DERMATOLOGY CASE STUDY
Chief complaint: “ My right great toe has been hurting for about 2 months and now it’s itchy, swollen and yellow. I can’t wear closed shoes and I was fine until I started going to the gym”.
HPI: E.D a 38 -year-old Caucasian female presents to the clinic with complaint of pain, itching, inflammation, and “yellow” right great toe. She noticed that the toe was moderately itching after she took a shower at the gym. She did not pay much attention. About two weeks after the itching became intense and she applied Benadryl cream with only some relief. She continued going to the gym and noticed that the itching got worse and her toe nail started to change color. She also indicated that the toe got swollen, painful and turned completely yellow 2 weeks ago. She applied lotrimin AF cream and it did not help relief her symptoms. She has not tried other remedies. Denies associated symptoms of fever and chills.
PMH:Diabetes Mellitus, type 2.
Surgeries: None
Allergies: Augmentin
Medication: Metformin 500mg PO BID.
Vaccination History: Immunization is up to date and she received her flu shot this year.
Social history: College graduate married and no children. She drinks 1 glass of red wine every night with dinner. She is a former smoker and quit 6 years ago.
Family history:Both parents are alive. Father has history of DM type 2, Tinea Pedis. mother alive and has history of atopic dermatitis, HTN.
ROS:
Constitutional: Negative for fever. Negative for chills.
Respiratory: No Shortness of breath. No Orthopnea
Cardiovascular: Regular rhythm.
Skin: Right great toe swollen, itchy, painful and discolored.
Psychiatric: No anxiety. No depression.
Physical examination:Vital Signs Height: 5 feet 5 inches Weight: 140 pounds BMI: 31 obesity, BP 130/70 T 98.0, P 88 R 22, non-labored
HEENT: Normocephalic/Atraumatic, Bilateral cataracts; PERRL, EOMI; No teeth loss seen. Gums no redness.
NECK: Neck supple, no palpable masses, no lymphadenopathy, no thyroid enlargement.
LUNGS: No Crackles. Lungs clear bilaterally. Equal breath sounds. Symmetrical respiration. No respiratory distress.
HEART: Normal S1 with S2 during expiration. Pulses are 2+ in upper extremities. 1+ pitting edema ankle bilaterally.
ABDOMEN: No abdominal distention. Nontender. Bowel sounds + x 4 quadrants. No organomegaly. Normal contour; No palpable masses.
GENITOURINARY: No CVA tenderness bilaterally. GU exam deferred.
MUSCULOSKELETAL: Slow gait but steady. No Kyphosis.
SKIN: Right great toe with yellow-brown discoloration in the proximal nail plate. Marked periungual inflammation. + dryness. No pus. No neuro deficit.
PSYCH: Normal affect. Cooperative.
Labs: Hgb 13.2, Hct 38%, K+ 4.2, Na+138, Cholesterol 225, Triglycerides 187, HDL 37, LDL 190, TSH 3.7, glucose 98.
A:Primary Diagnosis: Proximal subungual onychomycosis
Differential Diagnosis: Irritant Contact Dermatitis, Lichen Planus, Nail Psoriasis
Special Lab: Fungal culture confirms fungal infection.
Patient’s Name: E.D
Lami.
As leaders we understand that our job is to possibly idolize and c.docxfestockton
As leaders we understand that our job is to possibly idolize and carry out the impossible. Healthcare managers primary role is to manage and maintain stabilization. One of the main issues that effects healthcare is intelligence taking over an organization in a setting where elderly people can barely function coherently alone. Quest Diagnostics has switched over to electronically checking in on a kiosk system. MyQuest benefits a patient to receive their results on a portal, without going through the hassle of contacting your doctor or avoiding anxiety throughout the wait for a call back. Is this change saving a hassle or enhancing complications and trouble in an organization?
Change can be hard for some and easy for others. To the healthcare professional manager a change in a structured system may benefit the pace and results of outcomes at this organization. To the patient it may be an additional loop hole in the obstacle course they are not in favor of. The problem initiates when there’s order put in place to carry out new solutions effectively and there’s a complaint and the manager has to see how to satisfy this one customer out of a million because this too can be the rise or fall of an appointment. Managers should stand on what they believe is a better system that works for the majority and not bend it for any reason. Once there’s a tweak in the system it opens up a hole for everyone to think rules will be bent if there’s a complaint. We should question our thinking and communicate effectively with all other leadership to create the most effective system to please as much of the patients as possible. We can not please every human and doing cover ups or quick fixes creates a catastrophe.
Most doctors that have been practicing for years are used to coding manually and paper charts. Recently in the past two years all healthcare settings are forced to switch to icd coding, a new set of codes that are put in place to take the old ones that had been used for years out. This helps the specifications of the patient condition to easily communicate with the patients insurance and lessens the use of multiple codes. This also alters the doctors practice when they are still using paper orders and charts and haven’t learned the codes correctly so are causing patients to be billed by insurance.
When critically analyzing the solution to this problem we should use the problem-solving skills of asking the 5 whys. In a fast past setting we usually like to immediately fix the problem in the area or satisfy the majority. This can result to quick fixes which is like only placing a band aid over a bullet wound. Longterm this result can be detrimental to the organization. Quick fixes should be avoided as much as possible by healthcare management or anyone in leadership.
· Stephens, J. H., & Ledlow, G. R. (2010). Real healthcare reform: Focus on primary care access. Hospital Topics, 88(4), 98–106.
· Cliff, B. (2012). Excellence in patient satis ...
Lecture 1-Introduction to labour market skills (1).pptxShorooqSuleiman1
Introduction to labor market skills in Biology like : Define evidence-based medicine (EBM).
Explain the reasons for practicing EBM.
List the steps for practicing EBM.
Formulate background and foreground questions to be answered by EBM.
Detail the levels of scientific evidence in health care.
Use resources for EBM: pre-appraised evidence (Up-to-date, DynaMed, etc…) or search engines (PubMed, Medline, Google, Google Scholar).
Describe how science and practice of health care is moving forward from basic research to practice (translational science).
Define IT and IoT.
Identify the criteria needed to use IoT in health care.
Describe how technology, basic science and research has changed the job market.
Describe how technology, basic science and research has changed the job market.
Define “Big Data” and how it is collected.
Recognize the advantages and disadvantages of large data collection.
Identify the uses of IoT in medical education.
Describe the uses of IoT in virtual lab and surgical simulation.
Chapter 2 Assignment The Economic Problem Scarcity & Choice.docxwalterl4
Chapter 2 Assignment: The Economic Problem: Scarcity & Choice20 Points
Chips or Salsa?
In this assignment, you will demonstrate your ability to draw a simple production possibilities curve given data on the quantity of one input (labor) and the amount of labor required to produce each of two outputs (bags of chips and cases of salsa). You should also be able to identify the opportunity cost of one good in terms of the other as the slope of the Production Possibilities Frontier. You will explain your analysis of the figures to explain why it’s not possible to produce combinations of the two goods outside the PPF.
Chips or Salsa?
Suppose a nation has a total of 12 units of labor, which can be used to produce either chips or salsa.
One bag of chips takes 2 units of labor to produce and one case of salsa takes 6 units of labor to produce.
· Explain why scarcity exists in this economy. Use the data as evidence of your reasoning.
· What is the maximum quantity of chip bags that can be produced?
· What is the maximum quantity of salsa cases than can be produced?
· Draw the nation’s production possibility frontier.
· What is the opportunity cost of bags of chips in this nation?
· Explain why the nation can’t produce both 4 bags of chips and 3 cases of salsa.
· Explain why the nation shouldn’t produce both 2 bag of chips and 1 cases of salsa.
Chapter 2 Assignment Rubric
Criteria
Not Evident
Developing
Proficient
Distinguished
Points
Explain why scarcity exists in this economy, and use data to justify
2
Calculate maximum number of chip bags that can be produced
1
Calculate maximum number of salsa cases than can be produced
1
Draw the nation’s production possibility curve
3
Describe the opportunity cost of a case of salsa in this nation
4
Explain why the nation can’t produce both 4 bags of chips and 3 cases of salsa
4
Explain why the nation shouldn’t produce both 2 bag of chips and 1 cases of salsa
4
Articulation of response (citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas.)
1
Total:
20
ITS 832 CHAPTER 16
ANALYSIS OF FIVE POLICY CASES IN THE FIELD OF ENERGY POLICY
INFORMATION TECHNOLOGY IN A GLOBAL ECONOMY
DR. JORDON SHAW
OVERVIEW
• Introduction
• Theoretical grounds of policy implementation
• Approaches to policy implementation
• Five case studies
• Lessons learned
• Conclusion
INTRODUCTION
• Population and burning fossil fuels
• Factors of high pollution
• Environmental policy is high priority
• Most nations initiated projects to improve climate
• Focus
• Sustainable energy management
• Renewable energy sources
• Five case studies on climate change and energy use
• Comparative investigation
• What approaches are used?
• How can implications be measured?
• How easily can approaches be applied to other domains?
THEORETICAL GROUNDS OF POLICY
IMPLEMENTATION
• Policy implementation
• Turning theory into .
CLINICAL DECISION MAKING4What do you see as the fu.docxShiraPrater50
: CLINICAL DECISION MAKING
4
What do you see as the future in quality measurement? What is the role of technology? What other factors will be important?
Technology is considered to be the driving force behind the improvements in healthcare Thimbleby H. (2013). Thanks to it the healthcare delivery is more efficient, patient-centered, safe and cost-effective compared to two decades ago; however, there is still more room for improvement. According to CMS in 2017, the healthcare spending was approximately $10,739 per capita, and still, the health outcomes were not at its optimal level. With that being said, I strongly believe that quality measurements need restructuring and reinforcement in order to obtain desirable results. But to design and adopt new strategies that lead to an improvement in our healthcare system, it is important to have into account the role of state and federal policies and its function in shaping modern healthcare.
Technology has and will continue assisting in the quality measurement, healthcare organizations now can adopt a system where it can effectively implement a tailored program accordingly with the company’s necessities. Satisfactory results in quality measurements can be achieved only if the government, health organizations and we (patients) have the same goal. One of the obstacles that this change faces are the expensive implementation of health IT, among many others. Fortunately, sometimes it only takes visionary stakeholders to embrace this change to obtain sustainable improvements, while rapidly acquiring their return on investment.
Efforts, aggressive strategies, and technology can definitely change the course of healthcare, desirable results and improvements can be achieved. Understanding the needs and having the resources to fill the gaps in the healthcare system would be beneficial not only for the community but also would significantly reduce healthcare spending.
References
https://www.cms.gov/Research-Statistics-Data-and-Systems/Statistics-Trends-and-Reports/NationalHealthExpendData/NationalHealthAccountsHistorical.html
Global
editionGlo
b
a
l
ed
it
io
n
this is a special edition of an established
title widely used by colleges and universities
throughout the world. Pearson published this
exclusive edition for the benefit of students
outside the United States and Canada. if you
purchased this book within the United States
or Canada you should be aware that it has
been imported without the approval of the
Publisher or author.
Pearson Global Edition
Global
edition
For these Global editions, the editorial team at Pearson has
collaborated with educators across the world to address a
wide range of subjects and requirements, equipping students
with the best possible learning tools. this Global edition
preserves the cutting-edge approach and pedagogy of the
original, but also features alterations, customization, and
adaptation from the north american version.
it
Strategy:
Issue ...
Competency Chapter
Competency 1: Demonstrate Ethical and Professional Behavior
Behaviors:
Make ethical decisions by applying the standards of the NASW Code of Ethics, relevant laws and regulations,
models for ethical decision-making, ethical conduct of research, and additional codes of ethics as appropriate
to context
1
Use reflection and self-regulation to manage personal values and maintain professionalism in practice
situations
7
Demonstrate professional demeanor in behavior; appearance; and oral, written, and electronic communication 10
Use technology ethically and appropriately to facilitate practice outcomes 2
Use supervision and consultation to guide professional judgment and behavior 8
Competency 2: Engage Diversity and Difference in Practice
Behaviors:
Apply and communicate understanding of the importance of diversity and difference in shaping life
experiences in practice at the micro, mezzo, and macro levels
2, 6, 8
Present themselves as learners and engage clients and constituencies as experts of their own experiences 3, 5
Apply self-awareness and self-regulation to manage the influence of personal biases and values in working
with diverse clients and constituencies
1, 7
Competency 3: Advance Human Rights and Social, Economic, and
Environmental Justice
Behaviors:
Apply their understanding of social, economic, and environmental justice to advocate for human rights at the
individual and system levels
3, 10
Engage in practices that advance social, economic, and environmental justice 2, 8
Competency 4: Engage In Practice-informed Research and
Research-informed Practice
Behaviors:
Use practice experience and theory to inform scientific inquiry and research 9
Apply critical thinking to engage in analysis of quantitative and qualitative research methods and research
findings
4
Use and translate research evidence to inform and improve practice, policy, and service delivery 1, 3, 6, 7, 11
Competency 5: Engage in Policy Practice
Behaviors:
Identify social policy at the local, state, and federal level that impacts well-being, service delivery, and access to
social services
10
Assess how social welfare and economic policies impact the delivery of and access to social services 1, 6
Apply critical thinking to analyze, formulate, and advocate for policies that advance human rights and social,
economic, and environmental justice
2, 5
CSWE EPAS 2015 Core Competencies and Behaviors in This Text
A01_NETT8523_06_SE_FM.indd 1 9/30/15 5:23 PM
Competency Chapter
Competency 6: Engage with Individuals, Families, Groups, Organizations, and
Communities
Behaviors:
Apply knowledge of human behavior and the social environment, person-in- environment, and other
multidisciplinary theoretical frameworks to engage with clients and constituencies
7, 5, 9
Use empathy, reflection, and interpersonal skills to effectively engage diverse clients and constituencies 3, 4, 6
Competency 7: Assess Individuals, ...
Submission Requirements Format Microsoft Word (or compatible).docxdeanmtaylor1545
Submission Requirements
? Format: Microsoft Word (or compatible)
? Font: Arial, size 12, double-space
? Citation Style: Follow your school�s preferred style guide
? Length: 2 page
? APA Format
? No resources before 2015
? Must complete all parts to answer the questions
*** will be reviewed for plagiarism prior to all grading
“Your Company” is expanding. The company wants additional network controls to protect their growing network.
Tasks
Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend at least four possible controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security.
Summarize your network security controls in a summary report to management.
You must provide rationale for your choices by explaining how each control makes the environment more secure and what potential flaws the controls have as well.
Global
editionGlo
b
a
l
ed
it
io
n
this is a special edition of an established
title widely used by colleges and universities
throughout the world. Pearson published this
exclusive edition for the benefit of students
outside the United States and Canada. if you
purchased this book within the United States
or Canada you should be aware that it has
been imported without the approval of the
Publisher or author.
Pearson Global Edition
Global
edition
For these Global editions, the editorial team at Pearson has
collaborated with educators across the world to address a
wide range of subjects and requirements, equipping students
with the best possible learning tools. this Global edition
preserves the cutting-edge approach and pedagogy of the
original, but also features alterations, customization, and
adaptation from the north american version.
it
Strategy:
Issues and Practices
M
cK
een
Sm
ith
it Strategy
Issues and Practices
tHiRd edition
James D. McKeen • Heather A. Smith
t
H
iR
d
e
d
it
io
n
McKeen_1292080264_mech.indd 1 28/11/14 12:56 PM
IT STraTegy:
ISSueS and PracTIceS
A01_MCKE0260_03_GE_FM.indd 1 26/11/14 9:32 PM
A01_MCKE0260_03_GE_FM.indd 2 26/11/14 9:32 PM
IT STraTegy:
ISSueS and PracTIceS
T h i r d E d i t i o n
G l o b a l E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco Hoboken
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
A01_MCKE0260_03_GE_FM.indd 3 26/11/14 9:32 PM
Editor in Chief: Stephanie Wall
Head of Learning Asset Acquisition, Global Edition: Laura Dent
Acquisitions Editor: Nicole Sam
Program Manager Team Lead: Ashley Santora
Program Manager: Denise Vaughn
Editorial Assistant: Kaylee Rotella
Assistant Acquisitions Editor, Global Edition: Debapriya Mu.
Submission Requirements Format Microsoft Word (or compatible).docxdavid4611
Submission Requirements
? Format: Microsoft Word (or compatible)
? Font: Arial, size 12, double-space
? Citation Style: Follow your school�s preferred style guide
? Length: 2 page
? APA Format
? No resources before 2015
? Must complete all parts to answer the questions
*** will be reviewed for plagiarism prior to all grading
“Your Company” is expanding. The company wants additional network controls to protect their growing network.
Tasks
Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend at least four possible controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security.
Summarize your network security controls in a summary report to management.
You must provide rationale for your choices by explaining how each control makes the environment more secure and what potential flaws the controls have as well.
Global
editionGlo
b
a
l
ed
it
io
n
this is a special edition of an established
title widely used by colleges and universities
throughout the world. Pearson published this
exclusive edition for the benefit of students
outside the United States and Canada. if you
purchased this book within the United States
or Canada you should be aware that it has
been imported without the approval of the
Publisher or author.
Pearson Global Edition
Global
edition
For these Global editions, the editorial team at Pearson has
collaborated with educators across the world to address a
wide range of subjects and requirements, equipping students
with the best possible learning tools. this Global edition
preserves the cutting-edge approach and pedagogy of the
original, but also features alterations, customization, and
adaptation from the north american version.
it
Strategy:
Issues and Practices
M
cK
een
Sm
ith
it Strategy
Issues and Practices
tHiRd edition
James D. McKeen • Heather A. Smith
t
H
iR
d
e
d
it
io
n
McKeen_1292080264_mech.indd 1 28/11/14 12:56 PM
IT STraTegy:
ISSueS and PracTIceS
A01_MCKE0260_03_GE_FM.indd 1 26/11/14 9:32 PM
A01_MCKE0260_03_GE_FM.indd 2 26/11/14 9:32 PM
IT STraTegy:
ISSueS and PracTIceS
T h i r d E d i t i o n
G l o b a l E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco Hoboken
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
A01_MCKE0260_03_GE_FM.indd 3 26/11/14 9:32 PM
Editor in Chief: Stephanie Wall
Head of Learning Asset Acquisition, Global Edition: Laura Dent
Acquisitions Editor: Nicole Sam
Program Manager Team Lead: Ashley Santora
Program Manager: Denise Vaughn
Editorial Assistant: Kaylee Rotella
Assistant Acquisitions Editor, Global Edition: Debapriya Mu.
As leaders we understand that our job is to possibly idolize and c.docxfestockton
As leaders we understand that our job is to possibly idolize and carry out the impossible. Healthcare managers primary role is to manage and maintain stabilization. One of the main issues that effects healthcare is intelligence taking over an organization in a setting where elderly people can barely function coherently alone. Quest Diagnostics has switched over to electronically checking in on a kiosk system. MyQuest benefits a patient to receive their results on a portal, without going through the hassle of contacting your doctor or avoiding anxiety throughout the wait for a call back. Is this change saving a hassle or enhancing complications and trouble in an organization?
Change can be hard for some and easy for others. To the healthcare professional manager a change in a structured system may benefit the pace and results of outcomes at this organization. To the patient it may be an additional loop hole in the obstacle course they are not in favor of. The problem initiates when there’s order put in place to carry out new solutions effectively and there’s a complaint and the manager has to see how to satisfy this one customer out of a million because this too can be the rise or fall of an appointment. Managers should stand on what they believe is a better system that works for the majority and not bend it for any reason. Once there’s a tweak in the system it opens up a hole for everyone to think rules will be bent if there’s a complaint. We should question our thinking and communicate effectively with all other leadership to create the most effective system to please as much of the patients as possible. We can not please every human and doing cover ups or quick fixes creates a catastrophe.
Most doctors that have been practicing for years are used to coding manually and paper charts. Recently in the past two years all healthcare settings are forced to switch to icd coding, a new set of codes that are put in place to take the old ones that had been used for years out. This helps the specifications of the patient condition to easily communicate with the patients insurance and lessens the use of multiple codes. This also alters the doctors practice when they are still using paper orders and charts and haven’t learned the codes correctly so are causing patients to be billed by insurance.
When critically analyzing the solution to this problem we should use the problem-solving skills of asking the 5 whys. In a fast past setting we usually like to immediately fix the problem in the area or satisfy the majority. This can result to quick fixes which is like only placing a band aid over a bullet wound. Longterm this result can be detrimental to the organization. Quick fixes should be avoided as much as possible by healthcare management or anyone in leadership.
· Stephens, J. H., & Ledlow, G. R. (2010). Real healthcare reform: Focus on primary care access. Hospital Topics, 88(4), 98–106.
· Cliff, B. (2012). Excellence in patient satis ...
Lecture 1-Introduction to labour market skills (1).pptxShorooqSuleiman1
Introduction to labor market skills in Biology like : Define evidence-based medicine (EBM).
Explain the reasons for practicing EBM.
List the steps for practicing EBM.
Formulate background and foreground questions to be answered by EBM.
Detail the levels of scientific evidence in health care.
Use resources for EBM: pre-appraised evidence (Up-to-date, DynaMed, etc…) or search engines (PubMed, Medline, Google, Google Scholar).
Describe how science and practice of health care is moving forward from basic research to practice (translational science).
Define IT and IoT.
Identify the criteria needed to use IoT in health care.
Describe how technology, basic science and research has changed the job market.
Describe how technology, basic science and research has changed the job market.
Define “Big Data” and how it is collected.
Recognize the advantages and disadvantages of large data collection.
Identify the uses of IoT in medical education.
Describe the uses of IoT in virtual lab and surgical simulation.
Chapter 2 Assignment The Economic Problem Scarcity & Choice.docxwalterl4
Chapter 2 Assignment: The Economic Problem: Scarcity & Choice20 Points
Chips or Salsa?
In this assignment, you will demonstrate your ability to draw a simple production possibilities curve given data on the quantity of one input (labor) and the amount of labor required to produce each of two outputs (bags of chips and cases of salsa). You should also be able to identify the opportunity cost of one good in terms of the other as the slope of the Production Possibilities Frontier. You will explain your analysis of the figures to explain why it’s not possible to produce combinations of the two goods outside the PPF.
Chips or Salsa?
Suppose a nation has a total of 12 units of labor, which can be used to produce either chips or salsa.
One bag of chips takes 2 units of labor to produce and one case of salsa takes 6 units of labor to produce.
· Explain why scarcity exists in this economy. Use the data as evidence of your reasoning.
· What is the maximum quantity of chip bags that can be produced?
· What is the maximum quantity of salsa cases than can be produced?
· Draw the nation’s production possibility frontier.
· What is the opportunity cost of bags of chips in this nation?
· Explain why the nation can’t produce both 4 bags of chips and 3 cases of salsa.
· Explain why the nation shouldn’t produce both 2 bag of chips and 1 cases of salsa.
