SlideShare a Scribd company logo
1 of 10
Careers in Psychology
PSY/215 Version 4
University of Phoenix Material
Interview Preparation Worksheet
Resource: Ch. 12 Careers in psychology: Opportunities in a
changing world
Provide a brief summary for each question. The word count for
individual answers may vary, but your responses should total
800 – 1000 words for the entire worksheet.
1. Tell me about yourself.
2. What can a psychology major do for this organization?
3. Why do you feel that you will be successful in this position?
4. What motivates you?
5. If I were to ask one of your professors to describe you, what
would he or she say?
6. Have you ever had a conflict with a boss or professor? How
did you resolve it?
7. Why do you want to join our organization?
8. Do you have any actual work experience in this area? How
does your background make you a fit for this job?
9. What are your strengths and weaknesses?
10. Are you a team player? Would those who have worked with
you agree? Explain.
PP
Risk Assessment Exercise--Possible guidelines
This document is meant to help you go through the steps
required for Stage 1 of your project. Use it as needed or when
needed.
IDENTIFICATION
1- What are the components of the [ORGANIZATION NAME]
system (assets)?
a. Identify and assess value, (at this early stage, we don't need
to worry about $$$ details),
b. classify and,
c. prioritize them (create a table).
Possible questions you need to be asking at this point:
· Which information asset is the most critical to the success of
[ORGANIZATION NAME]?
· Which information asset generates the most revenue?
· Which the most profitability?
· Which is the most expensive to replace? (don’t limit yourself
into thinking in terms of $$ only: time, loss productivity, etc.)
· Which would be the most expensive to protect?
· Which would be the most embarrassing or cause greatest
liability (think of all those bad lawyers) if revealed?
· Does data need to be classified? Do users need a different
security clearance (examples of users: office staff, local
nationals, lab monitors, librarian, students, faculty, etc.)
2- What are the threats these components face?
a. Identify threats (you can use the web and find current threats
or even think of some other possible threats),
b. Prioritize threats (again, table format works)
Possible questions at this point (think in terms of danger to the
company v. to the information):
· Which threats are the most dangerous to [ORGANIZATION
NAME'S] assets in the given environment?
· Which are the most dangerous to the information?
· What would cost to recover from an attack? (non-detailed
estimation of time and loss productivity),
· Which are the most expensive to prevent?
3- What are the vulnerabilities the [ORGANIZATION NAME]
system has?
a. Create a list of weaknesses you think the system has (i.e.,
human error, theft, etc.)
RISK ASSESSMENT
1- Likelihood: chance that a specific vulnerability will be
exploited(number them (for example, 0.1 low and 1.0 high).
2- Valuation of Information assets (we have these findings
earlier on (2))(assign weight (any form of scale would do).
3- Create a list of current controls (don't limit yourself to
technical ones).
4- Identify possible controls to implement.
5- Document the results of risk assessment (a table format will
do)
Extra credit: Are data confidentiality, integrity and availability
protected?
PP
Risk Assessment Exercise--Possible guidelines
This document is meant to help you go through the steps
required for Stage 1 of your project. Use it as needed or when
needed.
IDENTIFICATION
1- What are the components of the [ORGANIZATION NAME]
system (assets)?
a. Identify and assess value, (at this early stage, we don't need
to worry about $$$ details),
b. classify and,
c. prioritize them (create a table).
Possible questions you need to be asking at this point:
· Which information asset is the most critical to the success of
[ORGANIZATION NAME]?
· Which information asset generates the most revenue?
· Which the most profitability?
· Which is the most expensive to replace? (don’t limit yourself
into thinking in terms of $$ only: time, loss productivity, etc.)
· Which would be the most expensive to protect?
· Which would be the most embarrassing or cause greatest
liability (think of all those bad lawyers) if revealed?
· Does data need to be classified? Do users need a different
security clearance (examples of users: office staff, local
nationals, lab monitors, librarian, students, faculty, etc.)
2- What are the threats these components face?
a. Identify threats (you can use the web and find current threats
or even think of some other possible threats),
b. Prioritize threats (again, table format works)
Possible questions at this point (think in terms of danger to the
company v. to the information):
· Which threats are the most dangerous to [ORGANIZATION
NAME'S] assets in the given environment?
· Which are the most dangerous to the information?
· What would cost to recover from an attack? (non-detailed
estimation of time and loss productivity),
· Which are the most expensive to prevent?
3- What are the vulnerabilities the [ORGANIZATION NAME]
system has?
a. Create a list of weaknesses you think the system has (i.e.,
human error, theft, etc.)
RISK ASSESSMENT
1- Likelihood: chance that a specific vulnerability will be
exploited(number them (for example, 0.1 low and 1.0 high).
2- Valuation of Information assets (we have these findings
earlier on (2))(assign weight (any form of scale would do).
3- Create a list of current controls (don't limit yourself to
technical ones).
4- Identify possible controls to implement.
5- Document the results of risk assessment (a table format will
do)
Extra credit: Are data confidentiality, integrity and availability
protected?
The following is the scenario you are to use for your individual
analysis assignment and your team project.
Joan Wilson was hurriedly leaving the office of Raymond
Pressly, the Chairman and CEO of MailPress Corporation. As
the newly hired CIO she had not expected her second meeting
with Mr. Pressly would be so soon or under such disturbing
circumstances. Mr. Pressly had been waiting for her arrival in
this morning with the news of the fire at End Point, Inc. last
week. End Point provided web hosting services for a number of
companies in the Pittsburgh area including the local Steel City
Arena Football Team to which Mr. Press had an ownership
