How do you integrate the philosophical, religious, and aesthetic values of the humanities into daily living?

Humanities In Modern Life

[Pin It]

Identify a list of twenty significant cultural developments from the past. Write 8–10 pages in which you evaluate the developments’ significance in history and to your everyday life.

For this assessment, complete the following:

Compile a list of twenty significant cultural developments from the past. You may use the Personal Significance activities (linked in the Resources under the Capella Multimedia heading) to help assemble this list:
Describe the cultural developments you noted and then evaluate their application to modern life.
Notice any compelling themes here. Are there any common themes or persistent forms of expression, or especially vital historical periods among your choices? Think about what the items you selected say about who you are and what gives your life meaning.
Consider how these developments impact your everyday life in a personal way. The cultural background of humanities disciplines provide some structure, of course, but what really matters are your own feelings, perceptions, thoughts, and decisions.
How does an understanding of the humanities impact your life?
How do you integrate the philosophical, religious, and aesthetic values of the humanities into daily living?

This essay will be an intensely personal one; make it a worthwhile exercise.
Additional Requirements

Written communication: Should be free of errors that detract from the overall message.
APA formatting: Your paper should be formatted according to APA (6th edition) style and formatting.
Length: 8–10 typed and double-spaced pages.
Font and font size: Times New Roman, 12 point

Identify and discuss the public service culture present in the case and explain why Wise argue that public service motivation is found more in the government than in private sector.

Write a one to two page paper exploring the use of the defense “insanity.” Please use one (or more) of the following examples for you analysis, and be sure to use appropriate APA formatting and citations:

John Hinkley
Lorena Bobbitt
Jonathan Schmitz

Issues and Dilemmas of Contemporary Public Administration

In 3-4 pages, discuss public interest, administrative responsibility and some of the recent ethical obligations confronting public administrators in their day to day decision making. Also examine the recent trend in privatizing government functions and discuss if it posses any dilemma for the attainment of public interest. Be sure to use relevant examples to illustrate your point.
Case Study 11: Who Brought Bernadine Healy Down?

Questions for Case study 11

Identify and discuss the public service culture present in the case and explain why Wise argue that public service motivation is found more in the government than in private sector.
Discuss if the Healy’s motivation for accepting the Red Cross presidency is in line with the public service motives?
Discuss what the case study indicates about the modern complexities of professional personnel in the public setting?
Does the Wise reading offer some specific answers to contemporary problems of public personnel motivation? If so, how?

Summarize the concepts from your written paper in Part 1 of this assignment for the lecture you would give to the class regarding data acquisition in a forensics investigation.

This assignment consists of two (2) parts: a written paper and a PowerPoint presentation. You must submit both parts as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Imagine you’ve been sought out as a guest lecturer at a local university for a computer forensics course. You have been asked to prepare a paper for the students, as well as a PowerPoint presentation, regarding data acquisition in a forensics investigation.

Part 1: Written Paper

Write a four to five (4-5) page paper in which you:

a. Analyze the four (4) methods of data acquisition to determine how an investigator selects the appropriate method to use in a given situation.

b. Determine how an investigator can plan for hardware, software, and / or general failures during data acquisition.

c. Justify the necessity of validating data acquisition and determine the negative effects on an investigation if this step is not performed.

d. Describe the acquisition procedures and tools for Windows and Linux data acquisitions.

e. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Part 2: PowerPoint Presentation

Use Microsoft PowerPoint or an open source alternative, such as OpenOffice, to:

2. Create a five to ten (5-10) slide PowerPoint presentation in which you:

a. Summarize the concepts from your written paper in Part 1 of this assignment for the lecture you would give to the class regarding data acquisition in a forensics investigation.

b. Use a professional technically written style to graphically convey the information.

The specific course learning outcomes associated with this assignment are:

Describe and analyze practices in obtaining digital evidence.
Describe operating system configurations and techniques in a forensic investigation.
Use technology and information resources to research advanced issues in computer forensics.
Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions

How does it relate to (or is grounded in) one or a combination of the concepts/frameworks/systems discussed in the course?

Critically reflect upon your personal and professional experiences in light of the course readings and discussions. Drawing upon and applying the course concept and using them to support your ideas, thoughtfully articulate your perspective on the following concepts. Be sure to refer to the grading rubric in the Handouts section of the course for grading criteria.

