Page 3 of 3
Managing Information and Technology: Finding New Ways to Learn and Link-
This chapter addresses technology and how technology is constantly changing the way we do business. To understand how technology impacts our personal and business lives, it is important to have the basic understanding of a computer, software, and networks. The computer has hardware. These are physicalcomponents used to collect, input, store, and process data to be distributed as information. Examples include hard drives, printers, keyboards, modems, and routers.
Software gives the computer instructions. There are two types of software:
1. Systems software is the operating system. An example would be Microsoft Windows.
2. Application software provides the user with the desired task. Examples are Microsoft Word, Excel, and PowerPoint.
In today’s world, networks are used to share information and communicate. The Internet is the largest network in the world. The World Wide Web provides information and service for business, education, and personal needs. When employees work from their home, they have access to their company’s server. This is an intranet connection that only specific employees have access to, depending on their job. The extranet is controlled by the company and limits the usage to suppliers and customers. An example would be a company that allows people to shop and buy their products.
The “cloud” is a form of computing that goes beyond the company’s firewall to store data and run applications. The main advantage in using cloud computing is that it does not take up space on the hard drive. The cloud accesses a vast array of computing recourses without a big expense. It creates an easy way to share files and programs. A good example of cloud usage is the New York Times using Amazon’s cloud to offer subscribers the ability to locate and view articles from over seven decades.
Technology allows for better decision making. The data compiled by companies are stored in a database and are stored in files of relative data in an organized logical system. After the firm creates the database, it is then converted into information that is available to help make better decisions. For example, before a sales employee makes his/her sales call, he/she can simply review a customer’s profile and make a plan for success.
It is clear to see that investing has many tools that can be used to make better choices. There are risk factors that go along with investing. The key is to have a set goal to work toward and to obtain your needs. Depending on where a person is in life, age and other variables determine different needs.
Having a better understanding of computers, software, and networks helps us in the real world. Technology aids in our decision making processes. As discussed, technology can be used when investing. There are many software programs that can enhance investing decisions, as well as websites that are used to trade stocks.
CASE STUDY
Hubway: B.
Running head FINAL REPORT2FINAL REPORT2.docxjeanettehully
Running head: FINAL REPORT 2
FINAL REPORT 2
Data Analytics and prediction for Travel Companies
Umair Afzal
IGlobal University
EXECUTIVE OVERVIEW
Customers demand more personalized services, presented to them without even having to look for themselves, with faster access. It is that time, companies are proactively notifying customers of what is relevant to their preferences and push customers to act. This is no different in the travel industry. As a matter of fact, travel industry is one of the industries that need the magic of Big Data Analytics the most, to please their customers. Therefore, our company “Global Tech” will collect and analyze the big data generated from social media pertaining to travel industry. We will get our required data via a subscription to NapoleonCat, a social media marketing and analytics platform. Our analytical tools will provide information allowing our customers to understand and predict consumers patterns, behaviors, pre and post travel feedback. In other words, our company will gather, analyze, and sell social media trends and predictions to companies across the travel industry.
Who is our customer? Everyone related to travel industry companies are our customers. Travel agencies travel focused marketing companies, foreign and domestic tourist and travel government agencies. What need will our company fill? Our company will help the customer’s design business strategy by leveraging customer insights, allowing them to personalize their offerings, improving their marketing and pricing strategies, and gaining competitive differentiation. We believe that companies need to understand their customer’s preferences to build business strategies. Our company’s Big data analytics will allow travel companies to understand their consumers patterns, behaviors, and feedback collected from various sources to help our customers design the right business and marketing strategy. Tracking, analyzing and understanding this valuable data will help our customers determine what offerings and services they should offer in the future.
According to our initial research, most travel agencies are either not performing social media analysis or are doing it in house. Most of the research articles outlined that the companies performing big data analysis within the travel industry employ B2C business model, which makes my offering quite unique in the current marketplace. Furthermore, our company will provide analytical report, and consulting and explanatory services regarding our analytics, the tools we use, and our insights gained from these tool and methods.
Our company’s expenses will be divided to three main categories: infrastructure, software and human resources. Estimated cost of $160,000/month for infrastructure, $200,000/month for software, $100,000/month for human resources, and $40,000 as miscellaneous cost are budgeted. The total amount of $500,000 per month is required to run Global Tech smo ...
Running head FINAL REPORT2FINAL REPORT2.docxjeanettehully
Running head: FINAL REPORT 2
FINAL REPORT 2
Data Analytics and prediction for Travel Companies
Umair Afzal
IGlobal University
EXECUTIVE OVERVIEW
Customers demand more personalized services, presented to them without even having to look for themselves, with faster access. It is that time, companies are proactively notifying customers of what is relevant to their preferences and push customers to act. This is no different in the travel industry. As a matter of fact, travel industry is one of the industries that need the magic of Big Data Analytics the most, to please their customers. Therefore, our company “Global Tech” will collect and analyze the big data generated from social media pertaining to travel industry. We will get our required data via a subscription to NapoleonCat, a social media marketing and analytics platform. Our analytical tools will provide information allowing our customers to understand and predict consumers patterns, behaviors, pre and post travel feedback. In other words, our company will gather, analyze, and sell social media trends and predictions to companies across the travel industry.
Who is our customer? Everyone related to travel industry companies are our customers. Travel agencies travel focused marketing companies, foreign and domestic tourist and travel government agencies. What need will our company fill? Our company will help the customer’s design business strategy by leveraging customer insights, allowing them to personalize their offerings, improving their marketing and pricing strategies, and gaining competitive differentiation. We believe that companies need to understand their customer’s preferences to build business strategies. Our company’s Big data analytics will allow travel companies to understand their consumers patterns, behaviors, and feedback collected from various sources to help our customers design the right business and marketing strategy. Tracking, analyzing and understanding this valuable data will help our customers determine what offerings and services they should offer in the future.
According to our initial research, most travel agencies are either not performing social media analysis or are doing it in house. Most of the research articles outlined that the companies performing big data analysis within the travel industry employ B2C business model, which makes my offering quite unique in the current marketplace. Furthermore, our company will provide analytical report, and consulting and explanatory services regarding our analytics, the tools we use, and our insights gained from these tool and methods.
Our company’s expenses will be divided to three main categories: infrastructure, software and human resources. Estimated cost of $160,000/month for infrastructure, $200,000/month for software, $100,000/month for human resources, and $40,000 as miscellaneous cost are budgeted. The total amount of $500,000 per month is required to run Global Tech smo ...
To answer new digital challenges (faster business cycles, new risks and need for more firm-level integration), companies need firm-level governance around their digital initiatives. Too often digital is left to grow organically, generally in a series of silos or managed from just one perspective of the business. In this paper the importance of governance of digital initiative is explored in detail, with working models, and some case studies from companies across different industries.
Internet, wireless technologies build bridge to customer engagementDawn Kehr
Discusses trends in the finance and insurance industries of using mobile and wireless technologies to invest in customer relationships and increase engagement.
