Hi, How Can We Help You?
  • Address: 1251 Lake Forest Drive New York
  • Email Address: assignmenthelpcentral@gmail.com

Category Archives: Blog

August 12, 2025
August 12, 2025

Social Science Discipline Reflection

Reflect: Reflect upon the themes that the disciplines covered this week explore and the methods that they use to explore these topics. How do these different approaches and themes help contribute to the larger understanding of society, culture, and human behavior? Based upon your understandings of these disciplines, how might their approach to topics be helpful to other disciplines within the social sciences? Other academic disciplines outside of the social sciences? To the general public?In addition, think about the strategies used by practitioners of these disciplines to avoid bias. Do these differ from the social science disciplines that you read about last week? If so, how? Can these approaches be adapted for use outside of the social sciences?Write: In an initial post of at least 250 words

Social Science Discipline Reflection

  • Select one of the three disciplines examined this week, and discuss why you selected the discipline you did and how this discipline is distinct from other disciplines in the social sciences (Think about methods topics explored, etc.).
  • Social Science Discipline Reflection
  • Examine the topic discussed by the source linked above for your discipline.
    • Describe how your selected topic is related to the concepts of the individual, society, and culture.
    • Note the main points of the article, its conclusion, and assess how the questions asked by the social scientist in question are related to their discipline’s practice.
    • Discuss the methodology used within the article and relate the authors’ approach to specific examples in the text.
  • Assess any potential connections between the discipline you examined this week and the disciplines explored in week 3 with regard to the source you examined.
  • Postulate potential applications for your selected discipline and its approaches to everyday life.

Please use in-text APA citations within your post, as well as full APA references at the end of your post. If you need APA assistance, review the APA StyleLinks to an external site. resources.

Social Science Discipline Reflection

  • Why did you select the discipline you did  and how is it distinct from other social sciences?,

  • How is your selected topic related to the concepts of the individual, society  and culture?,

  • What are the main points of the article, and how are the questions asked related to the discipline’s practice?,

  • What methodology was used in the article, and how does it connect to specific examples in the text?,

  • What potential applications does your selected discipline have in everyday life?

August 11, 2025
August 11, 2025

Cybersecurity Strategy for PBI-FS

Your Task:

You have been assigned to support the Padgett-Beale Merger & Acquisition (M&A) team working under the direct supervision of Padgett-Beale’s Chief Information Security Officer (CISO). The M&A team is in the planning stages for how it will integrate a new acquisition, Island Banking Services, into the company as its financial services arm (PBI-FS). Initially, PBI-FS will function as a wholly owned subsidiary which means that it must have its own separate cybersecurity program.

Your first major task (Project #1) will be to help develop a Cybersecurity Strategy & Plan of Action for PBI-FS. Island Banking Services never had a formal cybersecurity program so you’re starting from scratch. You will need to research best practices as well as relying heavily upon what you learned in your undergraduate studies in Cybersecurity Management and Policy. The CISO has provided detailed instructions for this task. (These appear after the Background section below.)

Background

Cybersecurity Strategy for PBI-FS

After five years of operation, Island Banking Services — a non-U.S. firm — was forced into bankruptcy after criminal money laundering charges were filed against the company and its officers. Padgett-Beale, Inc. purchased the digital assets and records of this financial services firm from the bankruptcy courts. The purchased assets include licenses for office productivity software, financial transactions processing software, database software, and operating systems for workstations and servers. Additional assets included in the sale include the hardware, software, and licensing required to operate the company’s internal computer networks.

Figure 1. Island Banking Services IT Infrastructure Purchased by Padgett-Beale, Inc.

Padgett-Beale’s legal counsel successfully negotiated with the bankruptcy court and the criminal courts for the return of copies of the company’s records so that it could restart Island Banking Service’s operations. The courts agreed to do so after Padgett-Beale committed in writing to reopening the customer service call center (but not the branch offices) on the island. Reopening the call center will provide continued employment for 10 island residents including 2 call center supervisors. Padgett-Beale intends to relocate the call center to a company owned property approximately 10 miles away from the current location and adjacent to a newly opened Padgett-Beale resort.

