SlideShare a Scribd company logo
PICOT/PICO QUESTION
Week 2 Discussion Post
Dear Dr. Hellem and Classmates,
My EBP project will be related to Catheter-Associated
Urinary Tract Infection – CAUTIs. After reading between
quantitative and qualitative approaches to use on my EBP
project proposal, I decided to use qualitative research due to the
target of the particular group and the technicalities involved
with the above issue. Understanding that Catheter-Associated
Urinary Tract Infection, comes as a result of the involvement of
the medical practitioner and staff, as it comes to life when
proper medical care is not administered to the patient
(Charlotte, 2019). Prolong use of indwelling urinary catheters is
a significant risk factor for CAUTI, therefore catheters should
be placed only when appropriate indications are present and its
appropriateness and prevalence should be tracked daily as
proper documentation for indication of use along with
identifying and collecting process measures such as staff
competency to perform insertion, audits of aseptic insertion
technique, and maintenance measures followed insertion (e.g.
drainage bag positioned below patient’s bladder and off the
floor) (Saint, Greene, Krein, Rogers, Ratz, Fowler, Edson,
Watson, Meyer-Lucas, Masuga, Faulkner, Gould, Battles, and
Fakih, 2016).
Using a qualitative research approach will allow the research
to undertake some methods such as participant observation, in-
depth interviews, small sample of participants, use of written
data, among others, keeping in mind that qualitative research
design is mainly focused on understanding the issue at hand by
embracing alternative ways of knowing in which findings will
be implemented in practice. Grounded Theory, a type of
qualitative research approach, generates theory by gathering and
analysing data which focus on the development of knowledge
that will help us understand the experience of a particular
situation and how relevant they are to our practice to identify
common risk factors among ICU and non-ICU patients (Saint et
al., 2016).
PICO question: How does the use nurse driven protocol for
evaluating the appropriateness and prevalence of catheter use or
removal, compared with no protocol affect the CAUTI rates?
Reference
Charlotte Lillis. (2019). Uses and types of urinary cateter.
Retrieved from
https://www.medicalnewstoday.com/articles/324187.php
Saint, S., Greene, T., Krein, S., Rogers, M., Ratz, D., Fowler,
K., Edson, B., Watson, S., Meyer-Lucas, B., Masuga, M.,
Faulkner, K., Gould, C., Battles, J., and Fakih, M. (2016). A
Program to Prevent Catheter-Associated Urinary Tract
Infection in Acute Care. The New England Journal of
Medicine. 374(22). Retrieved from
https://www.nejm.org/doi/pdf/10.1056/NEJMoa1504906?ar
ticleTools=true
Week 3
In this week you will learn about the security principles of
Diversity and Commonality
Copyright © 2012, Elsevier Inc. All rights Reserved
‹#›
Copyright © 2012, Elsevier Inc. All Rights Reserved
Chapter 5
Commonality
Cyber Attacks
Protecting National Infrastructure, 1st ed.
‹#›
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
2
Certain security attributes must be present in all aspects and
areas of national infrastructure to ensure maximum resilience
against attack
Best practices, standards, and audits establish a low-water mark
for all relevant organizations
Audits must be both meaningful and measurable
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Introduction
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
3
Common security-related best practice standards
Federal Information Security Management Act (FISMA)
Health Insurance Portability and Accountability Act (HIPAA)
Payment Card Industry Data Security Standard (PCI DSS)
ISO/IEC 27000 Standard (ISO27K)
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Introduction
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
4
Fig. 5.1 – Illustrative security audits for two organizations
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
‹#›
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Fig. 5.2 – Relationship between meaningful and measurable
requirements
‹#›
The primary motivation for proper infrastructure protection
should be success based and economic
Not the audit score
Security of critical components relies on
Step #1: Standard audit
Step #2: World-class focus
Sometimes security audit standards and best practices proven
through experience are in conflict
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Meaningful Best Practices for Infrastructure Protection
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
7
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Fig. 5.3 – Methodology to achieve world-class infrastructure
protection practices
‹#›
Four basic security policy considerations are recommended
Enforceable: Policies without enforcement are not valuable
Small: Keep it simple and current
Online: Policy info needs to be online and searchable
Inclusive: Good policy requires analysis in order to include
computing and networking elements in the local national
infrastructure environment
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Locally Relevant and
Appropriate Security Policy
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
9
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Fig. 5.4 – Decision process for security policy analysis
‹#›
Create an organizational culture of security protection
Culture of security is one where standard operating procedures
provide a secure environment
Ideal environment marries creativity and interest in new
technologies with caution and a healthy aversion to risk
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Culture of Security Protection
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
11
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Fig. 5.5 – Spectrum of organizational culture of security options
‹#›
Organizations should be explicitly committed to infrastructure
simplification
Common problems found in design and operation of national
infrastructure
Lack of generalization
Clouding the obvious
Stream-of-consciousness design
Nonuniformity
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Infrastructure Simplification
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
13
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Fig. 5.6 – Sample cluttered engineering chart
‹#›
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Fig. 5.7 – Simplified engineering chart
‹#›
How to simplify a national infrastructure environment
Reduce its size
Generalize concepts
Clean interfaces
Highlight patterns
Reduce clutter
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Infrastructure Simplification
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
16
Key decision-makers need certification and education programs
Hundred percent end-user awareness is impractical; instead
focus on improving security competence of decision-makers
Senior Managers
Designers and developers
Administrators
Security team members
Create low-cost, high-return activities to certify and educate
end users
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Certification and Education
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
17
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Fig. 5.8 – Return on investment (ROI) trends for security
education
‹#›
Create and establish career paths and reward structures for
security professionals
These elements should be present in national infrastructure
environments
Attractive salaries
Career paths
Senior managers
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Career Path and Reward Structure
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
19
Companies and agencies being considered for national
infrastructure work should be required to demonstrate past
practice in live security incidents
Companies and agencies must do a better job of managing their
inventory of live incidents
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Responsible Past Security Practice
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
20
Companies and agencies being considered for national
infrastructure work should provide evidence of the following
past practices
Past damage
Past prevention
Past response
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
Responsible Past Security Practice
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
21
A national commonality plan involves balancing the following
concerns
Plethora of existing standards
Low-water mark versus world class
Existing commissions and boards
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 5 – Commonality
National Commonality Program
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
22
Week 3
In this week you will learn about the security principles of
Diversity and Commonality
Copyright © 2012, Elsevier Inc. All rights Reserved
‹#›
Copyright © 2012, Elsevier Inc. All Rights Reserved
Chapter 4
Diversity
Cyber Attacks
Protecting National Infrastructure, 1st ed.
‹#›
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
2
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
Introduction
The securing any set of national assets should include a
diversity strategy
The deliberate introduction of diversity into national
infrastructure to increase security has not been well explored
Two system are considered diverse if their key attributes differ
Diversity bucks the trend to standardize assets for efficiency's
sake
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
3
Fig. 4.1 – Diverse and nondiverse components through attribute
differences
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
‹#›
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
Diversity and Worm Propagation
Worm propagation is an example of an attack that relies on a
nondiverse target environment
Worm functionality in three steps:
Step #1: Find a target system on the network for propagation of
worm program
Step #2: Copy program to that system
Step #3: Remotely execute program
Repeat
Diversity may be expensive to introduce, but saves money on
response costs in the long run
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
5
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
Fig. 4.2 – Mitigating worm activity through diversity
‹#›
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
Desktop Computer System Diversity
Most individual computers run the same operating system
software on a standard processor platform and browse the
Internet through one or two popular search engines with the one
of only a couple browsers
The typical configuration is a PC running Windows on an Intel
platform, browsing the Internet with Internet Explorer,
searching with Google
This makes the average home PC user a highly predictable
target
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
7
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
Fig. 4.3 – Typical PC configuration showing diversity
‹#›
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
Desktop Computer System Diversity
Three Considerations
Platform costs
Application interoperability
Support and training
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
9
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
Fig. 4.4 – Spectrum of desktop diversity options
‹#›
Ultimate solution for making desktops more secure involves
their removal
Not a practical solution
Cloud computing may offer home PC users a diverse, protected
environment
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
Diversity Paradox of Cloud Computing
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
11
Modern telecommunications consist of the following two types
of technologies
Circuit-switched
Packet-switched
When compared to one another, these two technologies
automatically provide diversity
Diversity may not always be a feasible goal
Maximizing diversity may defend against large-scale attacks,
but one must also look closely at the entire architecture
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
Network Technology Diversity
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
12
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
Fig. 4.6 – Worm nonpropagation benefit from diverse
telecommunications
‹#›
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
Fig. 4.7 – Potential for impact propagation over shared fiber
‹#›
Any essential computing or networking asset that serves a
critical function must include physical distribution to increase
survivability
