Identify at least two of the theoretical perspectives discussed in the text (e.g., behavioristic, cognitive, social learning theory, humanist), and briefly discuss how you would address the question “Why did this happen?” that surrounds events like this from each of the perspectives you selected.

Specify some strategies teachers can use to help students cope with stressful events such as this.

Keeping communication open and letting them freely Express what they may feel . Anger, frustration, being scared, be open to outbursts a student may feel. Every student may have a different look out, or feelings towards this.

One strategy that this web page mentions is “ letting the students guide how much or little information to provide and emphasize the positive things that are available to stay safe”( National Associated of School Psychologists ,2015).

I would have intervention strategies in place with faculty, in case something as horrific as this were to occur again. Being prepared for the worse is also a good preparation. Having teachers look for signs or change in a students behavior would be good to keep documented. Andrew Golden ended up being a shooter at a school facility. Even though his father was completely shocked and in disbelief, he showed signs earlier in life of anger.. “ In first grade Andrew brought a pop gun to school filled with sand and shot a girl in the face” ( Paul G, 2000).

Identify trends that may provide insights into and assistance with coping in the aftermath of this type of tragic event.

I would start out expressing my own feelings, and hurt towards the situation. Knowing that even adults or authority figures are in pain as well, can express that we are all human, with feelings and it’s ok to hurt.

The importance of talk therapy here is going to be really important with the aftermath of this tragedy. It is important to help these students feel safe in a place where this boy use to attend their school. By having one on one sessions a person can open up with confidentiality. Dome students may do better in group therapy, more open to talking with the support of friends. Both therapy’s allow the students to be honest and express their feelings.

They need to feel that school is a safe place for them to still be able to attend. By placing higher security, and prevention such as metal detectors may help the students to feel more safe as well. I would say having some intervention

Identify at least two of the theoretical perspectives discussed in the text (e.g., behavioristic, cognitive, social learning theory, humanist), and briefly discuss how you would address the question “Why did this happen?” that surrounds events like this from each of the perspectives you selected.

Why did this happen? What a tough question to answer. Why do bad things happen? How do we explain to kids why they lost a friend, or maybe even why I friend took fire on other kids?

According to The Behavioral perspective,” a theory focusing on learning the observable actions over mental process, focusing on shaping and conditioning ones actions and ones reactions” ( McCarthy et Al.2016).

Being a psychologist we can use this theory to evaluate reasons for the cause of this event, and the effect it is having on these students.

The social learning theory- “ learning is not an isolated, individual activity. Learning is a social process” ( McCarthy et. Al. 2016). I would ask the students .. why do you believe this happened? And wait for responses from the students. Was he an outcast? Was he bullied? Did he have a bad home life? And just wait for answers.

Lastly, examine the issue of personal responsibility. Defend your position by generalizing some of the pros and cons that might be associated with each of your recommended strategies

Pros- students can express their feelings openly. Professional help can be given to the students and staff , when friends and family are harder to talk to. They have the responsibility of their own actions. Choosing to get help or not to get help.

Cons- a lot of students won’t open up with their feelings l, keeping them bottled up and losing trust is the environment and friends around them . They can begin to shut down.

 

References-

McCarthy, C. J., DeLisi, M., Getzfeld, A. R., McCarthy, C. J., Moss-King, D. A., Mossler, R., Privitera, G. J., Spence, C., Walker, J. D., Weinberg, R. S., & Youssef-Morgan, C. M. (2016). Introduction to applied behavioral science [Electronic version]. Retrieved from https://content.ashford.edu/

National Association of School Psychologists. (2015). School violence prevention: Tips for parents & educators (Links to an external site.)Links to an external site.. Retrieved from http://www.nasponline.org/resources-and-publications/resources/school-safety-and-crisis/school-violence-prevention/school-violence-prevention-tips-for-parents-and-educators