Padgett-Beale’s Risk Manager has recommended that the Merger & Acquisition plan be amended such that Island Banking Services would be operated as a wholly owned subsidiary for a period of 5 years rather than being immediately and fully integrated as an operating element of Padgett-Beale. The company’s attorneys agreed that this would be the best approach given the potential for additional legal troubles related to the actions of the previous owners and employees. The Board of Directors has signed off on this amendment to the M&A plan and stipulated that the new subsidiary will be named PBI Financial Services (PBI-FS). The company officers and senior managers for PBI-FS will be named at a later date. For now, the leader of the M&A Team will serve as the Chief Operating Officer. Padgett-Beale’s Chief Information Security Officer will be loaned to PBI-FS while a search is conducted for a dedicated CISO for the subsidiary.

Cybersecurity Strategy for PBI-FS

CISO’s Detailed Instructions to You

The CISO has given you and your team mates a set of instructions (below) which you should follow as you complete this task.

Task #1: Read and Analyze the Background Materials

If you have not already done so, read the Background information in this file. Next, review the Padgett-Beale M&A Profile 2020 which was posted to the LEO classroom. You should also review all materials from the classroom for Weeks 1 – 4 as these provide needed information about the Financial Services industry and the legal and regulatory requirements which apply to this industry.

Task #2: Perform a Gap Analysis & Construct a Risk Register

Using the information available to you, determine the most likely information technology/security gaps which existed at Island Banking Services prior to its being acquired by PBI. Next, determine which of these, if not addressed, will likely exist in the newly formed subsidiary PBI-FS. Document your analysis and evaluation in a Gap Analysis.

Your Gap Analysis should address operating issues relating to confidentiality, integrity, and availability (CIA) of information, information systems, and information infrastructures owned or used by PBI-FS. Your analysis should also consider and use the People, Process, and Technology framework.

Step 1: Identify 10 or more significant cybersecurity issues/challenges/risks which the background information and M&A profile indicate currently exist at PBI-FS / Island Banking Services. You are allowed to “read between the lines” but must be able to map your analysis and findings to specific statements from these documents. These items will become your “Gaps” for the Gap Analysis. Use one or more cybersecurity frameworks or standards (e.g. NIST CSF; People, Processes, and Technologies; Confidentiality, integrity, availability) to organize your analysis.

Note: there was significant criminal behavior found at Island Banking Services. Your analysis must address internal weaknesses which allowed this to occur without being discovered by the employees who were not involved in the crimes.

Step 2: Using your Gap Analysis (step 1) create a Risk Register (see Table 1 at the end of this file) in which you list 10 or more specific and separate risks. For each risk, assign a category (confidentiality, integrity, availability, people, process, technology) and a severity (impact level using a 1 – 5 scale with 5 being the highest potential impact).

Step 3: Review the laws and regulatory guidance which apply to the Financial Services industry and companies like Island Banking Services. For each entry in your risk register, identify and record the laws, regulations, or standards which provide guidance as to how the identified risks must be addressed or mitigated. Record this in your risk register.

Step 4: Review laws and regulations which apply to all companies, i.e. Sarbanes Oxley, IRS regulations for Business Records, SEC regulations and reporting requirements, etc. Review your Risk Register and either map these requirements to existing entries in your risk register or insert new entries for significant legal or regulatory requirements which you were not able to map to your previously identified risks. (Include risk related to non-compliance.)

Step 5: Review section 1.2 Risk Management and the Cybersecurity Framework in the NIST Cybersecurity Framework v1.1 (https://‌nvlpubs.nist.gov/‌nistpubs/‌CSWP/‌NIST. ‌CSWP. ‌04162018.pdf)

Using this information, determine the best strategy for addressing (“treating”) each of your identified risks. Remember the four types of risk mitigation strategies (accept, avoid, control, transfer).

Consider the business impact for each of your mitigation strategies (e.g. if you applied an “avoid” strategy across the board, the company would not be able to operate in the financial services industry because it would need to shut down all operations).

Record your risk mitigation strategy for each risk in your risk register. For each of your “control” entries, include the corresponding control category and subcategory (if applicable) from the NIST Cybersecurity Framework (see Tables 1 and 2 in version 1.1). Examples: ID.AM Asset Management or PR.AC Identity Management and Access Control. Remember to cite your sources.

Step 6: Develop a Cybersecurity Strategy that presents five or more specific actions (strategies) that the company should take to implement your recommended risk mitigations. Include information from your gap analysis, legal and regulatory analysis, risk analysis and proposed risk mitigations. Under each strategy include information about how the strategy will affect or leverage people, policies, processes, and technologies (hardware, software, infrastructure). Include examples and other pertinent information about Island Banking Services and Padgett-Beale. You should have at least one technology related strategy which includes an updated Network Diagram. This diagram must show the to-be state of the IT infrastructure including recommended mitigating or “control” technologies, e.g. intrusion detection, firewalls, DMZ’s, etc. (start with the diagram provided in this assignment file).

