Monday, May 18, 2020

The Case of Susan Essay example - 1273 Words

Susan is a freshman enrolled at your small private university. She hopes to graduate with a Bachelor of Fine Arts degree, majoring in visual arts and maybe someday attend graduate school for a master’s in fine arts. Although Susan is an art major, she is required to take two English courses that require a great deal of writing. Susan reveals to you that she has an Auditory Processing Disorder. You learned in your EDCEP 853 College Students with Special Needs course that a person with an auditory processing disorder periodically experiences an inability to process verbal information. This learning disability (LD) can make it difficult for students to understand and organize large amounts of spoken information presented in lectures or class†¦show more content†¦Susan has convinced her parents that she can handle her situation and she is very concerned about letting herself and her parents down. Susan shares that she is reluctant to ask for help, fearing that her profess ors and fellow students will think that she is asking for â€Å"special† treatment and she explains that she is not really sure what kind of assistance is available to her in college. When she was in high school, she had an Individualized Education Plan (IEP) and everything was mapped out for her. You can hear the frustration in Susan’s voice. Because learning disabilities are not visible to the common observer, family, teachers and peers often do not understand the challenges faced by individuals with learning disabilities. The University of Wisconsin-Madison notes in College Students with Learning Disabilities (2012), those individuals with learning disabilities often have to prove their disability is real. Susan can organize and communicate her thoughts in a one-on-one conversation but she finds it difficult to organize and articulate her ideas in writing. Susan explains that writing was her most challenging academic area in high school. She confides that she is wor ried that she will not be able to keep up with the course workload and is worried about failing her freshman English course but she is determined to make her first year a successful one. You commend Susan for her determination and ensure her that your discussion will beShow MoreRelatedSusan Munro Case Evaluation1243 Words   |  5 Pages| Assignment # 01:†Susan Munro ,service consumer† | Case study | | A brief report on solving a case study full of services and identifying the need of solving it. Selecting the right service and analyzing the importance of doing so. | | Submitted by :Farah Zaidi | 9/29/2010 | | CUSTOMER SERVICE â€Å"The essence of good customer service is forming a relationship with customer- a relationship that individual customer feels that he would like to pursue.† TABLE OF CONTENT Read MoreEuthanasia: The Case of Susan Wolfs Father1150 Words   |  5 Pagespatient feels they should die. The option of assisted suicide (Physician Assisted Suicide) should be left for terminally ill patients, whose death is expected to be slow and painful both to the patient and family around them. Looking at the situation Susan Wolf was facing, hastily saying NO to a terminally ill family member is expected. Then consideration to re-think what one is advocating for would result. Similar would have been my reaction if was my father. In this situation Susans father had madeRead MoreOrganization Behavior: the Case of Julie and Susan Essays1281 Words   |  6 PagesThe Case of Julie and Susan Introduction The case of Julie and Susan demonstrates how a breakdown in any component of the MARS Model affects individual behaviour and performance. The questions facing Dr. Griffiths are; how did this breakdown occur, and is there an effective way to fix it? Using organizational behaviour theories, it is possible to analyze the symptoms, problems, and causes. From this analysis, a recommendation on how best to fix the situation can be developed. Given the factsRead MoreCase Study : Locating New Pam And Susan s Stores1658 Words   |  7 PagesMultiple Regression Project Case Study: Locating New Pam and Susan’s Stores Kim Ramirez Northeaster University MGSC 6200 Information Analysis Professor Grigorios Livanis Instructor Demetra Paparounas April 17, 2016 Introduction: Pam and Susan’s is a chain of discount department stores. There are currently 250 stores, mostly located throughout the South. As the company has grown and wants to expand, Pam and Susan’s is in the search of the most profitableRead MoreCase Study : The Bahamas, I Met Jack And Susan Gecko On Their Honeymoon 1287 Words   |  6 Pages While vacationing in the Bahamas, I met Jack and Susan Gecko on their honeymoon, married only five days. They are a loving couple excited about their future together and the possibilities of happy ever after. We met in the hotel restaurant and were elated to encounter fellow visitors from Chicago. Upon leaving the island, I gave them my card should they ever need financial coaching services. Three months later, I received a call from Jack asking for an appointment. However, after a few questionsRead MoreCase Study : Two Tough Calls1171 Words   |  5 PagesCase Study: Two Tough Calls (A) Business leaders among a wide range of industries agree that an organization’s success is determined by attracting and retaining a quality workforce. However, many organization’s hire employees based on a certain set of skills the employees possess, or acquaintances they have within the organization. Many