stake. The fire had been devastating, turning the 75 servers in
the web hosting data center into a mass of melted plastic and
metal. “It has been seven days and the Steel City’s website is
still down and so are our opening day ticket sales.” Mr. Press
had stated in the call that brought Joan to the 8:00 am meeting.
“What would we do if something like that happened here?” he
asked.
Joan Wilson had asked her Executive Assistant to grab a copy
of the company’s Business Recovery Plan so she could bring it
to her meeting with Mr. Pressly. It only took about two minutes
for Mr. Pressly to realize that the plan was written before the
merger with Flair Mail Marketing three years ago, which had
more than doubled the size of MailPress. Not only did it fail to
cover the company in full but the changes to the business
practices and support systems, in particular the move to the
Internet and World Wide Web, were not even discussed.
Further, while the plan was strong on Disaster Recovery for
situations such as that at End Point, it was almost silent on
Business Continuity. The one advantage to being on the job for
four weeks was she was not the focus of Mr. Pressly’s ire. On
the other hand she quickly realized that she was not
knowledgeable enough of the company’s operations to update
this plan without significant involvement from the various
departments in the company.
MailPress Corporation is a mail marketing /web advertising
company operating seven different facilities in four states. The
company has over 2000 clients of varying sizes and portfolios.
Mail marketing involves mailing and distribution of advertising
as well as promotional products ordered through the mail,
television or Internet. Net income last year exceeded 100
million dollars for the first time in spite of the economic
situation. There are currently about 6200 employees, with 800
headquartered in Pittsburgh, Pennsylvania. Its largest
operations are in Canton, Ohio and Baltimore, Maryland with
3100 and 1800 employees in each area respectively. The
merger with Flair Mail occurred 27 months ago. Although
financial data has been directed to the headquarters datacenter,
operational data is still retained at three locations in Canton,
Baltimore and Pittsburgh. Each facility is supported by the
geographically closest data center with three in Ohio, two in
Maryland and two in Pennsylvania.
Over the past two years the major focus of the IT department
has been to standardize the IT infrastructure and software across
the company. Human Resources, Accounting and Payroll have
been centralized in Pittsburgh as have been all of the web server
operations. Marketing and Operations have been standardized
but data are unique at each hub location where data centers
reside. Select data for the Corporate MIS is automatically fed
from the hubs. Although there were a few hurdles in
implementing the current environment, for the past three months
things have been working quite smoothly which probably in part
resulted in Wilson’s predecessor’s decision to retire. Joan
Wilson had been looking to further consolidate Marketing and
Operations before this latest discussion with Mr. Pressly who
highlighted a much more pressing issue, the disaster recovery
planning.
At the 2 PM Executive Council Meeting, this became the
number one issue on Mr. Pressly’s agenda. Wilson was asked
what she needed to make this happen. Wilson would assign her
sharpest project manager to lead a focus group to update the
Company’s Disaster Recovery Plan and to develop an effective
Business Continuity Plan given the current and projected future
operational environment and needs. She highlighted the need
for the executives of each department to assign a knowledgeable
expert to assist in this effort. She made it clear that these
individuals will need to be empowered to obtain the support
necessary from their counterparts anywhere in the
organization. Mr. Pressly endorsed Wilson’s initiative and
informed the Council that next month’s key agenda item would
be to review the completed plan for implementation costs and
schedule.
GRADING RUBRIC:
Phase
Full Points
Partial Points
No points
Possible Points
Phase 1
Risk Assessment
Part I Individual
Part II Group
Analysis identifies key risks for each business area completing
the template for each element, demonstrating understanding of
course concepts, analysis and critical thinking.
Analysis is incomplete either by lack of critical risk areas
and/or lacks definitions and/or explanations / weightings for
each; and may indicate a lack of understanding of course
concepts, analysis, and/or critical thinking.
Analysis not included, or does not identify any requirements.
Part I - 15 points
Part II - 15 points
Phase 2
Draft DRP/BCP
The plans incorporate the key elements identified in Phase I,
complete with mitigation strategies demonstrating
understanding of course concepts, analysis and critical
thinking.
The plans are partially appropriate and/or partially explained.
It may only partially address critical aspects associated with DR
or BC planning.
No technology solution provided.
15 points
Phase 3
Execute the BCP/DRP
2 elements – plan and the evaluation
The plans successfully address the test scenario and effectively
protect the business operations to the extent possible.
The evaluation by the testing group provides the rationale for
noted findings and any recommendations for improvement.
The plans are not sufficiently well defined or appropriate to
successfully address the scenario. May be lacking in
demonstration of understanding of course concepts, analysis,
and/or critical thinking.
Evaluations fail to adequately justify any finding or
shortcoming in the plan.
The BCP/DRP does not address any element to enable
successfully addressing the scenario.
Evaluation does not add value in any respect to the plan,
regardless of test outcome.
10 points for the plan
5 points for the evaluation
Phase 4
Final DRP/BCP
The final plans submission include graphics and references,
rationale on recommendations that were or were not
incorporated, and observations and lessons learned through the
prior three phases.
Elements are missing or only partially explained or
substantiated. Inappropriately cited or missing references.
No changes from the draft plan submitted in Phase 2.
10 points
TOTAL Points
70
Sheet1Project NamePrepared ByDateProblem Area or
ActivityKey ProcessesAccounting and
PayrollPayrollContractsTravelReporting/Compliance

