Category: APA (edition “APA 7”)

Evidence-Based Project, Part 1: Identifying Research Methodologies

Is there a difference between common practice and best practice?

When you first went to work for your current organization, experienced colleagues may have shared with you details about processes and procedures. Perhaps you even attended an orientation session to brief you on these matters. As a rookie, you likely kept the nature of your questions to those with answers that would best help you perform your new role.

Over time and with experience, perhaps you recognized aspects of these processes and procedures that you wanted to question further. This is the realm of clinical inquiry.

Clinical inquiry is the practice of asking questions about clinical practice. To continuously improve patient care, all nurses should consistently use clinical inquiry to question why they are doing something the way they are doing it. Do they know why it is done this way, or is it just because we have always done it this way? Is it a common practice or a best practice?

In this Assignment, you will identify clinical areas of interest and inquiry and practice searching for research in support of maintaining or changing these practices. You will also analyze this research to compare research methodologies employed.

To Prepare:

Review the Resources and identify a clinical issue of interest that can form the basis of a clinical inquiry. Keep in mind that the clinical issue you identify for your research will stay the same for the entire course.
Based on the clinical issue of interest and using keywords related to the clinical issue of interest, search at least four different databases in the Walden Library to identify at least four relevant peer-reviewed articles related to your clinical issue of interest. You should not be using systematic reviews for this assignment, select original research articles.
Review the results of your peer-reviewed research and reflect on the process of using an unfiltered database to search for peer-reviewed research.
Reflect on the types of research methodologies contained in the four relevant peer-reviewed articles you selected.
Part 1: Identifying Research Methodologies

After reading each of the four peer-reviewed articles you selected, use the Matrix Worksheet template to analyze the methodologies applied in each of the four peer-reviewed articles. Your analysis should include the following:

The full citation of each peer-reviewed article in APA format.
A brief (1-paragraph) statement explaining why you chose this peer-reviewed article and/or how it relates to your clinical issue of interest, including a brief explanation of the ethics of research related to your clinical issue of interest.
A brief (1-2 paragraph) description of the aims of the research of each peer-reviewed article.
A brief (1-2 paragraph) description of the research methodology used. Be sure to identify if the methodology used was qualitative, quantitative, or a mixed-methods approach. Be specific.
A brief (1- to 2-paragraph) description of the strengths of each of the research methodologies used, including reliability and validity of how the methodology was applied in each of the peer-reviewed articles you selected.

Resources

Grant, M. J., & Booth, A. (2009). A typology of reviews: An analysis of 14 review types and associated methodologies. Health Information and Libraries Journal, 26, 91108. doi:10.1111/j.1471-1842.2009.00848.x

Hoare, Z., & Hoe, J. (2013). Understanding quantitative research: Part 2. Nursing Standard, 27(18), 4855. doi:10.7748/ns2013.01.27.18.48.c9488

Hoe, J., & Hoare, Z. (2012). Understanding quantitative research: Part 1. Nursing Standard, 27(15), 5257. doi:10.7748/ns2012.12.27.15.52.c9485

https://academicguides.waldenu.edu/az.php?s=19981

https://academicguides.waldenu.edu/library/evaluating/sources

http://academicguides.waldenu.edu/library/keyword/boolean

http://academicguides.waldenu.edu/library/keyword/searching-basics

Assess computer networks for regulatory compliance.

Assignment Instructions

Part 1: Major Events Documentation

Scenario: You visit a retail establishment, shop around, and finally carry several products to one of the point of sale (POS) terminals distributed openly around the store. You produce a credit card, the salesclerk processes the transaction, bags your goods, and hands you the receipt. On your way to the exit, a store employee asks to see your receipt and checks the contents of the store bag. Document each of the major events just described and explain them in terms of the PCI compliance standard. Include this report in your assignment.

Part 2: PCI Compliance

This part of the assignment will cover PCI. Please refer to Figure B1 in your responses.

Respond to and address the following in essay style:

Suppose HGAs mainframe, depicted in Figure B-1, stored cardholder data in the private databases. What steps should be taken to protect that data in order to be PCI compliant?

