Posts

Write a concise report of 1250 words therefore, total word allowance is 2,500. You may use sub-headings to structure your report. Provide an overview of the professional issues raised in the scenario and outline the potential impact of these on patient outcome supported by relevant contemporary evidence. Critically discuss with rationale how you would respond to this scenario demonstrating safe and effective practice in line with The Code (NMC 2018).

Nursing workbook

Welcome to NURS 1450 Leadership and Management in Adult Nursing

You are about to qualify as an adult nurse which is a complex and diverse field of nursing.  The scenarios in this workbook provide you with the opportunity to apply knowledge of professional issues to realistic scenarios that you may face in the workplace.

It is important that you discuss and relate leadership and management styles and other relevant material taught in the module within these scenarios. You are advised to refer and include the NHS Leadership Model. You may also wish to link the impact of COVID 19 to the issues you discuss in the workbook.

These scenarios relate to the following professional issues:

  1. Care and compassion (compulsory)
  2. Time Management and prioritisation (option A)
  3. Risk management (option B)
  4. Safeguarding (option C)

You should complete two reports centred around a discussion of the professional issue in relation to the outlined scenario.  Professional issue 1. Care and compassion is compulsory, you may choose 1 other and for each:

  • Write a concise report of 1250 words therefore, total word allowance is 2,500. You may use sub-headings to structure your report.
  • Provide an overview of the professional issues raised in the scenario and outline the potential impact of these on patient outcome supported by relevant contemporary evidence.
  • Critically discuss with rationale how you would respond to this scenario demonstrating safe and effective practice in line with The Code (NMC 2018).
  • You should discuss related professional issues such as leadership, accountability, confidentiality and the patient experience.
  • You should discuss practice implications in relation to relevant national or professional guidance and policy
  • You may provide one reference list for both reports.

 

You should refer to additional guidance provided by the Module leader in the assignment preparation sessions on the Module and on the Module Moodle shell.

What personal challenges have you overcome in pursuit of your academic and career goals?

Personal statement

Essay of personal statement: “What personal challenges have you overcome in pursuit of your academic and career goals”

While the attacks shut down power grids and darkened many people’s night lights, it shone a light on the vulnerabilities of critical infrastructures around the world and in our own country. We wouldn’t feel safe driving on a bridge that had no protection, so why shouldn’t we protect our information highway?

Cyber-Firefighters Shine in the Darkness

On December 23rd, 2015 the cold, Ukrainian night was aglow with winter lights and decorations. As families closed their eyes to fall asleep and have darkness envelop them, darkness began to spread around western Ukraine; the lights went out. 225, 000 people in western Ukraine suddenly lost all electric power and had no idea as to why.

All at once, 103 cities were “completely blacked out,” and parts of 186 cities were left partially in the dark. During this blackout, many of those affected were unable to report their outage. Mystery added weight to the darkness, as call centers at Prykarpattya Oblenergo and another energy provider, Kyivoblenergo, were blocked from receiving calls from customers. The call centers were inundated with thousands of calls all at once from a cryptic source.

Prykarpattya Oblenergo was forced to send out response teams across western Ukraine to manually switch on all of the power generators which had inexplicably switched off. As the Prykarpattya engineers tried to turn the power back on, they discovered that a virus had erased the computers that the engineers use to monitor equipment during such outages. This left the engineers with no way to turn the lights back on through technical means. The engineers were forced to go “old-school” and travel to each station individually. After a few hours, the engineers reached all of the power stations that service the cities, manually flipped on the switches, and there was light again in western Ukraine.  With stories of the turmoil of the crisis in eastern Ukraine reaching the ears of those in the west daily, it was only natural to assume the worst; thoughts like these were not too far off.

Thousands of miles away, a phone rang. An Incident Response Team, the NPPD equivalent of a quick reaction force, prepared to be deployed to assist the Ukrainian government and the power companies in their investigations. Incident Response Teams from the National Cybersecurity and Communications Integration Center (NCCIC)/Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) and the U.S. Computer Emergency Readiness Team (US-CERT), all of whom are a part of NPPD, stacked up and deployed to Ukraine to assist in the investigation as part of a U.S. inter-agency team.

