Second Cycle Coding
David Lee — TIM 158, Spring 2019
Content drawn from Johnny Saldana’s The Coding Manual for Qualitative Researchers
and Michael Bernstein’s design course.
Deep, rich understanding of individuals
Hypotheses about narrow user segments
Hypotheses about solution concepts
Recall
“essence-capturing and essential elements of the
research story that, when clustered together according
to similarity and regularity - a pattern - facilitate the
development of categories and analysis of their
connections.”
Qualitative coding is about
The Coding Manual for Qualitative Researchers, Johnny Saldana
Recall
DATA → CODES → CATEGORIES → THEMES → THEORY
Recall
The Coding Manual for Qualitative Researchers (2009), Johnny Saldana (p. 12)
First cycle
focused on
who/what
Second cycle
moving from
who/what to
how/why
Recall
The Coding Manual for Qualitative Researchers (2013), Johnny Saldana (p. 189)
Attribute codes
Holistic/structural code
Line-by-line/sentence-
by-sentence codes
Recall
Memo type: networks
Saldana, pg 45
Integrate your codes into a narrative (codeweaving) to interpret how individual
components weave together in hierarchies, chronological flows, influences and affects, etc.
Recall
The Coding Manual for Qualitative Researchers (2009), Johnny Saldana (p. 43)
First and second cycle
coding intermixed with
data collection and
memo writing
Gradual development
from codes to categories
to theory, facilitated by
memo writing
Recall
General process
• End with annotated data, hierarchical coding scheme, codebook, analytic
memos, developed theory
• For us, the “theory” we’re aiming for is a hypothesized model that is:
• grounded in user data and quotes
• a cohesive narrative and logical interpretation
• communicated richly to help the reader in “being there”
• Remember: we are generating not validating hypotheses, so choose
diverse perspectives
Recall
Today
• Second cycle coding methods
• Defining a model: participant profiles, personas,
storyboards, customer journey maps
• Our process for assignment #3
transitioning from managing, focusing, highlighting, filtering
data to generate categories, themes, and theory
Second cycle coding
The Coding Manual for Qualitative Researchers, Johnny Saldana
Recall
Organizing/focusing/interpreting codes
• Pattern/focused coding: create categories from groups of codes
• Can consider emergent patterns or those most central to the analytic question
• Axial coding: flesh out a category with properties & dimensions
• Properties are attributes of a category, dimensions are the location of a property on
a continuum that tells if, when, how, why something happens,
• Theoretical coding: summarize the central/core concern
• If can achieve generalizable/transferable theory, that’s great!
Code mapping
• Start from the full
set of codes and
reorganize into a
list of categories,
and then condense
further into themes
or concepts
Saldana,.
First Cycle CodingContent drawn from Johnny Saldana’s The .docxclydes2
First Cycle Coding
Content drawn from Johnny Saldana’s The Coding Manual for Qualitative Researchers.
David Lee — TIM 158, Spring 2019
Credit: YCombinator : How to Start a Startup
Recall
generating hypotheses
Needfinding is about Recall
Who / What How / WhyHello! Thanks!
Recall
Summary
• Go from what to how and why, why, why
• Develop a model of an individual
• setting, actions → thoughts, feelings → values, motivations
• Then reflect on needs
• also consider: what is top of mind? hacks and workarounds?
Recall
Deep, rich understanding of individuals
Hypotheses about narrow user segments
Hypotheses about solution concepts
Recall
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation 7
Generate Evaluate Generate Evaluate
Recall
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation 8
Questions Prototype Questions Prototype
Recall
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation2018/10/08 9
Recall
Follow-up with a
30-min interview.
We’re still in hypothesis generating mode!
Recall
The next two weeks
• Revisiting unpacking
• Communicating your concept
The prototyping process
Generate questions
!Untested design thesis
!Risky design decisions
!Unobserved user behaviors
Rank questions
Which is most critical?
Build and test a prototype
Answer only the most critical question
Recall
Today
• Overview of Qualitative Analysis and Coding
• First Cycle Coding and Analytic Memos for HW #3
What is qualitative research?
So first…
Qualitative research
• When you’re trying to
• develop a rich understanding of a complex phenomena and the complex
interactions between factors
• communicate a holistic interpretation or narrative that helps readers experience
“being there”
• Ask → Collect → Organize → Analyze → Theory
• In our case: a model of the user segments and their context or experiences in
relation to our product (segment, setting, sequence, satisfaction)
How do you go from qualitative data
to patterns, concepts, and theories?
Unpacking so far…
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation2018/10/01
Recall
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation
KEEP A LIST OF
TENSIONS, CONTRADICTIONS, SURPRISES
say
do
think
feel
2018/10/01
USE TO FIND NEEDS & INSIGHTS
Empathy Map to Help Synthesize
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation
INSIGHTS
I wonder if this means . . .
think
feel
TENSIONS,
CONTRADICTIONS,
SURPRISES
2018/10/08 20
USERS & NEEDS
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation
combine to create a point of view
need insight
2018/10/01 …
SU
RP
ISE
D
TO
D
ISC
OV
ER
...
…
GA
ME
-C
HA
NG
ING
TO
…
user attribs.
WE MET . . .
(extreme user you are inspired by)
WE WERE AMAZED TO REALIZE . . .
(what did you learn that’s new? What is their need?)
IT WOULD BE GA.
This document discusses user stories and their role in software development projects. It begins by outlining the typical process of planning, storytelling, coding, testing, and implementation. It then focuses on composing effective user stories, noting they should be concise written descriptions of functionality valuable to users. The document provides guidelines for writing user stories, including using a role-action-context structure for headings and including just enough detail to estimate, plan and evolve the system.
This document provides an overview of UX design techniques that were covered in a lecture at EPFL in spring 2010. It discusses assumptions about users, collecting initial feedback, UX design concepts including situating users and motivating design concepts. Specific UX techniques covered include personas, scenarios, and storyboards. The lecture was partly based on courses from Forum Nokia and Hogeschool van Amsterdam.
This document provides guidance for students on analyzing print and digital media sources. It begins by outlining the lesson objectives, which are to review mock exam feedback, learn processes and terminology for analyzing print and digital media, apply those concepts to examples, and have students analyze their own examples. The document then reviews feedback from a mock exam, including suggestions to structure responses better and make more specific references. It introduces terminology for analyzing the form of print materials like newspapers and magazines as well as digital media like websites. Examples of a video game advertisement and newspaper front page are then analyzed in detail using the terminology. Students are then instructed to choose a newspaper or website and analyze it using the same structure and terminology.
Structured design: Modular style for modern contentChristopher Hess
The document discusses structured content modeling and its relationship to structured design. It advocates for intentionally recoupling structured content and presentation through content modeling. Content models can enable great design by making content clear, useful, and available. The document provides examples of different topic types like informational concepts, tasks, and stories. It emphasizes finding patterns in content, defining types of content structures, and establishing relationships between content types to share the content model.
Content is the new black. In fact, some people have called it the new interface. Yes, it is a crucial component to any successful design project, but in reality it is the interplay of content and interface design that can make or break an experience. So how do you go about it? Some people design with lorem ipsum. Some people just start writing. Neither of these is quite right. That’s because it’s not about what comes first – design or content – it’s about working together to tell the best story, truly collaborating. Sure, we all love the word collaborative, but it’s not always easy to take two distinct disciplines with very different approaches and mesh them together. In this presentation you’ll learn some successful techniques for integrating content into the research and design process and vice versa, tips on how to avoid common pitfalls and some surefire strategies to end the baton hand off once and for all. We’ll use a recent project as an example of how you too can embrace an inclusive process that yields powerful results.
Design Research (is not Market Research)Joyce Chou
The document discusses the differences between design research and market research. It explains that design research is used to encourage disruptive innovation before creating new products by getting outside assumptions and understanding customer perspectives. The document provides examples of design research methods like interviews, shadowing customers, and analyzing object usage to understand needs. It also discusses synthesizing findings by organizing data into themes, frameworks and personas to guide new product development.
This document discusses how storytelling has evolved with immersive simulations. Simulations allow audiences to interact with and become part of the story. The document provides an overview of topics such as adapting storytelling techniques to simulations, examples of storyboarding, and technology tools for creating immersive simulations. It also discusses best practices for simulation design including scenario, character, and story development as well as tools like Adobe Captivate, Articulate Storyline, and SimWriter for building interactive simulations.
First Cycle CodingContent drawn from Johnny Saldana’s The .docxclydes2
First Cycle Coding
Content drawn from Johnny Saldana’s The Coding Manual for Qualitative Researchers.
David Lee — TIM 158, Spring 2019
Credit: YCombinator : How to Start a Startup
Recall
generating hypotheses
Needfinding is about Recall
Who / What How / WhyHello! Thanks!
Recall
Summary
• Go from what to how and why, why, why
• Develop a model of an individual
• setting, actions → thoughts, feelings → values, motivations
• Then reflect on needs
• also consider: what is top of mind? hacks and workarounds?
Recall
Deep, rich understanding of individuals
Hypotheses about narrow user segments
Hypotheses about solution concepts
Recall
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation 7
Generate Evaluate Generate Evaluate
Recall
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation 8
Questions Prototype Questions Prototype
Recall
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation2018/10/08 9
Recall
Follow-up with a
30-min interview.
We’re still in hypothesis generating mode!
Recall
The next two weeks
• Revisiting unpacking
• Communicating your concept
The prototyping process
Generate questions
!Untested design thesis
!Risky design decisions
!Unobserved user behaviors
Rank questions
Which is most critical?
Build and test a prototype
Answer only the most critical question
Recall
Today
• Overview of Qualitative Analysis and Coding
• First Cycle Coding and Analytic Memos for HW #3
What is qualitative research?
So first…
Qualitative research
• When you’re trying to
• develop a rich understanding of a complex phenomena and the complex
interactions between factors
• communicate a holistic interpretation or narrative that helps readers experience
“being there”
• Ask → Collect → Organize → Analyze → Theory
• In our case: a model of the user segments and their context or experiences in
relation to our product (segment, setting, sequence, satisfaction)
How do you go from qualitative data
to patterns, concepts, and theories?