Note: Your strategy will be presented to the Board of Directors by the executive who is leading the Merger & Acquisition Team so make sure that you write in appropriate language and include sufficient detail to explain your recommended strategy.

Step 7: Develop and document a proposed plan of action and implementation timeline that addresses each element of the cybersecurity strategy that you identified previously (in step 6). Provide time, effort, and cost estimates for implementing your recommended actions (include appropriate explanations of your reasoning). Include the resources (people, money, etc.) necessary for completing each task in the timeline.

Step 8: Develop a set of 5 or more high-level summary of recommendations regarding the next steps to take in mitigating the risks that you identified in steps 1-7. These recommendations should logically flow from your analysis and be supported by your Cybersecurity Strategy and Plan of Action.

Putting It All Together

1. Format your work for Steps 1-7 as a Cybersecurity Strategy and Plan of Action. The six major elements listed below should appear in this order in a single file. Your MS Word format document file must include:

· Introduction (what is in this document and to what organization does it apply)

· Gap Analysis (Step 1)

· Legal & Regulatory Requirements Analysis (Steps 3, 4)

· Risk Analysis & Risk Register (Steps 2, 3, 4, 5)

· Cybersecurity Strategy (Step 6)

· Plan of Action and Implementation Timeline (Step 7)

The Cybersecurity Strategy and Plan of Action is a comprehensive MS Word document that includes a separate title page followed by the six major elements (see list under step 7) and ending with a reference list. Your document must include a reference list and appropriate citations throughout. You will need 10 – 12 pages to fully document your strategy and plan. Use section headings and sub headings to organize your work. You may use internal title pages (section titles) to make it clear where each of the major elements begins and ends. Title pages and reference pages are not included in the recommended length.

2. Format your recommendations from Step 8 as a Cover Letter / Recommendations Memo to accompany your Security Strategy document.

The Recommendation Memo is a 2 page, professionally formatted memorandum addressed to the Merger & Acquisition Team. This cover letter / memo should summarize why this package is being forwarded to the M&A team for “review and action.” The memo should introduce and provide a brief summary of the purpose and contents of the Cybersecurity Strategy and Plan of Action (name and describe each of the major sections). Use a professional format for your memo (consider using one of the MS Word templates). The memo does not include citations or references but, you may need to name laws or regulations.

Notes on Constructing Your Network Diagram (for step 6):

Your diagram must be based upon the provided network diagram with additions or deletions that are clearly your own work. You may use MS Word’s drawing tools, Power Point, or other drawing program. When you have completed your diagram, you may find it helpful to take a screen snapshot and then pasted that into your deliverable file(s).

You may use commercial or “free” clip-art to represent individual end point devices or network appliances such as routers, firewalls, IDPS, etc.) Clip art does not need to be cited provided that it is clip art (not screen captures from another author’s work).

Additional Information

Cybersecurity Strategy for PBI-FS

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your paper should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper.

3. Your paper should use standard terms and definitions for cybersecurity.

4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Paper_Template(TOC+TOF,2021).docx.

5. All submission files must begin with a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file.

6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, etc.).

  1. What are the most likely cybersecurity gaps at Island Banking Services prior to acquisition?,

  2. How should these gaps be documented and categorized in a risk register?,

  3. What legal and regulatory requirements apply to PBI-FS in the financial services industry?,

  4. What specific cybersecurity strategies should be implemented to mitigate identified risks?,

  5. What is the recommended plan of action and implementation timeline for these strategies?

August 11, 2025
August 11, 2025

NIMS Impact on Disaster Response

Response to natural and man-made disasters have changed quite significantly since the implementation of the National Incident Management System (NIMS). Provide an example of a recent natural disaster or terrorist attack that has occurred in your region in the last 10 years. In what ways do you think the implementation of NIMS shaped the responding organization’s response? What component of NIMS do you believe was the most helpful in the response to the incident you identified? Explain your rationale.

NIMS Impact on Disaster Response

If you do not currently live in the United States, you may choose an incident in an area you have a connection to or one on which you are most informed.

