Health Insurance Benefits

Managers need to understand the impact on the financial viability of a health service organization for providing care to the uninsured or underinsured. Review the following case scenario and provide a substantive 150 to 200 word response that thoroughly answers each of the following questions:

Joe Smith is a 27- year-old Caucasian male who works two part-time jobs for two different construction companies. Joe has been having dizzy spells off and on for the past two months. While driving to work one day, he loses consciousness and is involved in a motor vehicle accident. Joe is admitted to your not-for-profit hospital with a broken leg and multiple lacerations.

  • Does Mr. Smith fit the typical profile for an uninsured person in the United States? Justify your answer.
  • How will your hospital most likely be reimbursed for Mr. Smith’s medical care?
  • During the recent economic downturn, your community has experienced unemployment rates of approximately 9%.  What can be done to mitigate the effects of the financial impact to your organization?
    click here for more information on this paper

Directions

Please solve four (4) programming problems related to the content presented in Chapter 11 in your text. You can find the programming problems in the attached file (Module 4 Programming Problems Worksheet.docx (Links to an external site.)).

  • Download the worksheet and save it as Mod4-Worksheet-Programming-Last-First.docx. For example, Mod4-Worksheet-Programming-Smith-John.docx.
  • Consider the problem, design an algorithm (or algorithms) that would solve the problem, and then implement the algorithm in Java.
  • Create a new folder and name it as Mod4-Java-Programming-Last-First, for example, Mod4-Java-Programming-Smith-John.
  • Write the source code for each problem and save them as .java files in the folder you created. There are four programming problems for this module so you should have four .java files. Name your java files as Mod4Problem#.java, for example, Mod4Problem1.java.
  • Please insert the algorithm written in pseudocode as a comment in the beginning of your program.
  • Take screenshots of your running program – you can take screenshots using PrintScreen or any tool that you are familiar with, making sure that the console window in which you run the program appears on the screen.
  • Copy the screenshots in the worksheet. If your program has different outcomes, take screenshots of each variation.

Submission

  • Compress the folder that saves all of your java files as .zip file. Please note don’t save the worksheet in the same folder as they need to be submitted separately.
  • Submit the following two files as attachments by clicking the Submit Assignment button above.
    • Mod4-Java-Programming-Last-First.zip.
    • Mod4-Worksheet-Programming-Last-First.docx.

Grading

This assignment is worth 40 points. You can find the grading rubric for each program in the worksheet attached above.

  • Sports Statistics (10 pts.).
  • Reading Materials (10 pts.).
  • Courses (10 pts.).
  • Electronic Equipment (10 pts.).
  • attachment

    Mod4_Worksheet_Programming.docx

Evaluating the Case Data
This week, you will construct details of a case study that will form the basis for a Nutritional Care Plan you will prepare over the coming weeks. Your Nutritional Care Plan will be due Week 10.
By the due date assigned, submit your case study in the form of a Word document; double spaced, in 12 pt. font, to the Submissions Area.
NTR2050 Course Project
Nutritional Care Plan
For this project, you will identify a case study and then develop a nutritional care plan for the client associated with that case. You should begin working on your project in advance of Week 5as you construct the details of your case. The completed nutritional care plan for your client is due in Week 10.
Please read this entire document to gain understanding of the project scope and those tasks you will complete. This project will take you several weeks to complete. Do not delay beginning the work on this project.
Project tasks to be completed in Week: 5
Task 1:
Choose from one of the following stages: pregnancy, infancy and childhood, adolescence, adulthood, and old age.
List the specific nutrition issues affecting individuals in your selected stage.
Task 2:
Choose a disease or medical condition that could possibly, or commonly, affect your individual. This could be anything ranging from diabetes to cirrhosis.
Using the ABCDs of nutritional assessment, create a case study based on an actual client or patient. You can also make one up. Include the following in your case study:
Anthropometrics, relevant biochemical tests, clinical assessment, and dietary intake analysis.
Be sure to include a list of common medications that may be used to treat your patient’s condition and identify potential herb/nutrient/drug interactions that may be relevant.
Identify your client’s cultural background and give clues as to their socioeconomic status and psychosocial variables. For example, your patient may be a senior living alone on a fixed income or might be living in a nursing facility with reputed staff.

