SlideShare a Scribd company logo
1 of 7
Final Project Case Study
© 2014 Laureate Education, Inc. Page 1 of 1
Working With Families: The Case of the Cooper Family
The Cooper family consists of Susan (age 42), Matthew (age
41), Savannah (age 16),
and Milton (age 9). Susan works in the computer division of a
telephone company.
Matthew is a graphic artist who runs a private business out of
their home.
There are a number of issues that precipitated a family crisis
and led them to consult
with you for counseling. Susan and Matthew are experiencing
marital problems. Susan
is a strong and achievement-oriented woman who works very
long days and makes
approximately four times the salary of Matthew. Although
Matthew takes care of the
family home and most of the children’s daily needs, he is
chronically oversensitive and
edgy about his place in the family hierarchy.
Both Susan and Matthew are somewhat perfectionistic. This
style has clearly affected
Savannah. Savannah is a straight-A student who has never even
been close to having
even the most minor school-related behavioral problem. She
loves to feel in control.
Unfortunately, she has begun obsessing not only about her
academic performance but
also about calorie counting. She has begun compulsively
exercising and weighing
herself several times a day. Both Susan and Matthew have
observed Savannah’s
hyper-concern about her weight but are at a complete loss as to
how to deal with this
problem.
Milton is the opposite of Savannah. He is slightly overweight,
will eat consistently, and
does not seem to understand the word “No.” Matthew gets calls
about his misbehavior
at school almost daily. The problems often are trivial, and
Matthew has let the school
know this, but Milton continues to get into trouble for slapping
other students, not
completing his homework, not paying attention, calling the
teacher a sexist Nazi, and
carving his initials into the bus seat. Susan and Matthew also
struggle with Milton’s
behavior at home: They cannot get him to stop playing violent
video and computer
games, and Milton is always into something, whether it is
pestering the family dog or the
next-door neighbors.
The final incident prompting counseling occurred about a week
ago. Savannah had a
large school project due on a Friday and came home from band
practice to find that
Milton had destroyed her project. After a series of wailing
screams, Savannah
proceeded to the privacy of her bedroom and began cutting on
her left arm with a pair of
scissors. The cuts were small and not dangerous, but the
incident made Susan and
Matthew panic and become desperate to “make things right
again” in their family.
Running head: DHS BUDGET 1
DHS BUDGET 4
DHS Budget Analysis
Dorothea Hooper
Robert Uda
Terrorism and Homeland Security Management
Jan 3, 2019
DHS Budget Analysis
The report aims to determine if the Department of Homeland
Security (DHS) priorities are aligned with department priorities.
Over the years there has been a disorder on the budget process
generally leading to weak guidance by Congress. Budgeting will
help in the estimation of resources required in the future to
support the DHS agency and its activities and programs. The
agency will be able to identify and access other ways to
effectively use in accomplishing of goals. Some of the priority
has been good and various departments have received increases
in their budget while others have taken large cuts.
Priorities that provide for the required capabilities for the U.S.
to be safe from events such as cybercrime, terrorism, and
natural calamities are to be considered. The Quadrennial
Homeland Security review (HQSR) enables DHS to review and
suggest recommendations that would further increase the
collaboration within the department. The HQSR involves
analytics in the preparatory and early phases during the review
and senior awareness who should be made aware. Major
quadrennial reviews such as the quadrennial defense review and
quadrennial diplomacy and development review which are
synchronized. QSR can succeed if the government continues to
provide tools and technology to enhance policy making.
DHS has the responsibility of mitigating many threats and risk
analysis elements are part of its mandate. There are a number of
data analysis methods that DHS employs and one includes the
search tools. The search tool allows for the analyst to compare
two sets of data which in this case was the 2014 and 2015
budgets and HQSR documents (Boon, 2010). There is the
exploratory analysis tool which helps in fully understanding the
data available in order to make sense of it and decide the next
step to include. The advanced analysis tool allows for the