Physical diversity has been part of the national asset system for
years
Backup center diversity
Supplier/vendor diversity
Network route diversity
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
Physical Diversity
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
15
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
Fig. 4.8 – Diverse hubs in satellite SCADA configurations
‹#›
A national diversity program would coordinate between
companies and government agencies
Critical path analysis
Cascade modeling
Procurement discipline
Copyright © 2012, Elsevier Inc. All rights Reserved
Chapter 4 – Diversity
National Diversity Program
‹#›
The University of Adelaide, School of Computer Science
14 July 2019
Chapter 2 — Instructions: Language of the Computer
17
Week 2: Refinement of a Nursing Concern into an Evidence-
based Practice Proposal Using the Research ProcessPurpose
This assignment provides the opportunity for the student to
continue work on a previously identified area or phenomenon of
interest related to their MSN specialty track. Week Two’s
assignment builds upon the identified area of interest by
developing an overview of the evidence-based practice (EBP)
project and the PCIOT/PICo question. This assignment
initiates the evidence-based practice proposal that is continued
throughout the entire course with each assignment adding
components of the research process. Course Outcomes
This assignment enables the student to meet the following
course outcomes:
CO#1 Integrate evidence-based practice and research to support
advancement of holistic nursing care in diverse healthcare
settings. PO 1
CO#2 Integrate knowledge related to evidence-based practice
and person-centered care to improve healthcare outcomes. PO
2, 5
CO#4 Develop knowledge related to research and evidence-
based practice as a basis for designing and critiquing research
studies. PO 1, 2, 3, 5
Due Date: Sunday 11:59 PM MT at the end of Week Two
Total Points Possible: 150 points Requirements
Description of the Assignment
This assignment builds on the identification of a nursing
concern from NR 500 and the application of a nursing theory to
the selected concern from NR 501. For this course, the selected
concern and nursing theory then serve as a foundation to the
identification of PICOT/PICo. Identification of the literature
search strategy is also required. The purpose of the MSN
project proposal is to translate evidence currently found in the
literature into practice within the chosen specialty track. Due
to the research complexity, time involvement, and implications
regarding human subjects, drug studies are not acceptable areas
of interest for a MSN project.
Criteria for Content
1. Overview of Selected Evidenced-based Practice Project: This
section provides a foundation to the MSN EBP scholarly
project. It should contain the following elements:
· Explain the relationship between research and evidenced-
based practice (EBP)
· Distinguish how EBP is different from research
· Explain the contribution of EBP to professional nursing
· Identify your MSN Program Specialty Track and practice
focus
· Explain how EBP promotes change within your future practice
setting
2. Identification of the Nursing Concern to be Improved: This
section provides a comprehensive discussion of the selected
nursing concern (MY WILL BE ABOUT CAUTI – CATHETER
ACQUIRER URINARY TRACT INFECTION). It should
contain the following elements:
· Explain the selected nursing concern in detail
· Identify how frequently the selected concern occurs within
your specialty track setting
· Identify the stakeholders impacted by the concern
· Identify the consequences of the selected concern
· Identify your proposed solution to the selected concern
· Identify a purpose statement for this EBP proposal
3. PICOT/PICo question and Literature Search Process: This
section identifies the PICOT/PICo question that will used for
this EBP proposal. The literature search parameters will also be
identified. It should contain the following elements:
· Identify the question in correct format with all required
elements
· PICOT for quantitative research approach
· PICo for qualitative research approach
· Identify how the expected outcome will be useful to your
future practice setting
· Discuss the purpose of conducting a literature review and the
contribution it will provide to this EBP proposal
· Identify the steps used to conduct a literature review for this
EBP proposal by including:
· The specific library databases used
· The key search terms and phrases used
· The minor (additional) search terms and phrases used
· Identify any specialty organization that is relevant to this EBP
proposal
4. Theoretical Framework: This section presents the theoretical
framework that will used in this EBP project. It should contain
the following section:
· Explain the theoretical framework to be used in this EBP
proposal
· Describe how the identified theoretical framework is applied
to this EBP proposal
Preparing the Assignment
Criteria for Format and Special Instructions
1. The paper (excluding the title page and reference page)
should be at least 5, but no more than 8 pages. Points will be
lost for not meeting these length requirements.
2. Title page, running head, body of paper, and reference page
must follow APA guidelines as found in the 6th edition of the
manual. This includes the use of headings for each section of
the paper except for the introduction where no heading is used.
3. A minimum of 6 (six) appropriate research-based scholarly
references must be used. Required textbook for this course,
dictionary and Chamberlain College of Nursing lesson
information may NOT be used as scholarly references for this
assignment. For additional assistance regarding scholarly
nursing references, please see “What is a scholarly source”
located in the Course Resources tab. Be aware that information
from .com websites may be incorrect and should be avoided.
References are current - within a 5-year time frame unless a
valid rationale is provided and the instructor has approved them
prior to submission of the assignment.
4. Ideas and information from scholarly, peer reviewed, nursing
sources must be cited and referenced correctly.
5. Rules of grammar, spelling, word usage, and punctuation are
followed and consistent with formal, scientific
writing.Directions and Assignment Criteria
Assignment Criteria
Points
%
Description
Overview of Selected Evidenced-based Practice Project
25
17
Required content for this section includes:
· Explain the relationship between research and evidenced-
based practice (EBP)
· Distinguish how EBP is different from research
· Explain the contribution of EBP to professional nursing
· Identify your MSN Program Specialty Track and practice
focus
· Explain how EBP promotes change within your future practice
setting
Identification of the Nursing Concern to be Improved
25
17
Required content for this section includes:
· Explain the selected nursing concern in detail
· Identify how frequently the selected concern occurs within
your specialty track
· Identify the stakeholders impacted by the concern
· Identify the consequences of the selected concern
· Identify your proposed solution to the selected concern
· Identify a purpose statement for this EBP proposal
PICOT/PICo question and Literature Search Process
20
13
The required content for this section includes:
Identify the question in correct format with all required
elements:
· PICOT for quantitative research approach
· PICo for qualitative research approach
· Identify how the expected outcome will be useful to your
future practice setting
· Discuss the purpose of conducting a literature review and the
contribution it will provide to this EBP proposal
· Identify the steps used to conduct a literature review for this
EBP proposal by including:
· The specific library databases used
· The key search terms and phrases used
· The minor (additional) search terms and phrases used
· Identify any specialty organization that is relevant to this EBP
proposal
Theoretical Framework
20
16
The required content for this section includes:
· Explain the theoretical framework to be used in this EBP
proposal
· Describe how the identified theoretical framework is applied
to this EBP proposal
Paper Specifications
10
8
Paper meets length requirements of 5 to 8 pages.
Minimum of 6 (six) appropriate research scholarly nursing
references
A dictionary, required textbook for this course and Chamberlain
College of Nursing lesson information, may NOT be used as
scholarly references for this assignment.
References are current - within a 5-year time frame unless a
valid rationale is provided and the instructor has approved them
prior to assignment submission.
APA Format (6th edition)
25
17
Title page, running head, body of paper, and reference page
must follow APA guidelines as found in the 6th edition of the
manual. This includes the use of headings for each section of
the paper except for the introduction where no heading is used.
One deduction for each type of APA style error
Citations in Text
10
7
Ideas and information that come from readings must be cited
and referenced correctly.
Writing Mechanics
15
10
Rules of grammar, spelling, word usage, and punctuation are
followed and consistent with formal written work as found in
the 6th edition of the APA manual.
Total
150
100 %
Chamberlain College of Nursing NR505 Advanced
Research Methods: Evidenced Based Practice
Chamberlain College of Nursing NR505 Advanced
Research Methods: Evidenced Based Practice
NR505: W2 Assignment Refinement of Nsg. Concern Rev-
7/31/2017 (AR)
NR505: W2 Assignment Refinement of Nsg. Concern Rev-
7/31/2017 (AR),
REV 1/10/18 (AR)
1
Grading Rubric
Assignment Criteria
Exceptional
(100%)
Outstanding or highest level of performance
Exceeds
(88%)
Very good or high level of performance
Meets
(80%)
Competent or satisfactory level of performance
Needs Improvement
(38%)
Poor or failing level of performance
Developing
(0)
Unsatisfactory level of performance
Content
Possible Points = 100 Points
Overview of Selected Evidenced-based Practice Project
25 Points
22 Points
20 Points
10 Points
0 Points
Presentation of information was exceptional and included all of
the following elements:
· Explain the relationship between research and evidence-based
practice (EBP)
· Distinguish how EBP is different from research
· Explain the contribution of EBP to professional nursing
· Identify your MSN Program Specialty Track and practice
focus
· Explain how EBP promotes change within your future practice
setting
Presentation of information was good, but was superficial in
places and included all of the following elements:
· Explain the relationship between research and evidence-based
practice (EBP)
· Distinguish how EBP is different from research
· Explain the contribution of EBP to professional nursing
· Identify your MSN Program Specialty Track and practice
focus
· Explain how EBP promotes change within your future practice
setting
Presentation of information was minimally demonstrated in the
all of the following elements:
· Explain the relationship between research and evidence-based
practice (EBP)
· Distinguish how EBP is different from research
· Explain the contribution of EBP to professional nursing
· Identify your MSN Program Specialty Track and practice
focus
· Explain how EBP promotes change within your future practice
setting
Presentation of information in one or two of the following
elements fails to meet expectations:
· Explain the relationship between research and evidence-based
practice (EBP)
· Distinguish how EBP is different from research
· Explain the contribution of EBP to professional nursing
· Identify your MSN Program Specialty Track and practice
focus
· Explain how EBP promotes change within your future practice
setting
Presentation of information is unsatisfactory in three or more of
the following elements:
· Explain the relationship between research and evidence-based
practice (EBP)
· Distinguish how EBP is different from research
· Explain the contribution of EBP to professional nursing
· Identify your MSN Program Specialty Track and practice
focus
· Explain how EBP promotes change within your future practice
setting
Identification of the Nursing Concern to be Improved
25 Points
22 Points
20 Points
10 Points
0 Points
Presentation of information was exceptional and included all of
the following elements:
· Explain the selected nursing concern in detail
