SlideShare a Scribd company logo
IT Systems Mirium Brown, Tasha Curtis, Shenna Ganzy, Margarita Ramirez University of Phoenix BSHS 352, Technology in Human Services Miranda Palmer March 7, 2010
Introduction Big Brother’s Watching is a mentoring program which increases self esteem, builds self confidence and helps children with courage.  Big Brother’s Watching has several programs to match the childs needs. The current IT system has been updated to better  serve the needs of the children entering the Big Brother program.  http://media.wiley.com/product_data/excerpt/91/04712635/0471263591.pdf
Why Mentor? ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Big Brother’s Watching
IT Systems ,[object Object],[object Object],[object Object],[object Object]
IT Systems ,[object Object],[object Object],[object Object]
IT System ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Importance of Secure IT Systems ,[object Object],[object Object],[object Object],[object Object],[object Object]
IT System ,[object Object],[object Object],[object Object],[object Object],[object Object]
New IT system Used: MENTORlynx ,[object Object],[object Object],[object Object],[object Object],[object Object]
Points to follow in matching ,[object Object],[object Object],[object Object],[object Object],[object Object]
MENTORlynx  Main Components Hardware- computer Software- computer applications Communications- phones, local network
Lynk systems MentorLynk is a secure innovative program from TP sytems. Mentorlynk Adoptionlynk is a secure innovative program from TP systems. Mentorlynk is a process which has pros and cons to each party involved, however it makes the mentoring process much easier. Adoptlynk is a a process which help expedite the process. Adoptionlynk provides legal forms to help speed the process. The best part about this software is it provides matches to the prospective parents. Adoptionlynk will provide the workers with several reports. Adoptionlynk is a government controlled program which helps adoption agencies collaborate collectively. Lynk is a secure web-based software program which helps with the matching, placement, registration and reunion of children in the adoption system.  In order to successfully match a child with prospective parents, the program uses profile characteristics to best match the child. Adopt lynk helps prospective parents find a child and adoptive children find a home. Adoption Lynk are used for adoption agencies and local state and federal agencies looking to place a child in the care of prospective parents. Adoption Lynk registers the birth father of the child. Adoption lynk will track the father of the child and notifies him of the offering of adoption. When the adoption workers are seeking to place a child, they have to make sure the legal rights of the birth father are protected. Adoption lynk registers Out of country adoptions, Post Adoption openness, reunion, post adoption assistance, legislations and standards, and recruiting mode. I would recommend this software for a family seeking to adopt a child. I would recommend this software because the most important part and adoption is when the child has been placed. Many children are without a voice and its good that’s there is a system that will track the relationships after the exchange occurs.
References ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
Frances Coronel
 
(Webinar Slides) Digital Marketing for Lawyers
 (Webinar Slides) Digital Marketing for Lawyers (Webinar Slides) Digital Marketing for Lawyers
(Webinar Slides) Digital Marketing for Lawyers
MyCase Legal Case and Practice Management Software
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
University of North Carolina at Charlotte
 
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Melissa Luongo
 
Wraparound Services Case Study (Draft 2)
Wraparound Services Case Study (Draft 2)Wraparound Services Case Study (Draft 2)
Wraparound Services Case Study (Draft 2)Whitney Slightham
 
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagementTRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
Ansgar Koene
 
Keynote slides: The Future of Healthcare
Keynote slides: The Future of HealthcareKeynote slides: The Future of Healthcare
Keynote slides: The Future of Healthcare
Ross Dawson
 
(Webinar Slides) Tips and Tricks for Managing Social Media
(Webinar Slides) Tips and Tricks for Managing Social Media(Webinar Slides) Tips and Tricks for Managing Social Media
(Webinar Slides) Tips and Tricks for Managing Social Media
MyCase Legal Case and Practice Management Software
 

What's hot (8)

A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
A Survey of Security & Privacy in Online Social Networks (OSN) with regards t...
 
