Study Document
… opportunities for enhancing the ESL educative experience can be found that were not present before. Schools should be supportive of this endeavor and federal money should be available as districts re-think how to approach education in the coming years.
Conclusion
ESL learners are in a position to … able to afford all these tools, so schools may need to be the ones to provide them. Schools should receive funding from the federal budget, and the COVID-19 era has literally reshaped the way teachers and students think about learning. The trend towards using digital technology to ……
References
Alvarez-Marinelli, H., Blanco, M., Lara-Alecio, R., Irby, B. J., Tong, F., Stanley, K., & Fan, Y. (2016). Computer assisted English language learning in Costa Rican elementary schools: an experimental study. Computer Assisted Language Learning, 29(1), 103-126.
Beetham, H., & Sharpe, R. (Eds.). (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. NY: Routledge.
Cassady, J. C., Smith, L. L., & Thomas, C. L. (2017). Supporting emergent literacy for English language learners with computer?assisted instruction. Journal of Research in Reading.
Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.
Kahai, S. S., Carroll, E., & Jestice, R. (2007). Team collaboration in virtual worlds. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38(4), 61-68.
Kasapo?lu-Akyol, P. (2010). Using educational technology tools to improve language and communication skills of ESL students. Novitas-Royal, 4(2).
Meskill, G., & Mossop, J. (2003). Technologies use with learners of ESL in New Your State: Preliminary report. Retrieved from https://www.albany.edu/lap/Papers/technology%20use.htm
Park, J. Y. (2011). Design education online: Learning delivery and evaluation. International Journal of Art & Design Education, 30(2), 176-187.
Study Document
...Federal government Enterprise Risk Management in Wells Fargo during the Pandemic
Introduction
As Beasley (2020) points out, enterprise risk management (ERM) is especially needed during the COVID 19 pandemic because of the “number of different, but interrelated risks spread all across most organization” (p. 2). COVID 19 is not just a factor that has impacted one business or industry. It has impacted all businesses and all industries in different ways. Grocery chains like Kroger, for instance, have seen increased demand. Restaurants on the other hand have seen business dry up due to mandated quarantine orders. Small business owners and large corporations have filed for bankruptcy. All of this impacts the banking sector and Wells Fargo specifically because of its role in managing loan products, using interest rates to attract savers, and offering investment advice. “No single risk associated with the COVID-19 pandemic crisis can be managed in isolation,” as Beasley (2020) points……
References
Beasley, M. (2020). How to Leverage ERM Principles to Better Respond to COVID-19-Related Risks. ERM Professional Insights.
Derysh, I. (2020). Watchdog questions why Wells Fargo reported giving only one large PPP loan to a Black-owned business. Retrieved from https://www.salon.com/2020/07/22/watchdog-questions-why-wells-fargo-reported-giving-only-one-large-ppp-loan-to-a-black-owned-business/
English, C. (2020). Wells Fargo Forced to Cut Its Dividend After Fed Stress Test. Here’s What Other Banks Did. Retrieved from https://www.barrons.com/articles/wells-fargo-forced-to-cut-its-dividend-after-fed-stress-test-51593467664
Hall, J. (2007). Internal Auditing and ERM: Fitting in and Adding Value. Retrieved from https://global.theiia.org/about/about-the-iia/Public Documents/Sawyer_Award_2007.pdf
Kaplan, R. & Mikes, A. (2012). Managing risks: A new framework. Harvard Business Review, 3.
Lewis, M. (2010). The Big Short. NY: W. W. Norton.
Lundqvist, S. (2014). Abandoning Silos for Integration: Implementing Enterprise Risk Management and Risk Governance. Lund University.
Morgenson, G. (2020). More Wells Fargo customers say the bank decided to pause their mortgage payments without asking. Retrieved from https://www.nbcnews.com/business/personal-finance/more-wells-fargo-customers-say-bank-decided-pause-their-mortgage-n1234610
Study Document
… it. Criminals have to be very tech savvy and must know the latest technology in order to get away with white collar crime. government and businesses are now outsourcing security to third parties who specialize in providing digital security, and so white collar…[break]…one. Proving that a particular … Yet, attackers can often mask their footprints and make it appear as though the crime was conducted by another person or country.