Follow instructions below 

In a written paper of 1,200-1,500 words, apply the concepts of epidemiology and nursing research to a communicable disease.

Communicable Disease Selection

Choose one communicable disease from the following list:

  1. Chickenpox

Epidemiology Paper Requirements

Include the following in your assignment:

  1. Description of the communicable disease (causes, symptoms, mode of transmission, complications, treatment) and the demographic of interest (mortality, morbidity, incidence, and prevalence).
  2. Describe the determinants of health and explain how those factors contribute to the development of this disease.
  3. Discuss the epidemiologic triangle as it relates to the communicable disease you have selected. Include the host factors, agent factors (presence or absence), and environmental factors. (The textbook describes each element of the epidemiologic triangle).
  4. Explain the role of the community health nurse (case finding, reporting, data collecting, data analysis, and follow-up).
  5. Identify at least one national agency or organization that addresses the communicable disease chosen and describe how the organization(s) contributes to resolving or reducing the impact of disease.

A minimum of three references is required.

Refer to “Communicable Disease Chain” and “Chain of Infection” for assistance completing this assignment.

Prepare this assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to Turnitin. Please refer to the directions in the Student Success Center.

 Topic: Research the popular Types, Pros, Cons and your company’s use of Biometric Identification devices. Remember to get permission from security. If you are not currently employed discuss what types you would recommend.
Instructions: Please download the Assignment 4 Biometrics Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_4_Biometrics_Assessment.docx and submit to the appropriate assignment folder. You must have at least 3 references and 1 must be from the text. The others may be from the text or web sites. I will NOT accept any references from any other sources including journals UNLESS you provide the written proof of the reference with your submission.
  • attachment

    Assignment4BiometricsAssessmentTemplate1.docx

Consumer Behavior Project

Topic: Consumer perception of bottles and tap water
Perform a observation of consumers in regards to your chosen topic and discuss them in the paper. Be sure to discuss observation location.
Detailed Table of Contents (separate page)
EXECUTIVE SUMMARY (separate page)
PROBLEM RECOGNITION 
A statement of the consumer behavior issue being studied
[Insert Table/Graph 1 to present the issue and explain it]
INTERNAL FACTORS ANALYSIS 
[Inset Table 2  to list factors impacting the mediators or dependent variables associated with the issue]
EXTERNAL FACTORS ANALYSIS 
[Inset Table 3 to list factors impacting the mediators or dependent variables associated with the issue]
MODEL AND LITERATURE REVIEW (2 page)
Draw a theoretical model to present and explain your new theory of consumer behavior
[INSERT GRAPH 2]
DATA COLLECTION 
Collect secondary data from sources/journals/websites to support your model
CONCLUSION AND RECOMMENDATION 
Recommendations for marketing actions based on your analysis
REFERENCE (separate pages)
Copies of articles used/sourced

Technology Review #1: Emerging Application of Technology (Consumer or Business).
Objective
The purpose of this technology review is to identify an emerging application of technology, suitable for use by businesses or consumers, and then research the cybersecurity implications of the technology using journal articles, papers published in conference proceedings, and research studies published in dissertations. This type of research is also referred to as a survey of the literature.
Overview
Your audience is a group of senior executives who will be meeting to decide which emerging technologies or emerging applications of technologies should be selected for one or more security-focused, Internal Research & Development projects during the next budget cycle. Each of these executives is responsible for a business area that will (a) develop products that incorporate emerging applications of technology or (b) depend upon such products to support their organization’s operations.
The high-level visibility for your deliverable means that you need to start from a strong foundation of suitable research-based journal articles, papers published in conference proceedings, and doctoral dissertations. The basic question that must be answered is: what are the cybersecurity implications (good or bad) of a specific emerging application of technology.
In addition, the executives have expressed the following information needs, which must be met by the deliverable for this assignment.

