: Create a roadmap for organizations to use in development of an IMA program (to address gaps in their current offerings).

Select a hospital or healthcare organization to research. You may choose an organization you are familiar with or can readily obtain information about. To maintain confidentiality, you do not need to mention the name of the organization. You may also choose a hypothetical/fictitious healthcare organization.

Daily life requires us to have access to a lot of information, and information systems help us access that information. Desktop computers, laptops, and mobile devices keep us connected to the information we need through processes that work via hardware and software components. Information systems infrastructure makes this possible. However, our easy access to communication and information also creates security and privacy risks. Laws, regulations, policies, and guidelines exist to protect information and information owners. Cybersecurity ensures the confidentiality, integrity, and availability of the information. Identity management is a fundamental practice. Part of identity management is the governance of access, authorization, and authentication of users to information systems, Identity management is one part of a layered security defense strategy within the information systems infrastructure. Your work in this project will enable you to produce a technical report and nontechnical presentation that addresses these requirements.

There are six steps that will help you create your final deliverables. The deliverables for this project are as follows:

  1. Nontechnical presentation: This is an 8-10 slide PowerPoint presentation for business executives and board members.
  2. Technical report: Your report should be a 6-7 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.
  3. Executive summary: This should be a 2-3 page double-spaced Word document.
  4. In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

The technical report and the nontechnical presentation will identify compromises and vulnerabilities in the information systems infrastructure of the healthcare organization, and identify risks to the organization’s data. You will propose a way to prioritize these risks and include possible remediation actions.

The technical report: Provide recommendations for access control and authentication mechanisms to increase the security within the identity management system. After you have defined the roles within the organization, recommend the accesses, restrictions, and conditions for each role. Present these in a tabular format, as part of your list of recommendations.

Provide a comparison of risk scenarios to include the following:

  1. What will happen if the CIO and the leadership do nothing, and decide to accept the risks?
  2. Are there possible ways the CIO can transfer the risks?
  3. Are there possible ways to mitigate the risks?
  4. Are there possible ways to eliminate the risks?
  5. What are the projected costs to address these risks?

Provide an overall recommendation, with technical details to the director of IT.

The executive summary: In addition to your technical report, also create a nontechnical report as an executive summary.

The deliverables for this project are as follows:

  1. Nontechnical presentation: This is a 8-10 slide PowerPoint presentation for business executives and board members.
  2. Technical report: Your report should be a 6-7 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.
  3. Executive summary: This should be a 2-3 page double-spaced Word document.
  4. In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

Submit your deliverables to the assignment folder.

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.

  • 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
  • 2.3: Evaluate the information in logical manner to determine value and relevance.
  • 6.2: Create a roadmap for organizations to use in development of an IMA program (to address gaps in their current offerings).

Describe the conceptual model employed in the design of these types. Describe the analogies and concepts these monitors expose to users, including the task-domain objects users manipulate on the screen.

The following resources may be helpful when completing this assignment.

•Norman, D. (2005). Human-centered design considered dangerous. Retrieved from http://www.jnd.org/dn.mss/humancentered_desig.html

•Norman, D. (2007–2010). Activity-centered design: Why I like my Harmony remote control. Retrieved from http://www.jnd.org/dn.mss/activitycentere.html.

Computer applications that run on desktop and laptop computers have, for a long time, been designed to be driven by dragging and clicking a mouse. With the introduction of tablet personal computers, the trend has shifted toward using touch-based screens. We now have access to touch-based TVs, touch-based monitors, and touch-based laptops. Touch and multi-touch devices provide end users with the ability to interact physically with an application much more naturally.

Imagine that you have been assigned the task of redesigning your company’s applications to run on all devices. Examine a multi-touch computer monitor and a mouse-driven computer monitor and think about how the end user interacts with an application running on each of these types of monitors.

Write a four to five (4-5) page paper in which you:

1.Compare and contrast the metaphors used in the design of applications that run on each type of monitor. Use Microsoft Visio, Microsoft PowerPoint, or any other modeling tool to create.

2.Differentiate between the interaction types and styles that apply to these monitors and applications running on them.

3.Describe the conceptual model employed in the design of these types. Describe the analogies and concepts these monitors expose to users, including the task-domain objects users manipulate on the screen.

4.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. You may use the resources above or others of your choosing.

Your assignment must follow these formatting requirements:

•Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Summarize the issue/topic addressed. Explain why the author(s) think the issue/topic is important.