(Webinar Slides) Digital Marketing for Lawyers
 (Webinar Slides) Digital Marketing for Lawyers (Webinar Slides) Digital Marketing for Lawyers
(Webinar Slides) Digital Marketing for Lawyers
 
Components of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior AdoptionComponents of a Model of Cybersecurity Behavior Adoption
Components of a Model of Cybersecurity Behavior Adoption
 
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
 
Wraparound Services Case Study (Draft 2)
Wraparound Services Case Study (Draft 2)Wraparound Services Case Study (Draft 2)
Wraparound Services Case Study (Draft 2)
 
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagementTRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
 
Keynote slides: The Future of Healthcare
Keynote slides: The Future of HealthcareKeynote slides: The Future of Healthcare
Keynote slides: The Future of Healthcare
 
(Webinar Slides) Tips and Tricks for Managing Social Media
(Webinar Slides) Tips and Tricks for Managing Social Media(Webinar Slides) Tips and Tricks for Managing Social Media
(Webinar Slides) Tips and Tricks for Managing Social Media
 

Similar to Week 5 Final Presentation

Responsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfResponsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdf
Stefaan Verhulst
 
The bully tracker final
The bully tracker finalThe bully tracker final
The bully tracker final
CMchambers
 
The Bully Tracker
The Bully TrackerThe Bully Tracker
The Bully Trackerdealy14
 
IMSafer Angel Round
IMSafer Angel RoundIMSafer Angel Round
IMSafer Angel Round
Brandon Watson
 
Data Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About IndividualsData Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About Individuals
Christy Hunt
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations
AvePoint
 
Technology Against Trafficking
Technology Against TraffickingTechnology Against Trafficking
Technology Against Trafficking
Clair Deevy
 
Maura Tuohy
Maura TuohyMaura Tuohy
Maura Tuohy
James Prentis
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
ambersalomon88660
 
AIM: Data protection, data governance, data management
AIM: Data protection, data governance, data managementAIM: Data protection, data governance, data management
AIM: Data protection, data governance, data management
Policy in Practice
 
Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guideChristopher Bradley
 
Renish Dadhaniya - GlobeSync Technologies | Work at a glance
Renish Dadhaniya - GlobeSync Technologies | Work at a glanceRenish Dadhaniya - GlobeSync Technologies | Work at a glance
Renish Dadhaniya - GlobeSync Technologies | Work at a glance
GlobeSync Technologies
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
Seamus Tuohy
 
Ark presentation
Ark presentationArk presentation
Ark presentationbrentcarey
 
Handwriting Paper Roote. Online assignment writing service.
Handwriting Paper  Roote. Online assignment writing service.Handwriting Paper  Roote. Online assignment writing service.
Handwriting Paper Roote. Online assignment writing service.
Dawn Jones
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
waiforchi Wagiteerhh
 
Running head RESPONSE .docx
Running head RESPONSE                              .docxRunning head RESPONSE                              .docx
Running head RESPONSE .docx
toltonkendal
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
blondellchancy
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
BHANU281672
 

Similar to Week 5 Final Presentation (20)

Responsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfResponsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdf
 
The bully tracker final
The bully tracker finalThe bully tracker final
The bully tracker final
 
The Bully Tracker
The Bully TrackerThe Bully Tracker
The Bully Tracker
 
IMSafer Angel Round
IMSafer Angel RoundIMSafer Angel Round
IMSafer Angel Round
 
Data Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About IndividualsData Collection Tool Used For Information About Individuals
Data Collection Tool Used For Information About Individuals
 
3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations3 Steps to Automate Compliance for Healthcare Organizations
3 Steps to Automate Compliance for Healthcare Organizations
 
Technology Against Trafficking
Technology Against TraffickingTechnology Against Trafficking
Technology Against Trafficking
 