  • characteristics of the technology,
  • use of the technology to support or improve cybersecurity,
  • use of the technology to reduce or manage risk,
  • use of the technology to increase resistance to threats/attacks,
  • use of the technology to decrease vulnerabilities in an existing technology application,
  • use or exploitation of the technology by attackers, criminals, terrorists, etc. to accomplish their goals.

Instructions
Format your deliverable as a “descriptive or informative” annotated bibliography. The UMGC library provides information about how to complete this type of assignment. See http://sites.umgc.edu/library/libhow/bibliography_apa.cfm (sub-heading “To get started”). APA style is recommended but, you may use another professional format for your annotated bibliography.
In addition to the list of sources and annotations, you must provide an introductory paragraph.
See the rubric for additional requirements for this assignment.
Choose an Emerging Application of Technology
To begin, choose an emerging application of technology, which is suitable for future use in a consumer-oriented product or service (i.e. a new product for personal or home use) or a business-oriented product or service. Applications of technology that are currently in the emerging stages include:

  • Machine Learning and/or Artificial Intelligence
  • Data Science (especially when used to identify patterns and indicators of threats and attacks)
  • Blockchain Technology
  • 5G Telecommunications Networks
  • Physical Unclonable Functions (PUFs) (devices & electrical circuits)
  • Graphene
  • Nano machines
  • Neuromorphic computer chips

You are encouraged to look for and investigate additional appropriate technologies before deciding upon your technology choice for this assignment.
If you decide to research a technology that is not on the suggested technologies list (see above), you must first request and receive your instructor’s permission.  Your instructor may require that you do preliminary library searches for research papers and technical papers to prove that you can find a sufficient number of resources to complete the assignment.
Find Appropriate Sources (“Survey the Literature”)
Brainstorm keywords that you can use to help find articles, papers, and other scholarly publications (“sources’) which discuss your chosen emerging application of technology.
Your selected sources must come from publications indexed in one or more of the following library databases:

Since the point of this search is to find information about emerging applications of technology, your sources must have a publication date of 2016 or later (2016, 2017, 2018, 2019, 2020, 2021). For papers indexed in Science Direct, you may also use papers that are marked “In Press.”
Allowable source types are: (a) professional journals, (b) conference proceedings, (c) dissertations or theses, and (d) technical magazines (published by either the ACM or IEEE). Each of your selected sources must have a reference list containing at least 3 references for authoritative papers. (See http://sites.umgc.edu/library/libhow/scholarlyjournals.cfm)
To complete this part of the assignment, you may need to review 15 – 20 sources (search results) in order to find 10 papers or articles that are usable for this assignment. The sources you choose must provide technical information about your selected technology (see selection requirements for each paper).
Note: If you have problems accessing any of the library databases, contact the UMGC librarians via the contact methods listed on the library’s home page https://sites.umgc.edu/library/index.cfm . They will be able to assist you with login issues and/or search engine questions (but will not do your research for you).
Create Your Bibliography (List of Sources)
Choose the 10 best sources from your searches for articles, papers, and dissertations. Focus on the ones that give details about your technology and how it can be used in an emerging application of technology. Next, write the reference list entry (APA, MLA, or another appropriate professional citation style) for each source. Alphabetize your list of reference list entries. After you have the correctly ordered list, number your entries from 1 to 10. Note: different reference entry formats are used for different types of sources. Review the UMGC Library’s “Get Help > Citing and Writing for samples and explanations of the formatting rules. If you are using APA format, your list should look something like the following.