More Related Content

Similar to Careers in PsychologyPSY215 Version 4University of Phoeni.docx

National Honor Society Leadership Examples. Natio
National Honor Society Leadership Examples. NatioNational Honor Society Leadership Examples. Natio
National Honor Society Leadership Examples. NatioLori Mitchell
 
4020 Crews .docx
4020 Crews                                                        .docx4020 Crews                                                        .docx
4020 Crews .docxBHANU281672
 
How To Write A College Level Research Paper
How To Write A College Level Research PaperHow To Write A College Level Research Paper
How To Write A College Level Research PaperLori Gilbert
 
FINC 355Whats Retirement Needs Analysis1. Discuss the proces.docx
FINC 355Whats Retirement Needs Analysis1. Discuss the proces.docxFINC 355Whats Retirement Needs Analysis1. Discuss the proces.docx
FINC 355Whats Retirement Needs Analysis1. Discuss the proces.docxvoversbyobersby
 
How To Structure A Paragraph In An Academic Essay
How To Structure A Paragraph In An Academic EssayHow To Structure A Paragraph In An Academic Essay
How To Structure A Paragraph In An Academic EssaySusan Cox
 
Jenkins idj article 2010 - final
Jenkins   idj article 2010 - finalJenkins   idj article 2010 - final
Jenkins idj article 2010 - finalJulian Jenkins
 