Chapter 2 Assignment Rubric
Criteria
Not Evident
Developing
Proficient
Distinguished
Points
Explain why scarcity exists in this economy, and use data to justify
2
Calculate maximum number of chip bags that can be produced
1
Calculate maximum number of salsa cases than can be produced
1
Draw the nation’s production possibility curve
3
Describe the opportunity cost of a case of salsa in this nation
4
Explain why the nation can’t produce both 4 bags of chips and 3 cases of salsa
4
Explain why the nation shouldn’t produce both 2 bag of chips and 1 cases of salsa
4
Articulation of response (citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas.)
1
Total:
20
ITS 832 CHAPTER 16
ANALYSIS OF FIVE POLICY CASES IN THE FIELD OF ENERGY POLICY
INFORMATION TECHNOLOGY IN A GLOBAL ECONOMY
DR. JORDON SHAW
OVERVIEW
• Introduction
• Theoretical grounds of policy implementation
• Approaches to policy implementation
• Five case studies
• Lessons learned
• Conclusion
INTRODUCTION
• Population and burning fossil fuels
• Factors of high pollution
• Environmental policy is high priority
• Most nations initiated projects to improve climate
• Focus
• Sustainable energy management
• Renewable energy sources
• Five case studies on climate change and energy use
• Comparative investigation
• What approaches are used?
• How can implications be measured?
• How easily can approaches be applied to other domains?
THEORETICAL GROUNDS OF POLICY
IMPLEMENTATION
• Policy implementation
• Turning theory into .
CLINICAL DECISION MAKING4What do you see as the fu.docxShiraPrater50
: CLINICAL DECISION MAKING
4
What do you see as the future in quality measurement? What is the role of technology? What other factors will be important?
Technology is considered to be the driving force behind the improvements in healthcare Thimbleby H. (2013). Thanks to it the healthcare delivery is more efficient, patient-centered, safe and cost-effective compared to two decades ago; however, there is still more room for improvement. According to CMS in 2017, the healthcare spending was approximately $10,739 per capita, and still, the health outcomes were not at its optimal level. With that being said, I strongly believe that quality measurements need restructuring and reinforcement in order to obtain desirable results. But to design and adopt new strategies that lead to an improvement in our healthcare system, it is important to have into account the role of state and federal policies and its function in shaping modern healthcare.
Technology has and will continue assisting in the quality measurement, healthcare organizations now can adopt a system where it can effectively implement a tailored program accordingly with the company’s necessities. Satisfactory results in quality measurements can be achieved only if the government, health organizations and we (patients) have the same goal. One of the obstacles that this change faces are the expensive implementation of health IT, among many others. Fortunately, sometimes it only takes visionary stakeholders to embrace this change to obtain sustainable improvements, while rapidly acquiring their return on investment.
Efforts, aggressive strategies, and technology can definitely change the course of healthcare, desirable results and improvements can be achieved. Understanding the needs and having the resources to fill the gaps in the healthcare system would be beneficial not only for the community but also would significantly reduce healthcare spending.
References
https://www.cms.gov/Research-Statistics-Data-and-Systems/Statistics-Trends-and-Reports/NationalHealthExpendData/NationalHealthAccountsHistorical.html
Global
editionGlo
b
a
l
ed
it
io
n
this is a special edition of an established
title widely used by colleges and universities
throughout the world. Pearson published this
exclusive edition for the benefit of students
outside the United States and Canada. if you
purchased this book within the United States
or Canada you should be aware that it has
been imported without the approval of the
Publisher or author.
Pearson Global Edition
Global
edition
For these Global editions, the editorial team at Pearson has
collaborated with educators across the world to address a
wide range of subjects and requirements, equipping students
with the best possible learning tools. this Global edition
preserves the cutting-edge approach and pedagogy of the
original, but also features alterations, customization, and
adaptation from the north american version.
it
Strategy:
Issue ...
Competency Chapter
Competency 1: Demonstrate Ethical and Professional Behavior
Behaviors:
Make ethical decisions by applying the standards of the NASW Code of Ethics, relevant laws and regulations,
models for ethical decision-making, ethical conduct of research, and additional codes of ethics as appropriate
to context
1
Use reflection and self-regulation to manage personal values and maintain professionalism in practice
situations
7
Demonstrate professional demeanor in behavior; appearance; and oral, written, and electronic communication 10
Use technology ethically and appropriately to facilitate practice outcomes 2
Use supervision and consultation to guide professional judgment and behavior 8
Competency 2: Engage Diversity and Difference in Practice
Behaviors:
Apply and communicate understanding of the importance of diversity and difference in shaping life
experiences in practice at the micro, mezzo, and macro levels
2, 6, 8
Present themselves as learners and engage clients and constituencies as experts of their own experiences 3, 5
Apply self-awareness and self-regulation to manage the influence of personal biases and values in working
with diverse clients and constituencies
1, 7
Competency 3: Advance Human Rights and Social, Economic, and
Environmental Justice
Behaviors:
Apply their understanding of social, economic, and environmental justice to advocate for human rights at the
individual and system levels
3, 10
Engage in practices that advance social, economic, and environmental justice 2, 8
Competency 4: Engage In Practice-informed Research and
Research-informed Practice
Behaviors:
Use practice experience and theory to inform scientific inquiry and research 9
Apply critical thinking to engage in analysis of quantitative and qualitative research methods and research
findings
4
Use and translate research evidence to inform and improve practice, policy, and service delivery 1, 3, 6, 7, 11
Competency 5: Engage in Policy Practice
Behaviors:
Identify social policy at the local, state, and federal level that impacts well-being, service delivery, and access to
social services
10
Assess how social welfare and economic policies impact the delivery of and access to social services 1, 6
Apply critical thinking to analyze, formulate, and advocate for policies that advance human rights and social,
economic, and environmental justice
2, 5
CSWE EPAS 2015 Core Competencies and Behaviors in This Text
A01_NETT8523_06_SE_FM.indd 1 9/30/15 5:23 PM
Competency Chapter
Competency 6: Engage with Individuals, Families, Groups, Organizations, and
Communities
Behaviors:
Apply knowledge of human behavior and the social environment, person-in- environment, and other
multidisciplinary theoretical frameworks to engage with clients and constituencies
7, 5, 9
Use empathy, reflection, and interpersonal skills to effectively engage diverse clients and constituencies 3, 4, 6
Competency 7: Assess Individuals, ...
Submission Requirements Format Microsoft Word (or compatible).docxdeanmtaylor1545
Submission Requirements
? Format: Microsoft Word (or compatible)
? Font: Arial, size 12, double-space
? Citation Style: Follow your school�s preferred style guide
? Length: 2 page
? APA Format
? No resources before 2015
? Must complete all parts to answer the questions
*** will be reviewed for plagiarism prior to all grading
“Your Company” is expanding. The company wants additional network controls to protect their growing network.
Tasks
Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend at least four possible controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security.
Summarize your network security controls in a summary report to management.
You must provide rationale for your choices by explaining how each control makes the environment more secure and what potential flaws the controls have as well.
Global
editionGlo
b
a
l
ed
it
io
n
this is a special edition of an established
title widely used by colleges and universities
throughout the world. Pearson published this
exclusive edition for the benefit of students
outside the United States and Canada. if you
purchased this book within the United States
or Canada you should be aware that it has
been imported without the approval of the
Publisher or author.
Pearson Global Edition
Global
edition
For these Global editions, the editorial team at Pearson has
collaborated with educators across the world to address a
wide range of subjects and requirements, equipping students
with the best possible learning tools. this Global edition
preserves the cutting-edge approach and pedagogy of the
original, but also features alterations, customization, and
adaptation from the north american version.
it
Strategy:
Issues and Practices
M
cK
een
Sm
ith
it Strategy
Issues and Practices
tHiRd edition
James D. McKeen • Heather A. Smith
t
H
iR
d
e
d
it
io
n
McKeen_1292080264_mech.indd 1 28/11/14 12:56 PM
IT STraTegy:
ISSueS and PracTIceS
A01_MCKE0260_03_GE_FM.indd 1 26/11/14 9:32 PM
A01_MCKE0260_03_GE_FM.indd 2 26/11/14 9:32 PM
IT STraTegy:
ISSueS and PracTIceS
T h i r d E d i t i o n
G l o b a l E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco Hoboken
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
A01_MCKE0260_03_GE_FM.indd 3 26/11/14 9:32 PM
Editor in Chief: Stephanie Wall
Head of Learning Asset Acquisition, Global Edition: Laura Dent
Acquisitions Editor: Nicole Sam
Program Manager Team Lead: Ashley Santora
Program Manager: Denise Vaughn
Editorial Assistant: Kaylee Rotella
Assistant Acquisitions Editor, Global Edition: Debapriya Mu.
Submission Requirements Format Microsoft Word (or compatible).docxdavid4611
Submission Requirements
? Format: Microsoft Word (or compatible)
? Font: Arial, size 12, double-space
? Citation Style: Follow your school�s preferred style guide
? Length: 2 page
? APA Format
? No resources before 2015
? Must complete all parts to answer the questions
*** will be reviewed for plagiarism prior to all grading
“Your Company” is expanding. The company wants additional network controls to protect their growing network.
Tasks
Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend at least four possible controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security.
Summarize your network security controls in a summary report to management.
You must provide rationale for your choices by explaining how each control makes the environment more secure and what potential flaws the controls have as well.
Global
editionGlo
b
a
l
ed
it
io
n
this is a special edition of an established
title widely used by colleges and universities
throughout the world. Pearson published this
exclusive edition for the benefit of students
outside the United States and Canada. if you
purchased this book within the United States
or Canada you should be aware that it has
been imported without the approval of the
Publisher or author.
Pearson Global Edition
Global
edition
For these Global editions, the editorial team at Pearson has
collaborated with educators across the world to address a
wide range of subjects and requirements, equipping students
with the best possible learning tools. this Global edition
preserves the cutting-edge approach and pedagogy of the
original, but also features alterations, customization, and
adaptation from the north american version.
it
Strategy:
Issues and Practices
M
cK
een
Sm
ith
it Strategy
Issues and Practices
tHiRd edition
James D. McKeen • Heather A. Smith
t
H
iR
d
e
d
it
io
n
McKeen_1292080264_mech.indd 1 28/11/14 12:56 PM
IT STraTegy:
ISSueS and PracTIceS
A01_MCKE0260_03_GE_FM.indd 1 26/11/14 9:32 PM
A01_MCKE0260_03_GE_FM.indd 2 26/11/14 9:32 PM
IT STraTegy:
ISSueS and PracTIceS
T h i r d E d i t i o n
G l o b a l E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco Hoboken
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
A01_MCKE0260_03_GE_FM.indd 3 26/11/14 9:32 PM
Editor in Chief: Stephanie Wall
Head of Learning Asset Acquisition, Global Edition: Laura Dent
Acquisitions Editor: Nicole Sam
Program Manager Team Lead: Ashley Santora
Program Manager: Denise Vaughn
Editorial Assistant: Kaylee Rotella
Assistant Acquisitions Editor, Global Edition: Debapriya Mu.
Attendance Management A Review Of Good Practice R Supported By The IES Resea...Cassie Romero
The document summarizes research on the factors that influence employee attendance and absence. It groups the factors into four clusters: health and lifestyle, workplace, attitudinal/stress, and domestic. Some key points:
- Health and lifestyle factors like smoking, alcohol use, exercise, and weight directly impact health and absence. Workplaces can support healthier choices.
- Aspects of the working environment like work patterns, team composition, health/safety concerns, travel time, and excessive hours can affect attendance.
- Attitudinal factors such as job satisfaction, career satisfaction, organizational commitment, and stress influence employees' propensity to attend work. Intention to leave and perceptions of the absence culture also impact attendance.
Below is an example to follow :
Thanks
Comprehensive SOAP Exemplar
Purpose: To demonstrate what each section of the SOAP note should include. Remember that Nurse Practitioners treat patients in a holistic manner and your SOAP note should reflect that premise.
Patient Initials: _______ Age: _______ Gender: _______
SUBJECTIVE DATA:
Chief Complaint (CC): Coughing up phlegm and fever
History of Present Illness (HPI): Eddie Myers is a 58 year old African American male who presents today with a productive cough x 3 days, fever, muscle aches, loss of taste and smell for the last three days. He reported that the “cold feels like it is descending into his chest and he can’t eat much”. The cough is nagging and productive. He brought in a few paper towels with expectorated phlegm – yellow/green in color. He has associated symptoms of dyspnea of exertion and fatigue. His Tmax was reported to be 100.3, last night. He has been taking Tylenol 325mg about every 6 hours and the fever breaks, but returns after the medication wears off. He rated the severity of her symptom discomfort at 8/10.
Medications:
1.) Norvasc 10mg daily
2.) Combivent 2 puffs every 6 hours as needed
3.) Advair 500/50 daily
4.) Singulair 10mg daily
5.) Over the counter Tylenol 325mg as needed
6.) Over the counter Benefiber
7.) Flonase 1 spray each night as needed for allergic rhinitis symptoms
Allergies:
Sulfa drugs - rash
Cipro-headache
Past Medical History (PMH):
1.) Asthma
2.) Hypertension
3.) Osteopenia
4.) Allergic rhinitis
5.) Prostate Cancer
Past Surgical History (PSH):
1.) Cholecystectomy 1994
2.) Prostatectomy 1986
Sexual/Reproductive History:
Heterosexual
Personal/Social History:
He has never smoked
Dipped tobacco for 25 years, no longer dipping
Denied ETOH or illicit drug use.
Immunization History:
Covid Vaccine #1 3/2/2021 #2 4/2/2021 Moderna
Influenza Vaccination 10/3/2020
PNV 9/18/2018
Tdap 8/22/2017
Shingles 3/22/2016
Significant Family History:
One sister – with diabetes, dx at age 65
One brother--with prostate CA, dx at age 62. He has 2 daughters, both in 30’s, healthy, living in nearby neighborhood.
Lifestyle:
He works FT as Xray Tech; widowed x 8 years; lives in the city, moderate crime area, with good public transportation. He is a college grad, owns his home and financially stable.
He has a primary care nurse practitioner provider and goes for annual and routine care twice annually and as needed for episodic care. He has medical insurance but often asks for drug samples for cost savings. He has a healthy diet and eating pattern. There are resources and community groups in his area at the senior center but he does not attend. He enjoys golf and walking. He has a good support system composed of family and friends.
Review of Systems:
General: + fatigue since the illness started; + fever, no chills or night sweats; no recent weight gains of losses of significance.
HEENT: no changes in vision or hearing; he does wear glasses and his last ...
Example SOAP NoteDate 010116Patient Initials XXGendeBetseyCalderon89
Example SOAP Note
Date: 01/01/16
Patient Initials: XX
Gender: Female
Age:3 years 5 months
Chief complain: Pain to right ear
HPI: XX is a 3 year and 2-month old female patient accompanied by mother that reports the patient has had mild cold-like symptoms including clear nasal secretions and a dry cough x 6 days. Mother has been using OTC remedies (Zarbee’s) and nasal saline suction with minimal improvement. Now x 2 days, patient is c/o pain to right ear, worse at night, that is causing disrupted sleep. Also reports fever x 1 yesterday of 101.7, irritability and poor appetite. No nausea, no vomiting, no diarrhea, no rash, no recent travel.
Allergies: No Known Allergies
Current Meds: OTC cold medications, no calcium supplements, no herbal supplements.
PMH: No significant medical history. No previous hospitalizations, no previous emergency room visits, no disability, no chronic illness, no abuse/neglect.
Surgical/procedural: No prior surgery.
Exposure: no exposure to contagious disease, no stings, bites, or scratches. No recent travel.
Environmental exposure: No second hand cigarette smoke exposure.
Dietary: Current diet normal for age. Contains grains, dairy, meats, fruits and vegetables.
Family Hx: Paternal grandfather with hypertension. Maternal grandmother with DM Type II.
No family history of asthma, no hepatitis, no history of cancer, no thyroid disorder, no arthritis, no psychiatric disorders, no HIV, No TB, no clotting factor deficiency.
Social History: Patient is cared for at home. Attends daycare 3 times/week.
Review of Systems:
General: Fever and irritability
EENT: Right ear pain, clear nasal secretions, denies eye symptoms, denies redness or discharge from eyes, denies neck symptoms
Oropharynx: Denies sore throat, denies dysphagia, denies excessive drooling, denies mouth sores
Pulmonary: Dry cough, denies shortness of breathe
Cardiovascular: Denies cardiovascular symptoms, denies palpitations, denies chest pain
GI: Poor appetite, denies diarrhea, denies vomiting, denies abdominal pain
GU/ genital: Denies dysuria, denies urinary frequency and urgency
Neuro: Denies headache, denies dizziness, denies LOC
Musculoskeletal: Denies muscular discomfort, denies difficulty with ambulation
Integumentary: Denies skin symptoms, denies rash
Vitals:
Temperature: 99 F
Pulse: 98 bpm
Respiratory Rate: 24 per min
BP: 89/59 mmHg
Height: 40 inches
Weight: 37 pounds
BMI: 69%
Pain: 4/10 (FACES scale)
Physical Exam:
General: Well developed, nourished and hydrated, no acute distress noted.
HEENT
Head: Normocephalic, no evidence of a head injury.
Eyes: Bilat - EOMs intact, PERRLA, no swelling or tenderness of eyelids, no hyperemia of conjunctiva, no eye discharge.
Ears:
Left ear: External auditory canal intact, no erythema, no edema, no discharge noted, tympanic membrane intact, no bulging, not retracted, no fluid behind TM, visible bony landmarks
Right ear: External auditory canal intact, bulgi ...
Much has been written about telecare, and the evidence regarding its use is the subject of debate.
As well as looking at the existing evidence on telecare, this webinar will look at the findings from a new study looking at the use of telecare and put forward ideas for developing practice.
Aimed at: Commissioners and practitioners in adult social care.
View the recording of this webinar.
Partners and subscribers have full access to recorded webinars. Please note: you will need to login to your RiPfA account.
This document provides information about an economics course titled ECON2302 Principles of Microeconomics taught by Dr. Florian Gerth. It includes Dr. Gerth's background and contact information, an outline of the course structure including assessments, lecture topics on the ten principles of economics, and a discussion of how markets work. The document aims to introduce students to the course and provide administration details.
Discussion 1 Please review the chapter once again. Chapter 1 is a.docxcuddietheresa
Discussion 1: Please review the chapter once again. Chapter 1 is a guide for the rest of the book. The book is a compilation of articles that have been selected to address the topics that are addressed in the course. This chapter is a roadmap for the rest of the course. Although we are not going to be reading all of the articles, we see that the chapters that are included in our reading in the course do address the topics of importance that are outlined in the chapter.
Discussion 2: Please answer the following two questions in your main posting this week.
Do you agree or disagree with the skills and competencies that have been identified in the article this week.
What did the authors miss if anything?
Discussion 3: Describe the different ways in which policy models are used.
What are the key lessons for policy modeling, according to this paper?
Based on the examples that are provided, do you agree that these models would be useful? Please explain why or why not.
Discussion 4: Please find a total of 4 websites that are related to modeling policy with simulations. These can be and include eGovPoliNet and others that have been mentioned in the papers, readings or videos. They can be community-based, software based, or other, but make sure they are related to the topics that we are discussing this week.
Please describe the purpose of the website.
What you learned from visiting the website.
Anything else what you want to describe.
Discussion 5: Please find a video from any source that is sharable and post this in the main discussion. The video should cover a technology adoption theory. A technology adoption theory is a theory that is used to describe how and why technology is adopted. Additionally, write a short introduction which describes the theory that the video is covering and why you think this is valuable for discussion this week.
Discussion 6: Question: How would social media affect the early adoption of eco-farming in the 1980’s if it was available in that time period? What are the different ways that it could be applied? Who would be the stakeholders?
Public Administration and Information
Technology
Volume 10
Series Editor
Christopher G. Reddick
San Antonio, Texas, USA
[email protected]
More information about this series at http://www.springer.com/series/10796
[email protected]
Marijn Janssen • Maria A. Wimmer
Ameneh Deljoo
Editors
Policy Practice and Digital
Science
Integrating Complex Systems, Social
Simulation and Public Administration
in Policy Research
2123
[email protected]
Editors
Marijn Janssen Ameneh Deljoo
Faculty of Technology, Policy, and Faculty of Technology, Policy, and
Management Management
Delft University of Technology Delft University of Technology
Delft Delft
The Netherlands The Netherlands
Maria A. Wimmer
Institute for Information Systems Research
University of Koblenz-Landau
Koblenz
Germany
ISBN 978-3-319-12783-5 ISBN 978-3-319-12784-2 (eBook)
Public Administration and Information ...
By: Fiona Fitzgerald, GE Healthcare Canada
At Sherbrooke International Life Sciences Summit - 2nd edition | September 28/29/30 2015
www.sils-sherbrooke.com
This document discusses e-therapies for suicide prevention. It describes the evolution of e-therapies from first generation online books to future smart environments. Benefits include convenience and cost-effectiveness, but evidence of effectiveness is limited. Research on a New Zealand national depression initiative that used an e-therapy program showed decreases in depression scores. Open questions remain around how e-therapies work, effectiveness compared to other therapies, and addressing ethical and privacy issues.
EXAMPLEHPI 45 yo female from the virgin islands admitted forBetseyCalderon89
EXAMPLE
HPI: 45 y/o female from the virgin islands admitted for infected left stump. Transferred to ICU for worsening septic shock with respiratory distress. Last night had active bleeding from stump, surgery at beside. Patient in cardiac arrest x2 with ROSC. 4 units PRBC, 2 FFP, 1 of platelets given.
> PMH: chronic- HTN, PVD, DM, Mitral regurgitation, MI, HFrEF 20-25% (8/17), pulmonary hypertension
> FH: Mother HTN, Father DM.
> SH: Denies use of alcohol, drugs or smoking.
> ALL: NKDA
> MEDS: Metformin 500 mg BID, Metoprolol succinate 100 mg PO daily, aspirin 81 mg PO daily
> Objective
> VS: BP 97/55, HR 98, RR 20, MAP: 69, O2: 100%, Ht: 5'3'', Wt 89 kg, BMI 34.9
> LABS: AST 396/ ALT 63 ^, WBC 14.8 ^, H/H 7.6/30, platelets 350, aPTT 40, Glucose 202 ^, Na 144, K+ 3.9, lactic 10^. BUN 40, creat 3.0. Leg wounds culture: achromobacter. Tracheal aspirate: stenotrophomonas (9/9)
> PE: Anasarca. Mechanical ventilation, diminished breath sounds. Wet gangrene of leg stump debrided. Dry gangrene of right lower extremity. Lines: NG tube, PICC, left IJ.
> Assessment: 1. Septic shock 2. Acute Hypoxic respiratory failure 3. Left stump infection, dry gangrene of RLE 4. Post cardiac arrest 5. Apical thrombus
> Plan :
> 1. Septic shock. Continue vasopressors, levophed currently at 15 mcg/min. Analgesia with fentanyl drip, dilaudid 0.5 mg q4h PRN. Monitor CBC/BMP and lactic levels. Daptomycin to be continued for 6 weeks (from 8/25). Mondays check CKP, ESR, CRP levels while on daptomycin. GI prophylaxis with Pepcid 20 mg IV daily. Glucose checks q8h.