interpretation of data intelligently using statistics such as
hypothesis testing.
The Quadrennial Homeland Security review (HQSR) is a
strategy document for DHS and updated every four years. The
2014 HSQR updated from that of 2010 due to the strategic
environment in which key players have evolved and matured
leading to a more enhanced homeland security capabilities. The
HQSR findings show a more collaborative departmental
strategy, focused, planning and analytical capability of the
DHS. There’s a number of responsibilities that DHS shares with
many people across the state, federal, and territorial
governments. The HQSR advocated for a public-private sector
partnership since they are in constant contact with the public
and bear the responsibility for public safety and security.
The Bottom-Up Review (BUR) produces results after an
assessment of the DHS and its departments are done. The BUR
aims to align the organizational structure and the various
department activities with the goals and missions in the HSQR
(Oliver et al., 2014). The BUR finding advocates for
cohesiveness in National Protection and Programs Directorate
(NPPD) protection mission for physical and cyber
infrastructure. BUR promises to release more resources and
analytics that will improve on the identification of adversaries,
promote education on emerging cyber threats, and advancing on
strategies to deter adversaries. BUR indicates the need for new
acquisition models and the development of cyber-security
markets in the procurement process.
The strategic plan for Fiscal Years (FY) 2014-2018 for DHS
satisfied the GPRA modernization act of 2010 and the office of
management and budget’s circular A-11, part 6 of 2013
requirement. The strategic plan provides for mission and goals
of DHS which include preventing terrorism, secure and manage
borders, enforce and administer immigration laws, and secure
the cyberspace. There are strategies developed to tackle each
mission which will ensure that DHS is mature and strong. Most
of the DHS priorities are aligned to the various department
priorities and this can be seen with the intelligence reports
which are deemed satisfactory enabling customers to understand
a threat.
The President requested $38.2 billion for the Fiscal Year (FY)
2015 showing the commitment to continued security of America
and the public. The FY 2015 budget reduced from that of 2014
by more than $ 1 billion. The budget offer focuses on three
areas of homeland security which include cyber security,
efficient risk-based security, and border control and
immigration. About $ 1.25 billion was put into cyber security
activities representing an increase from $792 million in 2014
due to the increased cyber-attacks. There was the addition of
2,000 customs and border protection officers and thus the
expansion of the E-verify system which was budgeted for.
DHS departments use the HQSR in order to evaluate the current
structure and programs and adjust accordingly. The HQSR
provides for long term planning which helps in goal setting and
alignment of resources leading to effective homeland security.
BUR allows for DHS to make improvements on their current
infrastructure used in vetting and screening of individuals
(Weisbord & Janoff, 2010). The BUR identifies the budget plan
that is needed to carry out activities of DHS. The FY 2015
budget for DHS was slashed compared to the previous years but
DHS has been able to efficiently use the money that was on
offer to increase surveillance and apprehend people deemed a
threat to the U.S.
In conclusion, DHS should be given additional funds in order to
employ more border protection personnel in order to fulfill its
goal of protecting America and its citizens. The budget should
include funding for programs which allow for families to be
preserved and reunited. DHS should ensure that it works with
all stakeholders especially the private sector which has an
abundance of resources. Use of technology in the cyber security
should be employed and the government should increase its
budgeting for cyber security as criminals have become smarter
in committing fraud through the internet.
References
Boon, K. E. (2010). Discerning President Obama's national
security strategy. New York: Oxford University Press.
Oliver, W. M., Marion, N. E., & Hill, J. B. (2014). Introduction
to Homeland Security. Sudbury: Jones & Bartlett Learning,
LLC.
Weisbord, M. R., & Janoff, S. (2010). Future search: Getting
the whole system in the room for vision, commitment, and
action. San Francisco: Berrett-Koehler Publishers.
Final Project Case Study © 2014 Laureate Education, Inc.  .docx

