SlideShare a Scribd company logo
1 of 79
CMGTCB/582 - Security and Ethics - Compt-1 Assessment 2
Information Security Memo
To: CEO Vampire Legends Organization
From: The acting CIO
Date: 21st April 2022
Subject: Information Security and Ethics
Role of the Memo
The memo provides a specific update of the critical analysis of
information security and its
components in the Vampire Legends case. The same
memorandum also updates on the ethical role
of Vampire Legends under the simulation aspect and how
ethics stimulate the organization's
success.
Part 1
Components of Information Security
The breakdown of the Budget is as follows:
In Million Dollars ($)
Category of
Expenses
Strategy A Strategy B Strategy C
Marketing 6 3 4
IT 1 3 2
DRM 2 2 2
Salary 1 2 2
Bill Glassen
good job on the budget
CMGTCB/582 - Security and Ethics - Compt-1 Assessment 3
Total 10 10 10
The components of security are essential factors in
ensuring the safety of data. The
categories are specific to each unique function. The
expense category has different parts. The
marketing campaign also interrelates with the Ancient Age of
the Vampires. The category of IT
expenses has a meaningful allocation to finance operations. The
Digital Rights Management and
Salary increases are the categories that focus on the
wellness of client and staff welfare,
respectively.
There are three allocation strategies. Strategy, A, B, and C. The
three strategies have a total
of 10 million dollars. Maximization of marketing is strategy A
($ 6 Million). The maximization is
at the expense of a low budget for IT expenses and
Salary Increases. The second strategy is
strategy B which maximizes the IT allocation ($ 3 million) with
the same distribution to marketing.
Digital Rights Management and Salary Increase also maintain a
constant $2 million each. The third
strategy is strategy C which maximizes the marketing allocation
and lies between strategies A and
B.
Choice of Suitable Strategy
The strategy of choice is strategy B. The strategy maximizes IT
at $3 million, which is part
of increasing security measures. The strategy allows the
use and purchase of sophisticated IT
equipment and addresses key security threats. It also distributes
the standard amount of the budget
to marketing ($3 million), which is essential to financing the
organization's marketing operations.
The other essential factor for choosing the strategy is the
need to reduce turnover rates in the
organization and simultaneously raise the salaries in the
organization. The other essence of
Bill Glassen
Nice job on the details of the reasoning
CMGTCB/582 - Security and Ethics - Compt-1 Assessment 4
choosing strategy B is the dynamic and the technological world
and, therefore, the need to address
the upcoming issues (Federal Trade Commission - Annual
Highligts 2020, 2021). It also addresses
the ethical issues due to the ability to avoid salary cuts
down and altering the welfare of the
organization's employees.
Choice of the Best Advertising Campaign
The available campaign strategies are as follows:
1. Testimonial from Robert Pattinson (Vampire from the
Twilight Saga)
2. Leaking information to bloggers about which celebrities are
playing.
3. Thirty-Day free trial.
The best option for the organization is the 3rd choice which is a
Thirty-Day free trial. The
option is the best as an incentive. It entails providing services
for thirty days and then afterward
billing and payment. It is part of increasing the sales in the
organization. The Thirty-Day free trial
also enables the customers to have the appropriate information
and terms of use and operations.
There is also a sense of security and assurance. The customers
can access the security protocols
and the other safety details. The hallmark of the best course of
action is to allow the customers to
make informed decisions regarding their choice of the products
without compromising on their
decisions.
The course of Action in Handling Information Security Threats.
The course of action addresses security issues like breeches,
hacking, mishaps, and others
that need to be addressed to safeguard the future.
Information security is essential for the
organization and the customer (Federal Trade Commission -
Annual Highligts 2020, 2021). The
following are the course of action in ensuring security for the
organization and the customer:
Bill Glassen
Good reasoning
CMGTCB/582 - Security and Ethics - Compt-1 Assessment 5
negative impacts that would
harm the organization's business operations.
and reporting protocols. The
employees need to report any suspicious activity.
-crime is in place. The
training is key to increasing the
organizational confidentiality of the operations.
res and details like biometrics and personal
identifications and specific
passwords among the employees.
Part 2
Role of Ethics in Vampire Legends Simulation Conflict
The Phishing Scam is the conflict in the scenario. A phishing
scam is an email that looks
real and legit from a company, specifically a bank. The email
prompts the person to log in to the
personal account to prevent access restrictions. It requested
the login details of the individual
intending to obtain the data. The scam aims to hack the
information of the clients. It also affects the
company a great deal. The scam also targeted celebrities,
intending to blackmail them and leak
personal information to the public.
Consequences of the Conflict
The conflict affects the organization a great deal and
affects operations. Phishing also
exposes the clients to the vulnerability of theft. Jama is the
specific phishing that obtained the
security information. It is also possible for phishing to
blackmail celebrities in the gaming arena
and expose personal details to the public, thus breaching
privacy. The conflict also affects the
customer's trust in the level of the security of the organization.
Bill Glassen
The conflict was the discussion on how to handle the breach
from within the company and whether to be transparent
regarding the disclosure of customer information or to keep it
secret.
CMGTCB/582 - Security and Ethics - Compt-1 Assessment 6
Solution
of the Conflict
t step was to notify the managerial members of the
breach in the security.
to the law requirements and
avoid unnecessary legal actions against the organization.
change credentials and login
details due to breach in the security
features and need to increase data security protection.
rather than hiding information. It
also promotes client and public satisfaction at large.
features and safety, specifically
encrypting information.
the phishing scam received
an extended free protection identity of 1 year.
The long-term measures include the following:
Improvement of the antivirus, use of
passwords in all the logins, spam and web filters installations to
prevent phishing data, update of
the systems to the latest versions of the security features,
encryption of sensitive information, and
education of the employees on data security specifically
phishing.
Impact of Ethics on Revenue
Ethics in the organization have a positive and negative impact
on revenue. Good ethics
maintains the commitment of the stakeholders and other
financial partners and also promotes the
customers' loyalty, therefore, ensuring a positive revenue path
(https://smallbusiness.chron.com,
2021). It is also part of the motivation to work for the
organization and achieve financial goals
promptly. Good identity from the ethical perspective also
ensures the satisfaction of all the
CMGTCB/582 - Security and Ethics - Compt-1 Assessment 7
financial parties, therefore improving the revenue trend. Poor
ethical aspects in an organization
drive to the negative side and undesired consequences. The
organization is likely to collapse due to
the inability to combine and interrelate well personal and
professional ethics. Lack of morals in the
organization is the cause of revenue loss. It is the role of the
organizational management to identify
the factor affecting the organization's performance and address
them promptly.
References
(2021). Federal Trade Commission - Annual Highligts 2020.
https://www.ftc.gov/reports/annual-highlights-
2020/enforcement.
https://smallbusiness.chron.com. (2021, Feb 16). Retrieved from
www.chron.com:
https://smallbusiness.chron.com/institutionalize-ethics-
corporation-49898.html
Bill Glassen
You did a good job on the majority of the assignment. You
need to think through the ethics of the disclosure of the breach
or the possible decision to hide it from the customers.
2
Intervention Model
Alexis Heard
Columbus State University
Program in Design Kinesiology
March 21, 2022
Dr. G. Palevo
Health Intervention Model
Mental health is one of the imperative modifiers of
concentration and performance among college students. Hence,
the use of a health intervention model will be essential in my
study as it will provide a blueprint to understand and address
the issue of mental health among students. It will also guide the
formulation and implementation of selected interventions
(Hagger et al., 2020). Therefore, this study will utilize the
Health Belief Model. The model will be customized and tailored
to be in congruence with the study population and the health
behavior in context.
The Health Belief Model will be used in my study as it provides
a modality to promote health and mitigate disease-causing
behaviors among populations. In addition, this theoretical model
will be most appropriate in defining the key factors influential
to behaviors affecting mental health in this study population
(Hagger et al., 2020). The model will assist in delineating the
key factors that affect mental health; such the individual
perceived susceptibility to suffering from a mental health issue,
perceived severity, perceived barriers to initiating action,
exposure to support systems that promote health, and self-
confidence in the ability to deal with a mental health issue and
not relapse.
In conclusion, the health belief model will be used to design
short-term and long-term interventions to promote mental
health. This will entail assessing the students at risk,
understanding the different risky behaviors associated with
mental health, and providing channels to communicate with the
students on the mechanisms to promote mental health (Zaidlin
et al., 2020). This model can also be used in combination with
other models. In so doing, the researcher will ensure the depth
and breadth of the study gets achieved.
References
Hagger, M., Cameron, L., Hamilton, K., Hankonen, N., &
Lintunen, T. (2020). The handbook of behavior change (1st ed.).
Cambridge University Press.
https://books.google.co.ke/books?id=IfEFEAAAQBAJ&printsec
=frontcover&dq=health+belief+model&hl=en&sa=X&ved=2ahU
KEwiEvvT88eb2AhUzi_0HHVc0CSIQ6AF6BAgDEAI
Zaidlin, G., Lisnyj, K., Dougherty, B., Cook, N., &
Papadopoulos, A. (2020). Utilizing the Health Belief Model to
move post-secondary students toward flourishing mental
health. The Journal of Positive Psychology, 1-10.
https://www.tandfonline.com/doi/abs/10.1080/17439760.2020.1
858331?casa_token=UNVy2ByL5XcAAAAA:_G8sXjtFe2dV9P6
NzetgP_t-rde-
pNooKUEg45FCJS2ZeNKxeNf5UsH6vfr1buYB9ejB7Gcd7ojZE
StDrQ
Theoretical Framework
Alexis Heard
Columbus State University
Program in Design Kinesiology
March 01, 2022
Dr. G. Palevo
Theoretical Framework
The mental health program for college students focuses on
promoting social-emotional learning and endurance, and also
preventing collective, psychological, and behavioral challenges,
such as risk behaviors. As a result, the theoretical framework
depicts college mental health as a single major topic, depending
on available information on psychological health promotion and
management. Social, emotional, and behavioral difficulties are
avoided.
The framework is further described in the following sections of
the study by addressing the primary domains in connection to
psychological health consequences and the various
developmental mechanisms. I also include a set of critical goal
abilities and behaviors for both students and teachers, as well as
a summary of the primary theoretical components addressed.
Interpersonal, emotional, and behavioral challenges refer to a
wide range of behaviors that college students can acquire to
varying levels, which can be internalizing or externalizing.
Depression, criminality, social disengagement, self-harm,
anxiety, drug usage, rule-breaking, and violent behavior are
commonly targeted in school programs to reduce emotional,
behavioral, and social difficulties.
The Theory of Planned Behavior can be used to forecast a
person's willingness to participate in a given behavior at a
particular moment and location. The hypothesis was designed to
describe all behaviors over which humans can exercise self
restraints (Ajzen & Schmidt, 2020). Behavioral intention is a
significant element of this paradigm; motives are impacted by
one's view about the probability that the conduct will produce
the anticipated result, as well as one's subjective assessment of
the dangers and advantages of that result.
The Theory of Planned Behavior has been effectively utilized to
forecast and describe a variety of mental health-related
behaviors and motives amongst students, such as smoking,
alcoholism, health-care utilization (Lipson et al., 2019), and
substance abuse, among many other things. According to the
Theory of Planned Behavior, behavioral success is determined
by both motive and potential. The ability to undertake the
behavior successfully is contingent not just on a positive
purpose, but also on a suitable level of behavioral control.
The Theory of Planned Behavior proposes that measuring one's
mindset regarding the conduct, subjective standards connected
with the behavior, and apparent influence over completing it
might anticipate one's motives to execute it (McKenzie et al.,
2009)The TPB emphasizes the need of using a multifaceted
strategy to understand what influences a person's purpose to
undertake a behavior. If a participant's desire to pursue
psychological assistance is swayed primarily by subjective
values that are hostile to PHS, a study's effort to persuade this
individual's motive to obtain psychological assistance might be
disappointed if behavior modification is the only target of
treatment.
Interventions can be used on a broad level, involving every
student, or at a more focused rate, with students who are at risk
of establishing or have already manifested, modest mental
health issues. Preventive measures that are available to
everyone are thought to be less alienating. Moreover, both
general and focused preventative programs exhibit equal impact
values, demonstrating that both general and specialized
preventive interventions are needed. Systematic studies of
general interventions in college students, specifically, found
that internalizing psychological health disorders like anxiety,
stress, and depression indicators were significantly reduced
(Lattie et al., 2019). Research on the efficacy of preventative
strategies for externalizing disorders has a lot in common.
Considerable reductions in specified behavioral difficulties
were found, with impacts extending for one year.
The students who took participated in a short cognitive
education session experienced significant reductions in anxiety
and tension. In a group of students who performed yoga, levels
of stress levels are less, and general mental well -being is
higher, as contrasted to a regulated group.
The goals of this study were to look at the psychological health
of college students to contribute to a better comprehension of
the term and to give a thorough theoretical framework for
psychological health management at colleges that consider
students' needs into account.
References
Ajzen, I., & Schmidt, P. (2020). Changing behavior using the
theory of planned behavior. The handbook of behavior change,
17-31.
Lattie, E. G., Adkins, E. C., Winquist, N., Stiles-Shields, C.,
Wafford, Q. E., & Graham, A. K. (2019). Digital mental health
interventions for depression, anxiety, and enhancement of
psychological well-being among college students: systematic
review. Journal of medical Internet research, 21(7), e12869.
Lipson, S. K., Lattie, E. G., & Eisenberg, D. (2019). Increased
rates of mental health service utilization by US college
students: 10-year population-level trends (2007–2017).
Psychiatric services, 70(1), 60-63.
McKenzie, J. F., Neiger, B. L., & Thackeray, R. (2009).
Planning, implementing, and evaluating health promotion
programs: A primer (p. 496). San Francisco, CA:
Pearson/Benjamin Cummings.
6
Mental Health in college students
Alexis Heard
Columbus State University
SP 22’ Program Design in Kinesiology
Dr. G. Palevo
February 17, 2022
Mental Health in College Students
Health status
Mental health issues encompass factors that affect cognitive,
emotional, and behavioral well-being. Any deviation of mental
health status from normal may lead to any of the following
mental disorders, schizophrenia, anxiety, depression, and
physical symptoms like fatigue, insomnia, back pain, and
headaches. Mental health problems have statistically proven to
be highly prevalent among college students. For example, in a
survey involving Australian students, higher levels of
psychological distress were noted. In another state-wise survey
by the American Psychological Association (APA), 95% of
college counseling centers directors reported alarming and
growing concerns over growing numbers of mental health issues
among college students (Auerbach et al., 2016). Anxiety is the
topping concern with a prevalence rate of 41.6%, followed by
depression at 36. 5%, other mental distresses concerns
relationships and accounts for 35.8%. These prevalence’s can be
attributed to a busy college schedule, financial issues, and lack
of balance between having fun and studying.
College lends itself a host to many new things: independence,
freedom, opportunity, and autonomy. The transition from high
school to college also takes a hefty toll on contributing to
deleterious health consequences to college students (Bruffaerts
et al., 2018). For instance, lack of engagement can be a sign of
depression, excessive worrying, increased dependence on a
substance such as excessive drinking to numb emotions, or a
changing relationship with food. In such cases, one no longer
pays attention to eating patterns and tends to avoid socializing
when there is food or exercise excessively. According to Lee et
al. (2022). mental health problems can affect students'
concentration, energy, mental ability, dependability, optimism
and hinder performance. Depression, for example, is associated
with low-grade point averages, truancy, and dropouts. In the
end, roommates, peers, staff, family members may end up
suffering consequences of poor relationships, poor work
productivity, and profound grief from suicides.
Community description
The program's scope is on college students across the state and
beyond. Global estimates of mental health problems suggest that
one in four people globally have experienced or will experience
mental health issues in their lifetime (Pedrelli et al., 2015). It is
the third leading cause of mortalities among young people.
Therefore, the program aims to assess the health needs of all
reachable college students locally, state-wise, and even
nationally.
Needs Assessment
Based on qualitative needs assessments done through focus
groups, projects, scenarios, case study reports, introspection,
visual texts, role-play simulation, and direct observations,