Unpacking so far…
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation2018/10/01
Recall
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation
KEEP A LIST OF
TENSIONS, CONTRADICTIONS, SURPRISES
say
do
think
feel
2018/10/01
USE TO FIND NEEDS & INSIGHTS
Empathy Map to Help Synthesize
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation
INSIGHTS
I wonder if this means . . .
think
feel
TENSIONS,
CONTRADICTIONS,
SURPRISES
2018/10/08 20
USERS & NEEDS
dt+UX: Design Thinking for User Experience Design, Prototyping & Evaluation
combine to create a point of view
need insight
2018/10/01 …
SU
RP
ISE
D
TO
D
ISC
OV
ER
...
…
GA
ME
-C
HA
NG
ING
TO
…
user attribs.
WE MET . . .
(extreme user you are inspired by)
WE WERE AMAZED TO REALIZE . . .
(what did you learn that’s new? What is their need?)
IT WOULD BE GA.
This document discusses user stories and their role in software development projects. It begins by outlining the typical process of planning, storytelling, coding, testing, and implementation. It then focuses on composing effective user stories, noting they should be concise written descriptions of functionality valuable to users. The document provides guidelines for writing user stories, including using a role-action-context structure for headings and including just enough detail to estimate, plan and evolve the system.
This document provides an overview of UX design techniques that were covered in a lecture at EPFL in spring 2010. It discusses assumptions about users, collecting initial feedback, UX design concepts including situating users and motivating design concepts. Specific UX techniques covered include personas, scenarios, and storyboards. The lecture was partly based on courses from Forum Nokia and Hogeschool van Amsterdam.
This document provides guidance for students on analyzing print and digital media sources. It begins by outlining the lesson objectives, which are to review mock exam feedback, learn processes and terminology for analyzing print and digital media, apply those concepts to examples, and have students analyze their own examples. The document then reviews feedback from a mock exam, including suggestions to structure responses better and make more specific references. It introduces terminology for analyzing the form of print materials like newspapers and magazines as well as digital media like websites. Examples of a video game advertisement and newspaper front page are then analyzed in detail using the terminology. Students are then instructed to choose a newspaper or website and analyze it using the same structure and terminology.
Structured design: Modular style for modern contentChristopher Hess
The document discusses structured content modeling and its relationship to structured design. It advocates for intentionally recoupling structured content and presentation through content modeling. Content models can enable great design by making content clear, useful, and available. The document provides examples of different topic types like informational concepts, tasks, and stories. It emphasizes finding patterns in content, defining types of content structures, and establishing relationships between content types to share the content model.
Content is the new black. In fact, some people have called it the new interface. Yes, it is a crucial component to any successful design project, but in reality it is the interplay of content and interface design that can make or break an experience. So how do you go about it? Some people design with lorem ipsum. Some people just start writing. Neither of these is quite right. That’s because it’s not about what comes first – design or content – it’s about working together to tell the best story, truly collaborating. Sure, we all love the word collaborative, but it’s not always easy to take two distinct disciplines with very different approaches and mesh them together. In this presentation you’ll learn some successful techniques for integrating content into the research and design process and vice versa, tips on how to avoid common pitfalls and some surefire strategies to end the baton hand off once and for all. We’ll use a recent project as an example of how you too can embrace an inclusive process that yields powerful results.
Design Research (is not Market Research)Joyce Chou
The document discusses the differences between design research and market research. It explains that design research is used to encourage disruptive innovation before creating new products by getting outside assumptions and understanding customer perspectives. The document provides examples of design research methods like interviews, shadowing customers, and analyzing object usage to understand needs. It also discusses synthesizing findings by organizing data into themes, frameworks and personas to guide new product development.
This document discusses how storytelling has evolved with immersive simulations. Simulations allow audiences to interact with and become part of the story. The document provides an overview of topics such as adapting storytelling techniques to simulations, examples of storyboarding, and technology tools for creating immersive simulations. It also discusses best practices for simulation design including scenario, character, and story development as well as tools like Adobe Captivate, Articulate Storyline, and SimWriter for building interactive simulations.
A revision book to help students embed their understanding of the key theoretical perspectives for A2 Media Studies, including the new topic 'Identities & the Media'.
This document provides an overview of various "fluencies" taught at Riverside: digital citizenship, information fluency, media fluency, solution fluency, and creative fluency. Each fluency is broken down into stages that students go through. For example, information fluency involves the stages of asking questions, acquiring information from various sources, analyzing and filtering the information, applying it to solve problems, and assessing the process. The document defines each stage and provides keywords and skills developed for each one. The overall summary is that the document outlines different fluencies and their step-by-step processes taught to students at Riverside.
The document provides guidance on analyzing two media texts for a textual analysis exam question. It explains that the texts will be provided and can be any type of media such as advertisements, magazine covers, or web pages. Students will be asked to analyze specific codes from the texts, including visual codes, written codes, layout and design, genre, and mode of address. It then provides detailed descriptions of what to look for when analyzing each of these codes, such as camera shots, lighting, characters, and iconography. The goal is to analyze the codes and consider what meanings they convey in the texts.
The document provides tips for developing winning federal proposals. It emphasizes focusing on the customer's needs, customizing the proposal to the specific opportunity, and using a consistent and concise writing style. Key recommendations include putting the customer first, demonstrating a commitment to jointly achieving objectives, tailoring the solution and language to the requester, using compelling and creative elements like graphics and examples, and ensuring technical and political correctness.
Slides talk about importance & guidelines of sketching and story boarding. It discusses two approaches about "getting the design right" or getting the right design". Steps and Do's/Dont's of storyboarding
The document provides an overview of a content modeling workshop being conducted by Cleve Gibbon and Kate Kenyon. It includes:
- Introductions and backgrounds of the presenters
- An agenda for covering content modeling, defining a model, approaching personalization, and using models for personalization
- Explanations of what content modeling is, why do it, and the benefits it provides like a shared language and better content management
- Details on defining content types and relationships within a model
- Examples of applying a model to Netflix content and personalizing experiences based on user data
The document discusses the elements of context, spine, and structure that are necessary for effective design storytelling. It defines context as the theme, mood, and audience. The spine includes the plot, climaxes, and characters. Structure refers to the through-line, patterns, and infrastructure. Each element is described in detail and design tips are provided. The document emphasizes that covering all these elements leads to a compelling, engaging experience for the user.
This chapter discusses conceptualizing interaction design. It emphasizes the importance of conceptualizing design early in the process to scrutinize assumptions and determine feasibility. Conceptual models provide a framework for general concepts and their relationships. Different interaction types include instructing, conversing, manipulating, exploring, and responding. Choosing the right interaction type depends on the task. Interface metaphors can help users understand new systems but also have limitations. Other conceptual sources discussed include paradigms, visions, theories, models, and frameworks.
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
This comprehensive presentation with over 320+ slides covers 36 commonly used Design Thinking frameworks, mindsets and methods for Customer Experience innovation and redesign.
A detailed summary is provided for each design framework. The frameworks in this deck span across the inspiration, ideation and implementation phases of Design Thinking.
INCLUDED FRAMEWORKS & METHODOLOGIES:
1. Design Thinking
2. Assume a Beginner's Mindset
3. Persona
4. Empathy Map
5. Interviews
6. Extreme Users
7. Point Of View
8. "How Might We" Questions
9. Design Brief
10. Stakeholder Map
11. Customer Journey Map
12. Context Map
13. Opportunity Map
14. Brainstorming
15. SCAMPER
16. Affinity Diagram
17. Ideas Evaluation Matrix
18. Prioritization Map
19. Prototypes
20. Rapid Prototyping
21. Storyboard
22. Storytelling
23. Role Play
24. 2x2 Matrix
25. Ways to Grow Framework
26. Feedback Capture Grid
27. 70-20-10 Rule
28. Kano Model
29. Customer Profile
30. Value Proposition Map
31. Value Proposition Canvas
32. Business Model Canvas
33. The Golden Circle
34. Five Whys Analysis
35. ADKAR® Model for Individual Change
36. Kotter's Change Management Model
These frameworks and templates are used in many design firms. With this comprehensive document in your back pocket, you can find a way to address just about any problem or design challenge that can arise in your organization.
The level of detail varies by framework, depending on the nature of the model. Examples and templates are provided.
SocialSnack is a social media marketing agency that operates in Latin America. It believes in connecting people through great storytelling on social media. The document outlines SocialSnack's methodology, which involves researching consumer and culture, defining customer clusters, creating a channel plan and strategy, implementing campaigns, and continuously optimizing based on measurement and learnings. It also discusses topics like customer acquisition, lead nurturing, and the customer lifecycle.
Adaptive Content equals Architecture plus Process minus Reality [Noz Urbina, ...Noz Urbina
Adaptive content is one of the most powerful and critical concepts of this decade. It is an attempt to address a never-before-seen diversity of content contexts and platforms, as well as sky-high user expectations. We are in an age where our smartphones are already starting to bore us. What were head-spinning miracles of science and technology less than three years ago “lack innovation” today. With customers assimilating new technologies into their lives and resetting expectations at this speed, the pressure to provide innovative, differentiating and strategically significant content experience is higher than ever. New platforms and interface paradigms are just around the corner. Adaptive content promises to help us address these challenges, but it still takes organisations years to adapt themselves. Noz Urbina focuses on how content architecture and process need to be altered for adaptive content, and what to do when reality sets in.
This document discusses the importance of design research and strategy. It provides examples of guerrilla design research techniques people can use without large budgets. These include observing analogous environments to understand user behaviors, roles, and relationships. The document recommends identifying patterns in the data and translating observations into insights that guide product development. It then gives an example of how to apply these techniques by observing a skate park to develop an understanding of how skills are taught, mentored, and developed among users that could inform the design of a mobile social networking app.
This document summarizes a presentation about changing leadership strategies for libraries. It discusses four main issues facing libraries: 1) whether users are finding needed resources successfully, 2) if libraries are organized for the 21st century, 3) if libraries are effectively engaging their communities, and 4) if libraries are using numbers strategically. It then provides more details on each issue and recommends strategies libraries can take to address the issues, such as differentiating themselves from Google, understanding user workflows, investing in persona development, and adopting agile project management practices.
This slide deck covers why primary market research (aka customer development, customer research or customer empathy) is important and necessary, outlines how to organize a successful research program, provides a sampling of common qualitative and quantitative primary market research techniques, and provides an FAQ section on common questions.