More Related Content

Similar to Final Project Case Study © 2014 Laureate Education, Inc. .docx

Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINAL
Joseph White MPA CPM
 
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxRunning head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
joellemurphey
 
HM510Week2 AssignmentAs the assistant director of emergency
HM510Week2 AssignmentAs the assistant director of emergency HM510Week2 AssignmentAs the assistant director of emergency
HM510Week2 AssignmentAs the assistant director of emergency
SusanaFurman449
 
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mReply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
felipaser7p
 
Article one Lethal injection -electronic resource- -.docx
Article one         Lethal injection -electronic resource- -.docxArticle one         Lethal injection -electronic resource- -.docx
Article one Lethal injection -electronic resource- -.docx
noel23456789
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
ssuser454af01
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
mecklenburgstrelitzh
 
14 days agoDaniel Scott Information Technology Collapse.docx
14 days agoDaniel Scott Information Technology Collapse.docx14 days agoDaniel Scott Information Technology Collapse.docx
14 days agoDaniel Scott Information Technology Collapse.docx
drennanmicah
 
S16_MAP_Using Data Science to Model Relationships Between Educational Levels ...
S16_MAP_Using Data Science to Model Relationships Between Educational Levels ...S16_MAP_Using Data Science to Model Relationships Between Educational Levels ...
S16_MAP_Using Data Science to Model Relationships Between Educational Levels ...
Peiyun Zhang
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts are
archiejones4
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
Thomas Ewert
 
Concept PaperMHA 618DateInstructor NameRunning h.docx
Concept PaperMHA 618DateInstructor NameRunning h.docxConcept PaperMHA 618DateInstructor NameRunning h.docx
Concept PaperMHA 618DateInstructor NameRunning h.docx
donnajames55
 
Week Three– The Six Strategic ChallengesEvery four years, the De.docx
Week Three– The Six Strategic ChallengesEvery four years, the De.docxWeek Three– The Six Strategic ChallengesEvery four years, the De.docx
Week Three– The Six Strategic ChallengesEvery four years, the De.docx
philipnelson29183
 
William Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docxWilliam Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docx
ambersalomon88660
 
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docxScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
jeffsrosalyn
 

Similar to Final Project Case Study © 2014 Laureate Education, Inc. .docx (20)

Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINAL
 
Cyber Threat Intelligence Officer ODNI
Cyber Threat Intelligence Officer   ODNICyber Threat Intelligence Officer   ODNI
Cyber Threat Intelligence Officer ODNI
 
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docxRunning head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
Running head ASSIGNMENT 4ASSIGNMENT 4Assignment 4 Da.docx
 
HM510Week2 AssignmentAs the assistant director of emergency
HM510Week2 AssignmentAs the assistant director of emergency HM510Week2 AssignmentAs the assistant director of emergency
HM510Week2 AssignmentAs the assistant director of emergency
 
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so mReply to post 1 & 2 with 150 words eachPost 1It isnt so m
Reply to post 1 & 2 with 150 words eachPost 1It isnt so m
 
Article one Lethal injection -electronic resource- -.docx
Article one         Lethal injection -electronic resource- -.docxArticle one         Lethal injection -electronic resource- -.docx
Article one Lethal injection -electronic resource- -.docx
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
 
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
F e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docxF e B r U A r y  2 0 1 0      v O l .  5 3      n O .  2   .docx
F e B r U A r y 2 0 1 0 v O l . 5 3 n O . 2 .docx
 
14 days agoDaniel Scott Information Technology Collapse.docx
14 days agoDaniel Scott Information Technology Collapse.docx14 days agoDaniel Scott Information Technology Collapse.docx
14 days agoDaniel Scott Information Technology Collapse.docx
 
S16_MAP_Using Data Science to Model Relationships Between Educational Levels ...
S16_MAP_Using Data Science to Model Relationships Between Educational Levels ...S16_MAP_Using Data Science to Model Relationships Between Educational Levels ...
S16_MAP_Using Data Science to Model Relationships Between Educational Levels ...
 
SMART_Newsletter_Vol5_Iss1
SMART_Newsletter_Vol5_Iss1SMART_Newsletter_Vol5_Iss1
SMART_Newsletter_Vol5_Iss1
 
PERC Overview
PERC OverviewPERC Overview
PERC Overview
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts are
 
Prichard_WritingSample1
Prichard_WritingSample1Prichard_WritingSample1
Prichard_WritingSample1
 
Ewert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk ManagementEwert_Military Information Systems Risk Management
Ewert_Military Information Systems Risk Management
 
Concept PaperMHA 618DateInstructor NameRunning h.docx
Concept PaperMHA 618DateInstructor NameRunning h.docxConcept PaperMHA 618DateInstructor NameRunning h.docx
Concept PaperMHA 618DateInstructor NameRunning h.docx
 
Week Three– The Six Strategic ChallengesEvery four years, the De.docx
Week Three– The Six Strategic ChallengesEvery four years, the De.docxWeek Three– The Six Strategic ChallengesEvery four years, the De.docx
Week Three– The Six Strategic ChallengesEvery four years, the De.docx
 