Data Science Popup Austin: Conflict in Growing Data Science Organizations
Data Science Popup Austin: Conflict in Growing Data Science Organizations Data Science Popup Austin: Conflict in Growing Data Science Organizations
Data Science Popup Austin: Conflict in Growing Data Science Organizations Domino Data Lab
 

Similar to Careers in PsychologyPSY215 Version 4University of Phoeni.docx (9)

National Honor Society Leadership Examples. Natio
National Honor Society Leadership Examples. NatioNational Honor Society Leadership Examples. Natio
National Honor Society Leadership Examples. Natio
 
Jim Barton
Jim BartonJim Barton
Jim Barton
 
4020 Crews .docx
4020 Crews                                                        .docx4020 Crews                                                        .docx
4020 Crews .docx
 
How To Write A College Level Research Paper
How To Write A College Level Research PaperHow To Write A College Level Research Paper
How To Write A College Level Research Paper
 
Saucier_Jonathon_Resume
Saucier_Jonathon_ResumeSaucier_Jonathon_Resume
Saucier_Jonathon_Resume
 
FINC 355Whats Retirement Needs Analysis1. Discuss the proces.docx
FINC 355Whats Retirement Needs Analysis1. Discuss the proces.docxFINC 355Whats Retirement Needs Analysis1. Discuss the proces.docx
FINC 355Whats Retirement Needs Analysis1. Discuss the proces.docx
 
How To Structure A Paragraph In An Academic Essay
How To Structure A Paragraph In An Academic EssayHow To Structure A Paragraph In An Academic Essay
How To Structure A Paragraph In An Academic Essay
 
Jenkins idj article 2010 - final
Jenkins   idj article 2010 - finalJenkins   idj article 2010 - final
Jenkins idj article 2010 - final
 
Data Science Popup Austin: Conflict in Growing Data Science Organizations
Data Science Popup Austin: Conflict in Growing Data Science Organizations Data Science Popup Austin: Conflict in Growing Data Science Organizations
Data Science Popup Austin: Conflict in Growing Data Science Organizations
 

More from wendolynhalbert

What appropriate sources of information did you use in finding your .docx
What appropriate sources of information did you use in finding your .docxWhat appropriate sources of information did you use in finding your .docx
What appropriate sources of information did you use in finding your .docxwendolynhalbert
 
Western Civilization before The Thirty Years WarInstructions .docx
Western Civilization before The Thirty Years WarInstructions .docxWestern Civilization before The Thirty Years WarInstructions .docx
Western Civilization before The Thirty Years WarInstructions .docxwendolynhalbert
 
Western Civilization – Week 7 Discussion ForumPlease choose just o.docx
Western Civilization – Week 7 Discussion ForumPlease choose just o.docxWestern Civilization – Week 7 Discussion ForumPlease choose just o.docx
Western Civilization – Week 7 Discussion ForumPlease choose just o.docxwendolynhalbert
 
Wendy was addicted to her morning cup of coffee.  She had one cup be.docx
Wendy was addicted to her morning cup of coffee.  She had one cup be.docxWendy was addicted to her morning cup of coffee.  She had one cup be.docx
Wendy was addicted to her morning cup of coffee.  She had one cup be.docxwendolynhalbert
 
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docxWEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docxwendolynhalbert
 
Week 8The Trouble with Aid Please respond to the following.docx
Week 8The Trouble with Aid Please respond to the following.docxWeek 8The Trouble with Aid Please respond to the following.docx
Week 8The Trouble with Aid Please respond to the following.docxwendolynhalbert
 
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docxWeek 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docxwendolynhalbert
 
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docxWeek1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docxwendolynhalbert
 
Week 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docxWeek 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docxwendolynhalbert
 
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docxWEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docxwendolynhalbert
 
weeks Discussion link in the left navigation.Description and .docx
weeks Discussion link in the left navigation.Description and .docxweeks Discussion link in the left navigation.Description and .docx
weeks Discussion link in the left navigation.Description and .docxwendolynhalbert
 
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docxWeek1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docxwendolynhalbert
 