This document provides guidance and questions for a student to develop their A2 Media coursework answering evaluation questions about their animation project. It includes:
1) Suggestions to take screenshots of their animation and compare them to conventions from film trailers.
2) Prompts to illustrate links between their animation and a draft magazine cover, using screenshots.
3) Ways their animation could be shared with audiences for comments, like in the classroom, online, or via questionnaires.
4) Questions about what they learned about the digital technologies used and any limitations.
It also provides example blog links and homework to continue developing their work.
RedSwan5 Digital Workshop for Marketing TeamsKim Donlan
If you aren't marketing from the customer's perspective, you are not doing as well as you could be. To help, we are sharing the core of our digital workshop for B2B marketing teams who need to creating a richer user and brand experience. This is for brands that have most of the pieces but perhaps in the wrong sequence, place or media type. This workshop is customized for clients who need to transition to a richer brand experience and stronger digital strategy. Contact Kim Donlan Kdonlan@RedSwan5.com
"A scenario is a description of a person’s interaction with a system.
Scenarios help focus design efforts on the user’s requirements, which are distinct from technical or business requirements.
Scenarios may be related to ‘use cases’, which describe interactions at a technical level. Unlike use cases, however, scenarios can be understood by people who do not have any technical background. They are therefore suitable for use during participatory design activities." http://infodesign.com.au/usabilityresources/scenarios/
TownerPage 213015Page 1 of 2Project 1 A.docxedwardmarivel
Towner
Page 2
1/30/15
Page 1 of 2
Project 1: An Analysis of Argument’s Context
In his introduction of his second chapter “The Contexts of Argument,” Miller asserts:
Whenever we engage in argumentation, we must do more than examine the topic carefully and construct a sound argument in support of our position. We must also take into account our audience, the specific situation we and they are in, the cultural factors that might affect how an audience responds to a particular argument, and even the historical moment we are in as we argue. In short we always argue within a context—actually, within several contexts simultaneously—and we must consider context if we expect to argue effectively. (17)
Your writing task:
In a roughly 3 to 4 page paper, please briefly describe an argument you took part in or witnessed. As you describe the argument, also analyze how the Rhetorical Situation and Context may have affected the way speakers responded to each other, the types of words or speaking style, and affected the types of evidence the speakers used to persuade each other.
The argument you describe could be:Part of a job interview (where you argued you were best for the job)
An argument with a friend (or foe) about a the causes of something or even where, when, or whether to go somewhere or do something
An argument made in a presentation for school or work project, a report, essay, or speech. Or you may describe an argument you saw in a movie or TV show. Check with me about your choice.
Begin simply, setting up your paper with two or three sentences, making your intention to describe and analyze this argument clear. And describe the basic rhetorical situation (audience, speaker, topic) and the surrounding circumstances of the context: the place, time, setting, and etc.
Next, get into a simple but careful description of the argument, analyzing as you go. Describe and Explain: Rhetorical Situation:
Audience: Describe the audience. and how might that have shaped shape the argument? What was the relationship between you and your audience? Did the audience see you as an opponent, friend, peer, or expert? Expert? Novice? Friend? Foe? Relative? How long had you known the readers/listeners? What aspects of the audience may have affected your argument (language, evidence, tone): Cultural, Age, Status—class, money, education, disability, rank—Gender, Sexual Orientation, Race/Ethnicity? Setting: Where did this take placeSpeaker or Writer: Did you have to change your appearance, to persuade? How was the argument presented: written, spoken? Did you have to follow a format for the speech or document. or, the style (formal, informal, professional, casual, etc.)? Topic: What was the topic? How did the topic affect the argument?Purpose/Goal? What kind of argument did you make: to assert an opinion? To win over a listener? To define or identify the meaning of an event, term or concept? Or perhaps the argument was to evaluate options, ...
This document provides revision guidance for Section A of an A2 Media Studies exam. Section A focuses on evaluating a student's coursework productions through a theoretical lens. For question 1(a), students discuss the development of their skills such as digital technology use, creativity, research/planning, and post-production from AS to A2 level. For question 1(b), students analyze one of their coursework pieces using concepts like narrative, audience, genre, representation, or media language. The document provides sample questions and theories to help students structure their exam responses.
Sebika Darnal Devarani ArumugamENGL-1302-51008 Mar -03- 2020.docxrtodd280
Sebika Darnal
Devarani Arumugam
ENGL-1302-51008
Mar -03- 2020
Professor Deva Arumugam
Thesis
People from different religions should be allowed to marry because it is beneficial.
People from different religions should allow to marry because it allows people to explore different religious culture and behavior.
Even though some group of people and countries do not accept inter-religious marriage, people should allow to explore different religions because it is beneficial to create respect, love, care, and peace between two different religious people.
Sebika Darnal
Devarani Arumugam
ENGL-1302-51008
Feb-11-2020
Topic proposal: Inter religious marriage
My topic is going to be about Inter religious marriage. The reason why I pick these topic because I have seen in many country where couples get married with different religion and face many obstacles. Many times situation get so difficult were people are force to get kicked out from their country, church ,home and many more. In my research paper I want to talk about why people are forced to get kicked out and why cannot family accept inter religious marriage. an inter religious marriage couples attempt tons of circumstances. “According to Article 16 of the Universal Declaration of Human Rights, men and women who have attained the age of majority have the right to marry "without any limitation due to race, nationality or religion". Even though we have right to pick whoever we want to marry still, religion have become big issue because the way how our parent raise us. I also want to acknowledge that religion does not define our humanism. We should all learned to respects every religion.
The inter religious marriage contribute to me and my community because religious difference can bring unexpected conflict in our married life. In other hand communities does not always accept inter religious marriage because of their traditional and their belief. Different religion have different belief and everyone must follow their own belief. Community people always consider about their people and whom should women get married because inter religious will surface many struggles and how children will grow up into. If couples have different religion and whom should children follow, every community and parent have desire that children must raise by their parent religion.. Parents and community have passed down cultural and tradition for generations. Therefore they want their children to hold the generations for next generation. Parent don’t usually accept inter religious marriage because of their belief. They normally force their children to feel as they must choose between their boyfriends or girlfriend nor parents. If they go against and get inter religious marriage they are forced to get kicked out and have no relationship with parents. Last but not least every one have their right to choose.
This topic is very important to me because I want each of us to know that .
The document provides instructions for a classroom activity where students will construct dichotomous keys to classify 10 primate species. It outlines the 7 steps of the activity which include: 1) explaining what a dichotomous key is; 2) providing a primate list; 3) dividing students into groups to construct keys; 4) having students research primates; 5) providing a sample first couplet; 6) reminding students to explain each statement; and 7) having groups present their keys. Sample dichotomous keys and primate information are also provided.
More Related Content
Similar to Second Cycle CodingDavid Lee — TIM 158, Spring 2019Conte.docx
A revision book to help students embed their understanding of the key theoretical perspectives for A2 Media Studies, including the new topic 'Identities & the Media'.
This document provides an overview of various "fluencies" taught at Riverside: digital citizenship, information fluency, media fluency, solution fluency, and creative fluency. Each fluency is broken down into stages that students go through. For example, information fluency involves the stages of asking questions, acquiring information from various sources, analyzing and filtering the information, applying it to solve problems, and assessing the process. The document defines each stage and provides keywords and skills developed for each one. The overall summary is that the document outlines different fluencies and their step-by-step processes taught to students at Riverside.
The document provides guidance on analyzing two media texts for a textual analysis exam question. It explains that the texts will be provided and can be any type of media such as advertisements, magazine covers, or web pages. Students will be asked to analyze specific codes from the texts, including visual codes, written codes, layout and design, genre, and mode of address. It then provides detailed descriptions of what to look for when analyzing each of these codes, such as camera shots, lighting, characters, and iconography. The goal is to analyze the codes and consider what meanings they convey in the texts.
The document provides tips for developing winning federal proposals. It emphasizes focusing on the customer's needs, customizing the proposal to the specific opportunity, and using a consistent and concise writing style. Key recommendations include putting the customer first, demonstrating a commitment to jointly achieving objectives, tailoring the solution and language to the requester, using compelling and creative elements like graphics and examples, and ensuring technical and political correctness.
Slides talk about importance & guidelines of sketching and story boarding. It discusses two approaches about "getting the design right" or getting the right design". Steps and Do's/Dont's of storyboarding
The document provides an overview of a content modeling workshop being conducted by Cleve Gibbon and Kate Kenyon. It includes:
- Introductions and backgrounds of the presenters
- An agenda for covering content modeling, defining a model, approaching personalization, and using models for personalization
- Explanations of what content modeling is, why do it, and the benefits it provides like a shared language and better content management
- Details on defining content types and relationships within a model
- Examples of applying a model to Netflix content and personalizing experiences based on user data
The document discusses the elements of context, spine, and structure that are necessary for effective design storytelling. It defines context as the theme, mood, and audience. The spine includes the plot, climaxes, and characters. Structure refers to the through-line, patterns, and infrastructure. Each element is described in detail and design tips are provided. The document emphasizes that covering all these elements leads to a compelling, engaging experience for the user.
This chapter discusses conceptualizing interaction design. It emphasizes the importance of conceptualizing design early in the process to scrutinize assumptions and determine feasibility. Conceptual models provide a framework for general concepts and their relationships. Different interaction types include instructing, conversing, manipulating, exploring, and responding. Choosing the right interaction type depends on the task. Interface metaphors can help users understand new systems but also have limitations. Other conceptual sources discussed include paradigms, visions, theories, models, and frameworks.
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
This comprehensive presentation with over 320+ slides covers 36 commonly used Design Thinking frameworks, mindsets and methods for Customer Experience innovation and redesign.
A detailed summary is provided for each design framework. The frameworks in this deck span across the inspiration, ideation and implementation phases of Design Thinking.