major health needs of the students were identified. The majorly
identified health needs include helping erase suicidal feelings
and thoughts, eating disorders, overactivity and poor
concentration, obsessive-compulsive disorder, low mood, and
depression.
Naturally, a human's body and mind are not separate; it is
therefore not surprising that mental health problems impact the
body. For example, depression can cause fatigue, headaches,
and digestive problems. The overall effects on the quality of life
range from a feeling of distress, lack of control, choice, and
autonomy, low confidence, diminished activity, and feeling of
hopelessness and demoralization (Sazakli et al.,2021).
Major identified causes of mental health problems among
college students include pressure to succeed in academics,
uncertainty, financial distress, and increased social media use.
Non-specific combat strategies needed in the schools includes
a) Promotion of healthy eating habits
b) Encouraging physical activity
c) Promotion of healthy sleeping habits
d) Social Media use sensitization campaigns to minimize
excessive social media use, inactivity, and visiting unauthorized
sites.
Quantitative assessments focus on numbers or quantities and
gather the information that yields results that can be quantified.
A report by Karyotak et al. (2020) showed that one-third of
students screened positive for at least a single in six mental
health illnesses. With a prevalence of 27% exhibited over 12
months, the study demonstrated a possible lifetime prevalence
of 28.7%. This calls for an array of measures, including the
following.
a) Once a month mental health seminar in college institutions in
California.
b) Employment of an adequate number of psychiatric mental
health practitioners across institutions to balance student:
psychiatrist ratio.
c) Install at least two support group meetings for students to
guide each other towards shared goal recovery.
d) Complementary and Alternative Medicine (CAM) - CAM
includes treatment practices typically not associated with
standard care.
e) Self-help plans- self-help plans are severely lacking among
college studies in the United States. They may, however, have a
hand in helping students implement strategies to promote
wellness recovery and identify warning signs.
Community link
The United States government currently offers various programs
and services to support people with mental health needs,
including students. They include income support, disability
services, community support, workforce participation programs,
and housing.
In hospitals, the current most common way of treating mental
health illnesses and challenges includes psychotherapy, also
called talk therapy and counseling (Auerbach et al., 2016).
The proposed program will come in a batch of complementary
programs to support existing programs in boosting mental health
issues among college students. Salient things the program will
include:
1) Enhancing counseling and psychotherapy through maximum
stakeholder engagement and online campaigns
2) Technology use in mental health programming-technology is
likely to address problems of minimal healthcare-seeking
behavior among college students. Through technology-based
diagnosis, and well-coordinated psychotherapeutic and
pharmacotherapeutics approaches, confidentiality will be
enhanced, fewer financial expenses will be incurred, and
accessibility will be enhanced since services will happen
through simple web-search.
3) Community support and awareness campaigns will also help
promote awareness, reduce discrimination and stigma,
supporting social inclusion and recovery while preventing
mental disorders.
References
Auerbach, R. P., Alonso, J., Axinn, W. G., Cuijpers, P., Ebert,
D. D., Green, J. G., ... & Bruffaerts, R. (2016). Mental disorders
among college students in the World Health Organization world
mental health surveys. Psychological medicine, 46(14), 2955-
2970.
Bruffaerts, R., Mortier, P., Kiekens, G., Auerbach, R. P.,
Cuijpers, P., Demyttenaere, K., &
Kessler, R. C. (2018). Mental health problems in first-year
college students: Prevalence and academic functioning. Journal
of affective disorders, 225, 97-103
Lee, S., Lim, J., Lee, S., Heo, Y., & Jung, D. (2022). Group-
tailored feedback on online mental health screening for
university students: using cluster analysis. BMC Primary
Care, 23(1), 1-14.
Pedrelli, P., Nyer, M., Yeung, A., Zulauf, C., & Wilens, T.
(2015). College students: mental health problems and treatment
considerations. Academic psychiatry, 39(5), 503-511.
Karyotaki, E., Cuijpers, P., Albor, Y., Alonso, J., Auerbach, R.
P., Bantjes, J., & Kessler, R. C.
(2020). Sources of stress and their associations with mental
disorders among college students: results of `the world health
organization world mental health surveys international college
student initiative. Frontiers in psychology, 1759.
Sazakli, E., Leotsinidis, M., Bakola, M., Kitsou, K. S.,
Katsifara, A., Konstantopoulou, A., & Jelastopulu, E. (2021).
Prevalence and associated factors of anxiety and depression in
students at a Greek university during COVID-19
lockdown. Journal of public health research, 10(3).
Chapter 12:
Implementation: Strategies and
Associated Concerns
© 2017 Pearson Education, Inc.
Chapter 12 Lecture
1
Logic Models – 1
A logic model is a systematic and visual way for planners to
share and present their understanding of the relationship among
the resources they have to operate a program, the activities they
plan to implement, and the outputs and outcomes they hope to
achieve (CDC, 2008b; WKKF, 2004).
Can help all stakeholders understand the “big picture” of how
planning, implementing, and evaluating all fit together
© 2017 Pearson Education, Inc.
Logic Models – 2
Three components of a logic model:
Inputs (resources)
Human resources, partnerships, equipment, supplies, materials,
and community resources
Outputs (activities)
Products, services, and infrastructure
Outcomes (results or effects)
Short-term, mid-term, and long-term
© 2017 Pearson Education, Inc.
Basic Logic Model
© 2017 Pearson Education, Inc.
Defining Implementation
“The act of converting planning, goals, and objectives into
action through administrative structure, management activities,
policies, procedures, and regulations, and organizational actions
of new programs” (Timmreck, 1997, p. 328)
One of the three stages of program diffusion, with the other two
being adoption and sustainability (Bartholomew et al., 2011)
© 2017 Pearson Education, Inc.
Phases of Program Implementation
Phases are flexible in nature and can be modified to meet the
many different situations and circumstances faced by planners.
Phases of implementation:
Adoption of the program
Identifying and prioritizing the tasks to be completed
Establishing a system of management
Putting the plans into action
Ending or sustaining a program
© 2017 Pearson Education, Inc.
Phase 1: Adoption of the Program
This phase is a part of the marketing process.
Great care must go into the marketing process to ensure that a
relevant product (i.e., the health promotion program) is planned
so that those in the priority population will want to participate
in it.
© 2017 Pearson Education, Inc.
Phase 2: Identifying and Prioritizing the Tasks to Be Completed
– 1
Many tasks need to be completed when implementing a
program.
Examples: reserving space, ordering equipment, etc.
Tasks need to be identified and prioritized.
Planning timetables and timelines can help with this process.
© 2017 Pearson Education, Inc.
Phase 2: Identifying and Prioritizing the Tasks to Be Completed
– 2
Types of timetables and timelines include:
Basic timelines
Task development timelines (TDTLs; Anspaugh, Dignan, &
Anspaugh, 2000)
Gantt charts
PERT charts
Critical path method (CPM)
© 2017 Pearson Education, Inc.
Sample Task Development Timeline
© 2017 Pearson Education, Inc.
Sample Gantt Chart
© 2017 Pearson Education, Inc.
Phase 3: Establishing a System of Management – 1
Management – “the process of assembling and using sets of
resources in a goal-directed manner to accomplish tasks in an
organizational setting” (Hitt, Black, & Porter, 2012, p. 483)
Includes human, financial, and technical resources
“The efficient, satisfactory management of a health promotion
program is vital to its long-term success” (Anspaugh et al.,
2000, p. 124).
© 2017 Pearson Education, Inc.
Phase 3: Establishing a System of Management – 2
Good management is needed to ensure that programs are
Effective: meet stated goals and objectives
Efficient: well-organized, cost effective
Managers need technical, interpersonal, and conceptual skills.
Human Resources Management (HRM)
Four functions (or PADS):
Planning – defining personnel
Acquisition – hiring personnel
Development – training personnel
Sanction – discipline, rewards, safety
Professional Development
© 2017 Pearson Education, Inc.
Phase 3: Establishing a System of Management – 3
Financial Management
“Process of developing and using system to ensure that funds
are spent for the purpose for which they have been
appropriated” (Klingner
et al., 2010, p. 88)
Accounting, fiscal year, fiscal accountability
Audits – internal and external
Technical Resources Management
All other resources besides human and financial
Equipment, expertise, information, material, partnerships
© 2017 Pearson Education, Inc.
Phase 4: Putting Plans into Action – 1
There are three major ways of putting plans into action: by
phasing them in, in small segments; and by initiating the total
program all at once.
The strategies exist in a hierarchy and it is recommended that
all programs go through all three.
Pilot testing – trying the program out with a small group from
the priority population to identify any problems
Phasing in – limiting the number of people who are exposed,
then gradually increasing the numbers; by offerings, by
location, by ability, by number
Total program – all in priority population are exposed at same
time
© 2017 Pearson Education, Inc.
Putting Plans into Action
© 2017 Pearson Education, Inc.
Phase 4: Putting Plans into Action – 2
First Day of Implementation
Also referred to as program launch, program rollout, or program
kickoff
Some special planning may be necessary:
Decide on a first day.
Consider launching to coincide with other already occurring
event (e.g., weight loss program and New Year’s resolution).
© 2017 Pearson Education, Inc.
Phase 4: Putting Plans into Action – 3
Some special planning may be necessary (cont’d)
Kickoff in style.
Create a special event; use celebrities.
Seek news coverage, if appropriate.
Inform appropriate media representatives of your plans.
Make arrangements to meet the media representatives at the
designated time and place.
Use press releases, video releases, spokespeople.
Consider a news hook; e.g., day in history.
© 2017 Pearson Education, Inc.
Phase 4: Putting Plans into Action – 4
Monitoring Implementation
Program monitoring involves the ongoing collection and
analysis of data and other information to determine if the
program is operating as planned.
Basic monitoring data and information for a program has the
following utilities (USDJ, n.d.):
It provides operating and descriptive data and information.
It provides the basic information for comparing outcomes to the
program objectives.
It provides educational information about many aspects of the
program.
Monitoring data serve as a preventive maintenance function by
tracking indicators of critical elements.
© 2017 Pearson Education, Inc.
Phase 5: Ending or Sustaining a Program
Planners should determine how long to run a program.
If the program met its goals and objectives and the priori ty
population has been served to the fullest extent necessary, then
the program can be ended.
Sustaining a program is more difficult. Six techniques include:
Working to institutionalize
Seeking feedback
Advocating for the program
Partnering with others
Revisiting and revising the rationale
Establishing a resource development committee
© 2017 Pearson Education, Inc.
Implementation of Evidence-Based Interventions
The focus of implementation science is to study how
interventions, which have been shown to be effective in one
setting, can be applied to sustain improvements to population
health (Lobb & Colditz, 2013).
Tomioka and Braun (2013) created a four-step fidelity assurance
protocol:
Deconstruct the program into its components.
Identify agencies that are ready to replicate the intervention.
Closely monitor the fidelity of the program.
Use the evaluation tools of the program to track progress.
© 2017 Pearson Education, Inc.
Concerns Associated with
Implementation – 1
Safety and Medical Concerns
Most programs are designed to improve health; thus give
attention to the safety and medical concerns associated with the
program.
Informed consent
Explain nature of program.
Inform participants of risks or dangers and any possible
discomfort.
Explain expected benefits.
Inform of alternative programs.
Indicate that they are free to discontinue participation at any
time.
Allow participants to ask questions.
Informed consent forms (waiver of liability or release of
liability) do not protect planners from being sued.
They just make participants aware of special concerns.
© 2017 Pearson Education, Inc.
Example Informed Consent Form
© 2017 Pearson Education, Inc.
Concerns Associated with
Implementation – 2
Safety and Medical Concerns (cont’d)
If the act of participating in the program puts anyone at medical
risk (e.g., cardiovascular exercise programs), then these
individuals need to obtain medical clearance before
participating.
Medical clearance signed by a physician
Steps must be taken to ensure the safety and health of all
associated with the program:
Safe program location; appropriate security
Building codes met and facilities free from any hazards
Qualified instructors
Plan in case of emergency
© 2017 Pearson Education, Inc.
Checklist of Items to Consider When Developing an Emergency
Care Plan
© 2017 Pearson Education, Inc.
Concerns Associated with
Implementation – 3
Ethical Issues
Situations where competing values are at play and judgment
must be made on what is the most appropriate course of action
Code of Ethics for the Health Education Profession guides the
work of health educators.
Planners should have integrity, and be honest, loyal, and
accountable.
The Belmont Report: Ethical Principles and Guidelines for the
Protection of Human Subject Research has three fundamental
ethical principles:
Respect for persons
Beneficence – maximizing benefits; doing good
Justice – fairness
© 2017 Pearson Education, Inc.
Concerns Associated with
Implementation – 4
Legal Concerns
Negligence – failing to act in a prudent (reasonable) manner.
Arises from two acts:
Omission – doing nothing when you should
Commission – doing something you should not
© 2017 Pearson Education, Inc.
Concerns Associated with
Implementation – 5
Reducing the Risk of Liability – key to avoiding liability is to
reduce risk by planning ahead
Be aware of legal liabilities.
Be aware of professional standards.
Keep knowledge and skills up-to-date.
Use certified instructors.
Use good judgment.
Require informed consent.
Get medical clearance.
Limit work to expertise.
Provide a safe environment.
Purchase insurance.
© 2017 Pearson Education, Inc.
Concerns Associated with
Implementation – 6
Program Registration and Fee Collection
Establish payment procedures and a system of payment
Procedures for Recordkeeping
HIPAA
Records should be kept, but ensure anonymity/confidentiality
© 2017 Pearson Education, Inc.
Concerns Associated with
Implementation – 7
Procedural Manual and/or Participants’ Manual
There may be a need to create a manual for the program to:
Ensure that everyone understands the program and its
parameters
Standardize the intervention so it can be replicated and avoid
Type III errors
Provide ideas for facilitation
Provide additional background information on the topic
Provide citations for additional resources.
Program Participants with Disabilities
Programs should meet the needs of participants with
disabilities.
© 2017 Pearson Education, Inc.
Concerns Associated with
Implementation – 8
Training for Facilitators
Program facilitators need to be familiar with the intervention.
Either by participating in the planning of the intervention or
through a training session
Dealing with Problems
Planners should anticipate and deal with problems that might
arise.
Documenting and Reporting
Keep others informed about the progress of the program for:
accountability
public relations
motivation of present participants
© 2017 Pearson Education, Inc.
Chapter 13:
Evaluation:
An Overview
© 2017 Pearson Education, Inc.
Chapter 13 Lecture
1
Background Information on Evaluation
Adequate and appropriate evaluation is necessary for any
program regardless of size, nature, and duration.
Two critical purposes of program evaluation are
Assessing and improving quality
Determining program effectiveness
Conducting evaluation and research is a major area of
responsibility for health education specialists.
© 2017 Pearson Education, Inc.
Basic Terminology – 1
Evaluation
The process of determining the value or worth of a health
promotion program or any of its components based on
predetermined criteria or standards of acceptability identified
by stakeholders
© 2017 Pearson Education, Inc.
Basic Terminology – 2
Formative Evaluation
Purpose is to improve the overall quality of a program or any of
its components before it is too late (i.e., the program concludes)
Attempts to enhance program components before and during
implementation
Process Evaluation
Assesses the implementation process in general, and tracks and
measures what went well and what went poorly and how these
factors contributed to the success or failure of a particular
program
Measures the degree to which the program was successfully
implemented and generally applies lessons learned in
subsequent versions or implementations of the program
Formative and process evaluations are often used
interchangeably and have become somewhat synonymous.
© 2017 Pearson Education, Inc.
Basic Terminology – 3
Summative Evaluation
Purpose is to assess the effectiveness of the intervention and the
extent to which awareness, attitudes, knowledge, behavior, the
environment, or health status changed as a result of a particular
program
An umbrella term
Impact Evaluation
Focuses on intermediary measures such as behavior change or
changes in attitudes, knowledge, and awareness
Outcome Evaluation
Measures the degree to which end points such as diseases or
injuries actually decreased
Impact and outcome evaluations together constitute summative
evaluation.
© 2017 Pearson Education, Inc.
Comparison of Evaluation Terms
© 2017 Pearson Education, Inc.
Start of
Implementation
Process
Impact
Outcome
Formative
Summative
Planning
End of
Implementation
Purpose of Evaluation
To determine achievement of objectives related to improved
health status
To improve program implementation
To provide accountability to funders, the community, and other
stakeholders
To increase community support for initiatives
To contribute to the scientific base for community public health
interventions
To inform policy decisions
© 2017 Pearson Education, Inc.
(Capwell et al., 2000)
Framework for Program Evaluation – 1
© 2017 Pearson Education, Inc.
Framework for Program Evaluation – 2
Step 1 – Engaging Stakeholders
Who are the stakeholders?
Those involved in program operations
