Monday, May 25, 2020

Concept Paper - 1098 Words

Concept Paper 1: During Election year, does this play a big role in increasing the country’s Gross Domestic product? I. Rationale In every country, gross domestic product (GDP) serves as an indicator to determine how well does the country performed for a specific period of time. It is an estimation of the value of the total goods and services it has produced. It matters to us when our country’s gross domestic product constantly increases from period to period, but is there really a massive increase in a country’s gross domestic product when it is election year? It is said that during this time, gross deomestic product is expected to increase for factors such as manufacturing, construction, and financial intermediation really†¦show more content†¦No matter what job anyone is into, that company is already engage in business. Hence, the group will need the number of jobs present in the society, categorize them in the field of business they are into and get the statistics of employment engage in those jobs and hence, in the industry. The source could be a statistical source in knowing how ma ny jobs is there in an industry, at least the most known and important jobs then tally their employment records in each jobs. Concept Paper 3: How can Instagram, Facebook, or other social media be good for business? I. Rationale With the fast developing technology, more and more people make use of social medias and online based websites to communicate with one another. Some of these benefits are faster disimination of information, communication become more convinient and accessible and many more. Thus, small and large companies nowadays are adapting these technological changes. Different business industries have entered the growing area of online selling to expand their market to more people easily. Business people create accounts in various social media sites particularly in Facebook and Instagram to showcase the various products that they offer. In this way, people, especially those who are not capable of not visiting the physical stores, can be reached out. However, before entering a new market or adapting to technological changes, it is important for businesses to first assess the potential threats andShow MoreRelatedResearch Paper: Content Analysis of Nine Creative Concepts Found in Magazine Ad vertisements.1392 Words   |  6 Pagesquantitative, cross-sectional, exploratory and descriptive content analysis of selected advertisements from two different magazines published in August 2012 using the nine different creative concepts as main emphasis. 2 RESEARCH CRITERIA The main research problem deals with the use of creative concepts in advertisements which is a mass media issue and therefore contributes to the existing knowledge in communication studies. The issue is also of interest to the researcher as a media studiesRead MoreConcept Paper Template And Ppt Concept1021 Words   |  5 PagesExplore Concept Paper Template and PPT Concept Paper The process of exploring the concept paper template and the PPT Concept paper required a lot of reading and discovery, but the essentials learned from the templates and the dissertation process will be very beneficial in the future when it is time to construct and develop a dissertation. The Northcentral University dissertation center provides valuable information and step-by-step instructions to help the student develop their dissertation andRead MoreConcept Paper: Bullying1640 Words   |  7 PagesGeneral Santos Doctors’ Medical School Foundation Inc., ------------------------------------------------- Bulaong, General Santos City ------------------------------------------------- THESIS CONCEPT PAPER Group Members: Cherry Mae S. Bercero Date: June 24, 2013 Kenneth Jay M. Erasmo Florean Joyce J. Ramillano Keziah Keila C. Vallente Course: BS PSYCHOLOGY Part I. Research Topic / Area: The Level of Awareness on Bullying among Students of General Santos Doctors’ Medical School FoundationRead MoreVenture Concepts Paper826 Words   |  4 PagesVenture Concepts Paper Krashanti Wyatt FIN/375- Financial Management in the Small Business 10/01/2012 Dr. Betty Ahmed Venture Concepts Paper Introduction The conceptual venture that I am going to start when I get all the resources that I need is Wyatt’s Liquor and Tobacco Store. At my store, customers will be able to purchase varieties of liquor, beer, wine, and tobacco products. The Wyatt’s Liquor and Tobacco Store will be the cheapest store around that customers will be able to purchaseRead MoreConcept Analysis Paper : The Concept Of Caring2447 Words   |  10 Pages Concept Analysis Paper: The Concept of Caring Mallory M. Miner Idaho State University Concept Analysis Paper: The Concept of Caring Introduction As humans, we naturally want to care for and be taken care of. According to (McEwen Wills) concepts are terms that refer to phenomena that occur in nature or in thought. Caring is a concept that everyone can relate to and wants. The term â€Å"caring† can be used in relation to nurses, patients, and healthcare facilities. The purposeRead MoreHopelessness Concept Paper2643 Words   |  11 PagesRunning Head: CONCEPT ANALYSIS OF HOPELESSNESS 1 Hopelessness: A Concept Analysis by Linda Gouthro A Paper Submitted in partial fulfillment of the requirements for NU 607 Critical Analysis of the Scientific Underpinnings of Advanced Nursing Practice University of South Alabama College of Nursing Fall 2010 Running Head: CONCEPT ANALYSIS OF HOPELESSNESS 2 Hopelessness: A Concept Analysis Introduction Paragraph: Hopelessness is a familiar term generally used to denote a negative emotionalRead MoreSelf Concept Paper1841 Words   |  8 PagesSelf Concept Paper Although, many people like and dislike many of their physical appearances they have to cope with the fact that they can not change them and that their unique characteristics make them who they are. My favorite characteristic is my hair; I like my hair because it is long and curly. I can do a number of different styles with my hair such as straightening it, making it wavy or leaving it curly. I’ve never been bothered with my hair because my hair is unique and not many people haveRead MoreApplied Concept Paper5805 Words   |  24 PagesGLOBAL STRATEGY AND POLICY Prepared for: Professor Harry Schwartz | Applied Concepts Paper | Module D Chapter 6 – Strategy Formulation: Situation Analysis and Business StrategyChapter 7 – Strategy Formulation: Corporate StrategyChapter 8 – Strategy Formulation: Functional strategy and Strategic Choice | | LM ZXXXXXXXX | 10/25/2012 | | Table of Contents Executive Summary 3 Abstracts 4-5 Concepts 6-7 Analysis 8-10 Conclusion 10 Appendices 11-21 References 11 Read MoreConcept Application Paper10385 Words   |  42 PagesCHAPTER 4 ACTIVITY-BASED COST SYSTEMS TRUE/FALSE 1. Traditional cost systems use actual departments or cost centers for defining cost pools to accumulate and redistribute costs. a. True b. False 2. Activity-based cost systems use cost centers to accumulate costs. a. True b. False 3. Traditional cost systems are likely to undercost complex products with lower production volume. a. True b. False 4. The first step in designing an activity-based costRead MoreConcept Paper or Pre-Proposal1307 Words   |  6 PagesThis is an unsolicited proposal. A template for a statement of purpose/solution follows: The purpose of this concept paper is to request [approval or support] in the form of [ approval, equipment, funding, personnel, resources] to solve [description of a problem] so that [benefits of implementing the solution]. Sample purpose statements: †¢ The purpose of this concept paper is to request your approval to develop a technical proposal to request funding from the National Science Foundation