INCLUDED FRAMEWORKS & METHODOLOGIES:
1. Design Thinking
2. Assume a Beginner's Mindset
3. Persona
4. Empathy Map
5. Interviews
6. Extreme Users
7. Point Of View
8. "How Might We" Questions
9. Design Brief
10. Stakeholder Map
11. Customer Journey Map
12. Context Map
13. Opportunity Map
14. Brainstorming
15. SCAMPER
16. Affinity Diagram
17. Ideas Evaluation Matrix
18. Prioritization Map
19. Prototypes
20. Rapid Prototyping
21. Storyboard
22. Storytelling
23. Role Play
24. 2x2 Matrix
25. Ways to Grow Framework
26. Feedback Capture Grid
27. 70-20-10 Rule
28. Kano Model
29. Customer Profile
30. Value Proposition Map
31. Value Proposition Canvas
32. Business Model Canvas
33. The Golden Circle
34. Five Whys Analysis
35. ADKAR® Model for Individual Change
36. Kotter's Change Management Model
These frameworks and templates are used in many design firms. With this comprehensive document in your back pocket, you can find a way to address just about any problem or design challenge that can arise in your organization.
The level of detail varies by framework, depending on the nature of the model. Examples and templates are provided.
SocialSnack is a social media marketing agency that operates in Latin America. It believes in connecting people through great storytelling on social media. The document outlines SocialSnack's methodology, which involves researching consumer and culture, defining customer clusters, creating a channel plan and strategy, implementing campaigns, and continuously optimizing based on measurement and learnings. It also discusses topics like customer acquisition, lead nurturing, and the customer lifecycle.
Adaptive Content equals Architecture plus Process minus Reality [Noz Urbina, ...Noz Urbina
Adaptive content is one of the most powerful and critical concepts of this decade. It is an attempt to address a never-before-seen diversity of content contexts and platforms, as well as sky-high user expectations. We are in an age where our smartphones are already starting to bore us. What were head-spinning miracles of science and technology less than three years ago “lack innovation” today. With customers assimilating new technologies into their lives and resetting expectations at this speed, the pressure to provide innovative, differentiating and strategically significant content experience is higher than ever. New platforms and interface paradigms are just around the corner. Adaptive content promises to help us address these challenges, but it still takes organisations years to adapt themselves. Noz Urbina focuses on how content architecture and process need to be altered for adaptive content, and what to do when reality sets in.
This document discusses the importance of design research and strategy. It provides examples of guerrilla design research techniques people can use without large budgets. These include observing analogous environments to understand user behaviors, roles, and relationships. The document recommends identifying patterns in the data and translating observations into insights that guide product development. It then gives an example of how to apply these techniques by observing a skate park to develop an understanding of how skills are taught, mentored, and developed among users that could inform the design of a mobile social networking app.
This document summarizes a presentation about changing leadership strategies for libraries. It discusses four main issues facing libraries: 1) whether users are finding needed resources successfully, 2) if libraries are organized for the 21st century, 3) if libraries are effectively engaging their communities, and 4) if libraries are using numbers strategically. It then provides more details on each issue and recommends strategies libraries can take to address the issues, such as differentiating themselves from Google, understanding user workflows, investing in persona development, and adopting agile project management practices.
This slide deck covers why primary market research (aka customer development, customer research or customer empathy) is important and necessary, outlines how to organize a successful research program, provides a sampling of common qualitative and quantitative primary market research techniques, and provides an FAQ section on common questions.
This document provides guidance and questions for a student to develop their A2 Media coursework answering evaluation questions about their animation project. It includes:
1) Suggestions to take screenshots of their animation and compare them to conventions from film trailers.
2) Prompts to illustrate links between their animation and a draft magazine cover, using screenshots.
3) Ways their animation could be shared with audiences for comments, like in the classroom, online, or via questionnaires.
4) Questions about what they learned about the digital technologies used and any limitations.
It also provides example blog links and homework to continue developing their work.
RedSwan5 Digital Workshop for Marketing TeamsKim Donlan
If you aren't marketing from the customer's perspective, you are not doing as well as you could be. To help, we are sharing the core of our digital workshop for B2B marketing teams who need to creating a richer user and brand experience. This is for brands that have most of the pieces but perhaps in the wrong sequence, place or media type. This workshop is customized for clients who need to transition to a richer brand experience and stronger digital strategy. Contact Kim Donlan Kdonlan@RedSwan5.com
"A scenario is a description of a person’s interaction with a system.
Scenarios help focus design efforts on the user’s requirements, which are distinct from technical or business requirements.
Scenarios may be related to ‘use cases’, which describe interactions at a technical level. Unlike use cases, however, scenarios can be understood by people who do not have any technical background. They are therefore suitable for use during participatory design activities." http://infodesign.com.au/usabilityresources/scenarios/
TownerPage 213015Page 1 of 2Project 1 A.docxedwardmarivel
Towner
Page 2
1/30/15
Page 1 of 2
Project 1: An Analysis of Argument’s Context
In his introduction of his second chapter “The Contexts of Argument,” Miller asserts:
Whenever we engage in argumentation, we must do more than examine the topic carefully and construct a sound argument in support of our position. We must also take into account our audience, the specific situation we and they are in, the cultural factors that might affect how an audience responds to a particular argument, and even the historical moment we are in as we argue. In short we always argue within a context—actually, within several contexts simultaneously—and we must consider context if we expect to argue effectively. (17)
Your writing task:
In a roughly 3 to 4 page paper, please briefly describe an argument you took part in or witnessed. As you describe the argument, also analyze how the Rhetorical Situation and Context may have affected the way speakers responded to each other, the types of words or speaking style, and affected the types of evidence the speakers used to persuade each other.
The argument you describe could be:Part of a job interview (where you argued you were best for the job)
An argument with a friend (or foe) about a the causes of something or even where, when, or whether to go somewhere or do something
An argument made in a presentation for school or work project, a report, essay, or speech. Or you may describe an argument you saw in a movie or TV show. Check with me about your choice.
Begin simply, setting up your paper with two or three sentences, making your intention to describe and analyze this argument clear. And describe the basic rhetorical situation (audience, speaker, topic) and the surrounding circumstances of the context: the place, time, setting, and etc.
Next, get into a simple but careful description of the argument, analyzing as you go. Describe and Explain: Rhetorical Situation:
Audience: Describe the audience. and how might that have shaped shape the argument? What was the relationship between you and your audience? Did the audience see you as an opponent, friend, peer, or expert? Expert? Novice? Friend? Foe? Relative? How long had you known the readers/listeners? What aspects of the audience may have affected your argument (language, evidence, tone): Cultural, Age, Status—class, money, education, disability, rank—Gender, Sexual Orientation, Race/Ethnicity? Setting: Where did this take placeSpeaker or Writer: Did you have to change your appearance, to persuade? How was the argument presented: written, spoken? Did you have to follow a format for the speech or document. or, the style (formal, informal, professional, casual, etc.)? Topic: What was the topic? How did the topic affect the argument?Purpose/Goal? What kind of argument did you make: to assert an opinion? To win over a listener? To define or identify the meaning of an event, term or concept? Or perhaps the argument was to evaluate options, ...
This document provides revision guidance for Section A of an A2 Media Studies exam. Section A focuses on evaluating a student's coursework productions through a theoretical lens. For question 1(a), students discuss the development of their skills such as digital technology use, creativity, research/planning, and post-production from AS to A2 level. For question 1(b), students analyze one of their coursework pieces using concepts like narrative, audience, genre, representation, or media language. The document provides sample questions and theories to help students structure their exam responses.
Similar to Second Cycle CodingDavid Lee — TIM 158, Spring 2019Conte.docx (20)
Sebika Darnal Devarani ArumugamENGL-1302-51008 Mar -03- 2020.docxrtodd280
Sebika Darnal
Devarani Arumugam
ENGL-1302-51008
Mar -03- 2020
Professor Deva Arumugam
Thesis
People from different religions should be allowed to marry because it is beneficial.
People from different religions should allow to marry because it allows people to explore different religious culture and behavior.
Even though some group of people and countries do not accept inter-religious marriage, people should allow to explore different religions because it is beneficial to create respect, love, care, and peace between two different religious people.
Sebika Darnal
Devarani Arumugam
ENGL-1302-51008
Feb-11-2020
Topic proposal: Inter religious marriage
My topic is going to be about Inter religious marriage. The reason why I pick these topic because I have seen in many country where couples get married with different religion and face many obstacles. Many times situation get so difficult were people are force to get kicked out from their country, church ,home and many more. In my research paper I want to talk about why people are forced to get kicked out and why cannot family accept inter religious marriage. an inter religious marriage couples attempt tons of circumstances. “According to Article 16 of the Universal Declaration of Human Rights, men and women who have attained the age of majority have the right to marry "without any limitation due to race, nationality or religion". Even though we have right to pick whoever we want to marry still, religion have become big issue because the way how our parent raise us. I also want to acknowledge that religion does not define our humanism. We should all learned to respects every religion.
The inter religious marriage contribute to me and my community because religious difference can bring unexpected conflict in our married life. In other hand communities does not always accept inter religious marriage because of their traditional and their belief. Different religion have different belief and everyone must follow their own belief. Community people always consider about their people and whom should women get married because inter religious will surface many struggles and how children will grow up into. If couples have different religion and whom should children follow, every community and parent have desire that children must raise by their parent religion.. Parents and community have passed down cultural and tradition for generations. Therefore they want their children to hold the generations for next generation. Parent don’t usually accept inter religious marriage because of their belief. They normally force their children to feel as they must choose between their boyfriends or girlfriend nor parents. If they go against and get inter religious marriage they are forced to get kicked out and have no relationship with parents. Last but not least every one have their right to choose.
This topic is very important to me because I want each of us to know that .
The document provides instructions for a classroom activity where students will construct dichotomous keys to classify 10 primate species. It outlines the 7 steps of the activity which include: 1) explaining what a dichotomous key is; 2) providing a primate list; 3) dividing students into groups to construct keys; 4) having students research primates; 5) providing a sample first couplet; 6) reminding students to explain each statement; and 7) having groups present their keys. Sample dichotomous keys and primate information are also provided.
Seattle Take Home Final Exam h There are Four Different Versio.docxrtodd280
This document provides instructions for a take-home exam with four parts. It includes questions about analyzing Airbnb listing data from Seattle using Excel and mapping tools. Part I involves creating frequency tables and histograms from the Excel data, calculating percentages and locations. Part II has students make a map of listing locations using Copypastemap. Part III asks students to tell a story by creating maps in Social Explorer about areas suitable for new Airbnb hosts. Part IV covers standard deviation, outliers, and miscellaneous questions. Students are warned against cheating and collaboration is prohibited despite it being a take-home exam.