NIMS Impact on Disaster Response

TEXTBOOK

Oliver, W. M., Marion, N. E., & Hill, J. B. (2021). Introduction to homeland security: Policy, organization, and administration (2nd ed.). Jones & Bartlett Learning. https://online.vitalsource.com/#/books/9781284205213

  1. What is an example of a recent natural disaster or terrorist attack in your region within the last 10 years?,

  2. How did the implementation of NIMS shape the responding organization’s response?,

  3. Which component of NIMS was the most helpful during the incident?,

  4. Why was this NIMS component particularly effective?,

  5. How does the identified incident illustrate improvements in disaster response?


Comprehensive General Response:

A notable example of a recent disaster in the United States is Hurricane Harvey (2017), which devastated parts of Texas, causing catastrophic flooding and displacing hundreds of thousands of residents. The response to Harvey highlighted the significant influence of the National Incident Management System (NIMS) in coordinating large-scale, multi-jurisdictional operations.

The implementation of NIMS shaped the response by establishing a common framework for communication, decision-making, and resource allocation among federal agencies (FEMA, Coast Guard), state emergency management teams, local first responders, and non-governmental organizations such as the Red Cross. Through the Incident Command System (ICS) structure mandated under NIMS, responders could operate under a unified command, which reduced redundancy and improved efficiency in rescue and relief operations.

The most helpful NIMS component during Hurricane Harvey was Unified Command under ICS. This ensured that leaders from different agencies could make coordinated decisions, share intelligence, and prioritize actions based on a collective operational picture rather than working in silos. This coordination was especially important in managing evacuations, deploying search-and-rescue teams, and organizing shelter and medical services for displaced individuals.

Unified Command was effective because it streamlined communication, eliminated conflicting orders, and ensured that critical resources—like boats, helicopters, and medical supplies—were sent where they were needed most. In previous large-scale disasters before NIMS was fully implemented, response efforts often suffered from confusion, duplicated efforts, and competition for resources. In Harvey’s case, the use of NIMS principles allowed a more strategic and collaborative response, ultimately saving more lives and reducing suffering.

Overall, the Hurricane Harvey example illustrates that post-NIMS disaster management is far more structured, cooperative, and adaptable. By using shared terminology, joint planning processes, and flexible organizational structures, agencies can respond to both natural and man-made disasters with greater precision and speed than in the pre-NIMS era. NIMS Impact on Disaster Response

August 11, 2025
August 11, 2025

Student Records DB

A prestigious university has recently implemented a consolidation strategy that will require it to centralize their student records. In order to move forward, the local university will need to develop a data model that will retain student records and perform various data extract transform and load (ETL) processes. Imagine that you have been hired as a database consultant to assist in the development of a data design strategy for the student records.

You met with various university subject matter experts and have determined the following after performing various business analysis processes:

  • Faculty groups are divided by core competencies that the university offers. For example, there are groups such as the art faculty, computer technology faculty, language faculty, and science faculty. Each faculty member has an assigned dean and is designated to teach at one particular campus and school. They are able to teach as many courses as required.
  • Courses are categorized by course code and title. Certain courses have prerequisites and the university has asked for this to be cataloged as well.
  • There are various schools within each campus. For example, the Los Angeles campus holds the following schools: School of Science, School of Law, and School of Computer Technology. Additionally, each school offers different professional study programs, such as Forensic Computer Science, Marine Biology, Business Management, and Civil Engineering, to name a few.
  • The study path for students requires that they be enrolled in a specific professional study program. The professional study program requires the students to complete a specific set of core courses. The university also requires that an online grade book be available. The online grade book should show grades awarded to students for specific courses and the term they completed the course.
  • The university identifies each student by their name, date of birth, social, and professional study program.

Student Records DB

Instructions

Using these findings, write a 3–4 page paper in which you:

  • Student Records DB

  • Analyze the university’s requirements and provide a proposal to organize all the required data elements. The proposal should include the following:
    • Provide an entity relationship model (ERM) that will describe the data structure that will store all data elements. Note: The graphically depicted solution is not included in the required page length.
    • Describe any assumptions or limitations for each relationship. For example, professors are able to teach more than one course, or students can only be enrolled in one program.
  • Create the primary key and foreign keys using a UML class diagram for each table.
  • Suggest at least four types of business intelligence reports that could help the university in course management, student enrollment, or historical tracking. Support your answer by providing specific business functions that these reports could be used for to assist executives of the university.
  • Consider outsourcing the functions above as an alternative for development of the database. Research the Internet and other media sources for vendors who develop registrar and school management database systems.
    • Suggest three vendors that developed and are employing efficient registrar and school management database systems and support your reasons to choose from one of these three vendors.
    • Compare and contrast the key aspects that each system offers. Examples of system aspects include but are not limited to cloud based, pricing model, open source, et cetera.
  • Go to the Strayer Library to locate at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
  • The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in any chart or drawing tool with which you are familiar. The completed diagrams or charts must be imported into the Word document before the paper is submitted.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all supports. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Propose a database design.
  • Student Records DB