Friday, May 15, 2020

Does Face Recognition Play A Part Of How Quickly People...

Does face recognition play a part in how quickly people are able recall names or occupations? Abstract Face and object recognition is considered to be a very complex procedure to do, due to the fact that it requires a lot of processing before our memory essentially recognises the object. They were 30 digital images of faces from the Karolinska Directed Emotional Faces database which were used for the study (Lundqvist, Flykt, Ãâ€"hman, 1998). The 30 digital images were all males, wearing grey t-shirts; and had their eyes and mouths fixed to coordinate for image standardization. It was hypothesised that it would be challenging for an individual to remember someone’s name than it would be to remember their occupation. The results for this†¦show more content†¦What makes names difficult to remember is due to the fact that they are different languages with different pronunciations. This is why people are most likely to remember someone’s occupation rather than their name. Furthermore people usually find that names do not hold information that concerns the identity of an individual; than just too simply label someone McWeeny et al. (1987). Terry (1994) also conducted a similar study which also evidenced that participants found it difficult to remember names. In this study it was shown by the level of accuracy that information had a significant effect on the ability to put face, occupation and names together; according to the participants’ results. However the results also show that emotions have no influence when it comes to recalling. Overall this indicates that occupation plays a major part and is what enables individuals to recognise another people easily. Generally having the ability to recognize faces is very important in many aspects of life. It allows us to recognize faces of the people who we are close to, and also allows us to identify unfamiliar individuals so that we can be more aware of possible dangers. Facial recognition is a complex process that involves using knowledge and experience to get an average face and compare it to other faces. Concepts and categories are used to support in the object memory process as well as encoding information to long-term