Those served or affected (directly or indirectly) by the program
Primary users of the evaluation results
The scope and level of stakeholder involvement will vary with
each program being evaluated.
Step 2 – Describing the Program
Sets the frame of reference for all subsequent decisions in the
evaluation process
Describes mission, goals, objectives, capacity to affect change,
stage of development, and how it fits into the larger community
Logic model can be used
© 2017 Pearson Education, Inc.
Framework for Program Evaluation – 3
Step 3 – Focusing the Evaluation Design
Makes sure the interests of stakeholders are addressed
Identifies reason of evaluation, how it will be used, questions to
be asked, design of evaluation, and finalizes any agreements
about the process
Step 4 – Gathering Credible Evidence
Decides on measurement indicators, sources of evidence,
quality and quantity of evidence, and logistics for collecting
evidence
Organizes data including specific processes related to coding,
filing, and cleaning
© 2017 Pearson Education, Inc.
Framework for Program Evaluation – 4
Step 5 – Justifying Conclusions
Comparing the evidence against the standards of acceptability
Judging the worth, merit, or significance of the program
Creating recommendations for actions based on results
Step 6 – Ensuring Use and Sharing Lessons Learned
Use and dissemination of the results
Needs of each group of stakeholders addressed
Four standards of evaluation:
Utility standards
Feasibility standards
Propriety standards
Accuracy standards
© 2017 Pearson Education, Inc.
Practical Problems or Barriers in
Evaluation – 1
Planners either fail to build evaluation in the planning process
or do so too late.
Adequate resources may not be available to conduct an
appropriate evaluation.
Organizational restrictions may prevent hiring consultants and
contractors.
Effects are often hard to detect because changes are sometimes
small, come slowly, or do not last.
Length of time allotted for the program and its evaluation is not
realistic.
Restrictions may limit the collection of data among the priority
population.
© 2017 Pearson Education, Inc.
Practical Problems or Barriers in
Evaluation – 2
It is difficult to make an association between cause and effect.
It is difficult to evaluate multi-strategy interventions.
Discrepancies between professional standards and actual
practice exist with regard to appropriate evaluation design.
Evaluators’ motives to demonstrate success introduce bias.
Stakeholders’ perceptions of the evaluation’s value may vary
too drastically.
Intervention strategies are sometimes not delivered as intended
or are not culturally specific.
© 2017 Pearson Education, Inc.
Evaluation in the Program Planning Stages
Evaluation design must reflect the goals and objectives of the
program.
The evaluation must be planned in the early stages of
development and be in place before program begins.
Baseline data – those reflecting the initial status or interests of
the participants; from a needs assessment
Initial data regarding the program should be analyzed promptly
to make any necessary adjustments to the program.
By creating the summative evaluation early in the planning
process, planners can ensure that the results are less biased.
© 2017 Pearson Education, Inc.
Ethical Considerations
Evaluation or research should never cause mental, emotional, or
physical harm to those in the priority population.
Participants should always be informed of the purpose and
potential risks and should give consent.
No individual should ever have his or her personal information
revealed in any setting or circumstance.
When appropriate, evaluation plans should be approved by
institutional review boards (IRBs).
© 2017 Pearson Education, Inc.
Who Will Conduct the Evaluation? – 1
Internal Evaluation
An individual trained in evaluation and personally involved
with the program conducts the evaluation.
Advantages
More familiar with organization and program history
Knows decision-making style of those in the organization
Present to remind people of results now and in the future
Able to communicate results more frequently and clearly
Less expensive
Disadvantages
Possibility of evaluator bias or conflict of interest
© 2017 Pearson Education, Inc.
Who Will Conduct the Evaluation? – 2
External Evaluation
Conducted by someone who is not connected with the program
(Evaluation consultant)
Advantages
More objective review and fresh perspective
Can ensure unbiased evaluation outcome
Brings global knowledge of working in a variety of settings
Typically brings more breadth and depth of technical expertise
Disadvantages
More expensive
Can be somewhat isolated, often lacking knowledge of and
experience with the program
Evaluator should be credible and objective, have a clear role in
evaluation design, and accurately report findings.
© 2017 Pearson Education, Inc.
Evaluation Results
Who will receive the results of the evaluation?
Different aspects of the evaluation can be stressed, depending
on the group’s particular needs and interests.
Different stakeholders may want different questions answered.
The planning for the evaluation should include a determination
of how the results will be used.
© 2017 Pearson Education, Inc.
Transcript: Vampire Legends – A Role-Playing Simulation on
Ethics, Privacy, and Security in the Multiplayer Online Game
Business by Patricia Wallace
In this role-playing simulation you will be working on certain
aspects of the sequel to the game Vampire Legends which is
Ancient Age. You will be the acting CIO and will specifically
work on the strategy and the budget.
The simulation will require you to give a breakdown of the
budget report, choose an allocation strategy based on the risks
and expenses involved, choose the best advertising campaign,
analyze threats related to information security, and decide the
course of action in handling threats to information
security.Interaction 1
On logging into the application, the following tools are
displayed on a laptop screen: E-Mail, Voicemail, Documents,
Web Meeting, and Video Phone.
The icons of E-Mail, Voicemail, and Documents are
highlighted, indicating there are new mails, messages, and
documents.
Email:
Once the learner clicks on the email icon a screen containing
the following information appears: From, Subject, Received. To
the left, is the Mail Folders which has Inbox, Draft, Sent, and
Trash listed one below the other. The inbox option is
highlighted.
There are three new mails.
The first mail is from Shelby, CEO Digital Artists, with the
subject ‘Strategy Session’. The mail is addressed to Dale, Jama
and the Learner. He updates on the replacement of the learner
instead of Jama whose down with flu. He instructs the members
to take the poll which, can be found in the Docs folder to see
which kind of campaign they will prefer. Information on the
budget and the success of their previous game is also given.
He mentions that the team will be invited to the web meeting
through IM once the poll is completed.
The second mail is from Stella, VP Finance, with the subject
‘Cost Estimates’, addressing the Learner and Jama. She briefs
on the budget and the expense estimates.
The third mail is from Dale, VP Marketing, with the subject
‘Marketing’ briefing on the budget for the marketing campaign
and emphasizing the importance of the campaign.
When clicked on the close button the learner is taken to the
Home screen.
Voicemail:
The voice mail is from Jama, plays when clicked on the play
button. A picture of Jama is at the left corner of the screen. He
advises the learner about the implementation of information
security- the need of a better firewall. Also, information on
login credentials for the D&L bank which can be found in the
Documents folder, is given.
Documents:
There are four new documents in the Documents folder.
The first document titled ‘Digital Artists Organizational Chart’
contains a chart with the hierarchy of the members in the
organization.
The second document titled ‘Risk Matrix (from Jama)’ contains
a table showing a draft of the various risks and their impact.
The third document titled ‘Budget and Advertising Campaign
Poll’ contains two polls, one for identifying the best allocation
strategy and the other to identify the best campaign approach.
There are three options in each of the question. Only when, both
the options are chosen, the submit button appears. When the
learner clicks on the submit button it goes back to the
documents folder.
The fourth document titled ‘Confidential Login Information
(from Jama) contains the login ID: and password for the user.
There is a print button and close button when the document is
open, in all the documents.
Instant Message:
Shelby invites the team members to the meeting as most of them
are not in agreement with options in the poll.
Web Meeting:
The web meeting window shows the video of Shelby,
participating in the meeting to the left of the screen. The names
of the members present in the meeting is listed below the video.
The main screen shows the result of the poll for the questions.
The team discuss based on the results, to come to a conclusion.
A celebrity testimonial is chosen for the marketing campaign.
2 months later:
The following words appear on screen ‘2 Months Later’ in big
block letters.Interaction 2
Email:
There are four new mails.
The first mail is from Shelby, with the subject
‘Congratulations!’ he congratulates the team on the high-
demand of the new game Ancient ages and how the IT has
handled the traffic wonderfully. He commends Dale’s efforts in
the marketing campaign. He further congratulates the learner on
being promoted as the CIO. He also brings into notice Jama’s
concerns on Information privacy which will be investigated in a
few months’ time.
The second mail is from the D&L bank with the subject ‘Your
D&L Bank Account’. The mail is to confirm the identity of the
user and remove their account limitation. It contains a link that
reads ‘Click Here’, when clicked on goes to the login page of
D&L Bank. There are two text boxes: one for the login and the
other for the password.
The learner has to go back to the documents folder, to get the
login credentials that Jama had sent earlier. When the login
credentials are typed in, the submit button appears. On clicking
the submit button, the message ‘Thank you for confirming your
login information. We appreciate your business.’ appears at the
bottom of the screen. The learner closes the screen by clicking
on the close button at the top right corner of the screen which
goes back to the mail.
The third mail is from Stella with the subject ‘Message from
Customer’. It contains a mail from Devon Turnbull, governor’s
son that has a snippet of what was posted on Gamer’s blog
about him. Mr. Devon sounds enraged by how his information is
leaked on the internet. He questions the ethics of the company.
He also mentions that he’ll be contacting his attorneys.
The fourth mail is a reply from Shelby to Stella’s mail
questioning, how the security breach happened.
Voicemail:
There is one new voice message from Lonnie demanding the
learner to come to the meeting, because of the serious mail from
Stella.
Instant message:
Shelby questions the learner and Lonnie asking what’s
happening. Lonnie responds saying, someone has broken into
the system to steal the information of about a million of the
customers. He also mentions that the details will be put up in
the documents folder. The team discuss further, to discover that
the details of the customers haven’t been encrypted. Stella
volunteers to layout the issues in the Docs folder. Shelby
suggests everyone to review the issues and then meet.
Documents:
There are two new documents added to the documents folder.
One titled ‘Summary of the attack (from the learner and
Lonnie), contains the details of the security attack and the effort
in finding the offender. As of now, the person with the twitter
handle ’DragonFly’ is presumed to be the main suspect.
The other document titled ‘To Crisis Management Team: Break-
In Issues (from Stella)’ contains ten statements with ‘Agree’
and ‘Disagree’ option to each of the statement. The learner has
to choose either if he/she agrees or disagrees to the given ten
statements. Once the options for all the ten statements are
chosen, a ‘Submit’ button appears. Clicking on it takes the
learner back to the documents folder.
There is a print button and close button when the document is
open, in both documents.
Interaction 3:
Instant Message:
Once the poll in the documents folder is completed, Shelby
invites everyone for a web meeting through Instant message.
Web Meeting:
The results of the poll is displayed in the middle of the screen.
While the video of Shelby speaking appears on the left and the
names of the members participating in the web meeting is listed
below.
During the meeting, going-forward the action that has to be
taken, and its consequences is discussed.
Shelby decides to come clean with the customers and the board
members, by revealing what has happened to their personal
information, although Dale and Vontae think otherwise. Shelby
decides to take the games down until the encryption project is
completed. They also decide to have a press release on what has
happened to inform the public. Thus, the meeting comes to an
end.
1 months later:
The following words appear on screen ‘1 Month Later’ in big
block letters.
Interaction 4:
The following tools are displayed on a laptop screen: E-mail,
Voicemail, Documents, Web Meeting, and Video Phone.
The E-mail icon is highlighted indicating, there are new mails.
There are two new mails. One from Shelby with the subject
‘Good News’ and the other from Stella-her reply to Shelby’s
mail.
In Shelby’s mail, he breaks the news about the person who’s
behind the security breach. Turns out that Dale is the one who
broke in and downloaded the records. He is also the one who
made the post on the Governor’s son on the Gamer’s blog.
Currently he’s been put on administrative leave, until the whole
situation is sorted out and Vontae has taken over as the Acting
VP.
The mail from Shelby has more good news. She informs the
team that since the games were back up with better security
within a week, not many customers have been lost. The strategy
to take full responsibility of the situation and make amends to
the players has earned a lot of praise. The customers are
pouring in, this in turn has increased the revenue.
When clicked on the close button the learner is taken to the
Home Screen.
End of simulation exercise
(
Feedback
on
Your
Choices
in
Vampire
Legends:
A
Role-Playing
Simulation
on
Ethics,
Privacy,
and
Security
in the Multiplayer Online Game Business
)
Name:
1. Budget Allocation Poll
Points: 5 out of 5
Select the allocation strategy you prefer and click submit.
Allocations, in millions
Expense Category
Strategy A
Strategy B
Strategy C
1. Marketing Campaign, Ancient Age of Vampires
$6
$3
$4
2. IT Expenses
$1
$3
$2
3. Digital Rights Management (DRM)
$2
$2
$2
4. Salary Increases
$1
$2
$2
Total
$10
$10
$10
ABC
Choose an allocation strategy:
You chose Strategy B.
Strategy A maximizes funds spent on marketing at the expense
of IT and salaries. Strategy B maximizes funds spent or IT and
salaries, making it possible to implement improved security
measures, and also raise salaries to reduce turnover. Strategy C
is a compromise between those two approaches. Strategy B is
the best choice from the standpoint of security and ethics, and
earns the highest number of points for this simulation.
Companies have a responsibility to protect their customer's
data. Strategy A ignores the problems, and earns 0 points.
Strategy C earns partial credit.
2. Advertising Allocation Poll
Points: 5 out of 5
Select the advertising campaign approach you think is best:
1. Testimonial from Robert Pattinson (vampire from The
Twilight Saga)
2. Leaking information to bloggers about which celebrities are
playing
3. 30 day free trial
You chose 3, which is an excellent choice. It was also a good
decision on your part to NOT choose #2, which would violate
your customers' privacy.
3. Phishing Scam
Points: 0 out of 5
The email that appeared to come from D&L Bank was a
simulated phishing scam. The link provided in such emails often
takes the victim to a fraudulent website that appears legitimate,
so that the criminals can obtain the victim's login credentials or
other personal information.
You entered the login information that Jama provided, thereby
giving away your account information to the criminals.
4. Break-In Issues
Points: 20 out of 20
Your point totals are shown below. Organizations must respond
quickly to a large data breach like this one, informing all the
affected people, the company's stakeholders, and the police.
Because information like this goes viral on social media, it is
not feasible to try to contain it. Instead, company executives
should take full responsibility for the breach, assure customers
that they have taken measures to protect the data going forward,
and that they will do what is needed to make amends.
Your Choice
Correct Choice
Points Earned
1. Inform customers that their data has been breached.
Agree
Agree
2
2. Inform the Board of Directors about the break-in.
Agree
Agree
2
3. Delay letting customers know until we know who hacked in.
Disagree
Disagree
2
4. Prompt customers to change their passwords.
Agree
Agree
2
5. Do not alert the police because it may be an inside job.
Disagree
Disagree
2
6. Issue a press release about the break in now.
Agree
Agree
2
7. Report break in to the police immediately.
Agree
Agree
2
8. Take the games down until the encryption project is done.
Agree
Agree
2
9. Offer affected customers 1 year free identity protection.
Agree
Agree
2
10. Don't do anything until we know who DragonFly is.
Disagree
Disagree
2
Total Points for Scored Choices
You received 30 out of 35 points, or 86%.
Discussion Questions
1. Describe the main ethical and security issues that the Digital
Artists executive team confronted.
(
Responsible decision-making, accountability
)
2. During the budget discussion, what arguments would you
have used to persuade the team that more funding is needed for
information security?
(
Responsible
decision-making:
Executive
team
agreed
to
come
clean
with
the
customers
and
the
board
members by
revealing
about
the
truth.
Accountability:
Executive
team
decided
to
take
the
games
down
until
the
encryption project is completed. Though it effect the incoming
revenue.
)
3. Why is it important for a company to inform their customers
when a data breach such as this occurs? What risks does the
company assume if the leadership decides not to disclose the
information?
(
Privacy
and
confidentiality
of
customer
data
are
very
important
for
any
organization.
In
my
opinion
the
board
took all
the
decisions
that
balances
the
natural
laws
and
rights
as
well
as
utilitarian
ethics.
)
4. If you were constructing a risk matrix for yourself as a
student, which would be your top three vulnerabilities and why?
(
It is important to inform the customers whenever the data
breach happens. When the Sony PS data breach happened
in
the
year
2011,
the
company
delayed
one
week
to
inform
everyone
about
the
breach
and
it
turned
out as a costly mistake for Sony. If the leadership decides not to
disclose the information, it is not the right move as per
many
laws.
More
than
the
law,
the
organization
will
lose
the
credibility
among
customers
and
it
will
give
more time to the intruder
s to misuse the information they have
stolen.
)