organizations fail to consider if the prospective employee fits the organizational culture. In the case of Two Tough Calls, the Program Manager, Susan, was facedRead MoreThe X92 Press [Case Study 15.1]1460 Words   |  6 PagesIntroduction The key issues of this case are the salesperson is lack of understanding customer, lack of preparation before interview, and lack of understanding the product itself. And solutions are required to solve is problem the salesperson in order to salvage the sale. 1. What mistaken did Susan make? 2. How should she have handled this sale? According to the case, one of the mistaken that Susan did is lack of understanding her customer. She did not know the customer’s problemRead MoreEthical Dilemmas Of Social Workers1158 Words   |  5 Pagesways in which social workers can avoid ethical dilemmas. In regards to the Jones case I will explain five ethical dilemmas. I will explain what 3 core values could have benefitted the Jones family and I will give three strategies I will use to practice ethical behavior in my field of social work in the future. There are many ethical dilemmas in the Jones case. The first one I want to point out is the grandma giving Susan a quilt to show her appreciations. According to the NASW Code of Ethics, SocialRead MoreThe Criminal Justice System Is A System1307 Words   |  6 Pages Susan Mellen: Wronfully Convicted The criminal justice system is a system that prides itself on being able to help control crime and implement penalties to those that commit crimes. There is a specific way into which a person enters the justice system. First, a crime is committed. The crime is reported and that leads to an investigation. Once the investigation is completed and there is enough evidence, an arrest can be made (The Criminial Justice System, 2008). But what happens if something goesRead MoreThe Anorexia Relapse Prevention Guidelines1129 Words   |  5 PagesThe Anorexia Relapse Prevention Guidelines in Practice: A Case Report Introduction Anorexia Nervosa is a fairly common and very consequence psychiatric disorder that affects a person’s desire to consume nutrients because they believe that they are overweight. Women are more likely then men to develop this specific disorder and teenagers aged 15 to 19 are at the highest risk of anyone (Berends, Van Meijel, Van Elburg, 2012). Individual’s affected by Anorexia Nervosa Disorder will refuse to maintain

Wednesday, May 6, 2020

Descriptive Essay - Original Writing - 1462 Words

â€Å"Mom, please† I whined from across the room. â€Å"No Jamie, I told you before and I will tell you again, we are not going swimming in the ocean. It’s too dangerous with all of the shark spottings from only a mile away from shore.† â€Å"But I already bought a snorkel and I really want to go..† â€Å"Enough.† She interrupted. â€Å"If you want to use your new snorkel, go in the hotel pool while your father and I try and figure out restaurants worth trying for the next week.† â€Å"I thought this vacation was going to be fun.† I mumbled under my breath as I grabbed my snorkel and trudged down to the small, indoor pool near the lobby. I turned around, mesmerized by the waves of the ocean just across the street. The pool was empty, so I would have enough†¦show more content†¦This is incredible! I thought while swimming laps around the pool, needing to reach the surface for air. I could use this, I thought, if there is no way for me to drown, I can go to the ocean by myself without my parents telling me no! I jumped from the water, ripping the snorkel from my face, and raced towards the lobby. The water was swaying in rhythmic motions on the sand, the water slowly creeping onto the shore, then sinking back, leaving some rocks and shells that had been pulled in. As I placed the snorkel on my head, I felt the now familiar tickling sensation emerge and the hard slits forming. I practically dived into the waves, the salty water filling my neck, making me cough. I scratched my hand on the hard scales that had formed along the gills, and a couple drops of blood leaked into the open ocean. I didn’t think anything of it though. Swimming towards the bottom, I watched the many different species of fish swim along, fascinated by their many colors and sizes. One of the larger ones slyly swam right by where I was hiding along a coral reef, with shiny turquoise scales and a deep purple tail. I spotted one nearby with at least three rows of teeth, and I backed away, afraid that it would spot me. I didn’t realize, however, that I had backed into something even more frighten ing. A large shark was hovering behind me, it’s large nose sniffing the blood that had seeped from my hand. I slowly turned around and bolted, but he

Strategic Information Systems Public Transport Industry