State, federal and International Laws Related to Cybercrime
The federal Computer Fraud and Abuse Act is the main law that allows for the prosecution of cybercrime. It prohibits unauthorized access to a computer … allows for the prosecution of cybercrime. It prohibits unauthorized access to a computer or security information. The Electronic Communications Protection Act is another federal law that along with the Stored Communications Act makes it a criminal offense to access information with authorization. Hacking, phishing and……
References
Computer Hope. (2019). When was the first computer invented? Retrieved from https://www.computerhope.com/issues/ch000984.htm
Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/
Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.
Statista. (2020). Global digital population. Retrieved from https://www.statista.com/statistics/617136/digital-population-worldwide/
Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.
Study Document
… to give the Native Americans their own territory where they could practice their own activities, traditions and culture without interference from the American government. However, the Act resulted in the forced migration of thousands of Native Americans from their traditional homelands to a region of the U.S. … was just one example of an exercise in human rights abuses in a long history of human rights abuses committed by the American government—from the time of slavery even into the 21st century. This paper will describe the history of the Indian Removal Act of 1830 and … hundred more Cherokee were allowed to live in the Qualla Boundary of North Carolina in exchange for their assistance in helping the U.S. government to catch a wanted Cherokee leader named Tsali.[footnoteRef:19] [19: Kutsche, Paul. "The Tsali legend: culture heroes and historiography." Ethnohistory 10, no. 4 (1963), 329.]
The … the land. Men like Thomas……
Works Cited
Primary Sources
Crockett, Davy, “On the removal of the Cherokees, 1834,” Gilder Lehrman Institute of American History. https://www.gilderlehrman.org/history-now/spotlight-primary-source/davy-crockett-removal-cherokees-1834
“The Magnetic Telegraph.” Ladies’ Repository 10(1850): 61-62. O’Sullivan, John. “Annexation.” United States Magazine and Democratic Review, vol.17, no. 1 (July-August 1845): 5-10.
Sevier, John. Letter to the Cherokee. DPLA. https://dp.la/primary-source-sets/cherokee-removal-and-the-trail-of-tears/sources/1500
Secondary Sources
Brown-Rice, Kathleen. "Examining the Theory of Historical Trauma Among Native Americans." Professional Counselor 3, no. 3 (2013).
Cave, Alfred A. "Abuse of power: Andrew Jackson and the Indian removal act of 1830." The Historian 65, no. 6 (2003): 1330-1353.
Cherokee Preservation Foundation. “About the Eastern Band.” Cherokee Preservation, 2010. http://cherokeepreservation.org/who-we-are/about-the-ebci/
Study Document
… non-profit sector in various beneficial ways, such as
by allowing nonprofits to keep anonymous the names of donors; and by capping the amount federal agencies can force nonprofits to spend—the idea being that this will prohibit agencies from shifting costs for regulatory ambitions onto nonprofits and other … anonymous and organizations do not have to disclose who is giving financial support to them unless they are directly compelled to by the government. They must keep this information in their records, but they are not longer required to report these records annually. That is a big … every donation they make will be made public, which is good for nonprofits because it allows them to act more independently from the government. In a free market system, independence from the state is one of the most important factors. Big donors can help nonprofits to have … Graham, 2019, p. 15). Belton……
References
Belton, K. & Graham, J. (2019). Trump’s Deregulatory Record: An Assessment at the Two-Year Mark. Retrieved from http://accf.org/wp-content/uploads/2019/03/ACCF-Report_Trump-Deregulatory-Record-FINAL.pdf
Benson, M. L., Stadler, W. A., & Pontell, H. N. (2019). Harming America: Corporate Crime in a Context of Deregulation. Victims & Offenders, 14(8), 1063-1083.
Brookings Institute. (2020). Tracking deregulation in the Trump era. Retrieved from https://www.brookings.edu/interactives/tracking-deregulation-in-the-trump-era/
Morrow, D. (2017). Deregulation in the Trump Administration will likely impact nonprofits. Retrieved from http://blog.abila.com/deregulation-trump-administration-impacting-nonprofits/
Weaver, H. L. (2018). One for the price of two: the hidden costs of regulatory reform under executive order 13,771. Administrative Law Review, 70(2), 491-512.
Study Document
… to be careful, however, with respect to how information is shared. The Privacy Act of 1974 regulates how information is collected by the federal government, which means that nurses working in Veterans Affairs have to follow these regulations. Then there is also the Conditions for Coverage of Specialized … Services the ability to regulate the use of Health IT and clinical informatics. Safety, security and quality issues are all overseen by the federal government under HITECH.