Part I: Professional Ethical Code

What does ethics mean to you, particularly organizational and professional ethics?
What are the core components of an ethical decision making decisions process? How does your decision making process ensure that the decision is ethical and “reasonably does not harm”?
What is your professional code of ethics?

· How does it relate to (or is grounded in) one or a combination of the concepts/frameworks/systems discussed in the course?

· What are your core values, principles, etc.?

· What are the strengths and limitations of your ethical code?

What factors shaped/influenced your ethical code?

Do you belong to a profession that has an articulated professional code? If yes, outline its core principles and standards.
How have you incorporated them into your own code of ethics?
How do professional associations help ensure the integrity of professionals?

Part II: Ethical Leadership

A. What are the core qualities of an ethical leader?

B. What challenges do organizational leaders face today?

C. How can a leader work for the benefit of all of an organization’s stakeholders, including being a responsible global citizen?

Part III: Application/Example

A. Provide an example of a leader who meets your criteria of an ethical leader. This can be from your own life, experiences, or someone who is known publically

Do you believe that this philosophy explains the cause of criminal behavior in women?

Directions: Unless otherwise stated, answer in complete sentences, and be sure to use correct English, spelling and grammar. Sources must be cited in APA format. Your response should be four (4) double-spaced pages. All essays will be put through a plagiarism program to verify writing is original subject matter and content.

Part A

1. Describe the basis of feminist criminology.

2. Do you believe that this philosophy explains the cause of criminal behavior in women? Provide one (1) supporting fact to justify your position.

Part B

1. The victims’ rights movement grew out of the dissatisfaction of victims with the passive role, neglect, and minimization of harm they suffered. Describe three (3) costs and effects of victimization.

2. There are numerous theories that attempt to explain victimization. Select one (1) perspective you feel is most accurate, explain why, and provide two (2) supporting facts

Discuss if the plaintiff’s injury was caused due to her own negligence or the defendant’s negligence.

Resource: Case 20.3 in Employment Law, Chapter 20.

Write a 700- to 1,050-word executive summary in Microsoft® Word in the third person voice in which you analyze the case by addressing the following:

Defend against or support the position of the plaintiff.
Discuss if the plaintiff’s injury was caused due to her own negligence or the defendant’s negligence.
As the Human Resources Director, recommend an ethical resolution to this case to the legal department and senior management.

Format the summary consistent with APA guidelines.

Use at least a minimum of three in-text citation sources within the summary. The sources must be identified in your APA correctly formatted References page.

Case study for paper ****

———————————————————————————————————————-

The issues are whether the waiver signed by Ersaline Edwards barred her from recovering medical expenses she incurred when she sustained a broken leg while attempting to perform a physical test and whether OSHA covers lawsuits brought by individuals alleging negligence.

Collyer, United States District Judge.

In this civil action filed pro se, plaintiff Ersaline Edwards sues for $1 million in monetary damages, claiming that the defendants violated the Constitution and federal law in refusing to pay her medical bills for an injury she sustained while qualifying for a job with the District of Columbia Department of Corrections (“DCDC”). She sues DCDC Director Odie Washington and Unknown Members of the D.C. Department of Corrections, “[i]ndividually and in their official capacity[.]”

Ms. Edwards alleges the following. In 2007, she “was called to begin qualification training [to become] a [DCDC] correctional officer.” She signed, among other papers, a document entitled “INFORMED CONSENT: LIABILITY RELEASE FORM.” Id. (capitalization in original). In August 2007, “during her training and qualification” to become a DCDC correctional officer, Ms. Edwards was “assigned to run down a flight of stairs in one of the old D.C. General Hospital Buildings. While running . . . [she] [lost] her balance and grabbed the railing on the side of the steps.” Because the railing was wet, Ms. Edwards “was unable to sustain her grip” and fell down the step. She “was in excruciating pain” and could not get up.