HGAs mainframe has network connectivity. Assuming that cardholder data is transmitted across these networks, describe how data should be protected in transmission.

Users are located at various sites connected to the HGA network. Suggest appropriate access controls to restrict unauthorized users from looking at cardholder data.

The PCI specification notes that all systems and network devices connected to a system that stores, transmits, or processes cardholder data is in scope and must comply with PCI specifications. To avoid having the whole network subject to PCI specifications, how would you segment the network to reduce the scope of compliance?

Assess computer networks for regulatory compliance

Read the following information about a typical dental practice:

Community Dental has two offices in the same city the North office and the South office. These offices offer the same dental services to patients. Patients can make appointments to either office at their convenience to see the dentist of their choice. Both offices are similarly equipped.
The professional staff includes the dentists, hygienists, dental mechanics, and administrative staff (receptionist, billing clerk, and office manager).
Each Community Dental office has a waiting area served by a receptionist who uses a computer to check in patients, schedule one of the examination rooms, and answer the phone. The waiting room has a door opening to the outside. A second door admits patients into the rest of the facility. Background music plays inside the waiting area. There is also a large aquarium on display.
Each examination area is partitioned off from the adjacent ones. Each has a computer and LCD screen used to pull up patient information and record new dental data such as x-ray interpretations, examination and test results, and procedures done for the patient. A low-level sound masking system is installed in this area.
After their treatment, the patient visits the billing clerks desk, which of course has a computer and a printer. Here patients pay (cash co-pay, credit card, or check), insurance information is verified, and an appointment is made. This clerk also mails out postcard appointment reminders and answers the phone.
The Community Dental dentists share a private office that has a computer and a printer. Here they can review patient data, access the Internet, and exchange email with their patients, colleagues, and acquaintances.
A database server containing patient data sits in a closet, next to a small tape library used for backup. Next to it sits a VPN server, firewall/router, and cable modem connected to the Internet. The VPN server accepts incoming connections from the dentists home computers. It also provides a permanent VPN connection between the North and South Offices. In this way, all patient data is available at all times at either office.
Most patient data is stored electronically on the database server, but some data such as x-rays and third-party labs results are still in physical form. Community Dental also depends on third party service providers to build crowns, braces, false teeth, soft dental protectors, and such. Information is exchanged with service providers using telephone, fax, letter, and email.
The network infrastructures management and maintenance are outsourced.
Community Dental also maintains an informative website to advertise its practice. The site is remotely hosted.

Answer the following questions in essay style. Make any sensible assumptions necessary in order to continue your analysis. Feel free to use the discussion board to share your assumptions with others in the class:

What is all the electronic and non-electronic private health information (ePHI) that is stored, processed, and transmitted at Community Dentals two offices?

Assess the practices organization. Where is it most likely HIPAA compliant? What changes should be made to move the practice closer to compliance?

Assess the practices physical and technical safeguards. Where is it most likely HIPAA compliant? What changes should be made to move the practice closer to compliance?

Community Dental exchanges data with service providers and uses a third party to manage its IT infrastructure. What administrative and organizational safeguards should the practice expect these providers to adhere to?

Design an Alternative Processing Site

Alternative Processing Site Proposal

R&D Media, LLC has asked you to develop a proposal for an Alternative Processing Site.

Conduct research on the latest technologies for Alternative Processing Sites (feel free to use your teamwork for this part of the assignment).
Determine who the companys stakeholders are.
Using the results of your research, develop the request for proposal that best meets the stakeholders requirements and incorporates innovative technologies.
Within your proposal you must also consider cost and what R&D Media, LLC can afford.
Develop and document the requirements for R&D Media, LLCs alternate processing site.
Identify the mission critical services and indicate services that are not provided at the alternate site. The plan must include all data security issues.
Create and document the design and do walkthroughs for building the alternate site to ensure that there are no omissions and errors.
Document the activation process for the alternate processing site.
Document the hand-back process.
The information you need about R&D Media, LLC is as follows:

Consider the LAN for a small 100-person business, R&D Media, LLC Inc. The business occupies one floor in an office building. Everybody has a computer on his or her desk, and there are servers for the web, file and print sharing, email, database, and a small 3D render farm, a rack of 20 quad processor Xeon servers running Red Hat Linux that generates the actual high-resolution video animations that R&D Media, LLC produces for its clients. The desktop systems consist of Apple Mac Pro desktops running the latest version of the Mac OS for the creative staff, and the latest version of Windows on computers for general use. The servers are running the latest version of Windows Server running Microsoft Exchange, web server, and file and print service.

The network is gigabit

Ethernet and the network hardware are a mixture from Cisco and Hewlett-Packard. Employees, business partners, and clients may visit R&D Media, LLCs office with laptop computers in order to collaborate on projects. The laptops will obtain their IP configuration from the DHCP server at R&D Media, LLC.

R&D Media, LLC has 10 megabit/second Internet access and uses a SOHO firewall that doubles as a DHCP server. This firewall filters out Internet-based attempts to access R&D Media, LLCs servers and desktop computers, but admits email, web, and SFTP (Secure FTP) traffic destined for specifically hardened servers.

R&D Media, LLC produces short animation movies for advertiser clients

These clients are located worldwide and need to communicate securely with R&D Media, LLC as they collaborate on their advertising shorts. R&D Media, LLC uses its high- speed Internet connection both to support the exchange of movie shorts as well as for email and general Internet web connectivity.

The network has the following additional specifications:

The network is all TCP/IP based.
The network is based on Cisco routers and switches.
All desktop computers include email, web, database access, and office productivity software.
Creative users also have multimedia authoring software installed.
All server and critical network equipment are in a secure server room.
Printers are located around the office area.
The multimedia department uses high-end workstations for video rendering and animation.
A load-balancing dual firewall connects the network to the Internet.
Security Policy:

All email must be secure so it cannot be inadvertently sent to the wrong party or intercepted.
All network resources and equipment must be password protected.
Company equipment may not be used for personal business.
All Windows-based PCs must run approved anti-virus and antispyware programs.
All servers and desktops should run host-based intrusion detection software.
Clients may use the Secure FTP (SFTP) server to send or receive multimedia files, but under no circumstances should one client be able to view the files of any other client.
The mail server must be configured not to forward email that originated on the Internet.
Password aging must be enforced on all servers and desktops.
All server configurations must be readily available to rebuild a failed system.
Offsite backup is required, with 24/7 access to that location.
All employees will demonstrate they understand the security policy.
There will be a security officer who reports directly to the CEO of R&D Media, LLC.
Be sure that you capture the following information in your report:

List of mission critical applications, list of non-critical applications dropped
New technologies for Alternative Processing Sites are utilized
The needs of R&D Media, LLCs stakeholders are considered within the plan
A Plan for updating alternate processing site software during normal operation
Documentation showing a simple rack diagram and a network diagram
Network configuration info (IP, DNS, MX)
Power consumption estimates
Bandwidth estimates
Information security architecture (firewalls, VPNs)
Plan for cutting over to the alternate plan
Plan for cutting back to the main site (a.k.a. hand back)

High School Completion and Financial Situation Satisfaction

Assessment 3

PRINT

Data Analysis and Interpretation
Details
Attempt 1Available
Attempt 2NotAvailable
Attempt 3NotAvailable
Toggle Drawer
Overview
Write a 23 page paper that analyzes and interprets the data collected from the research project.

By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:

SHOW MORE
Toggle Drawer
Resources
Ethics in Research
Ensuring that research complies with the basic principles of ethical research is of utmost importance. We must always take measures to protect participants from harm and maintain confidentiality. Use your textbook to read the following chapter and learn the critical steps that are necessary to ensure that your research complies with the ethical standards.