· Identify how frequently the selected concern occurs within
your specialty track setting
· Identify the stakeholders impacted by the concern
· Identify the consequences of the selected concern
· Identify your proposed solution to the selected concern
· Identify a purpose statement for this EBP proposal
Presentation of information was good, but was superficial in
places and included all of the following elements:
· Explain the selected nursing concern in detail
· Identify how frequently the selected concern occurs within
your specialty track setting
· Identify the stakeholders impacted by the concern
· Identify the consequences of the selected concern
· Identify your proposed solution to the selected concern
· Identify a purpose statement for this EBP proposal
Presentation of information was minimally demonstrated in the
all of the following elements:
· Explain the selected nursing concern in detail
· Identify how frequently the selected concern occurs within
your specialty track setting
· Identify the stakeholders impacted by the concern
· Identify the consequences of the selected concern
· Identify your proposed solution to the selected concern
· Identify a purpose statement for this EBP proposal
Presentation of information in one, two or three of the
following elements fails to meet expectations:
· Explain the selected nursing concern in detail
· Identify how frequently the selected concern occurs within
your specialty track setting
· Identify the stakeholders impacted by the concern
· Identify the consequences of the selected concern
· Identify your proposed solution to the selected concern
· Identify a purpose statement for this EBP proposal
Presentation of information is unsatisfactory in four or more of
the following elements:
· Explain the selected nursing concern in detail
· Identify how frequently the selected concern occurs within
your specialty track setting
· Identify the stakeholders impacted by the concern
· Identify the consequences of the selected concern
· Identify your proposed solution to the selected concern
· Identify a purpose statement for this EBP proposal
PICOT/PICo question and Literature Search Process
20 Points
18 Points
16 Points
8 Points
0 Points
Presentation of information was exceptional and included all of
the following elements:
· Identify the question in correct format with all required
elements
· PICOT for quantitative research approach
· PICo for qualitative research approach
· Identify how the expected outcome will be useful to your
future practice setting
· Discuss the purpose of conducting literature review and the
contribution it will provide to this EBP proposal
· Identify the steps used to conduct a literature review for this
EBP proposal by including:
· The specific library databases used
· The key search terms and phrases used
· The minor (additional) search terms and phrases used
· Identify any specialty organization that is relevant to this EBP
proposal
Presentation of information was good, but was superficial in
places and included all of the following elements:
· Identify the question in correct format with all required
elements
· PICOT for quantitative research approach
· PICo for qualitative research approach
· Identify how the expected outcome will be useful to your
future practice setting
· Discuss the purpose of conducting literature review and the
contribution it will provide to this EBP proposal
· Identify the steps used to conduct a literature review for this
EBP proposal by including:
· The specific library databases used
· The key search terms and phrases used
· The minor (additional) search terms and phrases used
· Identify any specialty organization that is relevant to this EBP
proposal
Presentation of information was minimally demonstrated in the
all of the following elements:
· Identify the question in correct format with all required
elements
· PICOT for quantitative research approach
· PICo for qualitative research approach
· Identify how the expected outcome
will be useful to your future practice setting
· Discuss the purpose of conducting literature review and the
contribution it will provide to this EBP proposal
· Identify the steps used to conduct a literature review for this
EBP proposal by including:
· The specific library databases used
· The key search terms and phrases used
· The minor (additional) search terms and phrases used
· Identify any specialty organization that is relevant to this EBP
proposal
Presentation of information in one or two of the following
elements fails to meet expectations:
· Identify the question in correct format with all required
elements
· PICOT for quantitative research approach
· PICo for qualitative research approach
· Identify how the expected outcome will be useful to your
future practice setting
· Discuss the purpose of conducting literature review and the
contribution it will provide to this EBP proposal
· Identify the steps used to conduct a literature review for this
EBP proposal by including:
· The specific library databases used
· The key search terms and phrases used
· The minor (additional) search terms and phrases used
· Identify any specialty organization that is relevant to this EBP
proposal
Presentation of information is unsatisfactory in three or more of
the following elements:
· Identify the question in correct format with all required
elements
· PICOT for quantitative research approach
· PICo for qualitative research approach
· Identify how the expected outcome will be useful to your
future practice setting
· Discuss the purpose of conducting literature review and the
contribution it will provide to this EBP proposal
· Identify the steps used to conduct a literature review for this
EBP proposal by including:
· The specific library databases used
· The key search terms and phrases used
· The minor (additional) search terms and phrases used
· Identify any specialty organization that is relevant to this EBP
proposal
Theoretical Framework
20 Points
18 Points
16 Points
8 Points
0 Points
Presentation of information was exceptional and included all of
the following elements:
· Explain the theoretical framework to be used in this EBP
proposal
· Describe how the identified theoretical framework is applies
to this EBP proposal
Presentation of information was good, but was superficial in
places and included all of the following elements:
· Explain the theoretical framework to be used in this EBP
proposal
· Describe how the identified theoretical framework is applies
to this EBP proposal
Presentation of information was minimally demonstrated in the
all of the following elements:
· Explain the theoretical framework to be used in this EBP
proposal
· Describe how the identified theoretical framework is applies
to this EBP proposal
Presentation of information in one of the following elements
fails to meet expectations:
· Explain the theoretical framework to be used in this EBP
proposal
· Describe how the identified theoretical framework is applies
to this EBP proposal
Presentation of information is unsatisfactory in two of the
following:
· Explain the theoretical framework to be used in this EBP
proposal
· Describe how the identified theoretical framework is applies
to this EBP proposal
Paper Specifications
10 Points
9 Points
8 Points
4 Points
0 Points
This section included all of the following:
· Paper meet length requirements of 5 to 8 page.
· Minimum of 6 (six) scholarly nursing references
· Dictionary, required textbook for this course and Chamberlain
College of Nursing lesson information, were NOT used as
scholarly references.
· All references are current - within a 5-year time frame unless
a valid rationale was provided and the instructor approved them.
This section included three of the following:
· Paper meet length requirements of 5 to 8 page.
· Minimum of 6 (six) scholarly nursing references
· Dictionary, required textbook for this course and Chamberlain
College of Nursing lesson information, were NOT used as
scholarly references.
· All references are current - within a 5-year time frame unless
a valid rationale was provided and the instructor approved them.
This section included only two of the following:
· Paper meet length requirements of 5 to 8 page.
· Minimum of 6 (six) scholarly nursing references
· Dictionary, required textbook for this course and Chamberlain
College of Nursing lesson information, were NOT used as
scholarly references.
· All references are current - within a 5-year time frame unless
a valid rationale was provided and the instructor approved them.
This section included only one of the following:
· Paper meet length requirements of 5 to 8 page.
· Minimum of 6 (six) scholarly nursing references
· Dictionary, required textbook for this course and Chamberlain
College of Nursing lesson information, were NOT used as
scholarly references.
· All references are current - within a 5-year time frame unless
a valid rationale was provided and the instructor approved them.
This section included none of the following:
· Paper meet length requirements of 5 to 8 page.
· Minimum of 6 (six) scholarly nursing references
· Dictionary, required textbook for this course and Chamberlain
College of Nursing lesson information, were NOT used as
scholarly references.
· All references are current - within a 5-year time frame unless
a valid rationale was provided and the instructor approved them.
Content Subtotal ________of 100 points
Format
Possible Points = 50 Points
APA Style
25 Points
22 Points
20 Points
10 Points
0 Points
APA guidelines, as per the 6th edition of the manual, are
demonstrated for the
· title page,
· running head,
· body of paper (including margins, headings, font etc), and
reference page
One deduction for each type of APA format error
0 to 1 APA error was present
APA guidelines, as per the 6th edition of the manual, are
demonstrated for the
· title page,
· running head,
· body of paper (including margins, headings, font etc), and
reference page
One deduction for each type of APA format error
2 - 3 APA errors were present
APA guidelines, as per the 6th edition of the manual, are
demonstrated for the
· title page,
· running head,
· body of paper (including margins, headings, font etc), and
reference page
One deduction for each type of APA format error
4 – 5 APA errors were are present
APA guidelines, as per the 6th edition of the manual, are
demonstrated for the
· title page,
· running head,
· body of paper (including margins, headings, font etc), and
reference page
One deduction for each type of APA format error
6 – 7 APA errors were present
APA guidelines, as per the 6th edition of the manual, are
demonstrated for the
· title page,
· running head,
body of paper (including margins, headings, font etc), and
reference page
One deduction for each type of APA format error
8 or greater APA errors were present
Citations
10 Points
9 Points
8 Points
4 Points
0 Points
There were 0-1 errors in the crediting of ideas, and information
that contributed to knowledge
There were 2-3 errors in the crediting of ideas, and information
that contributed to knowledge
There were 4-5 errors in the crediting of ideas, and information
that contributed to knowledge
There were 6-7 errors in the crediting of ideas, and information
that contributed to knowledge
There were 8 or greater errors in the crediting of ideas, and
information that contributed to knowledge
Writing Mechanics
15 Points
13 Points
12 Points
6 Points
0 Points
1–2 errors or exceptions to the rules of grammar, spelling, word
usage, punctuation and other aspects of formal written work as
found in the 6th edition of the APA manual
3 – 4 errors or exceptions to the rules of grammar, spelling,
word usage, punctuation and other aspects of formal written
work as found in the 6th edition of the APA manual
5 – 6 errors or exceptions to the rules of grammar, spelling,
word usage, punctuation and other aspects of formal written
work as found in the 6th edition of the APA manual
7 – 8 errors or exceptions to the rules of grammar, spelling,
word usage, punctuation and other aspects of formal written
work as found in the 6th edition of the APA manual
9 or greater errors or exceptions to the rules of grammar,
spelling, word usage, punctuation and other aspects of formal
written work as found in the 6th edition of the APA manual
Format Subtotal
_____of 50 points
Total Points
_____of 150 points
NR505: W2 Assignment Refinement of Nsg. Concern Rev-
7/31/2017 (AR); Rev 11/20/2017 (AR)
13