The D.C. Fire Department Rescue Squad was called and transported Ms. Edwards to Greater Southeast Community Hospital where she was told following an x-ray “that both bones in her leg were broken.” They gave [Ms. Edwards] some medication, strapped her leg[,] gave her some crutches[,] told her to make an appointment for a doctor in four or five days [and] then released [her].” The following day, when the pain had not subsided, Ms. Edwards’s father and brother took her to the emergency room at Prince George’s Community Hospital but, because the emergency room was “severely overcrowded,” they left and went to Georgetown University Hospital. The doctors at Georgetown performed an operation, “thereby putting [Ms. Edwards’s] broken bones back together[,]” and released her. Ms. Edwards “later received a bill from the D.C. fire and EMS Department [for] $268.00 . . . a bill from the Greater Southeast Community Hospital for $315.00 and $1405.00 [and] a bill from Georgetown University Hospital for $37,310.00. She “sought the defendants and their agents to pay her hospital and emergency Ambulance bills,” but they refused to do so.

She asserts that the defendants deprived her of due process and equal protection of the laws and violated the Occupational Safety and Health Act (“OSHA”).

Ms. Edwards claims that Defendants deprived her “of a safe and healthy [work] environment” by “knowingly, intentionally and with malicious intent” failing to “adequately secur[e] the railing against moister [sic]” and that they, with the same intent, deprived her of “just compensation, due process and equal protection of the laws by failing to pay her medical bills, and compensating her for labor and injury for being hurt on their job and premises.” She further claims constitutional violations based on Defendants’ “training . . . in a shutdown possible [sic] condemned building and failing to insure her for potential injuries” and faults the District for “not compelling any other law enforcement agency with the Government to sign the same agreement that plaintiff was compelled to sign.” Ms. Edwards’s facts do not identify any rights secured by the Constitution, and the OSHA does not create a private cause of action.

The claim is quickly resolved because Ms. Edwards released the District from all liability arising from her “participation in the physical fitness examination” when she signed, in the presence of two witnesses, the liability release form.

The District of Columbia recognizes “prospective liability waivers for claims of negligent conduct” as long as the waiver is reasonably unambiguous and clear. By signing the single-page, two-paragraph consent form prominently captioned “INFORMED CONSENT: LIABILITY RELEASE FORM,” Ms. Edwards acknowledged and “agree[d] to accept” that she would undergo a

physical fitness examination [] intended to test overall physical ability . . . [that] there are risks to my physical health and well-being inherent in the physical fitness examination [that I] voluntarily and knowingly agree to accept . . . [and that I] release and forever discharge the DCDC, the District of Columbia . . . [from liability] by reason of my participation in the physical fitness examination which is part of the application process for employment with the DCDC.

For the foregoing reasons, the Court grants Defendant’s motion to dismiss. A separate Order dismissing the complaint in its entirety accompanies this Memorandum Opinion.

Discuss the individual and social implications of this problem.

Your Final Paper should include a problem statement or description of the social problem you have selected, a discussion of the scope and consequences of the problem, and an assessment of society’s responses to the problem (including public policies and other less formal responses). Papers should also present a clearly reasoned alternative that is supported by scholarly research.

While the following example can be modified to suit your needs, using this outline as a guide will likely result in a high quality final paper:

Title
Describe the social problem.
Explain why this problem qualifies as a social problem.
Indicate the sociological theory or theories that may explain this social problem.
Discuss the individual and social implications of this problem. Your discussion of implications should be supported by accurate research data.
Summarize what social science experts have to say about this social problem. Are their conclusions methodologically sound?
Explain what we, as a society, have done about this problem, considering public policies and other less formal responses.
Explain how well societal efforts to solve the social problem are working.
Describe an alternative.
Discuss why the alternative is, or can be, an effective response to the problem. Remember to consider negative consequences of the alternative response.
Conclude with reflections and thoughts about your chosen social problem.
References

Writing the Final Paper

The Final Paper:

Must be five to seven double-spaced pages in length, and formatted according to APA style as outlined in the Ashford Writing Center.
Must include a title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must begin with an introductory paragraph that has a succinct thesis statement.
Must address the topic of the paper with critical thought.
Must end with a conclusion that reaffirms your thesis.
Must use at least five scholarly resources, including a minimum of three from the Ashford Online Library.
Must document all sources in APA style, as outlined in the Ashford Writing Center.
Must include a separate reference page, formatted according to APA style as outlined in the Ashford Writing Center

What can be done through social policy to improve treatment options for sexual abuse victims? Explain.