Social network enterprises - Techno GlobalJorge Canal
Social Network Enterprises will grant you with the ability of connecting people (employees, partners, providers, friends and more) who have the same interests. In this way you can organize and share information and promote activities.
Digital Engineering: Top Three Imperatives for Banks and Financial Services C...Cognizant
Banking and financial services organizations need a blueprint for building modern digital capabilities, reducing technical debt and accelerating cost-cutting via the cloud. Here are some practical strategies for doing that, and examples of organizations achieving success.
CaseStudy m KEY TERMS behavior controls (p. 84) mobile.docxtroutmanboris
CaseStudy m
KEY TERMS
behavior controls (p. 84)
mobile workers (p. 86)
offshoring (p. 90)
outcome controls (p. 84)
personnel controls (p. 84)
remote workers (p. 86)
telecommuting (p. 86)
virtual teams (p. 87)
DISCUSSION QUESTIONS
1. Why might an employee resist the implementation of a new technology? What are some of the possible consequences of
asking an employee to use a computer or similar device in his or her job?
2. How can IT alter an individual's work? How can a manager ensure that the impact is positive rather than negative?
3. What current technologies do you predict will show the most impact on the way work is done? Why?
4. Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the com-
ing years? Will offices as we think of them today exist by 2030? Why or why not?
5. How is working at an online retailer different from working at a brick-and-mortar retailer? What types of jobs are necessary
at each? What skills are important?
6. Paul Saffo, former director of the Institute for the Future, noted, "Telecommuting is a reality for many today, and will con-
tinue to be more so in the future. But beware, this doesn't mean we will travel less. In fact, the more one uses electronics,
the more they are likely to travel."39 Do you agree with this statement? Why or why not?
7. The explosion of information-driven self-serve options in the consumer world is evident at the gas station where customers
pay, pump gas, and purchase a car wash without ever seeing an employee; in the retail store such as Walmart, Home Depot,
and the local grocery where self-service checkout stands mean that customers can purchase a basket of items without ever
speaking to a sales agent; at the airport where customers make reservations and pay for and print tickets without the help of
an agent; and at the bank, where ATMs have long replaced tellers for most transactions. But a backlash is coming, experts
predict. Some say that people are more isolated than they used to be in the days of face-to-face service, and they question
how much time people are really saving if they have to continually learn new processes, operate new machines, and over-
come new glitches. Labor-saving technologies were supposed to liberate people from mundane tasks, but it appears that
these technologies are actually shifting some tasks to the customer. On the other hand, many people like the convenience of
using these self-service systems, especially because it means customers can visit a bank for cash or order books or gifts from
an online retailer 24 hours a day. Does this mean the end of "doing business the old-fashioned way"? Will this put a burden
on the elderly or the poor when corporations begin charging for face-to-face services?40
• CASE STUDY 4-1 Trash and Waste Pickup Services. Inc.
Martin Andersen is responsible for 143 of Trash and Waste Pickup Services, Inc.'s (TWPS's) garbage trucks.
For this assignment, students will need to observe the activities th.docxalfred4lewis58146
For this assignment, students will need to observe the activities that take place in a courtroom setting. Find a video on YouTube... Pay attention to the courtroom actors including the judge, jury, attorneys, and defendant. Complete a one page reflection of your experience. Provide details about the case/cases you heard and note if anything surprised you during your observation.
Use APA format for this assignment.
.
For this assignment, select a human service organization from .docxalfred4lewis58146
For this assignment, select a human service organization from a public, nonprofit, or government sector that you are familiar with, or one that you find interesting. You will use this organization to complete all of the course assignments. You must be able to access information about the organization’s governance, financial sources and practices, mission, population served, and its political and social landscape. Review all the assignments now to verify the types of information you will need about the organization in order to complete them.
The following list provides examples of acceptable types of organizations. You can select an organization of the types included on this list or propose another type of organization to your instructor. The organization must provide human service program services. The selected organization will be included in all your assignments, so you will look at leadership and collaboration practices for that organization through several areas of focus.
Possible Organization Types
City, county, or state human services or mental health programs.
State hospitals (Western State Hospital, Milwaukee County Hospital, or another state or county hospital in your area).
School-based human services or case management programs.
Private mental health organizations.
Employee assistance programs.
For-profit hospital or health care organizations (Humana, Kaiser-Permanente, Aurora, etcetera).
Catholic community services.
Lutheran Social Services.
.
For this Assignment, read the case study for Claudia and find tw.docxalfred4lewis58146
For this Assignment, read the case study for Claudia and find two to three scholarly articles on social issues surrounding immigrant families.
By Day 7
In a 2- to 4-page paper, explain how the literature informs you about Claudia and her family when assessing her situation.
Describe two social issues related to the course-specific case study for Claudia that inform a culturally competent social worker.
Describe culturally competent strategies you might use to assess the needs of children.
Describe the types of data you would collect from Claudia and her family in order to best serve them.
Identify other resources that may offer you further information about Claudia’s case.
Create an eco-map to represent Claudia’s situation. Describe how the ecological perspective of assessment influenced how the social worker interacted with Claudia.
Describe how the social worker in the case used a strengths perspective and multiple tools in her assessment of Claudia. Explain how those factors contributed to the therapeutic relationship with Claudia and her family.
Support your Assignment with specific references to the resources. Be sure to provide full APA citations for your references.
.
For this assignment, download the A6 code pack. This zip fil.docxalfred4lewis58146
For this assignment, download the
A6 code pack
. This zip file contains several files:
main.cpp
- the predetermined main.cpp. This file shows the usage and functionality that is expected of your program. You are not allowed to edit this file. You will not be submitting this file with your assignment.
CMakeLists.txt
- the preset CMake file to build with your functions files.
input/greeneggsandham.txt
- the contents of Green Eggs and Ham in text format.
input/aliceChapter1.txt
- the first chapter of Alice in Wonderland in text format.
output/greeneggsandham.out
- the expected output when running your program against the
greeneggsandham.txt
file
output/aliceChapter1.out
- the expected output when running your program against the
aliceChapter1.txt
file
Your task is to provide the implementations for all of the referenced functions. You will need to create two files:
functions.h
and
functions.cpp
to make the program work as intended.
You will want to make your program as general as possible by not having any assumptions about the data hardcoded in. Two public input files have been supplied with the starter pack. We will run your program against a third private input file.
