Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

I am working on an essay for Information, I was

Question I am working on an essay for Information, I was giving the five topics listed below. I am wondering if some one will be able to help to get some information in these topics. These are the questions I am trying to answer for each:a description of the technology, 2) challenges that Google could face in implementing this technology, 3) suggestions for overcoming some of the potential challenges and obstacles, 4) an analysis of the potential positive and negative impacts of this technology on societyGoogle Glass -Elevators to Space – .Robots – Project Wing – Self-Driving Car –

8-1 Discussion: Reflection Discuss what you have learned about technical

Question 8-1 Discussion: Reflection Discuss what you have learned about technical communication during this course. Address the following areas in your post:

Module 03 Assignment – HIPAA ScenarioAn Admission to the Psych

Question Module 03 Assignment – HIPAA ScenarioAn Admission to the Psych Unit – Part IInstructions: Read through the description below, then use your knowledge of health information and healthcare systems to answer the questions that follow.ScenarioYou are the HIPAA privacy officer and receive a phone call from Audra in Registration who asked to file a HIPAA violation report. Audra reported the following:”Gina from registration returned from vacation this past Sunday, and we worked together. Gina asked me if I had heard that Rebecca’s son was up in Psych. Both Gina and I used to work for Becky. I told her that I did know about it, and then I asked her if she would cover my station for me while I took a break. I didn’t tell her that Rebecca (Becky) was the one that told me when we were at lunch this past Thursday.”Audra continued “I didn’t want to talk about Billy because I know that Becky is crushed by the whole thing. This has been very emotional for her, and I don’t want to make things worse for her. I really feel bad about calling you and even though I get along with Gina, I think it’s awful that she is talking about Billy being a patient upstairs in Psych.”1.To confirm Billy’s admission, you access the electronic record and look up Billy in the _ ____________.a.HIPAA Security Logb.Patient Account Registryc.Confidential Control Recordd.Master Patient Index2.Billy is confirmed as a patient in room 232 Behavioral Health Unit, so next you want to confirm Gina’sidentity. To find out if she is an employee, you call the _ department.a.Human Resource departmentb.Information Systems departmentc.Health Information Management Services departmentd.Telecommunications department3.To ensure that you have all the persons involved correctly identified, you review Billy’s record to identifynext of kin. You want to provea.Billy is actually a patient in Psych.b.Audra went to high school with Billy.c.Rebecca is listed as Billy’s parent.d.Both Audra and Gina used to work in patient accounts.Continued on next page4.You now need to learn who has accessed Billy’s record so you make a request for a _____________ fromthe Information Systems department.a.Privacy Log Reportb.Behavioral Census Reportc.Security Access Reportd.Medication Administration Report5.Next, you will schedule private meetings with Rebecca and Gina but first you open the annual ___________ training session ‘sign-in’ log (which included HIPAA Privacy and Security education) toensure that both received proper training for compliance.a.Fire Safetyb.Employeec.Payrolld.SecurityAn Admission to the Psych Unit – Part IIInstructions: As the investigation unfolds, take care to organize the primary characters and the investigative notes documented for you below.You have confirmed the following and are proceeding with the next steps in the HIPAA investigation.Billy is currently a patient in the facility.Billy is Rebecca (Becky) Bartel’s son.Rebecca is the manager of patient accounts.Gina R. is a full-time employee in Registration.Audra M. is a part-time employee in Registration.You meet with Rebecca. Review the notes below that you took during your meeting her.Met with Rebecca. Human Resource Director, Suzanne, in attendance as well.Asked Rebecca if she has attended the annual HIPAA training – she confirmed.Asked if she has a good understanding of HIPAA privacy and HIPAA compliance -she confirmed.Asked if she has any idea as to why this meeting has been called-she responded no.Asked if she has openly discussed her son’s admission here at the hospital.