> 2. Acute hypoxic respiratory failure. Continue mechanical ventilation and monitoring of patient oxygenation. Fio2 successfully titrated from 60 to 40%.
> 3. Left stump infection, dry gangrene of RLE. Zosyn 3.375 IV to be continued for 6 weeks from 8/25. Consult ID.
> 4. Pending CT brain post cardiac arrest.
> 5. DVT prophylaxis with heparin drip (apical thrombus). Continue to monitor coagulation levels.
EVIDENCE-BASED PRACTICE
FOR NURSES
Appraisal and Application of Research
2
THE PEDAGOGY
Evidence-Based Practice for Nurses: Appraisal and Application of Research,
Third Edition, drives comprehension through various strategies that meet the
learning needs of students, while also generating enthusiasm about the topic. This
interactive approach addresses different learning styles, making this the ideal text
to ensure mastery of key concepts. The pedagogical aids that appear in most
chapters include the following:
3
Chapter Objectives
These objectives provide instructors and students with a snapshot of the key
information they will encounter in each chapter. They serve as a checklist to
help guide and focus study.
Key Terms
Found in a list at the beginning of each chapter and in bold within the chapter,
these terms will create an expanded vocabulary in evidence-based practice.
Critical Thinking Exercises An integral part of the learning process, critical-
thinking scenarios and questions are pres ...
Chamberlain College of NursingNR351 Transitions in Professional .docxsleeperharwell
Chamberlain College of Nursing NR351 Transitions in Professional Nursing
Time Management Plan Template
Student Name:Date:
Directions:
1. Carefully read the Time Management Plan Guidelines and Grading Rubric found under Week 2 Assignments, which provides specific details on how to complete this assignment.
2. Rename this template by clicking File, then Save As. Change the file name so it reads Your Last Name Time Management Plan.docx. For example, if your last name is Smith, type Smith Time Management Plan.docx.
3. Save the document as a .docx compatible with Microsoft Word 2010 or later.
4. Type your name and date at the top of this template.
5. Type your answers directly on the template. Follow all instructions. Save frequently to prevent loss of your work.
6. Prior to the due date, post general questions about this assignment to the Q & A Forum so your classmates can read the advice, too. You may also e-mail private questions to your instructor.
7. Submit this assignment by clicking on the orange Submit Assignment button on the Week 2 Time Management Plan Assignment page by the end of Week 2, Sunday at 11:59 p.m. MT.
NOTE: Assigned Template MUST be used for this assignment. Failure to do so may result in loss of points and/or Academic Integrity violation investigation.
Times
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday
12 a.m.–1 a.m.
1 a.m.–2 a.m.
2 a.m.–3 a.m.
3 a.m.–4 a.m.
4 a.m.–5 a.m.
5 a.m.–6 a.m.
6 a.m.–7 a.m.
7 a.m.–8 a.m.
8 a.m.–9 a.m.
9 a.m.–10 a.m.
10 a.m.–11 a.m.
11 a.m.–12 p.m.
12 p.m.–1 p.m.
1 p.m.–2 p.m.
2 p.m.–3 p.m.
3 p.m.–4 p.m.
4 p.m.–5 p.m.
5 p.m.–6 p.m.
6 p.m.–7 p.m.
7 p.m.–8 p.m.
8 p.m.–9 p.m.
9 p.m.–10 p.m.
10 p.m.–11 p.m.
11 p.m.–12 a.m.
Academic Integrity Policy Attestation:
By typing my name in the box to the right, I attest and affirm that I have watched the entire Integrity Matters Tutorial and will comply with the Academic Integrity Policy of Chamberlain College of Nursing.
Answer:
Academic Integrity Question #1:
What is one example of plagiarism that was mentioned in the Chamberlain Integrity Matters Tutorial?
Answer:
Academic Integrity Question #2:
Other than not sharing passwords, what is one way students can avoid plagiarism that was mentioned in the Chamberlain Integrity Matters Tutorial?
Answer:
Self-Evaluation: Challenges (see Rubric)
What are your greatest challenges with time management?
Answer:
Self-Evaluation: Strategies (see Rubric)
What effective strategies will you use to overcome these challenges?
Answer:
Time Management Plan Template.docx 1/17/2020 cjm/sm
4
A case study of health
and agriculture social
enterprises in Kenya
Eliada Griffin-EL and Emily Darko .
This document discusses research evaluation and the use of quantitative indicators and bibliometrics. It notes that indicators are used to assess research quality and impact when direct assessment is not possible. Multiple indicators that consider field, time, and location are needed to account for differences. Bibliometric data on publications and citations are widely used but must be adjusted for field and time. Tracking broader economic and social impacts is challenging but important. Overall, quantitative indicators provide information to help distribute resources selectively while maintaining confidence, though no single indicator can fully capture research quality or impact.
The document is a student assignment on the topic of whether computer hacking is ethical. It begins with an introduction to ethics and definitions of key concepts like utilitarianism. It then provides context for why the topic was selected and introduces computer hacking and the original hacker ethics from the 1960s. The main section discusses whether hacking is ethical based on four views of ethics. It concludes that hacking can be considered ethical if it follows the principles of not harming systems and helps improve security.
The document provides information about the SBRI Healthcare Programme, which is an NHS England funded initiative that uses innovation to help address challenges in the public sector healthcare system. It outlines key features of the SBRI process, including that it provides 100% funded R&D contracts for innovative suppliers to engage with the public sector. It notes upcoming competitions through the programme, including ones focused on improving patient flow and operational efficiency in acute care settings, and developing tools to support self-care and independence for children with long-term conditions. Contact details are provided for those interested in learning more or applying to the programme.
This document summarizes previous research on television viewing habits and preferences among youth. Studies have found that youth spend significant time watching TV, preferring entertainment programs over educational content. Research also shows TV influences youth attitudes on topics like gender roles and music preferences. Marketers are interested in understanding youth TV consumption patterns to better target advertising. However, analyzing uniform patterns is difficult as individual tastes vary. This study aims to understand urban Cochin youth's preferred TV channels, genres and viewing times.
Apollo 13 Physics Essay. Online assignment writing service.Andrea Briggs
The document provides instructions for creating an account and submitting assignment requests on the website HelpWriting.net. Users must register with an email and password, then complete a form with assignment details, preferred sources, and deadline. Writers will bid on the request, and the user can choose a writer based on qualifications, history, and feedback. After receiving the paper, the user can request revisions if needed. The website aims to match users with high-quality original content and stand by refund guarantees if plagiarism occurs.
Develop a detailed outline for the data collection plan to include .docxbradburgess22840
The document outlines the requirements for a data collection plan, including obtaining permissions, proposing a sampling approach, outlining the collection steps for each instrument and data source, and including a data management plan. It also instructs to incorporate feedback to revise the sources of data/instruments and data collection sections of a prospectus.
Develop a 3–4 page research paper based on a selected case study rel.docxbradburgess22840
Develop a 3–4 page research paper based on a selected case study related to reproductive choices. Since the processes of reproduction and birth represent one of the potential biological outcomes of heterosexual activity, it is important to examine the biological foundations of human sexuality. This includes knowledge of fertilization and early development, including some of the most recent findings. There is more than a litany of birth control methods; this assessment offers a sound basis for understanding the issues to be weighed in personal decision making about contraception and abortion, which continue to generate debate and controversy.
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency 1: Apply psychological theories to topics in human sexuality.
Apply psychological theories to a case study in human sexuality.
Competency 2: Apply scholarly research findings to topics in human sexuality.
Apply scholarly research findings to a case study in human sexuality.
Competency 3: Explain how ethics inform professional behavior in the field of human sexuality.
Explain how ethics inform professional behavior in the field of human sexuality.
Competency 4: Communicate in a manner that is scholarly, professional, and consistent with expectations for professionals in the field of psychology.
Write coherently to support a central idea with correct grammar, usage, and mechanics as expected of a psychology professional.
Use APA format and style.
APA Resources
Because this is a psychology course, you need to format this assessment according to APA guidelines. Additional resources about APA can be found in the Research Resources in the left navigation menu of your courseroom. Use the resources to guide your work as needed.
American Psychological Association. (2010).
Publication manual of the American Psychological Association
(6th ed.). Washington, DC: Author.
Available from the
bookstore
.
APA Paper Template [DOCX]
.
Required Resources
The following resource is required to complete the assessment.
Human Sexuality Case Studies: Sexuality Confronts Social Policy
|
Transcript
.
Suggested Resources
The resources provided here are optional and support the assessment. They provide helpful information about the topics. You may use other resources of your choice to prepare for this assessment; however, you will need to ensure that they are appropriate, credible, and valid. The
PSYC-FP2800 – Introduction to Human Sexuality Library Guide
can help direct your research. The Supplemental Resources and Research Resources, both linked from the left navigation menu in your courseroom, provide additional resources to help support you.
Human Sexuality and Reproductive Choices
Kelly, G. F. (2015).
Sexuality today
(11th ed.). New York, NY: McGraw-Hill.
Available from the
bookstore
.
Chapter 10, "Reprod.
More Related Content
Similar to DERMATOLOGY CASE STUDYChief complaint My right great toe has.docx
Attendance Management A Review Of Good Practice R Supported By The IES Resea...Cassie Romero
The document summarizes research on the factors that influence employee attendance and absence. It groups the factors into four clusters: health and lifestyle, workplace, attitudinal/stress, and domestic. Some key points:
- Health and lifestyle factors like smoking, alcohol use, exercise, and weight directly impact health and absence. Workplaces can support healthier choices.
- Aspects of the working environment like work patterns, team composition, health/safety concerns, travel time, and excessive hours can affect attendance.
- Attitudinal factors such as job satisfaction, career satisfaction, organizational commitment, and stress influence employees' propensity to attend work. Intention to leave and perceptions of the absence culture also impact attendance.
Below is an example to follow :
Thanks
Comprehensive SOAP Exemplar
Purpose: To demonstrate what each section of the SOAP note should include. Remember that Nurse Practitioners treat patients in a holistic manner and your SOAP note should reflect that premise.
Patient Initials: _______ Age: _______ Gender: _______
SUBJECTIVE DATA:
Chief Complaint (CC): Coughing up phlegm and fever
History of Present Illness (HPI): Eddie Myers is a 58 year old African American male who presents today with a productive cough x 3 days, fever, muscle aches, loss of taste and smell for the last three days. He reported that the “cold feels like it is descending into his chest and he can’t eat much”. The cough is nagging and productive. He brought in a few paper towels with expectorated phlegm – yellow/green in color. He has associated symptoms of dyspnea of exertion and fatigue. His Tmax was reported to be 100.3, last night. He has been taking Tylenol 325mg about every 6 hours and the fever breaks, but returns after the medication wears off. He rated the severity of her symptom discomfort at 8/10.
Medications:
1.) Norvasc 10mg daily
2.) Combivent 2 puffs every 6 hours as needed
3.) Advair 500/50 daily
4.) Singulair 10mg daily
5.) Over the counter Tylenol 325mg as needed
6.) Over the counter Benefiber
7.) Flonase 1 spray each night as needed for allergic rhinitis symptoms
Allergies:
Sulfa drugs - rash
Cipro-headache
Past Medical History (PMH):
1.) Asthma
2.) Hypertension
3.) Osteopenia
4.) Allergic rhinitis
5.) Prostate Cancer
Past Surgical History (PSH):
1.) Cholecystectomy 1994
2.) Prostatectomy 1986
Sexual/Reproductive History:
Heterosexual
Personal/Social History:
He has never smoked
Dipped tobacco for 25 years, no longer dipping
Denied ETOH or illicit drug use.
Immunization History:
Covid Vaccine #1 3/2/2021 #2 4/2/2021 Moderna
Influenza Vaccination 10/3/2020
PNV 9/18/2018
Tdap 8/22/2017
Shingles 3/22/2016
Significant Family History:
One sister – with diabetes, dx at age 65
One brother--with prostate CA, dx at age 62. He has 2 daughters, both in 30’s, healthy, living in nearby neighborhood.
Lifestyle:
He works FT as Xray Tech; widowed x 8 years; lives in the city, moderate crime area, with good public transportation. He is a college grad, owns his home and financially stable.
He has a primary care nurse practitioner provider and goes for annual and routine care twice annually and as needed for episodic care. He has medical insurance but often asks for drug samples for cost savings. He has a healthy diet and eating pattern. There are resources and community groups in his area at the senior center but he does not attend. He enjoys golf and walking. He has a good support system composed of family and friends.
Review of Systems:
General: + fatigue since the illness started; + fever, no chills or night sweats; no recent weight gains of losses of significance.
HEENT: no changes in vision or hearing; he does wear glasses and his last ...
Example SOAP NoteDate 010116Patient Initials XXGendeBetseyCalderon89
Example SOAP Note
Date: 01/01/16
Patient Initials: XX
Gender: Female
Age:3 years 5 months
Chief complain: Pain to right ear
HPI: XX is a 3 year and 2-month old female patient accompanied by mother that reports the patient has had mild cold-like symptoms including clear nasal secretions and a dry cough x 6 days. Mother has been using OTC remedies (Zarbee’s) and nasal saline suction with minimal improvement. Now x 2 days, patient is c/o pain to right ear, worse at night, that is causing disrupted sleep. Also reports fever x 1 yesterday of 101.7, irritability and poor appetite. No nausea, no vomiting, no diarrhea, no rash, no recent travel.
Allergies: No Known Allergies
Current Meds: OTC cold medications, no calcium supplements, no herbal supplements.
PMH: No significant medical history. No previous hospitalizations, no previous emergency room visits, no disability, no chronic illness, no abuse/neglect.
Surgical/procedural: No prior surgery.
Exposure: no exposure to contagious disease, no stings, bites, or scratches. No recent travel.
Environmental exposure: No second hand cigarette smoke exposure.
Dietary: Current diet normal for age. Contains grains, dairy, meats, fruits and vegetables.
Family Hx: Paternal grandfather with hypertension. Maternal grandmother with DM Type II.
No family history of asthma, no hepatitis, no history of cancer, no thyroid disorder, no arthritis, no psychiatric disorders, no HIV, No TB, no clotting factor deficiency.
Social History: Patient is cared for at home. Attends daycare 3 times/week.
Review of Systems:
General: Fever and irritability
EENT: Right ear pain, clear nasal secretions, denies eye symptoms, denies redness or discharge from eyes, denies neck symptoms
Oropharynx: Denies sore throat, denies dysphagia, denies excessive drooling, denies mouth sores
Pulmonary: Dry cough, denies shortness of breathe
Cardiovascular: Denies cardiovascular symptoms, denies palpitations, denies chest pain
GI: Poor appetite, denies diarrhea, denies vomiting, denies abdominal pain
GU/ genital: Denies dysuria, denies urinary frequency and urgency
Neuro: Denies headache, denies dizziness, denies LOC
Musculoskeletal: Denies muscular discomfort, denies difficulty with ambulation
Integumentary: Denies skin symptoms, denies rash
Vitals:
Temperature: 99 F
Pulse: 98 bpm
Respiratory Rate: 24 per min
BP: 89/59 mmHg
Height: 40 inches
Weight: 37 pounds
BMI: 69%
Pain: 4/10 (FACES scale)
Physical Exam:
General: Well developed, nourished and hydrated, no acute distress noted.
HEENT
Head: Normocephalic, no evidence of a head injury.
Eyes: Bilat - EOMs intact, PERRLA, no swelling or tenderness of eyelids, no hyperemia of conjunctiva, no eye discharge.
Ears:
Left ear: External auditory canal intact, no erythema, no edema, no discharge noted, tympanic membrane intact, no bulging, not retracted, no fluid behind TM, visible bony landmarks
Right ear: External auditory canal intact, bulgi ...
Much has been written about telecare, and the evidence regarding its use is the subject of debate.
As well as looking at the existing evidence on telecare, this webinar will look at the findings from a new study looking at the use of telecare and put forward ideas for developing practice.
Aimed at: Commissioners and practitioners in adult social care.
View the recording of this webinar.
Partners and subscribers have full access to recorded webinars. Please note: you will need to login to your RiPfA account.
This document provides information about an economics course titled ECON2302 Principles of Microeconomics taught by Dr. Florian Gerth. It includes Dr. Gerth's background and contact information, an outline of the course structure including assessments, lecture topics on the ten principles of economics, and a discussion of how markets work. The document aims to introduce students to the course and provide administration details.
Discussion 1 Please review the chapter once again. Chapter 1 is a.docxcuddietheresa
Discussion 1: Please review the chapter once again. Chapter 1 is a guide for the rest of the book. The book is a compilation of articles that have been selected to address the topics that are addressed in the course. This chapter is a roadmap for the rest of the course. Although we are not going to be reading all of the articles, we see that the chapters that are included in our reading in the course do address the topics of importance that are outlined in the chapter.
Discussion 2: Please answer the following two questions in your main posting this week.
Do you agree or disagree with the skills and competencies that have been identified in the article this week.
What did the authors miss if anything?
Discussion 3: Describe the different ways in which policy models are used.
What are the key lessons for policy modeling, according to this paper?
Based on the examples that are provided, do you agree that these models would be useful? Please explain why or why not.
Discussion 4: Please find a total of 4 websites that are related to modeling policy with simulations. These can be and include eGovPoliNet and others that have been mentioned in the papers, readings or videos. They can be community-based, software based, or other, but make sure they are related to the topics that we are discussing this week.
Please describe the purpose of the website.
What you learned from visiting the website.
Anything else what you want to describe.
Discussion 5: Please find a video from any source that is sharable and post this in the main discussion. The video should cover a technology adoption theory. A technology adoption theory is a theory that is used to describe how and why technology is adopted. Additionally, write a short introduction which describes the theory that the video is covering and why you think this is valuable for discussion this week.
Discussion 6: Question: How would social media affect the early adoption of eco-farming in the 1980’s if it was available in that time period? What are the different ways that it could be applied? Who would be the stakeholders?
Public Administration and Information
Technology
Volume 10
Series Editor
Christopher G. Reddick
San Antonio, Texas, USA
[email protected]
More information about this series at http://www.springer.com/series/10796
[email protected]
Marijn Janssen • Maria A. Wimmer
Ameneh Deljoo
Editors
Policy Practice and Digital
Science
Integrating Complex Systems, Social
Simulation and Public Administration
in Policy Research
2123
[email protected]
Editors
Marijn Janssen Ameneh Deljoo
Faculty of Technology, Policy, and Faculty of Technology, Policy, and
Management Management
Delft University of Technology Delft University of Technology
Delft Delft
The Netherlands The Netherlands
Maria A. Wimmer
Institute for Information Systems Research
University of Koblenz-Landau
Koblenz
Germany
ISBN 978-3-319-12783-5 ISBN 978-3-319-12784-2 (eBook)
Public Administration and Information ...
By: Fiona Fitzgerald, GE Healthcare Canada
At Sherbrooke International Life Sciences Summit - 2nd edition | September 28/29/30 2015
www.sils-sherbrooke.com
This document discusses e-therapies for suicide prevention. It describes the evolution of e-therapies from first generation online books to future smart environments. Benefits include convenience and cost-effectiveness, but evidence of effectiveness is limited. Research on a New Zealand national depression initiative that used an e-therapy program showed decreases in depression scores. Open questions remain around how e-therapies work, effectiveness compared to other therapies, and addressing ethical and privacy issues.
EXAMPLEHPI 45 yo female from the virgin islands admitted forBetseyCalderon89
EXAMPLE
HPI: 45 y/o female from the virgin islands admitted for infected left stump. Transferred to ICU for worsening septic shock with respiratory distress. Last night had active bleeding from stump, surgery at beside. Patient in cardiac arrest x2 with ROSC. 4 units PRBC, 2 FFP, 1 of platelets given.
> PMH: chronic- HTN, PVD, DM, Mitral regurgitation, MI, HFrEF 20-25% (8/17), pulmonary hypertension
> FH: Mother HTN, Father DM.
> SH: Denies use of alcohol, drugs or smoking.
> ALL: NKDA
> MEDS: Metformin 500 mg BID, Metoprolol succinate 100 mg PO daily, aspirin 81 mg PO daily
> Objective
> VS: BP 97/55, HR 98, RR 20, MAP: 69, O2: 100%, Ht: 5'3'', Wt 89 kg, BMI 34.9
> LABS: AST 396/ ALT 63 ^, WBC 14.8 ^, H/H 7.6/30, platelets 350, aPTT 40, Glucose 202 ^, Na 144, K+ 3.9, lactic 10^. BUN 40, creat 3.0. Leg wounds culture: achromobacter. Tracheal aspirate: stenotrophomonas (9/9)
> PE: Anasarca. Mechanical ventilation, diminished breath sounds. Wet gangrene of leg stump debrided. Dry gangrene of right lower extremity. Lines: NG tube, PICC, left IJ.
> Assessment: 1. Septic shock 2. Acute Hypoxic respiratory failure 3. Left stump infection, dry gangrene of RLE 4. Post cardiac arrest 5. Apical thrombus
> Plan :
> 1. Septic shock. Continue vasopressors, levophed currently at 15 mcg/min. Analgesia with fentanyl drip, dilaudid 0.5 mg q4h PRN. Monitor CBC/BMP and lactic levels. Daptomycin to be continued for 6 weeks (from 8/25). Mondays check CKP, ESR, CRP levels while on daptomycin. GI prophylaxis with Pepcid 20 mg IV daily. Glucose checks q8h.
> 2. Acute hypoxic respiratory failure. Continue mechanical ventilation and monitoring of patient oxygenation. Fio2 successfully titrated from 60 to 40%.
> 3. Left stump infection, dry gangrene of RLE. Zosyn 3.375 IV to be continued for 6 weeks from 8/25. Consult ID.
> 4. Pending CT brain post cardiac arrest.
> 5. DVT prophylaxis with heparin drip (apical thrombus). Continue to monitor coagulation levels.
EVIDENCE-BASED PRACTICE
FOR NURSES
Appraisal and Application of Research
2
THE PEDAGOGY
Evidence-Based Practice for Nurses: Appraisal and Application of Research,
Third Edition, drives comprehension through various strategies that meet the
learning needs of students, while also generating enthusiasm about the topic. This
interactive approach addresses different learning styles, making this the ideal text
to ensure mastery of key concepts. The pedagogical aids that appear in most
chapters include the following:
3
Chapter Objectives
These objectives provide instructors and students with a snapshot of the key
information they will encounter in each chapter. They serve as a checklist to
help guide and focus study.
Key Terms
Found in a list at the beginning of each chapter and in bold within the chapter,
these terms will create an expanded vocabulary in evidence-based practice.
Critical Thinking Exercises An integral part of the learning process, critical-
thinking scenarios and questions are pres ...