Privacy, Confidentiality and Security Issues
One of the challenges facing the field of nursing is how to keep information private in ……
References
Cho, O. M., Kim, H., Lee, Y. W., & Cho, I. (2016). Clinical alarms in intensive care units: Perceived obstacles of alarm management and alarm fatigue in nurses. Healthcare informatics research, 22(1), 46-53.
Effken, J., Weaver, C., Cochran, K., Androwich, I., & O’Brien, A. (2016). Toward a central repository for sharing nursing informatics’ best practices. CIN: Computers, Informatics, Nursing, 34(6), 245-246.
Elsayed, W. A., Hussein, F. M., & Othman, W. N. (2017). Relation between nursing informatics competency and nurses’ attitude toward evidence-based practice among qualified nurses at Mansoura Oncology Center. International Journal of Nursing Didactics, 7(6), 26-33.
Drolet, B. C., Marwaha, J. S., Hyatt, B., Blazar, P. E., & Lifchez, S. D. (2017). Electronic communication of protected health information: privacy, security, and HIPAA compliance. The Journal of hand surgery, 42(6), 411-416.
Haupeltshofer, A., Egerer, V., & Seeling, S. (2020). Promoting health literacy: What potential does nursing informatics offer to support older adults in the use of technology? A scoping review. Health Informatics Journal, 1460458220933417.
Kharbanda, E. O., Asche, S. E., Sinaiko, A. R., Ekstrom, H. L., Nordin, J. D., Sherwood, N. E., & O’Connor, P. (2018). Clinical decision support for recognition and management of hypertension: a randomized trial. Pediatrics, 141(2).
Khezri, H., & Abdekhoda, M. (2019). Assessing nurses’ informatics competency and identifying its related factors. Journal of Research in Nursing, 24(7), 529-538.
Kleib, M., & Nagle, L. (2018). Factors associated with Canadian nurses\\\\\\\\\\\\' informatics competency. CIN: Computers, Informatics, Nursing, 36(8), 406-415.
Study Document
… could be re-established. Frederick Douglass, writing in The Atlantic in 1866, stated that enfranchisement of the free black would only come if the federal government passed laws to protect the newly freed former slaves and brought the law of the North into the South. What happened, however, was … persisted. This paper will show how the goals of Reconstruction regarding African-Americans were not achieved by 1900 because of a failure of the federal government to oversee effectively the Era of Reconstruction and to eradicate the racist doctrines and organizations of the South.
President Johnson essentially gave the … enfranchised. Johnson stated in his 1865 pardon: “I hereby grant and assure to all persons of color who have, directly or by…[break]…from the government. It was as though they had been dropped in their own same land as yesterday but now without any titles, any lodgings or … its goals because……
Works Cited
A&E. “Carpetbaggers and Scalawags.” History, 2018. https://www.history.com/topics/american-civil-war/carpetbaggers-and-scalawags
Douglass, Frederick. “Reconstruction.” The Atlantic, 1866. https://www.theatlantic.com/magazine/archive/1866/12/reconstruction/304561/
Guelzo, Allen. Reconstruction Didn\\\\'t Fail. It Was Overthrown. Time, 2018. http://time.com/5256940/reconstruction-failure-excerpt/
McBride, Alex. “Plessy v. Ferguson.” Thirteen, 2007. https://www.thirteen.org/wnet/supremecourt/antebellum/landmark_plessy.html
Johnson, Andrew. “A Proclamation.” Digital History, 1865. http://www.digitalhistory.uh.edu/exhibits/reconstruction/section4/section4_pardon1.html
Lincoln, Abraham. Second Inaugural Address, 1865. http://avalon.law.yale.edu/19th_century/lincoln2.asp
Study Document
… health care providers could focus exclusively on prevention and Medicare could offer support, such as subsidies, tax credits and other incentives—just as the federal government offered subsidies and tax credits for electric vehicle manufacturers in order to get people interested in buying them. To provide quality care means … necessarily going to be about padding the pockets of doctors, which is why many do not want to embrace preventive care. If the government subsidized preventive care and health literacy initiatives and allowed these approaches to health care to be seen as revenue streams by doctors, they … approaches to health care to be seen as revenue streams by doctors, they would become more attractive in their own right and the government could achieve the health outcomes it is interested in achieving. The more that doctors can feel supported financially in their approach to improving ……
References
Glasziou, P., Moynihan, R., Richards, T., & Godlee, F. (2013). Too much medicine; too little care. BMJ, 347, f4247.