More Related Content

Similar to PICOTPICO QUESTION Week 2 Discussion Post Dear Dr. Hellem and.docx

© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
gerardkortney
 
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docxITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
vrickens
 
Smart Wearable System For Patients With Respiratory DisordersUsing IOT
Smart Wearable System For Patients With Respiratory DisordersUsing IOTSmart Wearable System For Patients With Respiratory DisordersUsing IOT
Smart Wearable System For Patients With Respiratory DisordersUsing IOT
IRJET Journal
 
Alumni Tracking System
Alumni Tracking SystemAlumni Tracking System
Alumni Tracking System
Joe Andelija
 
Safety Assessment in Construction Projects
Safety Assessment in Construction ProjectsSafety Assessment in Construction Projects
Safety Assessment in Construction Projects
ijtsrd
 
STUDY ON ENHANCEMENT OF HUMAN SAFETY PROTECTION FACTORS IN CONSTRUCTION INDUSTRY
STUDY ON ENHANCEMENT OF HUMAN SAFETY PROTECTION FACTORS IN CONSTRUCTION INDUSTRYSTUDY ON ENHANCEMENT OF HUMAN SAFETY PROTECTION FACTORS IN CONSTRUCTION INDUSTRY
STUDY ON ENHANCEMENT OF HUMAN SAFETY PROTECTION FACTORS IN CONSTRUCTION INDUSTRY
IAEME Publication
 
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARECLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
UsmanYakubuMaaruf
 
Big data adoption: State of the art and Research challenges
Big data adoption: State of the art and Research challengesBig data adoption: State of the art and Research challenges
Big data adoption: State of the art and Research challenges
Nurul Mahfuz
 
Health and Safety Framework Using Analytic Hierarchy Process For Construction...
Health and Safety Framework Using Analytic Hierarchy Process For Construction...Health and Safety Framework Using Analytic Hierarchy Process For Construction...
Health and Safety Framework Using Analytic Hierarchy Process For Construction...
IRJET Journal
 
Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...
IJECEIAES
 
Restricted Routing Infrastructures Project Report
Restricted Routing Infrastructures Project ReportRestricted Routing Infrastructures Project Report
Restricted Routing Infrastructures Project Report
Sai Charan
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
CSCJournals
 
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
IJITE
 
Riskanalysisin housingindustry (1)
Riskanalysisin housingindustry (1)Riskanalysisin housingindustry (1)
Riskanalysisin housingindustry (1)
Dr.Madhav Prasad Koirala
 
Acr10D.tmp.pdf
Acr10D.tmp.pdfAcr10D.tmp.pdf
Acr10D.tmp.pdf
LisbethRoosRoos
 
Strengthening the resilience of critical infrastructure - Charles Baubion, OECD
Strengthening the resilience of critical infrastructure - Charles Baubion, OECDStrengthening the resilience of critical infrastructure - Charles Baubion, OECD
Strengthening the resilience of critical infrastructure - Charles Baubion, OECD
OECD Governance
 
Amelioration of safety management in infrastructure projects
Amelioration of safety management in infrastructure projectsAmelioration of safety management in infrastructure projects
Amelioration of safety management in infrastructure projects
IJERA Editor
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
rtodd599
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
rtodd599
 
Cisco ICon Speaker Series: The digital transformation of education 05/23/19
Cisco ICon Speaker Series: The digital transformation of education 05/23/19Cisco ICon Speaker Series: The digital transformation of education 05/23/19
Cisco ICon Speaker Series: The digital transformation of education 05/23/19
Vishnu Pendyala
 

Similar to PICOTPICO QUESTION Week 2 Discussion Post Dear Dr. Hellem and.docx (20)

© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
 
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docxITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
 
Smart Wearable System For Patients With Respiratory DisordersUsing IOT
Smart Wearable System For Patients With Respiratory DisordersUsing IOTSmart Wearable System For Patients With Respiratory DisordersUsing IOT
Smart Wearable System For Patients With Respiratory DisordersUsing IOT
 
Alumni Tracking System
Alumni Tracking SystemAlumni Tracking System
Alumni Tracking System
 
Safety Assessment in Construction Projects
Safety Assessment in Construction ProjectsSafety Assessment in Construction Projects
Safety Assessment in Construction Projects
 
STUDY ON ENHANCEMENT OF HUMAN SAFETY PROTECTION FACTORS IN CONSTRUCTION INDUSTRY
STUDY ON ENHANCEMENT OF HUMAN SAFETY PROTECTION FACTORS IN CONSTRUCTION INDUSTRYSTUDY ON ENHANCEMENT OF HUMAN SAFETY PROTECTION FACTORS IN CONSTRUCTION INDUSTRY
STUDY ON ENHANCEMENT OF HUMAN SAFETY PROTECTION FACTORS IN CONSTRUCTION INDUSTRY
 
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARECLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
 
Big data adoption: State of the art and Research challenges
Big data adoption: State of the art and Research challengesBig data adoption: State of the art and Research challenges
Big data adoption: State of the art and Research challenges
 
Health and Safety Framework Using Analytic Hierarchy Process For Construction...
Health and Safety Framework Using Analytic Hierarchy Process For Construction...Health and Safety Framework Using Analytic Hierarchy Process For Construction...
Health and Safety Framework Using Analytic Hierarchy Process For Construction...
 
Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...Ontology-based context-sensitive software security knowledge management model...
Ontology-based context-sensitive software security knowledge management model...
 
Restricted Routing Infrastructures Project Report
Restricted Routing Infrastructures Project ReportRestricted Routing Infrastructures Project Report
Restricted Routing Infrastructures Project Report
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
 
Riskanalysisin housingindustry (1)
Riskanalysisin housingindustry (1)Riskanalysisin housingindustry (1)
Riskanalysisin housingindustry (1)
 
Acr10D.tmp.pdf
Acr10D.tmp.pdfAcr10D.tmp.pdf
Acr10D.tmp.pdf
 
Strengthening the resilience of critical infrastructure - Charles Baubion, OECD
Strengthening the resilience of critical infrastructure - Charles Baubion, OECDStrengthening the resilience of critical infrastructure - Charles Baubion, OECD
Strengthening the resilience of critical infrastructure - Charles Baubion, OECD
 
Amelioration of safety management in infrastructure projects
Amelioration of safety management in infrastructure projectsAmelioration of safety management in infrastructure projects
Amelioration of safety management in infrastructure projects
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
 
Cisco ICon Speaker Series: The digital transformation of education 05/23/19
Cisco ICon Speaker Series: The digital transformation of education 05/23/19Cisco ICon Speaker Series: The digital transformation of education 05/23/19
Cisco ICon Speaker Series: The digital transformation of education 05/23/19
 

More from stilliegeorgiana

1. The Incident Command System (ICS) is a tool forA. Co.docx
1. The Incident Command System (ICS) is a tool forA. Co.docx1. The Incident Command System (ICS) is a tool forA. Co.docx
1. The Incident Command System (ICS) is a tool forA. Co.docx
stilliegeorgiana
 
1. The Thirteenth Amendment effectively brought an end to slaver.docx
1. The Thirteenth Amendment effectively brought an end to slaver.docx1. The Thirteenth Amendment effectively brought an end to slaver.docx
1. The Thirteenth Amendment effectively brought an end to slaver.docx
stilliegeorgiana
 
1. The Thirteenth Amendment effectively brought an end to slavery in.docx
1. The Thirteenth Amendment effectively brought an end to slavery in.docx1. The Thirteenth Amendment effectively brought an end to slavery in.docx
1. The Thirteenth Amendment effectively brought an end to slavery in.docx
stilliegeorgiana
 
1. The Fight for a True Democracyhttpswww.nytimes.com201.docx
1. The Fight for a True Democracyhttpswww.nytimes.com201.docx1. The Fight for a True Democracyhttpswww.nytimes.com201.docx
1. The Fight for a True Democracyhttpswww.nytimes.com201.docx
stilliegeorgiana
 
1. The article for week 8 described hip hop as a weapon. This weeks.docx
1. The article for week 8 described hip hop as a weapon. This weeks.docx1. The article for week 8 described hip hop as a weapon. This weeks.docx
1. The article for week 8 described hip hop as a weapon. This weeks.docx
stilliegeorgiana
 