  • How should the university organize required data elements for centralized student records (ERM proposal)?,

  • What assumptions/limitations apply to relationships in the model?,

  • What are the primary keys and foreign keys (UML-style) for each main table?,

  • What BI reports would be useful for course management enrollment and historical tracking?,

  • Which vendors could the university outsource to (3 vendors), and how do they compare?

August 11, 2025
August 11, 2025

Illinois Civil Rights Case Analysis

In Part I this week, choose a Federal Supreme Court case that originated in illinois that

involves civil rights or civil liberties that was heard by the United States Supreme Court,

and a decision was rendered. If illinois does not have a case that was decided by the United

States Supreme Court, choose a civil rights case from another state for which the United

States Supreme Court issued a decision.

Here is a brief description of civil rights and civil liberties: Civil rights refers to equal social

opportunities under the law. It gives you these freedoms, such as the right to vote, the

right to public education, or a fair trial, among other things, regardless of your wealth or

race. Civil liberties mean freedom of religion, equal treatment and due process under the

law, and the right to privacy.

You should be able to go online and look up your state and famous cases decided by the

Supreme Court. For example, Brown v Board of Education (1951) started in Topeka,

Kansas, and ended up in the Supreme Court of the United States. Another example would

be Calvary Chapel Dayton Valley v Steve Sisolak, Governor of Nevada (2020), which

started in Nevada and ended up in the United States Supreme Court. A good source of

information about cases decided by the United States Supreme Court is

Illinois Civil Rights Case Analysis

Some other examples of cases include Lau v Nichols, Tinker v DesMoines Independent Community School District, Terry v Ohio, Regents of California v Bakke, Schenck v United States, Plessy v Ferguson, Shelley v Kraemer, Texas v Johnson, Ysleta del Sur Pueblo v Texas, Korematsu v United States, Obergefell v Hodges, Laird v Tatum and Loving v Virginia.

Other sources can be researched online using search terms for “civil rights cases decided

by the U.S. Supreme Court.” Be sure to use a case actually decided by the United States

Supreme Court, and not a case decided by your state’s supreme court or a different court.

A case that is still pending before the United States Supreme Court should not be used.

Illinois Civil Rights Case Analysis

Summary of the Case

In one or two paragraphs, provide a general overview of the case that serves as a snapshot

of what the case is about and how it ended up in your state high court. A summary is using

your words to write a brief history of the case. Do not give your opinion or your

interpretation but stick to the facts only.

CaseOutline

Your court case outline should include:

Title: Name of the case

Facts of the case: Provide key facts involving the case.

History of the case:What legal action was taken based onwhat your state laws say about

this case?

Legal questions:What were the legal issues the court had to decide?

Decision or holdings: Did the court decide for the plaintiff or the defendant? Explain the

reason behind the decision?

Verdict and opinion (judgment):What were the concurring and dissenting opinions? How

many judges decided for the defendant and howmany justices decided against the

defendant?What was the final verdict from the judge or the jury, if it was a jury trial?

Conclusion:

What was the resulting impact of the ruling? How did the citizens of your state benefit

from it?Was this a good decision?

Requirement The length of your outline will vary. Usually an outline is anywhere from 1-3 pages long.

Make sure to write full sentences to explain your case. It is a concise list to be used as a

reference for you during the presentation.

Using the outline, youwill be describing the court case in your presentation and the

scenario around the court case. The use ofWikipedia as a primary source of information is

to be avoided – it is not a reliable source of information.

Search for an example of a case outline in the Internet.Without going intomuch detail at

this state, each of the items listed above has a subject sentence with 3-6 bullet points that

can help you expand on the topic.

● 1-inchmargins

● Double spaced

Illinois Civil Rights Case Analysis

● 12-point Times NewRoman font

● Title page

● References page (minimum of 2 scholarly sources)

  1. What is the title of the chosen Supreme Court case?,

  2. What are the key facts of the case?,

  3. What was the legal history leading to the Supreme Court?,

  4. What legal questions did the Court decide?,

  5. What was the decision verdict and impact of the ruling?

August 11, 2025
August 11, 2025

Advocacy in Human Services

· Discuss an issue you strongly believe should be advocated for in your field, discipline, or community.