Incidents like these, while rare, are a perfect example of the work that NPPD carries out in order to keep cyber systems free and defended from hackers. The Department of Homeland Security’s National Protection and Programs Directorate (NPPD) is tasked, among other things, with protecting the United States’ critical infrastructure, like power grids, from cyber-attacks like this.

America is made up of networks and systems, from communicating and traveling to banking and shopping. Like the highways that move us from place to place, electrical grids and the internet are made up of infrastructure; critically important to people and businesses across the world, these infrastructures have earned the moniker “critical infrastructure.” Not unlike how the infrastructure that transports people from place to place is vulnerable to attacks, the infrastructure that moves information is also at risk from terrorist and cyber-attacks or even natural disasters, like hurricanes or floods. NPPD analysts work 24 hours a day, seven days a week, to monitor these critical infrastructures in order to defend against attacks, with their Incident Response Teams being their equivalent of cyber firefighters.

An Incident Response Team, a team of four to six designated experts in the field of cybersecurity, is always packed with the critical equipment needed for any perceivable task, ready to depart at a moment’s notice to fix any cyber crisis.  The Incident Response Teams, also casually called “Fly Away Teams” are similar to deployable firefighters- but for computer and information systems. They are not always fighting fires or cyber hacks; other times they’re doing the cybersecurity equivalent of talking to kids, testing smoke alarms, and other proactive activities to prevent fires. NPPD and their various teams and subdivisions travel out to different agencies and private businesses to discuss best practices, plan strategies, and teach them to identify potential distribution vectors for malware in order to protect against it and learn how to notice it. If only Prykarpattya Oblenergo followed the lead of another Ukrainian power company, who completed an industry recognized malware search which detected and removed a very specific malware before anything bad had happened. The malware was called BlackEnergy and is well known in the cyber-security realm.

Cybercriminals have been exploiting the BlackEnergy since at least 2007 through various, edited versions. The attack scenario is a simple one. The target, such as a power company or a corporation, receives a phishing email that contains an attachment with a malicious document, for instance a Word document. Once opened, the target ends up infected with BlackEnergy- showing how one small, inadvertent click on something that looks harmless can cause massive software vulnerabilities.

Prykarpattya Oblenergo was the first electricity failure caused by a computer hack according to the U.S. Department of Homeland Security. It would be ignorant to believe that a hack that shuts down a major power grid could only happen in a country like Ukraine. BlackEnergy has been found to be the culprit in a hack to target NATO and, must worrying for those of us here in the United States, even found on systems used by the United States government and on other critical infrastructure. Luckily, the experts at NPPD and Homeland Security were able to discover the intrusion before the malware had a chance to damage, modify, or otherwise disrupt any of the industrial systems or critical infrastructure in the United States, speaking to the success and importance of those that work at NPPD.

NPPD is a lot like television’s Dr. Gregory House, but focused instead on computer viruses rather than those of the body…and hopefully a lot nicer. They are not concerned about who did the hack; they instead seek out the technical issues and focus on how best to formulate a plan to fix the issue for those who come to them for help. In the past, DHS has warned that BlackEnergy has infected various industrial control systems that make up a substantial portion of the critical infrastructure. With the American energy grid becoming increasingly more automated, any American energy company that falls victim to the same kind of attack as the one in Ukraine would be much more hard pressed to quickly turn back on their power grids by hand.

The above situation speaks to the importance of the Department of Homeland Security’s National Protection and Programs Directorate. From diagnostician like computer analysts, to the firefighter like members of the Fly Away teams, NPPD is uniquely positioned and prepared to protect the United States from attacks on our critical infrastructure.

The investigation has not officially named a culprit in the BlackEnergy cyber-attacks. While the attacks shut down power grids and darkened many people’s night lights, it shone a light on the vulnerabilities of critical infrastructures around the world and in our own country. We wouldn’t feel safe driving on a bridge that had no protection, so why shouldn’t we protect our information highway?