1. The Hatch Act defines prohibited activities of public employees. .docx
1. The Hatch Act defines prohibited activities of public employees. .docx1. The Hatch Act defines prohibited activities of public employees. .docx
1. The Hatch Act defines prohibited activities of public employees. .docx
stilliegeorgiana
 
1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx
1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx
1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx
stilliegeorgiana
 
1. Some people say that chatbots are inferior for chatting.Others di.docx
1. Some people say that chatbots are inferior for chatting.Others di.docx1. Some people say that chatbots are inferior for chatting.Others di.docx
1. Some people say that chatbots are inferior for chatting.Others di.docx
stilliegeorgiana
 
1. Some people say that chatbots are inferior for chatting.Other.docx
1. Some people say that chatbots are inferior for chatting.Other.docx1. Some people say that chatbots are inferior for chatting.Other.docx
1. Some people say that chatbots are inferior for chatting.Other.docx
stilliegeorgiana
 
1. Some people say that chatbots are inferior for chatting. Others d.docx
1. Some people say that chatbots are inferior for chatting. Others d.docx1. Some people say that chatbots are inferior for chatting. Others d.docx
1. Some people say that chatbots are inferior for chatting. Others d.docx
stilliegeorgiana
 
1. Tell us about yourself and your personal journey that has to .docx
1. Tell us about yourself and your personal journey that has to .docx1. Tell us about yourself and your personal journey that has to .docx
1. Tell us about yourself and your personal journey that has to .docx
stilliegeorgiana
 
1. Tell us what characteristics of Loma Linda University are particu.docx
1. Tell us what characteristics of Loma Linda University are particu.docx1. Tell us what characteristics of Loma Linda University are particu.docx
1. Tell us what characteristics of Loma Linda University are particu.docx
stilliegeorgiana
 
1. Tell us about yourself and your personal journey that has lea.docx
1. Tell us about yourself and your personal journey that has lea.docx1. Tell us about yourself and your personal journey that has lea.docx
1. Tell us about yourself and your personal journey that has lea.docx
stilliegeorgiana
 
1. The Research paper will come in five parts. The instructions are.docx
1. The Research paper will come in five parts. The instructions are.docx1. The Research paper will come in five parts. The instructions are.docx
1. The Research paper will come in five parts. The instructions are.docx
stilliegeorgiana
 
1. The minutiae points located on a fingerprint will help determine .docx
1. The minutiae points located on a fingerprint will help determine .docx1. The minutiae points located on a fingerprint will help determine .docx
1. The minutiae points located on a fingerprint will help determine .docx
stilliegeorgiana
 
1. The initial post is to be posted first and have 300-500 words.docx
1. The initial post is to be posted first and have 300-500 words.docx1. The initial post is to be posted first and have 300-500 words.docx
1. The initial post is to be posted first and have 300-500 words.docx
stilliegeorgiana
 
1. The key elements of supplier measurement are quality, delivery, a.docx
1. The key elements of supplier measurement are quality, delivery, a.docx1. The key elements of supplier measurement are quality, delivery, a.docx
1. The key elements of supplier measurement are quality, delivery, a.docx
stilliegeorgiana
 
1. Search the Internet and locate an article that relates to the top.docx
1. Search the Internet and locate an article that relates to the top.docx1. Search the Internet and locate an article that relates to the top.docx
1. Search the Internet and locate an article that relates to the top.docx
stilliegeorgiana
 
1. Text mining – Text mining or text data mining is a process to e.docx
1. Text mining – Text mining or text data mining is a process to e.docx1. Text mining – Text mining or text data mining is a process to e.docx
1. Text mining – Text mining or text data mining is a process to e.docx
stilliegeorgiana
 
1. Students need to review 3 different social media platforms that a.docx
1. Students need to review 3 different social media platforms that a.docx1. Students need to review 3 different social media platforms that a.docx
1. Students need to review 3 different social media platforms that a.docx
stilliegeorgiana
 

More from stilliegeorgiana (20)

1. The Incident Command System (ICS) is a tool forA. Co.docx
1. The Incident Command System (ICS) is a tool forA. Co.docx1. The Incident Command System (ICS) is a tool forA. Co.docx
1. The Incident Command System (ICS) is a tool forA. Co.docx
 
1. The Thirteenth Amendment effectively brought an end to slaver.docx
1. The Thirteenth Amendment effectively brought an end to slaver.docx1. The Thirteenth Amendment effectively brought an end to slaver.docx
1. The Thirteenth Amendment effectively brought an end to slaver.docx
 
1. The Thirteenth Amendment effectively brought an end to slavery in.docx
1. The Thirteenth Amendment effectively brought an end to slavery in.docx1. The Thirteenth Amendment effectively brought an end to slavery in.docx
1. The Thirteenth Amendment effectively brought an end to slavery in.docx
 
1. The Fight for a True Democracyhttpswww.nytimes.com201.docx
1. The Fight for a True Democracyhttpswww.nytimes.com201.docx1. The Fight for a True Democracyhttpswww.nytimes.com201.docx
1. The Fight for a True Democracyhttpswww.nytimes.com201.docx
 
1. The article for week 8 described hip hop as a weapon. This weeks.docx
1. The article for week 8 described hip hop as a weapon. This weeks.docx1. The article for week 8 described hip hop as a weapon. This weeks.docx
1. The article for week 8 described hip hop as a weapon. This weeks.docx
 
1. The Hatch Act defines prohibited activities of public employees. .docx
1. The Hatch Act defines prohibited activities of public employees. .docx1. The Hatch Act defines prohibited activities of public employees. .docx
1. The Hatch Act defines prohibited activities of public employees. .docx
 
1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx
1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx
1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx
 
1. Some people say that chatbots are inferior for chatting.Others di.docx
1. Some people say that chatbots are inferior for chatting.Others di.docx1. Some people say that chatbots are inferior for chatting.Others di.docx
1. Some people say that chatbots are inferior for chatting.Others di.docx
 
1. Some people say that chatbots are inferior for chatting.Other.docx
1. Some people say that chatbots are inferior for chatting.Other.docx1. Some people say that chatbots are inferior for chatting.Other.docx
1. Some people say that chatbots are inferior for chatting.Other.docx
 
1. Some people say that chatbots are inferior for chatting. Others d.docx
1. Some people say that chatbots are inferior for chatting. Others d.docx1. Some people say that chatbots are inferior for chatting. Others d.docx
1. Some people say that chatbots are inferior for chatting. Others d.docx
 
1. Tell us about yourself and your personal journey that has to .docx
1. Tell us about yourself and your personal journey that has to .docx1. Tell us about yourself and your personal journey that has to .docx
1. Tell us about yourself and your personal journey that has to .docx
 
1. Tell us what characteristics of Loma Linda University are particu.docx
1. Tell us what characteristics of Loma Linda University are particu.docx1. Tell us what characteristics of Loma Linda University are particu.docx
1. Tell us what characteristics of Loma Linda University are particu.docx
 
1. Tell us about yourself and your personal journey that has lea.docx
1. Tell us about yourself and your personal journey that has lea.docx1. Tell us about yourself and your personal journey that has lea.docx
1. Tell us about yourself and your personal journey that has lea.docx
 
1. The Research paper will come in five parts. The instructions are.docx
1. The Research paper will come in five parts. The instructions are.docx1. The Research paper will come in five parts. The instructions are.docx
1. The Research paper will come in five parts. The instructions are.docx
 
1. The minutiae points located on a fingerprint will help determine .docx
1. The minutiae points located on a fingerprint will help determine .docx1. The minutiae points located on a fingerprint will help determine .docx
1. The minutiae points located on a fingerprint will help determine .docx
 
1. The initial post is to be posted first and have 300-500 words.docx
1. The initial post is to be posted first and have 300-500 words.docx1. The initial post is to be posted first and have 300-500 words.docx
1. The initial post is to be posted first and have 300-500 words.docx
 
1. The key elements of supplier measurement are quality, delivery, a.docx
1. The key elements of supplier measurement are quality, delivery, a.docx1. The key elements of supplier measurement are quality, delivery, a.docx
1. The key elements of supplier measurement are quality, delivery, a.docx
 
1. Search the Internet and locate an article that relates to the top.docx
1. Search the Internet and locate an article that relates to the top.docx1. Search the Internet and locate an article that relates to the top.docx
1. Search the Internet and locate an article that relates to the top.docx
 
1. Text mining – Text mining or text data mining is a process to e.docx
1. Text mining – Text mining or text data mining is a process to e.docx1. Text mining – Text mining or text data mining is a process to e.docx
1. Text mining – Text mining or text data mining is a process to e.docx
 
1. Students need to review 3 different social media platforms that a.docx
1. Students need to review 3 different social media platforms that a.docx1. Students need to review 3 different social media platforms that a.docx
1. Students need to review 3 different social media platforms that a.docx
 

Recently uploaded

Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Leena Ghag-Sakpal
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
spdendr
 

Recently uploaded (20)

Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
Bed Making ( Introduction, Purpose, Types, Articles, Scientific principles, N...
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
Solutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptxSolutons Maths Escape Room Spatial .pptx
Solutons Maths Escape Room Spatial .pptx
 