- Learned that she had shared lunch with Audra and confided about Billy.Rebecca indicated that she and Audra went to high school together. They havemaintained a friendship for many years. She also indicated that she told herown boss, Ms. Reynolds, about Billy because she took two days of PDL tosupport Billy. She was tearful when discussing the topic.Continued on next pageYou meet with Gina. Review the notes below that you took during your meeting with Gina.Met with Gina. Human Resource Director, Suzanne, in attendance as well.Asked her if she has attended the annual HIPAA training-she confirmed.Asked if she has a good understanding of HIPAA privacy and HIPAA compliance-she confirmed.Asked if she has any idea as to why this meeting has been called-she responded “If this is about Becky’s son, then yes, I know about him.Everyone is talking about it, and I think it is really sad for Becky. I know she loves both of her kids a lot. I haven’t done anything wrong”.Additional notes from meeting with Gina.I stressed the importance of honesty. I shared that it is beneficial when an employee comes clean and is open when there is a HIPAA investigation.Gina then shared that she was on vacation when Billy came to the hospital. Shecouldn’t have possibly blabbed about his admission to psych. She shared thatSamantha (a friend and co-worker in Registration) was working in the ER whenhe came in and Sam sent her a text message about it. She shared the followingas proof.–Continued on next page–An Admission to the Psych Unit – Part IIIInstructions: Taking into consideration the information yielded by the investigation so far, answer the questions below. These ask that you make judgements regarding accountability and responsibility.After confirming Samantha’s identify and her job at the hospital, you meet with Samantha. Review the notes below that you took during your HIPAA investigation meeting with her.Met with Samantha. Human Resource Director, Suzanne, in attendance as well.Asked her if she has attended the annual HIPAA training-she confirmed.Asked if she has a good understanding of HIPAA privacy and HIPAA compliance -she confirmed.Asked if she has any idea as to why this meeting had been called-she responded no.I stressed the importance of honesty. I shared that it is beneficial when anemployee comes clean and is open when there is a HIPAA investigation.She again said that she knows nothing about a HIPAA problem.I asked if she knows Rebecca from patient accounts. After a few moments ofsilence, she responded “If this is about her crazy kid, I didn’t anything wrong.Everybody knows he was here that night – he went running out the ER doorand into the street. You can’t tag me with this problem. It’s his fault foracting wild and going berserk in the ER. He’s a freak.”I confirmed that the subject did regard Rebecca’s son. Samantha continued to deny any wrong-doing and never came clean. She denied communicating confidential, protected patient information outside of the facility and outside of her job duties.6.Consider the definition of Ethics “moral principles that govern a person’s behavior.” Who is the leastethical person described above?a.Ginab.Samanthac.Audrad.Rebecca7.Taking all of the interactions and information above into consideration and considering good ethics andmorals, who do you feel violated the HIPAA Privacy Act to the greatest extent?a.Rebeccab.Ginac.Samanthad.AudraContinued on next page8.Consider workplace relationships between staff, departments and management personnel. Who usedpoor judgement in communicating about Billy with other staff members particularly when you considerher position at the facility?a.Rebeccab.Ginac.Samanthad.Audra9.One staff member violated HIPAA (question 7) and one person did not funtion professionally consideringher position at the facility (question 8) – as the HIPAA officer, you will need to follow-up with these twopeople:a.Rebecca and Audrab.Audra and Samanthac.Samantha and Ginad.Rebecca and Samantha10.Based on the evidence you gathered in this HIPAA investigation, you will need to update the HIPAAIncident Log and complete _____________ for the person identified in question 7:a.HIPAA Incident Determination Checklistb.HIPAA Security Auditc.HIPAA Consent Formd.HIPAA Authorization Release