Week-2Here I attached two file. First one is poem file. In thi.docx
Week-2Here I attached two file. First one is poem file. In thi.docxWeek-2Here I attached two file. First one is poem file. In thi.docx
Week-2Here I attached two file. First one is poem file. In thi.docxwendolynhalbert
 
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docxWeek 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docxwendolynhalbert
 
Week4 Project Human Resources and Procurement Management.docx
Week4 Project Human Resources and Procurement Management.docxWeek4 Project Human Resources and Procurement Management.docx
Week4 Project Human Resources and Procurement Management.docxwendolynhalbert
 
Week4 DiscussionWireless CommunicationsSupporting Activity.docx
Week4 DiscussionWireless CommunicationsSupporting Activity.docxWeek4 DiscussionWireless CommunicationsSupporting Activity.docx
Week4 DiscussionWireless CommunicationsSupporting Activity.docxwendolynhalbert
 
Week3 Project Cost and Quality ManagementSupporting .docx
Week3 Project Cost and Quality ManagementSupporting .docxWeek3 Project Cost and Quality ManagementSupporting .docx
Week3 Project Cost and Quality ManagementSupporting .docxwendolynhalbert
 
Week Two IndividualReliability and ValidityWrite a 1,0.docx
Week Two IndividualReliability and ValidityWrite a 1,0.docxWeek Two IndividualReliability and ValidityWrite a 1,0.docx
Week Two IndividualReliability and ValidityWrite a 1,0.docxwendolynhalbert
 
Week 7 DiscussionDiversity in the work environment promotes ac.docx
Week 7 DiscussionDiversity in the work environment promotes ac.docxWeek 7 DiscussionDiversity in the work environment promotes ac.docx
Week 7 DiscussionDiversity in the work environment promotes ac.docxwendolynhalbert
 
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docxWeek Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docxwendolynhalbert
 

More from wendolynhalbert (20)

What appropriate sources of information did you use in finding your .docx
What appropriate sources of information did you use in finding your .docxWhat appropriate sources of information did you use in finding your .docx
What appropriate sources of information did you use in finding your .docx
 
Western Civilization before The Thirty Years WarInstructions .docx
Western Civilization before The Thirty Years WarInstructions .docxWestern Civilization before The Thirty Years WarInstructions .docx
Western Civilization before The Thirty Years WarInstructions .docx
 
Western Civilization – Week 7 Discussion ForumPlease choose just o.docx
Western Civilization – Week 7 Discussion ForumPlease choose just o.docxWestern Civilization – Week 7 Discussion ForumPlease choose just o.docx
Western Civilization – Week 7 Discussion ForumPlease choose just o.docx
 
Wendy was addicted to her morning cup of coffee.  She had one cup be.docx
Wendy was addicted to her morning cup of coffee.  She had one cup be.docxWendy was addicted to her morning cup of coffee.  She had one cup be.docx
Wendy was addicted to her morning cup of coffee.  She had one cup be.docx
 
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docxWEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
WEEK 8 – EXERCISESEnter your answers in the spaces pro.docx
 
Week 8The Trouble with Aid Please respond to the following.docx
Week 8The Trouble with Aid Please respond to the following.docxWeek 8The Trouble with Aid Please respond to the following.docx
Week 8The Trouble with Aid Please respond to the following.docx
 
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docxWeek 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
Week 8 Assignment 2 SubmissionInstructionsIf you are usi.docx
 
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docxWeek1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
Week1Writing SituationsOct 21 - Oct 27   15 pointsTasks.docx
 
Week 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docxWeek 8 -- Provide an example of some form of misrepresentation in me.docx
Week 8 -- Provide an example of some form of misrepresentation in me.docx
 
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docxWEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
WEEK 7 – EXERCISES Enter your answers in the spaces pr.docx
 
weeks Discussion link in the left navigation.Description and .docx
weeks Discussion link in the left navigation.Description and .docxweeks Discussion link in the left navigation.Description and .docx
weeks Discussion link in the left navigation.Description and .docx
 
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docxWeek1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
Week1. Basics of Critical Thinking. 7 daysWeek1Basics of Critica.docx
 