Oh mygov gps13 final
Oh mygov gps13 finalOh mygov gps13 final
Oh mygov gps13 final
 
William Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docxWilliam Strong1. Explain what is meant by the collaborations bet.docx
William Strong1. Explain what is meant by the collaborations bet.docx
 
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docxScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
 

More from tjane3

Final Project Multimedia PresentationThe assignment is to creat.docx
Final Project Multimedia PresentationThe assignment is to creat.docxFinal Project Multimedia PresentationThe assignment is to creat.docx
Final Project Multimedia PresentationThe assignment is to creat.docx
tjane3
 
Final Project Instructions this is a 2 part assignment D3204 FIN M.docx
Final Project Instructions this is a 2 part assignment D3204 FIN M.docxFinal Project Instructions this is a 2 part assignment D3204 FIN M.docx
Final Project Instructions this is a 2 part assignment D3204 FIN M.docx
tjane3
 
Final Project Implementing Data Masking the Coca-Co.docx
Final Project Implementing Data Masking the Coca-Co.docxFinal Project Implementing Data Masking the Coca-Co.docx
Final Project Implementing Data Masking the Coca-Co.docx
tjane3
 
Final Project Implementation Assessment of Electronic Health .docx
Final Project Implementation Assessment of Electronic Health .docxFinal Project Implementation Assessment of Electronic Health .docx
Final Project Implementation Assessment of Electronic Health .docx
tjane3
 
FINAL PROJECT Case Study This project is a 10-12 page paper; doub.docx
FINAL PROJECT Case Study This project is a 10-12 page paper; doub.docxFINAL PROJECT Case Study This project is a 10-12 page paper; doub.docx
FINAL PROJECT Case Study This project is a 10-12 page paper; doub.docx
tjane3
 
Final Project Biopsychological Analysis of a Neuropsychological D.docx
Final Project Biopsychological Analysis of a Neuropsychological D.docxFinal Project Biopsychological Analysis of a Neuropsychological D.docx
Final Project Biopsychological Analysis of a Neuropsychological D.docx
tjane3
 
Final Project (Objectives 1 – 8) (30 of final grade)Select o.docx
Final Project (Objectives 1 – 8) (30 of final grade)Select o.docxFinal Project (Objectives 1 – 8) (30 of final grade)Select o.docx
Final Project (Objectives 1 – 8) (30 of final grade)Select o.docx
tjane3
 
Final Project Guidelines The Final Project for this course.docx
Final Project Guidelines The Final Project for this course.docxFinal Project Guidelines The Final Project for this course.docx
Final Project Guidelines The Final Project for this course.docx
tjane3
 
Final Project Guidelines The Final Project for this course is a .docx
Final Project Guidelines The Final Project for this course is a .docxFinal Project Guidelines The Final Project for this course is a .docx
Final Project Guidelines The Final Project for this course is a .docx
tjane3
 
Final PaperYour good friends have just adopted a four-year-o.docx
Final PaperYour good friends have just adopted a four-year-o.docxFinal PaperYour good friends have just adopted a four-year-o.docx
Final PaperYour good friends have just adopted a four-year-o.docx
tjane3
 
Final PaperYour final paper should discuss similarities and diff.docx
Final PaperYour final paper should discuss similarities and diff.docxFinal PaperYour final paper should discuss similarities and diff.docx
Final PaperYour final paper should discuss similarities and diff.docx
tjane3
 
Final Project (due 121718)Whereas the midterm asked you to be .docx
Final Project (due 121718)Whereas the midterm asked you to be .docxFinal Project (due 121718)Whereas the midterm asked you to be .docx
Final Project (due 121718)Whereas the midterm asked you to be .docx
tjane3
 
Final PaperSection Two[Of the five sections of a political sci.docx
Final PaperSection Two[Of the five sections of a political sci.docxFinal PaperSection Two[Of the five sections of a political sci.docx
Final PaperSection Two[Of the five sections of a political sci.docx
tjane3
 
Final PaperScaffold your paper around the following outline.docx
Final PaperScaffold your paper around the following outline.docxFinal PaperScaffold your paper around the following outline.docx
Final PaperScaffold your paper around the following outline.docx
tjane3
 

More from tjane3 (20)