Function Requirements
The requirements of each function are given below. The input, output, and task of each function is described. The functions are:
promptUserForFilename()
openFile()
readWordsFromFile()
removePunctuation()
capitalizeWords()
filterUniqueWords()
alphabetizeWords()
countUniqueWords()
printWordsAndCounts()
countLetters()
printLetterCounts()
printMaxMinWord()
printMaxMinLetter()
promptUserForFilename()
Input
: None
Output
: A string
Task
: Prompt the user to enter a filename.
openFile()
Input
: (1) The input file stream (2) The string filename to open
Output
: True if the file successfully opened, False if the file could not be opened
Task
: Open the input file stream for the corresponding filename. Check that the file opened correctly. The string filename will remain unchanged.
readWordsFromFile()
Input
: The input file stream
Output
: A vector of strings
Task
: Read all of the words that are in the filestream and return a list of all the words in the order present in the file.
removePunctuation()
Input
: (1) A vector of strings (2) A string of all the punctuation characters to remove
Output
: None
Task
: For each word in the vector, remove all occurrences of all the punctuation characters denoted by the punctuation string. When complete, the input vector will now hold all the words with punctuation removed. The punctuation string will remain unchanged.
capitalizeWords()
Input
: A vector of strings
Output
: None
Task
: For each word in the vector, convert each character to its upper case equivalent. When complete, the input vector will now hold all the words capitalized.
filterUniqueWords()
Input
: A vector of strings
Output
: A vector of strings
Task
: The function will return only th.
For this assignment, create infographic using the Canva website..docxalfred4lewis58146
For this assignment, create infographic using the Canva website. Pictorially and using short phrases, depict the way in which an organization you are affiliated (Charter School) with celebrates its achievements.
Next, identify research conducted that supports and emphasizes the importance of leaders’ taking the time to celebrate. How does a leader’s taking the time to recognize victories and reinforce shared values enhance the culture and climate of an organization?
Then, explain how leaders could build upon or improve purposeful celebrations within the organization. Make sure that you utilize scholarly literature and document supportive research for the short phrases identified and used in your Canva infographic.
Length: 1 infographic and 2–3 page essay, not including references or title page.
References: Minimum of five scholarly resources
.
For this assignment, compare California during the Great Depression.docxalfred4lewis58146
For this assignment, compare California during the Great Depression and Great Recession. Provide historical details about California during the Great Depression. What did Californians go through? Think economic, social, political, etc., for the historical details. Describe (at least) one similarity and one difference between the two eras.
You may also compare the Great Depression to the economic problems caused by Covid-19 in 2020. Focus on California, not the United States.
Requirements: 500 words
Plagiarism check
.
For this assignment, create a 10- to 12-slide presentation in Mi.docxalfred4lewis58146
For this assignment, create a 10- to 12-slide presentation in Microsoft PowerPoint that addresses the following points:
What are the points of conflict between Sunni and Shia Muslims? Where do their interpretations of Islam differ significantly?
How and when did these conflicts come into existence?
In what ways do they share the same beliefs? Is antipathy toward the West an automatic position?
Identify which nations are predominantly Sunni and which are Shia. Illustrate with a map.
Provide an example of at least one significant terrorist action by each branch of Islam.
Discuss whether counterterrorism authorities should prepare differently for Sunni terrorism than they would for Shia terrorism.
.
For this assignment, begin by reading chapters 12-15 in Dr. Bells t.docxalfred4lewis58146
For this assignment, begin by reading chapters 12-15 in Dr. Bell's text. Then, consider and respond to the following questions.
The SALT talks accomplished little, but it was important to keep both parties talking. Does the evidence of the 1970s and 1980s support this thesis? Support your opinion with at least three examples.
Critics of "Star Wars" argued that an effective nuclear defense shield would have increased the dangers of nuclear war. How so?
During much of the 1970s, the Soviets became increasingly dependent on US grain in order to feed their people. These exports were popular with American farmers, but played a more ambiguous role in American efforts to control the Soviets. If you had been a presidential advisor for Presidents Ford and Carter, what economic strategy would you have recommended?
The Soviet invasion and occupation of Afghanistan has been described as the Soviets’ Vietnam. Discuss at least three similarities and one dissimilarity between these conflicts.
.
For this assignment, assume you are the new Secretary of Homelan.docxalfred4lewis58146
For this assignment, assume you are the new Secretary of Homeland Security. You are drafting a Policy Document referred to as a “White Paper” for the Biden Administration to highlight the impact of open/closed borders in the age of COVID-19 on migration, asylum seekers, and economic recovery. In this white paper, consider the following to frame your paper.
Define what YOU believe an “OPEN” vs “CLOSED” border means especially when dealing with those seeking asylum. Reminder that you can provide your opinion without using “I think” or something similar.
How do you believe illegal migrants can be treated humanely and with dignity/inclusion?
How does an “open” vs a “closed” border impact the United States economy?
What are your recommendations for the next 12-24 months on specific steps that the new administration needs to take?
DO NOT answer this as if it is a four Question Exam. This is a WHITE PAPER and is a single narrative framed by these questions, but do NOT use first person (I statements).
.
For this assignment, address the following promptsIntroductor.docxalfred4lewis58146
For this assignment, address the following prompts:
Introductory paragraph to topic about unemployment.
Write an introductory paragraph with at least 150 words that clearly explains the topic, the importance of further research, and ethical implications.
My thesis statement:
Unemployment and lack of economic opportunity have social consequences creating anxiety and added stress because it allows for reduced economic growth and directly influences our society's mental, physical, and emotional well-being
(A thesis statement should be a concise, declarative statement. The thesis statement must appear at the end of the introductory paragraph.)
Annotated bibliography.
Develop an annotated bibliography to indicate the quality of the sources you have read.
Summarize in your own words how the source contributes to the solution of the global societal issue for each annotation.
Address fully the purpose, content, evidence, and relation to other sources you found on this topic (your annotation should be one to two paragraphs long—150 words or more.
Include no less than five scholarly sources in the annotated bibliography that will be used to support the major points of the Final Paper.
Demonstrate critical thinking skills by accurately interpreting evidence used to support various positions of the topic.
.
For this assignment, analyze the play by focusing on one of the .docxalfred4lewis58146
For this assignment, analyze the play by focusing on
one
of the following characters: Cassio, Desdemona, Othello, or Iago. Explore the motives, emotions and circumstances of the character you choose, and his or her relationships with all the other significant characters in the play. Try to give your reader a good sense of why things play out as they do. Each of these characters has significant interactions with all the others, and you will end up discussing them all no matter which one you choose to focus on. But try to explain what happens in
Othello
by following the trajectory of a single character throughout the entire play. As always, use short but effective quotations from the play to point out significant words and actions, but focus mainly on your explanations of what the words and deeds mean and why we should agree with your analysis.
To cite the text, place
A
ct,
S
cene, and
L
ine numbers in parentheses at the end of your quotation. Example: “Your quotation here” (1.3.5).
.
More Related Content
Similar to Page 3 of 3Managing Information and Technology Finding New Wa.docx
To answer new digital challenges (faster business cycles, new risks and need for more firm-level integration), companies need firm-level governance around their digital initiatives. Too often digital is left to grow organically, generally in a series of silos or managed from just one perspective of the business. In this paper the importance of governance of digital initiative is explored in detail, with working models, and some case studies from companies across different industries.
Internet, wireless technologies build bridge to customer engagementDawn Kehr
Discusses trends in the finance and insurance industries of using mobile and wireless technologies to invest in customer relationships and increase engagement.