Salkind, N. J. (2017). Exploring research (9th ed.). Boston, MA: Pearson. Available in the courseroom via the VitalSource Bookshelf link.
Chapter 3B, “The Importance of Practicing Ethics in Research,” pages 6471.
Complete Ethical Standards in Research and Writing in the Learn tab of the Quick Guide of Academic Writer to learn about complying with ethical and legal principles in research and writing.

SHOW MORE
Assessment Instructions
Instructions
The next step in your research project is analyzing the data you collected. In previous courses, you wrote statistical results for several of your assessments. For this assessment, you will do the same for the variables that you have selected. Analyzing the data will help you determine the success of your study and help you make meaning of your information.

In a 23 page paper, address the following points.

Explain the statistical measures you used to analyze your data.
Be sure that you report your findings in APA style.
Describe your statistical findings, including statistical significance and influence of effect size.
Be sure to format your data in APA style.
Interpret your statistical findings using common language.
Submission Requirements
Submit your paper as your deliverable for assessment.

Note: Your instructor may also use the Writing Feedback Tool to provide feedback on your writing. In the tool, click the linked resources for helpful writing information.

Walkthrough Videos
You may find the following walkthrough videos helpful as you gather and analyze data for your research project:

Microsoft Excel How to Get the Analytic Add-on.
Microsoft Excel How to Use Descriptive Statistics.
Microsoft Excel How to Do T-Tests.
Microsoft Excel ANOVA.
Data Analysis and Interpretation Scoring Guide
VIEW SCORING GUIDE
Use the scoring guide to enhance your learning.
How to use the scoring guide
SUBMIT ASSESSMENT

This button will take you to the next available assessment attempt tab, where you will be able to submit your assessment.

High School Completion and Financial Situation Satisfaction

Assessment 2

PRINT

Research Proposal
Details
Attempt 1Available
Attempt 2NotAvailable
Attempt 3NotAvailable
Toggle Drawer
Overview
Create a research proposal that provides a detailed plan for your research study that states your hypothesis, reports on sampling methods, and identifies how the data will be analyzed to answer the research question.

By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:

SHOW MORE
Toggle Drawer
Resources
Selecting Your Sample
Selecting your sample is the next crucial component of designing your proposal. Use the following resources to help you.

Salkind, N. J. (2017). Exploring research (9th ed.). Boston, MA: Pearson. Available in the courseroom via the VitalSource Bookshelf link.
Chapter 4, “Sampling and Generalizability,” pages 7381.
This chapter explains populations, samples, and sample size.
Complete The Sample in the Learn tab of the Quick Guide of Academic Writer to learn about the sample of research participants, different types of sampling methods, assessing sampling bias, and select an appropriate sample size.

SHOW MORE
Assessment Instructions
Preparation
For this research, you will use the archival data from the GSS Data Explorer website to develop a research research question, develop a hypothesis, and analyze the data to draw conclusions.

Navigate to the GSS website.

GSS Data Explorer (2019). Retrieved from https://gssdataexplorer.norc.org/
You will complete the following steps in the GSS website. For a step-by-step guide, refer to the GSS Data Explorer Instructions [PDF] or the GSS Data Explorer Instructions video.

Create an account and add your two chosen variables to your cart.
Be sure that those variables are what you selected for your Literature Review.
Create a project, label it 4600_Last name, and save it.
Download the data by exporting it to Microsoft Excel.
Review the data available for each variable.
Once you have chosen your variables, use them for the entire course and use the resources provided to craft your study.

Instructions
In the next assessment, you will start to conduct your research study. We conduct research studies to expand our knowledge on how human behavior in the world is evolving. To conduct an effective study, we need to understand theories of development as they relate to our current environment and society.

The first step, however, is to create a research proposal that provides the detailed plan for your study. Be sure to use the Research Proposal Template [DOC], as it provides context and wording that you should use to help you clearly explain your main points. By using the template, you will cover all of the points below.