Final Project OverviewIn the final project, you play the role of.docx
Final Project OverviewIn the final project, you play the role of.docxFinal Project OverviewIn the final project, you play the role of.docx
Final Project OverviewIn the final project, you play the role of.docx
 
Final Project Milestone #5 StakeholdersRead Stakeholder Managem.docx
Final Project Milestone #5 StakeholdersRead Stakeholder Managem.docxFinal Project Milestone #5 StakeholdersRead Stakeholder Managem.docx
Final Project Milestone #5 StakeholdersRead Stakeholder Managem.docx
 
Final Project on the surveillance state consists of two parts1 .docx
Final Project on the surveillance state consists of two parts1 .docxFinal Project on the surveillance state consists of two parts1 .docx
Final Project on the surveillance state consists of two parts1 .docx
 
Final Project Milestone #2 The Three SpheresRead Corporate So.docx
Final Project Milestone #2 The Three SpheresRead Corporate So.docxFinal Project Milestone #2 The Three SpheresRead Corporate So.docx
Final Project Milestone #2 The Three SpheresRead Corporate So.docx
 
Final Project Multimedia PresentationThe assignment is to creat.docx
Final Project Multimedia PresentationThe assignment is to creat.docxFinal Project Multimedia PresentationThe assignment is to creat.docx
Final Project Multimedia PresentationThe assignment is to creat.docx
 
Final Project Instructions this is a 2 part assignment D3204 FIN M.docx
Final Project Instructions this is a 2 part assignment D3204 FIN M.docxFinal Project Instructions this is a 2 part assignment D3204 FIN M.docx
Final Project Instructions this is a 2 part assignment D3204 FIN M.docx
 
Final Project Instructions Develop a projectpresentation of 750 to.docx
Final Project Instructions Develop a projectpresentation of 750 to.docxFinal Project Instructions Develop a projectpresentation of 750 to.docx
Final Project Instructions Develop a projectpresentation of 750 to.docx
 
Final Project Implementing Data Masking the Coca-Co.docx
Final Project Implementing Data Masking the Coca-Co.docxFinal Project Implementing Data Masking the Coca-Co.docx
Final Project Implementing Data Masking the Coca-Co.docx
 
Final Project Implementation Assessment of Electronic Health .docx
Final Project Implementation Assessment of Electronic Health .docxFinal Project Implementation Assessment of Electronic Health .docx
Final Project Implementation Assessment of Electronic Health .docx
 
FINAL PROJECT Case Study This project is a 10-12 page paper; doub.docx
FINAL PROJECT Case Study This project is a 10-12 page paper; doub.docxFINAL PROJECT Case Study This project is a 10-12 page paper; doub.docx
FINAL PROJECT Case Study This project is a 10-12 page paper; doub.docx
 
Final Project Biopsychological Analysis of a Neuropsychological D.docx
Final Project Biopsychological Analysis of a Neuropsychological D.docxFinal Project Biopsychological Analysis of a Neuropsychological D.docx
Final Project Biopsychological Analysis of a Neuropsychological D.docx
 
Final Project (Objectives 1 – 8) (30 of final grade)Select o.docx
Final Project (Objectives 1 – 8) (30 of final grade)Select o.docxFinal Project (Objectives 1 – 8) (30 of final grade)Select o.docx
Final Project (Objectives 1 – 8) (30 of final grade)Select o.docx
 
Final Project Guidelines The Final Project for this course.docx
Final Project Guidelines The Final Project for this course.docxFinal Project Guidelines The Final Project for this course.docx
Final Project Guidelines The Final Project for this course.docx
 
Final Project Guidelines The Final Project for this course is a .docx
Final Project Guidelines The Final Project for this course is a .docxFinal Project Guidelines The Final Project for this course is a .docx
Final Project Guidelines The Final Project for this course is a .docx
 
Final Presentation – Interpersonal Communication, Managing Conflict,.docx
Final Presentation – Interpersonal Communication, Managing Conflict,.docxFinal Presentation – Interpersonal Communication, Managing Conflict,.docx
Final Presentation – Interpersonal Communication, Managing Conflict,.docx
 
Final PaperYour good friends have just adopted a four-year-o.docx
Final PaperYour good friends have just adopted a four-year-o.docxFinal PaperYour good friends have just adopted a four-year-o.docx
Final PaperYour good friends have just adopted a four-year-o.docx
 