Maura Tuohy
Maura TuohyMaura Tuohy
Maura Tuohy
 
IGPoster
IGPosterIGPoster
IGPoster
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
AIM: Data protection, data governance, data management
AIM: Data protection, data governance, data managementAIM: Data protection, data governance, data management
AIM: Data protection, data governance, data management
 
Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guide
 
Renish Dadhaniya - GlobeSync Technologies | Work at a glance
Renish Dadhaniya - GlobeSync Technologies | Work at a glanceRenish Dadhaniya - GlobeSync Technologies | Work at a glance
Renish Dadhaniya - GlobeSync Technologies | Work at a glance
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
 
Ark presentation
Ark presentationArk presentation
Ark presentation
 
Handwriting Paper Roote. Online assignment writing service.
Handwriting Paper  Roote. Online assignment writing service.Handwriting Paper  Roote. Online assignment writing service.
Handwriting Paper Roote. Online assignment writing service.
 
Ethical issues and social issues related to systems upload
Ethical issues and social issues related to systems uploadEthical issues and social issues related to systems upload
Ethical issues and social issues related to systems upload
 
Running head RESPONSE .docx
Running head RESPONSE                              .docxRunning head RESPONSE                              .docx
Running head RESPONSE .docx
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
 
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
54 Parents Worried About Cyber Bullying ofKids Norton Re.docx
 

Recently uploaded

一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Holger Mueller
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Lviv Startup Club
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
Adani case
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Boris Ziegler
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
ecamare2
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
JeremyPeirce1
 

Recently uploaded (20)

一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesEvent Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
In the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptxIn the Adani-Hindenburg case, what is SEBI investigating.pptx
In the Adani-Hindenburg case, what is SEBI investigating.pptx
 
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
Agency Managed Advisory Board As a Solution To Career Path Defining Business ...
 
Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431Observation Lab PowerPoint Assignment for TEM 431
Observation Lab PowerPoint Assignment for TEM 431
 
Top mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptxTop mailing list providers in the USA.pptx
Top mailing list providers in the USA.pptx
 

Week 5 Final Presentation

  • 1. IT Systems Mirium Brown, Tasha Curtis, Shenna Ganzy, Margarita Ramirez University of Phoenix BSHS 352, Technology in Human Services Miranda Palmer March 7, 2010
  • 2. Introduction Big Brother’s Watching is a mentoring program which increases self esteem, builds self confidence and helps children with courage. Big Brother’s Watching has several programs to match the childs needs. The current IT system has been updated to better serve the needs of the children entering the Big Brother program. http://media.wiley.com/product_data/excerpt/91/04712635/0471263591.pdf
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. MENTORlynx Main Components Hardware- computer Software- computer applications Communications- phones, local network
  • 13. Lynk systems MentorLynk is a secure innovative program from TP sytems. Mentorlynk Adoptionlynk is a secure innovative program from TP systems. Mentorlynk is a process which has pros and cons to each party involved, however it makes the mentoring process much easier. Adoptlynk is a a process which help expedite the process. Adoptionlynk provides legal forms to help speed the process. The best part about this software is it provides matches to the prospective parents. Adoptionlynk will provide the workers with several reports. Adoptionlynk is a government controlled program which helps adoption agencies collaborate collectively. Lynk is a secure web-based software program which helps with the matching, placement, registration and reunion of children in the adoption system. In order to successfully match a child with prospective parents, the program uses profile characteristics to best match the child. Adopt lynk helps prospective parents find a child and adoptive children find a home. Adoption Lynk are used for adoption agencies and local state and federal agencies looking to place a child in the care of prospective parents. Adoption Lynk registers the birth father of the child. Adoption lynk will track the father of the child and notifies him of the offering of adoption. When the adoption workers are seeking to place a child, they have to make sure the legal rights of the birth father are protected. Adoption lynk registers Out of country adoptions, Post Adoption openness, reunion, post adoption assistance, legislations and standards, and recruiting mode. I would recommend this software for a family seeking to adopt a child. I would recommend this software because the most important part and adoption is when the child has been placed. Many children are without a voice and its good that’s there is a system that will track the relationships after the exchange occurs.
  • 14.

