Determine which kinds of research questions would be served by a mixed methods strategy of inquiry and explain why.

The third research method to explore is a combination of both qualitative and quantitative research methods. However, combining two different things is more complicated than throwing everything into the same bowl and hoping to get a cake—there is a procedure to selecting the right ingredients and their amounts. The same is true of mixed methods strategies, and the newness of this research design makes it both exciting and challenging. In this Discussion, you will examine some of those challenges, calling upon your growing understanding of both quantitative and qualitative strategies.

To prepare for this Discussion:

Review Chapter 10 in the course text, Research Design and the “Mixed Methods: Examples” media segment. Based on this information, how would you respond to someone who asks you, “To what extent is mixed methods research simply taking half a quantitative plan and half of a qualitative plan and putting them together?”

Review the article “On Becoming a Pragmatic Researcher: The Importance of Combining Quantitative and Qualitative Research Methodologies” in the Learning Resources.

Explore what you believe is or are the biggest challenges for a researcher who wants to use a mixed methods strategy of inquiry.

Determine which kinds of research questions would be served by a mixed methods strategy of inquiry and explain why.

Indicate why you believe that more researchers are using a mixed methods strategy of inquiry.

Describe the extent to which a mixed methods strategy of inquiry is used in your discipline.

With these thoughts in mind:

Post a 2-to 3-paragraph response that includes an answer to the question “To what extent is mixed methods research simply taking half a quantitative plan and half of a qualitative plan and putting them together?” and an articulation of the challenges to using a mixed methods strategy of inquiry.

Be sure to support your postings and responses with specific references to the reading(s) and/or media segment(s) and use APA format

What reasons did the Court give to reject the government’s arguments and order that Garcia should go free?

Criminal Law essay

[Pin It]

For this week’s assignment, you will write a 250-300 word minimum essay about conspiracy. Be sure to address all prompts and cite your sources in APA format. This is worth 100 points, so be thorough and give your best effort.

Conspiracy mens rea wasn’t defined clearly at common law, and most modern legislatures haven’t made it any clearer. This leaves the courts to define it. The traditional definition of the inchoate crime of conspiracy includes the attendant circumstance element that agreements involve two or more parties agreeing or combining to commit a crime. Most modern statutes have replaced this traditional definition with a unilateral approach that doesn’t require that all conspirators agree–or even know–the other conspirators.

Review the case United States v. Garcia, (9th Cir. 1998), pages 281-283, and answer the following questions:

* What acts did Garcia do that amounted to a conspiracy?

* What was the government’s evidence that supports the conspiracy?

* What reasons did the Court give to reject the government’s arguments and order that Garcia should go free

What are the required components for the online delivery of education?

Based on the six assumptions of the Andragogical Model designed by Knowles, write a paper that provides guidelines and techniques for incorporating adult learning principles into the structure, delivery, and mentoring of an online course. Clearly state each principle of adult learning and describe an application of each principle in an online learning environment. Include the benefits of adapting these principles.

Length: 12-15 pages, not including the title and reference pages.

References: Minimum of seven scholarly resources.

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented and provide new thoughts and insights relating directly to this topic.

In this section, you will bring together the adult learning principles you have learned in this class to develop guidelines and techniques for online courses. Read the article, Meeting the Challenge: Teaching Strategies for Adult Learners. Think about the following to guide your reading:

What are the challenges faced by online instructors?
What are the required components for the online delivery of education?

The person helping must have access to, and use, grammalry and turn-it-in

Describe how alignment between the values of an organization and the values of the nurse impact nurse engagement and patient outcomes.

PP presentation on Organizational culture and values

[Pin It]

Prepare a 10-minute presentation (10-15 slides, not including title or reference slide) on organizational culture and values.

Describe how alignment between the values of an organization and the values of the nurse impact nurse engagement and patient outcomes.
Discuss how an individual can use effective communication techniques to overcome workplace challenges, encourage collaboration across groups, and promote effective problem solving.
Identify a specific instance from your own professional experience in which the values of the organization and the values of the individual nurses did or did not align. Describe the impact this had on nurse engagement and patient outcomes.

Solid academic writing is expected and in-text citations and references should be presented using APA documentation guidelines

Examine two (2) major mistakes that organizations make with cryptographic software.

Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Case Study 3: Why Does Cryptographic Software Fail?

Read the case study titled, “Why Does Cryptographic Software Fail? A Case Study and Open Problems,” located here (original article located at http://people.csail.mit.edu/nickolai/paper‌s/lazar-cryptobugs.pdf). Use the Internet to research a specific mistake and / or vulnerability that an organization has experienced within the past five (5) years in relation to its use of cryptographic software. Also, research the results that multiple organizations have experienced when they have implemented cryptographic software.