Billy is currently a patient in the facility; Billy is

Question Billy is currently a patient in the facility; Billy is Rebecca (Becky) Bartel’s son; Rebecca is the manager of patient accounts; Gina R. is a full-time employee in Registration; Audra M. is a part-time employee in Registration.with this scenario You meet with Rebecca. Review the notes below that you took during your meeting her.Met with Rebecca. Human Resource Director, Suzanne, in attendance as well.Asked Rebecca if she has attended the annual HIPAA training – she confirmed.Asked if she has a good understanding of HIPAA privacy and HIPAA compliance -she confirmed.Asked if she has any idea as to why this meeting has been called-she responded no.Asked if she has openly discussed her son’s admission here at the hospital.- Learned that she had shared lunch with Audra and confided about Billy.Rebecca indicated that she and Audra went to high school together. They havemaintained a friendship for many years. She also indicated that she told herown boss, Ms. Reynolds, about Billy because she took two days of PDL tosupport Billy. She was tearful when discussing the topic.You meet with Gina. Review the notes below that you took during your meeting with Gina.Met with Gina. Human Resource Director, Suzanne, in attendance as well.Asked her if she has attended the annual HIPAA training-she confirmed.Asked if she has a good understanding of HIPAA privacy and HIPAA compliance-she confirmed.Asked if she has any idea as to why this meeting has been called-she responded “If this is about Becky’s son, then yes, I know about him.Everyone is talking about it, and I think it is really sad for Becky. I know she loves both of her kids a lot. I haven’t done anything wrong”.Additional notes from meeting with Gina.I stressed the importance of honesty. I shared that it is beneficial when an employee comes clean and is open when there is a HIPAA investigation.Gina then shared that she was on vacation when Billy came to the hospital. She couldn’t have possibly blabbed about his admission to psych. She shared that Samantha (a friend and co-worker in Registration) was working in the ER when he came in and Sam sent her a text message about it. She shared the following as proof.After confirming Samantha’s identify and her job at the hospital, you meet with Samantha. Review the notes below that you took during your HIPAA investigation meeting with her.Met with Samantha. Human Resource Director, Suzanne, in attendance as well.Asked her if she has attended the annual HIPAA training-she confirmed.Asked if she has a good understanding of HIPAA privacy and HIPAA compliance -she confirmed.Asked if she has any idea as to why this meeting had been called-she responded no.I stressed the importance of honesty. I shared that it is beneficial when anemployee comes clean and is open when there is a HIPAA investigation.She again said that she knows nothing about a HIPAA problem.I asked if she knows Rebecca from patient accounts. After a few moments ofsilence, she responded “If this is about her crazy kid, I didn’t doanything wrong.Everybody knows he was here that night – he went running out the ER doorand into the street. You can’t tag me with this problem. It’s his fault foracting wild and going berserk in the ER. He’s a freak.”I confirmed that the subject did regard Rebecca’s son. Samantha continued to deny any wrong-doing and never came clean. She denied communicating confidential, protected patient information outside of the facility and outside of her job duties.Consider the definition of Ethics “moral principles that govern a person’s behavior.” Who is the least ethical person described above?Gina; Samantha; Audra; RebeccaI.Taking all of the interactions and information above into consideration and considering good ethics and morals, who do you feel violated the HIPAA Privacy Act to the greatest extent?Rebecca; Gina; Samantha; AudraII. Consider workplace relationships between staff, departments and management personnel. Who used poor judgement in communicating about Billy with other staff members particularly when you consider her position at the facility?Rebecca; Gina; Samantha; AudraOne staff member violated HIPAA (question I) and one person did not function professionally considering her position at the facility (question II) – as the HIPAA officer, you will need to follow-up with these two people:Rebecca and Audra; Audra and Samantha; Samantha and Gina; Rebecca and Samantha

Database System Assessment GuideAssessment 1 – Case StudyThis project is

Question  Database System Assessment GuideAssessment 1 – Case StudyThis project is the main assessment of this subject. It is worth 20% of your total assessment. You are required to design a database system for AITGames who operates a platform game store franchise in Australia. All work is to be completed individually. If parts or all of the source code you submit is not your own work, you will receive ZERO.Scenario You are contracted by AITGames to develop software that records everything about the games industry. Your first task is to design a database structure to work with this software. Specifically, the database would need to be able to record the following things: • Developers who create games. This includes individual developers and teams of developers. Production Studio for teams would need to be recorded as well. (Hint: only developers in a team would have a relationship with a production studio)• Games

Cybersecurity Principles and the Adversary ModelIn addition to the Cybersecurity

Question Cybersecurity Principles and the Adversary ModelIn addition to the Cybersecurity Principles, research the Adversary Model of cybercrime using your textbook and the Internet. Using the information you uncover, as well as your own critical thinking skills, write a summary report that details each of the cybersecurity principles and describes the Adversary Model, including resources, capabilities, intent, motivation, risk aversion, and access. Your essay should be no less than 400 words. Be sure to use proper APA punctuation as well as provide research references

An information system can be defined technically as a set

Question An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support.A. the creation of new products and servicesB. managers analyzing the organization’s raw dataC. communication and data flowD. decision making and control in an organization  