PICOTPICO QUESTION Week 2 Discussion Post Dear Dr. Hellem and.docx

  • 1. PICOT/PICO QUESTION Week 2 Discussion Post Dear Dr. Hellem and Classmates, My EBP project will be related to Catheter-Associated Urinary Tract Infection – CAUTIs. After reading between quantitative and qualitative approaches to use on my EBP project proposal, I decided to use qualitative research due to the target of the particular group and the technicalities involved with the above issue. Understanding that Catheter-Associated Urinary Tract Infection, comes as a result of the involvement of the medical practitioner and staff, as it comes to life when proper medical care is not administered to the patient (Charlotte, 2019). Prolong use of indwelling urinary catheters is a significant risk factor for CAUTI, therefore catheters should be placed only when appropriate indications are present and its appropriateness and prevalence should be tracked daily as proper documentation for indication of use along with identifying and collecting process measures such as staff competency to perform insertion, audits of aseptic insertion technique, and maintenance measures followed insertion (e.g. drainage bag positioned below patient’s bladder and off the floor) (Saint, Greene, Krein, Rogers, Ratz, Fowler, Edson, Watson, Meyer-Lucas, Masuga, Faulkner, Gould, Battles, and Fakih, 2016). Using a qualitative research approach will allow the research to undertake some methods such as participant observation, in- depth interviews, small sample of participants, use of written data, among others, keeping in mind that qualitative research design is mainly focused on understanding the issue at hand by embracing alternative ways of knowing in which findings will be implemented in practice. Grounded Theory, a type of qualitative research approach, generates theory by gathering and analysing data which focus on the development of knowledge that will help us understand the experience of a particular
  • 2. situation and how relevant they are to our practice to identify common risk factors among ICU and non-ICU patients (Saint et al., 2016). PICO question: How does the use nurse driven protocol for evaluating the appropriateness and prevalence of catheter use or removal, compared with no protocol affect the CAUTI rates? Reference Charlotte Lillis. (2019). Uses and types of urinary cateter. Retrieved from https://www.medicalnewstoday.com/articles/324187.php Saint, S., Greene, T., Krein, S., Rogers, M., Ratz, D., Fowler, K., Edson, B., Watson, S., Meyer-Lucas, B., Masuga, M., Faulkner, K., Gould, C., Battles, J., and Fakih, M. (2016). A Program to Prevent Catheter-Associated Urinary Tract Infection in Acute Care. The New England Journal of Medicine. 374(22). Retrieved from https://www.nejm.org/doi/pdf/10.1056/NEJMoa1504906?ar ticleTools=true Week 3 In this week you will learn about the security principles of Diversity and Commonality Copyright © 2012, Elsevier Inc. All rights Reserved ‹#›
  • 3. Copyright © 2012, Elsevier Inc. All Rights Reserved Chapter 5 Commonality Cyber Attacks Protecting National Infrastructure, 1st ed. ‹#› ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 2 Certain security attributes must be present in all aspects and areas of national infrastructure to ensure maximum resilience against attack Best practices, standards, and audits establish a low-water mark for all relevant organizations Audits must be both meaningful and measurable Copyright © 2012, Elsevier Inc. All rights Reserved
  • 4. Chapter 5 – Commonality Introduction ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 3 Common security-related best practice standards Federal Information Security Management Act (FISMA) Health Insurance Portability and Accountability Act (HIPAA) Payment Card Industry Data Security Standard (PCI DSS) ISO/IEC 27000 Standard (ISO27K) Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Introduction ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 4
  • 5. Fig. 5.1 – Illustrative security audits for two organizations Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality ‹#› Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Fig. 5.2 – Relationship between meaningful and measurable requirements ‹#› The primary motivation for proper infrastructure protection should be success based and economic Not the audit score Security of critical components relies on Step #1: Standard audit Step #2: World-class focus Sometimes security audit standards and best practices proven through experience are in conflict Copyright © 2012, Elsevier Inc. All rights Reserved
  • 6. Chapter 5 – Commonality Meaningful Best Practices for Infrastructure Protection ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 7 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Fig. 5.3 – Methodology to achieve world-class infrastructure protection practices ‹#› Four basic security policy considerations are recommended Enforceable: Policies without enforcement are not valuable Small: Keep it simple and current Online: Policy info needs to be online and searchable Inclusive: Good policy requires analysis in order to include computing and networking elements in the local national infrastructure environment
  • 7. Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Locally Relevant and Appropriate Security Policy ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 9 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Fig. 5.4 – Decision process for security policy analysis ‹#› Create an organizational culture of security protection Culture of security is one where standard operating procedures provide a secure environment Ideal environment marries creativity and interest in new technologies with caution and a healthy aversion to risk Copyright © 2012, Elsevier Inc. All rights Reserved
  • 8. Chapter 5 – Commonality Culture of Security Protection ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 11 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Fig. 5.5 – Spectrum of organizational culture of security options ‹#› Organizations should be explicitly committed to infrastructure simplification Common problems found in design and operation of national infrastructure Lack of generalization Clouding the obvious Stream-of-consciousness design Nonuniformity
  • 9. Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Infrastructure Simplification ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 13 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Fig. 5.6 – Sample cluttered engineering chart ‹#› Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Fig. 5.7 – Simplified engineering chart
  • 10. ‹#› How to simplify a national infrastructure environment Reduce its size Generalize concepts Clean interfaces Highlight patterns Reduce clutter Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Infrastructure Simplification ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 16 Key decision-makers need certification and education programs Hundred percent end-user awareness is impractical; instead focus on improving security competence of decision-makers Senior Managers Designers and developers Administrators Security team members
  • 11. Create low-cost, high-return activities to certify and educate end users Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Certification and Education ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 17 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Fig. 5.8 – Return on investment (ROI) trends for security education ‹#› Create and establish career paths and reward structures for security professionals These elements should be present in national infrastructure environments
  • 12. Attractive salaries Career paths Senior managers Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Career Path and Reward Structure ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 19 Companies and agencies being considered for national infrastructure work should be required to demonstrate past practice in live security incidents Companies and agencies must do a better job of managing their inventory of live incidents Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Responsible Past Security Practice ‹#›
  • 13. The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 20 Companies and agencies being considered for national infrastructure work should provide evidence of the following past practices Past damage Past prevention Past response Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality Responsible Past Security Practice ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 21 A national commonality plan involves balancing the following concerns Plethora of existing standards Low-water mark versus world class Existing commissions and boards Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 5 – Commonality
  • 14. National Commonality Program ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 22 Week 3 In this week you will learn about the security principles of Diversity and Commonality Copyright © 2012, Elsevier Inc. All rights Reserved ‹#› Copyright © 2012, Elsevier Inc. All Rights Reserved Chapter 4 Diversity Cyber Attacks Protecting National Infrastructure, 1st ed.
  • 15. ‹#› ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 2 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity Introduction The securing any set of national assets should include a diversity strategy The deliberate introduction of diversity into national infrastructure to increase security has not been well explored Two system are considered diverse if their key attributes differ Diversity bucks the trend to standardize assets for efficiency's sake ‹#›
  • 16. The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 3 Fig. 4.1 – Diverse and nondiverse components through attribute differences Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity ‹#› Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity Diversity and Worm Propagation Worm propagation is an example of an attack that relies on a nondiverse target environment Worm functionality in three steps: Step #1: Find a target system on the network for propagation of worm program Step #2: Copy program to that system Step #3: Remotely execute program Repeat Diversity may be expensive to introduce, but saves money on response costs in the long run
  • 17. ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 5 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity Fig. 4.2 – Mitigating worm activity through diversity ‹#› Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity Desktop Computer System Diversity Most individual computers run the same operating system software on a standard processor platform and browse the Internet through one or two popular search engines with the one of only a couple browsers The typical configuration is a PC running Windows on an Intel platform, browsing the Internet with Internet Explorer, searching with Google This makes the average home PC user a highly predictable target
  • 18. ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 7 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity Fig. 4.3 – Typical PC configuration showing diversity ‹#› Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity Desktop Computer System Diversity Three Considerations Platform costs Application interoperability Support and training
  • 19. ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 9 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity Fig. 4.4 – Spectrum of desktop diversity options ‹#› Ultimate solution for making desktops more secure involves their removal Not a practical solution Cloud computing may offer home PC users a diverse, protected environment Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity Diversity Paradox of Cloud Computing
  • 20. ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 11 Modern telecommunications consist of the following two types of technologies Circuit-switched Packet-switched When compared to one another, these two technologies automatically provide diversity Diversity may not always be a feasible goal Maximizing diversity may defend against large-scale attacks, but one must also look closely at the entire architecture Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity Network Technology Diversity ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 12