Chamberlain College of NursingNR351 Transitions in Professional .docxsleeperharwell
Chamberlain College of Nursing NR351 Transitions in Professional Nursing
Time Management Plan Template
Student Name:Date:
Directions:
1. Carefully read the Time Management Plan Guidelines and Grading Rubric found under Week 2 Assignments, which provides specific details on how to complete this assignment.
2. Rename this template by clicking File, then Save As. Change the file name so it reads Your Last Name Time Management Plan.docx. For example, if your last name is Smith, type Smith Time Management Plan.docx.
3. Save the document as a .docx compatible with Microsoft Word 2010 or later.
4. Type your name and date at the top of this template.
5. Type your answers directly on the template. Follow all instructions. Save frequently to prevent loss of your work.
6. Prior to the due date, post general questions about this assignment to the Q & A Forum so your classmates can read the advice, too. You may also e-mail private questions to your instructor.
7. Submit this assignment by clicking on the orange Submit Assignment button on the Week 2 Time Management Plan Assignment page by the end of Week 2, Sunday at 11:59 p.m. MT.
NOTE: Assigned Template MUST be used for this assignment. Failure to do so may result in loss of points and/or Academic Integrity violation investigation.
Times
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Sunday
12 a.m.–1 a.m.
1 a.m.–2 a.m.
2 a.m.–3 a.m.
3 a.m.–4 a.m.
4 a.m.–5 a.m.
5 a.m.–6 a.m.
6 a.m.–7 a.m.
7 a.m.–8 a.m.
8 a.m.–9 a.m.
9 a.m.–10 a.m.
10 a.m.–11 a.m.
11 a.m.–12 p.m.
12 p.m.–1 p.m.
1 p.m.–2 p.m.
2 p.m.–3 p.m.
3 p.m.–4 p.m.
4 p.m.–5 p.m.
5 p.m.–6 p.m.
6 p.m.–7 p.m.
7 p.m.–8 p.m.
8 p.m.–9 p.m.
9 p.m.–10 p.m.
10 p.m.–11 p.m.
11 p.m.–12 a.m.
Academic Integrity Policy Attestation:
By typing my name in the box to the right, I attest and affirm that I have watched the entire Integrity Matters Tutorial and will comply with the Academic Integrity Policy of Chamberlain College of Nursing.
Answer:
Academic Integrity Question #1:
What is one example of plagiarism that was mentioned in the Chamberlain Integrity Matters Tutorial?
Answer:
Academic Integrity Question #2:
Other than not sharing passwords, what is one way students can avoid plagiarism that was mentioned in the Chamberlain Integrity Matters Tutorial?
Answer:
Self-Evaluation: Challenges (see Rubric)
What are your greatest challenges with time management?
Answer:
Self-Evaluation: Strategies (see Rubric)
What effective strategies will you use to overcome these challenges?
Answer:
Time Management Plan Template.docx 1/17/2020 cjm/sm
4
A case study of health
and agriculture social
enterprises in Kenya
Eliada Griffin-EL and Emily Darko .
This document discusses research evaluation and the use of quantitative indicators and bibliometrics. It notes that indicators are used to assess research quality and impact when direct assessment is not possible. Multiple indicators that consider field, time, and location are needed to account for differences. Bibliometric data on publications and citations are widely used but must be adjusted for field and time. Tracking broader economic and social impacts is challenging but important. Overall, quantitative indicators provide information to help distribute resources selectively while maintaining confidence, though no single indicator can fully capture research quality or impact.
The document is a student assignment on the topic of whether computer hacking is ethical. It begins with an introduction to ethics and definitions of key concepts like utilitarianism. It then provides context for why the topic was selected and introduces computer hacking and the original hacker ethics from the 1960s. The main section discusses whether hacking is ethical based on four views of ethics. It concludes that hacking can be considered ethical if it follows the principles of not harming systems and helps improve security.
The document provides information about the SBRI Healthcare Programme, which is an NHS England funded initiative that uses innovation to help address challenges in the public sector healthcare system. It outlines key features of the SBRI process, including that it provides 100% funded R&D contracts for innovative suppliers to engage with the public sector. It notes upcoming competitions through the programme, including ones focused on improving patient flow and operational efficiency in acute care settings, and developing tools to support self-care and independence for children with long-term conditions. Contact details are provided for those interested in learning more or applying to the programme.
This document summarizes previous research on television viewing habits and preferences among youth. Studies have found that youth spend significant time watching TV, preferring entertainment programs over educational content. Research also shows TV influences youth attitudes on topics like gender roles and music preferences. Marketers are interested in understanding youth TV consumption patterns to better target advertising. However, analyzing uniform patterns is difficult as individual tastes vary. This study aims to understand urban Cochin youth's preferred TV channels, genres and viewing times.
Apollo 13 Physics Essay. Online assignment writing service.Andrea Briggs
The document provides instructions for creating an account and submitting assignment requests on the website HelpWriting.net. Users must register with an email and password, then complete a form with assignment details, preferred sources, and deadline. Writers will bid on the request, and the user can choose a writer based on qualifications, history, and feedback. After receiving the paper, the user can request revisions if needed. The website aims to match users with high-quality original content and stand by refund guarantees if plagiarism occurs.
Similar to DERMATOLOGY CASE STUDYChief complaint My right great toe has.docx (20)
Develop a detailed outline for the data collection plan to include .docxbradburgess22840
The document outlines the requirements for a data collection plan, including obtaining permissions, proposing a sampling approach, outlining the collection steps for each instrument and data source, and including a data management plan. It also instructs to incorporate feedback to revise the sources of data/instruments and data collection sections of a prospectus.
Develop a 3–4 page research paper based on a selected case study rel.docxbradburgess22840
Develop a 3–4 page research paper based on a selected case study related to reproductive choices. Since the processes of reproduction and birth represent one of the potential biological outcomes of heterosexual activity, it is important to examine the biological foundations of human sexuality. This includes knowledge of fertilization and early development, including some of the most recent findings. There is more than a litany of birth control methods; this assessment offers a sound basis for understanding the issues to be weighed in personal decision making about contraception and abortion, which continue to generate debate and controversy.
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency 1: Apply psychological theories to topics in human sexuality.
Apply psychological theories to a case study in human sexuality.
Competency 2: Apply scholarly research findings to topics in human sexuality.
Apply scholarly research findings to a case study in human sexuality.
Competency 3: Explain how ethics inform professional behavior in the field of human sexuality.
Explain how ethics inform professional behavior in the field of human sexuality.
Competency 4: Communicate in a manner that is scholarly, professional, and consistent with expectations for professionals in the field of psychology.
Write coherently to support a central idea with correct grammar, usage, and mechanics as expected of a psychology professional.
Use APA format and style.
APA Resources
Because this is a psychology course, you need to format this assessment according to APA guidelines. Additional resources about APA can be found in the Research Resources in the left navigation menu of your courseroom. Use the resources to guide your work as needed.
American Psychological Association. (2010).
Publication manual of the American Psychological Association
(6th ed.). Washington, DC: Author.
Available from the
bookstore
.
APA Paper Template [DOCX]
.
Required Resources
The following resource is required to complete the assessment.
Human Sexuality Case Studies: Sexuality Confronts Social Policy
|
Transcript
.
Suggested Resources
The resources provided here are optional and support the assessment. They provide helpful information about the topics. You may use other resources of your choice to prepare for this assessment; however, you will need to ensure that they are appropriate, credible, and valid. The
PSYC-FP2800 – Introduction to Human Sexuality Library Guide
can help direct your research. The Supplemental Resources and Research Resources, both linked from the left navigation menu in your courseroom, provide additional resources to help support you.
Human Sexuality and Reproductive Choices
Kelly, G. F. (2015).
Sexuality today
(11th ed.). New York, NY: McGraw-Hill.
Available from the
bookstore
.
Chapter 10, "Reprod.
Develop a 5- to 6-slide PowerPoint presentation for a staff meet.docxbradburgess22840
Develop a 5- to 6-slide PowerPoint presentation for a staff meeting that addresses the following:
Identify your selected transition of care. ------" Transitions of care” refer to the movement of patients between health care practitioners, settings, and home as their condition and care need change. For example, a patient might receive care from a primary care physician or specialist in an outpatient setting, then transition to a hospital physician and nursing team during an inpatient admission before moving on to yet another care team at a skilled nursing facility. Finally, the patient might return home, where he or she may receive care from a visiting nurse or support from a family member or friend.
Explain how you, as a nurse leader, along with your healthcare team, would apply systems thinking when providing a transition of care aligned with the IHI Quadruple Aim framework in order to improve it. Explain what the fourth aim in your strategy would be and why.
These are the four areas:
Experience of care
Population health
Per capita cost
Care team well-being
Describe the key stakeholders that might be involved in this transition of care and how you would engage and influence them to improve the transition of care processes.
Explain how systems thinking would inform your improvement plan for your transition of care.
.
Develop a 5–10-year strategic plan for achieving specific health.docxbradburgess22840
Develop a 5–10-year strategic plan for achieving specific health care quality and safety improvements, based on the analysis you completed in Assessment 1. Use either an AI approach or your SWOT analysis and a chosen strategic planning model.
Note:
Each assessment in this course builds on the work you completed in the previous assessment. Therefore, you must complete the assessments in this course in the order in which they are presented.
SHOW LESS
Evaluation of strategic choices is important. The methods for selecting strategic alternatives help leaders organize significant issues to support decision making. However, it is important that the techniques do not make the decision. Rather, leaders should use the techniques to reveal the inherent situation and to organize their thought processes. This assessment provides you with an opportunity to evaluate and apply some of the techniques for successful strategy development and implementation.
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency 1: Evaluate qualities and skills that promote effective leadership within health care organizations.
Evaluate the leadership qualities and skills that will be most important to successfully implementing a strategic plan and sustaining strategic direction.
Competency 2: Apply strategies to lead high-performing health care teams to meet organizational quality and safety goals.
Develop strategic goal statements and outcomes that support the achievement of specific quality and safety improvements for a care setting.
Justify the relevance of proposed strategic goals and outcomes in relation to the mission, vision, and values of a care setting.
Competency 3: Apply cultural, ethical, and regulatory considerations to leadership decision making.
Analyze the extent to which strategic goals and outcomes address the use of technology and the ethical, cultural, and regulatory environments.
Competency 4: Integrate leadership and health care theories into the role of the nurse leader.
Explain how relevant leadership and health care theories will be used to help achieve proposed strategic goals and objectives.
Competency 5: Communicate with stakeholders and constituencies to build collaborative partnerships and create inclusive work environments.
Communicate analyses clearly and in a way that demonstrates professionalism and respect for stakeholders and colleagues.
Integrate relevant and credible sources of evidence to support assertions, correctly formatting citations and references using APA style.
Suggested Resources
The resources provided here are optional. You may use other resources of your choice to prepare for this assessment; however, you will need to ensure that they are appropriate, credible, and valid. The
MSN-FP6210: Leadership and Management for Nurse Executives Library Guide
can help direct your res.
Develop a 2–4-page proposal for a policy that should help to imp.docxbradburgess22840
Develop a 2–4-page proposal for a policy that should help to improve health care and outcomes for your target population.
Note
: Each assessment in this course builds on the work you completed in the previous assessment. Therefore, you must complete the assessments in this course in the order in which they are presented.
Cost and access to care continue to be main concerns for patients and providers. As technology improves our ability to care for and improve outcomes in patients with chronic and complex illnesses, questions of cost and access become increasingly important. As a master’s-prepared nurse, you must be able to develop policies that will ensure the delivery of care that is effective and can be provided in an ethical and equitable manner.
SHOW LESS
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency 1: Design evidence-based advanced nursing care for achieving high-quality population outcomes.
Propose a policy and guidelines that will lead to improved outcomes and quality of care for a specific issue in a target population.
Competency 2: Evaluate the efficiency and effectiveness of interprofessional interventions in achieving desired population health outcomes.
Analyze the potential for an interprofessional approach to implementing a proposed policy to increase the efficiency or effectiveness of the care setting to achieve high quality outcomes.
Competency 3: Analyze population health outcomes in terms of their implications for health policy advocacy.
Advocate the need for a proposed policy in the context of current outcomes and quality of care for a specific issue in a target population.
Competency 4: Communicate effectively with diverse audiences, in an appropriate form and style, consistent with organizational, professional, and scholarly standards.
Communicate proposal in a professional and persuasive manner, writing content clearly and logically with correct use of grammar, punctuation, and spelling.
Integrate relevant sources to support assertions, correctly formatting citations and references using APA style.
CONTEXT:
As a master's-prepared nurse, you have a valuable viewpoint and voice with which to advocate for policy developments. As a nurse leader and health care practitioner, often on the front lines of helping individuals and populations, you are able to articulate and advocate for the patient more than any other professional group in health care. This is especially true of populations that may be underserved, underrepresented, or are otherwise lacking a voice. By advocating for and developing policies, you are able to help drive improvements in outcomes for specific populations. The policies you advocate for could be internal ones (just within a specific department or health care setting) that ensure quality care and compliance. Or they could be external policies (local, st.
Develop a 10- to 12- slide PowerPoint Presentation designed for .docxbradburgess22840
Develop a 10- to 12- slide PowerPoint Presentation designed for training the staff at a local high school. The PowerPoint Presentation should focus on strategies that promote communication skills among adolescents.
Students are encouraged to approach the assignment creatively, adding graphics, visuals, charts and/or graphs to their work. Slides should be designed to address the selected topic clearly and concisely. Each slide should be developed with professional presentation style (e.g., bulleted items in brief statements rather than complete sentences). Notes should complement the slides and provide details useful to the speaker if an oral presentation were to be given.
Creating the PowerPoint Presentation
The PowerPoint Presentation:
Must be 10 to 12 slides, and formatted according to APA style as outlined by the Ashford Writing Center.
Must include a title slide with the following:
Title of the training
Student’s name
Course name and number
Instructor’s name
Date submitted
Must present a thesis statement regarding why social skills training would be appropriate for adolescents.
Must explain different types of communication (e.g., aggressive and assertive).
Must share four strategies on how adolescents could improve their communication skills.
Must create at least three hypothetical scenarios of problems that adolescents might encounter, including one that involves cultural/ethnic issues. The scenarios should show how adolescents could use improved communication skills to solve these problems.
Must develop conclusions that reiterate the opening thesis statement, include a summary of the social skills training discussed, and offer evidence of its effectiveness.
Must use at least four scholarly sources (in addition to the course text), including a minimum of two from the Ashford Online Library. References are to be provided as needed within the slides.
Must include a separate reference slide, formatted according to APA style as outlined in the Ashford Writing Center.
.
DetailsPlease answer the following questions. 1. Desc.docxbradburgess22840
Meiosis involves two rounds of cell division that result in four haploid cells from one diploid cell. A cross between a GgBb male and GgBb female would result in a 1:1:1:1 ratio of offspring with green/black, green/brown, purple/black, and purple/brown phenotypes according to a Punnett square. A mating between a normal female and hemophilic male would result in all male offspring being hemophilic according to a Punnett square, with 50% of total offspring being hemophilic. Linked genes are located close together on the same chromosome and may not assort independently during meiosis, but they are not an exception to Mendel's law of
Despite the literature supporting technology use in schools as ben.docxbradburgess22840
Despite the literature supporting technology use in schools as beneficial for students, and despite the wide use of social technology, schools continue to be slow to change its integration in the classroom (Livingstone, 2012). It is imperative that teachers increase their use of technology in the classroom in order to prepare our K-12 students referred to as "digital natives," for the 21st century. Though many schools have technology available for use (Alger & Kopcha, 2008), barriers exist in incorporating technology into lesson plans, namely teacher reluctance (Keengwe, Onchwari, & Wachira, 2008). Teachers' hesitation in using technology more frequently is due to a number of factors, such as lack of time to learn new technology and incorporate it into lesson plans, beliefs around using technology in instruction, availability of working technology and technical support, comprehensive professional development, and a culture that promotes using new technology, self-efficacy, and teaching methods (Alger & Kopcha, 2008).
Literature Review
Self-Efficacy toward Technology
According to Bandura (1986) individuals possess a self-system that determines how much effort people will expend on any activity. Bandura also asserts that self-efficacy beliefs may be a strong predictor of related performance. Studies have shown a positive correlation between self-efficacy in technology and technology ability (Anderson & Maninger, 2007; Anderson, Grouulx, & Maninger, 2011). According to the technology acceptance model introduced by Davis (1989), there is a correlation between users' perceived ease of use and predicted adoption of technology. In his study investigating Moodles, Yeou (2016) found self-efficacy to be a critical factor in undergraduates' use of the technology tool. In a similar study investigating pre-service teachers, Albion (2001) found that self-efficacy was the most significant factor in predicting technology use. Pre-service and in-service teachers who possess high self-efficacy in regard to technology are more apt to use technology in the classroom because they are more confident in their ability. In their study investigating teachers' use of technology, Holden and Rada (2011) found that self-efficacy directly influenced individuals' ease of use and usability of technology.
Need for Technology Integration
With the adoption of the National Education Technology Plan (NETP), providing access to technology is no longer sufficient; the NETP stresses that schools are expected to ensure "all students understand how to use technologies as a tool to engage in creative, productive, lifelong learning" (p. 16 Herold, 2016). A key element in the plan is the need to move from passive to active use of technology. Often referred to as the "digital use and divide," a gap exists between learners who are using technology in active, creative ways to support their learning and those who predominantly use technology for passive content consumption.
To develop .
This document contains notifications from Sakai's version control system about recent changes made in Source code repositories. It describes 14 separate revisions made between January 4th and 5th, 2008. The revisions include changes to code related to gradebook, site management, messaging, and other tools.
Description:
Ch .17:
Newborn transitioning
Ch. 18:
Nursing management of the
newborn
Ch.19:
Nursing Management at risk:
Pregnancy-related complications
Ch.20:
Nursing Management of the
Pregnancy at Risk: Health
conditions and vulnerable populations
Ch. 21:
Nursing management of
labor and birth at risk
Ch. 22:
Nursing management of the
postpartum woman at risk
.
Description of the assignment The following 4 men created a p.docxbradburgess22840
Description of the assignment:
The following 4 men created a paradigm shift within Western culture: Luther, Columbus, Gutenberg, and Charles Darwin. In this assignment, explain which one of these you deem to have had the most influence on Western culture. Provide concrete reasons that clarify your position. If you include sources, cite them in current APA format. This assignment must be 250–300 words and must include the word count in parentheses. S
.
Description of the AssignmentThis assignment presents a mo.docxbradburgess22840
Description of the Assignment
This assignment presents a modified method for conducting a concept analysis of
one
concept that is important and useful to the nurse practitioner role. The concept for this assignment must be supported by a published
nursing
theory. The selected concept is identified and then the elements of the analysis process are applied in order to synthesize knowledge for application as demonstrated through the creation of a model case. Theoretical applications of the concept are also discussed. Non-nursing theories may
not
be used. Scholarly literature is incorporated throughout the analysis.
Only the elements identified in this assignment should be used for this concept analysis.
Possible Concepts:
The following concepts are not required; students may select one of these concepts or find another concept. Each selected concept must be associated with a nursing theory; the use of non-nursing theories is
not
allowed. If you have any questions regarding your concept or the nursing theory, please consult with your faculty member for assistance.
Please note: the concepts of caring or cultural humility are not permitted for this assignment.
Adaptation
Burnout
Civility
Comfort
Compassion
Compassion fatigue
Competence
Empowerment
Engagement
Health
Leadership
Meaningfulness
Modeling
Noise
Pain
Palliative care
Quality of life
Resilience
Self-care
Sensory overload
Situational awareness
Criteria for Content
Definition/Explanation of the selected nursing concept
Defines/explains the concept using scholarly literature (a dictionary maybe used for this section
only
)
Support from nursing literature is required.
2.
Defining attributes:
A minimum of
three (3)
attributes are required.
Support from nursing literature is required.
Explanation: An attribute identifies characteristics of a concept. For this question, the characteristics of the selected nursing concept are identified and discussed.
Antecedent and Consequence
1 antecedent
of the selected nursing concept.
1 consequence
of the selected nursing concept.
Support from nursing literature is required.
Explanation:
An antecedent is an identifiable occurrence that happens before an event. An antecedent precedes a selected nursing concept. A consequence follows or is the result of an event. The selected consequence follows or is the result of the selected nursing concept.
4.
Model Case
1 Model Case
is created by the student and discussed substantively by demonstrating within the case each of the following areas:
Definition
All identified attributes
Theoretical Applications of the Concept
Explain how the concept applies to the selected nursing theory.
Support from nursing literature is required.
Reflection
Reflect on how the concept analysis findings apply to your advanced nursing practice, specifically as an NP.
Self-reflection may be written in first-person.
Preparing the Assi.
Description of theNationalMilitary Strategy2018.docxbradburgess22840
Description of the
National
Military
Strategy
2018
The Joint Staff
1
Overview
The 2018 National Military Strategy (NMS) provides the
Joint Force a framework for protecting and advancing U.S.
national interests. Pursuant to statute, it reflects a
comprehensive review conducted by the Chairman with the
other members of the Joint Chiefs of Staff and the unified
combatant commanders.
As an overarching military strategic framework, this
strategy implements the substantial body of policy and
strategy direction provided in the 2017 National Security
Strategy, the 2018 National Defense Strategy (NDS), the
Defense Planning Guidance (DPG), and other documents.
The 2018 NMS provides the Chairman’s military advice for
how the Joint Force implements the defense objectives in
the NDS and the direction from the President and the
Secretary of Defense.
The 2018 NMS also reflects lessons learned from
implementing global integration over the last two years. The
strategy articulates a continuum of strategic direction to
frame global integration into three strategy horizons to meet
the challenges of the existing and future security
environment. Force employment addresses planning, force
management, and decisionmaking to fulfill the defense
objectives of the NDS. Force development adapts functions,
capabilities, and concepts to improve the current Joint
Force. Force design innovates to enable the Joint Force to
do what it does differently to retain a competitive advantage
against any adversary.
The vision of the Joint Force articulated in the 2018 NMS is
a Joint Force capable of defending the homeland and
projecting power globally, now and into the future.
2
Strategic Approach
From its global perspective, the NMS premises an adaptive
and innovative Joint Force capable of employing its
capabilities seamlessly across multiple regions and all
domains -- continuing the transition from a regional to a
global mindset and approach.
This strategy
anchors its
approach against a
set of clearly
identified security
trends outlined in
the NDS (see inset).
These trends,
especially those
posed by the
reemergence of
great power
competition with China and Russia, represent the most
difficult challenges facing the Joint Force. However, the full
scope of global integration must recognize uncertainty and
be vigilant for emerging threats to the security and interests
of the United States, its allies and partners. In a security
environment where the homeland is no longer a sanctuary
and every operating domain is contested, competitors and
adversaries will continue to operate across geographic
regions and span multiple domains to offset or erode Joint
Force advantages.
To achieve military advantage over competitors and
adversaries, the NMS introduces the notion of joint
combined arms, defined as the conduct of operational art
through the integration of joint capabilities.