Social network enterprises - Techno GlobalJorge Canal
Social Network Enterprises will grant you with the ability of connecting people (employees, partners, providers, friends and more) who have the same interests. In this way you can organize and share information and promote activities.
Digital Engineering: Top Three Imperatives for Banks and Financial Services C...Cognizant
Banking and financial services organizations need a blueprint for building modern digital capabilities, reducing technical debt and accelerating cost-cutting via the cloud. Here are some practical strategies for doing that, and examples of organizations achieving success.
CaseStudy m KEY TERMS behavior controls (p. 84) mobile.docxtroutmanboris
CaseStudy m
KEY TERMS
behavior controls (p. 84)
mobile workers (p. 86)
offshoring (p. 90)
outcome controls (p. 84)
personnel controls (p. 84)
remote workers (p. 86)
telecommuting (p. 86)
virtual teams (p. 87)
DISCUSSION QUESTIONS
1. Why might an employee resist the implementation of a new technology? What are some of the possible consequences of
asking an employee to use a computer or similar device in his or her job?
2. How can IT alter an individual's work? How can a manager ensure that the impact is positive rather than negative?
3. What current technologies do you predict will show the most impact on the way work is done? Why?
4. Given the growth in telecommuting and other mobile work arrangements, how might offices physically change in the com-
ing years? Will offices as we think of them today exist by 2030? Why or why not?
5. How is working at an online retailer different from working at a brick-and-mortar retailer? What types of jobs are necessary
at each? What skills are important?
6. Paul Saffo, former director of the Institute for the Future, noted, "Telecommuting is a reality for many today, and will con-
tinue to be more so in the future. But beware, this doesn't mean we will travel less. In fact, the more one uses electronics,
the more they are likely to travel."39 Do you agree with this statement? Why or why not?
7. The explosion of information-driven self-serve options in the consumer world is evident at the gas station where customers
pay, pump gas, and purchase a car wash without ever seeing an employee; in the retail store such as Walmart, Home Depot,
and the local grocery where self-service checkout stands mean that customers can purchase a basket of items without ever
speaking to a sales agent; at the airport where customers make reservations and pay for and print tickets without the help of
an agent; and at the bank, where ATMs have long replaced tellers for most transactions. But a backlash is coming, experts
predict. Some say that people are more isolated than they used to be in the days of face-to-face service, and they question
how much time people are really saving if they have to continually learn new processes, operate new machines, and over-
come new glitches. Labor-saving technologies were supposed to liberate people from mundane tasks, but it appears that
these technologies are actually shifting some tasks to the customer. On the other hand, many people like the convenience of
using these self-service systems, especially because it means customers can visit a bank for cash or order books or gifts from
an online retailer 24 hours a day. Does this mean the end of "doing business the old-fashioned way"? Will this put a burden
on the elderly or the poor when corporations begin charging for face-to-face services?40
• CASE STUDY 4-1 Trash and Waste Pickup Services. Inc.
Martin Andersen is responsible for 143 of Trash and Waste Pickup Services, Inc.'s (TWPS's) garbage trucks.
For this assignment, students will need to observe the activities th.docxalfred4lewis58146
For this assignment, students will need to observe the activities that take place in a courtroom setting. Find a video on YouTube... Pay attention to the courtroom actors including the judge, jury, attorneys, and defendant. Complete a one page reflection of your experience. Provide details about the case/cases you heard and note if anything surprised you during your observation.
Use APA format for this assignment.
.
For this assignment, select a human service organization from .docxalfred4lewis58146
For this assignment, select a human service organization from a public, nonprofit, or government sector that you are familiar with, or one that you find interesting. You will use this organization to complete all of the course assignments. You must be able to access information about the organization’s governance, financial sources and practices, mission, population served, and its political and social landscape. Review all the assignments now to verify the types of information you will need about the organization in order to complete them.
The following list provides examples of acceptable types of organizations. You can select an organization of the types included on this list or propose another type of organization to your instructor. The organization must provide human service program services. The selected organization will be included in all your assignments, so you will look at leadership and collaboration practices for that organization through several areas of focus.
Possible Organization Types
City, county, or state human services or mental health programs.
State hospitals (Western State Hospital, Milwaukee County Hospital, or another state or county hospital in your area).
School-based human services or case management programs.
Private mental health organizations.
Employee assistance programs.
For-profit hospital or health care organizations (Humana, Kaiser-Permanente, Aurora, etcetera).
Catholic community services.
Lutheran Social Services.
.
For this Assignment, read the case study for Claudia and find tw.docxalfred4lewis58146
For this Assignment, read the case study for Claudia and find two to three scholarly articles on social issues surrounding immigrant families.
By Day 7
In a 2- to 4-page paper, explain how the literature informs you about Claudia and her family when assessing her situation.
Describe two social issues related to the course-specific case study for Claudia that inform a culturally competent social worker.
Describe culturally competent strategies you might use to assess the needs of children.
Describe the types of data you would collect from Claudia and her family in order to best serve them.
Identify other resources that may offer you further information about Claudia’s case.
Create an eco-map to represent Claudia’s situation. Describe how the ecological perspective of assessment influenced how the social worker interacted with Claudia.
Describe how the social worker in the case used a strengths perspective and multiple tools in her assessment of Claudia. Explain how those factors contributed to the therapeutic relationship with Claudia and her family.
Support your Assignment with specific references to the resources. Be sure to provide full APA citations for your references.
.
For this assignment, download the A6 code pack. This zip fil.docxalfred4lewis58146
For this assignment, download the
A6 code pack
. This zip file contains several files:
main.cpp
- the predetermined main.cpp. This file shows the usage and functionality that is expected of your program. You are not allowed to edit this file. You will not be submitting this file with your assignment.
CMakeLists.txt
- the preset CMake file to build with your functions files.
input/greeneggsandham.txt
- the contents of Green Eggs and Ham in text format.
input/aliceChapter1.txt
- the first chapter of Alice in Wonderland in text format.
output/greeneggsandham.out
- the expected output when running your program against the
greeneggsandham.txt
file
output/aliceChapter1.out
- the expected output when running your program against the
aliceChapter1.txt
file
Your task is to provide the implementations for all of the referenced functions. You will need to create two files:
functions.h
and
functions.cpp
to make the program work as intended.
You will want to make your program as general as possible by not having any assumptions about the data hardcoded in. Two public input files have been supplied with the starter pack. We will run your program against a third private input file.
