Objectives: To have students understand how the media plays a role in the agenda of the market.
Read the NY Times article titled “How Companies Learn Your Secrets” (February 16, 2012; available at http://www.nytimes.com/2012/02/19/magazine/shoppinghabits.html?pagewanted=6&_r=2&hp). Once you have read this article, watch the film, Consuming Kids: https://www.youtube.com/watch?v=tMaRsR7orTk
(This film is 1 hour long).
Once you read the article and watch the film, answer these questions in your journal prompt

  1. How have cultivation and agenda setting changed now that digital users make their interests available to media producers?
  2. How has big data changed our assumptions about the agenda? What might it mean that users cultivate their own messages?
  3. What current day examples do we see at play when thinking about cultivation theory and agenda-setting?

Please see the instructions attached and the additional download needed to complete the writing assignment.

***REPLY TO EACH POST 100 WORDS MIN EACH***
1. I have chosen Decontamination following an event.  One such Event that has happened recently not in the U.S. but on the deck of  U.S. Aircraft Carrier was the Fukushima nuclear disaster.  After a 9.0 earthquake and Tsunami that followed caused the rod coiling at the Nuclear plant to fail.  The Carrier U.S. Ronald Regan is forward deployed to Japan and was sent to the area to provide assistance, while at the time the Navy thought they were at a safe distance and did not take to much radiation, it was later proven that the Carrier had gotten to close to the actual Radiation Cloud and took on more than was thought.  The carrier did take emergency actions of turning into the wind and emergency wash down, it was to late as many Sailors took on to much Radiation and are still fighting the after effects to this day. After 9/11 and Hurricane Katrina the U.S. has put billion of dollars into the responding to Natural Disasters and Terrorist attacks.  A All the money is being funneled into the initial response and it leaves out many factors like environment, science and technology.  While most scholars think that a terrorist dirty bomb will not have the death toll of Katrina but where the problem is, the United States doesn’t have the technology to clean urban areas that is contaminated with Radiation.  So if a couple of dirty bombs are released in say Dallas a city of a little over a million people, the initial blast and first wave a radiation is the least of our problems, its the after effects of the lingering radiation.  So we have to find a way to fix that rather quickly, because we are living on borrowed time before a terrorist group gets their hand on a RDD and causes havoc in one of our Major Cities.
2. For this week’s discussion, I chose to focus on “Ionizing radiation effects on cells and tissues”. While many people recongnize that radiation is dangerous, most people do not know just how radiation can change and effect the body. Ionizing radiation is most commonly found in medical devices, primarily X-rays. However, the world is bombarded by ionizing radiation on a daily basis, either from radioactive material found in soil, water and rock, to the radiation from the sun (World Health Organization). First, when it comes to the effect radiation has on the body, the first major factor is the amount of radiation that is absorbed by the body. The second major factor is what type of radiation is it. Both factors will influence the amount and type of damage that cells and tissues can experience. The most accurate way for health officials to measure the severity of the radiation is the sievert (Sv), which factors in the sensitivity of tissues and organs and the type of radiation in it’s measurements (World Health Organization 2016). The most basic form of damage that can be done by radiation is increasing the likelihood of cancer. Research has suggested that even lower doses of radiation, 50-100 mSv (millisieverts), can increase a person’s chance of getting cancer. Radiation primarily attacks a cell’s ability to control how and when it replicates. Ionizing radiation can effect the genes of a cell witch in turn can cause cancer. Furthermore, the more radiation that is absorbed by the body, the more danger you are in. In extreme exposure, between 1 sievert to 10 sieverts, many cells can be killed, which in turn can impair how vital organs function (Australian Government, 2001). Symptoms of this level of exposure can cause nausea, burns across the body and a weakened immune system. Due to radiation changing how a cell replicates and controls itself, adults are naturally more resistant to radiation than children. Children’s cells are constantly changing and replicating to accommodate their growing bodies, which in turn makes it easier for radiation to essentially, mess up the cells rhythm.
3. To enable analysts to reduce cognitive and perceptual, I choose Analysis of competing hypotheses (ACH) (Diagnostic), Team A/Team B (Contrarian) and Red Team Analysis (Imaginative). ACH – ACH technique identifies and compare alternative explanations course. Uses analytic methods to evaluate evidence bearing on hypotheses (Chang et al, 2017). Team A/Team B – Identifies, evaluates, and assimilates data and information from separate analytic teams (Chang et al, 2017). I believe it implements analytic techniques throughout the organization to maintain checks and balances on self and others. Red Team Analysis – Red team analysis exercises flexibility, it replicate how an adversary would think about the threat/risk to estimate course of action (Chang et al, 2017). I believe it is vital to understand foreign cultural, religious, and political views. I believe time is one of the key components of intelligence analyst to success; faster decide and quicker movement to execution will generally prevail terrorist threat. Therefore, today, intelligence analyst will require a different set of skills compared to those used by the analyst before 9/11 attacks. According to Hare et al., (2016). “We have envisaged a workflow in which analytical graft (collating, reading, remembering, etc.) is largely outsourced to machinery (p. 868). Artificial Intelligence (AI) is a wide-ranging tool that enables intelligence analyst to rethink how they integrate information, analyze data, and use the resulting insights to improve an assessment for the policymaker. Future analyst will need to understand “how to interact with data tools, what the most effective methods are, and accommodate the limitations of machines, which primarily means being more explicit and formal in their approach to methodology than is necessary today” (Hare et al, 2016, p. 869). However, I still believe intelligence analyst will need to know the human factors and psychological science, so they do not get trapped in analysis paralysis. If intelligence analysts are unaware of or have failed to think through decisions
