Friday, May 22, 2020
Thursday, May 7, 2020
Drug Addicts Should They Receive Rehabilitation Or Go
Patricia McKenna Professor Riley English 101 16 November 2015 Drug Addicts: Should they Receive Rehabilitation or Go to Prison? People everywhere suffer from the life-ruining disease, drug addiction. A common way people try to escape the hardships of life is to turn to drugs. Once they get into drugs that are highly addictive, such as heroin, they are trapped by a dependency that can be incapacitating. These people are no different than anybody else, they are simply people who made a bad decision and are now stuck. The best thing for these people is to be in a supporting environment to kick the nasty habit they have formed. The place that provides the perfect conditions is rehabilitation centers, not prison. Prison is a very hostileâ⬠¦show more contentâ⬠¦Meaning that it is not the addict choosing this life, it is the drug taking over the abuser (Johann). Dr. Nora Volkow, director of the National Institute on Drug Abuse reiterates the fact that addicts are sick by saying, ââ¬Å"We need to first recognize that drug addiction is a mental illness.â⬠Also, researchers have shown that most addicts also have psychiatric issues such as Post Traumatic Stress Disorder, depression, anxiety disorders, psychosis, ADHD, and other personality disorders (Singer, Kola, and Biegel). So, not only do addicts have a disease that they struggle with day by day but also, often they have other mental issues that need to be treated, some even caused by the addiction. Brig Gen Maktoum al Sharifi, the head of Abu Dhabi Capital Police expressed the same idea by saying, ââ¬Å"A drug addict is a sick person and he should be treated as such. Alternative punishment would be more effective. A drug offender could be just an addict, not a criminalâ⬠(Jakarta). A person suffering from cancer or bipolar disorder would not be punished and put behind bars so why should someone with a drug addiction? Addictions are frequently caused by deeper reasons that need to be helped and addressed by professionals in order to make a change in addictsâ⠬⢠lives. Addicts usually go in a downward spiral and they often lose everything in their life from their family to their job to a
Wednesday, May 6, 2020
Ms2 Course Review Free Essays
2013 Exam Review Session CGA MS2 Information Systemsââ¬â¢ Strategy 1 Agenda Agenda will change as needed to suit your needs â⬠¢ 2 pm Start. â⬠¢ Introduction Feedback Solicitation â⬠¢ 2:10 ââ¬â 2:30: Fundamentals of Business Case Analysis â⬠¢ 2:30 ââ¬â 3:45. Business Case Example/s â⬠¢ Break 10 mins â⬠¢ 3:55 ââ¬â 5pm Review of key items from all modules â⬠¢ 5pm Finish. We will write a custom essay sample on Ms2 Course Review or any similar topic only for you Order Now 2 Nine-step approach to case analysis Spend about 40% of your time on the case ââ¬â 90 minutes. 1. 2. 3. 4. 5. 6. 7. 8. 9. Skim the case. Read the case closely. Identify problems, threats, and opportunities. Analyze the data. Generate alternatives. Select the decision criteria. Analyze and evaluate the alternatives. Make a recommendation or decision. Determine Implementation steps associated Risks. 3 Executive Summary (3 marks) â⬠¢ â⬠¢ â⬠¢ â⬠¢ Objective of the report Key problems/threats/opportunities identified State Alternatives (briefly) Recommendations ââ¬â Include completion date Implementation strategy ââ¬â Key Risk and mitigation (briefly) â⬠¢ It should suffice as a Stand alone report REVIEW YOUR CASEâ⬠¦ 4 Current Situation (10 marks) â⬠¢ List some of the strengths/ Strategic advantages â⬠¢ Is there an existing system? What is wrong? ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â List briefly explain the problems Categorize them if possible Determine Root cause, if there is one single cause? Business fundamental shortcomings? Conflicts? â⬠¢ Does the technology used align / support the business model? â⬠¢ Organizational misfits? â⬠¢ Strategic misfits? 