  1. (date). Article title. Publication name, vol(issue), #-#.
  2. (date). Paper title. Published in the Proceedings of conference-name, pp. #-#.
  3. Author …

Write Your Annotations
In an annotated bibliography, the annotation is a paragraph or two placed under the reference list entry for each source. For this assignment, the annotation should be a combination of factual information from the source and your evaluation (opinion) of that information. To accomplish this, you should read the abstract, introduction section, and closing sections for each article or paper. For dissertations, look over the Introduction and the Literature Review (usually Chapters 1 & 2). From this information, develop a one to three paragraph informative or descriptive summary of the source that includes: (a) a description of technology and its characteristics, (b) planned uses of the technology (products, services, etc.), and (c) your thoughts and opinions as to how you could use this paper to justify selecting the technology for an Internal Research & Development study.
In each annotation, you should provide at least one specific example of a characteristic and/or application of the technology, e.g. an emerging technology, which impacts cybersecurity.
For example, for an annotation for an article about graphene’s applications to product design, you could discuss how it could be used to manufacture cell phone cases or laptop cases which are less breakable than cases made with current materials. This could positively impact availability because the new case design using graphene would be expected to decrease the risk of breakage. Decreased risk of breakage will decrease the probability of loss of availability caused by a broken case. Decreasing the probability of a negative event will decrease the risk associated with that event
Note: Remember that the security posture of a system or product is framed in terms of risk, threats, vulnerabilities, etc. Improvements to the security posture (positive security implications) will result in reduced risk, increased resistance to threats or attacks, and decreased vulnerability.  Negative impacts on the security posture will result in increased risk, decreased resistance to threats / attacks, and increased vulnerability (weakness).
As you write the annotations for each article / paper / dissertation, make sure that you include YOUR thoughts and ideas about the security implications of this technology. Use standard terminology from the readings and glossaries provided in the LEO classroom.
As you brainstorm the security implications of this technology (if these are not specifically discussed by your source), you should consider use of the technology to improve cybersecurity. Then consider applications or uses which will negatively impact the security posture of an organization or the security of individual consumers or users of the product. It is very important that you consider BOTH SIDES OF THIS ISSUE.
Putting It All Together

  1. Consult the grading rubric for specific content and formatting requirements for this assignment.
  2. Your 5-8 page annotated bibliography should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.
  3. Your paper should use standard terms and definitions for cybersecurity.
  4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.
  5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count.
  6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
  7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

 

Week 4 Assignment 1: Building Awareness of the Value of BI (Outcomes 1, 2, 3, 4; The Regis Nine Outcomes 1, 3, 4, 5, 6, 8, 9)
Student Teams will select a company or an organization as the course project. It is recommended the company or organization currently collects and uses (in some form) analytics to develop reports and/or make business decisions. It is important the team can access company information. A privately-held company/organization can be a challenge in terms of collecting data unless a team member is an employee of the company/organization and has prior approval to access information. Teams should not select a company or organization with a market capitalization of more than $1 billion or less than $5 million. The course instructor will need to approval all exceptions to the rule.
1. Select a company/organization as the course project.
2. Provide a detailed outline of the company/organization in terms of its industry, product/service, history, corporate structure, top financial components (revenues, expenses and profits or losses), corporate objectives, mission/vision/values, customer base, value proposition, and competition.
3. Discuss the types of business intelligence standard for the industry that covers the company/organization
4.1 Discuss the types of business intelligence/data gathering/data warehousing used by the company/organization.
4.2 how the company/organization’s business units/segments use the data to improve financial success, customer service, product/service quality, product/service development/improvements, operations (supply chain), sales and marketing.
The assignment should be no more than six double-spaced pages in length and APA formatted. A resource for APA formatting can be found at Purdue OWL. Include a research reference page. The page count should include only assignment information. A cover sheet, reference page, etc. are not included in the assignment page count. The assignment should be posted within the course assignments/dropbox as outlined by the course facilitator.