Wednesday, May 6, 2020

Dialectical Behavior Therapy - 833 Words

Description of Dialectical Behavior Therapy Dialectical Behavior Therapy (DBT) is a comprehensive cognitive-behavioral treatment developed by Marsha M. Linehan for the treatment of complex, difficult-to-treat mental disorders. Originally, DBT was developed to treat individuals diagnosed with borderline personality disorder (BPD; Carson-Wong, Rizvi, Steffel, 2013; Scheel, 2000). However, DBT has evolved into a treatment for multi-disordered individuals with BPD. In addition, DBT has been adapted for the treatment of other behavioral disorders involving emotional dysregulation, for example, substance abuse, binge eating, and for settings, such as inpatient and partial hospitalization. Dimeff and Linehan (2001) described five functions†¦show more content†¦Finally, therapist may be reinforced for iatrogenic treatment, where they reward clients for ineffective treatment strategies and punish them for effective treatment strategies. To address these difficulties, Linehan developed several modifications which formed the basis of DBT. (Dimeff Linehan, Dialectical behavior therapy in a nutshell, 2001) DBT is designed to treat clients at all levels of severity and complexity of disorders. A growing body of empirical studies has examined DBT. DBT has been the subject of the most study and is the most widely used (Carson-Wong, Rizvi, Steffel, 2013). In one study, Axelrod, et al. (2011) adapted DBT to treat pre-adolescent children who were engaging in nonsuicidal self harming behaviors. The goal of this study was to adapt DBT skills to accommodate the developmental level of younger children. The results of the study provided promising evidence for the use of DBT for children with severe suicidal and nonsuicidal behaviors. At the end of the study, there was a significant increase in adaptive coping skills and a significant decrease in depressive symptoms, behavioral problems and suicidal ideations. However, there are several limitations to this study. One, the sample size is small, and there results may not generalize to other populations. Second, the study was conducted for only sixShow MoreRelatedDialectical Behavior Therapy And Mindfulness Essay1353 Words   |  6 PagesDialectical Behavior Therapy Mindfulness Mindfulness is another way of meditation. Meditation was used to seek to improve one’s psychological or physical health, or spiritual growth. (Brantley, 2007). The history of Mindfulness comes from Buddhism and his search for enlightenment and a foundation of the four noble truths. The Buddha teaching focus on the four noble truths which consist of knowing suffering exists, there is a cause of suffering, there is cessation of suffering and there is a pathRead MoreDialectical Behavior Therapy Is A Second Wave Therapy1065 Words   |  5 PagesDialectical Behavior Therapy is a Third Wave Therapy created by Marsha Linehan in the 1970’s. It comes from a Cognitive Behavioral perspective. In High School she wanted to become a psychiatrist and work with the most mentally disturbed patients. She realized, however, that there weren’t a lot of effective treatments for these patients. She then decided to earn a PhD in experiential personality psychology (Prochaska Norcro ss 2014 p. ). Linehan wanted to work with the most difficult patients,Read MoreDialectical Behavior Therapy As A Treatment For Borderline Personality Disorder1482 Words   |  6 PagesDialectical Behavior Therapy as a Treatment for Borderline Personality Disorder What is Borderline Personality Disorder? Personality disorders are characterized by the Diagnostic and Statistic Manual of Mental Disorders-5 (DSM-5; American Psychiatric Association, 2013) as disorders where impulsivity is the main deficit and without treatment, it acquires new symptoms as time progresses. The four core features that are prevalent in all personality disorders include dysfunctional thinkingRead MoreDialectical Behavior Therapy ( Dbt ) Essay1974 Words   |  8 PagesDialectical Behavior Therapy