Seba Alwayel517 Catawba circle Columbia, SC 29201 · 8032372950.docxrtodd280
Seba Alwayel
517 Catawba circle Columbia, SC 29201 · 8032372950
Sebaalwayel.gmail.com · personal summary
Organized registration information, product warranties, end user agreements, program user codes, and other data essential to effective software acquisitions, resource distribution, and asset utilization.
Keeping to inform future software acquisitions, resource distribution, and asset utilization. Trusted IT team member articulated technology forecasts to company directors.
Experience01-01-2014 to 11-12-2014
STC company in Dammam, Saudi Arabia
-translator
- answerd customar quations related to proudacts, servises or their specific account.
- translate conversations from English to Arbic.
Education
Bachler’s degree in Information technology “IT” major
University of south Carolina.
Graduation date” 09-05-2020
Skills
Speak two languages.
Good communication skills.
Good at persuasion.
Good leader.
Good in bargaining.
Nice behaviors.
2
O R I G I N A L P A P E R
A Transitional Living Program for Homeless
Adolescents: A Case Study
Elissa D. Giffords Æ Christina Alonso Æ Richard Bell
Published online: 7 July 2007
� Springer Science+Business Media, LLC 2007
Abstract Under the Runaway, Homeless, and Missing Children Protection Act in (P.L.
108-96), Congress authorized the Transitional Living Program for Older Homeless Youth
(TLP). TLP provides grants to community and faith-based non-profit and public organi-
zations for longer-term residential supports (up to 18 months) to youth ages 16–21 in order
to promote their successful transition to adulthood and self-sufficiency (National Network
for Youth, Issue brief: Runaway and homeless youth act reauthorization [Available online
at http://www.nn4youth.org/site/DocServer/NNYandVOAFinalUpdate.pdf?docID=304],
2007). This article describes a transitional living program in Long Island, New York
designed to enable youth in a residential setting (ages 16–21) to develop and internalize
independent living skills through the provision of shelter and support services which
prepare them for living independently in the community.
Keywords Independent living � Foster care � Self-sufficiency � Adolescent youth �
Homeless � Runaway
E. D. Giffords (&)
Social Work Department, Long Island University, CW Post Campus, Northern Blvd, Brookville, NY
11548, USA
e-mail: [email protected]
C. Alonso � R. Bell
Family and Children’s Association, 100 East Old Country Road, Mineola, NY 11501, USA
C. Alonso
e-mail: [email protected]
R. Bell
e-mail: RBel[email protected]
123
Child Youth Care Forum (2007) 36:141–151
DOI 10.1007/s10566-007-9036-0
Introduction
In the 1980s the number of Independent living programs to assist formerly homeless
adolescents and foster youth to develop the skills they need to sustain themselves in the
community increased significantly nationwide (for, e.g., see Brickman et al. 1991; Kroner
1988; Lindsey and Ahmed 1999). Many of these programs received their funding from.
Searching for the Wrong-Eyed Jesus, clip 1, Due Saturday, February .docxrtodd280
Searching for the Wrong-Eyed Jesus, clip 1, Due: Saturday, February 15, 2014, ReOpened and now Due: Sunday, Feb. 23, 2014, 11:55p.m.
Searching for the Wrong-Eyed Jesus, clip 1 (5:00)
In their stories, how do these prisoners explain their criminal behavior? Would the prisoners be more likely to agree with the functionalist, conflict, control, or interactionist theories of crime?
How would labeling theory and differential association theory explain the criminal behaviors of the men in the video?
Most prisoners will be released back into the community in a few years. How will being ex-convicts affect these men’s lives? How will their race affect that experience?
.
Searching Databases (APA 7 format and at least 3-4 references)Wh.docxrtodd280
Searching Databases (APA 7 format and at least 3-4 references)
When you decide to purchase a new car, you first decide what is important to you. If mileage and dependability are the important factors, you will search for data focused more on these factors and less on color options and sound systems.
The same holds true when searching for research evidence to guide your clinical inquiry and professional decisions. Developing a formula for an answerable, researchable question that addresses your need will make the search process much more effective. One such formula is the PICO(T) format.
In this Discussion, you will transform a clinical inquiry into a searchable question in PICO(T) format, so you can search the electronic databases more effectively and efficiently. You will share this PICO(T) question and examine strategies you might use to increase the rigor and effectiveness of a database search on your PICO(T) question.
To Prepare:
Review the Resources and identify a clinical issue of interest that can form the basis of a clinical inquiry.
Review the materials offering guidance on using databases, performing keyword searches, and developing PICO(T) questions provided in the Resources.
Based on the clinical issue of interest and using keywords related to the clinical issue of interest, search at least two different databases in the Walden Library to identify at least four relevant peer-reviewed articles related to your clinical issue of interest. You should not be using systematic reviews for this assignment, select original research articles.
Review the Resources for guidance and develop a PICO(T) question of interest to you for further study. It is suggested that an Intervention-type PICOT question be developed as these seem to work best for this course.
By Day 3 of Week 4
Post a brief description of your clinical issue of interest. This clinical issue will remain the same for the entire course and will be the basis for the development of your PICOT question. Then, post your PICO(T) question, the search terms used, and the names of at least two databases used for your PICO(T) question. Describe your search results in terms of the number of articles returned on original research and how this changed as you added search terms using your Boolean operators. Finally, explain strategies you might make to increase the rigor and effectiveness of a database search on your PICO(T) question. Be specific and provide examples.
By Day 6 of Week 4
Respond
to at least
two
of your colleagues
on two different days
and provide further suggestions on how their database search might be improved.
Mike RE: Discussion - Week 4/Initial (at least 2-3 references and APA 7 format)
Given the diverse nature of the health care industry, the ubiquitous array of multi faceted axillary services, the sector we service the most sometimes becomes the focus of our interest given the opportunity and longevity in such an institution. For the purpose of .
Searching for help with this For this two-part assessment,.docxrtodd280
Searching for help with this
For this two-part assessment, you will respond to a question about interpreting correlations and use SPSS software to complete a data analysis and application report.
You will examine three fundamental inferential statistics, including correlation,
t
tests, and analysis of variance (ANOVA). The first inferential statistic we will focus on is correlation, denoted
r
, which estimates the strength of a linear association between two variables. By contrast,
t
tests and ANOVAs will examine group differences on some quantitative dependent variable.
SHOW LESS
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency 1: Analyze the computation, application, strengths, and limitations of various statistical tests.
Develop a conclusion including strengths and limitations of correlation.
Competency 2: Analyze the decision-making process of data analysis.
Analyze the assumptions of correlation.
Competency 3: Apply knowledge of hypothesis testing.
Develop a research question, null hypothesis, alternative hypothesis, and alpha level.
Competency 4: Interpret the results of statistical analyses.
Interpret the correlation output.
Competency 5: Apply a statistical program's procedure to data.
Apply the appropriate SPSS procedures to check assumptions and calculate the correlations.
Competency 6: Apply the results of statistical analyses (your own or others) to your field of interest or career.
Develop a context for the data set, including a definition of required variables and scales of measurement.
Competency 7: Communicate in a manner that is scholarly, professional, and consistent with the expectations for members in the identified field of study.
Communicate in a manner that is scholarly, professional, and consistent with the expectations for members in the identified field of study.
Competency Map
CHECK YOUR PROGRESS
Use this online tool to track your performance and progress through your course.
Toggle Drawer
ContextRead
Assessment 2 Context [DOC]
for important information on the following topics:
SHOW LESS
Interpreting correlation: Magnitude and sign.
Assumptions of correlation.
Hypothesis testing of correlation.
Effect size in correlation.
Alternative correlation coefficients.
Correlation—application.
Proper reporting of correlations.
r
, degrees of freedom, and correlation coefficient.
Probability values.
Effect size.
Toggle Drawer
Questions to ConsiderAs you prepare to complete this assessment, you may want to think about other related issues to deepen your understanding or broaden your viewpoint. You are encouraged to consider the questions below and discuss them with a fellow learner, a work associate, an interested friend, or a member of your professional community. Note that these questions are for .
Search the Internet for an article where physical security failed.docxrtodd280
Search the Internet for an article where physical security failed
Propose a possible change in that organization’s physical security that could have prevented the breach/failure for that scenario
Submit at
least 5 full pages
double spaced (
not including
cover page, reference pages, abstract or table of contents)
No photos or graphs
Reference all sources used
Your paper must be APA formatted (including a separate cover page and reference page)
Your paper must include at least 2 references that are properly cited inside the body of your paper and listed in your reference section
.
Search Yahoo Finance orand any other credible source(s) to find the.docxrtodd280
Search Yahoo Finance or/and any other credible source(s) to find the most recent income
statement and balance sheet of a major corporation.
● Provide these statements in the appropriate format (financial statement)
● Perform a vertical financial analysis incorporating
i. Debt ratio
ii. Debt to equity ratio
iii. Return on assets
iv. Return on equity
v. Current ratio
vi. Quick ratio
vii. Inventory turnover
viii. Days in inventory
ix. Accounts receivable turnover
x. Accounts receivable cycle in days
xi. Accounts payable turnover
BUS 550 Syllabus
8 of
xii. Accounts payable cycle in days
xiii. Earnings per share (EPS)
xiv. Price to earnings ratio (P/E)
xv. Cash conversion cycle (CCC), and
xvi. Working capital
xvii. Explain Dupont identity, apply it to your selected company, interpret the
components in Dupont identity.
Provide your explanations and definitions in detail and be precise. Comment on your findings.
Provide references for content when necessary. Provide your work in detail and explain in your
own words. Support your statements with peer-reviewed in-text citation(s) and reference(s). All
PA and CLA submissions require at least six (6) peer-reviewed references, which should
include the source of the data.
.
Search Yahoo Finance orand any other credible source(s) to find.docxrtodd280
Search Yahoo Finance or/and any other credible source(s) to find the most recent income statement and balance sheet of a major corporation.
Provide these statements in the appropriate format (financial statement)
Perform a vertical financial analysis incorporating
Debt ratio
Debt to equity ratio
Return on assets
Return on equity
Current ratio
Quick ratio
vii.
Inventory turnover
viii.
Days in inventory
Accounts receivable turnover
Accounts receivable cycle in days
Accounts payable turnover
xii.
Accounts payable cycle in days
xiii.
Earnings per share (EPS)
xiv.