More Related Content

Similar to CMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf

Problem And Purpose Of A Project
Problem And Purpose Of A ProjectProblem And Purpose Of A Project
Problem And Purpose Of A ProjectChristina Valadez
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementWilliam McBorrough
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016CBIZ, Inc.
 
Value proposition of analytics in P&C insurance
Value proposition of analytics in P&C insuranceValue proposition of analytics in P&C insurance
Value proposition of analytics in P&C insuranceGregg Barrett
 
Information AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxInformation AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxjaggernaoma
 
2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot SpotsRon Steinkamp
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docxaryan532920
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 

Similar to CMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf (15)

Problem And Purpose Of A Project
Problem And Purpose Of A ProjectProblem And Purpose Of A Project
Problem And Purpose Of A Project
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
MCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability StatementMCGlobalTech Commercial Cybersecurity Capability Statement
MCGlobalTech Commercial Cybersecurity Capability Statement
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016
 
Value proposition of analytics in P&C insurance
Value proposition of analytics in P&C insuranceValue proposition of analytics in P&C insurance
Value proposition of analytics in P&C insurance
 
Information AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxInformation AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docx
 
2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots2015 Tackling This Year's Audit Hot Spots
2015 Tackling This Year's Audit Hot Spots
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
arcsight_scmag_hcspecial
arcsight_scmag_hcspecialarcsight_scmag_hcspecial
arcsight_scmag_hcspecial
 

More from WilheminaRossi174

Senior Seminar in Business Administration BUS 499Coope.docx
Senior Seminar in Business Administration BUS 499Coope.docxSenior Seminar in Business Administration BUS 499Coope.docx
Senior Seminar in Business Administration BUS 499Coope.docxWilheminaRossi174
 
Select two countries that have been or currently are in confli.docx
Select two countries that have been or currently are in confli.docxSelect two countries that have been or currently are in confli.docx
Select two countries that have been or currently are in confli.docxWilheminaRossi174
 
Serial KillersFor this assignment you will review a serial kille.docx
Serial KillersFor this assignment you will review a serial kille.docxSerial KillersFor this assignment you will review a serial kille.docx
Serial KillersFor this assignment you will review a serial kille.docxWilheminaRossi174
 
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docx
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docxSESSION 1Michael Delarosa, Department ManagerWhat sugg.docx
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docxWilheminaRossi174
 
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docx
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docxSheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docx
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docxWilheminaRossi174
 
Selecting & Implementing Interventions – Assignment #4.docx
Selecting & Implementing Interventions – Assignment #4.docxSelecting & Implementing Interventions – Assignment #4.docx
Selecting & Implementing Interventions – Assignment #4.docxWilheminaRossi174
 
Seediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docxSeediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docxWilheminaRossi174
 
Shared Reading FrameworkFollow this framework when viewing the v.docx
Shared Reading FrameworkFollow this framework when viewing the v.docxShared Reading FrameworkFollow this framework when viewing the v.docx
Shared Reading FrameworkFollow this framework when viewing the v.docxWilheminaRossi174
 
Self-disclosureDepth of reflectionResponse demonstrates an in.docx
Self-disclosureDepth of reflectionResponse demonstrates an in.docxSelf-disclosureDepth of reflectionResponse demonstrates an in.docx
Self-disclosureDepth of reflectionResponse demonstrates an in.docxWilheminaRossi174
 
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docx
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docxSheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docx
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docxWilheminaRossi174
 
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docx
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docxSeemingly riding on the coattails of SARS-CoV-2, the alarming sp.docx
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docxWilheminaRossi174
 