Insert your revised literature review in the Literature Review section in the template.
Operationally define the variables that you are using in your study.
State your hypothesis for your study.
Report on the method you will use to sample your participants.
You may want to look at the GSS website to see how participants were found.
Use your notes from the media piece to guide your sampling method selection.
Explain the method you will use to collect and analyze your data.
You may want to look at the GSS site to see how data was found.
Use your notes from the media piece to guide your sampling method selection.
Choose the measurement that matches your study.
Review the template for suggested language.
Discuss how the measurement increases the reliability and validity of the study.
Explain your procedure based on research design you chose.
Submission Requirements
Submit your proposal as your deliverable for assessment.

Note: Your instructor may also use the Writing Feedback Tool to provide feedback on your writing. In the tool, click the linked resources for helpful writing information.

Research Proposal Scoring Guide
VIEW SCORING GUIDE
Use the scoring guide to enhance your learning.
How to use the scoring guide
SUBMIT ASSESSMENT

This button will take you to the next available assessment attempt tab, where you will be able to submit your assessment.

Reproductive Anatomy

You have been assigned to teach a high school health class. Create a lesson on male and female reproductive anatomy and physiology. Be sure to highlight and distinguish the differences and similarities between the male and female reproductive systems.

Prepare a lesson on male and female reproductive anatomy and physiology. Include the following in the lesson:

The anatomy of both sexes.
The physiology of the anatomical parts for both sexes.
Highlight similarities and differences between the sexes in terms of anatomy and physiology.

“Battling Bad Science”

Watch Ben Godacre’s TedTalk, “Battling Bad Science.” (At least 125 words for each answer)
https://www.ted.com/talks/ben_goldacre_battling_bad_science

1. In your own words, explain the connection between what we are learning about information literacy and what Godacre is talking about? (It’s there, promise).

2. Find and explain your own example of research being “spun” or twisted to serve a purpose. What is the research, how was it appropriated, and was it successful?

For example, Goldacre mentions in an interview that he was initially drawn to this field of inquiry by the MMR/Wakefield scare, where Dr. Andrew Wakefield published a study that claimed to link the measles vaccine to autism in children. It was discovered later that the study was not only flawed, but parts of it were based on lies about the condition of the children participating. In addition, Wakefield was being paid by a law firm representing parents who were engaged in a civil lawsuit, AND he had his own competing vaccine about to be released on the market. Thousands of children died of measles in the following years in large part because their parents were afraid to immunize them.

Any topic (writer’s choice)

Unit VII Case Study
Weight: 11% of course grade
Grading Rubric
Due: Tuesday, 12/22/2020 11:59 PM (CST)
Instructions
The employees at your organization have formed a union, and the bargaining process now begins. Write a case study in which you analyze the situation. First, begin with background information about the negotiation, and make certain to address the areas below.

Identify the state where the organization is located. Is the state a right-to-work state? If yes, explain what this means. If no, explain what this means. Why are the employees deciding to unionize? What are the mandatory bargaining subjects? Other than wages and hours, what are five other terms and conditions of employment? What are permissive bargaining subjects that will be negotiated? List at least five.
Second, you need to select members of your bargaining team. You will select four supervisors who were identified in the Unit VI Lesson. Discuss why you selected each supervisor, and compare/contrast their conflict management styles. Each supervisor must have a different conflict style. Explain how each supervisor can contribute to conflict resolution strategies used during negotiation.
Third, explain the two collective bargaining strategies, and identify which one you will recommend your team to use. Explain and support your rationale.
Finally, what will you propose happens if a labor management agreement is not reached by your team and the employee representatives?
Your case study must be a minimum of three pages in length, not counting the title and reference pages. Your case study should present an insightful and thorough analysis with strong arguments and evidence. You must use three academically reliable sources to support your analysis.

Adhere to APA Style when constructing this assignment, and make certain to include in-text citations and references for all sources that are used. Please note that no abstract is needed.

METRICS

word paper that describes Optics: The Line of Site and Metrics Equal Focus.

Include the following key points your paper:

Define optics, and provide an example of one at your place of employment or in your research.
Explain how metrics can equal focus.
Propose an idea on why and how you would use optics and metrics to improve an organization based upon the information from the text and your own personal experience with metrics.