Week-2Here I attached two file. First one is poem file. In thi.docx
Week-2Here I attached two file. First one is poem file. In thi.docxWeek-2Here I attached two file. First one is poem file. In thi.docx
Week-2Here I attached two file. First one is poem file. In thi.docx
 
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docxWeek 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
Week 7 Exercise Prosocial BehaviorMuch of what we tend to focus.docx
 
Week4 Project Human Resources and Procurement Management.docx
Week4 Project Human Resources and Procurement Management.docxWeek4 Project Human Resources and Procurement Management.docx
Week4 Project Human Resources and Procurement Management.docx
 
Week4 DiscussionWireless CommunicationsSupporting Activity.docx
Week4 DiscussionWireless CommunicationsSupporting Activity.docxWeek4 DiscussionWireless CommunicationsSupporting Activity.docx
Week4 DiscussionWireless CommunicationsSupporting Activity.docx
 
Week3 Project Cost and Quality ManagementSupporting .docx
Week3 Project Cost and Quality ManagementSupporting .docxWeek3 Project Cost and Quality ManagementSupporting .docx
Week3 Project Cost and Quality ManagementSupporting .docx
 
Week Two IndividualReliability and ValidityWrite a 1,0.docx
Week Two IndividualReliability and ValidityWrite a 1,0.docxWeek Two IndividualReliability and ValidityWrite a 1,0.docx
Week Two IndividualReliability and ValidityWrite a 1,0.docx
 
Week 7 DiscussionDiversity in the work environment promotes ac.docx
Week 7 DiscussionDiversity in the work environment promotes ac.docxWeek 7 DiscussionDiversity in the work environment promotes ac.docx
Week 7 DiscussionDiversity in the work environment promotes ac.docx
 
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docxWeek Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
Week Lecture - Evaluating the Quality of Financial ReportsThe coll.docx
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

