done more to save his family. He
admits that at times he wishes that he died alongside his family;
he would not be going through the pain and difficulty that he is
under now. Syria is a warzone, and his family was the little
hope that he had of a future. He remembers how his father
would teach him metalwork, hoping that one day, after the war
49. Blurred process & org. boundaries
Collaboration and sharing
Situational applications
Mass participation and accessibility
Transient information
Supports social behavior
Innovation and creativity
Viral
Dynamic
Situational roles
Social governance and etiquette
Collective intelligence; bottom-up
innovation
Anywhere/anytime connectivity
Ad hoc applications and inquiries
Firewalls and structured processes
Intellectual property and privacy protection
Maintaining transactional applications and
operational integrity
Authentication and authorization
Creating a permanent record
Support business behavior
Efficient use of resources
Secure
Backup
Regulatory accountabilities
Organizational governance and policy
Top-down business strategy
Managed data environments
Controlled communication
Scalable applications
61. • Data integration
• Data quality
• Data administration
• Reports
• Dashboards
• Data mining
• Information – enhanced
processes
• Queries
• Graphics and
visualization
• Real-time analysis
• Historical, current, and
predictive analysis
• Information – enhanced
products and services
Data Information
Management
111. From:Holistic Risk Management (RM): A PortraitHolistic Risk
Management (RM): A Portrait (continued)Holistic Risk
Management (RM): A Portrait (continued)A Risk Management
FrameworkA Basic Risk Management Framework Includes:A
Basic Risk Management Framework: Risk
CategoryA Basic Risk Management Framework: Policies and
standardsA Basic Risk Management Framework:
Risk TypeA Basic Risk Management Framework: Risk
OwnershipA Basic Risk Management Framework:
Risk MitigationA Basic Risk Management Framework: �Risk
Reporting and MonitoringActions to Improve Risk Management
CapabilitiesActions to Improve Risk Management Capabilities
(continued)ConclusionInformation Management: The Nexus of
Business and ITInformation Delivery versus Information
Management (IM)Information Management DriversThe
Foundation for Creating Business ValueFramework for
Information ManagementStage One : Develop an IM
PolicyStage Two: Articulate Operational ComponentsStage
Three: Establish Information StewardshipStage Four: Build
Information StandardsStage Four: Build Information Standards
(continued)Issues in IMCulture and BehaviorCulture and
Behavior (continued)Information Risk ManagementElements of
an Information Security StrategyInformation
ValuePrivacyKnowledge ManagementThe Knowledge-Doing
GapGetting Started in IMElements of IM Operations (Appendix
A)IM Operations Strategy ElementsIM Operations People
ElementsIM Operations Process ElementsIM Operations
Technology and Architecture ElementsIM Operations Culture
and Behavior ElementsIM Operations Governance
ElementsConclusion
Lesson 3
1-1