Description This is a 4 page paper about either a creative genius o.docxbradburgess22840
Description: This is a 4 page paper about either a creative genius of your choosing (Thomas Edison? Einstein? Michelangelo? Beyonce? Lucille Ball?) or a creative business (DuPont, Corning, IDEO? Pixar?). You can either read a full biography or research the person or organization using several sources. The paper should include: Description and background of the person/organization, 2) why you chose him/her/it, 3) what this person/org achieved (briefly), 4) how he/she/it fuels their creativity (his or her own, or if a company, its workforce) and 5) include a self reflection. Knowing what they do, what are some things YOU DO to fuel your creativity? What else could you do going forward? . #4 and #5 are most important. At the end of the paper, summarize by listing at least ten to fifteen things that this individual did to fuel his/her/its creativity. Here are some examples:
Da Vinci kept journals and notebooks. He dissected eyes and other body parts. He learned many mediums - painting sculpting, etc.
Ian Flemming (author), designed golf courses in his spare time.
Steven Hillenburg, the creator of Spongebob, had been a marine biology professor who had a keen interest in art and began drawing visual images for his student which he then began animating. He continuously worked on acquiring new skills. He watched old movies.
Beyonce learned dressmaking from her mom, who designed all of her early costumes. Her mom had sewn clothing for priests and nuns in exchange for Beyonce’s tuition.
Etsy has employee-led workshops where associates teach others their hobbies, and they regularly engage their shop owners in planning
The important thing about this project is that you learn and be able to share not just what they achieved, but what they did to nurture their creativity. You must include sources.
.
Describe your experience with electronic healthmedical record.docxbradburgess22840
Describe your experience with electronic health/medical records (EHR/EMR).
Have you used a health care IT system as a patient/provider? If yes, what system(s) did you use?
What were your impressions of the system?
Did you find it user-friendly?
Did you have concerns about privacy/security?
Did it seem to make health care seeking/delivery easier or more burdensome?
.
Description Develop a paper describing how the knowledge, skill.docxbradburgess22840
Description:
Develop a paper describing how the knowledge, skills, or theories
of this course
have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge applied to an employment opportunity in your field of study.
Requirements:
Provide a >500 word (2 or more pages) paper (excluding title and reference pages in page count). The paper should include a title page, body (include Introduction and Conclusion sections), and a reference page. An abstract is not required for this assignment. Use proper APA formatting of the entire paper including sources on the reference page and citations in the body of the paper.
.
Describing Research FindingsResearchers take many steps to p.docxbradburgess22840
Describing Research Findings
Researchers take many steps to prepare, organize, and analyze research data. In this discussion, you will examine the importance of taking a systematic approach to describing research findings. Be sure to address the following in your main post:
What is the purpose of computing descriptive statistics and exploratory analyses?
Why should researchers graph their data? What are the benefits of graphing?
How might you assess the distribution of data?
What does the “spread” of data tell us?
What does Pearson
r
tell us about two variables?
.
Description I. Introduction A. Summarize the client. What is the rat.docxbradburgess22840
Description I. Introduction A. Summarize the client. What is the rationale for seeking counseling?
II. Biopsychosocial Summary
A. Describe the problem that brought the client to treatment. i. Make sure to address any problems, issues, or challenges the client may be facing.
B. Explain the symptoms affecting the client. i. What are the behavioral symptoms? ii. What are the cognitive symptoms? iii. What are the emotional symptoms? iv. What are the physiological symptoms?
C. Identify any environmental factors that may be contributing to the client's problem.
D. Identify any potential harmful behavior: i. Aggression ii. Harm to others iii. Harm to self iv. Criminal activity v. Impulsive behaviors vi. High-risk activity
E. Determine if the client has a family history of the diagnosis. Consider how this may affect the client. F. Use evidence-based research to support the biological factors presented in the case.
G. Outline how the client identifies him- or herself in regard to cultural characteristics. Make sure to add rationale for any answers that are not straightforward. i. What are the addressing factors?
a. Age and generational influences
b. Developmental disabilities (acquired at birth or during childhood)
c. Disabilities acquired later in life (e.g., traumatic brain injury, multiple sclerosis, stroke)
d. Religion and spirituality
e. Ethnic and racial identity
f. Socioeconomic status
g. Sexual orientation
h. Indigenous heritage
i. National origin j. Gender
H. Summarize how the client culturally identifies him- or herself.
i. With the identifiers above, how does the client culturally identify him- or herself? ii. What is the order of importance for the client? Assessment III. Co-occurring Disorders
A. Identify any co-occurring disorders. B. Describe the initial DSM diagnosis. i. What is the overall descriptor of the diagnosis? ii. What criteria must be met to meet the diagnosis? iii. Describe which client behaviors are being used to meet the diagnostic criteria.
C. Discuss the rationale behind the diagnosis. i. Identify what other diagnoses should be ruled out. Make sure to provide rationale. ii. Identify limitations with this diagnosis. Make sure to provide rationale.
D. Use evidence-based research to support your justification. IV. Addiction Assessments
A. Describe how the assessment was administered.
B. Describe the assessment scoring.
C. Summarize the assessment results.
i. How do you interpret the results? Plan V. Recommendations
A. Summarize what you recommend for this client based on the information collected.
i. Describe what you recommend for recovery.
ii. Describe what you recommend for relapse prevention.
resources you would provide to the client. Rubric Guidelines for Submission: Consider using the headings from the critical elements outlined above when drafting your DAP note, as you will do this when you submit for your final project. You may also consider using double spac.
Describes the use of Computers in Nursing in general clearly and com.docxbradburgess22840
Describes the use of Computers in Nursing in general clearly and comprehensively.
Address the significance of Computers, attributes of Computers (i.e., accuracy, cost, accessibility, etc.), and provide specific examples with rationale of situations in which Computers as an educational tool would provide advantages as well as disadvantages.
Relate the use of Computers to the appropriate professional standards and competencies.
.
How to Download & Install Module From the Odoo App Store in Odoo 17Celine George
Custom modules offer the flexibility to extend Odoo's capabilities, address unique requirements, and optimize workflows to align seamlessly with your organization's processes. By leveraging custom modules, businesses can unlock greater efficiency, productivity, and innovation, empowering them to stay competitive in today's dynamic market landscape. In this tutorial, we'll guide you step by step on how to easily download and install modules from the Odoo App Store.
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
🔥🔥🔥🔥🔥🔥🔥🔥🔥
إضغ بين إيديكم من أقوى الملازم التي صممتها
ملزمة تشريح الجهاز الهيكلي (نظري 3)
💀💀💀💀💀💀💀💀💀💀
تتميز هذهِ الملزمة بعِدة مُميزات :
1- مُترجمة ترجمة تُناسب جميع المستويات
2- تحتوي على 78 رسم توضيحي لكل كلمة موجودة بالملزمة (لكل كلمة !!!!)
#فهم_ماكو_درخ
3- دقة الكتابة والصور عالية جداً جداً جداً
4- هُنالك بعض المعلومات تم توضيحها بشكل تفصيلي جداً (تُعتبر لدى الطالب أو الطالبة بإنها معلومات مُبهمة ومع ذلك تم توضيح هذهِ المعلومات المُبهمة بشكل تفصيلي جداً
5- الملزمة تشرح نفسها ب نفسها بس تكلك تعال اقراني
6- تحتوي الملزمة في اول سلايد على خارطة تتضمن جميع تفرُعات معلومات الجهاز الهيكلي المذكورة في هذهِ الملزمة
واخيراً هذهِ الملزمة حلالٌ عليكم وإتمنى منكم إن تدعولي بالخير والصحة والعافية فقط
كل التوفيق زملائي وزميلاتي ، زميلكم محمد الذهبي 💊💊
🔥🔥🔥🔥🔥🔥🔥🔥🔥
DERMATOLOGY CASE STUDYChief complaint My right great toe has.docx
1. DERMATOLOGY CASE STUDY
Chief complaint: “ My right great toe has been hurting for
about 2 months and now it’s itchy, swollen and yellow. I can’t
wear closed shoes and I was fine until I started going to the
gym”.
HPI: E.D a 38 -year-old Caucasian female presents to the clinic
with complaint of pain, itching, inflammation, and “yellow”
right great toe. She noticed that the toe was moderately itching
after she took a shower at the gym. She did not pay much
attention. About two weeks after the itching became intense and
she applied Benadryl cream with only some relief. She
continued going to the gym and noticed that the itching got
worse and her toe nail started to change color. She also
indicated that the toe got swollen, painful and turned
completely yellow 2 weeks ago. She applied lotrimin AF cream
and it did not help relief her symptoms. She has not tried other
remedies. Denies associated symptoms of fever and chills.
PMH:Diabetes Mellitus, type 2.
Surgeries: None
Allergies: Augmentin
Medication: Metformin 500mg PO BID.
Vaccination History: Immunization is up to date and she
received her flu shot this year.
Social history: College graduate married and no children. She
drinks 1 glass of red wine every night with dinner. She is a
former smoker and quit 6 years ago.
Family history:Both parents are alive. Father has history of DM
type 2, Tinea Pedis. mother alive and has history of atopic
dermatitis, HTN.
ROS:
Constitutional: Negative for fever. Negative for chills.
Respiratory: No Shortness of breath. No Orthopnea
Cardiovascular: Regular rhythm.
Skin: Right great toe swollen, itchy, painful and discolored.
2. Psychiatric: No anxiety. No depression.
Physical examination:Vital Signs Height: 5 feet 5 inches
Weight: 140 pounds BMI: 31 obesity, BP 130/70 T 98.0, P 88 R
22, non-labored
HEENT: Normocephalic/Atraumatic, Bilateral cataracts;
PERRL, EOMI; No teeth loss seen. Gums no redness.
NECK: Neck supple, no palpable masses, no lymphadenopathy,
no thyroid enlargement.
LUNGS: No Crackles. Lungs clear bilaterally. Equal breath
sounds. Symmetrical respiration. No respiratory distress.
HEART: Normal S1 with S2 during expiration. Pulses are 2+ in
upper extremities. 1+ pitting edema ankle bilaterally.
ABDOMEN: No abdominal distention. Nontender. Bowel
sounds + x 4 quadrants. No organomegaly. Normal contour; No
palpable masses.
GENITOURINARY: No CVA tenderness bilaterally. GU exam
deferred.
MUSCULOSKELETAL: Slow gait but steady. No Kyphosis.
SKIN: Right great toe with yellow-brown discoloration in the
proximal nail plate. Marked periungual inflammation. +
dryness. No pus. No neuro deficit.
PSYCH: Normal affect. Cooperative.
Labs: Hgb 13.2, Hct 38%, K+ 4.2, Na+138, Cholesterol 225,
Triglycerides 187, HDL 37, LDL 190, TSH 3.7, glucose 98.
A:Primary Diagnosis: Proximal subungual onychomycosis
Differential Diagnosis: Irritant Contact Dermatitis, Lichen
Planus, Nail Psoriasis
Special Lab: Fungal culture confirms fungal infection.
Patient’s Name: E.D
Lamisil 250 mg tablet once daily for 12 weeks.
Dispense: 30 tablets
Instructions: take 1 tablet by mouth daily for 12 weeks.
Refills: 2
Generic substitute permitted: Terbinafine 250 mg tablet
Daylamis Gonzalez, ARNP
02/05/2020
3. Global
editionGlo
b
a
l
ed
it
io
n
this is a special edition of an established
title widely used by colleges and universities
throughout the world. Pearson published this
exclusive edition for the benefit of students
outside the United States and Canada. if you
purchased this book within the United States
or Canada you should be aware that it has
been imported without the approval of the
Publisher or author.
Pearson Global Edition
Global
edition
For these Global editions, the editorial team at Pearson has
4. collaborated with educators across the world to address a
wide range of subjects and requirements, equipping students
with the best possible learning tools. this Global edition
preserves the cutting-edge approach and pedagogy of the
original, but also features alterations, customization, and
adaptation from the north american version.
it
Strategy:
Issues and Practices
M
cK
een
Sm
ith
it Strategy
Issues and Practices
tHiRd edition
James D. McKeen • Heather A. Smith
t
H
iR
d
e
d
it
5. io
n
McKeen_1292080264_mech.indd 1 28/11/14 12:56 PM
IT STraTegy:
ISSueS and PracTIceS
A01_MCKE0260_03_GE_FM.indd 1 26/11/14 9:32 PM
A01_MCKE0260_03_GE_FM.indd 2 26/11/14 9:32 PM
IT STraTegy:
ISSueS and PracTIceS
T h i r d E d i t i o n
G l o b a l E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco
Hoboken
Amsterdam Cape Town Dubai London Madrid Milan Munich
Paris Montréal Toronto
8. ISBN 13: 978-1-292-08026-0
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British
Library
10 9 8 7 6 5 4 3 2 1
Typeset in 10/12 Palatino LT Std by Integra Software Services,
Pvt. Ltd.
Printed and bound in Great Britain by Clays Ltd, Bungay,
Suffolk.
A01_MCKE0260_03_GE_FM.indd 4 26/11/14 9:32 PM
ConTEnTS
Preface 13
About the Authors 21
Acknowledgments 22
Section I Delivering Value with IT 23
Chapter 1 The IT Value ProPoSITIon 24
Peeling the Onion: Understanding IT Value 25
What Is IT Value? 25
Where Is IT Value? 26
Who Delivers IT Value? 27
9. When Is IT Value Realized? 27
The Three Components of the IT Value Proposition 28
Identification of Potential Value 29
Effective Conversion 30
Realizing Value 31
Five Principles for Delivering Value 32
Principle 1. Have a Clearly Defined Portfolio Value
Management
Process 33
Principle 2. Aim for Chunks of Value 33
Principle 3. Adopt a Holistic Orientation to Technology Value
33
Principle 4. Aim for Joint Ownership of Technology Initiatives
34
Principle 5. Experiment More Often 34
Conclusion 34 • References 35
Chapter 2 DelIVerIng BuSIneSS Value Through
IT STraTegy 37
Business and IT Strategies: Past, Present, and Future 38
Four Critical Success Factors 40
The Many Dimensions of IT Strategy 42
Toward an IT Strategy-Development Process 44
Challenges for CIOs 45
10. Conclusion 47 • References 47
Chapter 3 MakIng IT CounT 49
Business Measurement: An Overview 50
Key Business Metrics for IT 52
5
A01_MCKE0260_03_GE_FM.indd 5 26/11/14 9:32 PM
6 Contents
Designing Business Metrics for IT 53
Advice to Managers 57
Conclusion 58 • References 58
Chapter 4 effeCTIVe BuSIneSS–IT relaTIonShIPS 60
The Nature of the Business–IT Relationship 61
The Foundation of a Strong Business–IT
Relationship 63
Building Block #1: Competence 64
Building Block #2: Credibility 65
Building Block #3: Interpersonal Interaction 66
Building Block #4: Trust 68
Conclusion 70 • References 70
Appendix A The Five IT Value Profiles 72
11. Appendix B Guidelines for Building a Strong Business–IT
Relationship 73
Chapter 5 BuSIneSS–IT CoMMunICaTIon 74
Communication in the Business–IT Relationship 75
What Is “Good” Communication? 76
Obstacles to Effective Communication 78
“T-Level” Communication Skills for IT Staff 80
Improving Business–IT Communication 82
Conclusion 83 • References 83
Appendix A IT Communication Competencies 85
Chapter 6 effeCTIVe IT leaDerShIP 86
The Changing Role of the IT Leader 87
What Makes a Good IT Leader? 89
How to Build Better IT Leaders 92
Investing in Leadership Development: Articulating the Value
Proposition 95
Conclusion 96 • References 97
MInI CaSeS
Delivering Business Value with IT at Hefty Hardware 98
Investing in TUFS 102
IT Planning at ModMeters 104
12. A01_MCKE0260_03_GE_FM.indd 6 26/11/14 9:32 PM
Contents 7
Section II IT governance 109
Chapter 7 effeCTIVe IT ShareD SerVICeS 110
IT Shared Services: An Overview 111
IT Shared Services: Pros and Cons 114
IT Shared Services: Key Organizational Success Factors 115
Identifying Candidate Services 116
An Integrated Model of IT Shared Services 117
Recommmendations for Creating Effective IT
Shared Services 118
Conclusion 121 • References 121
Chapter 8 SuCCeSSful IT SourCIng: MaTurITy MoDel,
SourCIng oPTIonS, anD DeCISIon CrITerIa 122
A Maturity Model for IT Functions 123
IT Sourcing Options: Theory Versus Practice 127
The “Real” Decision Criteria 131
Decision Criterion #1: Flexibility 131
Decision Criterion #2: Control 131
13. Decision Criterion #3: Knowledge Enhancement 132
Decision Criterion #4: Business Exigency 132
A Decision Framework for Sourcing IT Functions 133
Identify Your Core IT Functions 133
Create a “Function Sourcing” Profile 133
Evolve Full-Time IT Personnel 135
Encourage Exploration of the Whole Range
of Sourcing Options 136
Combine Sourcing Options Strategically 136
A Management Framework for Successful
Sourcing 137
Develop a Sourcing Strategy 137
Develop a Risk Mitigation Strategy 137
Develop a Governance Strategy 138
Understand the Cost Structures 138
Conclusion 139 • References 139
Chapter 9 BuDgeTIng: PlannIng’S eVIl TwIn 140
Key Concepts in IT Budgeting 141
The Importance of Budgets 143
The IT Planning and Budget Process 145
14. A01_MCKE0260_03_GE_FM.indd 7 26/11/14 9:32 PM
8 Contents
Corporate Processes 145
IT Processes 147
Assess Actual IT Spending 148
IT Budgeting Practices That Deliver Value 149
Conclusion 150 • References 151
Chapter 10 rISk ManageMenT In IT 152
A Holistic View of IT-Based Risk 153
Holistic Risk Management: A Portrait 156
Developing a Risk Management Framework 157
Improving Risk Management Capabilities 160
Conclusion 161 • References 162
Appendix A A Selection of Risk Classification
Schemes 163
Chapter 11 InforMaTIon ManageMenT:
STageS anD ISSueS 164
Information Management: How Does IT Fit? 165
A Framework For IM 167
15. Stage One: Develop an IM Policy 167
Stage Two: Articulate the Operational
Components 167
Stage Three: Establish Information Stewardship 168
Stage Four: Build Information Standards 169
Issues In IM 170
Culture and Behavior 170
Information Risk Management 171
Information Value 172
Privacy 172
Knowledge Management 173
The Knowing–Doing Gap 173
Getting Started in IM 173
Conclusion 175 • References 176
Appendix A Elements of IM Operations 177
MInI CaSeS
Building Shared Services at RR Communications 178
Enterprise Architecture at Nationstate Insurance 182
IT Investment at North American Financial 187
A01_MCKE0260_03_GE_FM.indd 8 26/11/14 9:32 PM
16. Contents 9
Section III IT-enabled Innovation 191
Chapter 12 TeChnology-DrIVen InnoVaTIon 192
The Need for Innovation: An Historical
Perspective 193
The Need for Innovation Now 193
Understanding Innovation 194
The Value of Innovation 196
Innovation Essentials: Motivation, Support,
and Direction 197
Challenges for IT leaders 199
Facilitating Innovation 201
Conclusion 202 • References 203
Chapter 13 when BIg DaTa anD SoCIal CoMPuTIng MeeT 204
The Social Media/Big Data Opportunity 205
Delivering Business Value with Big Data 207
Innovating with Big Data 211
Pulling in Two Different Directions: The Challenge
for IT Managers 212
17. First Steps for IT Leaders 214
Conclusion 215 • References 216
Chapter 14 effeCTIVe CuSToMer exPerIenCe 217
Customer Experience and Business value 218
Many Dimensions of Customer Experience 219
The Role of Technology in Customer Experience 221
Customer Experience Essentials for IT 222
First Steps to Improving Customer Experience 225
Conclusion 226 • References 226
Chapter 15 BuSIneSS InTellIgenCe: an oVerVIew 228
Understanding Business Intelligence 229
The Need for Business Intelligence 230
The Challenge of Business Intelligence 231
The Role of IT in Business Intelligence 233
Improving Business Intelligence 235
Conclusion 238 • References 238
A01_MCKE0260_03_GE_FM.indd 9 26/11/14 9:32 PM
10 Contents
Chapter 16 TeChnology-enaBleD CollaBoraTIon 240
Why Collaborate? 241
18. Characteristics of Collaboration 244
Components of Successful Collaboration 247
The Role of IT in Collaboration 249
First Steps for Facilitating Effective Collaboration 251
Conclusion 253 • References 254
MInI CaSeS
Innovation at International Foods 256
Consumerization of Technology at IFG 261
CRM at Minitrex 265
Customer Service at Datatronics 268
Section IV IT Portfolio Development and Management 273
Chapter 17 ManagIng The aPPlICaTIon PorTfolIo 274
The Applications Quagmire 275
The Benefits of a Portfolio Perspective 276
Making APM Happen 278
Capability 1: Strategy and Governance 280
Capability 2: Inventory Management 284
Capability 3: Reporting and Rationalization 285
Key Lessons Learned 286
Conclusion 287 • References 287
19. Appendix A Application Information 288
Chapter 18 IT DeManD ManageMenT: SuPPly ManageMenT
IS noT enough 292
Understanding IT Demand 293
The Economics of Demand Management 295
Three Tools for Demand management 295
Key Organizational Enablers for Effective Demand
Management 296
Strategic Initiative Management 297
Application Portfolio Management 298
Enterprise Architecture 298
Business–IT Partnership 299
Governance and Transparency 301
Conclusion 303 • References 303
A01_MCKE0260_03_GE_FM.indd 10 26/11/14 9:32 PM
Contents 11
Chapter 19 TeChnology roaDMaP: BenefITS, eleMenTS, anD
PraCTICal STePS 305
What is a Technology Roadmap? 306
The Benefits of a Technology Roadmap 307
20. External Benefits (Effectiveness) 307
Internal Benefits (Efficiency) 308
Elements of the Technology Roadmap 308
Activity #1: Guiding Principles 309
Activity #2: Assess Current Technology 310
Activity #3: Analyze Gaps 311
Activity #4: Evaluate Technology
Landscape 312
Activity #5: Describe Future Technology 313
Activity #6: Outline Migration Strategy 314
Activity #7: Establish Governance 314
Practical Steps for Developing a Technology
Roadmap 316
Conclusion 317 • References 317
Appendix A Principles to Guide a Migration
Strategy 318
Chapter 20 eMergIng DeVeloPMenT PraCTICeS 319
The Problem with System Development 320
Trends in System Development 321
Obstacles to Improving System Development
Productivity 324
21. Improving System Development Productivity: What we
know that Works 326
Next Steps to Improving System Development
Productivity 328
Conclusion 330 • References 330
Chapter 21 InforMaTIon DelIVery: PaST, PreSenT, anD
fuTure 332
Information and IT: Why Now? 333
Delivering Value Through Information 334
Effective Information Delivery 338
New Information Skills 338
New Information Roles 339
New Information Practices 339
A01_MCKE0260_03_GE_FM.indd 11 26/11/14 9:32 PM
12 Contents
New Information Strategies 340
The Future of Information Delivery 341
Conclusion 343 • References 344
MInI CaSeS
Project Management at MM 346
22. Working Smarter at Continental Furniture International 350
Managing Technology at Genex Fuels 355
Index 358
A01_MCKE0260_03_GE_FM.indd 12 26/11/14 9:32 PM
PrEFACE
Today, with information technology (IT) driving constant
business transformation,
overwhelming organizations with information, enabling 24/7
global operations, and
undermining traditional business models, the challenge for
business leaders is not
simply to manage IT, it is to use IT to deliver business value.