Dialectical Behavior Therapy (DBT) is an innovative and contemporary approach to treatment for clients that display behaviors associated with the diagnosis of Borderline Personality Disorder (BPD) (Andreasson, Krogh, Wenneberg, Jessen, Krakauer, Gluud Nordentoft, 2016). DBT was created by Marsha Linehan at the University of Washington, where she studied emotionally vulnerable individuals who were diagnosed with BPD (Burke Stepp, 2012) Individuals living with BPDRead More Dialectical Behavior Therapy (DBT) Essay2635 Words   |  11 PagesDescription of Dialectical Behavior Therapy Dialectical Behavior Therapy (DBT) is a comprehensive cognitive-behavioral treatment developed by Marsha M. Linehan for the treatment of complex, difficult-to-treat mental disorders. Originally, DBT was developed to treat individuals diagnosed with borderline personality disorder (BPD; Carson-Wong, Rizvi, Steffel, 2013; Scheel, 2000). However, DBT has evolved into a treatment for multi-disordered individuals with BPD. In addition, DBT has been adaptedRead MoreLiving With Borderline Personality Disorder Essay1131 Words   |  5 Pageswhat is borderline personality disorder? Borderline personality disorder is a serious mental disorder marked by a pattern of ongoing instability in moods, behavior, self-image and functioning (Borderline Personality Disorder, 2016). I wanted to know what symptoms of BPD are and Patient A stated, â€Å"symptoms of BPD are impulsive actions or behaviors, really unhealthy relationships, it’s all or nothing, there can be no in the middle with rela tionships, feeling alone or isolated, feeling empty, always beingRead MoreMy Emerging Behavioral Therapy Theory1711 Words   |  7 PagesMy emerging theory employed aspects of therapy from the humanism, existentialism, dialectical behavior, and when necessary exposure therapy. These theories have represented me as a person. As I have presented them here, they through the lens of each other, they work to form one integrative approach. As Rogerian humanism has laid the foundation for ways of being, this theory also incorporated Dr. Marsha Linehan’s structure of dialectical behavioral therapy’s and goals expressed by Yalom in existentialismRead MoreDr. Young Uses Dialectical Behavior Therapy Essay1751 Words   |  8 Pageswith therapy – until I conducted an interview with Dr. Priscilla Young, a psychiatric mental health nurse practitioner with Kennebec Behavioral Health. First, a little bit about the interviewee - Dr. Young received a Master’s in Advanced Practice Psychiatric Nursing from Husson University in 2005. As a psychiatrist, she prescribes medications to clients, but also does psychotherapy during sessions. My goal for the interview was to determine the population Dr. Young works with, the therapies and techniquesRead MoreDialectical Behavior Therapy : An Evidence Based Treatment For Borderline Personality Disorder1141 Words   |  5 PagesDialectical behavior therapy (DBT) is an evidence-based treatment for borderline personality disorder (BPD) and PTSD (Cukor, 2009). The therapy focuses on a balance between change and acceptance. DBT is combined with individual psychotherapy and building skills groups to regulate emotion, mindfulness and distress tolerance. There are two stages associated with DBT. The first entails the use of DBT for individuals with BPD with significant trauma histories and PTSD (Welch Rothbaum, 2007). Patients Read MoreClass, Dialectical Behavior Therapy ( Dbt ) Skills Group, And A Chronic Pain Group2062 Words   |  9 PagesThroughout this semester I have been able to attend three different groups and they all have taught me something different. The three groups that I have been a part of are: Love and Logic Parenting Class, Dialectical Behavior Therapy (DBT) Skills Group, and a Chronic Pain Group. The DBT group is the one that I have been a part the longest and will write most of my paper on. In this group there were originally three members, however, as of this week a new group member has joined. The way the DBT

