Detailed Training Outline or Storyboard

For this part of your course project, submit one of the following:

If Your Course Project Is Traditional-Based Training:

Submit a detailed outline (a minimum of 4 pages) of the training.
If Your Course Project Is Technology-Based Training:

Submit a detailed storyboard (in Word or PowerPoint) of the training.
In your outline or storyboard, also include a summary of the activities and assessments you will use. Be sure to indicate what each assessment will be — formative or summative, traditional or authentic.

Sample Solution

The post Detailed Training Outline or Storyboard appeared first on homework handlers.

The effect healthcare reform has on stakeholders

Synthesize the effect healthcare reform has on stakeholders

Directions

For this Assignment, you will examine the stakeholders impacted by the implementation of the Affordable Care Act (ACA). Your paper must include the following topics:

Differentiate between at least three groups of stakeholders impacted by the ACA.
Examine the financial impact of the ACA on each group of stakeholders.
Summarize benefits of the ACA on each group of stakeholders.
Summarize drawbacks of the ACA on each group of stakeholders.
The word count for your paper, excluding the title page and references page, will be 800-1200 words. You must include a minimum of (5) different scholarly references.

Sample Solution

The post The effect healthcare reform has on stakeholders appeared first on homework handlers.

Business and Security Risk Analysis

Read NIST SP 800-30 revision 1 http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf
NIST SP 800-53 revision 4, Chapters 1 thru 3 http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
SP 800-18 revision 1 http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf

all of which are located in your Module 3 Resources folder.

Develop a System Security Plan (SSP) based on the information system selected in Project 1 using the sample provided in NIST SP 800-18 revision 1, Appendix A, for general formatting of your deliverable. Note for #13, Minimum Security Controls in the SSP template: you only need to specify the appropriate control baseline from NIST SP 800-53 revision 4 and any additional controls or control enhancements (MINIMUM OF 2) added as part of the tailoring process, including your rationale for the addition. Do NOT list all the controls and enhancements in the selected baseline.

Sample Solution

The post Business and Security Risk Analysis appeared first on homework handlers.

The Intersection of Ethics and Policy

Consider the following scenarios:

Scenario 1: One of the physicians on staff is telling you about a study that he is doing on his patients. He hopes to have the study published and to receive a grant to expand his research. He offers to hire you to help him with the data collection during your off hours. You accept and begin helping him. You start collecting data. When you access the file the next day, you realize that he has removed a number of patients from the study. You suspect that they were removed intentionally, but you cannot be sure. You put your suspicions aside and proceed with your work and add more patients to the database. A few days later, more patients have been removed from the database. When you do some investigation, you discover that the patients who were removed were sicker and/or had a poor outcome. This is a problem and may prevent the rewarding of the grant money to this project.

Scenario 2: You are traveling with your work laptop to a conference and leave it for five minutes at the airport terminal as you go to the bathroom. You asked your colleague to keep an eye on it, but when you return, your colleague has boarded the plane and taken your belongings. As you look through, you realize your laptop is missing. When you confront your colleague, she says it was just there a moment ago and she is certain she brought it on board with her. Your laptop contains secure information regarding your organization and has remote access to your clinical information system. The policy at your organization for a data breach is to call tech support immediately and report the breach. You think it may just be misplaced and begin looking.

Choose one of the scenarios above and answer the following:

What challenges are present in the scenario, and what are some steps that can be taken to address them?
What is the relationship between ethics and policy? Do they always match up with one another?
If individual ethics do not align with organizational policy, what might be the end result?
Support your answer with relevant resources.

Sample Solution

The post The Intersection of Ethics and Policy appeared first on homework handlers.