Function Requirements
The requirements of each function are given below. The input, output, and task of each function is described. The functions are:
promptUserForFilename()
openFile()
readWordsFromFile()
removePunctuation()
capitalizeWords()
filterUniqueWords()
alphabetizeWords()
countUniqueWords()
printWordsAndCounts()
countLetters()
printLetterCounts()
printMaxMinWord()
printMaxMinLetter()
promptUserForFilename()
Input
: None
Output
: A string
Task
: Prompt the user to enter a filename.
openFile()
Input
: (1) The input file stream (2) The string filename to open
Output
: True if the file successfully opened, False if the file could not be opened
Task
: Open the input file stream for the corresponding filename. Check that the file opened correctly. The string filename will remain unchanged.
readWordsFromFile()
Input
: The input file stream
Output
: A vector of strings
Task
: Read all of the words that are in the filestream and return a list of all the words in the order present in the file.
removePunctuation()
Input
: (1) A vector of strings (2) A string of all the punctuation characters to remove
Output
: None
Task
: For each word in the vector, remove all occurrences of all the punctuation characters denoted by the punctuation string. When complete, the input vector will now hold all the words with punctuation removed. The punctuation string will remain unchanged.
capitalizeWords()
Input
: A vector of strings
Output
: None
Task
: For each word in the vector, convert each character to its upper case equivalent. When complete, the input vector will now hold all the words capitalized.
filterUniqueWords()
Input
: A vector of strings
Output
: A vector of strings
Task
: The function will return only th.
For this assignment, create infographic using the Canva website..docxalfred4lewis58146
For this assignment, create infographic using the Canva website. Pictorially and using short phrases, depict the way in which an organization you are affiliated (Charter School) with celebrates its achievements.
Next, identify research conducted that supports and emphasizes the importance of leaders’ taking the time to celebrate. How does a leader’s taking the time to recognize victories and reinforce shared values enhance the culture and climate of an organization?
Then, explain how leaders could build upon or improve purposeful celebrations within the organization. Make sure that you utilize scholarly literature and document supportive research for the short phrases identified and used in your Canva infographic.
Length: 1 infographic and 2–3 page essay, not including references or title page.
References: Minimum of five scholarly resources
.
For this assignment, compare California during the Great Depression.docxalfred4lewis58146
For this assignment, compare California during the Great Depression and Great Recession. Provide historical details about California during the Great Depression. What did Californians go through? Think economic, social, political, etc., for the historical details. Describe (at least) one similarity and one difference between the two eras.
You may also compare the Great Depression to the economic problems caused by Covid-19 in 2020. Focus on California, not the United States.
Requirements: 500 words
Plagiarism check
.
For this assignment, create a 10- to 12-slide presentation in Mi.docxalfred4lewis58146
For this assignment, create a 10- to 12-slide presentation in Microsoft PowerPoint that addresses the following points:
What are the points of conflict between Sunni and Shia Muslims? Where do their interpretations of Islam differ significantly?
How and when did these conflicts come into existence?
In what ways do they share the same beliefs? Is antipathy toward the West an automatic position?
Identify which nations are predominantly Sunni and which are Shia. Illustrate with a map.
Provide an example of at least one significant terrorist action by each branch of Islam.
Discuss whether counterterrorism authorities should prepare differently for Sunni terrorism than they would for Shia terrorism.
.
For this assignment, begin by reading chapters 12-15 in Dr. Bells t.docxalfred4lewis58146
For this assignment, begin by reading chapters 12-15 in Dr. Bell's text. Then, consider and respond to the following questions.
The SALT talks accomplished little, but it was important to keep both parties talking. Does the evidence of the 1970s and 1980s support this thesis? Support your opinion with at least three examples.
Critics of "Star Wars" argued that an effective nuclear defense shield would have increased the dangers of nuclear war. How so?
During much of the 1970s, the Soviets became increasingly dependent on US grain in order to feed their people. These exports were popular with American farmers, but played a more ambiguous role in American efforts to control the Soviets. If you had been a presidential advisor for Presidents Ford and Carter, what economic strategy would you have recommended?
The Soviet invasion and occupation of Afghanistan has been described as the Soviets’ Vietnam. Discuss at least three similarities and one dissimilarity between these conflicts.
.
For this assignment, assume you are the new Secretary of Homelan.docxalfred4lewis58146
For this assignment, assume you are the new Secretary of Homeland Security. You are drafting a Policy Document referred to as a “White Paper” for the Biden Administration to highlight the impact of open/closed borders in the age of COVID-19 on migration, asylum seekers, and economic recovery. In this white paper, consider the following to frame your paper.
Define what YOU believe an “OPEN” vs “CLOSED” border means especially when dealing with those seeking asylum. Reminder that you can provide your opinion without using “I think” or something similar.
How do you believe illegal migrants can be treated humanely and with dignity/inclusion?
How does an “open” vs a “closed” border impact the United States economy?
What are your recommendations for the next 12-24 months on specific steps that the new administration needs to take?
DO NOT answer this as if it is a four Question Exam. This is a WHITE PAPER and is a single narrative framed by these questions, but do NOT use first person (I statements).
.
For this assignment, address the following promptsIntroductor.docxalfred4lewis58146
For this assignment, address the following prompts:
Introductory paragraph to topic about unemployment.
Write an introductory paragraph with at least 150 words that clearly explains the topic, the importance of further research, and ethical implications.
My thesis statement:
Unemployment and lack of economic opportunity have social consequences creating anxiety and added stress because it allows for reduced economic growth and directly influences our society's mental, physical, and emotional well-being
(A thesis statement should be a concise, declarative statement. The thesis statement must appear at the end of the introductory paragraph.)
Annotated bibliography.
Develop an annotated bibliography to indicate the quality of the sources you have read.
Summarize in your own words how the source contributes to the solution of the global societal issue for each annotation.
Address fully the purpose, content, evidence, and relation to other sources you found on this topic (your annotation should be one to two paragraphs long—150 words or more.
Include no less than five scholarly sources in the annotated bibliography that will be used to support the major points of the Final Paper.
Demonstrate critical thinking skills by accurately interpreting evidence used to support various positions of the topic.
.
For this assignment, analyze the play by focusing on one of the .docxalfred4lewis58146
For this assignment, analyze the play by focusing on
one
of the following characters: Cassio, Desdemona, Othello, or Iago. Explore the motives, emotions and circumstances of the character you choose, and his or her relationships with all the other significant characters in the play. Try to give your reader a good sense of why things play out as they do. Each of these characters has significant interactions with all the others, and you will end up discussing them all no matter which one you choose to focus on. But try to explain what happens in
Othello
by following the trajectory of a single character throughout the entire play. As always, use short but effective quotations from the play to point out significant words and actions, but focus mainly on your explanations of what the words and deeds mean and why we should agree with your analysis.
To cite the text, place
A
ct,
S
cene, and
L
ine numbers in parentheses at the end of your quotation. Example: “Your quotation here” (1.3.5).
.
For this assignment I would like you to answer these questions.docxalfred4lewis58146
For this assignment I would like you to answer these questions
1. Explain what a black hole is, describe its characteristics (size, mass), and give a detailed explanation on how they form. Make sure to explain what the Schwarzschild radius and event horizon are. Describe the two types of black holes.
2. Describe the observational evidence for black holes that are discussed in Chapter 15.
Bonues: Do a little research on the Internet (read a few articles) and summarize how astronomers were able to make this image of a black hole. This came out in April 2019.
.