4. This week we are tasked with choosing three structured analytic techniques (one diagnostic, one contrarian, and one imaginative) that we believe will best enable analysts to reduce cognitive and perceptual biases. The diagnostic technique I think would be best would be a key assumptions check. Key assumptions checks aim to look past biases and look at concrete facts based on past precedents (“A Tradecraft Primer”, 2009). This focus on facts and historical evidence is exactly why I think this technique would be best to mitigate the effects of biases. The scenario used in our reading was of particular interest to me. The example uses the 2002 DC Sniper Case as an example, as it details key assumptions made and the probability and risks involved with each assumption regarding the shooter’s race, gender, and accomplices (“A Tradecraft Primer”, 2009). The contrarian technique I chose is the Devil’s Advocate technique. The reason for this is because the Devil’s Advocate technique requires analysts to observe and strengthen any holes or weak spots in their analysis. To quote our reading, the value here is in challenging assumptions “to see if they will not hold up under some circumstances” (“A Tradecraft Primer”, 2009). I think this is a great technique in preventing problems that arise from biases before they begin. The imaginative technique I have chosen is brainstorming. Brainstorming allows analysts to be creative, and when combined with an outsider (for example, someone from a different culture or educational background) can bean effective way to take multiple points of view into account in order to minimize the effects of biases.As for the future, I do think there will be a different set of skills necessary to do the job. Unfortunately, I think catastrophe drives changes in the approaches intelligence analysts take. Ideally, this will not happen. But realistically, just as Pearl Harbor and the 9/11 attacks drove reform and changes within the IC, I think another disaster is sure to occur in the future that restructures the way analysts approach problems.
5.       In this week’s lesson, we learned about the importance of sharing information between agencies and partners within the homeland security enterprise. This is made possible and facilitated by fusion centers throughout the country. A fusion center is defined as a collaborative effort between two or more agencies providing resources, expertise, and/or information the goal of maximizing the ability to detect, prevent, apprehend and respond to criminal and terrorist activity (Carter, C. 2009). Its concept is to make it easier to share and disseminate information to those various government and private homeland security enterprises in achieving the goal of protecting the homeland (Carter, C. 2009). The value of these fusion centers to the homeland security concept is that is can be a centralized, organized and known place to seek and input information about various threats that might be relevant to an agencies area of responsibility. The benefit of having on-site representatives that can act as liaisons for their agency and reach out for additional resources if needed is of tremendous value in my eyes. As the lead federal investigative agency for counterterrorism and intelligence collection with the U.S., the FBI has an important role to play within the homeland security enterprise (Kraft, M. 2012). It takes charge during domestic terrorism crisis within the U.S. and takes on role of the on-scene manager for the U.S. government (Kraft, M. 2012). The Joint Terrorism Task Force (JTTF) concept are small cells of locally based investigators, analyst, SWAT experts, and other specialist from other law enforcement and intelligence agencies (Kraft, M. 2012). The JTTF seems to be a fusion center but more for the management and operational side of missions with the FBI and its partners. The JTTF has been successful throughout the years and has grown by over 71 created post 9/11 (Kraft, M. 2012). By being a focal point for the FBI and its partners, the JTTF has shown the value it brings into the homeland security enterprise in keeping it safe.
6. Fist let us say that the DHS believes that homeland security starts with hometown security. It is mainly the work of local police forces that stop potential terrorist plots from happening. However, that does not mean that they can do all the work required. This is where fusion centers come in to play, they are an effort to create a more effective information sharing, training and educational environment. They are supported by the federal government who then provides local police, fire, emergency response, public safety, public health and private security personnel with the necessary tools. Some of these tools include the ability to collaborate across jurisdictional and geographic boundaries. They train and give access to federal systems, credentials and security clearances. The fusion centers are directed by the Department of Homeland Security and the Department of Justice. Now, the Joint Terrorism Task force, JTTF. It was founded in New York in 1980 but grew significantly since 9/11. Now there are over 4,000 members nationwide. While the local and state entities are responsible for combating terrorist activities, the JTTF is still an effective force and is comprised of local officers. The National Joint Terrorism Task Force, NJTTF, is in Washington DC and coordinates with the JTTF and the FBI. The FBI views the JTTF as the nations front line on terrorism. The JTTF is an important resource for sharing intelligence developed from FBI-led counterterrorism investigations.
Purpose of Assignment 
This assignment continues to connect the topics learned in the course. Week 4 is a continuation of your Week 3 paper, and the final paper.
Assignment Steps
a. Review the instructor’s feedback and update your paper. Add the following new content. This is the final paper, which will be graded. Use this paper to help prepare your Wk 5 Presentation.
b. Descriptive Statistics: Numerical Measures. Use numerical measures that might be best for summarizing the data if you had collected a sample. Recall the Wk3 Measuring Salespeople Performance Template. Lind LO1-3.
c. Descriptive Statistics: Graphical Measures. Use graphical measures that might be best for summarizing this data, if you were to collect a sample. Recall the Wk 2 Graphical Techniques Instructions 365. Lind LO2-2, -4, LO4-4, -6.
Points. Total 80 points.
Earn 20 points for reviewing the instructor’s feedback and making corrections.
Earn 60 points for completing the Week 4 topics.
Format your paper consistent with APA guidelines.
  • attachment