Price to earnings ratio (P/E)
Cash conversion cycle (CCC), and
xvi.
Working capital
xvii.
Explain Dupont identity, apply it to your selected company, interpret the components in Dupont identity.
Provide your explanations and definitions in detail and be precise. Comment on your findings. Provide references for content when necessary. Provide your work in detail and explain in your own words. Support your statements with peer-reviewed in-text citation(s) and reference(s). All PA and CLA submissions require at least six (6) peer-reviewed references, which should include the source of the data.
.
Search WarrantAffidavit Project Paper 3-6 pages, double spa.docxrtodd280
Search Warrant/Affidavit Project/ Paper
: 3-6 pages, double spaced, 12 pt. Times New Roman, 1-inch margins on all sides. The assignment is a project about an important contemporary topic written for an informed audience. You should address the questions below, making a strong argument on behalf of your analysis and developing your own conclusion based on evidence from sources. In doing so, you must use a minimum of five references (3) from the syllabus’ bibliography or other academic area (i.e. eText, ProQuest, etc.) Extra research beyond the specified readings will help the quality of your project significantly.
Directions:
Each student will research and submit a work product on the questions related to the search warrant affidavit in the course material. This short p r o j e c t / paper will be assessed and graded on both the quality of the content (the student communicates in a clear and concise way what is important in the assignment) and on the quality of the composition (grammar, word usage, organization, etc.).
Case Scenario
Police Officer Gilbert Caesar sought a warrant to search the persons of Raul Franco and his live-in girlfriend Mildred, the house where Raul and Mildred resided, and a black pickup truck owned by Raul.
Police Officer Caesar’s Affidavit in Support of Application for Search Warrant:
“In the latter part of 2015, I arrested a subject and took him to jail. While enroute to the jail I asked the subject who he knew that was dealing drugs. The subject told me of a person named Raul who lived on the corner of Henry Avenue and Spring Street. I asked the subject how he knew Raul was selling drugs. The subject told me his wife bought her heroin from Raul. As I was driving towards the jail, I drove up Henry Avenue and asked the subject to point the house out to me as we drove past. As we drove past, the subject pointed to the residence on the northeast corner of Henry Avenue and Spring Street. The subject also said Raul drove the black pickup truck that was parked in front of the residence.
“After dropping the subject off at the jail, I drove back to the residence on the corner of Henry Avenue and Spring Street. The black truck was still parked in front of the residence. I ran a registration check on the vehicle. The return information from dispatch showed the vehicle was registered to Raul Franco with an address of 51-03 Spring Street.
“On 01-07-16 Officer Justin Bassey and I were talking to a person who herein will be referred to as confidential reliable informant one. (CRI-1). I was talking to CRI-1 about people who sold drugs in this city, specifically heroin or meth. CRI-1 told us a woman named Mildred and her boyfriend Raul were selling heroin. I asked CRI-1 where Mildred and Raul lived. CRI-1 said they lived on the corner of Henry Avenue and Spring Street. I asked CRI-1 if Raul or Mildred drove any cars. CRI-1 said [he/she] only knew of a black colored full size truck Raul drove. I asked CRI-1 if [he/she] kne.
Search the internet for best practices for developing technolo.docxrtodd280
Search the internet for best practices for developing technology project requirements.
Personally, what one part of the project requirements is critical to the success of the project? Please explain.
As you work to complete your IT Project, you are soon to be finalizing your project design (Unit 4). What have you learned about your project over these weeks (ex. new requirements)?
.
Search the Internet for articles on Implementing a Biometrics Usage .docxrtodd280
Search the Internet for articles on Implementing a Biometrics Usage Today
Propose and discuss a possible Biometrics System
Solution
to implement
Submit at least 2 full pages double spaced
Your paper must be APA formatted (including a separate cover page and reference page)
.
Search the Human Rights Watch website for examples of human ri.docxrtodd280
Search the Human Rights Watch website for examples of human rights violations and abuses
.
Select a human rights violation to use for this Discussion.
Think about the factors that contribute to this human rights violation.
Consider consequences of this violation (locally and/or internationally).
Post by Day 4
a brief description of the human rights violation you selected. Then describe two factors that may contribute to this human rights violation. Finally, explain at least two consequences of the human rights violation (locally and/or internationally). Be specific.
.
Search the Internet and locate a victim impact statement (vide.docxrtodd280
Search the Internet and locate a victim impact statement (video or written).
Reflect on the background and relevant facts of the case for which the statement was prepared
In a minimum of 6
00 words
, briefly describe the background of the case, including:
Criminals involved
Victims involved
Crime committed
Apparent impacts
Other relevant information to provide context
.
Search the Internet and watch the first 6 minutes of PBS Idea Ch.docxrtodd280
Search the Internet and watch the first 6 minutes of PBS Idea Channel’s video:
Are Bitcoins and Unusual Hats the Future of Currency?
Consider the functions of money as well as the risks inherent in traditional fiat currency. After watching the video, consider the following questions: Do alternative currencies have real world worth? What are the pros and cons of the expanding popularity and acceptance of these forms of money?
.
Search the Internet for any short article related to our topics this.docxrtodd280
Search the Internet for any short article related to our topics this week of the time value of money. For the discussion, avoid sites such as Wikipedia or Investopedia. Once you find an article, discuss what you've learned or what your thoughts are. Please also post a link to the article so others can access it.
.
Search the internet and learn about the cases of nurses Julie Th.docxrtodd280
Search the internet and learn about the cases of nurses Julie Thao and Kimberly Hiatt.
The medical caretaker Julie Theo was accused of criminal disregard after she erroneously infused some unacceptable medication for a high school young lady in labor, which lead to her demise. Kimberly Hiatt was charged in the wake of making a numerical mistake that prompted an overdose of calcium chloride and the resulting passing of a fundamentally sick newborn child.
2. List and discuss lessons that you and all healthcare professionals can learn from these two cases.
We as nurses can learn to double check medication administrations and medication math. As well as learn to always remember to check the six rights of medication. Also, learn to let a second nurse check our medication math. learn and realize what do if a medication error happens what to do as a convention. learn to manage our time, so we do not exhaust ourselves.
3. Describe how the principle of beneficence and the virtue of benevolence could be applied to these cases. Do you think the hospital administrators handled the situations legally and ethically?
The principle of beneficence is moral rule that medical caretakers’ activities ought to advance great. I imagine that the principle of beneficence could be applied to the situation of Kimberley Hiatt in light of the fact that she was not effectively attempting to hurt the child, but in the end her actions prompted the death of her patient. Kimberley has the best goals for her patient, but her action did not show her actual expectations. The prudence of benevolence can likewise be applied to the situation of Thao because of her having a " charitable disposition to do good in regard to others “(Jones, 2012). She took the extra shift as an expression of her good will.
4. In addition to benevolence, which other virtues exhibited by their colleagues might have helped Thao and Hiatt?
Different ethics that their colleagues might have displayed is responsibility. In the event that their colleagues would have indicated responsibility for themselves as well as for others on their nursing group. Another accommodating temperance is teamwork. In the event that their colleagues would have shown cooperation, they may have had the option to twofold check other colleague’s medication administration. goodness is the prudence of obligation If Thao's colleagues realized that she was working extended periods they might have mediated and conversed with Thao.
5. Discuss personal virtues that might be helpful to second victims themselves to navigate the grieving process.
The virtue of forgiveness could be extremely useful to second victims who have not had the option to excuse themselves for committing an error. The second victim should have the option to perceive that they are not a perfect human and they can commit errors. The virtue of growth would be useful to second victims also. The second victim can gain from the error and attempt to instruct others on.
Search the Internet for articles on Implementing Biometrics To.docxrtodd280
Search the Internet for articles on Implementing Biometrics Today
Propose and discuss a possible Biometrics System
Solution
to implement
Submit at
least 2 full pages
double spaced (
not includin
g
cover page, reference pages, abstract or table of contents)
No photos or graphs
Reference all sources used
Your paper must be APA formatted (including a separate cover page and reference page)
Your paper must include
at least 2 references
that are properly cited inside the body of your paper and listed in your reference section
NOTE:
Cover and Reference pages in APA format are required!
.
Search the Web for reports of cloud system failures. Write a 3 to 4 .docxrtodd280
Search the Web for reports of cloud system failures. Write a 3 to 4 page paper where you discuss the causes of each incident.
Writing Requirements
3–4 pages in length (excluding cover page, abstract, and reference list)
Include at least two peer reviewed sources that are properly cited
APA format, Use the APA template
.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Communicating effectively and consistently with students can help them feel at ease during their learning experience and provide the instructor with a communication trail to track the course's progress. This workshop will take you through constructing an engaging course container to facilitate effective communication.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Second Cycle CodingDavid Lee — TIM 158, Spring 2019Conte.docx
1. Second Cycle Coding
David Lee — TIM 158, Spring 2019
Content drawn from Johnny Saldana’s The Coding Manual for
Qualitative Researchers
and Michael Bernstein’s design course.
Deep, rich understanding of individuals
Hypotheses about narrow user segments
Hypotheses about solution concepts
Recall
“essence-capturing and essential elements of the
research story that, when clustered together according
to similarity and regularity - a pattern - facilitate the
development of categories and analysis of their
connections.”
Qualitative coding is about
The Coding Manual for Qualitative Researchers, Johnny
Saldana
Recall
DATA → CODES → CATEGORIES → THEMES → THEORY
2. Recall
The Coding Manual for Qualitative Researchers (2009), Johnny
Saldana (p. 12)
First cycle
focused on
who/what
Second cycle
moving from
who/what to
how/why
Recall
The Coding Manual for Qualitative Researchers (2013), Johnny
Saldana (p. 189)
Attribute codes
Holistic/structural code
Line-by-line/sentence-
by-sentence codes
Recall
Memo type: networks
Saldana, pg 45
Integrate your codes into a narrative (codeweaving) to interpret
3. how individual
components weave together in hierarchies, chronological flows,
influences and affects, etc.