Prof. Stacy

[Pin It]

Jeremy is an 8-year-old boy who used to exhibit normal and happy emotions. Jeremy’s mother, Natalie, works a lot of hours and does not have the time to spend with him. Natalie has entrusted the help of her younger brother, Jacob, who is an unemployed 32-year-old male, to watch Jeremy. Jacob lives with Jeremy and Natalie. Over a period of about 6 months, Jeremy was exhibiting emotions of sadness, being very quiet, and acting withdrawn, which Natalie had witnessed one day while home. Natalie asked Jeremy if everything was okay, and Jeremy quietly replied, “no.”

A letter from Jeremy’s teacher was sent home to Natalie describing her concerns of how Jeremy’s grades in class had dropped and how Jeremy exhibited “some type of emotional withdrawal.” One day, Natalie was sorting Jeremy’s clothes to wash when she saw blood in Jeremy’s undergarments. Natalie had initially believed that Jeremy was missing his father, who was serving in the military in Afghanistan, thus concluding that that was the reason for Jeremy’s change of emotions. Upon speaking with Jeremy about missing his father, Jeremy exhibited little to no emotion, and barely spoke at all. Natalie became very concerned and asked Jeremy repeatedly what was the matter. Jeremy eventually broke down and said, “Uncle Jacob has been doing things to me and makes me sleep with him in the bed.”

Natalie was immediately shocked by what Jeremy had said. Natalie later confronted Jacob about what Jeremy had said, and Jacob denied everything Jeremy claimed he had done to him. While Jacob was away from the house one day, Natalie went through Jacob’s items in his bedroom and found child pornography videos and magazines, as well as pictures of Jeremy in very provocative poses and some nude photographs. Law enforcement was contacted, but Natalie was also concerned about the emotional scars that Jeremy may have because of what took place between him and Jacob, and she began to seek professional help for Jeremy. The local law enforcement agency did advise Natalie that Jacob was also a victim of child sexual abuse but he had never revealed that information until he was interrogated by the police.

Natalie seeks your assistance, a trained counselor who treats child sexual abuse victims, in gaining insight to understanding child sexual abuse. As a trained professional, define and explain the type of sexual abuse from which Jeremy may be suffering. Second, describe what type of treatment program you would suggest for Jeremy to participate in that would address the needs of a victim of child sexual abuse. Finally, what type of treatment should Jacob receive since he is claiming to be a victim of sexual molestation himself?

Assignment Guidelines

Address the following in 1,000–1,250 words:
Fully define, describe, and explain the type of sexual abuse from which Jeremy may be suffering.
What type of treatment program would you suggest for Jeremy to participate in that would address the needs of a victim of child sexual abuse?
Why is this program the most appropriate for Jeremy? Explain in detail.
Be sure to use scholarly sources to support all arguments.
What type of treatment should Jacob receive since he is claiming to be a victim of sexual molestation himself? Explain in detail.
Compare and contrast the appropriate treatments used for young victims of child sexual abuse and adults who have been sexually abused as children.
What challenges exist for each type of victim? Explain in detail.
What role does social policy play in addressing the type of abuse Jeremy suffered in this case? Explain.
What can be done through social policy to improve treatment options for sexual abuse victims? Explain.
How can the availability of treatment programs for people like Jacob be improved? Explain.
How can parents be educated effectively to help them identify when children are potential victims of sexual abuse? Explain.

What safeguards are in place to ensure the security of data and patient information?

Security of Health Care Records

[Pin It]

Security of Health Care Records

With the increase of health information technology used to store and access patient information, the likelihood of security breaches has also risen. In fact, according to the Canadian Medical Association Journal (CMAJ):

In the United States, there was a whopping 97% increase in the number of health records breached from 2010 to 2011… The number of patient records accessed in each breach has also increased substantially, from 26,968 (in 2010) to 49,394 (in 2011). Since August 2009, when the US government regulated that any breach affecting more than 500 patients be publicly disclosed, a total of 385 breaches, involving more than 19 million records, have been reported to the Department of Health and Human Services.

A large portion of those breaches, 39%, occurred because of a lost, stolen, or otherwise compromised portable electronic device—a problem that will likely only get worse as iPads, smartphones, and other gadgets become more common in hospitals. (CMAJ, 2012, p. E215).

Consider your own experiences. Does your organization use portable electronic devices? What safeguards are in place to ensure the security of data and patient information? For this Discussion you consider ethical and security issues surrounding the protection of digital health information.