  • 21. Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity Fig. 4.6 – Worm nonpropagation benefit from diverse telecommunications ‹#› Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity Fig. 4.7 – Potential for impact propagation over shared fiber ‹#› Any essential computing or networking asset that serves a critical function must include physical distribution to increase survivability Physical diversity has been part of the national asset system for years Backup center diversity Supplier/vendor diversity Network route diversity Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity Physical Diversity
  • 22. ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 15 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity Fig. 4.8 – Diverse hubs in satellite SCADA configurations ‹#› A national diversity program would coordinate between companies and government agencies Critical path analysis Cascade modeling Procurement discipline Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 4 – Diversity National Diversity Program
  • 23. ‹#› The University of Adelaide, School of Computer Science 14 July 2019 Chapter 2 — Instructions: Language of the Computer 17 Week 2: Refinement of a Nursing Concern into an Evidence- based Practice Proposal Using the Research ProcessPurpose This assignment provides the opportunity for the student to continue work on a previously identified area or phenomenon of interest related to their MSN specialty track. Week Two’s assignment builds upon the identified area of interest by developing an overview of the evidence-based practice (EBP) project and the PCIOT/PICo question. This assignment initiates the evidence-based practice proposal that is continued throughout the entire course with each assignment adding components of the research process. Course Outcomes This assignment enables the student to meet the following course outcomes: CO#1 Integrate evidence-based practice and research to support advancement of holistic nursing care in diverse healthcare settings. PO 1 CO#2 Integrate knowledge related to evidence-based practice and person-centered care to improve healthcare outcomes. PO 2, 5 CO#4 Develop knowledge related to research and evidence- based practice as a basis for designing and critiquing research studies. PO 1, 2, 3, 5 Due Date: Sunday 11:59 PM MT at the end of Week Two
  • 24. Total Points Possible: 150 points Requirements Description of the Assignment This assignment builds on the identification of a nursing concern from NR 500 and the application of a nursing theory to the selected concern from NR 501. For this course, the selected concern and nursing theory then serve as a foundation to the identification of PICOT/PICo. Identification of the literature search strategy is also required. The purpose of the MSN project proposal is to translate evidence currently found in the literature into practice within the chosen specialty track. Due to the research complexity, time involvement, and implications regarding human subjects, drug studies are not acceptable areas of interest for a MSN project. Criteria for Content 1. Overview of Selected Evidenced-based Practice Project: This section provides a foundation to the MSN EBP scholarly project. It should contain the following elements: · Explain the relationship between research and evidenced- based practice (EBP) · Distinguish how EBP is different from research · Explain the contribution of EBP to professional nursing · Identify your MSN Program Specialty Track and practice focus · Explain how EBP promotes change within your future practice setting 2. Identification of the Nursing Concern to be Improved: This section provides a comprehensive discussion of the selected nursing concern (MY WILL BE ABOUT CAUTI – CATHETER ACQUIRER URINARY TRACT INFECTION). It should contain the following elements: · Explain the selected nursing concern in detail · Identify how frequently the selected concern occurs within your specialty track setting
  • 25. · Identify the stakeholders impacted by the concern · Identify the consequences of the selected concern · Identify your proposed solution to the selected concern · Identify a purpose statement for this EBP proposal 3. PICOT/PICo question and Literature Search Process: This section identifies the PICOT/PICo question that will used for this EBP proposal. The literature search parameters will also be identified. It should contain the following elements: · Identify the question in correct format with all required elements · PICOT for quantitative research approach · PICo for qualitative research approach · Identify how the expected outcome will be useful to your future practice setting · Discuss the purpose of conducting a literature review and the contribution it will provide to this EBP proposal · Identify the steps used to conduct a literature review for this EBP proposal by including: · The specific library databases used · The key search terms and phrases used · The minor (additional) search terms and phrases used · Identify any specialty organization that is relevant to this EBP proposal 4. Theoretical Framework: This section presents the theoretical framework that will used in this EBP project. It should contain the following section: · Explain the theoretical framework to be used in this EBP proposal · Describe how the identified theoretical framework is applied to this EBP proposal Preparing the Assignment Criteria for Format and Special Instructions 1. The paper (excluding the title page and reference page) should be at least 5, but no more than 8 pages. Points will be
  • 26. lost for not meeting these length requirements. 2. Title page, running head, body of paper, and reference page must follow APA guidelines as found in the 6th edition of the manual. This includes the use of headings for each section of the paper except for the introduction where no heading is used. 3. A minimum of 6 (six) appropriate research-based scholarly references must be used. Required textbook for this course, dictionary and Chamberlain College of Nursing lesson information may NOT be used as scholarly references for this assignment. For additional assistance regarding scholarly nursing references, please see “What is a scholarly source” located in the Course Resources tab. Be aware that information from .com websites may be incorrect and should be avoided. References are current - within a 5-year time frame unless a valid rationale is provided and the instructor has approved them prior to submission of the assignment. 4. Ideas and information from scholarly, peer reviewed, nursing sources must be cited and referenced correctly. 5. Rules of grammar, spelling, word usage, and punctuation are followed and consistent with formal, scientific writing.Directions and Assignment Criteria Assignment Criteria Points % Description Overview of Selected Evidenced-based Practice Project 25 17 Required content for this section includes: · Explain the relationship between research and evidenced- based practice (EBP) · Distinguish how EBP is different from research · Explain the contribution of EBP to professional nursing · Identify your MSN Program Specialty Track and practice focus · Explain how EBP promotes change within your future practice
  • 27. setting Identification of the Nursing Concern to be Improved 25 17 Required content for this section includes: · Explain the selected nursing concern in detail · Identify how frequently the selected concern occurs within your specialty track · Identify the stakeholders impacted by the concern · Identify the consequences of the selected concern · Identify your proposed solution to the selected concern · Identify a purpose statement for this EBP proposal PICOT/PICo question and Literature Search Process 20 13 The required content for this section includes: Identify the question in correct format with all required elements: · PICOT for quantitative research approach · PICo for qualitative research approach · Identify how the expected outcome will be useful to your future practice setting · Discuss the purpose of conducting a literature review and the contribution it will provide to this EBP proposal · Identify the steps used to conduct a literature review for this EBP proposal by including: · The specific library databases used · The key search terms and phrases used · The minor (additional) search terms and phrases used · Identify any specialty organization that is relevant to this EBP proposal Theoretical Framework 20
  • 28. 16 The required content for this section includes: · Explain the theoretical framework to be used in this EBP proposal · Describe how the identified theoretical framework is applied to this EBP proposal Paper Specifications 10 8 Paper meets length requirements of 5 to 8 pages. Minimum of 6 (six) appropriate research scholarly nursing references A dictionary, required textbook for this course and Chamberlain College of Nursing lesson information, may NOT be used as scholarly references for this assignment. References are current - within a 5-year time frame unless a valid rationale is provided and the instructor has approved them prior to assignment submission. APA Format (6th edition) 25 17 Title page, running head, body of paper, and reference page must follow APA guidelines as found in the 6th edition of the manual. This includes the use of headings for each section of the paper except for the introduction where no heading is used. One deduction for each type of APA style error Citations in Text 10 7 Ideas and information that come from readings must be cited and referenced correctly. Writing Mechanics 15 10 Rules of grammar, spelling, word usage, and punctuation are followed and consistent with formal written work as found in
  • 29. the 6th edition of the APA manual. Total 150 100 % Chamberlain College of Nursing NR505 Advanced Research Methods: Evidenced Based Practice Chamberlain College of Nursing NR505 Advanced Research Methods: Evidenced Based Practice NR505: W2 Assignment Refinement of Nsg. Concern Rev- 7/31/2017 (AR) NR505: W2 Assignment Refinement of Nsg. Concern Rev- 7/31/2017 (AR), REV 1/10/18 (AR) 1 Grading Rubric Assignment Criteria Exceptional (100%) Outstanding or highest level of performance Exceeds (88%) Very good or high level of performance Meets (80%) Competent or satisfactory level of performance Needs Improvement (38%) Poor or failing level of performance Developing (0) Unsatisfactory level of performance
  • 30. Content Possible Points = 100 Points Overview of Selected Evidenced-based Practice Project 25 Points 22 Points 20 Points 10 Points 0 Points Presentation of information was exceptional and included all of the following elements: · Explain the relationship between research and evidence-based practice (EBP) · Distinguish how EBP is different from research · Explain the contribution of EBP to professional nursing · Identify your MSN Program Specialty Track and practice focus · Explain how EBP promotes change within your future practice setting Presentation of information was good, but was superficial in places and included all of the following elements: · Explain the relationship between research and evidence-based practice (EBP) · Distinguish how EBP is different from research · Explain the contribution of EBP to professional nursing · Identify your MSN Program Specialty Track and practice focus · Explain how EBP promotes change within your future practice setting Presentation of information was minimally demonstrated in the all of the following elements: · Explain the relationship between research and evidence-based practice (EBP)
  • 31. · Distinguish how EBP is different from research · Explain the contribution of EBP to professional nursing · Identify your MSN Program Specialty Track and practice focus · Explain how EBP promotes change within your future practice setting Presentation of information in one or two of the following elements fails to meet expectations: · Explain the relationship between research and evidence-based practice (EBP) · Distinguish how EBP is different from research · Explain the contribution of EBP to professional nursing · Identify your MSN Program Specialty Track and practice focus · Explain how EBP promotes change within your future practice setting Presentation of information is unsatisfactory in three or more of the following elements: · Explain the relationship between research and evidence-based practice (EBP) · Distinguish how EBP is different from research · Explain the contribution of EBP to professional nursing · Identify your MSN Program Specialty Track and practice focus · Explain how EBP promotes change within your future practice setting Identification of the Nursing Concern to be Improved 25 Points 22 Points