Final PaperYour final paper should discuss similarities and diff.docx
Final PaperYour final paper should discuss similarities and diff.docxFinal PaperYour final paper should discuss similarities and diff.docx
Final PaperYour final paper should discuss similarities and diff.docx
 
Final Project (due 121718)Whereas the midterm asked you to be .docx
Final Project (due 121718)Whereas the midterm asked you to be .docxFinal Project (due 121718)Whereas the midterm asked you to be .docx
Final Project (due 121718)Whereas the midterm asked you to be .docx
 
Final PaperSection Two[Of the five sections of a political sci.docx
Final PaperSection Two[Of the five sections of a political sci.docxFinal PaperSection Two[Of the five sections of a political sci.docx
Final PaperSection Two[Of the five sections of a political sci.docx
 
Final PaperScaffold your paper around the following outline.docx
Final PaperScaffold your paper around the following outline.docxFinal PaperScaffold your paper around the following outline.docx
Final PaperScaffold your paper around the following outline.docx
 

Recently uploaded

會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Recently uploaded (20)

Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 

Final Project Case Study © 2014 Laureate Education, Inc. .docx

  • 1. Final Project Case Study © 2014 Laureate Education, Inc. Page 1 of 1 Working With Families: The Case of the Cooper Family The Cooper family consists of Susan (age 42), Matthew (age 41), Savannah (age 16), and Milton (age 9). Susan works in the computer division of a telephone company. Matthew is a graphic artist who runs a private business out of their home. There are a number of issues that precipitated a family crisis and led them to consult with you for counseling. Susan and Matthew are experiencing marital problems. Susan is a strong and achievement-oriented woman who works very long days and makes approximately four times the salary of Matthew. Although Matthew takes care of the family home and most of the children’s daily needs, he is chronically oversensitive and edgy about his place in the family hierarchy. Both Susan and Matthew are somewhat perfectionistic. This style has clearly affected Savannah. Savannah is a straight-A student who has never even been close to having even the most minor school-related behavioral problem. She loves to feel in control.
  • 2. Unfortunately, she has begun obsessing not only about her academic performance but also about calorie counting. She has begun compulsively exercising and weighing herself several times a day. Both Susan and Matthew have observed Savannah’s hyper-concern about her weight but are at a complete loss as to how to deal with this problem. Milton is the opposite of Savannah. He is slightly overweight, will eat consistently, and does not seem to understand the word “No.” Matthew gets calls about his misbehavior at school almost daily. The problems often are trivial, and Matthew has let the school know this, but Milton continues to get into trouble for slapping other students, not completing his homework, not paying attention, calling the teacher a sexist Nazi, and carving his initials into the bus seat. Susan and Matthew also struggle with Milton’s behavior at home: They cannot get him to stop playing violent video and computer games, and Milton is always into something, whether it is pestering the family dog or the next-door neighbors. The final incident prompting counseling occurred about a week ago. Savannah had a large school project due on a Friday and came home from band practice to find that Milton had destroyed her project. After a series of wailing screams, Savannah proceeded to the privacy of her bedroom and began cutting on her left arm with a pair of
  • 3. scissors. The cuts were small and not dangerous, but the incident made Susan and Matthew panic and become desperate to “make things right again” in their family. Running head: DHS BUDGET 1 DHS BUDGET 4 DHS Budget Analysis Dorothea Hooper Robert Uda Terrorism and Homeland Security Management Jan 3, 2019 DHS Budget Analysis The report aims to determine if the Department of Homeland Security (DHS) priorities are aligned with department priorities. Over the years there has been a disorder on the budget process generally leading to weak guidance by Congress. Budgeting will help in the estimation of resources required in the future to support the DHS agency and its activities and programs. The agency will be able to identify and access other ways to effectively use in accomplishing of goals. Some of the priority has been good and various departments have received increases in their budget while others have taken large cuts.