For the Weekly Reports I need 2 reports. For the First two weeks the.docxalfred4lewis58146
For the Weekly Reports I need 2 reports. For the First two weeks they need to do the weekly report and each report must be a minimum of one page.
For the Final Report Its only 1, But it's pretty much putting all the weeks together to do one final report. It needs to be minimum 2 pages
.
For the shortanswer questions,you will need to respo.docxalfred4lewis58146
For the
short
answer questions,
y
ou will need to respond to 7
of the questions
provided (bellow). Each answer should be around
200 words
. Your answers should provide evidence of engagement with and understanding of the key concepts about identity, alienation, rationality, and power.
Your answers should be expressed in academic English.
You will not be able to use direct quotations from the readings or lecture material.
Explain concepts in your own words; if you cannot clearly explain an idea/concept in your own words, you probably haven’t yet fully grasped its meaning.
To what extent can identities be said to be "integral" to a person (i.e. is a particular identity an essential feature of who you are)?
When thinking sociologically about identity, subject positions are associated with roles learned through socialisation. Explain how individuals learn those roles through socialisation?
According to Benedict Andersen the nation is a cultural artefact and an imagined community. What did he mean by this and what are key means through which the nation is imagined?
Marx described “alienation” as an outcome of capitalist economic relations. Sociologists have since expanded the concept to think about how it might relate to other social processes (i.e. “social alienation”). In what other ways might we be said to experience alienation in society?
Gramsci understood hegemony as a form of rule in which subordinate groups consent to the exercise of power or domination. According to Gramsci how does hegemony operate in capitalist societies?
Weber saw rationalisation as an “iron cage” that increasingly dominated all social life. Discuss how rationalisation shapes higher education.
According to Marxists how do relationships of power operate in capitalist societies?
According to Foucault how does modern disciplinary power differ from traditional sovereign power? (e.g. as exercised by monarchs, kings and emperors)
.
For the sake of argument (this essay in particular), lets prete.docxalfred4lewis58146
For the sake of argument (this essay in particular), let's pretend that
Sophia (Links to an external site.)
has discovered a fundamental truth about our concept of the soul: that it is, as she defined it,
the mind's essence
.For this essay, I'd like you to first take a deep dive into
defining
and
elaborating
on what that might mean
(to Sophia, then, as a consequence, to humanity) Then, I'd like you to take into consideration the technologies that have had the greatest impact on how the soul-as-mind's-essence idea expresses itself in our era. Can we have a "virtual afterlife"? A "digital soul"? Can we beat death? If we create nonbiological entities into which we put our identities, and, thus, that entity "thinks" and "feels" like it is "you," well, to what degree can we say that it is "you" and that it is a contemporary version of how Sophia defines the soul? Furthermore, do you think that is what Sophia means--a digital simulacrum of the self? I am hoping you consider how our civilization's ideas are profoundly influenced by our technological world, and that these philosophical questions only exist in the first place because we have invented tools that inevitably create problems for and probe into the most sacred spaces of human identity.
This essay should be 4.5 pages minimum and, as usual, MLA format.
.
For the proposal, each student must describe an interface they a.docxalfred4lewis58146
For the proposal, each student must describe an interface they are interested in exploring and developing. The interface can be screen-oriented or other. It may be multi-model, web-based, mobile, etc. Please describe the interface, its intended target audience, and the data collection method you think is most appropriate for developing this system.
Your proposal should be between 1 and 2 pages. Submit the proposal in a word document
.
For the project, you will be expected to apply the key concepts of p.docxalfred4lewis58146
For the project, you will be expected to apply the key concepts of program evaluation to conduct a comprehensive evaluation, using quantitative and qualitative methods, of a health behavior change intervention among residents of a rural or underserved community. Essentially, you will develop, implement and evaluate a small-scale health behavior change intervention among 5-10 individuals residing in a rural or underserved community. You will be asked to choose a specific health behavior (e.g. healthy eating, physical activity, stress management, getting adequate sleep, increased water consumption, following dental hygiene recommendations, reducing distracted driving, etc.) that you can feasibly promote for a duration of two weeks. You may ask family members, friends, co-workers, neighbors or other individuals who you interact with on a regular basis to participate in your intervention as long they reside in a rural or underserved community. The intervention may occur via social media (e.g. posting health education messages on a Facebook page and/or facilitating discussion of health behavior among participants on Facebook), print media, email interaction, phone conversations, text messages, or in person; you may also employ a combination of these techniques. The focus of this project will be on the evaluation of the intervention. You will be expected to identify which evaluation questions you will be exploring, use both quantitative and qualitative methods to collect data, and analyze and interpret your qualitative data. You will be required to submit all of your data as well as expound on the development, implementation and evaluation of your health behavior change intervention in a paper.
should be
4-6 pages and double-spaced using 12- pt. Times Roman or Arial font with 1- inch page margins
.
Please see the following document regarding the required content of the paper:
Required Content for Evaluation Project Paper-1.pdf
.
For the past several weeks you have addressed several different area.docxalfred4lewis58146
For the past several weeks you have addressed several different areas of telecommunications and information technology in relation to different types of communication across the organizational footprint of Sunshine Health Corporation. Review the work you have done and formulate the Network Security Plan to be implemented across the network footprint. This is not to be an overly detailed report but to address different network concerns and recommendations for improving and securing organizational data, personnel records, intellectual property, and customer records.
Please address the narrative plan as well as a network diagram (no IP addresses, or circuit data required) and what is being done to secure the network at different levels of the OSI model and the organizational structure. Please make sure that you bring in a minimum of two external sources to strengthen and support your presentation.
The assignment should be 5-6 pages of content not counting title page, reference page or appendices (diagrams, budget sheet, equipment list, etc.). Please follow APA format.
Note: it is suggested that as you are reviewing your previous assignments in order to complete this assignment, also be making modifications and refining your previous work in order to successfully complete the week seven assignment, which is a final project report.
.
For the Mash it Up assignment, we experimented with different ways t.docxalfred4lewis58146
For the Mash it Up assignment, we experimented with different ways to use existing digital media in unexpected ways to generate something meaningful. What does this express about our relationship with digital media? We use popular digital platforms to expand the ways that we can express ourselves, but can they constrain our self-expression?
.
For the first time in modern history, the world is experiencing a he.docxalfred4lewis58146
For the first time in modern history, the world is experiencing a health system crisis through the current coronavirus known as (COVID-19), which has put the international financial market and economy, like never before, under cut-throat pressures. In light of your understanding of accounting and finance, please discuss how you and the world should assess the impacts of COVID-19, from the financial, social, educational, and ethical viewpoint.
1 page
.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Page 3 of 3Managing Information and Technology Finding New Wa.docx
1. Page 3 of 3
Managing Information and Technology: Finding New Ways to
Learn and Link-
This chapter addresses technology and how technology is
constantly changing the way we do business. To understand how
technology impacts our personal and business lives, it is
important to have the basic understanding of a computer,
software, and networks. The computer has hardware. These are
physicalcomponents used to collect, input, store, and process
data to be distributed as information. Examples include hard
drives, printers, keyboards, modems, and routers.