Whereas until fairly recently,
decisions about IT could be safely delegated to technology
specialists after a business
strategy had been developed, IT is now so closely integrated
with business that, as one
CIO explained to us, “We can no longer deliver business
solutions in our company
without using technology so IT and business strategy must
constantly interact with
each other.”
What’s New in This Third Edition?
• Six new chapters focusing on current critical issues in IT
management, including
IT shared services; big data and social computing; business
intelligence; manag-
ing IT demand; improving the customer experience; and
23. enhancing development
productivity.
• Two significantly revised chapters: on delivering IT functions
through different
resourcing options; and innovating with IT.
•
TwonewminicasesbasedonrealcompaniesandrealITmanagementsi
tuations:
Working Smarter at Continental Furniture and Enterprise
Architecture at Nationstate
Insurance.
•
Arevisedstructurebasedonreaderfeedbackwithsixchaptersandtwo
minicases
from the second edition being moved to the Web site.
All too often, in our efforts to prepare future executives to deal
effectively with
the issues of IT strategy and management, we lead them into a
foreign country where
they encounter a different language, different culture, and
different customs. Acronyms
(e.g., SOA, FTP/IP, SDLC, ITIL, ERP), buzzwords (e.g.,
asymmetric encryption, proxy
servers, agile, enterprise service bus), and the widely adopted
practice of abstraction
(e.g., Is a software monitor a person, place, or thing?) present
formidable “barriers to
entry” to the technologically uninitiated, but more important,
they obscure the impor-
tance of teaching students how to make business decisions about
a key organizational
resource. By taking a critical issues perspective, IT Strategy:
24. Issues and Practices treats IT
as a tool to be leveraged to save and/or make money or
transform an organization—not
as a study by itself.
As in the first two editions of this book, this third edition
combines the experi-
ences and insights of many senior IT managers from leading-
edge organizations with
thorough academic research to bring important issues in IT
management to life and
demonstrate how IT strategy is put into action in contemporary
businesses. This new
edition has been designed around an enhanced set of critical
real-world issues in IT
management today, such as innovating with IT, working with
big data and social media,
13
A01_MCKE0260_03_GE_FM.indd 13 26/11/14 9:32 PM
14 Preface
enhancing customer experience, and designing for business
intelligence and introduces
students to the challenges of making IT decisions that will have
significant impacts on
how businesses function and deliver value to stakeholders.
IT Strategy: Issues and Practices focuses on how IT is changing
and will continue to
change organizations as we now know them. However, rather
than learning concepts
25. “free of context,” students are introduced to the complex
decisions facing real organi-
zations by means of a number of mini cases. These provide an
opportunity to apply
the models/theories/frameworks presented and help students
integrate and assimilate
this material. By the end of the book, students will have the
confidence and ability to
tackle the tough issues regarding IT management and strategy
and a clear understand-
ing of their importance in delivering business value.
Key Features of This Book
• AfocusonITmanagement issues as opposed to technology
issues
• CriticalITissuesexploredwithintheirorganizationalcontexts
•
ReadilyapplicablemodelsandframeworksforimplementingITstrat
egies
•
Minicasestoanimateissuesandfocusclassroomdiscussionsonreal-
worlddeci-
sions, enabling problem-based learning
• Provenstrategiesandbestpracticesfromleading-
edgeorganizations
•
UsefulandpracticaladviceandguidelinesfordeliveringvaluewithIT
• Extensiveteachingnotesforallminicases
A Different ApproAch to teAching it StrAtegy
The real world of IT is one of issues—critical issues—such as
the following:
26. • HowdoweknowifwearegettingvaluefromourITinvestment?
• HowcanweinnovatewithIT?
• WhatspecificITfunctionsshouldweseekfromexternalproviders?
•
HowdowebuildanITleadershipteamthatisatrustedpartnerwiththeb
usiness?
• HowdoweenhanceITcapabilities?
• WhatisIT’sroleincreatinganintelligentbusiness?
•
Howcanwebesttakeadvantageofnewtechnologies,suchasbigdataan
dsocial
media, in our business?
• HowcanwemanageITrisk?
However, the majority of management information systems
(MIS) textbooks are orga-
nized by system category (e.g., supply chain, customer
relationship management, enterprise
resource planning), by system component (e.g., hardware,
software, networks), by system
function (e.g., marketing, financial, human resources), by
system type (e.g., transactional,
decisional, strategic), or by a combination of these.
Unfortunately, such an organization
does not promote an understanding of IT management in
practice.
IT Strategy: Issues and Practices tackles the real-world
challenges of IT manage-
ment. First, it explores a set of the most important issues facing
IT managers today, and
second, it provides a series of mini cases that present these
critical IT issues within the
contextofrealorganizations.Byfocusingthetextaswellastheminica
sesontoday’s
27. critical issues, the book naturally reinforces problem-based
learning.
A01_MCKE0260_03_GE_FM.indd 14 26/11/14 9:32 PM
Preface 15
IT Strategy: Issues and Practices includes thirteen mini cases—
each based on a real
company presented anonymously.1 Mini cases are not simply
abbreviated versions of
standard, full-length business cases. They differ in two
significant ways:
1. A horizontal perspective. Unlike standard cases that develop
a single issue within
an organizational setting (i.e., a “vertical” slice of
organizational life), mini cases
take a “horizontal” slice through a number of coexistent issues.
Rather than looking
for a solution to a specific problem, as in a standard case,
students analyzing a mini
case must first identify and prioritize the issues embedded
within the case. This mim-
ics real life in organizations where the challenge lies in
“knowing where to start” as
opposed to “solving a predefined problem.”
2. Highly relevant information. Mini cases are densely written.
Unlike standard
cases, which intermix irrelevant information, in a mini case,
each sentence exists for
a reason and reflects relevant information. As a result, students
must analyze each
28. case very carefully so as not to miss critical aspects of the
situation.
Teaching with mini cases is, thus, very different than teaching
with standard cases.
With mini cases, students must determine what is really going
on within the organiza-
tion. What first appears as a straightforward “technology”
problem may in fact be a
political problem or one of five other “technology” problems.
Detective work is, there-
fore, required. The problem identification and prioritization
skills needed are essential
skills for future managers to learn for the simple reason that it
is not possible for organi-
zations to tackle all of their problems concurrently. Mini cases
help teach these skills to
students and can balance the problem-solving skills learned in
other classes. Best of all,
detective work is fun and promotes lively classroom discussion.
To assist instructors, extensive teaching notes are available for
all mini cases. Developed
by the authors and based on “tried and true” in-class experience,
these notes include case
summaries, identify the key issues within each case, present
ancillary information about the
company/industry represented in the case, and offer guidelines
for organizing the class-
room discussion. Because of the structure of these mini cases
and their embedded issues, it
is common for teaching notes to exceed the length of the actual
mini case!
This book is most appropriate for MIS courses where the goal is
to understand how
29. IT delivers organizational value. These courses are frequently
labeled “IT Strategy” or
“IT Management” and are offered within undergraduate as well
as MBA programs. For
undergraduate juniors and seniors in business and commerce
programs, this is usually
the “capstone” MIS course. For MBA students, this course may
be the compulsory core
course in MIS, or it may be an elective course.
Each chapter and mini case in this book has been thoroughly
tested in a variety
ofundergraduate,graduate,andexecutiveprogramsatQueen’sSchoo
lofBusiness.2
1 We are unable to identify these leading-edge companies by
agreements established as part of our overall
research program (described later).
2
Queen’sSchoolofBusinessisoneoftheworld’spremierbusinessscho
ols,withafacultyteamrenowned
for its business experience and academic credentials. The
School has earned international recognition for
its innovative approaches to team-based and experiential
learning. In addition to its highly acclaimed MBA
programs,Queen’sSchoolofBusinessisalsohometoCanada’smostp
restigiousundergraduatebusiness
programandseveraloutstandinggraduateprograms.Aswell,theScho
olisoneoftheworld’slargestand
most respected providers of executive education.
A01_MCKE0260_03_GE_FM.indd 15 26/11/14 9:32 PM
16 Preface
30. These materials have proven highly successful within all
programs because we adapt
how the material is presented according to the level of the
students. Whereas under-
graduate students “learn” about critical business issues from the
book and mini cases
for the first time, graduate students are able to “relate” to these
same critical issues
based on their previous business experience. As a result,
graduate students are able to
introduce personal experiences into the discussion of these
critical IT issues.
orgAnizAtion of thiS Book
One of the advantages of an issues-focused structure is that
chapters can be approached
in any order because they do not build on one another. Chapter
order is immaterial; that
is, one does not need to read the first three chapters to
understand the fourth. This pro-
vides an instructor with maximum flexibility to organize a
course as he or she sees fit.
Thus, within different courses/programs, the order of topics can
be changed to focus on
different IT concepts.
Furthermore, because each mini case includes multiple issues,
they, too, can be
used to serve different purposes. For example, the mini case
“Building Shared Services
at RR Communications” can be used to focus on issues of
governance, organizational
structure, and/or change management just as easily as shared
services. The result is a
31. rich set of instructional materials that lends itself well to a
variety of pedagogical appli-
cations, particularly problem-based learning, and that clearly
illustrates the reality of IT
strategy in action.
The book is organized into four sections, each emphasizing a
key component of
developing and delivering effective IT strategy:
• Section I: Delivering Value with IT is designed to examine the
complex ways that
IT and business value are related. Over the past twenty years,
researchers and prac-
titioners have come to understand that “business value” can
mean many different
things when applied to IT. Chapter 1 (The IT Value Proposition)
explores these con-
cepts in depth. Unlike the simplistic value propositions often
used when imple-
menting IT in organizations, this chapter presents “value” as a
multilayered busi-
ness construct that must be effectively managed at several
levels if technology is
to achieve the benefits expected. Chapter 2 (Delivering
Business Value through IT
Strategy) examines the dynamic interrelationship between
business and IT strat-
egy and looks at the processes and critical success factors used
by organizations to
ensure that both are well aligned. Chapter 3 (Making IT Count)
discusses new ways
ofmeasuringIT’seffectivenessthatpromotecloserbusiness–
ITalignmentandhelp
drive greater business value. Chapter 4 (Effective Business–IT
Relationships) exam-
32. ines the nature of the business–IT relationship and the
characteristics of an effec-
tive relationship that delivers real value to the enterprise.
Chapter 5 (Business–IT
Communication) explores the business and interpersonal
competencies that IT staff
will need in order to do their jobs effectively over the next five
to seven years and
what companies should be doing to develop them. Finally,
Chapter 6 (Effective IT
Leadership) tackles the increasing need for improved leadership
skills in all IT staff
and examines the expectations of the business for strategic and
innovative guid-
ance from IT.
A01_MCKE0260_03_GE_FM.indd 16 26/11/14 9:32 PM
Preface 17
In the mini cases associated with this section, the concepts of
delivering
value with IT are explored in a number of different ways. We
see business and
IT executives at Hefty Hardware grappling with conflicting
priorities and per-
spectives and how best to work together to achieve the
company’s strategy. In
“Investing in TUFS,” CIO Martin Drysdale watches as all of the
work his IT depart-
ment has put into a major new system fails to deliver value. And
the “IT Planning
atModMeters”minicasefollowsCIOBrianSmith’seffortstocreateas
trategic
33. IT plan that will align with business strategy, keep IT running,
and not increase
IT’sbudget.
• Section II: IT Governance explores key concepts in how the IT
organization is
structured and managed to effectively deliver IT products and
services to the orga-
nization. Chapter 7 (Effective IT Shared Services) discusses
how IT shared services
should be selected, organized, managed, and governed to
achieve improved organi-
zational performance. Chapter 8 (Successful IT Sourcing:
Maturity Model, Sourcing
Options, and Decision Criteria) examines how organizations are
choosing to source
and deliver different types of IT functions and presents a
framework to guide sourc-
ingdecisions.Chapter9(Budgeting:Planning’sEvilTwin)describes
the“eviltwin”
of IT strategy, discussing how budgeting mechanisms can
significantly undermine
effective business strategies and suggesting practices for
addressing this problem
while maintaining traditional fiscal accountability. Chapter 10
(Risk Management
in IT) describes how many IT organizations have been given the
responsibility of
not only managing risk in their own activities (i.e., project
development, operations,
and delivering business strategy) but also of managing IT-based
risk in all company
activities (e.g., mobile computing, file sharing, and online
access to information and
software) and the need for a holistic framework to understand
and deal with risk
34. effectively. Chapter 11 (Information Management: Stages and
Issues) describes how
new organizational needs for more useful and integrated
information are driving
the development of business-oriented functions within IT that
focus specifically on
information and knowledge, as opposed to applications and
data.
The mini cases in this section examine the difficulties of
managing com-
plex IT issues when they intersect substantially with important
business issues.
In “Building Shared Services at RR Communications,” we see
an IT organiza-
tion in transition from a traditional divisional structure and
governance model
to a more centralized enterprise model, and the long-term
challenges experi-
enced by CIO Vince Patton in changing both business and IT
practices, includ-
ing information management and delivery, to support this new
approach. In
“Enterprise Architecture at Nationstate Insurance,” CIO Jane
Denton endeavors
to make IT more flexible and agile, while incorporating new and
emerging tech-
nologies into its strategy. In “IT Investment at North American
Financial,” we
show the opportunities and challenges involved in prioritizing
and resourcing
enterprisewide IT projects and monitoring that anticipated
benefits are being
achieved.
• Section III: IT-Enabled Innovation discusses some of the ways
35. technology is
being used to transform organizations. Chapter 12 (Technology-
Driven Innovation)
examines the nature and importance of innovation with IT and
describes a typi-
cal innovation life cycle. Chapter 13 (When Big Data and Social
Computing Meet)
discusses how IT leaders are incorporating big data and social
media concepts
A01_MCKE0260_03_GE_FM.indd 17 26/11/14 9:32 PM
18 Preface
and technologies to successfully deliver business value in new
ways. Chapter 14
(Effective Customer Experience) explores the IT function’s role
in creating and
improvinganorganization’scustomerexperiencesandtheroleoftech
nologyin
helping companies to understand and learn from their
customers’ experiences.
Chapter 15 (Business Intelligence: An Overview) looks at the
nature of business
intelligence and its relationship to data, information, and
knowledge and how
IT can be used to build a more intelligent organization. Chapter
16 (Technology-
Enabled Collaboration) identifies the principal forms of
collaboration used in orga-
nizations, the primary business drivers involved in them, how
their business value
is measured, and the roles of IT and the business in enabling
collaboration.
36. The mini cases in this section focus on the key challenges
companies face in
innovating with IT. “Innovation at International Foods”
contrasts the need for pro-
cess and control in corporate IT with the strong push to
innovate with technology
and the difficulties that ensue from the clash of style and
culture. “Consumerization
of Technology at IFG” looks at issues such as “bring your own
device” (BYOD) to
the workplace. In “CRM at Minitrex,” we see some of the
internal technological and
political conflicts that result from a strategic decision to
become more customercen-
tric. Finally, “Customer Service at Datatronics” explores the
importance of present-
ing unified, customer-facing IT to customers.
• Section IV: IT Portfolio Development and Management looks
at how the IT func-
tion must transform itself to be able to deliver business value
effectively in the
future. Chapter 17 (Managing the Application Portfolio)
describes the ongoing
management process of categorizing, assessing, and
rationalizing the IT applica-
tion portfolio. Chapter 18 (IT Demand Management: Supply
Management is Not
Enough) looks at the often neglected issue of demand
management (as opposed
to supply management), explores the root causes of the demand
for IT services,
and identifies a number of tools and enablers to facilitate more
effective demand
management. Chapter 19 (Technology Roadmap: Benefits,
37. Elements, and Practical
Steps) examines the challenges IT managers face in
implementing new infrastruc-
ture, technology standards, and types of technology in their
real-world business and
technical environments, which is composed of a huge variety of
hardware, software,
applications, and other technologies, some of which date back
more than thirty
years. Chapter 20 (Emerging Development Practices) explores
how system develop-
ment practices are changing and how managers can create an
environment to pro-
mote improved development productivity. And Chapter 21
(Information Delivery:
Past, Present, and Future) examines the fresh challenges IT
faces in managing the
exponential growth of data and digital assets; privacy and
accountability concerns;
and new demands for access to information on an anywhere,
anytime basis.
The mini cases associated with this section describe many of
these themes
embedded within real organizational contexts. “Project
Management at MM” mini
case shows how a top-priority, strategic project can take a
wrong turn when proj-
ect management skills are ineffective. “Working Smarter at
Continental Furniture”
minicasefollowsaninitiativetoimprovethecompany’sanalyticssoit
canreduce
its environmental impact. And in the mini case “Managing
Technology at Genex
Fuels,” we see CIO Nick Devlin trying to implement
enterprisewide technology for
38. competitive advantage in an organization that has been limping
along with obscure
and outdated systems.
A01_MCKE0260_03_GE_FM.indd 18 26/11/14 9:32 PM
Preface 19
SupplementAry mAteriAlS
online instructor resource center
The following supplements are available online to adopting
instructors:
• PowerPointLectureNotes
• ImageLibrary(textart)
• ExtensiveTeachingNotesforallMinicases
•
AdditionalchaptersincludingDevelopingITProfessionalism;ITSo
urcing;Master
Data Management; Developing IT Capabilities; The Identity
Management Challenge;
Social Computing; Managing Perceptions of IT; IT in the New
World of Corporate
Governance Reforms; Enhancing Customer Experiences with
Technology; Creating
Digital Dashboards; and Managing Electronic Communications.
•
Additionalminicases,includingITLeadershipatMaxTrade;Creatin
gaProcess-Driven
Organization at Ag-Credit; Information Management at
Homestyle Hotels; Knowledge
39. Management at Acme Consulting; Desktop Provisioning at
CanCredit; and Leveraging
IT Vendors at SleepSmart.
For detailed descriptions of all of the supplements just listed,
please visit
www.pearsongloableditions.com/McKeen.
courseSmart etextbooks online
CourseSmart* is an exciting new choice for students looking to
save money. As an alter-
native to purchasing the print textbook, students can purchase
an electronic version of
the same content and save up to 50 percent off the suggested list
price of the print text.
With a CourseSmart etextbook, students can search the text,
make notes online, print
out reading assignments that incorporate lecture notes, and
bookmark important pas-
sages for later review. www.coursesmart.co.uk.
* This product may not be available in all markets. For more
details, please visit www.coursesmart.co.uk or
contact your local Pearson representative.
the geneSiS of thiS Book
Since 1990 we have been meeting quarterly with a group of
senior IT managers from a
number of leading-edge organizations (e.g., Eli Lilly, BMO,
Honda, HP, CIBC, IBM, Sears,
Bell Canada, MacDonalds, and Sun Life) to identify and discuss
critical IT manage-
ment issues. This focus group represents a wide variety of
industry sectors (e.g., retail,
manufacturing, pharmaceutical, banking, telecommunications,
40. insurance, media, food
processing, government, and automotive). Originally, it was
established to meet the com-
panies’ needs for well-balanced, thoughtful, yet practical
information on emerging IT
management topics, about which little or no research was
available. However, we soon
recognized the value of this premise for our own research in the
rapidly evolving field
of IT management. As a result, it quickly became a full-scale
research program in which
we were able to use the focus group as an “early warning
system” to document new IT
management issues, develop case studies around them, and
explore more collaborative
approaches to identifying trends, challenges, and effective
practices in each topic area.3
3 This now includes best practice case studies, field research in
organizations, multidisciplinary qualitative
and quantitative research projects, and participation in
numerous CIO research consortia.
A01_MCKE0260_03_GE_FM.indd 19 26/11/14 9:32 PM
20 Preface
As we shared our materials with our business students, we
realized that this issues-based
approach resonated strongly with them, and we began to
incorporate more of our research
intotheclassroom.Thisbookistheresultofourmanyyears’workwiths
eniorITmanag-
ers, in organizations, and with students in the classroom.
41. Each issue in this book has been selected collaboratively by the
focus group after
debateanddiscussion.Asfacilitators,ourjobhasbeentokeepthegrou
p’sfocusonIT
management issues, not technology per se. In preparation for
each meeting, focus group
members researched the topic within their own organization,
often involving a number
of members of their senior IT management team as well as
subject matter experts in
the process. To guide them, we provided a series of questions
about the issue, although
members are always free to explore it as they see fit. This
approach provided both struc-
ture for the ensuing discussion and flexibility for those
members whose organizations
are approaching the issue in a different fashion.
The focus group then met in a full-day session, where the
members discussed all
aspects of the issue. Many also shared corporate documents with
the group. We facilitated
the discussion, in particular pushing the group to achieve a
common understanding of
the dimensions of the issue and seeking examples, best
practices, and guidelines for deal-
ing with the challenges involved. Following each session, we
wrote a report based on the
discussion, incorporating relevant academic and practitioner
materials where these were
available. (Because some topics are “bleeding edge,” there is
often little traditional IT
research available on them.)
Each report has three parts:
42. 1. A description of the issue and the challenges it presents for
both business and IT
managers
2. Models and concepts derived from the literature to position
the issue within a con-
textual framework
3. Near-term strategies (i.e., those that can be implemented
immediately) that have
proven successful within organizations for dealing with the
specific issue
Each chapter in this book focuses on one of these critical IT
issues. We have learned
over the years that the issues themselves vary little across
industries and organizations,
even in enterprises with unique IT strategies. However, each
organization tackles the
same issue somewhat differently. It is this diversity that
provides the richness of insight
in these chapters. Our collaborative research approach is based
on our belief that when
dealing with complex and leading-edge issues, “everyone has
part of the solution.”
Every focus group, therefore, provides us an opportunity to
explore a topic from a
variety of perspectives and to integrate different experiences
(both successful and oth-
erwise) so that collectively, a thorough understanding of each
issue can be developed
and strategies for how it can be managed most successfully can
be identified.
A01_MCKE0260_03_GE_FM.indd 20 26/11/14 9:32 PM
43. AbouT THE AuTHorS
James D.
McKeenisProfessorEmeritusattheQueen’sSchoolofBusiness.Heh
asbeen
working in the IT field for many years as a practitioner,
researcher, and consultant. In
2011, he was named the “IT Educator of the Year” by
ComputerWorld Canada. Jim has
taught at universities in the United Kingdom, France, Germany,
and the United States.