Careers in PsychologyPSY215 Version 4University of Phoeni.docx

  • 1. Careers in Psychology PSY/215 Version 4 University of Phoenix Material Interview Preparation Worksheet Resource: Ch. 12 Careers in psychology: Opportunities in a changing world Provide a brief summary for each question. The word count for individual answers may vary, but your responses should total 800 – 1000 words for the entire worksheet. 1. Tell me about yourself. 2. What can a psychology major do for this organization? 3. Why do you feel that you will be successful in this position? 4. What motivates you? 5. If I were to ask one of your professors to describe you, what would he or she say? 6. Have you ever had a conflict with a boss or professor? How did you resolve it? 7. Why do you want to join our organization? 8. Do you have any actual work experience in this area? How does your background make you a fit for this job? 9. What are your strengths and weaknesses? 10. Are you a team player? Would those who have worked with you agree? Explain. PP
  • 2. Risk Assessment Exercise--Possible guidelines This document is meant to help you go through the steps required for Stage 1 of your project. Use it as needed or when needed. IDENTIFICATION 1- What are the components of the [ORGANIZATION NAME] system (assets)? a. Identify and assess value, (at this early stage, we don't need to worry about $$$ details), b. classify and, c. prioritize them (create a table). Possible questions you need to be asking at this point: · Which information asset is the most critical to the success of [ORGANIZATION NAME]? · Which information asset generates the most revenue? · Which the most profitability? · Which is the most expensive to replace? (don’t limit yourself into thinking in terms of $$ only: time, loss productivity, etc.) · Which would be the most expensive to protect? · Which would be the most embarrassing or cause greatest liability (think of all those bad lawyers) if revealed? · Does data need to be classified? Do users need a different
  • 3. security clearance (examples of users: office staff, local nationals, lab monitors, librarian, students, faculty, etc.) 2- What are the threats these components face? a. Identify threats (you can use the web and find current threats or even think of some other possible threats), b. Prioritize threats (again, table format works) Possible questions at this point (think in terms of danger to the company v. to the information): · Which threats are the most dangerous to [ORGANIZATION NAME'S] assets in the given environment? · Which are the most dangerous to the information? · What would cost to recover from an attack? (non-detailed estimation of time and loss productivity), · Which are the most expensive to prevent? 3- What are the vulnerabilities the [ORGANIZATION NAME] system has? a. Create a list of weaknesses you think the system has (i.e., human error, theft, etc.) RISK ASSESSMENT 1- Likelihood: chance that a specific vulnerability will be exploited(number them (for example, 0.1 low and 1.0 high). 2- Valuation of Information assets (we have these findings earlier on (2))(assign weight (any form of scale would do). 3- Create a list of current controls (don't limit yourself to technical ones).
  • 4. 4- Identify possible controls to implement. 5- Document the results of risk assessment (a table format will do) Extra credit: Are data confidentiality, integrity and availability protected? PP Risk Assessment Exercise--Possible guidelines This document is meant to help you go through the steps required for Stage 1 of your project. Use it as needed or when needed. IDENTIFICATION 1- What are the components of the [ORGANIZATION NAME] system (assets)? a. Identify and assess value, (at this early stage, we don't need to worry about $$$ details), b. classify and, c. prioritize them (create a table). Possible questions you need to be asking at this point: · Which information asset is the most critical to the success of [ORGANIZATION NAME]? · Which information asset generates the most revenue? · Which the most profitability?
  • 5. · Which is the most expensive to replace? (don’t limit yourself into thinking in terms of $$ only: time, loss productivity, etc.) · Which would be the most expensive to protect? · Which would be the most embarrassing or cause greatest liability (think of all those bad lawyers) if revealed? · Does data need to be classified? Do users need a different security clearance (examples of users: office staff, local nationals, lab monitors, librarian, students, faculty, etc.) 2- What are the threats these components face? a. Identify threats (you can use the web and find current threats or even think of some other possible threats), b. Prioritize threats (again, table format works) Possible questions at this point (think in terms of danger to the company v. to the information): · Which threats are the most dangerous to [ORGANIZATION NAME'S] assets in the given environment? · Which are the most dangerous to the information? · What would cost to recover from an attack? (non-detailed estimation of time and loss productivity), · Which are the most expensive to prevent? 3- What are the vulnerabilities the [ORGANIZATION NAME] system has? a. Create a list of weaknesses you think the system has (i.e.,
  • 6. human error, theft, etc.) RISK ASSESSMENT 1- Likelihood: chance that a specific vulnerability will be exploited(number them (for example, 0.1 low and 1.0 high). 2- Valuation of Information assets (we have these findings earlier on (2))(assign weight (any form of scale would do). 3- Create a list of current controls (don't limit yourself to technical ones). 4- Identify possible controls to implement. 5- Document the results of risk assessment (a table format will do) Extra credit: Are data confidentiality, integrity and availability protected? The following is the scenario you are to use for your individual analysis assignment and your team project. Joan Wilson was hurriedly leaving the office of Raymond Pressly, the Chairman and CEO of MailPress Corporation. As the newly hired CIO she had not expected her second meeting with Mr. Pressly would be so soon or under such disturbing circumstances. Mr. Pressly had been waiting for her arrival in this morning with the news of the fire at End Point, Inc. last week. End Point provided web hosting services for a number of companies in the Pittsburgh area including the local Steel City Arena Football Team to which Mr. Press had an ownership stake. The fire had been devastating, turning the 75 servers in the web hosting data center into a mass of melted plastic and metal. “It has been seven days and the Steel City’s website is still down and so are our opening day ticket sales.” Mr. Press had stated in the call that brought Joan to the 8:00 am meeting. “What would we do if something like that happened here?” he asked.
