Technology Proposal Project

I need 6-10 pages paper:

 Please note, all papers are automatically uploaded into Safe Assign upon submission. If your originality report comes back with 20% or more, consider revising your paper. the full and detailed instruction is in the attachment:

Administration Negligence

 

Dr. John Bradley is an Emergency Room physician. He worked a 24-hour shift due to a staff shortage. As a result, he had a patient that died because he failed to provide a duty of care, he breached his duty, and caused an injury. A prima facie case of negligence was established when Dr. Bradley failed to provide appropriate medical care. Liability was also based on res ipsa loguitor (the thing speaks for itself). The incident is considered a Sentinel Event and must be reported to The Joint Commission (a non-profit hospital regulatory agency).

After a trend analysis of several Sentinel Events, We Care Hospital fired the Health Care Administrator. As a result, you were hired as the new Health Care Administrator. You have reviewed the Sentinel Event with Dr. John Bradley and discovered several factors that showed the hospital was negligent. The three basic forms for negligence are malfeasance, misfeasance, and nonfeasance. Your first task is to rationalize your answers by using any applicable legal precedents.

Then, prepare a Microsoft PowerPoint 10-slide narrative using a SWOT Analysis. A SWOT Analysis identifies strengths, weaknesses, opportunities, and threats in a situation. Review the video: Strategic Planning and SWOT Analysis. To help you prepare the narrative PowerPoint using Microsoft 365 and older versions, review the video: Record a slide show with narration and slide timings.

Your 10-slide SWOT PowerPoint should follow this format:

  1. Slide 1: Cover Page
    1. Include the title of your presentation, the course number and course title, your name, your professors name, and the date. 
  2. Slide 2: Background / Executive Summary
    1. Describe the details of the situation. Use bullets with short sentences. The title of this slide should be Executive Summary.
  3. Slide 3: Thesis Statement
    1. Identify the focus of your research. The title of this slide should be Thesis Statement.
  4. Slides 4-9: Support
    1. Support your thesis statement following the SESC formula: State, Explain, Support, and Conclude. (An overview of using Sublevel 1 and Sublevel 2 headings is provided in the following video: APA Style – Formatting the Title Page, Abstract, and Body).
    2. You should include at least three court cases and related peer-reviewed articles from within the past five years. In-text citations should be in the American Psychological Association (APA) format.
  5. Slides 10: References
    1. Use APA format for your Reference slide. (To help you with APA in-text citations and your Reference list, some students use Citation Machine.

Follow Instructions

A person cannot evaluate the ethicality of organizational policies until he or she identifies the issues that those policies are intended to address. In this assessment, you will do just that.

Complete the following:

  • Identify a potential ethical dilemma from a real-world organization. As an example of an ethical dilemma, consider the following scenario: an organization may choose to videotape the office and read employee e-mails. The conflict here may be that employees feel these practices are a violation of their privacy, and that they have a right to a certain level of privacy. However, organizational stakeholders defend these practices because their concern is whether the employees are getting their work done. 
    • Choose any organization about which you can find sufficient information to complete the assessment. For example, you might use the organization for which you currently work, where you used to work, or where an associate of yours works.
    • If there is any concern with disclosing confidential information, substitute a made-up name for the organization’s name and indicate you are doing so.
    • The ethical issue or problem selected must affect the organization, potentially affect the organization, or involve the organization.
  • Explain the issues involved, including the following: 
    • Identify the stakeholders.
    • Identify the concerns of the stakeholders.
  • Explain why you chose this particular issue and why the issue is important.
  • Examine the current relevance of the issue. 
    • Is the issue currently in the media spotlight?
    • Are there any recent incidents or reasons why this issue has come to the public’s attention?

Reply To The Following Post Below.

  Traditionally, technology has been associated with  rationality,  objectivity and structure; traits oft considered  masculine in the  traditional societal definition of gender roles.  While some technologies  have largely been male-dominated, throughout  history, women have had an  often unrecognized presence in making  significant contributions to  these technological advancements. One such  technology would be the  digital computer. While its development is  generally viewed as a product  of male logic and rationality, much of  the progress in this area has  required an intuitive, interactive and  generally less structured  feminine approach. These culturally  appropriated gender  characteristics as well as historic gender roles  have had a significant  influence in consumerism and technological  development. In this  activity, you will explore technologies that may  be gender-specific and  evaluate technological innovations that have  shaped current society 

I have chosen Next Generation Biometrics Capture Capability (NXGBCC) as my project.