Recall
The Coding Manual for Qualitative Researchers (2009), Johnny
Saldana (p. 43)
First and second cycle
coding intermixed with
data collection and
memo writing
Gradual development
from codes to categories
to theory, facilitated by
memo writing
Recall
General process
• End with annotated data, hierarchical coding scheme,
codebook, analytic
memos, developed theory
• For us, the “theory” we’re aiming for is a hypothesized model
that is:
• grounded in user data and quotes
• a cohesive narrative and logical interpretation
4. • communicated richly to help the reader in “being there”
• Remember: we are generating not validating hypotheses, so
choose
diverse perspectives
Recall
Today
• Second cycle coding methods
• Defining a model: participant profiles, personas,
storyboards, customer journey maps
• Our process for assignment #3
transitioning from managing, focusing, highlighting, filtering
data to generate categories, themes, and theory
Second cycle coding
The Coding Manual for Qualitative Researchers, Johnny
Saldana
Recall
Organizing/focusing/interpreting codes
• Pattern/focused coding: create categories from groups of codes
• Can consider emergent patterns or those most central to the
analytic question
• Axial coding: flesh out a category with properties &
dimensions
5. • Properties are attributes of a category, dimensions are the
location of a property on
a continuum that tells if, when, how, why something happens,
• Theoretical coding: summarize the central/core concern
• If can achieve generalizable/transferable theory, that’s great!
Code mapping
• Start from the full
set of codes and
reorganize into a
list of categories,
and then condense
further into themes
or concepts
Saldana, pg 194-198
Theming the data
• Instead of codes, label with thematic
statements that draw out a code’s
essence: what it’s about, what it means.
• Can take a broad code and elaborate it
using “is” or “means” after phenomenon
• Example: phrases for code “Negotiating” might be
result in “negotiating is the path of least resistance”
or “negotiating means manipulating others”.
6. • Then condense into meta-themes or
theoretical constructs
Saldana, pg 177
Saldana, pg 178
What is the theory/model we are trying
to develop for designing a product?
Recall the business model canvas
strategyzer.com
Cost structure Revenue streams
Key resources Channels
Key activitiesKey partners
Value
proposition
Customer
relationships
Customer
segments
Recall
This model includes
Pr
o
7. du
ct
Marketing,
Sales, Support
U
ser segm
ents
• Groups of users whose contexts and
values give rise to similar experiences in
encountering and using your product
• The strategic roadmap of which groups
you plan to target first and the
accompanying product / marketing
features needed
Stems from a rich model of users
• Context of user segment: what is the broader environment,
values, and goals
they are operating in, especially as affecting the below.
• Adoption of product: what motivates or prevents them from
using your
product? how do they first discover and adopt it?
• Experience of product: how do they use your product (e.g.
tasks, frequency,
length)? what is their experience and how do they affect the
ecosystem?
8. • Summary of value: how are their needs ultimately satisfied
and what is the
extent or limits? what does success for this segment look like?
SEGMENT → SETTING → SEQUENCE → SATISFACTION
Recall
Credit: Crossing the Chasm: Geoffrey Moore
Recall
How do you represent
this model?
Cookie Monster
Cookie Connoisseur, 4
“Not a day goes by when I don’t think
about my precious cookies.”
Cookie Monster cares most about enjoying cookies and
maintaining his image as relentless cookie thief .
‐ A day in Cookie Monster’s life ‐
9. Cookie Monster is a voracious monster and one of the main
characters on Sesame Street . Covered with blue fur and
possessing a pair of googly eyes, Cookie Monster has an
insatiable appetite. As his name implies, his primary craving
is cookies, but he can (and often does) consume anything
and everything , from apples and pie to letters , flatware, and
hubcaps. When Cookie Monster eats something, he makes a very
distinct, loud munching "noise", often
interpreted as " OMM-nom-nom-nom... " Cookie Monster has a
deep, growly voice, and generally speaks
with simplistic diction, saying everything with "me" - for instan
ce, as opposed to "I want a cookie!"
- Cookie Monster’s Challenges -
Cookie monster is generally very happy but when he had has a f
ew
traumatic experience in his life. At some point someone offered
him
fruit instead of cookies and he cried for a week. Cookie monster
works hard to maintain his image as trouble maker to ensure a
10. steady cookie supply. Whenever Ernie or Bert have cookies, he
barges into the scene and eats all their cookies. Cookie monster
has a sweet personality but he thinks he needs to be scary in ord
er
to not threaten his cookie supply.
Participant profiles
& personas
• Conveys context of their life and
needs, especially characterizing
attributes of segments.
• Help people visualize/empathize
with your user. Useful for creating
alignment within a team.
• Concrete and specific. Enough depth
to tell a story and communicate in a
more emotionally resonant way
Storyboard
No artistic skill required!
Hand-drawn comic that features:
Setting + Sequence + Satisfaction
(slides adapted from Amal Dar Aziz)
Hand-drawn comic that features:
Setting + Sequence + Satisfaction
11. Storyboard
Hand-drawn comic that features:
Setting + Sequence + Satisfaction
Storyboard
Hand-drawn comic that features:
Setting + Sequence + Satisfaction
Storyboard
Hand-drawn comic that features:
Setting + Sequence + Satisfaction
Storyboard
Hand-drawn comic that features:
Setting + Sequence + Satisfaction
Storyboard
For modeling and prototyping:
• Gets everyone on same page about
the app’s goals
• Focuses the conversation and
feedback on user tasks
• Avoids nitpicking about user
interface details
12. Customer Journey Map
• Provide a holistic and rich
visualization of a user’s
encounter with a product
• Combines:
• User segment attributes and context,
• Actions and touchpoints the user
encounters,
• Mindsets and emotions in that encounter,
• Reflections on metrics, risks, priorities,
Credit: When and How to Create Customer Journey Maps,
Nielsen Norman Group
The goal
• Represent the hypothesized model of the user
segments that can be used to inform future iterations
• Communicate a cohesive narrative grounded in data
that can help readers empathize with the user journey
How do you know if its effective?
• As a representation of the hypothesis
• Does it help describe something about this particular segment?
13. • Does it make assertions about their experience that can be
questioned or
validated or that can inform iteration of the product?
• As communicating a rich and cohesive narrative
• Does it help someone put themselves into the user’s shoes?
• Does the story it tells of the experience fit compellingly with
the context?
Today
• Second cycle coding methods
• Defining a model: participant profiles, personas,
storyboards, customer journey maps
• Our process for assignment #3
Code your interview
• Preparation: Annotate it with attribute and holistic/structural
codes
• Who/What: use descriptive and process codes to describe the
characters, setting, and
other context
• How/Why: Use emotion, evaluation, values, versus coding to
develop a richer view
of the participant context and experiences. Bias towards using
in vivo codes to ground
these in the user’s language.
• Memos: Write short analytic memos that use codeweaving to
write narratives of the
participant context and experiences
14. • (On Wednesday) We’ll talk about organizing codes into
categories and defining models of
our participant and of hypothesized user segments
Recall
Code mapping to create categories
• Do it for the entire set of codes for each individual
• Code map into two high-level groups of categories
• Persona and setting: groups of attributes, values, motivations,
etc. that potentially
characterize segments
• Adoption and experience: how and why do they join and use
it, what value/pain do
they encounter, why does it work or not
• These are categories and subcategories, and potentially themes
• Think of these as potential features predicting a segment or
predictions of
experiences you could try validating
Write insights on segments/themes
• Define notable segments reflected in the individual or other
major themes
that arose
15. • A segment is a group of users who experience adoption and/or
use of the product in a similar way.
Think about some of the major point-of-views that might be
reflected in that individual’s experience,
• Write a short memo summarizing these notable segments with
1-2 particularly illustrative quotes,
• Then write a memo for each segment containing
• The major hypotheses you might want to validate
• Ideas you have for how to build a product to better nail fit,
• Questions you have that you’d want to understand more.
Get started on synthesizing
for final report
Share in your groups
• Share the potential segments and themes you saw in
unpacking of individuals
• Based on patterns across individuals, decide on 2-3
segments you want to target as early adopters or a
beachhead segment
• Then detail each of these segments with a customer
journey map elaborated by a 2-page narrative
Customer journey map
• 4 columns corresponding to segment, discovery,
16. experience, satisfaction
• Segment describes the user before they encounter your
product,
• Discovery describes how they encounter and join/buy your
product,
• Experience describes their use/participation of your product,
• Satisfaction describes the user’s satisfaction with your product
and after
they finish using your product.
Customer journey map
• 5 rows for each column (some are blank for first and last)
• Concise summary (200-400 characters) of each of the four
columns
• Actions that a user would be going through, and their
mindset/emotions as they
go through these actions
• Touchpoints for connecting to the user as they go through this
journey
• Data collection that you would eventually want to do to
validate key hypotheses
• Risks, questions, and ideas that you think of
Customer journey map
• Link to your 2-page supporting narrative
17. • Basically mirrors the customer journey map, but has space to
add some
illustrative quotes, and actually explain the short phrases in the
map
Define implications for future
• Explain your prioritization of user segments
• Who are the early adopters? Your beachhead into the early
majority? Explain the strength of
the value you are providing to them and why they are likely to
be good early target segments
• What are later segments you could potentially grow to and
what would be an estimate of
the market size?
• Define the next iteration
• How will you change the product or marketing? What is the
next version? A longer roadmap?
• What do you feel is still unanswered? What are the biggest
questions or risks?
Running Head: DEPTH (CYBERSECURITY)
1
DEPTH (CYBERSECURITY)
5
18. RAKESH PRAKASH GENTYALA
ITS 834 Emerging Threats and Countermeasures
Annotated Bibliography - Depth (Cyber Security)
Dr. Steve Brown
29th March, 2019
Depth –Cyber Security
The paper will provide an overview of the defense in depth
strategy as a practical method of attaining information
assurance, considering the widespread of the networked
environment in today’s modern world. It will look into the
purpose of the defense in depth technique and how exactly this
strategy works, more importantly, its role as a defensive
countermeasure in protecting national infrastructure from cyber-
attacks. The different elements of the defense in depth strategy
will be explored. It will also give insight on how to measure the
effectiveness of the defense in depth strategy and ways to
improve its effectiveness in order to ensure that national
infrastructure remains secure.
Annotated Bibliography
19. Harrop, W., & Matteson, A. (2015). Cyber resilience: A review
of critical national infrastructure and cyber-security protection
measures applied in the UK and USA. In Current and Emerging
Trends in Cyber Operations (pp. 149-166). Palgrave Macmillan,
London.