  • 4. Priorities that provide for the required capabilities for the U.S. to be safe from events such as cybercrime, terrorism, and natural calamities are to be considered. The Quadrennial Homeland Security review (HQSR) enables DHS to review and suggest recommendations that would further increase the collaboration within the department. The HQSR involves analytics in the preparatory and early phases during the review and senior awareness who should be made aware. Major quadrennial reviews such as the quadrennial defense review and quadrennial diplomacy and development review which are synchronized. QSR can succeed if the government continues to provide tools and technology to enhance policy making. DHS has the responsibility of mitigating many threats and risk analysis elements are part of its mandate. There are a number of data analysis methods that DHS employs and one includes the search tools. The search tool allows for the analyst to compare two sets of data which in this case was the 2014 and 2015 budgets and HQSR documents (Boon, 2010). There is the exploratory analysis tool which helps in fully understanding the data available in order to make sense of it and decide the next step to include. The advanced analysis tool allows for the interpretation of data intelligently using statistics such as hypothesis testing. The Quadrennial Homeland Security review (HQSR) is a strategy document for DHS and updated every four years. The 2014 HSQR updated from that of 2010 due to the strategic environment in which key players have evolved and matured leading to a more enhanced homeland security capabilities. The HQSR findings show a more collaborative departmental strategy, focused, planning and analytical capability of the DHS. There’s a number of responsibilities that DHS shares with many people across the state, federal, and territorial governments. The HQSR advocated for a public-private sector partnership since they are in constant contact with the public and bear the responsibility for public safety and security.
  • 5. The Bottom-Up Review (BUR) produces results after an assessment of the DHS and its departments are done. The BUR aims to align the organizational structure and the various department activities with the goals and missions in the HSQR (Oliver et al., 2014). The BUR finding advocates for cohesiveness in National Protection and Programs Directorate (NPPD) protection mission for physical and cyber infrastructure. BUR promises to release more resources and analytics that will improve on the identification of adversaries, promote education on emerging cyber threats, and advancing on strategies to deter adversaries. BUR indicates the need for new acquisition models and the development of cyber-security markets in the procurement process. The strategic plan for Fiscal Years (FY) 2014-2018 for DHS satisfied the GPRA modernization act of 2010 and the office of management and budget’s circular A-11, part 6 of 2013 requirement. The strategic plan provides for mission and goals of DHS which include preventing terrorism, secure and manage borders, enforce and administer immigration laws, and secure the cyberspace. There are strategies developed to tackle each mission which will ensure that DHS is mature and strong. Most of the DHS priorities are aligned to the various department priorities and this can be seen with the intelligence reports which are deemed satisfactory enabling customers to understand a threat. The President requested $38.2 billion for the Fiscal Year (FY) 2015 showing the commitment to continued security of America and the public. The FY 2015 budget reduced from that of 2014 by more than $ 1 billion. The budget offer focuses on three areas of homeland security which include cyber security, efficient risk-based security, and border control and immigration. About $ 1.25 billion was put into cyber security activities representing an increase from $792 million in 2014 due to the increased cyber-attacks. There was the addition of 2,000 customs and border protection officers and thus the expansion of the E-verify system which was budgeted for.
  • 6. DHS departments use the HQSR in order to evaluate the current structure and programs and adjust accordingly. The HQSR provides for long term planning which helps in goal setting and alignment of resources leading to effective homeland security. BUR allows for DHS to make improvements on their current infrastructure used in vetting and screening of individuals (Weisbord & Janoff, 2010). The BUR identifies the budget plan that is needed to carry out activities of DHS. The FY 2015 budget for DHS was slashed compared to the previous years but DHS has been able to efficiently use the money that was on offer to increase surveillance and apprehend people deemed a threat to the U.S. In conclusion, DHS should be given additional funds in order to employ more border protection personnel in order to fulfill its goal of protecting America and its citizens. The budget should include funding for programs which allow for families to be preserved and reunited. DHS should ensure that it works with all stakeholders especially the private sector which has an abundance of resources. Use of technology in the cyber security should be employed and the government should increase its budgeting for cyber security as criminals have become smarter in committing fraud through the internet. References Boon, K. E. (2010). Discerning President Obama's national security strategy. New York: Oxford University Press. Oliver, W. M., Marion, N. E., & Hill, J. B. (2014). Introduction to Homeland Security. Sudbury: Jones & Bartlett Learning, LLC. Weisbord, M. R., & Janoff, S. (2010). Future search: Getting the whole system in the room for vision, commitment, and action. San Francisco: Berrett-Koehler Publishers.