The Department of Defense (DoD) Defense Forensics and Biometrics Agency (DFBA) is responsible for all matter regarding Biometrics. The Department of the Army and more specifically Program Manager Biometrics (PM Bio) manages the program of record (POR) to ensure training and equipment are function for military operations.  Biometrics are the unique personal physical characteristics, such as fingerprints, iris, DNA, that can be used for automation recognition (DHS, 2019). 

First a little history, in December of 2004 an Iraqi insurgent wearing an Iraqi security forces uniform was able to get into the U.S. military base in Mosul Iraq blowing himself up in the dining facility full of U.S. service personnel.  In total 14 U.S. service members, 4 U.S. civilians and 3 Iraqi Soldiers were killed in the incident (AP, 2005).  Since then the military has used Biometrics extensively to identify of personnel entering U.S. installations in the Middle East as well as all U.S. sponsored trained personnel working along U.S. and coalition forces. 

U.S. Forces also collect DNA and latent fingerprints from operational and forensics exploitation locations allowing to identify persons of interest (POI) operating against U.S. and Coalition partners.

Although biometrics mostly used for Intelligence gathering, screening, and force protection. One of the more important matters regarding the collection of Biometrics of non-U.S. individuals who interact with U.S. forces (Host Nation Soldiers, Police Officers, third country, and host nation nationals working at U.S. Bases) in the middle east is that the DoD shares the information with other federal agencies allowing for screening of all Middle Eastern personnel requesting Visas to enter the U.S.  This ensures that any persons who have acted against U.S. and coalition interest are prohibited from legally entering the U.S.

The current PM Biometrics systems that consist of the Biometrics Automated Toolset (BAT) have become antiquated and have reached their operational lifecycle.  Currently the BAT systems require a lot of manual loading of data and a long time in processing, analytical examination, comparisons and sharing with other U.S. agencies. Current civilian application of Biometrics has advance to the point that individuals who are persons of interest (POI) can be biometrically identified by the authorities within matter of minutes.  Appling these commercially advance to military operations would provide with identification of those that are good guys working for our forces and those who are working against us. can be identified within less than returning

SWOT

Strengths:

– Identifying persons of interest (POI)

– Positively Identifying U.S. Base workers

– Vetting host country nationals, Soldiers, police officers

– Force protection

Weakness:

– Old Biometrics systems

– Loading data is manual process

– Processing, analyzing and sharing data takes days

– Requires close proximity of subject to capture biometric or identify

Opportunities:

– New systems are commercially available

– Capabilities to capture biometrics at greater distances are currently available and improving – very fast

– Biometric standoff (at a distance) identification would provide protection to U.S. forces

– Sharing data with Federal agencies faster would identify persons of interest attempting to enter U.S.

– Sharing data with Allies could protect U.S. interest overseas

Threats:

– Bad guys trying to figure way to defeat Biometrics capabilities

– Slow processing of data could put U.S. forces in harms way

– Slow sharing of Data with U.S. Federal agencies could place U.S. homeland in harms way

The business area for this project would be Information Technology (IT) and Intelligence (Intel) gathering/analysis/operations/force protection. For the purpose of this class I plan on keeping this project in the (IT) business area.

Return on Investment (ROI): Although when insurance cost is taken into consideration, it may be possible to try to place a cost on a loss of a life.  It would be impractical and unwise to conduct an ROI when trying to determine the value of saved lives.  From a person who has lost fellow Soldiers and has had to talk to loved ones of lost family members I will say the ROI would be priceless.

The most challenging part of this project proposal is that I am actually working with the Product Manager (PdM) in trying to develop actual methodologies to evaluate the Next Generation Biometrics Capture Capabilities (NXGBCC) that would replace the current BAT systems.  I have worked in the Biometrics area for over 12 years so this will be a great opportunity to possibly identifying some new considerations for the capabilitys development documents (CDD) for the NXGBCC.

Reference:

Department of Homeland Security.  (2019, May 9).  Biometrics. Retrieved from https://www.dhs.gov/biometrics (Links to an external site.)

Associated Press.  (2005, August 19).  Details of Mosul mess hall bombing emerge.  NBCNEWS.  Retrieved from http://www.nbcnews.com/id/9013247/ns/world_news-mideast_n_africa/t/details-mosul-mess-hall-bombing-emerge/#.XiIqAi3MxhE (Links to an external site.)