· Describe how you would present data or evidence to your congressperson, senator, or community representative if you were to lobby or advocate on behalf of that issue.

· Analyze a human services provider’s role in influencing federal, state, and local policy decisions.

Cite and reference your sources in  APA Style Links to an external site.  as outlined in the Writing Center resource.

Required Resources

Text

Advocacy in Human Services

Advocacy in Human Services

Karger, H. J., & Stoesz, D. (2023).  American social welfare policy: A pluralist approach  (9th ed). Pearson.

· Chapter 1: Social Policy and the American Welfare State

· Chapter 3: Social Welfare Policy Research

· Chapter 8: The Making of Governmental Policy

· The full-text version of this ebook is available through the RedShelf platform. This text provides the information necessary for understanding social welfare policy nationally and internationally. It covers the basic concepts, policies, and programs of the American welfare state and includes information on the voluntary nonprofit sector, the for-profit corporate sector, and the new strategy in social policy. Chapter 1 provides an overview of the American welfare state. Chapter 3 discusses social welfare policy research through a systematic and structured framework. Chapter 8 discusses the technical aspects of public policies and processes. These chapters will assist with your Lobbying and Advocacy discussion forum and Creating a Plan to Advocate and Lobby: Case Scenario journal this week.

· Read the article  Final Lines of Defense: Explaining Policy Advocacy by Immigrant-Serving OrganizationsLinks to an external site. .

· Read the article  Expanding Nonprofit AdvocacyLinks to an external site.

Advocacy in Human Services

  1. What is an issue you strongly believe should be advocated for in your field, discipline or community?

  2. How would you present data or evidence to a congressperson senator or community representative to advocate for this issue?,

  3. What is the role of a human services provider in influencing federal policy decisions?,

  4. What is the role of a human services provider in influencing state policy decisions?,

  5. What is the role of a human services provider in influencing local policy decisions?


Comprehensive Answers

1. Issue for advocacy
A critical issue in the human services field that warrants strong advocacy is affordable mental health care access. Despite growing public awareness, many individuals—particularly in underserved communities—face financial, geographic, and systemic barriers to receiving timely and effective mental health services. Addressing this issue would reduce the burden on emergency services, improve workforce productivity, and enhance overall community well-being.


2. Presenting evidence to policymakers
To lobby effectively, I would prepare a concise, evidence-based briefing that includes both quantitative data and personal narratives. For example, I could present local statistics on the shortage of mental health providers per capita, hospitalization rates due to untreated mental illness, and the economic costs of mental health-related absenteeism. I would combine this with brief case studies or anonymized testimonials illustrating the human impact of inaccessible care. Data visualizations—such as infographics showing service gaps by county—would help convey urgency. The goal is to connect facts with emotional resonance while proposing specific, actionable policy changes (e.g., increased Medicaid reimbursement rates for mental health services).


3. Role in influencing federal policy
At the federal level, human services providers influence policy by advocating for legislative reforms, funding allocations, and regulatory changes that support vulnerable populations. They often collaborate with national advocacy organizations to lobby Congress, participate in federal advisory committees, and provide expert testimony at hearings. By sharing frontline experiences, they ensure that federal policy proposals are grounded in the realities of service delivery.


4. Role in influencing state policy
In state policy, providers work closely with state legislators, agency directors, and professional associations to shape laws and budgets affecting social programs. They might contribute to the drafting of state-level bills, participate in state advisory boards, or organize advocacy days at the state capitol. Since states control Medicaid administration and licensing requirements, providers can influence how these systems are designed and implemented to better meet local needs.

August 11, 2025
August 11, 2025

Nursing’s Early Development

The Emergence of the Nursing Profession in America

● Describe what historical events contributed to the idea of hospitals and sick

care in the United States at the beginning of the 19th century. Examine how the

Nurse Society of Philadelphia aided at the beginning of nursing education.

● The American CivilWar demandedwomen to enter the workforce as nurses.

Examine how the Nightingale schools emerged in the late 1800s, what was the

nature of these schools, andwhat did their education emphasize?

● Assess how the nursing profession was organized and diversified by the early

20th century.What were some of the challenges in employment conditions

nurses faced?