A PIA is both a process and a document. It

Question A PIA is both a process and a document. It is a process that focuses upon identifying and assessing risks related to privacy of data handled by a specific IT system or database. A PIA is also a document in which the results of the assessment are communicated to stakeholders. Some PIA’s are released to the public in full while others are redacted to remove sensitive / non-public information.Answer the following questions regarding PIA’s.1. What is privacy? Is it a right? An expectation? Discuss differing definitions, e.g. “the average person” definition vs. a legal definition, and how these differences impact risk assessments for privacy protections (or the lack thereof).2. What are some important best practices for protecting privacy for information collected, stored, used, and transferred by the US federal government? Identify and discuss three or more best practice recommendations for reducing risk by improving or ensuring the privacy of information processed by or stored in an organization’s IT systems and databases.3. Explain why federal government agencies and departments required to complete PIA’s. Must a PIA be completed for every federal IT system? Why or why not?4. Name and briefly describe 3 benefits to citizens which result from the use of PIA’s. (Considering citizen’s needs for privacy and the protection of the privacy of individuals whose information is collected, processed, transmitted, and stored in federal government IT systems and databases.)

I need help discussing some common points of failure for

Question I need help discussing some common points of failure for access control and physical security and ways to mitigate these deficiencies. 

Use the Internet to locate a CASE tool and describe

Question Use the Internet to locate a CASE tool and describe why that tool would be useful in modeling and documenting a software application or system.

The University of Nebraska’s data breach affected over 600,000 students

Question The University of Nebraska’s data breach affected over 600,000 students in 2012. This was one of the largest data breaches reported for a university campus. Read the following reports about the data breach and then answer the questions below.https://www.databreachtoday.com/u-nebraska-breach-affects-650000-a-4809https://nebraska.edu/docs/2012-06-08SecurityIncident.pdfhttps://campustechnology.com/Articles/2013/03/21/Higher-Ed-Data-Breaches-at-Near-Record-High-in-2012.aspxAddress the following in your article:1. Briefly summarize the events before and after the data breach (one or two paragraphs). Use typical new story elements (who, what, when, where, how) to construct your summary. Make sure that you address threats, vulnerabilities, risks, and impacts (costs of the breach).2. Discuss the impact(s) of the event on Univ of Nebraska stakeholders (identify who and how they were affected) and implications of this event for other higher education institutions. 3. Identify and discuss the regulatory and compliance issues associated with the event.4. What are your recommended courses of action for other university CISO’s to ensure this type of incident did not happen in the future? (provide at least 3)  Remember to cite your sources and include your references at the end of the article.

Before you begin read: https://www.blackstratus.com/best-practices-cybersecurity-compliance-audits/Our class focuses on integrating several

Question Before you begin read: https://www.blackstratus.com/best-practices-cybersecurity-compliance-audits/Our class focuses on integrating several aspects of cybersecurity, information security, and information assurance. Part of an overall integrated approach to achieving a comprehensive information assurance program is compliance management. As you are aware there are a number of government regulations that affect both the public and private sector. Your organization is a financial services firm that has a decentralized management structure including the management of IT resources. Each regional division has its own IT support organization which reports to the region’s Vice President.The Board of Directors has decided that the division IT support can remain as is but wants the CEO to establish a centralized IT security management program under a Chief Information Security Officer (CISO). The CISO will be responsible for ensuring that policies, procedures, and best practices are in place to implement and operate this program; he or she will have budgetary authority and staff support.You are being considered as one of the internal candidates for the CISO position. Provide background information about implementing an IT Security / cybersecurity compliance management. They have specifically asked you to make a recommendation regarding the use of compliance management tools. You can and should address additional best practices for IT security / cybersecurity compliance management.