Lichtenfeld, L. (2011). Overdiagnosed: Making people sick in the pursuit of health. The Journal of Clinical Investigation, 121(8), 2954-2954.
Moynihan, R. (2015). Preventing overdiagnosis: the myth, the music, and the medical meeting. BMJ: British Medical Journal (Online), 350.
Welch, H., Schwartz, L. & Woloshin, S. (2011). Overdiagnosed. Beacon Hill.
Study Document
...Federal government Countering the Threat of Weapons of Mass Destruction (WMDs)
Purpose Statement
Chemical, biological, radiological, and nuclear (CBRN) weapons of mass destruction (WMD) area a threat that can completely disrupt an entire nation’s way of life. The current situation in China is a perfect illustration of what can happen when a biological weapon is used to destabilize a nation’s economy. China is currently grinding to a halt as the Covin-19 virus spreads like wildfire through China. The example shows how devastating a WMD can be when used in an attack. The purpose of this study is to examine ways to prevent or reduce the risk of a CBRN WMD attack. By looking at the use of international treaties, the rise of terrorism, and counter-proliferation strategies, this paper will assess the measures available for achieving the aim.
Research Question
What can nations do to prevent or reduce the risk of CBRN WMD……
References
Asada, M. (2008). Security Council Resolution 1540 to combat WMD terrorism: effectiveness and legitimacy in international legislation. Journal of Conflict & Security Law, 13(3), 303-332.
Carter, A. B. (2004). Overhauling counterproliferation. Technology in Society 26(2-3), 257-269.
CBS. (2011). Clinton on Qaddafi: We came, we saw, he died. Retrieved from https://www.youtube.com/watch?v=mlz3-OzcExI
The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. (1999). Combating Proliferation of Weapons of Mass Destruction. Washington, D.C.
Forest, J.J.F. (2012, Winter). Framework for Analyzing the Future Threat of WMD Terrorism. Journal of Strategic Security 5, 4. Retrieved from http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1193&context=jss
Hochman, D. (2006). Rehabilitating a rogue: Libya's WMD reversal and lessons for US policy. Parameters, 36(1), 63.
Lang, C. G. (1937). Archbishop's Appeal: Individual Will and Action; Guarding Personality. London Times, 28.
Stone, O., & Kuznick, P. (2013). The untold history of the United States. Simon and Schuster.
Study Document
… to happen on their soil resulted in many people being very surprised and mentally traumatized by the attacks. There was pressure on the government to attack in a significant way to prevent such attacks from reoccurring. This is what resulted in major changes in the United States … to attack in a significant way to prevent such attacks from reoccurring. This is what resulted in major changes in the United States government’s foreign and domestic security policies. It also led to the government getting into several wars and supporting various government and militias across the world to fight its enemies. This paper reviews some of the key government reactions to the September 11 attacks and the role of the private sector in the country’s security policy after the attacks.
Public Opinion …
In the weeks that followed the September 11 attacks in New York and on Pentagon, polling showed……
References
Chanley, V. (2002). Trust in Government in the Aftermath of 9/11: Determinants and Consequences. Political Psychology, 23(3), 469-483. Retrieved May 11, 2020, from https://www.jstor.org/stable/3792588
Dugulin, R., & Niglia, A. (2015, May 17). The private sector in the protection of critical infrastructure - GRI. Global Risk Insights. https://globalriskinsights.com/2015/05/the-private-sectors-vital-role-in-the-protection-of-critical-infrastructure/
Gramlich, J. (2018, September 11). Since 9/11, Americans have seen anti-terrorism policy as a top priority. Pew Research Center. https://www.pewresearch.org/fact-tank/2018/09/11/defending-against-terrorism-has-remained-a-top-policy-priority-for-americans-since-9-11/
Morgan, D. (2019). Homeland Security Research and Development: Homeland Security Issues in the 116th Congress. Current Politics and Economics of the United States, Canada, and Mexico, 21(1), 43-46.
Moteff, J., Copeland, C., & Fischer, J. (2003, January). Critical infrastructures: What makes an infrastructure critical?. Library of Congress Washington DC Congressional Research Service.
We have over 150,000+ study documents to help you.
Sign Up for FREE