5 Current Situatio n contdâ⬠¦ â⬠¢ What is the Impact? ââ¬â Cost: quantified in $$ ââ¬â Does it meet current or future business needs? ââ¬â Intangible impacts ââ¬â Strategic â⬠¢ Threats â⬠¢ Opportunities ââ¬â Competitive ââ¬â Technological 6 Criteria (5 marks) â⬠¢ What is Criteria? What is it used for? â⬠¢ State it at a high level where you can â⬠¢ Prioritize the criteria ââ¬â and show that you have done so. â⬠¢ Explain why you chose each criterion â⬠¢ Measuring each criterion? ($, market share/Sales, other goals) ââ¬â Does it meet current or future business needs? ââ¬â $ savings ââ¬â Intangible benefits ââ¬â Strategic â⬠¢ Threats â⬠¢ Opportunities ââ¬â Competitive ââ¬â Technological 7 Alternatives Recommendation (15 marks) â⬠¢ â⬠¢ â⬠¢ â⬠¢ Improvise use your imagination (just be logical). Each alternative should be a mostly complete Solution. Each alternative should be feasible. Assess each alternative based upon the criteria ââ¬â show this analysis in your work. â⬠¢ Other pros cons (other than in the criteria) â⬠¢ Alternatives donââ¬â¢t have to be mutually exclusive. They can be a combination of the options identified. â⬠¢ Why did you choose the recommended alternative/s? ââ¬â Benefits ââ¬â Explain how it achieves the objective/resolves the problem ââ¬â Limitations / risks 8 Alternatives Recommendation (Continuedâ⬠¦) â⬠¢ Make a recommendation (use a positive voice! ) ââ¬â Do not just suggest something ââ¬â Do not say it weakly or ambiguously â⬠¢ I believeâ⬠¦ / In my opinionâ⬠¦ / My thoughts areâ⬠¦ Clearly recommend an action and explain â⬠¢ what it is and â⬠¢ why it fits the criteria. (if you have not already in the analysis). 9 Risk Management Plan (15 marks) Read Carefully the requirements of this section. Does it require an Implementation / Action plan as well? â⬠¢ Narrative exp lanation ââ¬â Implementation Strategy/Approach (at a high level)? ââ¬â Assumptions / Requirements â⬠¢ High level Risks, Ethical, Privacy issues? (Probability Impact) â⬠¢ Mitigation Strategies â⬠¢ Plan ââ¬ËBââ¬â¢ â⬠¢ Actual implementation steps and, within each step ââ¬â Step Risk if any and mitigation plan if any â⬠¢ â⬠¢ â⬠¢ Time Lines / Time Frame / Schedule Detail Costs Responsibilities Project Phases, if anyâ⬠¦ short term, long term 10 Exam Review Session â⬠¢ Go over Business Case ââ¬â Tonyââ¬â¢s Auto Services Inc. from 2010 June exam 11 Some multiple choice tipsâ⬠¦ â⬠¢ When answering a true and false question on the Exam simply break down complex sentences into smaller phrases. Each phrase has to be true or the entire sentence is false. â⬠¢ And, for multiple choice questions try to answer the question before looking at the answer choices. Remember that a perfect answer may not be given as a choice. Choose the best answer. ââ¬â Source Certified Fraud Examiners (CFE) Exam Coach. 12 Strategic Alignment â⬠¢ Look for IT Strategy to support Business strategy. â⬠¢ IT to differentiate from competition â⬠¢ IT to reduce costs â⬠¢ IT to bring business ââ¬Å"Quick to marketâ⬠â⬠¢ IT to create new markets / products â⬠¢ IT to tie suppliers and customers 13 Porterââ¬â¢s five forces â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ threat of new entrants bargaining power of customers bargaining power of suppliers threat of substitute products or services rivalry among existing competitors 14 Threat of New Entrants Mitigation Strategies: ââ¬â High entry cost. Equipment, buildings, infrastructure, etc. ââ¬â Mature Information Systems ââ¬â Expertise Knowledge ââ¬â Compete aggressively on Price ââ¬â Lock in partners for a competitive edge ââ¬â Brand recognition. Product Differentiation. ââ¬â Focus on a Market niche ââ¬â Operating Efficie ncies Pace of change ââ¬â IT 16 Mooreââ¬â¢s Law Metcalfeââ¬â¢s Law â⬠¢ â⬠¢ â⬠¢ â⬠¢ Dropping price of computer Storage Dropping cost of processing (ââ¬Å"mipsâ⬠) Double the power every 18 months Metcalfeââ¬â¢s Law ââ¬â The value of the network is the square of the sum of the nodes. Therefore stick with popular technology 17 Strategic Planning for IS â⬠¢ How is Planning done? ââ¬â Top Down / Strategic Analysis ââ¬â Bottom Up / Enterprise Analysis ââ¬â Scenario Planning / ââ¬Å"What ifââ¬â¢Ã¢â¬ Analysis â⬠¢ When is Planning done? ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â Short Term Long Term Mergers Acquistions Economic downturns As part of a Budgeting Exercise After a major disaster. 18 Planning Issues â⬠¢ â⬠¢ â⬠¢ â⬠¢ Scalability Capacity planning Standardization vs. differentiation Legacy systems ââ¬â Upgrade to new system or integrate with new technology but old core. 9 Total Cost of Ownership â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ Hardware Software Installation Training Support Ongoing Maintenance S/W Upgrades Infrastructure costs Data Backups, Business Continuity, Insurance Downtime Space, Energy, Security 20 Six IT Decisions ââ¬â IT should not make 1. 2. 3. 4. 5. 6. How much to spend Allocation amongst Business Processes Firm-wide IT capabilities How much IT Security Privacy issues Blame over failure 21 IT Governance 22 10. 3 OVERVIEW OF SYSTEMS DEVELOPMENT 23 Achieving Success in IS Projects â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ clearly defined goals excellent communication management involvement definitive timelines Project management skills S. M. A. R. T Objectives. Why do they Fail? â⬠¢ lack of understanding of the desired results (imprecise targets) â⬠¢ poor estimating techniques for budgeting and scheduling â⬠¢ small, unadjusted schedule slippage, which cumulatively results in a major delivery delay â⬠¢ lack of project management skills or leadership â⬠¢ poorly trained analysts and programmers â⬠¢ conflicting goals and objectives among the project team members and users use of inappropriate software or hardware tools 25 Make Vs. Buy ââ¬â Issues ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â Cost Specialized functionality Ability to integrate with other existing Systems Ability to change the s/w Maintenance / Service Contract Update / Upgrade Speed of delivery KNOWLEDGE ââ¬â Business vs. Industry vs. Functional Responsibility vs. Control vs. Risk Conversion 27 Parallel â⬠¢ Pros â⬠¢ â⬠¢ â⬠¢ â⬠¢ Least risk of not meeting objectives Compare results to ensure correctness Gentle weaning off of the ââ¬Ëoldââ¬â¢ system Resilient to errors. Cons â⬠¢ Duplication of effort â⬠¢ Requires additional computing resources â⬠¢ Not possible in every situation 28 Pilot â⬠¢ Pros ââ¬â ââ¬â ââ¬â ââ¬â Allows for a small, low risk, controlled test bed Allows for a Go-NoGo decision w/o large investment Limits disruption harm Helps overcome user resistance â⬠¢ Cons ââ¬â Still Costly to run 2 systems ââ¬â even if scaled down ââ¬â Results may not extrapolate to ââ¬Ëfull installââ¬â¢ ââ¬â Choice of Pilot site is critical 29 Phased â⬠¢ Pros ââ¬â ââ¬â ââ¬â Incremental approach with functional Phase-in Allows for Phased Systemsââ¬â¢ Development Allows time for orientation of the new technology Usually easier to manage the change â⬠¢ Cons ââ¬â Still running 2 systems, ââ¬â Longer disruption 30 Direct Cutover â⬠¢ Pros ââ¬â Quick ââ¬â Easy on resource utilization (only 1 system running) ââ¬â Low cost â⬠¢ Cons ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â ââ¬â Risky Requires full training preparation Requires ââ¬Ëall handsââ¬â¢ on deck for Implementation Causes spike in Help desk calls Cr eates disruption, uncertainty, confusion Errors can cause Business Loss / interruption 31 Internet as a business tool Advantages â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ Wider Market exposure New ways to communicate (text, voice, video) Economical (ISP, programming, Shipping) 24x7x365 Anywhere, Anytime Off loads work to the customer Convenient for the customer if well designed. Quick Easy to update / Change ââ¬â Real time Consistent Information / Prices 32 Internet as a business tool Disadvantages â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ Not everybody has access high speed Impersonal not so interactive No touch feel of the goods Replacement for good business practice? Lack of consumer trust Legal challenges Socio-economic factors (availability of access) Privacy Challenges Groupware Collaborative