Question: Discuss about the Strategic Information Systems Public Transport Industry. Answer: Introduction It has become very necessary to make use of automated information systems in the field of public transport to offer better services to the commuters. There are thousands and millions of people that make use of public transports on a daily basis. It is not feasible to manage these commuters and offer best services through manual operations. It is therefore required to make use of automation in the systems that are used to control and manage these transport systems. Business Processes There are various business processes that are carried out in association with the public transport system. Fare collection processes in which the commuters are issued the tickets as per their destination and the mode of transport. There are usually two types of customers that are present as: Regular or frequent customers that commute on a frequent basis In-frequent commuters that make use of the transport system once in a while Route estimation for the vehicle to make sure that the quickest and shortest path is covered in the journey Information storage and handling to store the information associated with the passengers Applications associated with security and surveillance to keep a track of all the vehicles and modes of transport that are being used simultaneously (Polzin, 2016) Business Requirements There are several requirements in association with the public transport. With the increase in the population and the increase in the number of vehicles on road, there are often situations of congestion that have been observed. Also, in case of air or rail transport system, there are often scenarios wherein the passengers fail to book their tickets online on the referred date of journey due to unavailability of the space. It is necessary for the public transport systems to manage the traffic to make sure that the real-time information is made available to the customers and there is no congestion or situation of unavailability (Mala and Leela, 2014). System Requirements The system that is required to be developed for the management of public transport shall fulfill the following set of requirements: The system reviewers and analysts shall have the ability to locate a particular vehicle automatically with the aid of GPS Radio and cellular communication systems and technologies shall be integrated to ensure that proper and adequate communication is maintained The information of the passengers shall be available on a real-time basis and shall be stored in the database for future use There shall be automated counters set up for the passengers to obtain tickets and passes for the journey (Litman, 2017) Security tools and surveillance equipment along with its monitoring shall be done to ensure that there are no loopholes in the security The information regarding the best route to follow shall be displayed to avoid the situation of congestion and jams The passengers shall be made aware of the next stop through the announcement system There shall also be the following non-functional system requirements that shall be present in the system. It will be required for the system to showcase enhanced performance to make sure that the end users do not have to compromise on the response time at any point of time and there is also minimum throughput time involved (Trommer, 2017) Reliability of the automated system will also be extremely essential and a required aspect as it will be necessary to make sure that there is always valid information reflected by the system for the end users It will be required for the system to showcase enhanced usability to make sure that the end users do not have to compromise on the functional aspects that are included and all of their expectations are met Scalability of the automated system will also be extremely essential and a required aspect as it will be necessary to make sure that any of the changes can be incorporated easily without much of re-work It will be required for the system to showcase enhanced availability to make sure that the end users do not have to compromise on the access time for the system. It shall be available for access at all times Maintainability of the automated system will also be extremely essential and a required aspect as it will be necessary to make sure that all the upgrades can be made with much ease. Software and Vendor Selection The system that will be installed for the management of public transport will be required to reflect high availability along with required functional and non-functional aspects. Following are the key factors that will be required to be considered while selecting the vendor and the software package. There shall be multiple levels of software support along with enhanced maintenance that shall be promised The parties shall sign a Service Level Agreement (SLA) that shall include the escalation procedures along with all the terms that are agreed upon Upgrade paths along with the information on the upgrade schedule shall also be included Testing types and mechanisms that will be covered shall also be explained It is necessary that the expectations along with the requirements of the organization are met and the selection shall be done in such a manner that the needs are fulfilled There shall also be an study that shall be carried out on the future trends in the field of public transport and the flexibility and scalability associated with the selection of the software that is made Methods of Utilization of Technology: Custom Developed Software Public transport services and providers can made use of the technology in terms of the custom developed software to implement the functional and non-functional aspects in their architecture. It is the software in which there are features and functionalities present according to the customer expectations along with specifications that are listed out by the customer. There are various modes of public transport along with several agencies and providers that provide them to the people. There may be certain requirements that may apply to one of the providers which may not be any use to the other. For example, the requirements of a public transport agency that provides road transport