Write a three to four (3-4) page paper in which you:

Examine two (2) major mistakes that organizations make with cryptographic software. Recommend two (2) actions that companies can take in order to avoid these common mistakes and vulnerabilities with cryptographic software.
Briefly describe the company that you researched and its experience with cryptographic software. Analyze the company’s actions (or lack thereof) following the mistake and / or vulnerability.
Provide your opinion on the company’s actions or plans to correct the mistake and / or vulnerability to avoid it from reoccurring. If the organization has not corrected or does not have a plan to correct the mistake and / or vulnerability, suggest one (1) action that it should take in order to correct the mistake and / or vulnerability. Provide a rationale for your response.
Examine the most common results that organizations have experienced when they implemented cryptographic software. Speculate two (2) reasons that organizations see such results. Provide a rationale for your response.
Use at least three (3) quality references in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Examine the challenges of computer security, including different threats and types of attacks
Describe computational security and symmetric encryption techniques and adoption to modern organizations.
Use technology and information resources to research issues in Cryptography.
Write clearly and concisely about Cryptography using proper writing mechanics and technical style conventions

Describe how your researched large organization uses “policy as a project” in its program.

The purpose of this Capstone Project is for students to examine and solve real world information assurance problems and apply associated techniques to create practical solutions. The course takes an integrative and senior security officer approach to address the policy, risk, and control opportunities within cyberspace and IT environments. Deliverables 1 through 5 focus on preparing students toward the final Capstone Project. Skills, experience, and knowledge gained through the completion of prerequisite courses will be used throughout each deliverable. The project contents to be addressed are as follows:

Project Deliverable 3: Security Policy Documentation

Project Deliverable 3 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Research the Internet for a large organization, reviewing its cybersecurity policy.

From your textbook, examine the phrase “policy as a project” from the Cyber Security Policy Guidebook, taking into account the security cycle.

Submission Requirements

  • Document (MS Word)
  • Microsoft Project (MS Project)

Section 1

Write a three to four (3-4) page paper in which you:

  1. Analyze the strategy used to protect the large organization you researched from hackers, fraud, and theft.
  2. Describe how your researched large organization uses “policy as a project” in its program.
  3. Analyze the general consequences of not having a policy for cybersecurity. Justify your thoughts with real-world examples.
  4. Cover the basic needs should there be a lack of cybersecurity policy in an organization. Decide what can be done to provide a base for security needs.  

Section 2

Using Microsoft Project, or an open source alternative such as OpenProj, to:

5.  Record all tasks, subtasks, resources, and time related to the security cycle.

6.  Outline the organization’s business, the systems, mission, and / or risk management phases in your design.

7.  Your milestones should show how you are reducing cybersecurity risk rather than compliance and best practices.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Discuss cybersecurity strategies and the various frameworks.
  • Discuss the threats of modern technology in the workplace.
  • Discuss how policies play an important role in techniques adopted for cybersecurity.
  • Use technology and information resources to research issues in information assurance.
  • Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions

Define what a Gantt chart is. How would you use it to focus and key in critical areas that need improvement?

Define what a Gantt chart is. How would you use it to focus and key in critical areas that need improvement?

 

Risk Management

Read the Forbes article, “Managing Capital Projects in a High-Risk World.” Based on the content presented in the article, describe some of the risk management techniques and tools available to a PM. Explain how you would apply them to assessing the risk involved with implementing a service or product improvement, or to the design of a new service or product

Analyze and explain whether evidence-based practice would prove to be the best choice for this program.

Substance Abuse Prevention Program

The Public Health Department is planning to develop an adolescent substance abuse prevention program.

Using the South University Online Library or the Internet, research about the stages of research synthesis. Based on your research, respond to the following:

Using meta-analysis, apply and explain the stages of research synthesis that you would propose to address adolescent substance abuse.
Identify the best practices that will form the basis of service delivery.
Analyze and explain whether evidence-based practice would prove to be the best choice for this program.
Explain which steps should be followed when using evidence-based practice for this program. Provide at least two examples of evidence-based practice that can be referred to for the program.
Analyze and explain which of the summative evaluation methods is the most effective in accessing a research program’s outcomes or effects. Describe the pros and cons of using each method.

Work should be supported with examples as well as citing sources in your work and provide references for the citations in APA format.

How will data be collected to gain insight into visitor interaction with website?

You will expand the management plan to include an approach to quality assurance, marketing and promotion, search engine optimization, and analytics. For each of these items you should document the specific choices that will be made, what other options were considered, and how you will measure success.

Specifically, the following critical elements must be addressed: New sections should be added to the existing Website Management Plan that address the following issues:

Quality Assurance: What approaches will be used to ensure that the site functions as expected at launch and in the future? How will the website be tested? What systems will be put in place to facilitate testing? What aspects of the site will be tested?
Marketing and Promotion: What efforts will be taken to promote the website?
SEO: What efforts will be made to optimize the site for search engines?
Analytics: How will data be collected to gain insight into visitor interaction with website? Exactly what data points will be used?

Guidelines for Submission: The Milestone Four Testing and Deploying document should follow these formatting guidelines: five pages, double spaced, 12- point Times New Roman font, one-inch margins. APA citations should be used for all sources

Discuss the impact managed care has on the access, financing, and delivery of health care in the United States.

Write a paper that includes the following elements:

· Provide a thorough analysis of managed care, and discuss how it, as a delivery method, has facilitated the transfer of health services to outpatient and other nontraditional settings of care.

· Discuss the impact managed care has on the access, financing, and delivery of health care in the United States.

· Discuss managed care’s role in promoting health.

Note: Use APA style and 3 scholarly references.