Editor's Notes

  1. Big Brother’s Watching is a mentoring program which increases self esteem, builds self confidence and helps children with courage. Big Brother’s Watching has several programs to match the childs needs. The current IT system has been updated to better serve the needs of the children entering the Big Brother program.
  2. - Mentoring builds self-esteem and self-confidence for both the mentor and the mentee - The mentee builds on a support system that is provided by the mentor. This in turn shows the mentee they are no longer alone and they now have someone who they can turn to in times of need. - Knowing that there is someone there for them who cares gives them courage to go on and to try harder at reaching goals for themselves. (Kienlen, L., 2007).
  3. Big Brother’s Watching is an informal support network, which allows youth children the opportunity to express themselves in a non-threatening environment, among their peers. The organization is based on establishing goals and objectives while helping children find the meaning of their life or how to cope with their current situation.
  4. Information Systems was the used used in the Big Brother’s Watching organization, but lacked various up to date features. Information Systems is an information system, which is a combination of technology, people, and processes to capture, transmit, store, retrieve, manipulate, and display information (Mediawiley, 2010).
  5. The current system we have for the organization is outdated. The company needs to create another IT system to better serve the organization. The new system will need to have better programs and hardware, which will promote more advantages to the organization.
  6. The advantage of having a IT System is to communicate with the clients more efficiently. Communication is the key when trying to communicate within the organization. The organization must have computers, phones and certain computer applications. This will allow the process to run at its best. Having applications such as spreadsheets, Web-base, database, and certain types of Microsoft will allow this process to be effective. The system has a good security network, which will help the security with information. Having a good Antivirus and good secure IT system will eliminate any issues.
  7. - Due to the nature of the personal information stored in an organization's IT System, it is very important to ensure that the IT System of choice is focused on securing the information from being hacked or stolen. - Each client, whether mentor or mentee, is providing personal information about themselves in an effort to either give or receive services with the mentor organization and it is their right for the organization to help keep the information secure and confidential. - The lack of an organization to secure their clients information can be both damaging to their clients and to the organization. Ultimately it can be more expensive from a failure to do so if lawsuits follow in which case it would have been more worth it to put the money into a secure system. - The ultimate risk would be to a clients safety at which point serious consequences could follow. - (Denley, I., Smith, S. 1999).
  8. Having a database is good, however, there is always room for improvements. The database that was currently built does not hold enough information , however, with the company growing the database needs to be bigger. We may need to invest in bigger database. The knowledge for this database is a must. We will need to implement a plan to help our IT people can the knowledge in making sure the data base is what we need. The web is something that increases all the time, which will cause for connectivity to not operate as it should. However, it is important to have enough servicing, this means getting a broadband to communicate effectively. The problem will be making sure the company have the “right sizing” to implement the communications for the internet (Mediawiley, 2010). With having the IT system, there is a need to keep all information confidential. Protecting all client information through the database and e-mails are important. The clients privacy is most important for the organization.
  9. MENTORlynx is a state funded database with an all inclusive approach to finding the proper mentor to instill hope, dreams, and values into the hearts and minds of inner city youth’s who struggle with their environment or identity whether at home, school, or amongst their peers.
  10. - Matching a mentee to a mentor that is the same gender or near to the same age could be a request of one or the other and should be valued by the organization as it may be beneficial to the mentee. - Matching temperaments is very crucial to the success of the program. Some mentees may need a parent figure where others may need a friend. It is important to know what the mentee needs. - A person's life experiences or interests can be what bonds them to another person as they are better able to relate or understand what they are going through or experiencing. - Race in itself connects people as they may share the same beliefs, cultural traditions, and prejudices against them. - (Mentor, 2010).
  11. Components of MENTORlynx are the hardware, software, communications. Each organization must have at least these three components to perform functions effectively.
  12. References