and the one that deals in to the rail transport will be different from each other. The costs may however rise up in this case. Package Purchasing The second option which may be used for the deployment of the automated systems in the architecture of public transport system is packaged purchasing. These are the software packages that are readymade and can be deployed with immediate effect. Because of the nature of these packages, the cost that is associated with them is usually low. There is also a lot of information that is already available regarding these packages in terms of their performance and the level of customer satisfaction associated with these. A market study can easily highlight all of these details and the selection process becomes easier. There is also an ease of training and documentation that comes along with these. However, they score less on the mapping of the business specifications with the requirements that are targeted by the package. Outsourcing Outsourcing is one of the most commonly used methods and can be used by the public transport providers and agencies as well. A third party is involved in this case which is responsible for carrying out all of the tasks that are related with design along with deployment of the information systems. It will therefore be certain that the amount and level of management and monitoring that will be involved in this case will be low. There may however be increased time that may be required to obtain and implement these packages. Level of Efficiency The efficiency of the technical implementation of the automated systems in public transports is based upon various success factors. It will be required to analyze the actual budget with the estimated budget and the same will go in case of the schedule as well. Level of efficiency will be calculated in terms of the higher value of the match between the two. Manual processes will be cut down with the implementation of automated systems and this percentage will be significant to understand the efficiency levels It will be required to make sure that the employees are satisfied which will be highlighted with the aid of their satisfactions levels It will be required to make sure that the customers are satisfied which will be highlighted with the aid of their satisfactions levels Potential Security Risks and Data Breaches: Confidentiality Attacks The automated system that will be designed for public transport will be composed of numerous entities that will be inter-linked and inter-dependent upon each other. There may be case of eavesdropping that may occur because of the presence of such huge number of entities (Lu, 2014). The attackers may take advantage of the presence of several entities and may therefore find it easy to track the activities that take place in terms of movement of the passengers or the allotment of tickets and likewise (Mahmoud, 2015). There will be various technologies, processes and concepts that will be used in the automated systems that will be designed for public transport and data mining will be one such technology. There may be confidentiality risks and threats that may emerge because of the same (Microsoft, 2016). The information sets and the containers may be modified and changed during their transition from one source to the destination. There may also be reconstruction of the contents that may be done (Jing, 2014). Integrity Attacks Public transport systems will be composed of a lot of information and it will be necessary to make sure that the integrity of the information is not altered or impacted at any time. Integrity will be restored and maintained only when there will be no change or modification done to the information contents without adequate permissions. There may however be cases of message alteration that may be reported in which the attacker may modify the message contents or the structure without authentication and authorization to do so (Bhabad, 2015). Public transport systems will be composed of a lot of information and it will be necessary to make sure that the integrity of the information is not altered or impacted at any time. Integrity will be restored and maintained only when there will be no change or modification done to the information contents without adequate permissions. There may however be cases of media alteration that may be reported in which the attacker may modify the media contents or the structure without authentication and authorization to do so (Nichols, 2016). Availability Attacks Availability of the information is one of the prime necessities and requirements of the clients that is required to be maintained and offered. There may however be execution of various attacks that may impact the information availability. One of such attacks may be flooding attacks in which the automated system for public transport may be loaded with a lot of unwanted and garbage information that may bring down the service continuity and impact its availability (Panetta, 2016). There may also be various attacks on the quality of the information that may be given shape by the attackers which will eventually impact the availability. Guidelines on Mitigation of the Risks There are several automated tools that have been developed in response to the attacks on the availability of the information and the system. Some of these tools include anti-denial and flood-detection tools that may control and prevent the attacks from taking place. It is necessary to upgrade the first step to security which can be done