s/w â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ MS NetMeeting / Communicator / Remote PC support Rolling out s/w updates and self healing s/w IBM Lotus Notes Domino EMC Documentum Virtual Meeting, avatars , e-Rooms (SDLC Project Mgmt) Private Cloud computing ââ¬â ââ¬â ââ¬â ââ¬â VPN Storage space Applications Virtualization â⬠¢ Data Warehousing â⬠¢ Data Mining â⬠¢ Business Intelligence s/w Strategic use of the Internet â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ Cost Reduction Strategic Alliances Differentiation of products services Customer Loyalty (custom mass production) Value Chains To take advantage of Internet Technologies: ââ¬â Keep focused on Business Strategy (Internet doesnââ¬â¢t compensate for bad or missing strategy) ââ¬â Simplify Integrate your customer facing processes ââ¬â to enable self service ââ¬â Adhere to evolving IT standards Rationale for E-Business â⬠¢ Diminished Information Asymmetry â⬠¢ Richness vs. Reach â⬠¢ Reduced transaction costs Ways to Reduce Costs Customer Self serve ââ¬â Eliminate middle person ââ¬â Customer data entry ââ¬â Self research and reduced consultation time â⬠¢ â⬠¢ â⬠¢ â⬠¢ Reduced Staffing levels Reduced Re-work Streamlined communication Faster 37 Securing online transactions The key issues in a transaction processing environment are â⬠¢ identification (Who are you? ) â⬠¢ authentication (How can I be sure you are who you say you are? ) â⬠¢ authorization (What authority do you have to make whatever transaction you seek? ) â⬠¢ privacy (How can we be sure our transaction is private? â⬠¢ nonrepudiation (How can we each be assured that the other will not later deny the transaction? ). Benefits / Limitations of Networking â⬠¢ Sharing ââ¬â Printers, Drives, Scanners, etc â⬠¢ e-mail â ⬠¢ Centralized Administration ââ¬â Distribution of S/W, Policies, Patches, A/V ââ¬â Tracking, monitoring, Backing up data ââ¬â Remote repair Support â⬠¢ Groupware â⬠¢ Limitations ââ¬â Cost, Security, Vulnerability 39 Client ââ¬â Server Computing â⬠¢ Centralized Computing â⬠¢ Distributed Computing â⬠¢ Advantages ââ¬â Data Security Centralization ââ¬â Administration ââ¬â Off Loads processing to Clients Disadvantages ââ¬â extra complexity ââ¬â Cost 40 Advantages of Outsourcing â⬠¢ cost savings through economies of scale and scope â⬠¢ infusion of cash through liquidation of computer assets â⬠¢ facilitate transition of data centre from cost centre to profit/loss centre â⬠¢ ability to rapidly introduce new technology and access IT talent â⬠¢ Better Scalability â⬠¢ focus on core competencies â⬠¢ Allows an objective look at process improvement by O/S 41 Limitations of Outsourcing loss of direct mana gerial control â⬠¢ difficulty in reversing decision â⬠¢ outsourcerââ¬â¢s viability (financial strength, responsiveness, service, and so on) â⬠¢ dilutes the strength of in-house staff ââ¬â Unique, one of a kind application support? ââ¬â Will key staff stay permanent or be rotated? â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ vendor doesnââ¬â¢t know your business lack of flexibility untenable long-term contracts; fixed price versus service trade-off requires skills in partnership management strategic factors Privacy issues Monitoring / Managing Outsourcers 42 Risk Mitigation Strategies â⬠¢ Risk Assessment â⬠¢ Restrict Physical access Log all visitors ââ¬â in/out â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ â⬠¢ Cameras, Card Readers, Security Guards Alarms monitoring Intrusion Detection Systems (network) Firewalls Restricted Network access Policies, signoff, and Security Awareness training 43 Risk Mitigation Strategies Contâ⬠¦ â⬠¢ Authentication (know, have, and are) ââ¬â Password Strategies, Single Sign-on, Pass Phrase â⬠¢ Authorization (Open / need to know) â⬠¢ Access invocation / revocation procedures ââ¬â Hiring / Firing / Promotion â⬠¢ Segregation of Duties â⬠¢ Adequate Supervision Sign offs â⬠¢ Monitoring, Logging, Reporting, and Acting on Information. 44 Good Luck!! 45 How to cite Ms2 Course Review, Papers
Subscribe to:
Posts (Atom)