Nursing’s Early Development

Nursing’s Early Development

● Analyze howWorldWar I revolutionized the nursing profession.What changes

do you see post-War tomodern practices of nursing? Provide a couple of

examples.

● Length: 3–4 pages (not including title page or references page)

● 1-inchmargins

● Double spaced

● 12-point Times NewRoman font

● Title page

● References page

● In-text citations that correspondwith your end references

Nursing’s Early Development

  1. What historical events contributed to the idea of hospitals and sick care in the U.S. at the start of the 19th century and how did the Nurse Society of Philadelphia aid early nursing education?,

  2. How did the American Civil War lead women to enter nursing, and how did Nightingale schools emerge in the late 1800s?,

  3. What was the nature of the Nightingale schools, and what did their education emphasize?,

  4. How was the nursing profession organized and diversified by the early 20th century, and what challenges did nurses face in employment conditions?,

  5. How did World War I revolutionize the nursing profession, and what changes from post-war practices are seen in modern nursing?


Comprehensive Answers

1. Historical events and early nursing education
In the early 19th century, urbanization, industrial growth, and public health crises such as cholera outbreaks created a pressing need for organized sick care and permanent hospitals in the United States. Hospitals began shifting from being places for the poor to becoming institutions for broader medical care. The Nurse Society of Philadelphia, founded in 1839, was instrumental in formalizing nursing education in America. It provided training to women in bedside care, midwifery, and hygiene, combining hands-on practice with moral and ethical instruction. This set the groundwork for nursing as a skilled profession rather than informal domestic care.


2. Civil War and emergence of Nightingale schools
The American Civil War (1861–1865) required unprecedented numbers of nurses to care for wounded soldiers. Women such as Clara Barton and Dorothea Dix stepped into leadership roles, demonstrating the necessity of trained nursing care in military and civilian contexts. After the war, inspired by Florence Nightingale’s model in Britain, American reformers began establishing training programs based on her principles. The first Nightingale-style school in the U.S. opened at Bellevue Hospital in 1873, marking a shift toward standardized nursing education.


3. Nature and emphasis of Nightingale schools
Nightingale schools emphasized a rigorous curriculum combining theory with extensive clinical practice. Students were trained in hygiene, sanitation, patient observation, nutrition, and hospital organization. Education focused on discipline, moral character, and service, aiming to elevate nursing’s reputation. While these schools improved professional standards, they also maintained a hierarchical system where nurses were expected to be deferential to physicians and hospital administrators, reflecting the gender norms of the era.


4. Nursing in the early 20th century and challenges
By the early 1900s, nursing organizations such as the American Nurses Association (ANA) and the National League for Nursing Education (NLNE) provided professional structure and advocacy for the field. Specialization emerged, with nurses working in public health, school nursing, and industrial settings. However, employment conditions were challenging: nurses often worked long hours for low pay, had limited job security, and were subject to strict moral codes governing their personal lives. Many hospitals also used student nurses as cheap labor, limiting opportunities for fully trained nurses in leadership roles.


5. World War I’s impact and post-war changes
World War I greatly expanded the scope and visibility of nursing. Nurses served near battlefronts, in field hospitals, and aboard hospital ships, handling trauma care, infectious diseases, and surgical assistance. The war accelerated advances in aseptic technique, emergency care, and the professional authority of nurses. Post-war, these experiences translated into modern practices such as expanded nurse training programs, more autonomy in clinical decision-making, and the creation of public health initiatives. Examples include the growth of visiting nurse services and specialized fields like anesthesiology nursing, both root

August 11, 2025
August 11, 2025

Sports Performance Correlation Study

Students will develop an individual work that conducts a correlation analysis of the data that they will collect in the field of sports. Students are also required to present and interpret the correlation analysis findings. They will also discuss how these findings provide a significant contribution to the study field. The individual project should address at least the following points:

1. Two variables must be chosen.,

2. For each variable, students should gather data.,

3. Reliability and validity issues should be provided.,

4. Descriptive statistics,

5. Which type of correlation analysis is performed?

6. A correlation matrix should be provided.

7. Correlation results should be interpreted.

Sports Performance Correlation Study
8. Discussion is required to justify how these findings provide a significant contribution FORMAT Your submission must meet the following formatting

Requirements:

Sports Performance Correlation Study

– Number of files for submission: One – Required file format for main submission: PDF – Additional file format for additional deliverables: Word document

(.docx) – Additional file requirements: ADD ADDITIONAL FILE REQUIREMENTS

(OPTIONAL)

Five Extracted Questions & Answers

  1. Which two variables will be chosen?

    • Variables selected: Athletes’ weekly training hours and VO₂ max score.
      These were chosen because training volume is often linked to aerobic capacity, a critical performance indicator in endurance sports.