Software gives the computer instructions. There are two types
of software:
1. Systems software is the operating system. An example would
be Microsoft Windows.
2. Application software provides the user with the desired task.
Examples are Microsoft Word, Excel, and PowerPoint.
In today’s world, networks are used to share information and
communicate. The Internet is the largest network in the world.
The World Wide Web provides information and service for
business, education, and personal needs. When employees work
from their home, they have access to their company’s server.
This is an intranet connection that only specific employees have
access to, depending on their job. The extranet is controlled by
the company and limits the usage to suppliers and customers.
An example would be a company that allows people to shop and
buy their products.
The “cloud” is a form of computing that goes beyond the
2. company’s firewall to store data and run applications. The main
advantage in using cloud computing is that it does not take up
space on the hard drive. The cloud accesses a vast array of
computing recourses without a big expense. It creates an easy
way to share files and programs. A good example of cloud usage
is the New York Times using Amazon’s cloud to offer
subscribers the ability to locate and view articles from over
seven decades.
Technology allows for better decision making. The data
compiled by companies are stored in a database and are stored
in files of relative data in an organized logical system. After the
firm creates the database, it is then converted into information
that is available to help make better decisions. For example,
before a sales employee makes his/her sales call, he/she can
simply review a customer’s profile and make a plan for success.
It is clear to see that investing has many tools that can be used
to make better choices. There are risk factors that go along with
investing. The key is to have a set goal to work toward and to
obtain your needs. Depending on where a person is in life, age
and other variables determine different needs.
Having a better understanding of computers, software, and
networks helps us in the real world. Technology aids in our
decision making processes. As discussed, technology can be
used when investing. There are many software programs that
can enhance investing decisions, as well as websites that are
used to trade stocks.
CASE STUDY
Hubway: Boston’s Online Bike-Sharing System
If you’ve ever lived in a city, you know that getting around can
be a challenge. Traffic jams, overflowing parking lots, crammed
subway cars, drivers who plow through puddles that spray water
on pedestrians—all of these may be enough to make you pack
3. your bags and head for the suburbs. A company in Boston is
trying to change that, using a fleet of bicycles and the Internet.
Hubway (sponsored by New Balance and operated by Alta
Bicycle Share) is Boston’s recently established bike-sharing
system that features 60 stations, 600 bicycles, and an interactive
component that allows urban consumers to borrow a bike at one
location with the swipe of a credit card—and return it to another
destination. On a Hubway bike, you can pedal to the gym or the
grocery store; commute to work; or visit a friend across town.
You can grab an available bike spur of the moment by swiping
your credit card at one of the kiosk stations, giving you a 24-
hour or three-day membership. Or you can sign up for an annual
membership online; within a week, Hubway will mail you a
station key with a printed code. The cost of membership
includes unlimited rides that are less than 30 minutes, with
additional fees for longer rides.
Hubway operates entirely in the realm of e-commerce,
marketing to consumers and conducting transactions completely
online. “There is no store or counter to get a key,” says
Hubway’s Brogan Graham, who bears the title of Hype Master.
“You put in your information online and we mail you a key.”
The touch screens at the bike stations are solar-powered,
offering access 24 hours a day, 7 days a week, meaning that
bike riders may rent a bike at any time without the assistance of
another human being. General Manager Scott Mullen points to
the efficiency of this operating system, as opposed to the
“unwieldiness” of staffing each station with a Hubway
representative, which he claims “would be a 1.0 solution to a
2.0 problem.” Customer service does exist, however. If you
cruise into a station with a flat tire or broken chain, you just hit
the red “mechanic” button, which will secure the bike without
letting someone else unwittingly take it out on the road. A
Hubway mechanic will retrieve the bike and repair it. An app
called Spot Cycle identifies the locations of different stations,
4. including whether or not bikes are available at a specific
station.
Hubway relies on the communication function of the Internet to
provide current information to its customers. Consumers get
station updates and marketing messages through social media
sites, such as Facebook and Twitter; for example, if a station’s
Internet connection isn’t working properly, Hubway will alert
consumers via social media—including an estimated time for
the station to go live. On its Facebook page, some Hubway
members post suggestions for improvement (like which stations
need more bikes on a regular basis) while others receive kudos
for bicycling achievements (such as the first member to reach
250,000 rides). “We leverage the Internet,” says Scott Mullen.
Hubway’s typical customers tend to be those who are the most
tech savvy about swiping credit cards at kiosks, using touch
screens, and maximizing services via the company’s website
and social media accounts. But its marketers emphasize the fact
that Hubway’s system is easy to use. Most people need only to
“use the system once to understand it because it is so intuitive,”
remarks Marketing Director Mary McLaughlin.
Whether we’re talking about e-commerce or traditional
commerce, the numbers don’t lie. Hubway began with a goal of
attracting 3,000 members and launching 100,000 rides during its
first year of business. In fact, the company hit the 100,000-ride
target in less than 11 weeks and topped 250,000 trips in 6
months. On one sample day, more than 2,500 station-to-station
rides were recorded. By year’s end, 3,700 members had signed
on. With this kind of success, Hubway has already planned
expansion into more Boston neighborhoods, as well as adjacent
towns like Cambridge and Brookline—with the near-term goal
of doubling the number of stations and increasing the number of
bikes to 1,000. Riding is “cool and fun,” says Brogan Graham.
“It’s a great way to explore a new city.”
5. Sources: Company website, www.thehubway.com, accessed
June 26, 2012; Eric Moskowitz, “Hubway Bike-Sharing Program
Is on a Roll,” Boston.com, June 3, 2012,
http://articles.boston.com; Jonathan Simmons, “On Biking:
Learning to Love Hubway,” Boston.com, May 22, 2012,
http://articles.boston.com.
Critical Thinking Questions
Using information from the case, answer the following
questions (1 & 2).
1. How has Hubway incorporated core e-business concepts in its
operations? (Include at least a 200-word response)
2. How has Hubway used social media platforms like Facebook
and Twitter to its advantage? (Include at least a 200-word
response)
1. Discuss the difference between criminal intelligence and
business intelligence and the difference between business
intelligence and institutional espionage.
Your response should be a minimum of 300 words in length.
2. Briefly define the various types of investigations conducted
by security and protective services and the statues that govern
the conduct of investigative agents. In your opinion, which type
of investigation is conducted the most by security and
protective service agencies in your community? Include a
detailed discussion of how you reached your conclusion.
Your response should be a minimum of 300 words in length.
General Overview
When people hear the term investigation the first thing that
comes to mind is what they saw on a dramatized crime show or
TV program. In actuality there are several types of
investigations. There are human resource investigations that
6. investigate issues related to employee backgrounds, workplace
violence, employment discrimination, worker compensation,
sexual harassment, sexual abuse, substance abuse, and wrongful
termination. There are also personal injury and property damage
investigations, and criminal investigations which include
undercover investigations. Another aspect of criminal
investigations is business crime investigations which involves
investigations concerning crimes committed against businesses
by employees (e.g., fraud and embezzlement), crimes committed
against businesses by outsiders (e.g., arson and robbery), and
crimes committed by individuals on behalf of businesses (e.g.,
tax evasion and commercial bribery).