His research is widely published in a number of leading journals
and he is the coau-
thor (with Heather Smith) of five books on IT management.
Their most recent book—IT
Strategy: Issues and Practices (2nd ed.)—was the best-selling
business book in Canada
(Globe and Mail, April 2012).
Heather A. Smith has been named the most-published researcher
on IT management
issuesintwosuccessivestudies(2006,2009).Aseniorresearchassoci
atewithQueen’s
University School of Business, she is the author of five books,
the most recent being IT
Strategy: Issues and Practices (Pearson Prentice Hall, 2012).
She is also a senior research
associatewiththeAmericanSocietyforInformationManagement’sA
dvancedPractices
Council. A former senior IT manager, she is codirector of the IT
Management Forum and
the CIO Brief, which facilitate interorganizational learning
among senior IT executives.
44. In addition, she consults and collaborates with organizations
worldwide.
21
A01_MCKE0260_03_GE_FM.indd 21 26/11/14 9:32 PM
ACKnowLEDGMEnTS
The work contained in this book is based on numerous meetings
with many senior IT
managers. We would like to acknowledge our indebtedness to
the following individuals
who willingly shared their insights based on their experiences
“earned the hard way”:
Michael Balenzano, Sergei Beliaev, Matthias Benfey, Nastaran
Bisheban, Peter
Borden, Eduardo Cadena, Dale Castle, Marc Collins, Diane
Cope, Dan Di Salvo,
Ken Dschankilic, Michael East, Nada Farah, Mark Gillard, Gary
Goldsmith, Ian
Graham, Keiko Gutierrez, Maureen Hall, Bruce Harding,
Theresa Harrington,
Tom Hopson, Heather Hutchison, Jim Irich, Zeeshan Khan,
Joanne Lafreniere,
Konstantine Liris, Lisa MacKay, Mark O’Gorman, Amin
Panjwani, Troy Pariag,
Brian Patton, Marius Podaru, Helen Restivo, Pat Sadler, A. F.
Salam, Ashish
Saxena, Joanne Scher, Stewart Scott, Andy Secord, Marie Shafi,
Helen Shih, Trudy
Sykes, Bruce Thompson, Raju Uppalapati, Len Van Greuning,
Laurie Schatzberg,
45. Ted Vincent, and Bond Wetherbe.
WewouldalsoliketorecognizethecontributionofQueen’sSchoolof
Business
to this work. The school has facilitated and supported our vision
of better integrat-
ing academic research and practice and has helped make our
collaborative approach
to the study of IT management and strategy an effective model
for interorganizational
learning.
James D. McKeen
Kingston, Ontario
Heather A. Smith
School of Business
June 2014
22
A01_MCKE0260_03_GE_FM.indd 22 26/11/14 9:32 PM
S e c t i o n i
Delivering Value with IT
Chapter 1 The IT Value Proposition
Chapter 2 Delivering Business Value through IT Strategy
Chapter 3 Making IT Count
Chapter 4 Effective Business–IT Relationships
Chapter 5 Business–IT Communication
Chapter 6 Effective IT Leadership
46. Mini Cases
■ Delivering Business Value with IT at Hefty Hardware
■ Investing in TUFS
■ IT Planning at ModMeters
M01_MCKE0260_03_GE_C01.indd 23 12/3/14 8:33 PM
24
C h a p t e r
1 the it Value Proposition1
1 This chapter is based on the authors’ previously published
article, Smith, H. A., and J. D. McKeen.
“Developing and Delivering on the IT Value Proposition.”
Communications of the Association for Information
Systems 11 (April 2003): 438–50. Reproduced by permission of
the Association for Information Systems.
It’s déjà vu all over again. For at least twenty years, business
leaders have been trying to figure out exactly how and where
IT can be of value in their organizations. And IT managers have
been trying to learn how to deliver this value. When IT was
used mainly as a productivity improvement tool in small areas
of a business, this was
a relatively straightforward process. Value was measured by
reduced head counts—
usually in clerical areas—and/or the ability to process more
transactions per person.
However, as systems grew in scope and complexity,
unfortunately so did the risks. Very
few companies escaped this period without making at least a
47. few disastrous invest-
ments in systems that didn’t work or didn’t deliver the bottom-
line benefits executives
thought they would. Naturally, fingers were pointed at IT.
With the advent of the strategic use of IT in business, it became
even more difficult
to isolate and deliver on the IT value proposition. It was often
hard to tell if an invest-
ment had paid off. Who could say how many competitors had
been deterred or how
many customers had been attracted by a particular IT initiative?
Many companies can
tell horror stories of how they have been left with a substantial
investment in new forms
of technology with little to show for it. Although over the years
there have been many
improvements in where and how IT investments are made and
good controls have been
established to limit time and cost overruns, we are still not able
to accurately articulate
and deliver on a value proposition for IT when it comes to
anything other than simple
productivity improvements or cost savings.
Problems in delivering IT value can lie with how a value
proposition is conceived
or in what is done to actually implement an idea—that is,
selecting the right project and
doing the project right (Cooper et al. 2000; McKeen and Smith
2003; Peslak 2012). In
addition, although most firms attempt to calculate the expected
payback of an IT invest-
ment before making it, few actually follow up to ensure that
value has been achieved or
to question what needs to be done to make sure that value will
48. be delivered.
M01_MCKE0260_03_GE_C01.indd 24 12/3/14 8:33 PM
Chapter1 • TheITValueProposition 25
This chapter first looks at the nature of IT value and “peels the
onion” into its
different layers. Then it examines the three components of
delivering IT value: value
identification, conversion, and value realization. Finally, it
identifies five general
principles for ensuring IT value will be achieved.
Peeling the OniOn: Understanding it ValUe
Thirty years ago the IT value proposition was seen as a simple
equation: Deliver the
right technology to the organization, and financial benefits will
follow (Cronk and
Fitzgerald 1999; Marchand et al. 2000). In the early days of IT,
when computers were
most often used as direct substitutes for people, this equation
was understandable,
even if it rarely worked this simply. It was easy to compute a
bottom-line benefit where
“technology” dollars replaced “salary” dollars.
Problems with this simplistic view quickly arose when
technology came to be
used as a productivity support tool and as a strategic tool.
Under these conditions,
managers had to decide if an IT investment was worth making if
it saved people time,
49. helped them make better decisions, or improved service. Thus,
other factors, such as
how well technology was used by people or how IT and
business processes worked
together, became important considerations in how much value
was realized from an IT
investment. These issues have long confounded our
understanding of the IT value prop-
osition, leading to a plethora of opinions (many negative) about
how and where technol-
ogy has actually contributed to business value. Stephen Roach
(1989) made headlines
with his macroeconomic analysis showing that IT had had
absolutely no impact on pro-
ductivity in the services sector. More recently, research shows
that companies still have a
mixed record in linking IT to organizational performance, user
satisfaction, productivity,
customer experience, and agility (Peslak 2012).
These perceptions, plus ever-increasing IT expenditures, have
meant business
managers are taking a closer look at how and where IT delivers
value to an organization
(Ginzberg 2001; Luftman and Zadeh 2011). As they do this,
they are beginning to change
their understanding of the IT value proposition. Although,
unfortunately, “silver bullet
thinking” (i.e., plug in technology and deliver bottom-line
impact) still predomi-
nates, IT value is increasingly seen as a multilayered concept,
far more complex than
it first appeared. This suggests that before an IT value
proposition can be identified
and delivered, it is essential that managers first “peel the
onion” and understand more
50. about the nature of IT value itself (see Figure 1.1).
What is it Value?
Value is defined as the worth or desirability of a thing (Cronk
and Fitzgerald 1999). It is
a subjective assessment. Although many believe this is not so,
the value of IT depends
very much on how a business and its individual managers
choose to view it. Different
companies and even different executives will define it quite
differently. Strategic posi-
tioning, increased productivity, improved decision making, cost
savings, or improved
service are all ways value could be defined. Today most
businesses define value broadly
and loosely, not simply as a financial concept (Chakravarty et
al. 2013). Ideally, it is tied
to the organization’s business model because adding value with
IT should enable a firm
to do its business better. In the focus group (see the Preface),
one company sees value
M01_MCKE0260_03_GE_C01.indd 25 12/3/14 8:33 PM
26 SectionI • DeliveringValuewithIT
resulting from all parts of the organization having the same
processes; another defines
value by return on investment (ROI); still another measures it
by a composite of key
performance indicators. In short, there is no single agreed-on
measure of IT value. As a
result, misunderstandings about the definition of value either
51. between IT and the busi-
ness or among business managers themselves can lead to
feelings that value has not
been delivered. Therefore, a prerequisite of any IT value
proposition is that everyone
involved in an IT initiative agree on what value they are trying
to deliver and how they
will recognize it.
Where is it Value?
Value may also vary according to where one looks for it
(Davern and Kauffman 2000;
Oliveira and Martins 2011). For example, value to an enterprise
may not be perceived as
value in a work group or by an individual. In fact, delivering
value at one level in an orga-
nization may actually conflict with optimizing value at another
level. Decisions about
IT value are often made to optimize firm or business process
value, even if they cause
difficulties for business units or individuals. As one manager
explained, “At the senior
levels, our bottom-line drivers of value are cost savings, cash
flow, customer satisfaction,
and revenue. These are not always visible at the lower levels of
the organization.” Failure
to consider value implications at all levels can lead to a value
proposition that is coun-
terproductive and may not deliver the value that is anticipated.
Many executives take a
hard line with these value conflicts. However, it is far more
desirable to aim for a value
What Value will be
Delivered?
52. Where will Value be
Delivered?
Who will
Deliver Value?
When will Value
be Delivered?
How will Value
be Delivered?
FigUre 1.1 IT Value Is a Many-Layered Concept
M01_MCKE0260_03_GE_C01.indd 26 12/3/14 8:33 PM
Chapter1 • TheITValueProposition 27
that is not a win–lose proposition but is a win–win at all levels.
This can leverage overall
value many times over (Chan 2000; Grant and Royle 2011).
Who delivers it Value?
Increasingly, managers are realizing that it is the interaction of
people, information, and
technology that delivers value, not IT alone.2 Studies have
confirmed that strong IT
practices alone do not deliver superior performance. It is only
the combination of these
IT practices with an organization’s skills at managing
information and people’s behav-
iors and beliefs that leads to real value (Birdsall 2011; Ginzberg
53. 2001; Marchand et al.
2000). In the past, IT has borne most of the responsibility for
delivering IT value. Today,
however, business managers exhibit a growing willingness to
share responsibility with
IT to ensure value is realized from the organization’s
investments in technology. Most
companies now expect to have an executive sponsor for any IT
initiative and some busi-
ness participation in the development team. However, many IT
projects still do not
have the degree of support or commitment from the business
that IT managers feel is
necessary to deliver fully on a value proposition (Peslak 2012).
When is it Value realized?
Value also has a time dimension. It has long been known that
the benefits of technol-
ogy take time to be realized (Chan 2000; Segars and Chatterjee
2010). People must be
trained, organizations and processes must adapt to new ways of
working, information
must be compiled, and customers must realize what new
products and services are
being offered. Companies are often unprepared for the time it
takes an investment to
pay off. Typically, full payback can take between three and five
years and can have at
least two spikes as a business adapts to the deployment of
technology. Figure 1.2 shows
this “W” effect, named for the way the chart looks, for a single
IT project.
Initially, companies spend a considerable amount in deploying a
new technology.
54. During this twelve-to-sixteen-month period, no benefits occur.
Following implementa-
tion, some value is realized as companies achieve initial
efficiencies. This period lasts
for about six months. However, as use increases, complexities
also grow. Information
overload can occur and costs increase. At this stage, many can
lose faith in the initia-
tive. This is a dangerous period. The final set of benefits can
occur only by making the
business simpler and applying technology, information, and
people more effectively. If
a business can manage to do this, it can achieve sustainable,
long-term value from its IT
investment (Segars and Chatterjee 2010). If it can’t, value from
technology can be offset
by increased complexity.
Time also changes perceptions of value. Many IT managers can
tell stories of
how an initiative is vilified as having little or no value when
first implemented, only
to have people say they couldn’t imagine running the business
without it a few years
later. Similarly, most managers can identify projects where time
has led to a clearer
2 These interactions in a structured form are known as
processes. Processes are often the focus of much orga-
nizational effort in the belief that streamlining and
reengineering them will deliver value. In fact, research
shows that without attention to information and people, very
little value is delivered (Segars and Chatterjee
2010). In addition, attention to processes in organizations often
ignores the informal processes that contribute
to value.
55. M01_MCKE0260_03_GE_C01.indd 27 12/3/14 8:33 PM
28 SectionI • DeliveringValuewithIT
understanding of the potential value of a project. Unfortunately,
in cases where antici-
pated value declines or disappears, projects don’t always get
killed (Cooper et al. 2000).
Clarifying and agreeing on these different layers of IT value is
the first step involved
in developing and delivering on the IT value proposition. All
too often, this work is for-
gotten or given short shrift in the organization’s haste to answer
this question: How will
IT value be delivered? (See next section.) As a result,
misunderstandings arise and tech-
nology projects do not fulfill their expected promises. It will be
next to impossible to do a
good job developing and delivering IT value unless and until
the concepts involved in IT
value are clearly understood and agreed on by both business and
IT managers.
the three COmPOnents OF the it ValUe PrOPOsitiOn
Developing and delivering an IT value proposition involves
addressing three compo-
nents. First, potential opportunities for adding value must be
identified. Second, these
opportunities must be converted into effective applications of
technology. Finally, value
56. 12–16 Months
EVA
Time
Get the House
in Order
Harvest Low-
Hanging Fruit
Make the
Business
Complex
Make Business
Simpler
16–22 Months 22–38 Months 3–5 Years
FigUre 1.2 The ‘W’ Effect in Delivering IT Value (Segars &
Chatterjee, 2010)
Best Practices in Understanding IT Value
• LinkITvaluedirectlytoyourbusinessmodel.
•
Recognizevalueissubjective,andmanageperceptionsaccordingly.
• Aimforavalue“win–
win”acrossprocesses,workunits,andindividuals.
• SeekbusinesscommitmenttoallITprojects.
• Managevalueovertime.
M01_MCKE0260_03_GE_C01.indd 28 12/3/14 8:33 PM
57. Chapter1 • TheITValueProposition 29
must be realized by the organization. Together, these
components comprise the funda-
mentals of any value proposition (see Figure 1.3).
identification of Potential Value
Identifying opportunities for making IT investments has
typically been a fairly
informal activity in most organizations. Very few companies
have a well-organized
means of doing research into new technologies or strategizing
about where these tech-
nologies can be used (McKeen and Smith 2010). More
companies have mechanisms
for identifying opportunities within business units. Sometimes a
senior IT manager
will be designated as a “relationship manager” for a particular
unit with responsi-
bility for working with business management to identify
opportunities where IT
could add value (Agarwal and Sambamurthy 2002; Peslak
2012). Many other com-
panies, however, still leave it up to business managers to
identify where they want
to use IT. There is growing evidence that relegating the IT
organization to a passive
role in developing systems according to business instructions is
unlikely to lead to
high IT value. Research shows that involving IT in business
planning can have a direct
and positive influence on the development of successful
business strategies using IT
58. (Ginzberg 2001; Marchand et al. 2000). This suggests that
organizations should estab-
lish joint business–IT mechanisms to identify and evaluate both
business and technical
opportunities where IT can add value.
Once opportunities have been identified, companies must then
make decisions
about where they want to focus their dollars to achieve optimal
value. Selecting the
right projects for an organization always involves balancing
three fundamental factors:
cash, timing, and risk (Luehrman 1997). In principle, every
company wants to under-
take only high-return projects. In reality, project selection is
based on many different
factors. For example, pet or political projects or those mandated
by the government or
competitors are often part of a company’s IT portfolio (Carte et
al. 2001). Disagreement
at senior levels about which projects to undertake can arise
because of a lack of a coher-
ent and consistent mechanism for assessing project value. All
organizations need some
formal mechanism for prioritizing projects. Without one, it is
very likely that project
selection will become highly politicized and, hence, ineffective
at delivering value.
There are a variety of means to do this, ranging from using
strictly bottom-line metrics,
to comparing balanced scorecards, to adopting a formal value-
assessment methodology.
However, although these methods help to weed out higher cost–
lower return projects,
they do not constitute a foolproof means of selecting the right
projects for an organiza-
59. tion. Using strict financial selection criteria, for example, can
exclude potentially high-
value strategic projects that have less well-defined returns,
longer payback periods,
and more risk (Cooper et al. 2000; DeSouza 2011). Similarly, it
can be difficult getting
Identification Conversion Realization
IT
Value
FigUre 1.3 The Three Components of the IT Value Proposition
M01_MCKE0260_03_GE_C01.indd 29 12/3/14 8:33 PM
30 SectionI • DeliveringValuewithIT
important infrastructure initiatives funded even though these
may be fundamental to
improving organizational capabilities (Byrd 2001).
Therefore, organizations are increasingly taking a portfolio
approach to project
selection. This approach allocates resources and funding to
different types of projects,
enabling each type of opportunity to be evaluated according to
different criteria (McKeen
and Smith 2003; Smith and McKeen 2010). One company has
identified three different
classes of IT—infrastructure, common systems, and business
unit applications—and
funds them in different proportions. In other companies,
funding for strategic initia-
60. tives is allocated in stages so their potential value can be
reassessed as more information
about them becomes known. Almost all companies have found it
necessary to justify
infrastructure initiatives differently than more business-oriented
projects. In fact, some
remove these types of projects from the selection process
altogether and fund them with
a “tax” on all other development (McKeen and Smith 2003).
Other companies allocate a
fixed percentage of their IT budgets to a technology renewal
fund.
Organizations have come a long way in formalizing where and
how they choose to
invest their IT dollars. Nevertheless, there is still considerable
room for judgment based
on solid business and technical knowledge. It is, therefore,
essential that all executives
involved have the ability to think strategically and
systematically as well as financially
about project identification and selection.
effective Conversion
“Conversion” from idea/opportunity to reality has been what IT
organizations have
been all about since their inception. A huge amount of effort
has gone into this central
component of the IT value proposition. As a result, many IT
organizations have become
very good at developing and delivering projects on time and on
budget. Excellent
project management, effective execution, and reliable
operations are a critical part of
IT value. However, they are not, in and of themselves,
61. sufficient to convert a good idea
into value or to deliver value to an organization.
Today managers and researchers are both recognizing that more
is involved in
effective conversion than good IT practices. Organizations can
set themselves up for
failure by not providing adequate and qualified resources. Many
companies start more
projects than they can effectively deliver with the resources
they have available. Not
having enough time or resources to do the job means that people
are spread too thin
and end up taking shortcuts that are potentially damaging to
value (Cooper et al. 2000).
Resource limitations on the business side of a project team can
be as damaging to con-
version as a lack of technical resources. “[Value is about] far
more than just sophisticated
managerial visions. . . . Training and other efforts . . . to obtain
value from IT investments
Best Practices in Identifying Potential Value
• Jointbusiness–
ITstructurestorecognizeandevaluateopportunities
• Ameansofcomparingvalueacrossprojects
• Aportfolioapproachtoprojectselection
• Afundingmechanismforinfrastructure
M01_MCKE0260_03_GE_C01.indd 30 12/3/14 8:33 PM
Chapter1 • TheITValueProposition 31
62. are often hamstrung by insufficient resources” (Chircu and
Kauffman 2000). Inadequate
business resources can lead to poor communication and
ineffective problem solving on
a project (Ginzberg 2001). Companies are beginning to
recognize that the number and
quality of the staff assigned to an IT project can make a
difference to its eventual out-
come. They are insisting that the organization’s best IT and
businesspeople be assigned
to critical projects.
Other significant barriers to conversion that are becoming more
apparent now
that IT has improved its own internal practices include the
following:
• Organizational barriers. The effective implementation of IT
frequently requires
the extensive redesign of current business processes (Chircu and
Kauffman 2000).
However, organizations are often reluctant to make the difficult
complementary
business changes and investments that are required (Carte et al.
2001). “When
new IT is implemented, everyone expects to see costs come
down,” explained one
manager. “However, most projects involve both business and IT
deliverables. We,
therefore, need to take a multifunctional approach to driving
business value.” In
recognition of this fact, some companies are beginning to put
formal change man-
agement programs in place to help businesses prepare for the
changes involved
with IT projects and to adapt and simplify as they learn how to
63. take advantage of
new technology.
• Knowledge barriers. Most often new technology and processes
require employ-
ees to work differently, learn new skills, and have new
understanding of how and
where information, people, and technologies fit together (Chircu
and Kauffman
2000; Perez-Lopez and Alegre 2012). Although training has
long been part of new
IT implementations, more recently businesses are recognizing
that delivering value
from technology requires a broader and more coordinated
learning effort (Smith
and McKeen 2002). Lasting value comes from people and
technology working
together as a system rather than as discrete entities. Research
confirms that high-
performing organizations not only have strong IT practices but
also have people
who have good information management practices and who are
able to effectively
use the information they receive (Beath et al. 2012; Marchand et
al. 2000).
realizing Value
The final component of the IT value proposition has been the
most frequently ignored.
This is the work involved in actually realizing value after
technology has been imple-
mented. Value realization is a proactive and long-term process
for any major initiative.
All too often, after an intense implementation period, a
development team is disbanded
64. to work on other projects, and the business areas affected by
new technology are left to
Best Practices in Conversion
• AvailabilityofadequateandqualifiedITandbusinessresources
• Traininginbusinessgoalsandprocesses
• Multifunctionalchangemanagement
• Emphasisonhigher-levellearningandknowledgemanagement
M01_MCKE0260_03_GE_C01.indd 31 12/3/14 8:33 PM
32 SectionI • DeliveringValuewithIT
sink or swim. As a result, a project’s benefits can be
imperfectly realized. Technology
must be used extensively if it is to deliver value. Poorly
designed technology can lead
to high levels of frustration, resistance to change, and low
levels of use (Chircu and
Kauffman 2000; Sun et al., 2012).
Resistance to change can have its root cause in an assumption or
an action that
doesn’t make sense in the everyday work people do. Sometimes
this means challeng-
ing workers’ understanding of work expectations or information
flows. At other times
it means doing better analysis of where and how a new process
is causing bottlenecks,
overwork, or overload. As one manager put it, “If value is not
being delivered, we
need to understand the root causes and do something about it.”
His company takes
65. the unusual position that it is important to keep a team working
on a project until the
expected benefits have been realized. This approach is ideal but
can also be very costly
and, therefore, must be carefully managed. Some companies try
to short-circuit the
value management process by simply taking anticipated cost
savings out of a business
unit’s budget once technology has been implemented, thereby
forcing it to do more
with less whether or not the technology has been as beneficial
as anticipated. However,
most often organizations do little or no follow-up to determine
whether or not benefits
have been achieved.
Measurement is a key component of value realization (Thorp
1999). After imple-
mentation, it is essential that all stakeholders systematically
compare outcomes against
expected value and take appropriate actions to achieve benefits.