Select a commercial service airport anywhere in the world. Identify the need for a capital development project at the chosen airport terminal, runway, parking garage, airfield capacity expansion.

Research Project

Instructions
A research project is required for this course. Each student must independently prepare a report in: APA format and a minimum of ten pages 1.5 spacing. (If a student chooses to use Powerpoint it must be equivalent to 10 pages). Students should select a commercial service airport anywhere in the world. Identify the need for a capital development project at the chosen airport terminal, runway, parking garage, airfield capacity expansion. noise mitigation Project. environmental project. or ground transportation project and prepare a summary of the project including how the airport and aviation will benefit as a result, the cost of the project, and time frame for completion. Include photos and exhibits. Be sure to give credit to your sources.

In your research of ICAO Annex 17 and 49 CFR Part 1542, you should have an understanding how the Standards and Recommended Practices are applied to airports. Now put on your designer hat and in a one page summary, identify how airports are designed to accommodate security needs and infrastructures around the airfield and terminal complex.

Airport Security

Instructions
In your research of ICAO Annex 17 and 49 CFR Part 1542, you should have an understanding how the Standards and Recommended Practices are applied to airports. Now put on your designer hat and in a one page summary, identify how airports are designed to accommodate security needs and infrastructures around the airfield and terminal complex.

Relate the framework /technologies/solutionsmentioned in the case study to your work experience. Discuss anything that you learnt from the case study you can apply to your work and/or the other way around, which would be whether you can apply lessons learnt from your own experience to the case study.

Artificial intelligence for the real world: Don’t start with moon shots. Davenport TH, Ronanki R. Harvard Business Review. 96(1), 2018.

1. All case studies are from the Harvard Business Review journal. Download the cases from the UHD Library databases. Full citations of the cases are on the next pages.

2. Summarize the case study.

3. Relate the framework / technologies / solutions mentioned in the case study to the topics you are studying in the textbook. You may need to study chapters that you have not yet encountered as per the schedule in the syllabus.

4. Relate the framework /technologies/solutionsmentioned in the case study to your work experience. Discuss anything that you learnt from the case study you can apply to your work and/or the other way around, which would be whether you can apply lessons learnt from your own experience to the case study. Just one or two group members are expected to address this.

5. Relate how the framework / technologies / solutions mentioned in the case study are being used to improve business processes and build solutions in the fields of energy, infrastructure, urban design and LEED – Leadership in Energy and Environment Design (LEED), agriculture, healthcare, transportation, social media, or other.

6. Cite your references. It is expected that you will research significantly beyond the textbook to prepare your case study presentation.

How does Dunn use poetic language and techniques to explore ideas of cultural hybridity in her poem?

English

How does Dunn use poetic language and techniques to explore ideas of cultural hybridity in her poem?

In your answer, you need to refer to at least THREE different examples of poetic language/techniques from the poem, e.g. metaphor, imagery, symbolism. Try not to simply retell the story of the poem. Rather, try and show how the author is using specific kinds of language/techniques to explore her key ideas.

REMEMBER: the core focus of this assessment is on close reading skills and students do not need to include reference to any secondary/critical resources for this assessment.

Indicate the reasons and evidence for the argument. Discuss the reasons and evidence against the argument. Summarise both points of view and discuss and explain your own viewpoint.

Critical and reflect on teaching session provided

The advanced method is a persuasive approach that uses your argument as the starting point and has been adapted for ease of use as follows:

1.Start by introducing generally and express your point of view.

2.Explain your rational for the argument

3.Explain the reasons against the argument

The summary

  1. Start by introducing the argument to the reader and its importance
  2. Indicate the reasons and evidence for the argument.
  3. Discuss the reasons and evidence against the argument.
  4. Summarise both points of view and discuss and explain your own viewpoint.

If you struggle with knowing a clear process of building your work you may wish to consider an eight-stage approach to building critical appraisal skills in our writing developed by the author:

Stage 1: Explore the evidence: following your literature review, identify other people’s positions, lines of argument and conclusions.