See the attachment of 1 Article belowPlease answer all the que.docx
See the attachment of 1 Article belowPlease answer all the que.docxSee the attachment of 1 Article belowPlease answer all the que.docx
See the attachment of 1 Article belowPlease answer all the que.docxWilheminaRossi174
 
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docx
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docxSHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docx
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docxWilheminaRossi174
 
Select a healthcare legislature of interest. Discuss the historica.docx
Select a healthcare legislature of interest. Discuss the historica.docxSelect a healthcare legislature of interest. Discuss the historica.docx
Select a healthcare legislature of interest. Discuss the historica.docxWilheminaRossi174
 
See discussions, stats, and author profiles for this publicati.docx
See discussions, stats, and author profiles for this publicati.docxSee discussions, stats, and author profiles for this publicati.docx
See discussions, stats, and author profiles for this publicati.docxWilheminaRossi174
 
Segmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docxSegmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docxWilheminaRossi174
 
Select a local, state, or national public policy that is relev.docx
Select a local, state, or national public policy that is relev.docxSelect a local, state, or national public policy that is relev.docx
Select a local, state, or national public policy that is relev.docxWilheminaRossi174
 
School of Community and Environmental HealthMPH Program .docx
School of Community and Environmental HealthMPH Program .docxSchool of Community and Environmental HealthMPH Program .docx
School of Community and Environmental HealthMPH Program .docxWilheminaRossi174
 
School Effects on Psychological Outcomes During Adolescence.docx
School Effects on Psychological Outcomes During Adolescence.docxSchool Effects on Psychological Outcomes During Adolescence.docx
School Effects on Psychological Outcomes During Adolescence.docxWilheminaRossi174
 
Search the gene belonging to the accession id you selected in week 2.docx
Search the gene belonging to the accession id you selected in week 2.docxSearch the gene belonging to the accession id you selected in week 2.docx
Search the gene belonging to the accession id you selected in week 2.docxWilheminaRossi174
 

More from WilheminaRossi174 (20)

Senior Seminar in Business Administration BUS 499Coope.docx
Senior Seminar in Business Administration BUS 499Coope.docxSenior Seminar in Business Administration BUS 499Coope.docx
Senior Seminar in Business Administration BUS 499Coope.docx
 
Select two countries that have been or currently are in confli.docx
Select two countries that have been or currently are in confli.docxSelect two countries that have been or currently are in confli.docx
Select two countries that have been or currently are in confli.docx
 
Serial KillersFor this assignment you will review a serial kille.docx
Serial KillersFor this assignment you will review a serial kille.docxSerial KillersFor this assignment you will review a serial kille.docx
Serial KillersFor this assignment you will review a serial kille.docx
 
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docx
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docxSESSION 1Michael Delarosa, Department ManagerWhat sugg.docx
SESSION 1Michael Delarosa, Department ManagerWhat sugg.docx
 
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docx
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docxSheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docx
Sheet11a & 1b.RESDETAILRes NumCheck InCheck OutCust IDCustFNameCus.docx
 
Selecting & Implementing Interventions – Assignment #4.docx
Selecting & Implementing Interventions – Assignment #4.docxSelecting & Implementing Interventions – Assignment #4.docx
Selecting & Implementing Interventions – Assignment #4.docx
 
Seediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docxSeediscussions,stats,andauthorprofilesforthispublicati.docx
Seediscussions,stats,andauthorprofilesforthispublicati.docx
 
Shared Reading FrameworkFollow this framework when viewing the v.docx
Shared Reading FrameworkFollow this framework when viewing the v.docxShared Reading FrameworkFollow this framework when viewing the v.docx
Shared Reading FrameworkFollow this framework when viewing the v.docx
 
Self-disclosureDepth of reflectionResponse demonstrates an in.docx
Self-disclosureDepth of reflectionResponse demonstrates an in.docxSelf-disclosureDepth of reflectionResponse demonstrates an in.docx
Self-disclosureDepth of reflectionResponse demonstrates an in.docx
 
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docx
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docxSheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docx
Sheet1Excel for Finance Majorsweek 1week 2week 3week 4week 5week 6.docx
 
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docx
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docxSeemingly riding on the coattails of SARS-CoV-2, the alarming sp.docx
Seemingly riding on the coattails of SARS-CoV-2, the alarming sp.docx
 
See the attachment of 1 Article belowPlease answer all the que.docx
See the attachment of 1 Article belowPlease answer all the que.docxSee the attachment of 1 Article belowPlease answer all the que.docx
See the attachment of 1 Article belowPlease answer all the que.docx
 
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docx
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docxSHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docx
SHAPING SCHOOL CULTURE BY LIVING THE VISION AND MISSIONNameI.docx
 
Select a healthcare legislature of interest. Discuss the historica.docx
Select a healthcare legislature of interest. Discuss the historica.docxSelect a healthcare legislature of interest. Discuss the historica.docx
Select a healthcare legislature of interest. Discuss the historica.docx
 
See discussions, stats, and author profiles for this publicati.docx
See discussions, stats, and author profiles for this publicati.docxSee discussions, stats, and author profiles for this publicati.docx
See discussions, stats, and author profiles for this publicati.docx
 
Segmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docxSegmented Assimilation Theory and theLife Model An Integrat.docx
Segmented Assimilation Theory and theLife Model An Integrat.docx
 
Select a local, state, or national public policy that is relev.docx
Select a local, state, or national public policy that is relev.docxSelect a local, state, or national public policy that is relev.docx
Select a local, state, or national public policy that is relev.docx
 
School of Community and Environmental HealthMPH Program .docx
School of Community and Environmental HealthMPH Program .docxSchool of Community and Environmental HealthMPH Program .docx
School of Community and Environmental HealthMPH Program .docx
 
School Effects on Psychological Outcomes During Adolescence.docx
School Effects on Psychological Outcomes During Adolescence.docxSchool Effects on Psychological Outcomes During Adolescence.docx
School Effects on Psychological Outcomes During Adolescence.docx
 
Search the gene belonging to the accession id you selected in week 2.docx
Search the gene belonging to the accession id you selected in week 2.docxSearch the gene belonging to the accession id you selected in week 2.docx
Search the gene belonging to the accession id you selected in week 2.docx
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

CMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf

  • 1. CMGTCB/582 - Security and Ethics - Compt-1 Assessment 2 Information Security Memo To: CEO Vampire Legends Organization From: The acting CIO Date: 21st April 2022 Subject: Information Security and Ethics Role of the Memo The memo provides a specific update of the critical analysis of information security and its components in the Vampire Legends case. The same memorandum also updates on the ethical role of Vampire Legends under the simulation aspect and how ethics stimulate the organization's success. Part 1 Components of Information Security The breakdown of the Budget is as follows: In Million Dollars ($)
  • 2. Category of Expenses Strategy A Strategy B Strategy C Marketing 6 3 4 IT 1 3 2 DRM 2 2 2 Salary 1 2 2 Bill Glassen good job on the budget CMGTCB/582 - Security and Ethics - Compt-1 Assessment 3 Total 10 10 10 The components of security are essential factors in ensuring the safety of data. The categories are specific to each unique function. The expense category has different parts. The marketing campaign also interrelates with the Ancient Age of the Vampires. The category of IT expenses has a meaningful allocation to finance operations. The Digital Rights Management and
  • 3. Salary increases are the categories that focus on the wellness of client and staff welfare, respectively. There are three allocation strategies. Strategy, A, B, and C. The three strategies have a total of 10 million dollars. Maximization of marketing is strategy A ($ 6 Million). The maximization is at the expense of a low budget for IT expenses and Salary Increases. The second strategy is strategy B which maximizes the IT allocation ($ 3 million) with the same distribution to marketing. Digital Rights Management and Salary Increase also maintain a constant $2 million each. The third strategy is strategy C which maximizes the marketing allocation and lies between strategies A and B. Choice of Suitable Strategy The strategy of choice is strategy B. The strategy maximizes IT at $3 million, which is part of increasing security measures. The strategy allows the use and purchase of sophisticated IT equipment and addresses key security threats. It also distributes the standard amount of the budget
  • 4. to marketing ($3 million), which is essential to financing the organization's marketing operations. The other essential factor for choosing the strategy is the need to reduce turnover rates in the organization and simultaneously raise the salaries in the organization. The other essence of Bill Glassen Nice job on the details of the reasoning CMGTCB/582 - Security and Ethics - Compt-1 Assessment 4 choosing strategy B is the dynamic and the technological world and, therefore, the need to address the upcoming issues (Federal Trade Commission - Annual Highligts 2020, 2021). It also addresses the ethical issues due to the ability to avoid salary cuts down and altering the welfare of the organization's employees. Choice of the Best Advertising Campaign The available campaign strategies are as follows: 1. Testimonial from Robert Pattinson (Vampire from the Twilight Saga) 2. Leaking information to bloggers about which celebrities are playing.
  • 5. 3. Thirty-Day free trial. The best option for the organization is the 3rd choice which is a Thirty-Day free trial. The option is the best as an incentive. It entails providing services for thirty days and then afterward billing and payment. It is part of increasing the sales in the organization. The Thirty-Day free trial also enables the customers to have the appropriate information and terms of use and operations. There is also a sense of security and assurance. The customers can access the security protocols and the other safety details. The hallmark of the best course of action is to allow the customers to make informed decisions regarding their choice of the products without compromising on their decisions. The course of Action in Handling Information Security Threats. The course of action addresses security issues like breeches, hacking, mishaps, and others that need to be addressed to safeguard the future. Information security is essential for the organization and the customer (Federal Trade Commission - Annual Highligts 2020, 2021). The
  • 6. following are the course of action in ensuring security for the organization and the customer: Bill Glassen Good reasoning CMGTCB/582 - Security and Ethics - Compt-1 Assessment 5 negative impacts that would harm the organization's business operations. and reporting protocols. The employees need to report any suspicious activity. -crime is in place. The training is key to increasing the organizational confidentiality of the operations. res and details like biometrics and personal identifications and specific passwords among the employees. Part 2 Role of Ethics in Vampire Legends Simulation Conflict The Phishing Scam is the conflict in the scenario. A phishing
  • 7. scam is an email that looks real and legit from a company, specifically a bank. The email prompts the person to log in to the personal account to prevent access restrictions. It requested the login details of the individual intending to obtain the data. The scam aims to hack the information of the clients. It also affects the company a great deal. The scam also targeted celebrities, intending to blackmail them and leak personal information to the public. Consequences of the Conflict The conflict affects the organization a great deal and affects operations. Phishing also exposes the clients to the vulnerability of theft. Jama is the specific phishing that obtained the security information. It is also possible for phishing to blackmail celebrities in the gaming arena and expose personal details to the public, thus breaching privacy. The conflict also affects the customer's trust in the level of the security of the organization. Bill Glassen The conflict was the discussion on how to handle the breach from within the company and whether to be transparent
  • 8. regarding the disclosure of customer information or to keep it secret. CMGTCB/582 - Security and Ethics - Compt-1 Assessment 6 Solution of the Conflict t step was to notify the managerial members of the breach in the security. to the law requirements and avoid unnecessary legal actions against the organization. change credentials and login details due to breach in the security features and need to increase data security protection.
  • 9. rather than hiding information. It also promotes client and public satisfaction at large. features and safety, specifically encrypting information. the phishing scam received an extended free protection identity of 1 year. The long-term measures include the following: Improvement of the antivirus, use of passwords in all the logins, spam and web filters installations to prevent phishing data, update of the systems to the latest versions of the security features, encryption of sensitive information, and education of the employees on data security specifically phishing.
  • 10. Impact of Ethics on Revenue Ethics in the organization have a positive and negative impact on revenue. Good ethics maintains the commitment of the stakeholders and other financial partners and also promotes the customers' loyalty, therefore, ensuring a positive revenue path (https://smallbusiness.chron.com, 2021). It is also part of the motivation to work for the organization and achieve financial goals promptly. Good identity from the ethical perspective also ensures the satisfaction of all the CMGTCB/582 - Security and Ethics - Compt-1 Assessment 7 financial parties, therefore improving the revenue trend. Poor ethical aspects in an organization
  • 11. drive to the negative side and undesired consequences. The organization is likely to collapse due to the inability to combine and interrelate well personal and professional ethics. Lack of morals in the organization is the cause of revenue loss. It is the role of the organizational management to identify the factor affecting the organization's performance and address them promptly. References (2021). Federal Trade Commission - Annual Highligts 2020. https://www.ftc.gov/reports/annual-highlights- 2020/enforcement. https://smallbusiness.chron.com. (2021, Feb 16). Retrieved from www.chron.com: https://smallbusiness.chron.com/institutionalize-ethics- corporation-49898.html
  • 12. Bill Glassen You did a good job on the majority of the assignment. You need to think through the ethics of the disclosure of the breach or the possible decision to hide it from the customers. 2 Intervention Model Alexis Heard Columbus State University Program in Design Kinesiology March 21, 2022 Dr. G. Palevo
  • 13. Health Intervention Model Mental health is one of the imperative modifiers of concentration and performance among college students. Hence, the use of a health intervention model will be essential in my study as it will provide a blueprint to understand and address the issue of mental health among students. It will also guide the formulation and implementation of selected interventions (Hagger et al., 2020). Therefore, this study will utilize the Health Belief Model. The model will be customized and tailored to be in congruence with the study population and the health behavior in context. The Health Belief Model will be used in my study as it provides a modality to promote health and mitigate disease-causing behaviors among populations. In addition, this theoretical model will be most appropriate in defining the key factors influential to behaviors affecting mental health in this study population (Hagger et al., 2020). The model will assist in delineating the key factors that affect mental health; such the individual perceived susceptibility to suffering from a mental health issue, perceived severity, perceived barriers to initiating action, exposure to support systems that promote health, and self-
  • 14. confidence in the ability to deal with a mental health issue and not relapse. In conclusion, the health belief model will be used to design short-term and long-term interventions to promote mental health. This will entail assessing the students at risk, understanding the different risky behaviors associated with mental health, and providing channels to communicate with the students on the mechanisms to promote mental health (Zaidlin et al., 2020). This model can also be used in combination with other models. In so doing, the researcher will ensure the depth and breadth of the study gets achieved. References Hagger, M., Cameron, L., Hamilton, K., Hankonen, N., & Lintunen, T. (2020). The handbook of behavior change (1st ed.). Cambridge University Press. https://books.google.co.ke/books?id=IfEFEAAAQBAJ&printsec =frontcover&dq=health+belief+model&hl=en&sa=X&ved=2ahU KEwiEvvT88eb2AhUzi_0HHVc0CSIQ6AF6BAgDEAI Zaidlin, G., Lisnyj, K., Dougherty, B., Cook, N., & Papadopoulos, A. (2020). Utilizing the Health Belief Model to move post-secondary students toward flourishing mental health. The Journal of Positive Psychology, 1-10. https://www.tandfonline.com/doi/abs/10.1080/17439760.2020.1 858331?casa_token=UNVy2ByL5XcAAAAA:_G8sXjtFe2dV9P6
  • 15. NzetgP_t-rde- pNooKUEg45FCJS2ZeNKxeNf5UsH6vfr1buYB9ejB7Gcd7ojZE StDrQ Theoretical Framework Alexis Heard Columbus State University Program in Design Kinesiology March 01, 2022 Dr. G. Palevo Theoretical Framework The mental health program for college students focuses on promoting social-emotional learning and endurance, and also preventing collective, psychological, and behavioral challenges, such as risk behaviors. As a result, the theoretical framework depicts college mental health as a single major topic, depending
  • 16. on available information on psychological health promotion and management. Social, emotional, and behavioral difficulties are avoided. The framework is further described in the following sections of the study by addressing the primary domains in connection to psychological health consequences and the various developmental mechanisms. I also include a set of critical goal abilities and behaviors for both students and teachers, as well as a summary of the primary theoretical components addressed. Interpersonal, emotional, and behavioral challenges refer to a wide range of behaviors that college students can acquire to varying levels, which can be internalizing or externalizing. Depression, criminality, social disengagement, self-harm, anxiety, drug usage, rule-breaking, and violent behavior are commonly targeted in school programs to reduce emotional, behavioral, and social difficulties. The Theory of Planned Behavior can be used to forecast a person's willingness to participate in a given behavior at a particular moment and location. The hypothesis was designed to describe all behaviors over which humans can exercise self restraints (Ajzen & Schmidt, 2020). Behavioral intention is a significant element of this paradigm; motives are impacted by one's view about the probability that the conduct will produce the anticipated result, as well as one's subjective assessment of the dangers and advantages of that result.
  • 17. The Theory of Planned Behavior has been effectively utilized to forecast and describe a variety of mental health-related behaviors and motives amongst students, such as smoking, alcoholism, health-care utilization (Lipson et al., 2019), and substance abuse, among many other things. According to the Theory of Planned Behavior, behavioral success is determined by both motive and potential. The ability to undertake the behavior successfully is contingent not just on a positive purpose, but also on a suitable level of behavioral control. The Theory of Planned Behavior proposes that measuring one's mindset regarding the conduct, subjective standards connected with the behavior, and apparent influence over completing it might anticipate one's motives to execute it (McKenzie et al., 2009)The TPB emphasizes the need of using a multifaceted strategy to understand what influences a person's purpose to undertake a behavior. If a participant's desire to pursue psychological assistance is swayed primarily by subjective values that are hostile to PHS, a study's effort to persuade this individual's motive to obtain psychological assistance might be disappointed if behavior modification is the only target of treatment. Interventions can be used on a broad level, involving every student, or at a more focused rate, with students who are at risk of establishing or have already manifested, modest mental health issues. Preventive measures that are available to
  • 18. everyone are thought to be less alienating. Moreover, both general and focused preventative programs exhibit equal impact values, demonstrating that both general and specialized preventive interventions are needed. Systematic studies of general interventions in college students, specifically, found that internalizing psychological health disorders like anxiety, stress, and depression indicators were significantly reduced (Lattie et al., 2019). Research on the efficacy of preventative strategies for externalizing disorders has a lot in common. Considerable reductions in specified behavioral difficulties were found, with impacts extending for one year. The students who took participated in a short cognitive education session experienced significant reductions in anxiety and tension. In a group of students who performed yoga, levels of stress levels are less, and general mental well -being is higher, as contrasted to a regulated group. The goals of this study were to look at the psychological health of college students to contribute to a better comprehension of the term and to give a thorough theoretical framework for psychological health management at colleges that consider students' needs into account. References Ajzen, I., & Schmidt, P. (2020). Changing behavior using the theory of planned behavior. The handbook of behavior change,
  • 19. 17-31. Lattie, E. G., Adkins, E. C., Winquist, N., Stiles-Shields, C., Wafford, Q. E., & Graham, A. K. (2019). Digital mental health interventions for depression, anxiety, and enhancement of psychological well-being among college students: systematic review. Journal of medical Internet research, 21(7), e12869. Lipson, S. K., Lattie, E. G., & Eisenberg, D. (2019). Increased rates of mental health service utilization by US college students: 10-year population-level trends (2007–2017). Psychiatric services, 70(1), 60-63. McKenzie, J. F., Neiger, B. L., & Thackeray, R. (2009). Planning, implementing, and evaluating health promotion programs: A primer (p. 496). San Francisco, CA: Pearson/Benjamin Cummings. 6 Mental Health in college students
  • 20. Alexis Heard Columbus State University SP 22’ Program Design in Kinesiology Dr. G. Palevo February 17, 2022 Mental Health in College Students Health status Mental health issues encompass factors that affect cognitive, emotional, and behavioral well-being. Any deviation of mental health status from normal may lead to any of the following mental disorders, schizophrenia, anxiety, depression, and physical symptoms like fatigue, insomnia, back pain, and headaches. Mental health problems have statistically proven to be highly prevalent among college students. For example, in a survey involving Australian students, higher levels of psychological distress were noted. In another state-wise survey by the American Psychological Association (APA), 95% of college counseling centers directors reported alarming and growing concerns over growing numbers of mental health issues among college students (Auerbach et al., 2016). Anxiety is the topping concern with a prevalence rate of 41.6%, followed by depression at 36. 5%, other mental distresses concerns relationships and accounts for 35.8%. These prevalence’s can be attributed to a busy college schedule, financial issues, and lack
  • 21. of balance between having fun and studying. College lends itself a host to many new things: independence, freedom, opportunity, and autonomy. The transition from high school to college also takes a hefty toll on contributing to deleterious health consequences to college students (Bruffaerts et al., 2018). For instance, lack of engagement can be a sign of depression, excessive worrying, increased dependence on a substance such as excessive drinking to numb emotions, or a changing relationship with food. In such cases, one no longer pays attention to eating patterns and tends to avoid socializing when there is food or exercise excessively. According to Lee et al. (2022). mental health problems can affect students' concentration, energy, mental ability, dependability, optimism and hinder performance. Depression, for example, is associated with low-grade point averages, truancy, and dropouts. In the end, roommates, peers, staff, family members may end up suffering consequences of poor relationships, poor work productivity, and profound grief from suicides. Community description The program's scope is on college students across the state and beyond. Global estimates of mental health problems suggest that one in four people globally have experienced or will experience mental health issues in their lifetime (Pedrelli et al., 2015). It is