Information collected in investigations is derived from various
sources which “include physical evidence, specialized
databases, victims, witnesses, suspects, records, informants, and
the Internet” (Ortmeier, 2013, p. 212). Once information is
gathered it is then analyzed. The analysis of physical evidence
is associated with forensic science and criminalistics. Such
analyses are traditionally conducted in the laboratory. DNA
testing is one of several analysis techniques used by forensic
scientists. Other techniques include psychological profiling,
anthropological strategies, forensic accounting, biology,
chemistry, ballistics testing, and many more. Every
investigation is governed by a code of conduct. Both private and
public law enforcement and security agencies are governed by
investigative statutes which govern overt and covert
investigative techniques
(e.g., the Omnibus Crime Control and Safe Streets Act of 1968
and the
Employee Polygraph Protection Act of 1988). While the fourth
amendment to the
Constitution only restricts government conduct, private and
7. nongovernment employees may also have an expectation of
privacy if their employers knowingly or knowingly create an
expectation of privacy among their employees.
Intelligence operations are not limited to criminal
investigations. They also include business intelligence
operations, which is also known as competitive intelligence.
This form of intelligence is designed to assist businesses in
controlling losses that result from competition. Business
intelligence is a legitimate and ethical activity. Both internal
and external sources can be accessed to obtain information
about competing organizations strategies such as sales
promotions, employee recruitment, pricing, distribution center
strategies, and advertising.
Criminal intelligence is used to protect against actual criminal
activity and possible threats of criminal activity, such as
industrial espionage. An extension of criminal intelligence is
national intelligence which focuses on collecting information
about foreign entities viewed as potential threats to the nation.
Counterespionage strategies prevent espionage using covert and
overt strategies which “involves application of appropriate
physical, personnel, and information security measures as well
as a thorough investigation of all actual intent to security
breaches” (Ortmeier, 2013, pp.220-221).
Documentation of incidents, interviews, accidents,
investigations or criminal activity is instrumental in assisting
security personnel in addressing security issues. Such
documentation is useful in the development of reports (contact,
incident, narrative, and organization – specific) which are one
of the most important outcomes associated with investigations.
To maximize the usefulness of reports, reports must be well
organized, grammatically sound, clear and concise, free of
unnecessary jargon, and include crucial information (e.g., how
the report writer was involved in the incident, details about
8. what happened, information about all the parties involved,
statements from the involved parties, descriptions of the scene
where the incident occurred, descriptions of evidence, damage
or theft, and any actions conducted by personnel on the scene).
There are some distinctions and exceptions to general security
management principles, and loss prevention philosophies and
practices. For example, banking and financial institutions are
susceptible to threats and loss of assets in physical and digital
environments. Funds can now be transferred electronically
without any paper trails. In addition, the types of financial
institutions are as diverse as the way funds move across these
entities. In 1968 the Bank Protection Act was passed by the
U.S. Congress to assist in reducing the vulnerability of financial
institutions. However, the act only established minimal
guidelines and is not effective in controlling technological
threats to financial assets.
High profile cases involving the murder of court personnel
walking to work and even the murder of court personnel and law
enforcement in the perceived security of their homes by
defendants in the cases they were associated with exemplifies
the need for courthouse and courtroom security. To respond to
these increase threats many courthouses and courtrooms have
increased security measures such as metal detectors, state-of-
the-art surveillance systems, security glass, secured and covered
entrances and parking decks for court personnel, and the use of
sheriff deputies as courthouse and courtroom security.
Educational institutions also require unique security
preparations. It was once believed that schools were safe havens
into which the threats from the outside world could not
penetrate. However, recent events in which children at schools
have become the victims of murder at the hands of lone gunman
and/or have died as a result of natural disasters that have
impacted schools critically exemplify the need for special
9. security measures at educational institutions.
Violent crime, sexual assaults, homicides, thefts, gang and drug
activity, and many other threats to institutional security exist
across all levels of education. However, the age of the students,
structure of the facilities, the number and characteristics of
staff, and the access of members of the community very across
all levels of education. Thus, different criteria must be
considered for elementary and secondary schools and colleges
and universities. Many states have created safe-school zone.
The federal government has created informational material such
as a guide entitled Threats Assessments in Schools published by
the U.S. Secret Service. Agencies have also developed
informational pages on their websites concerning school safety.
Legislation like the Crime Awareness And Campus Security Act
of 1990, also known as the Clery Act, have been established and
require post-secondary institutions to gather and post the
current crime statistics so that students, parents, faculty and
staff all were on the status of crime on their campuses. College
and university informational guides also include sections about
safety security measures available at their featured colleges and
universities.
Healthcare facilities also have unique security concerns.
Security must be maintained in order for healthcare facilities to
function. There are numerous international, federal, state, and
local requirements that mandate the provision of a secure
healthcare environment. Healthcare security covers many facets
such as facilities, personnel, equipment and supplies, service
provision, records, and mobile healthcare units.
Hospitality security, entertainment security, disaster recovery,
and executive protection are other areas which require specific
security considerations. For example, the hospitality industry
has invested significant amounts of money into making its
establishments attractive to its guests. However, in so doing
10. many internal controls were not established. We can all think of
people we know who have come home from a hotel with linen,
dishes, and other items that were not intended for guests take
home in their suitcases. In addition to loss of assets, the
hospitality industry is also susceptible to accidents, fires, and
natural disasters.
To respond to these unique threats to security key control, alarm
systems, security cameras, and the employment of security
personnel are usually implemented.
The entertainment industry (sporting events, recreation areas
and their components, racetracks, movies and music, ships and
boats, casinos) also has its set of unique threats to security that
are associated with the size of the venue, the openness of the
venue facilities, and the number of people that attend the
events.
Disaster recovery is a specialty area in the field of security
management that focuses on managing organization-related
disasters (damages that result from natural and environmental
disasters) to ensure that services are restored quickly and
customers are not loss due to dissatisfaction with the services
provided during disaster recovery efforts.
Lastly, protection of executives, citizens, and political leaders
is a continual challenge. Incidences of executive kidnapping
continue to increase abroad. Acts of terrorism against citizens is
on the rise in the United States, and political leaders are more at
risk of being injured or killed by gunfire during public
appearances and at their private residences. Therefore, it is
important that effective executive protection programs include
1) risk assessments that accurately identify threats, the
likelihood of the threat being realized, and assessment of the
damage that would result if the threat was realized; 2) advanced
procedures that implement security arrangements before, during,
11. and after the executive travels; and 3) protective operations
which involve the accompanying of the executive by executive
detection personnel who are equipped and ready to use counter
surveillance and defensive tactics to protect the executive.