To prepare:

Review the Learning Resources dealing with the security of digital health care information. Reflect on your own organization or one with which you are familiar, and think about how health information stored electronically is protected.
Consider the nurse’s responsibility to ensure the protection of patient information. What strategies can you use?
Reflect on ethical issues that are likely to arise with the increased access to newer, smaller, and more powerful technology tools.
Consider strategies that can be implemented to ensure that the use of HIT contributes to an overall culture of safety.

Post on or before Day 3 an analysis of the nurse’s responsibility to protect patient information and the extent that HIT has made it easier or more difficult to protect patient privacy. Comment on any security or ethical issues related to the use of portable devices to store information. Assess the strategies your organization uses to safeguard patient information and how these promote a culture of safety. Describe an area where improvement is needed and one strategy that could address the situation.

Reference:

Collier, R. (2012). Medical privacy breaches rising. CMAJ, 184(4), E215–216. Retrieved from http://www.cmaj.ca/content/184/4/E215.full.pdf+html?sid=9e034984-6399-49f0-bb53-12634786beb8
Readings

McGonigle, D., & Mastrian, K. G. (2012). Nursing informatics and the foundation of knowledge (Laureate Education, Inc., custom ed.). Burlington, MA: Jones and Bartlett Learning.
Chapter 5, “Ethical Applications of Informatics”

This chapter examines the ethical dilemmas that arise in nursing informatics. The authors explore the responsibilities for the ethical use of health information technology.
Chapter 15, “Information Copyright and Fair Use and Network Security”

In this chapter, the author explains information fair use and copyright restrictions. The chapter describes processes for ensuring the security of a computer network.
Brown, B. (2009a). Improving the privacy and security of personal health records. Journal of Health Care Compliance, 11(2), 39–40, 68.

Retrieved from the Walden Library databases.

The author of this article examines the use of the document titled “Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identified Health Information.” The article describes how the framework aims to construct an approach to address the privacy and security challenges that come with health information exchanges and personal health records.
Dimitropoulos, L., Patel, V., Scheffler, S. A., & Posnack, S. (2011). Public attitudes toward health information exchange: Perceived benefits and concerns. American Journal of Managed Care, 17, SP111–SP116.

Retrieved from the Walden Library databases.

This article describes a study that sought to determine the attitude of consumers toward electronic health information exchanges (HIE), HIE privacy and security concerns, and the relationship between these concerns and the perceived benefits of HIE. The authors recommend solutions to some of the privacy challenges stimulated by HIE.
Goodman, K. W. (2010). Ethics, information technology, and public health: New challenges for the clinician-patient relationship. Journal of Law, Medicine & Ethics, 38(1), 58–63.

Retrieved from the Walden Library databases.

This article focuses on the challenges generated by the increased level of adoption of health information technology tools. The author emphasizes the ethical issues raised by electronic public health surveillance and the secondary use of health data.
Hoffman, S., & Podgurski, A. (2011). Meaningful use and certification of health information technology: What about safety? Journal of Law, Medicine & Ethics, 39(3), 425–436.

Retrieved from the Walden Library databases.

This article stresses the necessity of sufficient safeguards for EHR systems. The author explores current safety regulations for EHR system design and deployment. The author makes additional recommendations for protecting public health in the digital area.
Rothstein, M. A. (2010). The Hippocratic bargain and health information technology. Journal of Law, Medicine & Ethics, 38(1), 7–13.

Retrieved from the Walden Library databases.

The increasing availability of sensitive patient information granted by electronic health records has generated significant debate about patient privacy. This article examines the potential ethical and legal consequences of patient-directed sequestering of sensitive health information.

Optional Resources

Brown, B. (2009b). Privacy provisions of the American Recovery and Reinvestment Act. Journal of Health Care Compliance, 11(3), 37–38, 72–73.

Retrieved from the Walden Library databases

Explain the difference between direct and representational democracy.

Explain the difference between direct and representational democracy. Include arguments for and against direct and representational democracy.

2. Describe the major provisions that most state constitutions contain.

3. Using examples, discuss how the initiative device affects state politics.

4.Contrast the differences between liberal and conservative ideology in the states. Please include examples.

All questions must be in APA format, and at least 200 words in length excluding references