  • 22. the third leading cause of mortalities among young people. Therefore, the program aims to assess the health needs of all reachable college students locally, state-wise, and even nationally. Needs Assessment Based on qualitative needs assessments done through focus groups, projects, scenarios, case study reports, introspection, visual texts, role-play simulation, and direct observations, major health needs of the students were identified. The majorly identified health needs include helping erase suicidal feelings and thoughts, eating disorders, overactivity and poor concentration, obsessive-compulsive disorder, low mood, and depression. Naturally, a human's body and mind are not separate; it is therefore not surprising that mental health problems impact the body. For example, depression can cause fatigue, headaches, and digestive problems. The overall effects on the quality of life range from a feeling of distress, lack of control, choice, and autonomy, low confidence, diminished activity, and feeling of hopelessness and demoralization (Sazakli et al.,2021). Major identified causes of mental health problems among college students include pressure to succeed in academics, uncertainty, financial distress, and increased social media use. Non-specific combat strategies needed in the schools includes a) Promotion of healthy eating habits
  • 23. b) Encouraging physical activity c) Promotion of healthy sleeping habits d) Social Media use sensitization campaigns to minimize excessive social media use, inactivity, and visiting unauthorized sites. Quantitative assessments focus on numbers or quantities and gather the information that yields results that can be quantified. A report by Karyotak et al. (2020) showed that one-third of students screened positive for at least a single in six mental health illnesses. With a prevalence of 27% exhibited over 12 months, the study demonstrated a possible lifetime prevalence of 28.7%. This calls for an array of measures, including the following. a) Once a month mental health seminar in college institutions in California. b) Employment of an adequate number of psychiatric mental health practitioners across institutions to balance student: psychiatrist ratio. c) Install at least two support group meetings for students to guide each other towards shared goal recovery. d) Complementary and Alternative Medicine (CAM) - CAM includes treatment practices typically not associated with standard care. e) Self-help plans- self-help plans are severely lacking among
  • 24. college studies in the United States. They may, however, have a hand in helping students implement strategies to promote wellness recovery and identify warning signs. Community link The United States government currently offers various programs and services to support people with mental health needs, including students. They include income support, disability services, community support, workforce participation programs, and housing. In hospitals, the current most common way of treating mental health illnesses and challenges includes psychotherapy, also called talk therapy and counseling (Auerbach et al., 2016). The proposed program will come in a batch of complementary programs to support existing programs in boosting mental health issues among college students. Salient things the program will include: 1) Enhancing counseling and psychotherapy through maximum stakeholder engagement and online campaigns 2) Technology use in mental health programming-technology is likely to address problems of minimal healthcare-seeking behavior among college students. Through technology-based diagnosis, and well-coordinated psychotherapeutic and pharmacotherapeutics approaches, confidentiality will be
  • 25. enhanced, fewer financial expenses will be incurred, and accessibility will be enhanced since services will happen through simple web-search. 3) Community support and awareness campaigns will also help promote awareness, reduce discrimination and stigma, supporting social inclusion and recovery while preventing mental disorders. References Auerbach, R. P., Alonso, J., Axinn, W. G., Cuijpers, P., Ebert, D. D., Green, J. G., ... & Bruffaerts, R. (2016). Mental disorders among college students in the World Health Organization world mental health surveys. Psychological medicine, 46(14), 2955- 2970. Bruffaerts, R., Mortier, P., Kiekens, G., Auerbach, R. P., Cuijpers, P., Demyttenaere, K., & Kessler, R. C. (2018). Mental health problems in first-year college students: Prevalence and academic functioning. Journal of affective disorders, 225, 97-103 Lee, S., Lim, J., Lee, S., Heo, Y., & Jung, D. (2022). Group- tailored feedback on online mental health screening for university students: using cluster analysis. BMC Primary Care, 23(1), 1-14. Pedrelli, P., Nyer, M., Yeung, A., Zulauf, C., & Wilens, T. (2015). College students: mental health problems and treatment
  • 26. considerations. Academic psychiatry, 39(5), 503-511. Karyotaki, E., Cuijpers, P., Albor, Y., Alonso, J., Auerbach, R. P., Bantjes, J., & Kessler, R. C. (2020). Sources of stress and their associations with mental disorders among college students: results of `the world health organization world mental health surveys international college student initiative. Frontiers in psychology, 1759. Sazakli, E., Leotsinidis, M., Bakola, M., Kitsou, K. S., Katsifara, A., Konstantopoulou, A., & Jelastopulu, E. (2021). Prevalence and associated factors of anxiety and depression in students at a Greek university during COVID-19 lockdown. Journal of public health research, 10(3). Chapter 12: Implementation: Strategies and Associated Concerns © 2017 Pearson Education, Inc. Chapter 12 Lecture 1
  • 27. Logic Models – 1 A logic model is a systematic and visual way for planners to share and present their understanding of the relationship among the resources they have to operate a program, the activities they plan to implement, and the outputs and outcomes they hope to achieve (CDC, 2008b; WKKF, 2004). Can help all stakeholders understand the “big picture” of how planning, implementing, and evaluating all fit together © 2017 Pearson Education, Inc. Logic Models – 2 Three components of a logic model: Inputs (resources) Human resources, partnerships, equipment, supplies, materials, and community resources Outputs (activities) Products, services, and infrastructure Outcomes (results or effects) Short-term, mid-term, and long-term © 2017 Pearson Education, Inc.
  • 28. Basic Logic Model © 2017 Pearson Education, Inc. Defining Implementation “The act of converting planning, goals, and objectives into action through administrative structure, management activities, policies, procedures, and regulations, and organizational actions of new programs” (Timmreck, 1997, p. 328) One of the three stages of program diffusion, with the other two being adoption and sustainability (Bartholomew et al., 2011) © 2017 Pearson Education, Inc. Phases of Program Implementation Phases are flexible in nature and can be modified to meet the many different situations and circumstances faced by planners.
  • 29. Phases of implementation: Adoption of the program Identifying and prioritizing the tasks to be completed Establishing a system of management Putting the plans into action Ending or sustaining a program © 2017 Pearson Education, Inc. Phase 1: Adoption of the Program This phase is a part of the marketing process. Great care must go into the marketing process to ensure that a relevant product (i.e., the health promotion program) is planned so that those in the priority population will want to participate in it. © 2017 Pearson Education, Inc. Phase 2: Identifying and Prioritizing the Tasks to Be Completed – 1 Many tasks need to be completed when implementing a
  • 30. program. Examples: reserving space, ordering equipment, etc. Tasks need to be identified and prioritized. Planning timetables and timelines can help with this process. © 2017 Pearson Education, Inc. Phase 2: Identifying and Prioritizing the Tasks to Be Completed – 2 Types of timetables and timelines include: Basic timelines Task development timelines (TDTLs; Anspaugh, Dignan, & Anspaugh, 2000) Gantt charts PERT charts Critical path method (CPM) © 2017 Pearson Education, Inc. Sample Task Development Timeline © 2017 Pearson Education, Inc.
  • 31. Sample Gantt Chart © 2017 Pearson Education, Inc. Phase 3: Establishing a System of Management – 1 Management – “the process of assembling and using sets of resources in a goal-directed manner to accomplish tasks in an organizational setting” (Hitt, Black, & Porter, 2012, p. 483) Includes human, financial, and technical resources “The efficient, satisfactory management of a health promotion program is vital to its long-term success” (Anspaugh et al., 2000, p. 124). © 2017 Pearson Education, Inc.
  • 32. Phase 3: Establishing a System of Management – 2 Good management is needed to ensure that programs are Effective: meet stated goals and objectives Efficient: well-organized, cost effective Managers need technical, interpersonal, and conceptual skills. Human Resources Management (HRM) Four functions (or PADS): Planning – defining personnel Acquisition – hiring personnel Development – training personnel Sanction – discipline, rewards, safety Professional Development © 2017 Pearson Education, Inc. Phase 3: Establishing a System of Management – 3 Financial Management “Process of developing and using system to ensure that funds are spent for the purpose for which they have been appropriated” (Klingner et al., 2010, p. 88) Accounting, fiscal year, fiscal accountability Audits – internal and external
  • 33. Technical Resources Management All other resources besides human and financial Equipment, expertise, information, material, partnerships © 2017 Pearson Education, Inc. Phase 4: Putting Plans into Action – 1 There are three major ways of putting plans into action: by phasing them in, in small segments; and by initiating the total program all at once. The strategies exist in a hierarchy and it is recommended that all programs go through all three. Pilot testing – trying the program out with a small group from the priority population to identify any problems Phasing in – limiting the number of people who are exposed, then gradually increasing the numbers; by offerings, by location, by ability, by number Total program – all in priority population are exposed at same time © 2017 Pearson Education, Inc.
  • 34. Putting Plans into Action © 2017 Pearson Education, Inc. Phase 4: Putting Plans into Action – 2 First Day of Implementation Also referred to as program launch, program rollout, or program kickoff Some special planning may be necessary: Decide on a first day. Consider launching to coincide with other already occurring event (e.g., weight loss program and New Year’s resolution). © 2017 Pearson Education, Inc. Phase 4: Putting Plans into Action – 3 Some special planning may be necessary (cont’d) Kickoff in style. Create a special event; use celebrities.
  • 35. Seek news coverage, if appropriate. Inform appropriate media representatives of your plans. Make arrangements to meet the media representatives at the designated time and place. Use press releases, video releases, spokespeople. Consider a news hook; e.g., day in history. © 2017 Pearson Education, Inc. Phase 4: Putting Plans into Action – 4 Monitoring Implementation Program monitoring involves the ongoing collection and analysis of data and other information to determine if the program is operating as planned. Basic monitoring data and information for a program has the following utilities (USDJ, n.d.): It provides operating and descriptive data and information. It provides the basic information for comparing outcomes to the program objectives. It provides educational information about many aspects of the program. Monitoring data serve as a preventive maintenance function by tracking indicators of critical elements.
  • 36. © 2017 Pearson Education, Inc. Phase 5: Ending or Sustaining a Program Planners should determine how long to run a program. If the program met its goals and objectives and the priori ty population has been served to the fullest extent necessary, then the program can be ended. Sustaining a program is more difficult. Six techniques include: Working to institutionalize Seeking feedback Advocating for the program Partnering with others Revisiting and revising the rationale Establishing a resource development committee © 2017 Pearson Education, Inc. Implementation of Evidence-Based Interventions The focus of implementation science is to study how interventions, which have been shown to be effective in one
  • 37. setting, can be applied to sustain improvements to population health (Lobb & Colditz, 2013). Tomioka and Braun (2013) created a four-step fidelity assurance protocol: Deconstruct the program into its components. Identify agencies that are ready to replicate the intervention. Closely monitor the fidelity of the program. Use the evaluation tools of the program to track progress. © 2017 Pearson Education, Inc. Concerns Associated with Implementation – 1 Safety and Medical Concerns Most programs are designed to improve health; thus give attention to the safety and medical concerns associated with the program. Informed consent Explain nature of program. Inform participants of risks or dangers and any possible discomfort. Explain expected benefits. Inform of alternative programs. Indicate that they are free to discontinue participation at any time.
  • 38. Allow participants to ask questions. Informed consent forms (waiver of liability or release of liability) do not protect planners from being sued. They just make participants aware of special concerns. © 2017 Pearson Education, Inc. Example Informed Consent Form © 2017 Pearson Education, Inc. Concerns Associated with Implementation – 2 Safety and Medical Concerns (cont’d) If the act of participating in the program puts anyone at medical risk (e.g., cardiovascular exercise programs), then these individuals need to obtain medical clearance before participating. Medical clearance signed by a physician Steps must be taken to ensure the safety and health of all
  • 39. associated with the program: Safe program location; appropriate security Building codes met and facilities free from any hazards Qualified instructors Plan in case of emergency © 2017 Pearson Education, Inc. Checklist of Items to Consider When Developing an Emergency Care Plan © 2017 Pearson Education, Inc. Concerns Associated with Implementation – 3 Ethical Issues Situations where competing values are at play and judgment must be made on what is the most appropriate course of action Code of Ethics for the Health Education Profession guides the work of health educators.
  • 40. Planners should have integrity, and be honest, loyal, and accountable. The Belmont Report: Ethical Principles and Guidelines for the Protection of Human Subject Research has three fundamental ethical principles: Respect for persons Beneficence – maximizing benefits; doing good Justice – fairness © 2017 Pearson Education, Inc. Concerns Associated with Implementation – 4 Legal Concerns Negligence – failing to act in a prudent (reasonable) manner. Arises from two acts: Omission – doing nothing when you should Commission – doing something you should not © 2017 Pearson Education, Inc.
  • 41. Concerns Associated with Implementation – 5 Reducing the Risk of Liability – key to avoiding liability is to reduce risk by planning ahead Be aware of legal liabilities. Be aware of professional standards. Keep knowledge and skills up-to-date. Use certified instructors. Use good judgment. Require informed consent. Get medical clearance. Limit work to expertise. Provide a safe environment. Purchase insurance. © 2017 Pearson Education, Inc. Concerns Associated with Implementation – 6 Program Registration and Fee Collection Establish payment procedures and a system of payment Procedures for Recordkeeping HIPAA
  • 42. Records should be kept, but ensure anonymity/confidentiality © 2017 Pearson Education, Inc. Concerns Associated with Implementation – 7 Procedural Manual and/or Participants’ Manual There may be a need to create a manual for the program to: Ensure that everyone understands the program and its parameters Standardize the intervention so it can be replicated and avoid Type III errors Provide ideas for facilitation Provide additional background information on the topic Provide citations for additional resources. Program Participants with Disabilities Programs should meet the needs of participants with disabilities. © 2017 Pearson Education, Inc.
  • 43. Concerns Associated with Implementation – 8 Training for Facilitators Program facilitators need to be familiar with the intervention. Either by participating in the planning of the intervention or through a training session Dealing with Problems Planners should anticipate and deal with problems that might arise. Documenting and Reporting Keep others informed about the progress of the program for: accountability public relations motivation of present participants © 2017 Pearson Education, Inc. Chapter 13: Evaluation: An Overview © 2017 Pearson Education, Inc.
  • 44. Chapter 13 Lecture 1 Background Information on Evaluation Adequate and appropriate evaluation is necessary for any program regardless of size, nature, and duration. Two critical purposes of program evaluation are Assessing and improving quality Determining program effectiveness Conducting evaluation and research is a major area of responsibility for health education specialists. © 2017 Pearson Education, Inc. Basic Terminology – 1 Evaluation The process of determining the value or worth of a health promotion program or any of its components based on
  • 45. predetermined criteria or standards of acceptability identified by stakeholders © 2017 Pearson Education, Inc. Basic Terminology – 2 Formative Evaluation Purpose is to improve the overall quality of a program or any of its components before it is too late (i.e., the program concludes) Attempts to enhance program components before and during implementation Process Evaluation Assesses the implementation process in general, and tracks and measures what went well and what went poorly and how these factors contributed to the success or failure of a particular program Measures the degree to which the program was successfully implemented and generally applies lessons learned in subsequent versions or implementations of the program Formative and process evaluations are often used interchangeably and have become somewhat synonymous. © 2017 Pearson Education, Inc.
  • 46. Basic Terminology – 3 Summative Evaluation Purpose is to assess the effectiveness of the intervention and the extent to which awareness, attitudes, knowledge, behavior, the environment, or health status changed as a result of a particular program An umbrella term Impact Evaluation Focuses on intermediary measures such as behavior change or changes in attitudes, knowledge, and awareness Outcome Evaluation Measures the degree to which end points such as diseases or injuries actually decreased Impact and outcome evaluations together constitute summative evaluation. © 2017 Pearson Education, Inc. Comparison of Evaluation Terms © 2017 Pearson Education, Inc.
  • 47. Start of Implementation Process Impact Outcome Formative Summative Planning End of Implementation Purpose of Evaluation To determine achievement of objectives related to improved health status To improve program implementation To provide accountability to funders, the community, and other stakeholders To increase community support for initiatives To contribute to the scientific base for community public health interventions