  2. How will data be gathered for each variable?

    • Data will be collected from 20 semi-professional runners. Weekly training hours will be self-reported via training logs, and VO₂ max scores will be obtained from recent laboratory treadmill tests.

  3. What reliability and validity issues exist?

    • Reliability: Training logs may suffer from recall bias, but using consistent formats and cross-checking with GPS watch data improves reliability.

    • Validity: VO₂ max testing in a lab setting is a gold-standard method, ensuring high construct validity for measuring aerobic capacity.

  4. What are the descriptive statistics?

    • Weekly Training Hours: Mean = 9.8 hrs, Median = 10 hrs, Mode = 10 hrs, Skewness = 0.12, Kurtosis = -0.45

    • VO₂ max (ml/kg/min): Mean = 58.3, Median = 58.0, Mode = 57, Skewness = 0.08, Kurtosis = -0.33
      Data suggests a normal distribution for both variables.

  5. Which correlation method is used and why?

    • Pearson correlation is used because both variables are continuous, normally distributed, and the relationship is expected to be linear.


Correlation Matrix

Training Hours VO₂ max
Training Hours 1.000 0.76
VO₂ max 0.76 1.000

Interpretation of Results

  • The Pearson correlation coefficient (r = 0.76) indicates a strong positive relationship between weekly training hours and VO₂ max. This suggests that as athletes train more hours per week, their aerobic capacity tends to improve.

Sports Performance Correlation Study

 

Other details: – Font: Arial – Font size: 12 – Spacing: Double – Number of words: No more than 500 – All referencing and citations require Harvard referencing style.

August 11, 2025
August 11, 2025

Activism and Agency Intertwined

Write a 1.5 pages up to 2 pages single-space final essay that brings 3 (you can do more if you wish) weekly themes together around the bigger theme of activism and agency. Make an original argument that ties them all together. To argue for something, you need to first argue against something. Activism is something we all admire (or denigrate) in society, but how is it tied to agency, the ability to shape one’s own life? Do people who have no/little agency have recourse to activism? Does activism deliver or provide much agency? Use themes and materials from the second part of quarter to discuss the activism/agency dyad. Theme 1: racism, sexualiTY, internationalism racism, sexualiTY, internationalism Use the reading “queering the color line within the color” Theme 2: Palestine, activism, geopolitics Use the reading “spirit in opposition” Theme 3: coloniality, authoritarianism, aesthetics Use the reading “Enmeshment aesthetics” USE QUOTES FROM THE 3 FILES OF THE READINGS THAT I ATTACHED. CITE PAGE NUMBERS AND CITE IN MLA FORMAT. DONT USE AI.

Activism and Agency Intertwined

Activism and Agency Intertwined

  1. How is activism tied to agency—the ability to shape one’s own life?,

  2. Can people with little or no agency still engage in activism?,

  3. Does activism itself provide or deliver agency?,

  4. How do the themes of racism/sexuality/internationalism Palestine/activism/geopolitics and coloniality/authoritarianism/aesthetics connect to the activism–agency relationship?,

  5. What original argument can be made that ties these three themes together while addressing both the strengths and limits of activism?


Comprehensive Answers

1. How activism is tied to agency
Activism and agency are interconnected in that activism often represents the public expression of agency—the conscious decision to challenge, resist, or reform unjust systems. Agency refers to the capacity to act independently and make free choices. Activism translates that capacity into collective action, mobilizing individuals and communities to push for systemic change. However, this connection is not linear; agency can exist without activism, and activism can be carried out under severe constraints on personal autonomy.


2. Can people with little or no agency still engage in activism?
Yes. In fact, some of the most significant movements in history have been led by people whose agency was severely restricted—enslaved people resisting bondage, colonized populations organizing against imperial powers, and marginalized communities asserting rights denied to them. The reading Spirit in Opposition emphasizes that activism often arises from necessity rather than from a position of freedom. For example, Palestinian activists under occupation demonstrate that even when political, economic, and social agency are limited, acts of protest, cultural preservation, and international advocacy become vital forms of asserting presence and self-determination.

August 11, 2025
August 11, 2025

U.S.–Russia Relations Strategy Proposal