  • 7. Joan Wilson had asked her Executive Assistant to grab a copy of the company’s Business Recovery Plan so she could bring it to her meeting with Mr. Pressly. It only took about two minutes for Mr. Pressly to realize that the plan was written before the merger with Flair Mail Marketing three years ago, which had more than doubled the size of MailPress. Not only did it fail to cover the company in full but the changes to the business practices and support systems, in particular the move to the Internet and World Wide Web, were not even discussed. Further, while the plan was strong on Disaster Recovery for situations such as that at End Point, it was almost silent on Business Continuity. The one advantage to being on the job for four weeks was she was not the focus of Mr. Pressly’s ire. On the other hand she quickly realized that she was not knowledgeable enough of the company’s operations to update this plan without significant involvement from the various departments in the company. MailPress Corporation is a mail marketing /web advertising company operating seven different facilities in four states. The company has over 2000 clients of varying sizes and portfolios. Mail marketing involves mailing and distribution of advertising as well as promotional products ordered through the mail, television or Internet. Net income last year exceeded 100 million dollars for the first time in spite of the economic situation. There are currently about 6200 employees, with 800 headquartered in Pittsburgh, Pennsylvania. Its largest operations are in Canton, Ohio and Baltimore, Maryland with 3100 and 1800 employees in each area respectively. The merger with Flair Mail occurred 27 months ago. Although financial data has been directed to the headquarters datacenter, operational data is still retained at three locations in Canton, Baltimore and Pittsburgh. Each facility is supported by the geographically closest data center with three in Ohio, two in Maryland and two in Pennsylvania. Over the past two years the major focus of the IT department has been to standardize the IT infrastructure and software across
  • 8. the company. Human Resources, Accounting and Payroll have been centralized in Pittsburgh as have been all of the web server operations. Marketing and Operations have been standardized but data are unique at each hub location where data centers reside. Select data for the Corporate MIS is automatically fed from the hubs. Although there were a few hurdles in implementing the current environment, for the past three months things have been working quite smoothly which probably in part resulted in Wilson’s predecessor’s decision to retire. Joan Wilson had been looking to further consolidate Marketing and Operations before this latest discussion with Mr. Pressly who highlighted a much more pressing issue, the disaster recovery planning. At the 2 PM Executive Council Meeting, this became the number one issue on Mr. Pressly’s agenda. Wilson was asked what she needed to make this happen. Wilson would assign her sharpest project manager to lead a focus group to update the Company’s Disaster Recovery Plan and to develop an effective Business Continuity Plan given the current and projected future operational environment and needs. She highlighted the need for the executives of each department to assign a knowledgeable expert to assist in this effort. She made it clear that these individuals will need to be empowered to obtain the support necessary from their counterparts anywhere in the organization. Mr. Pressly endorsed Wilson’s initiative and informed the Council that next month’s key agenda item would be to review the completed plan for implementation costs and schedule. GRADING RUBRIC: Phase Full Points Partial Points No points Possible Points Phase 1 Risk Assessment
  • 9. Part I Individual Part II Group Analysis identifies key risks for each business area completing the template for each element, demonstrating understanding of course concepts, analysis and critical thinking. Analysis is incomplete either by lack of critical risk areas and/or lacks definitions and/or explanations / weightings for each; and may indicate a lack of understanding of course concepts, analysis, and/or critical thinking. Analysis not included, or does not identify any requirements. Part I - 15 points Part II - 15 points Phase 2 Draft DRP/BCP The plans incorporate the key elements identified in Phase I, complete with mitigation strategies demonstrating understanding of course concepts, analysis and critical thinking. The plans are partially appropriate and/or partially explained. It may only partially address critical aspects associated with DR or BC planning. No technology solution provided. 15 points Phase 3 Execute the BCP/DRP 2 elements – plan and the evaluation The plans successfully address the test scenario and effectively protect the business operations to the extent possible. The evaluation by the testing group provides the rationale for noted findings and any recommendations for improvement. The plans are not sufficiently well defined or appropriate to successfully address the scenario. May be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking. Evaluations fail to adequately justify any finding or
  • 10. shortcoming in the plan. The BCP/DRP does not address any element to enable successfully addressing the scenario. Evaluation does not add value in any respect to the plan, regardless of test outcome. 10 points for the plan 5 points for the evaluation Phase 4 Final DRP/BCP The final plans submission include graphics and references, rationale on recommendations that were or were not incorporated, and observations and lessons learned through the prior three phases. Elements are missing or only partially explained or substantiated. Inappropriately cited or missing references. No changes from the draft plan submitted in Phase 2. 10 points TOTAL Points 70 Sheet1Project NamePrepared ByDateProblem Area or ActivityKey ProcessesAccounting and PayrollPayrollContractsTravelReporting/Compliance