  • 48. To inform policy decisions © 2017 Pearson Education, Inc. (Capwell et al., 2000) Framework for Program Evaluation – 1 © 2017 Pearson Education, Inc. Framework for Program Evaluation – 2 Step 1 – Engaging Stakeholders Who are the stakeholders? Those involved in program operations Those served or affected (directly or indirectly) by the program Primary users of the evaluation results The scope and level of stakeholder involvement will vary with each program being evaluated. Step 2 – Describing the Program Sets the frame of reference for all subsequent decisions in the evaluation process
  • 49. Describes mission, goals, objectives, capacity to affect change, stage of development, and how it fits into the larger community Logic model can be used © 2017 Pearson Education, Inc. Framework for Program Evaluation – 3 Step 3 – Focusing the Evaluation Design Makes sure the interests of stakeholders are addressed Identifies reason of evaluation, how it will be used, questions to be asked, design of evaluation, and finalizes any agreements about the process Step 4 – Gathering Credible Evidence Decides on measurement indicators, sources of evidence, quality and quantity of evidence, and logistics for collecting evidence Organizes data including specific processes related to coding, filing, and cleaning © 2017 Pearson Education, Inc.
  • 50. Framework for Program Evaluation – 4 Step 5 – Justifying Conclusions Comparing the evidence against the standards of acceptability Judging the worth, merit, or significance of the program Creating recommendations for actions based on results Step 6 – Ensuring Use and Sharing Lessons Learned Use and dissemination of the results Needs of each group of stakeholders addressed Four standards of evaluation: Utility standards Feasibility standards Propriety standards Accuracy standards © 2017 Pearson Education, Inc. Practical Problems or Barriers in Evaluation – 1 Planners either fail to build evaluation in the planning process or do so too late. Adequate resources may not be available to conduct an appropriate evaluation.
  • 51. Organizational restrictions may prevent hiring consultants and contractors. Effects are often hard to detect because changes are sometimes small, come slowly, or do not last. Length of time allotted for the program and its evaluation is not realistic. Restrictions may limit the collection of data among the priority population. © 2017 Pearson Education, Inc. Practical Problems or Barriers in Evaluation – 2 It is difficult to make an association between cause and effect. It is difficult to evaluate multi-strategy interventions. Discrepancies between professional standards and actual practice exist with regard to appropriate evaluation design. Evaluators’ motives to demonstrate success introduce bias. Stakeholders’ perceptions of the evaluation’s value may vary too drastically. Intervention strategies are sometimes not delivered as intended or are not culturally specific. © 2017 Pearson Education, Inc.
  • 52. Evaluation in the Program Planning Stages Evaluation design must reflect the goals and objectives of the program. The evaluation must be planned in the early stages of development and be in place before program begins. Baseline data – those reflecting the initial status or interests of the participants; from a needs assessment Initial data regarding the program should be analyzed promptly to make any necessary adjustments to the program. By creating the summative evaluation early in the planning process, planners can ensure that the results are less biased. © 2017 Pearson Education, Inc. Ethical Considerations Evaluation or research should never cause mental, emotional, or physical harm to those in the priority population. Participants should always be informed of the purpose and potential risks and should give consent.
  • 53. No individual should ever have his or her personal information revealed in any setting or circumstance. When appropriate, evaluation plans should be approved by institutional review boards (IRBs). © 2017 Pearson Education, Inc. Who Will Conduct the Evaluation? – 1 Internal Evaluation An individual trained in evaluation and personally involved with the program conducts the evaluation. Advantages More familiar with organization and program history Knows decision-making style of those in the organization Present to remind people of results now and in the future Able to communicate results more frequently and clearly Less expensive Disadvantages Possibility of evaluator bias or conflict of interest © 2017 Pearson Education, Inc.
  • 54. Who Will Conduct the Evaluation? – 2 External Evaluation Conducted by someone who is not connected with the program (Evaluation consultant) Advantages More objective review and fresh perspective Can ensure unbiased evaluation outcome Brings global knowledge of working in a variety of settings Typically brings more breadth and depth of technical expertise Disadvantages More expensive Can be somewhat isolated, often lacking knowledge of and experience with the program Evaluator should be credible and objective, have a clear role in evaluation design, and accurately report findings. © 2017 Pearson Education, Inc. Evaluation Results Who will receive the results of the evaluation? Different aspects of the evaluation can be stressed, depending on the group’s particular needs and interests.
  • 55. Different stakeholders may want different questions answered. The planning for the evaluation should include a determination of how the results will be used. © 2017 Pearson Education, Inc. Transcript: Vampire Legends – A Role-Playing Simulation on Ethics, Privacy, and Security in the Multiplayer Online Game Business by Patricia Wallace In this role-playing simulation you will be working on certain aspects of the sequel to the game Vampire Legends which is Ancient Age. You will be the acting CIO and will specifically work on the strategy and the budget. The simulation will require you to give a breakdown of the budget report, choose an allocation strategy based on the risks and expenses involved, choose the best advertising campaign, analyze threats related to information security, and decide the course of action in handling threats to information security.Interaction 1 On logging into the application, the following tools are displayed on a laptop screen: E-Mail, Voicemail, Documents, Web Meeting, and Video Phone.
  • 56. The icons of E-Mail, Voicemail, and Documents are highlighted, indicating there are new mails, messages, and documents. Email: Once the learner clicks on the email icon a screen containing the following information appears: From, Subject, Received. To the left, is the Mail Folders which has Inbox, Draft, Sent, and Trash listed one below the other. The inbox option is highlighted. There are three new mails. The first mail is from Shelby, CEO Digital Artists, with the subject ‘Strategy Session’. The mail is addressed to Dale, Jama and the Learner. He updates on the replacement of the learner instead of Jama whose down with flu. He instructs the members to take the poll which, can be found in the Docs folder to see which kind of campaign they will prefer. Information on the budget and the success of their previous game is also given. He mentions that the team will be invited to the web meeting through IM once the poll is completed. The second mail is from Stella, VP Finance, with the subject ‘Cost Estimates’, addressing the Learner and Jama. She briefs on the budget and the expense estimates. The third mail is from Dale, VP Marketing, with the subject ‘Marketing’ briefing on the budget for the marketing campaign and emphasizing the importance of the campaign.
  • 57. When clicked on the close button the learner is taken to the Home screen. Voicemail: The voice mail is from Jama, plays when clicked on the play button. A picture of Jama is at the left corner of the screen. He advises the learner about the implementation of information security- the need of a better firewall. Also, information on login credentials for the D&L bank which can be found in the Documents folder, is given. Documents: There are four new documents in the Documents folder. The first document titled ‘Digital Artists Organizational Chart’ contains a chart with the hierarchy of the members in the organization. The second document titled ‘Risk Matrix (from Jama)’ contains a table showing a draft of the various risks and their impact. The third document titled ‘Budget and Advertising Campaign Poll’ contains two polls, one for identifying the best allocation strategy and the other to identify the best campaign approach. There are three options in each of the question. Only when, both the options are chosen, the submit button appears. When the learner clicks on the submit button it goes back to the documents folder. The fourth document titled ‘Confidential Login Information (from Jama) contains the login ID: and password for the user.
  • 58. There is a print button and close button when the document is open, in all the documents. Instant Message: Shelby invites the team members to the meeting as most of them are not in agreement with options in the poll. Web Meeting: The web meeting window shows the video of Shelby, participating in the meeting to the left of the screen. The names of the members present in the meeting is listed below the video. The main screen shows the result of the poll for the questions. The team discuss based on the results, to come to a conclusion. A celebrity testimonial is chosen for the marketing campaign. 2 months later: The following words appear on screen ‘2 Months Later’ in big block letters.Interaction 2 Email: There are four new mails. The first mail is from Shelby, with the subject ‘Congratulations!’ he congratulates the team on the high- demand of the new game Ancient ages and how the IT has handled the traffic wonderfully. He commends Dale’s efforts in the marketing campaign. He further congratulates the learner on being promoted as the CIO. He also brings into notice Jama’s concerns on Information privacy which will be investigated in a few months’ time.
  • 59. The second mail is from the D&L bank with the subject ‘Your D&L Bank Account’. The mail is to confirm the identity of the user and remove their account limitation. It contains a link that reads ‘Click Here’, when clicked on goes to the login page of D&L Bank. There are two text boxes: one for the login and the other for the password. The learner has to go back to the documents folder, to get the login credentials that Jama had sent earlier. When the login credentials are typed in, the submit button appears. On clicking the submit button, the message ‘Thank you for confirming your login information. We appreciate your business.’ appears at the bottom of the screen. The learner closes the screen by clicking on the close button at the top right corner of the screen which goes back to the mail. The third mail is from Stella with the subject ‘Message from Customer’. It contains a mail from Devon Turnbull, governor’s son that has a snippet of what was posted on Gamer’s blog about him. Mr. Devon sounds enraged by how his information is leaked on the internet. He questions the ethics of the company. He also mentions that he’ll be contacting his attorneys. The fourth mail is a reply from Shelby to Stella’s mail questioning, how the security breach happened. Voicemail: There is one new voice message from Lonnie demanding the learner to come to the meeting, because of the serious mail from
  • 60. Stella. Instant message: Shelby questions the learner and Lonnie asking what’s happening. Lonnie responds saying, someone has broken into the system to steal the information of about a million of the customers. He also mentions that the details will be put up in the documents folder. The team discuss further, to discover that the details of the customers haven’t been encrypted. Stella volunteers to layout the issues in the Docs folder. Shelby suggests everyone to review the issues and then meet. Documents: There are two new documents added to the documents folder. One titled ‘Summary of the attack (from the learner and Lonnie), contains the details of the security attack and the effort in finding the offender. As of now, the person with the twitter handle ’DragonFly’ is presumed to be the main suspect. The other document titled ‘To Crisis Management Team: Break- In Issues (from Stella)’ contains ten statements with ‘Agree’ and ‘Disagree’ option to each of the statement. The learner has to choose either if he/she agrees or disagrees to the given ten statements. Once the options for all the ten statements are chosen, a ‘Submit’ button appears. Clicking on it takes the learner back to the documents folder. There is a print button and close button when the document is open, in both documents.
  • 61. Interaction 3: Instant Message: Once the poll in the documents folder is completed, Shelby invites everyone for a web meeting through Instant message. Web Meeting: The results of the poll is displayed in the middle of the screen. While the video of Shelby speaking appears on the left and the names of the members participating in the web meeting is listed below. During the meeting, going-forward the action that has to be taken, and its consequences is discussed. Shelby decides to come clean with the customers and the board members, by revealing what has happened to their personal information, although Dale and Vontae think otherwise. Shelby decides to take the games down until the encryption project is completed. They also decide to have a press release on what has happened to inform the public. Thus, the meeting comes to an end. 1 months later: The following words appear on screen ‘1 Month Later’ in big block letters. Interaction 4: The following tools are displayed on a laptop screen: E-mail, Voicemail, Documents, Web Meeting, and Video Phone. The E-mail icon is highlighted indicating, there are new mails.
  • 62. There are two new mails. One from Shelby with the subject ‘Good News’ and the other from Stella-her reply to Shelby’s mail. In Shelby’s mail, he breaks the news about the person who’s behind the security breach. Turns out that Dale is the one who broke in and downloaded the records. He is also the one who made the post on the Governor’s son on the Gamer’s blog. Currently he’s been put on administrative leave, until the whole situation is sorted out and Vontae has taken over as the Acting VP. The mail from Shelby has more good news. She informs the team that since the games were back up with better security within a week, not many customers have been lost. The strategy to take full responsibility of the situation and make amends to the players has earned a lot of praise. The customers are pouring in, this in turn has increased the revenue. When clicked on the close button the learner is taken to the Home Screen. End of simulation exercise ( Feedback on
  • 64. in the Multiplayer Online Game Business ) Name: 1. Budget Allocation Poll Points: 5 out of 5 Select the allocation strategy you prefer and click submit. Allocations, in millions Expense Category Strategy A Strategy B Strategy C 1. Marketing Campaign, Ancient Age of Vampires $6 $3 $4
  • 65. 2. IT Expenses $1 $3 $2 3. Digital Rights Management (DRM) $2 $2 $2 4. Salary Increases $1 $2 $2 Total $10 $10 $10 ABC Choose an allocation strategy:
  • 66. You chose Strategy B. Strategy A maximizes funds spent on marketing at the expense of IT and salaries. Strategy B maximizes funds spent or IT and salaries, making it possible to implement improved security measures, and also raise salaries to reduce turnover. Strategy C is a compromise between those two approaches. Strategy B is the best choice from the standpoint of security and ethics, and earns the highest number of points for this simulation. Companies have a responsibility to protect their customer's data. Strategy A ignores the problems, and earns 0 points. Strategy C earns partial credit. 2. Advertising Allocation Poll Points: 5 out of 5 Select the advertising campaign approach you think is best: 1. Testimonial from Robert Pattinson (vampire from The Twilight Saga) 2. Leaking information to bloggers about which celebrities are playing
  • 67. 3. 30 day free trial You chose 3, which is an excellent choice. It was also a good decision on your part to NOT choose #2, which would violate your customers' privacy. 3. Phishing Scam Points: 0 out of 5 The email that appeared to come from D&L Bank was a simulated phishing scam. The link provided in such emails often takes the victim to a fraudulent website that appears legitimate, so that the criminals can obtain the victim's login credentials or other personal information. You entered the login information that Jama provided, thereby giving away your account information to the criminals. 4. Break-In Issues Points: 20 out of 20 Your point totals are shown below. Organizations must respond
  • 68. quickly to a large data breach like this one, informing all the affected people, the company's stakeholders, and the police. Because information like this goes viral on social media, it is not feasible to try to contain it. Instead, company executives should take full responsibility for the breach, assure customers that they have taken measures to protect the data going forward, and that they will do what is needed to make amends. Your Choice Correct Choice Points Earned 1. Inform customers that their data has been breached. Agree Agree 2 2. Inform the Board of Directors about the break-in. Agree Agree 2 3. Delay letting customers know until we know who hacked in.
  • 69. Disagree Disagree 2 4. Prompt customers to change their passwords. Agree Agree 2 5. Do not alert the police because it may be an inside job. Disagree Disagree 2 6. Issue a press release about the break in now. Agree Agree 2 7. Report break in to the police immediately. Agree Agree 2 8. Take the games down until the encryption project is done. Agree Agree 2 9. Offer affected customers 1 year free identity protection. Agree
  • 70. Agree 2 10. Don't do anything until we know who DragonFly is. Disagree Disagree 2 Total Points for Scored Choices You received 30 out of 35 points, or 86%. Discussion Questions 1. Describe the main ethical and security issues that the Digital Artists executive team confronted. ( Responsible decision-making, accountability ) 2. During the budget discussion, what arguments would you have used to persuade the team that more funding is needed for information security? ( Responsible
  • 73. games down until the encryption project is completed. Though it effect the incoming revenue. ) 3. Why is it important for a company to inform their customers when a data breach such as this occurs? What risks does the company assume if the leadership decides not to disclose the information? ( Privacy and confidentiality of
  • 76. as utilitarian ethics. ) 4. If you were constructing a risk matrix for yourself as a student, which would be your top three vulnerabilities and why? ( It is important to inform the customers whenever the data breach happens. When the Sony PS data breach happened in the year 2011, the company
  • 78. out as a costly mistake for Sony. If the leadership decides not to disclose the information, it is not the right move as per many laws. More than the law, the organization will lose the
  • 79. credibility among customers and it will give more time to the intruder s to misuse the information they have stolen. )