Your organization is a financial services firm that has a

Question Your organization is a financial services firm that has a decentralized management structure including the management of IT resources. Each regional division has its own IT support organization which reports to the region’s Vice President. The regional VP’s have a great deal of authority and, in many cases, the regional divisions operate as if they were separate companies.It is now two years after you wrote your position paper about compliance management. The CEO and Board of Directors liked your responses during the interview process and you’ve held the position of CISO at the financial services firm for the past 18 months. All is not well … having decentralized IT support teams reporting to the regional VP’s has significantly and adversely impacted the implementation of a single IT Security Management program. The Board of Directors has met with the CEO and VP’s and determined that management of all IT resources will be placed under a Chief Information Officer (CIO) who reports to the CEO. Your position as CISO will report the the new CIO and your responsibilities will be expanded to include managing the regional IT security teams.The regional VP’s want to know how you are going to integrate their employees into your organization. For that briefing you must research and answer the following questions:1. What integration issues do merging companies face? 2. There are significant cultural influences which have been seen between the various regional divisions. What techniques can you and your central office team of security professionals use to ease cultural differences as the regional teams are integrated with your central team?3. How can you and your management team bring everyone together to form a single organization? How can you make the regional IT teams feel comfortable? 4. One of the most “invisible” barriers to success is the perception / feelings regarding “loss of control.” How can you ease these concerns / fears and build a positive, high functioning team?Organize talking points around the four sets of questions.This paper will be sent to the VP’s and other senior leaders to read prior to the senior leadership meeting.Post your briefing paper as a reply to this topic. Remember to cite your sources and include your reference list at the end of your posting.

What are the roles and responsibilities of: Chief Executive Officer

Question What are the roles and responsibilities of: Chief Executive Officer (CEO)Chief Operations Officer (COO)Chief Financial Officer (CFO)Chief Information Officer (CIO)Chief Information Security Officer (CISO)Senior Security ManagerInformation Security ArchitectInformation Security EngineerInformation Security AuditorInformation Security AnalystSecurity Technician/Specialist I have been stuck on this for days. Any help would be great thank you.

System analysts have to consider a great many factors when

Question System analysts have to consider a great many factors when recommending system architectures. Use an example of a new business information system to respond to the following

Write two thousand words for the game that you are

Question Write two thousand words for the game that you are going to invent as a major assignment . the game that i am going to invent is hard drop which is almost similar to tetris.

Choose a business that operates online and evaluate its strategic

Question Choose a business that operates online and evaluate its strategic position using two strategic planning tools. Indicate areas where information systems are used effectively to support business strategy and where improvements could be made.

Explain to the class your approach (Research or Project) to

Question Explain to the class your approach (Research or Project) to the class, the topic you have selected, as well as why you have made these selections. My topic is Violence in the Workplace and I choose conventional research.

Hi, do you help with papers?

Question Hi, do you help with papers?

analyze five Google technologies Google Glass – This technology is

Question  analyze five Google technologies Google Glass – This technology is Google upgrading the Augmented Reality so to speak to theoretically, let the user “view social media feeds, text, Google Maps, take photos, and navigate with GPS” (hongkait.com) in which I suppose using a pair of glasses.   Elevators to Space – Google are actually “one of a number of organization and individuals interested in setting up the infrastructure to leave Earth’s atmosphere without the use of rocket propulsion” (cio.com). The problem that I foresee with this is that not only are they trying to make this, they will also have to make something to protect personal from the Space radiation, along with pressurize the people and depressurize them for the trip. Another bad aspect of this is aircraft, satellites, meteors, and space debris can collide with the elevator.   Robots – With another website that I found for the projects Google is working on, there is supposedly a “secret division dubbed ‘Google X’ which actually includes a lab in an undisclosed location where robots rule the roost” (cio.com). The robots that are being made are performing mundane tasks for the home and office.   Project Wing – Another project that is being made in the Google X section is the project wing. Project Wing is supposed to be “a drone-based delivery system like what Amazon is working on too” (theverge.com). Unlike Amazon though, Google would be able using this technology to deliver items for people in need, but the deliveries could not be over three pounds though.   Self-Driving Car – This vehicle is being tested out at this time and I do believe I read something within the news that this vehicle got pulled over by the police because it was driving to slow. The statistics that are shows on the website that was given for the self-driving vehicles is only for the United States. If you were to go to any other country though, those statistics would be very, very low. I do believe in Germany the deaths for Automobile deaths might be only 50 in the past year. I do believe the reason behind this is that people are not allowed to drive without a seasoned passenger until the age of 21, plus they have to go to 4 months of driving school prior to being able to drive with that passenger.

Read “Defending Against Cyber Attacks,” located within the required readings.

Question Read “Defending Against Cyber Attacks,” located within the required readings. In the article, the author discusses four distinct steps found in almost every hack attack. Name the four steps and discuss each. Do you agree or disagree with this assertion? Why or why not? Provide a rationale for your answer.

The post I am working on an essay for Information, I was appeared first on Smashing Essays.

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"