Laaser, M. R. (2004). Healing the wounds of sexual addiction. Grand Rapids, MI: Zondervan. ISBN: 978-0310256571.

CRITICAL BOOK REVIEW INSTRUCTIONS
A critique is more than a summary of the book, article, and/or chapter being reviewed. The emphasis is on a discussion and evaluation of the topic, not just a description. Further, it must be remembered that critical is not necessarily synonymous with bad or unfavorable. Critical reviews may be positive, negative, or a combination of both.
In Module/Week 4, you will submit a 5-page critical book review over the Laaser text. Three specific sections (Summary, Analysis, and Conclusion) will be required. Adhering to current APA format guidelines for in-text citations and references is required. View the instructions and grading rubric located within the Assignment Instructions folder in the course for specific expectations for this assignment. This assignment must be submitted no later than 11:59 p.m. (ET) on Monday of Module/Week 4.Your critique must be 5–6 full pages of content and include the following 3 sections:
I.Summary
•Summarize the issue/topic addressed. Explain why the author(s) think the issue/topic is important.
•Briefly highlight the major themes (or sub-topics) being explored.
This part of the critique must be about 2 pages, double-spaced. Do not make it longer than 2½ pages.
II.Analysis
This section must critically analyze and evaluate the work being reviewed. Some of the questions you may want to consider in this part are:
•What is the point of view of the author(s)? What perspective (ideological, philosophical) do they bring to the work? Is their perspective implicit (gleaned from reading “between the lines†) or explicit (openly stated)?
•What kind of evidence to they bring to support their viewpoint? Is it adequate?
•How clear is the argument? Does it flow logically? Are there gaps, inconsistencies, or contradictions in the discussion or argument?
Support your response with examples from the work itself and from your knowledge of the issue/topic. Be sure to go beyond stating your opinion; it is not enough to say you agree or disagree with the author’s point of view. Substantiate your claims!
III.Conclusion
•Of what value is the book? What does it add (if anything) to the discourse?
•Who would find the piece helpful and why?

Other Specifics:
The paper:
•Is to be an original work of the author and written solely for this course;
•Must be written using current APA format guidelines and include the following: title, abstract, and reference pages (which do not count toward the 5–6 pages of content);
•Must be submitted as a Word document (.doc or .docx);
•Must be typed in Times New Roman or Arial 12 point font; and
•Can be written in first person.
Submit this assignment by 11:59 p.m. (ET) on Monday of Module/Week 4.

Explain how a disability in childhood or adolescence could be considered a deficit or a difference in terms of developmental trajectory. Provide evidence from scholarly sources to support your conclusion. 

· Derman-Sparks, L., & Olsen Edwards, J. (2010). Anti-bias education for young children and ourselves. Washington, DC: National Association for the education of Young Children.

o Chapter 10, “Learning About Different Abilities & Fairness” (pp. 125–134)

· Fleury, V. P., Hedges, S., Hume, K., Browder, D. M., Thompson, J. L., Fallin, K., … & Vaughn, S. (2014). Addressing the academic needs of adolescents with autism spectrum disorder in secondary education. Remedial and Special Education, 35, 68–79.
Retrieved from the Walden Library databases.

· Kritzer, K. L. (2012). The story of an outlier: A case study of one young deaf child and his journey towards early mathematical competence. Deafness and Education International, 14(2), 69–77.
Retrieved from the Walden Library databases.

· Rescorla, L. (2011). Late talkers: Do good predictors of outcome exist? Developmental Disabilities Research Reviews, 17(2), 141–150.
Retrieved from the Walden Library databases.

Media

· Laureate Education (Producer). (2014i). Physical and other disabilities [Video file]. Baltimore, MD: Author.

Disability: A Deficit or a Difference?

School settings, in particular, might be challenging for children and adolescents with a disability. However, whether a disability is considered a deficit or a difference could affect the presence and types of interventions and accommodations available, as well as how the individual is treated by others.

To prepare:

· Review the Akhtar & Jaswal (2013) article from the Week 1 Learning Resources. Consider how a disability could be considered a deficit or a difference in terms of developmental trajectories and individual outcomes.

· Read/view this week’s Learning Resources.

· Think about possible strategies to counteract those who may view disabilities as a deficit.

Post by Day 3: 

Explain how a disability in childhood or adolescence could be considered a deficit or a difference in terms of developmental trajectory. Provide evidence from scholarly sources to support your conclusion.