Stage 2: Using a critical review framework (The CASP, Critical Appraisal Tool is useful, www.casp-uk.net) evaluate the evidence by weighing up opposing arguments and evidence, read between the lines and identify false or biased assumptions.

Stage 3: Examine the bias of opinion and the use of persuasive techniques.

Stage 4: Reflect on issues in a structured way, bringing logic and insight to the forefront of your discussion points.

Stage 5: Draw conclusions about the validity and reliability and justifiability of arguments based on good evidence and supportive ideas.

Stage 6: In academic writing we need to consider if we have explored the whole picture and not just one point of view.

Stage 7: Present your points in a structured, clear and convincing format that appears rational i.e.: we need to identify the reasons for what we believe and do and consider other people’s reasoning.

Stage 8:  Importantly we need to reach conclusions on what we have read, to voice our opinion and look at the impact of knowledge and ideas for practice.

Choose a single story whose opening page or so clearly establishes the tensions and confrontations to come and whose ending offers a resonating metaphor of the story’s theme(s). Carefully explain how these opening and closing passages create both meaning and satisfaction for the reader.

American Short Story critical brief

English 183, Introduction to the American Short Story, Final Exam:

Choose TWO of the following questions and write thoughtful essays (at least one page in length) in response to them, employing appropriate examples and QUOTATIONS from the stories.  Depending on the questions you choose, you may need to refer to stories read in the first half of the semester, in addition to those read in the second.. Each should response must be at least one page in length.

  1. This semester you have read twenty American short stories written over a period of about two hundred years. (Stories are listed below) Having done so, describe what you see as the primary trends in the evolution of this literary form.  That is, attempt to explain how the American short story has changed from the time of Washington Irving and Nathaniel Hawthorne until now.
  2. Choose a single story whose opening page or so clearly establishes the tensions and confrontations to come and whose ending offers a resonating metaphor of the story’s theme(s).  Carefully explain how these opening and closing passages create both meaning and satisfaction for the reader.
  3. By contrasting two stories written in the last sixty years (since 1950), attempt to convey the range and scope of the modern American short story.  Proceed like this: choose two stories that you see as very different from one another; then explain these differences in terms of (a) subject,  (b) writing style, or voice (c) technique (the author’s manipulation of point of view and time), and (d) plot.
  4. This is a question about the untrustworthiness of first impressions.  Choose a story you failed to understand on first reading but then came to understand and appreciate after giving it a second look, or after reading your classmates’ responses to it.  Explain what you missed on first reading.

 

 

Story list from the whole semester.

The Legend of Sleepy Hollow,” by Washington Irving

“The Birthmark,” by Nathaniel Hawthorne

“The Black Cat,” by Edgar Allan Poe

“The Coup de Grace,” by Ambrose Bierce

“A White Heron, by Sarah Orne Jewett

“The Storm,” by Kate Chopin

“The Blue Hotel,” by Stephen Crane

“The Use of Force,” by William Carlos Williams

“The Grave,” by Katherine Anne Porter)

“The Gilded Six-Bits,” by Zora Neale Hurston

“Babylon Revisited,” by F. Scott Fitzgerald

“A Clean, Well-Lighted Place,” by Ernest Hemingway

“Thank You, Ma’am,” by Langston Hughes

“Sonny’s Blues,” by James Baldwin

“The Ones Who Walk Away from Omelas,” by Ursula LeGuin

“A Girl’s Story,” by Toni Cade Bambara

“Hunters in the Snow,” by Tobias Wolff

“The Things They Carried,” by Tim O’Brien

“Fleur,” by Louise Erdrich

Discuss issues with opioid prescriptions and how it threatens patient safety. Discuss ways to combat this issue including healthcare communication to increase patient safety. Peer reviewed references no older than 5 years.

Patient Safety with Opioid Prescriptions

Discuss issues with opioid prescriptions and how it threatens patient safety. Discuss ways to combat this issue including healthcare communication to increase patient safety. Peer reviewed references no older than 5 years.