    GraphicalTechniques2.docx
  • attachment

    GraphicalTechniques2.xlsx
  • attachment

    Wk2QNT351r6GraphicalTechniquesTemplate1.xlsx
  • attachment

    Wk2GraphicalTechniquesGradingGuide1.docx
  • attachment

    Graphical2.xlsx
  • attachment

    GraphicalTechniquesInstructions3651.xlsx
In further preparation for your audit of the company your team selected, you decided to gather your team and discuss Audit Evidence and Documentation Standards for this audit. Your preparation included a review of evidence and documentation literature (Ch. 7). To properly prepare the staff that will be working with you, you decide to create a Cheat Sheet on Evidence and Documentation to be used in your presentation. Prepare a “Cheat Sheet” that briefly describes Audit Evidence and Documentation Standards, which includes the following topics. Each topic should be 90 to 175 words: Comparison of Audit, Scientific and Legal Evidence Standards
The purpose of this discussion board forum is to provide a way in which you can demonstrate your understanding of the basic organizational patterns for a speech, the influence of the quality of your ideas, and the underlying principles of sound organization by completing the following tasks in an initial discussion board thread:
1. Create a topic for each of the basic organizational patterns.
2. Create an outline for each of the organizational patterns explained in your course textbook.  Please use Microsoft Word to create your outline and submit it as an attachment with your initial discussion board thread.
3. Explain how the quality of your ideas helped you with matching topics and patterns.
4. Write a 150-200 word summary of the underlying principles of sound organization.
In addition to the initial thread, you are required to reply to 2 other peers’ threads. Each reply must be 150-200 words in length and be substantive in content, adding to the discussion the peer began in his/her initial thread. Your replies should address any differences found in your initial thread and theirs, provide feedback on their outline, as well as further expand upon what you have learned through this learning activity.
To facilitate discussion, post earlier than required and check back regularly. You may also post more than the required minimum responses if you choose.
Using the information in the course textbook regarding speech development, listen to two speeches from an online source. YouTube is a great place to find speeches. Once you have selected and viewed two speeches, create an initial thread and respond to the following prompts:

  • Provide the title for the two speeches you chose and the URLs/hyperlinks of where you found them online.
  • Describe why you chose to two speeches to evaluate.
  • Evaluate the speeches concerning their topic choices, organizational styles, strategic choices, introductions, and conclusions.

In addition to the initial thread, you are required to reply to 2 other peers’ threads. Each reply must be 150-200 words in length and be substantive in content, adding to the discussion the peer began in his/her initial thread. Your replies should address any differences found in your initial thread and theirs, as well as further expand upon what you have learned through this learning activity.
To facilitate discussion, post earlier than required and check back regularly. You may also post more than the required minimum responses if you choose.

POWER POINT PRESENTATION.

15 SLIDES WITH NOTES

FOR NURSING PROGRAM BACHELORS IN NURSING ON WEST COAST UNIVERSITY

Follow these assignment parameters in your presentation:

  • Identify three short-term goals and three long-term goals related to your professional aspirations. You may also include a five-year plan if you wish. These goals should be reasonable within the time frames presented.
  • Describe how you plan to meet your professional goals:

·         What steps will you take?

·         What milestones will you set? (How will you know you are making progress?)

·         How will you use your strengths to meet your goals?

·         What challenges do you foresee, and how will you overcome them to meet your goals?

·         Include opportunities to leverage your ePortfolio and other resources to meet your goals.

  • Explain how this nursing program and specific courses or assignments within it impacted your goals (goals met and goals still to achieve).

·         Identify specific achievements during your program (e.g., a goal GPA, an attendance goal, certificates, improved writing skills).

·         Self-evaluate your success at meeting the program outcomes and essentials.

  • Identify memorable assignments or courses, epiphanies, or moments when your course work directly impacted your professional work.
  • Describe your current nursing philosophy and reflect on how it supports your goals and aspirations.
  • Be sure to include an introduction (introduce yourself briefly) and a conclusion to your presentation.

RUBRICS:

Information is presented in a clear, logical order with an apparent beginning, middle, and end. The speaker does not jump around from one idea to another. A clear closing to the presentation is provided.

All parameters of the assignment are met. Links to supporting documents and visual aids are used to support the spoken content when needed. Technical terms are well defined in language appropriate for the target audience. References to documents or visual aid components are specific and clear so that they can be easily identified. Presentation contains accurate and complete information. Ideas, facts, and information provided demonstrate a strong, confident, understanding of the assignment.

The assignment consistently follows current APA format and is free from errors in formatting, citation, and references. No grammatical, spelling, or punctuation errors. All sources are cited and referenced correctly.

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Learning Activity: Monitoring Observed Policy Outcomes

After viewing this week’s presentations and completing the reading assignments, each student is to write their own Discussion Board (DB) question on the topic of policy analysis and assembling evidence based on the readings and course content. Then, provide a comprehensive, well-reasoned and evidence-based response to your own prompt in 250–500 words. You will submit your response as a paper assignment.
Remember that the response must be thoughtful and comprehensive, citing outside sources as supporting evidence (details, sensible approach) and the writing represents Strayer Writing Standards and style in tone, clarity, citations and stylistic points.
Your assignment must follow these formatting requirements:

  • This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Document attached