Paul, G. (Director), & Neufeld, V. (Executive producer). (2000). Punishing parents: Who is responsible for delinquent kids? (Links to an external site.)Links to an external site.[Video file]. Retrieved from https://fod.infobase.com/OnDemandEmbed.aspx?token=11903&wID=100753&plt=FOD&loid=0

#2 Kyle Fenstermacher

Some strategies a teacher could use are resiliency training and social interaction with students. Training a person how to be more resilient is not just for adults but can prove useful in children as well. As with many other things, learning something at a younger age provides more knowledge earlier and a skill that can be perfected over time. Resiliency focuses on how to battle stressors in life from a different perspective, providing guidance in sorting through to find positivity in a situation to enable a person to focus on a solution rather than dwell in negativity. It also allows them to approach situations with more clear thought by rationalizing instead of simply reacting impulsively. Tailoring lessons to involve more social activity among students and the teacher can help provide real feedback and insight of what may be going on in the classroom. Through the social interaction, it may also help to identify issues that may require immediate attention and the teachers are not working by themselves to identify, these issues can be identified by other students.

The strategies before can also be used in coping with these horrible events. Getting things out into the open may inspire students to share their feelings and hopefully encourage others to do so that may have been hesitant.

Providing an answer to why this happened may not be exact but there are theories that can help provide some light on the issue. Social learning theory helped to influence the development of social constructivism, which demonstrates how individuals interact within a culture and knowledge is exchanged in formal and informal ways (McCarthy, DeLisi, Getzfeld, McCarthy, Moss-King, Mossler, Privitera, Spence, Walker, Weinberg & Youssef-Morgan, 2016). Basically, they learn from their environment and this can sway a person either way due to the type of interaction. Negative interactions will foster more negative results and positive will generally create more positive results.

 

Resources

McCarthy, C. J., DeLisi, M., Getzfeld, A. R., McCarthy, C. J., Moss-King, D. A., Mossler, R., Privitera, G. J., Spence, C., Walker, J. D., Weinberg, R. S., & Youssef-Morgan, C. M. (2016). Introduction to applied behavioral science [Electronic version]. Retrieved from https://content.ashford.edu

Create a site map based on this scenario. A site map is a proposed organizational layout of the web design that you will be recommending for the organization.

Web Proposal and Site Analysis Report

Description of LASA:

For this assignment, you will develop a web proposal for a fictitious organization; the proposal should include wireframes and display the design and layout of the website. You will also analyze several websites and critique their design, highlighting any exemplary design features.

Part I: Creation of a Site Map and a Web Proposal

Scenario

Doug Kowalski is a freelance photographer who specializes in photographing nature scenes. He often gets contract work of shooting photographs for textbooks and journals. Kowalski would like a website that showcases his talents and provides publishers an easy way to contact him. He would like the website to include a Home page, additional pages with samples of his work, and a Contact page.

Tasks:

Create a 4–6 page report on the basis of the following:

  1. Create a site map based on this scenario. A site map is a proposed organizational layout of the web design that you will be recommending for the organization.
    1. Develop and include wireframe page layouts for Kowalski’s photography business (the Home page, content pages, and the Contact page) in the site map.
    2. Develop and include wireframes showing the design and layout of the website, including the navigational structure.
  2. Create and include a web proposal document that is convincing to gain approval for this project. Include all estimated resources, time, and costs.
  3. Justify the rationale for developing the website and the benefits to Kowalski’s business in terms of return on investment (ROI).

Part II: Website Analysis and Summary

Tasks:

In an effort to convince Kowalski about what it takes to produce a high-quality website, you will critique another website and summarize how it can be improved.

First, choose and review any one of the websites mentioned below:

  • TechSmith
  • GNU Operating System
  • DistroWatch
  • Laptop

Second, in approximately 2 pages, include the following in your final report to Kowalski:

  • Summarize your reaction to the selected website. Your summary should:
    • Evaluate whether the website reaches the intended audience. Justify your reasoning.
    • Select three examples that support how the website uses recommended web design guidelines.
    • Recommend the ways in which the website can be improved.