This article points out the defense in depth approach as amongst
the security measures adopted by the USA and UK to safeguard
national infrastructure. The article looks into the possibility of a
country’s financial systems suffering from an unexpected
malicious downtime, or even the possibility of digital terrorists
interfering with power grids and breaching water treatment
plants. The article provides the defense in depth strategy as a
measure for protecting the basic way of life which is highly
dependent on national infrastructure.
Ani, U. P. D., He, H., & Tiwari, A. (2017). Review of
cybersecurity issues in industrial critical infrastructure:
manufacturing in perspective. Journal of Cyber Security
Technology, 1(1), 32-74.
This paper looks into cybersecurity concerns regarding
industrial control systems. It offers an insightful review on
vulnerabilities, threats and cyber-attack patterns and their
impact on the industrial environment. The defense in depth
strategy for improving the cybersecurity of industrial control
systems is examined in detail. Industrial control systems are
quite complex and so lack of defense in depth strategy can
result in long term exposure to threats.
Hausken, K., & Levitin, G. (2016). Review of Systems Defense
and Attack Models. International Journal of Performability
Engineering, 8(4).
This paper highlights the importance of the defense in depth
strategy and provides a well-described example of its role in the
health care industry. It explores the WannaCry Malware
outbreak and the havoc it caused on the healthcare industry. It
looks into cybersecurity practices that the health care industry
moved into, the defense in depth strategy being one of them.
The healthcare industry is charged with the protection of crucial
20. patient data and so adopting the defense in depth strategy was
considered a way to exponentially multiply the industry’s cyber
defense.
Khattak, M. A., Shaharuddin, M. K. H., Islam, M. S., & Ahmad,
M. H. N. (2017). Review of cyber security applications in
nuclear power plants. Journal of Advanced Research in Applied
Sciences and Engineering Technology, 7(1), 43-54.
This paper reviews the application of the defense in depth
strategy for nuclear safety by the International Atomic Energy
Agency. It summarizes the historical development of nuclear
safety concepts, with a focus on the Defense in depth concept. It
describes how the defense in depth strategy can be enhanced for
the safety of the nuclear power plants that are currently in
operation. It provides the objectives of the defense in depth
mechanism for nuclear safety.
Geramiparvar, S., & Modiri, N. (2015). Security as a Serious
Challenge for E-Banking: a Review of Emmental
Malware. International Journal of Advanced Computer
Research, 5(18), 62.
This paper explores electronic payment frauds in financial
institutions. Cyber threats are have increased in the financial
sector owing to the various innovations on digital payment
techniques by banks. The paper recommends the defense in
depth strategy as a security measure to combat online payment
frauds. The paper also looks into how cyber attackers use
Emmental malware to compromise digital banking platforms and
gain access to the private information of customers. The paper
gives insight into how a defense in depth strategy works to stop
fraudulent transactions.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K.,
Soulsby, H., & Stoddart, K. (2016). A review of cybersecurity
risk assessment methods for SCADA systems. Computers &
security, 56, 1-27.
This paper explores the unprecedented security threats
introduced by computer technologies in the SCADA
(Supervisory Control And Data Acquisition) systems. SCADA
48. r 1
0
–
A
w
a
re
n
e
s
s
12
Cyber Security Intelligence Reports
• Daily cyber security intelligence reports are standard
in government agencies
• They would be useful in enterprise settings
• A cyber security intelligence report would include
– Current security posture
– Top and new security risks
– Automated metrics
– Human interpretation
51. All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
15
Risk Management Process
• Security risks must be tracked and prioritized
• Generally agreed upon approach to measuring risk
associated with specific components begins with two
estimations
– Liklihood
58. Research Paper Rubric
Component 100% 75% 50% 25% 0
Basic
Requirements
Formatted correctly, at
least 500 words in
length, citation page
and internal citations
correct (APA format), at
least 2 cited peer
reviewed sources.
Does not meet required
page length, and/or
does not have 2 cited
peer reviewed sources.
Thesis
Statement
Engaging, challenging,
and clearly focuses the
paper. Effectively
stated in the
introduction and
carried throughout the
paper.
59. Clear and articulate,
engaging and clearly
focuses the paper, but
is not challenging. Is
effectively carried
throughout the paper.
Clearly stated in the
introduction, attempts
to be engaging, is
adequate, but lacks
insight and focus, and is
carried through the
paper.
Included in the
introduction, but is
vague. Lacks insight,
focus, and is not carried
throughout the paper.
Is vague or may be
lacking in the
introduction; is not
focused and lacks
development; is not
carried throughout the
paper.
Introduction Strong and effective, it
is engaging and clearly
defines the thesis, as
well as provides a
foundation for the body
of the paper.
60. Effective and engaging,
defines the thesis and
provides foundation for
the body of the paper.
Introduces the topic of
the paper and builds a
connection between
the topic, the thesis,
and the body of the
paper. Informative but
not engaging or strong.
Introduces the topic of
the paper loosely and
includes the thesis
statement. Provides
little information
regarding the topic.
Includes little more
than the thesis and
shows no demonstrable
knowledge of the topic
of the paper.
Content
Strongly and vividly
supports the thesis and
is reflective of strong,
thorough research.
Illustrates extensive
knowledge of the topic.
Every aspect of the
61. thesis is supported by
quality academic
research.
Strongly supports the
thesis and is reflective
of good, thorough
research. Illustrates
knowledge of the topic,
but could be extended.
Most aspects of the
thesis are supported by
quality academic
research.
Supports the thesis and
reflects research, and
illustrates adequate
knowledge of the topic.
Could be extended and
shows some gaps in
understanding of the
topic. Although there
may be some
inconsistencies with
support from quality
academic research.
Related to the thesis
but reflects inadequate
research and
knowledge of the topic,
and demonstrates a
lack of understanding.
There may be a lack of
support from quality
62. academic research.
Does not convey
adequate
understanding of the
topic, the research, or
the thesis. There are
many unsupported
aspects of the thesis
and the research lacks
quality sources.
Organization Effectively organized.
Logical structure of
points and smooth
transitions convey both
understanding of topic
and care in writing.
Well organized, but
may lack some
transitions between
ideas. Logical structure
of most ideas conveys
understanding of topic
and composition.
Ideas are logically
structured, but may
lack transitions
between ideas. Could
benefit from
reorganizing 1 or 2
ideas.
Some significant gaps in
63. organization are
present but the basic
framework of ideas is
logical. Overall
organization could be
improved.
Much of the paper lacks
organization of ideas,
making it difficult to
understand the ideas
expressed in the paper.
Citation Format APA format is used
accurately as needed
throughout the entire
paper.
APA format is used
throughout the entire
paper, but may show
variations or slight
inconsistencies of
format.
APA format is used
throughout the entire
paper, but may be
noticeably inconsistent
in format.
APA format is used
inaccurately and
inconsistently in the
paper.
64. APA is not used
(regardless of the
number of sources or
citations).
Conclusion Strongly and clearly
connects the thesis
statement to the
research to draw a
specific conclusion that
does not leave the
reader with questions
regarding the thesis.
Clearly connects the
thesis statement and
the research to draw a
clear conclusion that
draws the research to a
logical close.
Connects the thesis
statement and research
to draw a conclusion
regarding the research.
Restates the topic
statements throughout
the paper.
Restates the thesis and
the topic statements,
but does not draw any
specific conclusion
about the research or
the thesis.
65. There is no conclusion;
it restates the thesis at
best.
Conventions Conventions of
standard written
English are used with
accuracy; there are few,
if any, minor errors.
Conventions of
standard written
English are used; there
may be several minor
errors of usage.
Conventions of
standard written
English are used;
however, there may be
a few major errors and
few minor errors of
usage.
Conventions of
standard written
English are used with
numerous major errors
and several minor
errors of usage.
The paper shows
significant errors in
conventions of
standard written
English.
66. In this third project milestone, you will learn techniques for
rigorously analyzing qualitative data. You will apply this to
analyze the interview that you conducted at the end of the last
assignment. This assignment should be done individually.
Readings and Resources:
· Transcribing: Finally, an easy, quick way to transcribe audio,
for free, Quartz, Leah Fessler, Trint (automated transcription,
but I don’t have a sense for how high-quality it is)
· Step-by-step instructions and example for TIM 158 qualitative
coding
· The Coding Manual for Qualitative Researchers, Johnny
Saldana
Requirements:
1. Transcribe the interview, then skim through and annotate
your transcript (individual).
If you have not already, transcribe the interview you conducted
in homework #2. Annotate the transcript with attribute codes,
e.g. participant demographics or other potential factors of
interest for analysis. Quickly skim through the transcript and
section it off into major topic areas using holistic codes. Use
Google Docs for your transcript. You can copy the example in
Step 1 in the step-by-step instructions as a template.
0. Make one detailed pass through the transcript to code
characters and setting (individual).
Use the Google Docs comment functionality to annotate the
transcript with Descriptive (D) and Process (P) codes. This
67. helps to capture the setting. Only code the interviewee
responses to make sure that you’re not just coding leading
questions, and use In Vivo codes. Then organize your codes,
and use codeweaving to write short analytic memos that
describe the various characters and settings discussed in the
interviews. You can copy the example in Steps 2-3 of the step-
by-step instructions as a template.
· Descriptive codes describe the things being talked about.
Process codes describe the actions going on and should use
gerunds whenever possible (e.g. -ing words). Make sure to also
mark any quotes that are particularly salient, illustrative, or
evocative,
· Organize all your descriptive and process codes into a list
organized by the section headers. Include quotes associated with
codes,
· When codeweaving, all of the codes should be used in at least
one memo, and the memos should minimize the use of words
that are not codes. All codes should be underlined within the
memos and quotes should be italicized.
0. Make a second detailed pass through the transcript to code
values and experience (individual).
Create a copy of the annotated transcript from before and make
a second pass through it, this time annotating it with Values
(V), Attitudes (A), Beliefs (B), Emotions (E), and Judgments
(positive: J+, negative: J-). Only code interviewee responses,
and use In Vivo codes (written with “quotation marks”)
whenever possible to ground your codes in the user’s own
words. Then organize your codes, and use codeweaving to write
short analytic memos that give a richer depiction of the various
characters and their experiences. You can copy the example in
Steps 4-5 of the step-by-step instructions as a template.
Value codes describe the importance we attribute to things.
Attitude codes describe the way we think and feel about things.