only by enhancing the measures that are taken to ensure that there is proper authentication and access control implemented (Aws, 2016). In the public transport systems that will be developed as per the latest technology, there will be prime use of the networks and the networking protocols. There are a majority of information security risks and breaches that are based on networks as the threat agents. It shall be made sure that steps such as network monitoring and analysis are carried out. Cryptography and encryption is an important activity that is required to be incorporated in the public transport systems to make sure that the passenger information remains safe even if the attacker succeeds in stealing it (Wood, 2016). Many tools are available in the market that has the ability to detect and prevent the intruders in an automated manner. There are various attacks that are created by the attackers that are only based upon the specific version of the system. Such forms of attacks can be easily avoided with the aid of maintenance and regular upgrades (Amato, 2016). Conclusion Automation is the prime necessity of the modern day systems to make sure that the business processes and business requirements are met. There are several industries that have shifted and are making a move towards the automated information systems and once such applicant is public transport and related systems. There are a lot many business activities and operations that are handled and operated by the public transport systems on a daily basis. Manual processes cannot be applied any longer to handle these activities and operations. These can only be handled with the aid of automated and technically advanced systems that are specifically designed according to the needs and requirements. These packages and software can be availed with the use of several options such as customer software packages, packaged purchasing or using the option of outsourcing. There are several advantages that are offered by these automated systems in terms of the reliability, performance and agility. However, t here are certain risks and threats that are associated with the information that is contained in these information systems. These risks are primarily categorized in three broad categories as confidentiality risks, integrity risks and availability risks. There are mechanisms and measures that have also been developed to deal with these risks and attacks. These mechanisms shall be incorporated and it shall be made sure that the information is always kept protected. References Amato, N. (2016). The hidden costs of a data breach.. [online] Available at: https://www.journalofaccountancy.com/news/2016/jul/hidden-costs-of-data-breach-201614870.html [Accessed 12 May 2017]. Aws (2016). Overview of Security Processes. [online] Available at: https://d0.awsstatic.com/whitepapers/aws-security-whitepaper.pdf [Accessed 12 May 2017]. Bhabad, M. (2015). Internet of Things: Architecture, Security Issues and Countermeasures.. [online] Available at: https://www.ijcaonline.org/research/volume125/number14/bhabad-2015-ijca-906251.pdf [Accessed 12 May 2017]. Jing, Q. (2014). Security of the Internet of Things: perspectives and challenges. [online] Available at: https://csi.dgist.ac.kr/uploads/Seminar/1407_IoT_SSH.pdf [Accessed 12 May 2017]. Litman, T. (2017). Autonomous Vehicle Implementation Predictions Implications for Transport Planning. [online] Available at: https://www.vtpi.org/avip.pdf [Accessed 12 May 2017]. Lu, C. (2014). Overview of Security and Privacy Issues in the Internet of Things. [online] Available at: https://www.cse.wustl.edu/~jain/cse574-14/ftp/security.pdf [Accessed 12 May 2017]. Mahmoud, R. (2015). Internet of things (IoT) security: Current status, challenges and prospective measures - IEEE Xplore Document. [online] Ieeexplore.ieee.org. Available at: https://ieeexplore.ieee.org/document/7412116/ [Accessed 12 May 2017]. Mala, S. and Leela, N. (2014). Automated Fare Collection System for Public Transport Using GPS. [online] Available at: https://www.ijirset.com/upload/2014/icets/116_EC315.pdf [Accessed 12 May 2017]. Microsoft (2016). Core Infrastructure Optimization: IT Security Processes - Best Practices for Business IT. [online] Available at: https://www.microsoft.com/india/infrastructure/capabilities/itprocesses.mspx [Accessed 12 May 2017]. Nichols, A. (2016). Perspective Threats Risk Analysis Process. [online] Sans.org. Available at: https://www.sans.org/reading-room/whitepapers/auditing/perspective-threats-risk-analysis-process-63 [Accessed 12 May 2017]. Panetta, K. (2016). Gartner's Top 10 Security Predictions 2016 - Smarter With Gartner. [online] Smarter With Gartner. Available at: https://www.gartner.com/smarterwithgartner/top-10-security-predictions-2016/ [Accessed 12 May 2017]. Polzin, S. (2016). Implications to Public Transportation of Emerging Technologies. [online] Available at: https://www.nctr.usf.edu/wp-content/uploads/2016/11/Implications-for-Public-Transit-of-Emerging-Technologies-11-1-16.pdf [Accessed 12 May 2017]. Trommer, S. (2017). Autonomous Driving: The Impact of Vehicle Automation on Mobility Behaviour. [online] Available at: https://www.ifmo.de/tl_files/publications_content/2016/ifmo_2016_Autonomous_Driving_2035_en.pdf [Accessed 12 May 2017]. Wood, P. (2016). Social hacking: The easy way to breach network security. [online] ComputerWeekly. Available at: https://www.computerweekly.com/tip/Social-hacking-The-easy-way-to-breach-network-security [Accessed 12 May 2017].