In addition to monitor-
ing metrics, a thorough and ongoing assessment of value and
information flows must
also be undertaken at all levels of analysis: individual, team,
work unit, and enterprise.
Efforts must be taken to understand and improve aspects of
process, information, and
technology that are acting as barriers to achieving value.
A significant problem with not paying attention to value
recognition is that areas
of unexpected value or opportunity are also ignored. This is
unfortunate because it is
only after technology has been installed that many
businesspeople can see how it could
66. be leveraged in other parts of their work. Realizing value
should, therefore, also include
provisions to evaluate new opportunities arising through
serendipity.
FiVe PrinCiPles FOr deliVering ValUe
In addition to clearly understanding what value means in a
particular organization and
ensuring that the three components of the IT value proposition
are addressed by every
project, five principles have been identified that are central to
developing and deliver-
ing value in every organization.
Best Practices in Realizing Value
• Planavalue-realizationphaseforallITprojects.
• Measureoutcomesagainstexpectedresults.
• Lookforandeliminaterootcausesofproblems.
• Assessvaluerealizationatalllevelsintheorganization.
• Haveprovisionsforactingonnewopportunitiestoleveragevalue.
M01_MCKE0260_03_GE_C01.indd 32 12/3/14 8:33 PM
Chapter1 • TheITValueProposition 33
Principle 1. have a Clearly defined Portfolio
Value management Process
Every organization should have a common process for managing
the overall value
being delivered to the organization from its IT portfolio. This
would begin as a means of
67. identifying and prioritizing IT opportunities by potential value
relative to each other. It
would also include mechanisms to optimize enterprise value
(e.g., through tactical, stra-
tegic, and infrastructure projects) according to a rubric of how
the organization wants
to allocate its resources.
A portfolio value management process should continue to track
projects as they
are being developed. It should ensure not only that projects are
meeting schedule and
budget milestones but also that other elements of conversion
effectiveness are being
addressed (e.g., business process redesign, training, change
management, informa-
tion management, and usability). A key barrier to achieving
value can be an organiza-
tion’s unwillingness to revisit the decisions made about its
portfolio (Carte et al. 2001).
Yet this is critically important for strategic and infrastructure
initiatives in particular.
Companies may have to approve investments in these types of
projects based on imper-
fect information in an uncertain environment. As they develop,
improved information
can lead to better decision making about an investment. In some
cases this might lead to
a decision to kill a project; in others, to speed it up or to
reshape it as a value proposition
becomes clearer.
Finally, a portfolio value management process should include an
ongoing means
of ensuring that value is realized from an investment.
Management must monitor
68. expected outcomes at appropriate times following
implementation and hold someone
in the organization accountable for delivering benefits (Smith
and McKeen 2010).
Principle 2. aim for Chunks of Value
Much value can be frittered away by dissipating IT investments
on too many projects
(Cho et al. 2013; Marchand et al. 2000). Focusing on a few key
areas and designing a set
of complementary projects that will really make a difference is
one way companies are
trying to address this concern. Many companies are undertaking
larger and larger tech-
nology initiatives that will have a significant transformational
and/or strategic impact
on the organization. However, unlike earlier efforts, which
often took years to complete
and ended up having questionable value, these initiatives are
aiming to deliver major
value through a series of small, focused projects that, linked
together, will result in both
immediate short-term impact and long-term strategic value. For
example, one company
has about three hundred to four hundred projects underway
linked to one of a dozen
major initiatives.
Principle 3. adopt a holistic Orientation to technology Value
Because value comes from the effective interaction of people,
information, and tech-
nology, it is critical that organizations aim to optimize their
ability to manage and use
them together (Marchand et al. 2000). Adopting a systemic
69. approach to value, where
technology is not viewed in isolation and interactions and
impacts are anticipated and
planned, has been demonstrated to contribute to perceived
business value (Ginzberg
2001). Managers should aim to incorporate technology as an
integral part of an overall
M01_MCKE0260_03_GE_C01.indd 33 12/3/14 8:33 PM
34 SectionI • DeliveringValuewithIT
program of business change rather than dealing with people and
information manage-
ment as afterthoughts to technology (Beath et al. 2012). One
company has done this by
taking a single business objective (e.g., “increase market
penetration by 15 percent over
five years”) and designing a program around it that includes a
number of bundled tech-
nology projects.
Principle 4. aim for Joint Ownership of technology initiatives
This principle covers a lot of territory. It includes the necessity
for strong executive
sponsorship of all IT projects. “Without an executive sponsor
for a project, we simply
won’t start it,” explained one manager. It also emphasizes that
all people involved in
a project must feel they are responsible for the results. Said
another manager, “These
days it is very hard to isolate the impact of technology,
therefore there must be a ‘we’
70. mentality.” This perspective is reinforced by research that has
found that the quality of
the IT–business relationship is central to the delivery of IT
value. Mutual trust, visible
business support for IT and its staff, and IT staff who consider
themselves to be part of
a business problem-solving team all make a significant
difference in how much value
technology is perceived to deliver (Ginzberg 2001).
Principle 5. experiment more Often
The growing complexity of technology, the range of options
available, and the
uncertainty of the business environment have each made it
considerably more difficult
to determine where and how technology investments can most
effectively be made.
Executives naturally object to the risks involved in investing
heavily in possible business
scenarios or technical gambles that may or may not realize
value. As a result, many
companies are looking for ways to firm up their understanding
of the value proposition
for a particular opportunity without incurring too much risk.
Undertaking pilot studies
is one way of doing this (DeSouza 2011). Such experiments can
prove the value of an
idea, uncover new opportunities, and identify more about what
will be needed to make
an idea successful. They provide senior managers with a greater
number of options
in managing a project and an overall technology portfolio. They
also enable poten-
tial value to be reassessed and investments in a particular
project to be reevaluated
71. and rebalanced against other opportunities more frequently. In
short, experimentation
enables technology investments to be made in chunks and makes
“go/no go” decisions
at key milestones much easier to make.
This chapter has explored the concepts
and activities involved in developing and
delivering IT value to an organization. In
their efforts to use technology to deliver
business value, IT managers should keep
clearly in mind the maxim “Value is in the
eye of the beholder.” Because there is no
single agreed-on notion of business value, it
is important to make sure that both business
and IT managers are working to a common
goal. This could be traditional cost reduction,
process efficiencies, new business capabili-
ties, improved communication, or a host of
other objectives. Although each organization
Conclusion
M01_MCKE0260_03_GE_C01.indd 34 12/3/14 8:33 PM
Chapter1 • TheITValueProposition 35
References
or business unit approaches value differ-
ently, increasingly this goal includes much
more than the simple delivery of technology
to a business unit. Today technology is being
72. used as a catalyst to drive many different
types of organizational transformation and
strategy. Therefore, IT value can no longer
be viewed in isolation from other parts of
the business, namely people and informa-
tion. Thus, it is no longer adequate to focus
simply on the development and delivery of
IT projects in order to deliver value. Today
delivering IT value means managing the
entire process from conception to cash.
Agarwal, R., and V. Sambamurthy. “Organizing
the IT Function for Business Innovation
Leadership.” Society for Information
Management Advanced Practices Council
Report, Chicago, September 2002.
Beath, C., I. Becerra-Fernandez, J. Ross, and J.
Short. “Finding Value in the Information
Explosion.” MIT Sloan Management Review 53,
no. 4 (2012): 18–20.
Birdsall, W. “Human Capabilities and
Information and Communication Technology:
The Communicative Connection.” Ethics and
Information Technology 13, no. 2 (2011): 93–106.
Byrd, T. A. “Information Technology, Core
Com petencies, and Sustained Competitive
Advantage.” Information Resources Management
Journal 14, no. 2 (April–June 2001): 27–36.
Carte, T., D. Ghosh, and R. Zmud. “The Influence
of IT Budgeting Practices on the Return
Derived from IT Investments.” CMISS White
73. Paper, November 2001.
Chakravarty, A., R. Grewal, and V. Sambamurthy.
“Information Technology Competencies,
Organizational Agility, and Firm Performance:
Enabling and Facilitating Roles.” Information
Systems Research 24, no. 4 (2013): 976–97, 1162–63,
1166.
Chan, Y. “IT Value: The Great Divide Between
Qualitative and Quantitative and Individual
and Organizational Measures.” Journal of
Management Information Systems 16, no. 4
(Spring 2000): 225–61.
Cho, W., M. Shaw, and H. Kwan. “The Effect
of Synergy Enhancement on Information
Technology Portfolio Selection.” Information
Technology and Management 14, no. 2 (2013):
125–42.
Chircu, A., and R. J. Kauffman. “Limits to Value in
Electronic Commerce-Related IT Investments.”
Journal of Management Information Systems 17,
no. 2 (Fall 2000): 59–80.
Cooper, R., S. Edgett, and E. Kleinschmidt. “New
Problems, New
Solution
s: Making Portfolio
Management More Effective.” Research
74. Technology Management 43, no. 2 (March/April
2000): 18–33.
Cronk, M., and E. Fitzgerald. “Understanding ‘IS
Business Value’: Derivation of Dimensions.”
Logistics Information Management 12, no. 1–2
(1999): 40–49.
Davern, M., and R. Kauffman. “Discovering
Potential and Realizing Value from
Information Technology Investments.” Journal
of Management Information Systems 16, no. 4
(Spring 2000): 121–43.
DeSouza, K. Intrapreneurship: Managing Ideas
in Your Organization. Toronto: University of
Toronto Press, 2011.
Ginzberg, M. “Achieving Business Value Through
Information Technology: The Nature of High
Business Value IT Organizations.” Society for
Information Management Advanced Practices
Council Report, Chicago, November 2001.
Grant, G. L., and M. T. Royle. “Information
75. Technology and Its Role in Creating Sustainable
Competitive Advantage.” Journal of International
Management Studies 6, no. 1 (2011): 1–7.
Luehrman, T. A. “What’s It Worth? A General
Manager’s Guide to Valuation.” Harvard
Business Review (May–June 1997): 131–41.
Luftman, J., and H. S. Zadeh. “Key Information
Technology and Management Issues 2010–
2011: An International Study.” Journal of
Information Technology 26, no. 3 (2011): 193–204.
M01_MCKE0260_03_GE_C01.indd 35 12/3/14 8:33 PM
36 SectionI • DeliveringValuewithIT
Marchand, D., W. Kettinger, and J. Rollins.
“Information Orientation: People, Technology
and the Bottom Line.” Sloan Management
Review (Summer 2000): 69–80.
McKeen, J. D., and H. A. Smith. Making IT
76. Happen. Chichester, England: John Wiley &
Sons, 2003.
McKeen, J. D., and H. A. Smith. “Application
Portfolio Management.” Communications for the
Association of Information Systems 26, Article 9
(March 2010), 157–70.
Oliveira, T., and M. F. Martins. “Literature Review
of Information Technology Adoption Models
at Firm Level.” Electronic Journal of Information
Systems Evaluation 14, no.1 (2011): 110–21.
Perez-Lopez, S., and J. Alegre. “Information
Technology Competency, Knowledge Processes
and Firm Performance.” Industrial Management
and Data Systems 112, no. 4 (2012): 644–62.
Peslak, A. R. “An Analysis of Critical Information
Technology Issues Facing Organizations.”
Industrial Management and Data Systems 112, no.
5 (2012): 808–27.
Roach, S. “The Case of the Missing Technology
Payback.” Presentation at the Tenth
77. International Conference on Information
Systems, Boston, December 1989.
Segars, A. H., and D. Chatterjee. “Diets That Don’t
Work: Where Enterprise Resource Planning
Goes Wrong.” Wall Street Journal, August 23,
2010. online.wsj.com/article/SB100014240527
48703514404574588060852535906.html.
Smith, H., and J. McKeen. “Instilling a Knowledge
Sharing Culture.” Presentation at the KM
Forum, Queen’s School of Business, Kingston,
Ontario, Canada, 2002.
Smith, H., and J. McKeen. “Investment Spend
Optimization at BMO Financial Group.” MISQ
Executive 9, no. 2 (June 2010): 65–81.
Sun, Y., Y. Fang, K. Lim, and D. Straub. “User
Satisfaction with Information Technology
Service Delivery: A Social Capital Perspective.”
Information Systems Research 23, no. 4 (2012):
1195–211.
Thorp, J. “Computing the Payoff from IT.” Journal of
78. Business Strategy 20, no. 3 (May/June 1999): 35–39.
M01_MCKE0260_03_GE_C01.indd 36 12/3/14 8:33 PM
37
C h a p t e r
2 Delivering Business Value through IT Strategy1
1 This chapter is based on the authors’ previously published
article, Smith, H. A., J. D. McKeen, and S. Singh.
“Developing IT Strategy for Business Value.” Journal of
Information Technology Management XVIII, no. 1 (June
2007): 49–58. Reproduced by permission of the Association of
Management.
Suddenly, it seems, executives are “getting” the strategic
potential of IT. Instead of being relegated to the back rooms of
the enterprise, IT is now being invited to the boardrooms and is
being expected to play a leading role in delivering top-
line value and business transformation (Korsten 2011; Luftman
and Zadeh 2011; Peslak
79. 2012). Thus, it can no longer be assumed that business strategy
will naturally drive IT
strategy, as has traditionally been the case. Instead, different
approaches to strategy
development are now possible and sometimes desirable. For
example, the capabilities
of new technologies could shape the strategic direction of a firm
(e.g., mobile, social
media, big data). IT could enable new competencies that would
then make new busi-
ness strategies possible (e.g., location-based advertising). New
options for governance
using IT could also change how a company works with other
firms (think Wal-Mart
or Netflix). Today new technologies coevolve with new
business strategies and new
behaviors and structures (see Figure 2.1). However, whichever
way it is developed, if
IT is to deliver business value, IT strategy must always be
closely linked with sound
business strategy.
Ideally, therefore, business and IT strategies should complement
and support each
other relative to the business environment. Strategy
80. development should be a two-way
process between the business and IT. Yet unfortunately, poor
alignment between them
remains a perennial problem (Frohman 1982; Luftman and
Zadeh 2011; McKeen and
Smith 1996; Rivard et al. 2004). Research has already identified
many organizational
challenges to effective strategic alignment. For example, if their
strategy-development
processes are not compatible (e.g., if they take place at different
times or involve differ-
ent levels of the business), it is unlikely that the business and
IT will be working toward
the same goals at the same time (Frohman 1982). Aligning with
individual business
units can lead to initiatives that suboptimize the effectiveness
of corporate strategies
(McKeen and Smith 1996). Strategy implementation must also
be carefully aligned to
M02_MCKE0260_03_GE_C02.indd 37 12/3/14 8:34 PM
38 SectionI • DeliveringValuewithIT
81. ensure the integration of business and IT efforts (Smith and
McKeen 2010). Finally, com-
panies often try to address too many priorities, leading to an
inadequate focus on key
strategic goals (Weiss and Thorogood 2011).
However, strategic alignment is only one problem facing IT
managers when they
develop IT strategy. With IT becoming so much more central to
the development and
delivery of business strategy, much more attention is now being
paid to strategy devel-
opment than in the past. What businesses want to accomplish
with their IT and how IT
shapes its own delivery strategy are increasingly vital to the
success of an enterprise.
This chapter explores how organizations are working to improve
IT strategy develop-
ment and its relationship with business strategy. It looks first at
how our understanding
of business and IT strategies has changed over time and at the
forces that will drive
even further changes in the future. Then it discusses some
critical success factors for IT
82. strategy development about which there is general consensus.
Next it looks at the dif-
ferent dimensions of the strategic use of IT that IT management
must address. Finally,
it examines how some organizations are beginning to evolve a
more formal IT strategy-
development process and some of the challenges they are facing
in doing so.
Business and iT sTraTegies: PasT, PresenT, and FuTure
At the highest level, a strategy is an approach to doing business
(Gebauer 1997).
Traditionally, a competitive business strategy has involved
performing different activi-
ties from competitors or performing similar activities in
different ways (Porter 1996).
Ideally, these activities were difficult or expensive for others to
copy and, therefore,
resulted in a long-term competitive advantage (Gebauer 1997).
They enabled firms to
charge a premium for their products and services.
Until recently, the job of an IT function was to understand the
business’s strategy
83. and figure out a plan to support it. However, all too often IT’s
strategic contribution
was inhibited by IT managers’ limited understanding of
business strategy and by busi-
ness managers’ poor understanding of IT’s potential. Therefore,
most formal IT plans
were focused on the more tactical and tangible line of business
needs or opportunities
New
Capabilities
New Behaviors & S
tructu
re
s
N
e
w
T
e
ch
84. no
lo
gy
New Strate
gie
s
Figure 2.1 Business and IT Strategies Co-evolve to Create New
Capabilities
M02_MCKE0260_03_GE_C02.indd 38 12/3/14 8:34 PM
Chapter2 • DeliveringBusinessValuethroughITStrategy 39
for operational integration rather than on supporting enterprise
strategy (Burgelman
and Doz 2001). And projects were selected largely on their
abilities to affect the short-
term bottom line rather than on delivering top-line business
85. value. “In the past IT had
to be a strategic incubator because businesspeople simply didn’t
recognize the potential
of technology,” said a member of the focus group.
As a result, instead of looking for ways to be different, in the
past much business
strategy became a relentless race to compete on efficiencies
with IT as the primary means
of doing so (Hitt et al. 1998; Porter 1996). In many industries,
companies’ improved
information-processing capabilities have been used to drive
down transaction costs to
near zero, threatening traditional value propositions and shaving
profit margins. This
is leading to considerable disruption as business models (i.e.,
the way companies add
value) are under attack by new, technology-enabled approaches
to delivering products
and services (e.g., the music industry, bookselling). Therefore:
Strategists [have to] honestly face the many weaknesses
inherent in [the]
industrial-age ways of doing things. They [must] redesign,
build upon and reconfig-
86. ure their components to radically transform the value
proposition. (Tapscott 1996)
Such new business strategies are inconceivable without the use
of IT. Other factors,
also facilitated by IT, are further influencing the relationship
between the business
and IT strategy. Increasingly, globalization is altering the
economic playing field. As
countries and companies become more deeply interrelated,
instability is amplified.
Instead of being generals plotting out a structured campaign,
business leaders are now
more likely to be participating in guerilla warfare (Eisenhardt
2002; Friedman 2005).
Flexibility, speed, and innovation are, therefore, becoming the
watchwords of competi-
tion and must be incorporated into any business or IT strategy–
development process.
These conditions have dramatically elevated the business’s
attention to the
value of IT strategy (Korsten 2011; Weiss and Thorogood
2011). As a result, business
executives recognize that it was a mistake to consider
87. technology projects to be solely
the responsibility of IT. There is, thus, a much greater
understanding that business
executives have to take leadership in making technology
investments in ways that will
shape and/or complement business strategy. There is also
recognition at the top of most
organizations that problems with IT strategy implementation are
largely the fault of
leaders who “failed to realize that adopting … systems posed a
business—not just a
technological—challenge” and didn’t take responsibility for the
organizational and
process changes that would deliver business value (Ross and
Beath 2002).
Changing value models and the development of integrated,
cross-functional
systems have elevated the importance of both a corporate
strategy and a technology
strategy that crosses traditional lines of business. Many
participants remarked that their
executive teams at last understand the potential of IT to affect
the top line. “IT recently
added some new distribution channels, and our business has just
88. exploded,” stated
one manager. Others are finding that there is a much greater
emphasis on IT’s ability to
grow revenues, and this is being reflected in how IT budgets are
allocated and projects
prioritized. “Our executives have finally recognized that
business strategy is not only
enabled by IT, but that it can provide new business
opportunities as well,” said another
manager. This is reflected in the changing position of the CIO
in many organizations
over the past decade. “Today our CIO sits on the executive team
and takes part in all
M02_MCKE0260_03_GE_C02.indd 39 12/3/14 8:34 PM
40 SectionI • DeliveringValuewithIT
business strategy discussions because IT has credibility,” said a
group member. “Our
executives now want to work closely with IT and understand the
implications of tech-
nology decisions,” said another. “It’s not the same as it was
89. even five years ago.” Now
CIOs are valued for their insight into business opportunities,
their perspective across
the entire organization, and their ability to take the long view
(Korsten 2011).
However, this does not mean that organizations have become
good at developing
strategy or at effectively integrating business and IT strategies.
“There are many incon-
sistencies and problems with strategy development,” said a
participant. Organizations
have to develop new strategy-making capabilities to cope in the
future competitive
environment. This will mean changing their current top–down
method of developing
and implementing strategy. If there’s one thing leading
academics agree on, it’s that
future strategy development will have to become a more
dynamic and continuous pro-
cess (Casadesus and Ricart 2011; Eisenhardt 2002; Kanter 2002;
Prahalad and Krishnan
2002; Quinn 2002; Weill et al. 2002). Instead of business
strategy being a well-crafted
plan of action for the next three to five years, from which IT
90. can devise an appropri-
ate and supportive technology strategy, business strategy must
become more and more
evolutionary and interactive with IT. IT strategy development
must, therefore, become
more dynamic itself and focused on developing strategic
capabilities that will support a
variety of changing business objectives. In the future, managers
will not align business
strategy and IT at particular points in time but will participate
in an organic process
that will address the need to continually evolve IT and business
plans in concert with
each other (Casadesus and Ricart 2011).
Four CriTiCal suCCess FaCTors
Each focus group member had a different approach to
developing IT strategy, but there
was general agreement that four factors had to be in place for
strategy development to
be effective.
1. Revisit your business model. The worlds of business and IT
have traditionally
91. been isolated from each other, leading to misaligned and
sometimes conflicting
strategies. Although there is now a greater willingness among
business manag-
ers to understand the implications of technology in their world,
it is still IT that
must translate their ideas and concepts into business language.
“IT must absolutely
understand and focus on the business,” said a participant.
Similarly, it is essential that all managers thoroughly
understand how their
business as a whole works. Although this sounds like a truism,
almost any IT man-
ager can tell “war stories” of business managers who have very
different visions
of what they think their enterprise should look like. Business
models and strate-
gies are often confused with each other (Osterwalder and
Pigneur 2010). A business
model explains how the different pieces of a business fit
together. It ensures that
everyone in an organization is focused on the kind of value a
company wants to
create. Only when the business model is clear can strategies be
92. developed to articu-
late how a company will deliver that value in a unique way that
others cannot easily
duplicate (Osterwalder and Pigneur 2010).
2. Have strategic themes. IT strategy used to be about
individual projects. Now
it is about carefully crafted programs that focus on developing
specific business
M02_MCKE0260_03_GE_C02.indd 40 12/3/14 8:34 PM
Chapter2 • DeliveringBusinessValuethroughITStrategy 41
capabilities. Each program consists of many smaller,
interrelated business and IT
initiatives cutting across several functional areas. These are
designed to be adapted,
reconfigured, accelerated, or canceled as the strategic program
evolves. Themes
give both business and IT leaders a broad yet focused topic of
interest that chal-
lenges them to move beyond current operations (Kanter 2002).