  • 32. 20 Points 10 Points 0 Points Presentation of information was exceptional and included all of the following elements: · Explain the selected nursing concern in detail · Identify how frequently the selected concern occurs within your specialty track setting · Identify the stakeholders impacted by the concern · Identify the consequences of the selected concern · Identify your proposed solution to the selected concern · Identify a purpose statement for this EBP proposal Presentation of information was good, but was superficial in places and included all of the following elements: · Explain the selected nursing concern in detail · Identify how frequently the selected concern occurs within your specialty track setting · Identify the stakeholders impacted by the concern · Identify the consequences of the selected concern · Identify your proposed solution to the selected concern · Identify a purpose statement for this EBP proposal Presentation of information was minimally demonstrated in the all of the following elements: · Explain the selected nursing concern in detail · Identify how frequently the selected concern occurs within your specialty track setting · Identify the stakeholders impacted by the concern · Identify the consequences of the selected concern · Identify your proposed solution to the selected concern · Identify a purpose statement for this EBP proposal Presentation of information in one, two or three of the
  • 33. following elements fails to meet expectations: · Explain the selected nursing concern in detail · Identify how frequently the selected concern occurs within your specialty track setting · Identify the stakeholders impacted by the concern · Identify the consequences of the selected concern · Identify your proposed solution to the selected concern · Identify a purpose statement for this EBP proposal Presentation of information is unsatisfactory in four or more of the following elements: · Explain the selected nursing concern in detail · Identify how frequently the selected concern occurs within your specialty track setting · Identify the stakeholders impacted by the concern · Identify the consequences of the selected concern · Identify your proposed solution to the selected concern · Identify a purpose statement for this EBP proposal PICOT/PICo question and Literature Search Process 20 Points 18 Points 16 Points 8 Points 0 Points Presentation of information was exceptional and included all of the following elements: · Identify the question in correct format with all required elements · PICOT for quantitative research approach · PICo for qualitative research approach · Identify how the expected outcome will be useful to your future practice setting
  • 34. · Discuss the purpose of conducting literature review and the contribution it will provide to this EBP proposal · Identify the steps used to conduct a literature review for this EBP proposal by including: · The specific library databases used · The key search terms and phrases used · The minor (additional) search terms and phrases used · Identify any specialty organization that is relevant to this EBP proposal Presentation of information was good, but was superficial in places and included all of the following elements: · Identify the question in correct format with all required elements · PICOT for quantitative research approach · PICo for qualitative research approach · Identify how the expected outcome will be useful to your future practice setting · Discuss the purpose of conducting literature review and the contribution it will provide to this EBP proposal · Identify the steps used to conduct a literature review for this EBP proposal by including: · The specific library databases used · The key search terms and phrases used · The minor (additional) search terms and phrases used · Identify any specialty organization that is relevant to this EBP proposal Presentation of information was minimally demonstrated in the all of the following elements: · Identify the question in correct format with all required elements · PICOT for quantitative research approach · PICo for qualitative research approach · Identify how the expected outcome will be useful to your future practice setting
  • 35. · Discuss the purpose of conducting literature review and the contribution it will provide to this EBP proposal · Identify the steps used to conduct a literature review for this EBP proposal by including: · The specific library databases used · The key search terms and phrases used · The minor (additional) search terms and phrases used · Identify any specialty organization that is relevant to this EBP proposal Presentation of information in one or two of the following elements fails to meet expectations: · Identify the question in correct format with all required elements · PICOT for quantitative research approach · PICo for qualitative research approach · Identify how the expected outcome will be useful to your future practice setting · Discuss the purpose of conducting literature review and the contribution it will provide to this EBP proposal · Identify the steps used to conduct a literature review for this EBP proposal by including: · The specific library databases used · The key search terms and phrases used · The minor (additional) search terms and phrases used · Identify any specialty organization that is relevant to this EBP proposal Presentation of information is unsatisfactory in three or more of the following elements: · Identify the question in correct format with all required elements · PICOT for quantitative research approach · PICo for qualitative research approach
  • 36. · Identify how the expected outcome will be useful to your future practice setting · Discuss the purpose of conducting literature review and the contribution it will provide to this EBP proposal · Identify the steps used to conduct a literature review for this EBP proposal by including: · The specific library databases used · The key search terms and phrases used · The minor (additional) search terms and phrases used · Identify any specialty organization that is relevant to this EBP proposal Theoretical Framework 20 Points 18 Points 16 Points 8 Points 0 Points Presentation of information was exceptional and included all of the following elements: · Explain the theoretical framework to be used in this EBP proposal · Describe how the identified theoretical framework is applies to this EBP proposal Presentation of information was good, but was superficial in places and included all of the following elements: · Explain the theoretical framework to be used in this EBP proposal · Describe how the identified theoretical framework is applies to this EBP proposal Presentation of information was minimally demonstrated in the all of the following elements: · Explain the theoretical framework to be used in this EBP
  • 37. proposal · Describe how the identified theoretical framework is applies to this EBP proposal Presentation of information in one of the following elements fails to meet expectations: · Explain the theoretical framework to be used in this EBP proposal · Describe how the identified theoretical framework is applies to this EBP proposal Presentation of information is unsatisfactory in two of the following: · Explain the theoretical framework to be used in this EBP proposal · Describe how the identified theoretical framework is applies to this EBP proposal Paper Specifications 10 Points 9 Points 8 Points 4 Points 0 Points This section included all of the following: · Paper meet length requirements of 5 to 8 page. · Minimum of 6 (six) scholarly nursing references · Dictionary, required textbook for this course and Chamberlain College of Nursing lesson information, were NOT used as scholarly references. · All references are current - within a 5-year time frame unless a valid rationale was provided and the instructor approved them.
  • 38. This section included three of the following: · Paper meet length requirements of 5 to 8 page. · Minimum of 6 (six) scholarly nursing references · Dictionary, required textbook for this course and Chamberlain College of Nursing lesson information, were NOT used as scholarly references. · All references are current - within a 5-year time frame unless a valid rationale was provided and the instructor approved them. This section included only two of the following: · Paper meet length requirements of 5 to 8 page. · Minimum of 6 (six) scholarly nursing references · Dictionary, required textbook for this course and Chamberlain College of Nursing lesson information, were NOT used as scholarly references. · All references are current - within a 5-year time frame unless a valid rationale was provided and the instructor approved them. This section included only one of the following: · Paper meet length requirements of 5 to 8 page. · Minimum of 6 (six) scholarly nursing references · Dictionary, required textbook for this course and Chamberlain College of Nursing lesson information, were NOT used as scholarly references. · All references are current - within a 5-year time frame unless a valid rationale was provided and the instructor approved them. This section included none of the following: · Paper meet length requirements of 5 to 8 page. · Minimum of 6 (six) scholarly nursing references · Dictionary, required textbook for this course and Chamberlain College of Nursing lesson information, were NOT used as scholarly references. · All references are current - within a 5-year time frame unless a valid rationale was provided and the instructor approved them. Content Subtotal ________of 100 points Format Possible Points = 50 Points
  • 39. APA Style 25 Points 22 Points 20 Points 10 Points 0 Points APA guidelines, as per the 6th edition of the manual, are demonstrated for the · title page, · running head, · body of paper (including margins, headings, font etc), and reference page One deduction for each type of APA format error 0 to 1 APA error was present APA guidelines, as per the 6th edition of the manual, are demonstrated for the · title page, · running head, · body of paper (including margins, headings, font etc), and reference page One deduction for each type of APA format error 2 - 3 APA errors were present APA guidelines, as per the 6th edition of the manual, are demonstrated for the · title page, · running head, · body of paper (including margins, headings, font etc), and reference page One deduction for each type of APA format error 4 – 5 APA errors were are present APA guidelines, as per the 6th edition of the manual, are demonstrated for the
  • 40. · title page, · running head, · body of paper (including margins, headings, font etc), and reference page One deduction for each type of APA format error 6 – 7 APA errors were present APA guidelines, as per the 6th edition of the manual, are demonstrated for the · title page, · running head, body of paper (including margins, headings, font etc), and reference page One deduction for each type of APA format error 8 or greater APA errors were present Citations 10 Points 9 Points 8 Points 4 Points 0 Points There were 0-1 errors in the crediting of ideas, and information that contributed to knowledge There were 2-3 errors in the crediting of ideas, and information that contributed to knowledge There were 4-5 errors in the crediting of ideas, and information that contributed to knowledge There were 6-7 errors in the crediting of ideas, and information that contributed to knowledge
  • 41. There were 8 or greater errors in the crediting of ideas, and information that contributed to knowledge Writing Mechanics 15 Points 13 Points 12 Points 6 Points 0 Points 1–2 errors or exceptions to the rules of grammar, spelling, word usage, punctuation and other aspects of formal written work as found in the 6th edition of the APA manual 3 – 4 errors or exceptions to the rules of grammar, spelling, word usage, punctuation and other aspects of formal written work as found in the 6th edition of the APA manual 5 – 6 errors or exceptions to the rules of grammar, spelling, word usage, punctuation and other aspects of formal written work as found in the 6th edition of the APA manual 7 – 8 errors or exceptions to the rules of grammar, spelling, word usage, punctuation and other aspects of formal written work as found in the 6th edition of the APA manual 9 or greater errors or exceptions to the rules of grammar, spelling, word usage, punctuation and other aspects of formal written work as found in the 6th edition of the APA manual Format Subtotal _____of 50 points Total Points _____of 150 points NR505: W2 Assignment Refinement of Nsg. Concern Rev- 7/31/2017 (AR); Rev 11/20/2017 (AR)
  • 42. 13