Note: Your final deliverable will be in a Microsoft Word document that is approximately 6–8 pages in length and utilizes at least three professional sources (beyond your textbook). Your report should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., in APA format); and display accurate spelling, grammar, and punctuation.

Submission Details:

  • By the due date assigned, save your report as M3_A2_LastName_FirstInitial.doc and submit it to the Submissions Area.

Assignment 2 Grading CriteriaMaximum PointsCreated a site map based on the provided scenario. Developed a sample wireframe page layout in your site map.56Created and included a web proposal document that is convincing and designed to gain approval for this project. Included all estimated resources, time, and costs24Justified your rationale for your chosen website design based on ROI for Kowalski’s business.24Evaluated whether the website reaches the intended audience and justified your reasoning.20Selected three examples that support how this website uses recommended web design guidelines.16Recommended the ways in which this website can be improved16Writing Components:

  • Organization (12)
  • Usage and Mechanics (12)
  • APA Elements (16)
  • Style (4)

44Total:200

Attachments

Briefly compare and contrast unauthorized access and inappropriate use?  What can smaller to medium sized organizations do to best prepare for these types of attacks?

Please select ONLY 3 of the 6 questions below to form a response:

  1. If an organization chooses the protect and forget instead of the apprehend and prosecute philosophy, what aspect of IR will be most affected?
  2. What is the primary determinant of which containment and eradication strategies are chosen for a specific incident?
  3. Why is it critical for an organization to have a DoS attack response plan well before it happens?
  4. What is watchful waiting and why might we use it?
  5. Briefly compare and contrast unauthorized access and inappropriate use?  What can smaller to medium sized organizations do to best prepare for these types of attacks?
  6. What is malware?  What are some actions that larger companies can implement after a malware attack to prevent future attacks?

Submission Requirements

  • Format: Microsoft Word document
  • Font: Arial or Times New Roman font, 12-Point, Double-Space
  • Citation Style: APA format (Do not copy/paste entire paragraphs/sentences from your book or other web resources to answer each question.  The majority of the answers should be in your own words).
  • Length: Ensure that each response is at least 50 words (per question) but no more than 250 words.  Points will be deducted for not meeting this minimum requirement.
  • Your SafeAssign score should be below 20%. Again, writing in your own words will help prevent this from reaching 20% or higher.
  • This assignment is due by Sunday, July 15 @ 11:59 pm EST.  No late submissions are allowed.

The item will go through SafeAssign.  Any high score may receive an automatic 0/F without the ability to re-do the assignment.

Determine      one (1) additional theory that a researcher could use to explain the cause      of digital-crime and non-digital crime. Include one (1) example for each      crime in question to support your response.

Write a three to four (3-4) page paper in which you:

  1. Select      two (2) of the theories, suggested in Chapter 3 of the text, that a      researcher could use to explain the cause of digital crime. Provide a      rationale to support your response.
  2. Explain      the manner in which the theory that you selected in Question 1 relates to      crime in general.
  3. Determine      one (1) additional theory that a researcher could use to explain the cause      of digital-crime and non-digital crime. Include one (1) example for each      crime in question to support your response.
  4. Use      at least three (3) quality references for this assignment, Note:      Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be      typed, double spaced, using Times New Roman font (size 12), with one-inch      margins on all sides; citations and references must follow APA or      school-specific format. Check with your professor for any additional      instructions.
  • Include      a cover page containing the title of the assignment, the student’s name,      the professor’s name, the course title, and the date. The cover page and      the reference page are not included in the required assignment page      length.

The specific course learning outcomes associated with this assignment are:

  • Analyze      the types of digital criminals and hackers.
  • Summarize      white-collar crimes and criminal tools.
  • Use      technology and information resources to research issues in information      technology in criminal justice.
  • Write clearly and concisely about information technology in criminal justice  topics using proper writing mechanics and technical style convention.