Tuesday, May 5, 2020

In Privacy And Security For Cloud Computing -Myassignmenthelp.Com

Question: Discuss About The In Privacy And Security For Cloud Computing? Answer: Introducation It is very important that Webb stores should not fully rely on the encryption services offered by the cloud vendors. As encryptions services consumer, huge resources, cloud vendors offer minimal encryption services. Instead Webb stores should also use encryption at their end before sending the data on the cloud. They also ensure that encryption key is located in on premise locations only and not on cloud. Restricted access to employees: People should have restricted access based on their role and should see only the data they need. Critical data should be read only so that no one can change it. Using RSA Secure ID systems for generating real time passwords and extra layer of prevention (Khanezaei, Hanapi, 2014) Ensure that all the machines have latest anti-viruses and all the fixes whether they belong to software, operating systems or any other should be installed as soon as possible. The only way to ensure is that controlling the updates features centrally and do not give users the choice of not installing updated (Hashizume, et al., 2013). Recent attack on NHS hospitals of UK by malware WannaCry was happened because the company did not update the latest fix by Microsoft which Microsoft released 2 month before this ransomware attack. Describe the benefits and issues that would be the result of your deployment of these security measures. Using encryption at Webb stores before sending data to the cloud is highly effective and while transmitting also, data is encrypted. Also, this will provide another layer of data protection and maintain confidentiality since even cloud vendors will do no have access to your data. Restricting access will ensure that only the key people have access to important functions like edit the data (Pearson, 2013) Secure ID systems that will generate real time password will add multi factor authentication and even if one of the password of user is leaked, still the intruders will not able to enter the system due to non-verification of RSA secure password. Ensuring updated version of every tool will ensure the protection because these tools and operating systems found the vulnerabilities in their systems from time to time and release fixes to remove these vulnerabilities (Rittinghouse, Ransome, 2016) What are the risks associated with migrating this mission critical database to the cloud? You should name and describe each risk that you identify that applies to: The database Data loss risks applies to the database. In case of a provider going of a business or suffers from technical problem at their end, there is a risk of losing the complete databased for the Webb stores. Data removal risk: This data is mission critical and suppose Webb stores wants to remove any data from their database, it will be removed from its database but how it will be permanently removed from the cloud as cloud is maintaining multiple copies at multiple locations. The IaaS infrastructure Compliance risks: There are rules and polices of Cloud computing designed by the Australian and New Zealand government and each IaaS Infrastructure must abide by those polices. There are policies that prevent vendors from storing data outside the country but cloud vendors maintain numerous copies of their Cloud and stored them in their data centers across different parts of the world. There are various Audits like SAS 70 and many more and each cloud vendor must furnish the details of conducting these audits and thus it is mandatory that cloud vendor must abide by all such policies. Vendor lock in risks: It is possible that IaaS vendor has suddenly increase the prices of their services or there can also be any other conflict and thus, Webb stores want to move their data out of the cloud on some other vendor cloud or on their premise, how it will be handled. Sometimes vendors claim their proprietary data if data is created or analyzed by using their tool, how such things will be handled is a big risk (ALi, Khan, Vasilakos, 2015). The communications between Webbs and their IaaS database in the cloud Data leakage risks: There is risk of intruders and attackers during data communication between Webbs and their IaaS database (Chang, 2015) Identity Access management risk: There is risk of identity verification and if right authorized person is accessing the data. Webbs is considering the use of the Cloud for backup and possibly also for archival of records. What are the risks and issues associated with backing up data to the cloud? You should name and describe each risk that you identify that applies to: Backing up data to the Cloud Too much time in restoring backup: Backing up the data is used so that in case anything goes wrong, backup data can be used. Now, Webb must ensure the timely retrieval of their backup data from the cloud. Restoring data from cloud using bandwidth will be very slow as compared to the restoring the backup from the tapes (Nicolini, et al., 2015) Backup Windows size: For backup, Data needs to be moved from machines to servers on a continuous basis and thus it will be consuming the bandwidth making the overall network slow (Yao, Lu, Zhu, 2014) Storage of data in the Cloud Data privacy risk: Webb stores having the confidential information related to payment details of customers and many more and any compromise of the cloud security vendor can put the companys data on risk iii. Retrieval of data from the cloud. Identity Risk: Cloud vendors do not have strong mechanism in place to distinguish between the authentic traffic and malicious traffic which is a very high risk for the Webb stores. Network risk: Cloud vendor will send the data after decryption to your systems and if the Webb stores is not using encryption/decryption at their end, unencrypted data transmission over the network can be very much vulnerable to attackers and intruders. How does Webbs use of a Cloud backup affect their DR plans? Describe how you see that their backup and restore strategy will change as a result of this service. Earlier backup was maintained on the tapes in-house and hence retrieval is pretty much fast however in case of outsourcing backup services also to the cloud vendor, Disaster recovery plan must be changed. In this case, DR plans will make use of bandwidth and thus Webb stores should ensure that it is using high speed internet so that restoration can happen very quickly. Webb stores also plan to conduct a pilot project regarding restoring the backup and can analyses the time needed, costs and bandwidth requirements (Couto, et al., 2014). How should Webbs protect access to these services that they are now moving to the Cloud? Describe what you would recommend to Webbs Board to protect access to: Their IaaS infrastructure, Webb stores should give access to only authorized person based on their role. For example, a person responsible for buying should see only the relevant details based on his role and not everything that is stored on the cloud. Another way is to use services of specialized security and Access management vendors like RSA Secure ID that generates a password on real time basis and involves multi-factor authentication (Khalil, Khreishah, Azeem, 2014). This will drastically reduce any unauthorized access. Their Ms SQL Server 2012 R2 cloud instance, Webb stores should use encryption at their end also and do not rely solely on the encryption and security services of the cloud network. In this case, if the data of the cloud is compromised, Webb stores data will still be encrypted. Web stores must ensure that it is storing the data encryption key somewhere else and not on the cloud. Their Cloud network infrastructure The biggest challenge here is that cloud vendor does not have any firewalls that can differentiate the data from the Webb stores and the data coming from malicious users. In such cases, they should ensure that cloud vendor is using the virtual cloud firewall using virtual security device that will be deployed within your tenant environment and separate customer traffic from malicious traffic. Also, Webb stores should clearly bring this topic in contract with the cloud vendors and also adds clause of penalty in case of any default. Their Cloud backup and restore infrastructure challenges, security issues as well as how these issues can be solved. Backup and restoring is a time taking activity and involves a lot of challenges. It is recommended that Webb stores should ask their vendor to conduct a Pilot project where they will be showcasing their capability how fast they can restore the back up and also Webb stores should setup the Service Level agreements (SLAs) that restoration must happen within this time frame otherwise there will be a penalty. Also, there should be clauses like network should be up and available more than 99% of the time and any downtime must be communicated 2 weeks in advance (Almorsy, Grundy, Muller, 2016). Webb stores also need to educate its IT users how to handle phishing emails because clicking on malicious emails by any user on a network can pose a risk to entire network. References Ali, M., Khan, S. U., Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges.Information Sciences,305, 357-383. Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Chang, V. (2015). Towards a Big Data system disaster recovery in a Private Cloud.Ad Hoc Networks,35, 65-82. Couto, R. D. S., Secci, S., Campista, M. E. M., Costa, L. H. M. K. (2014). Network design requirements for disaster resilience in IaaS clouds.IEEE Communications Magazine,52(10), 52-58. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Khalil, I., Khreishah, A., Azeem, M. (2014). Consolidated Identity Management System for secure mobile cloud computing.Computer networks,65, 99-110. Khanezaei, N., Hanapi, Z. M. (2014, December). A framework based on RSA and AES encryption algorithms for cloud computing services. InSystems, Process and Control (ICSPC), 2014 IEEE Conference on(pp. 58-62). IEEE. Nicolini, M. J., Wildes, R. A., Slawsky, J. E., Sabjan, C. A., Alexander, J. W., Freiheit, K., ... Gregory, R. D. I. (2015).U.S. Patent No. 9,122,711. Washington, DC: U.S. Patent and Trademark Office. Pearson, S. (2013). Privacy, security and trust in cloud computing. InPrivacy and Security for Cloud Computing(pp. 3-42). Springer London. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Yao, J., Lu, P., Zhu, Z. (2014, June). Minimizing disaster backup window for geo-distributed multi-datacenter cloud systems. InCommunications (ICC), 2014 IEEE International Conference on(pp. 3631-3635). IEEE.