CHCPOL003 Research and apply evidence to practice Assignment

Assignment Help Computer Network Security
Reference no: EM133187398

CHCPOL003 Research and apply evidence to practice

Assessment: The objective of this assessment is to assess your knowledge and performance in establishing the information needed, gathering and critically analysing the information relevant to your own work.

Specific task instructions
The instructions and the criteria in the tasks and activities will be used by yourTeacher/Assessor to determine if you have satisfactorily completed this assessment event. Use these instructions as a guide to ensure you demonstrate the required knowledge and skills.

To complete this assessment,you must plan and write two literature reviews on topics related to health and human services. You must complete the three tasks for both topics:

Task 1: Plan and gather information on each topic
Task 2: Analyse and present findings on each topic.
Task 3: Provide a reference list of information sources, using the APA Referencing style.

Part 1: Research-based - Literature reviews

To complete this assessment students must select two of the following topics that are relevant to theirprofessional context and work practices:
• health informatics
• social determinants of health
• patient/person-centred care

For each topicstudents must then:
1. Gather at least three credible sources of information on the topic and explain how they did this by completing Task 1.
2. Analyse the information gathered and present their findings by completing Task 2.
3. Provide a reference list of the resources used, in the APA referencing style.

Topic 1
Task 1: Plan and gather information

Address each of the following criteria for the first topic. Each answer should be approximately 100 words. Ensure at least one of the information sources should be one you have found and is in addition to the list provided.
a) Introduce the topic you have chosen and identify how researching the literature in this area may support and improve your work practices.
b) Provide a clear statement defining the research objectives of your literature review.
c) Describe the methods you used to systematically gather information for your literature review and provide a rationale for why these were appropriate.
d) Describe at least three credible sources of data and information you accessed for your literature review- of which is one is a resource you have found.
e) Explain how you determined whether the information you gathered was relevant to your chosen topic and research objectives.
f) Describe how you organised the data and information you gathered in a way that helped you to use it in your literature review.
g) Describe how you prioritised which sources of data and information to discuss in your literature review.

Task 2: Analyse and present findings
Use the following headings to write a literature review that analyses three or more credible sources of information, and assesses how the findings might be applied in your professional context. Each answer should be approximately 100 words. In your literature review you must address each of the criteria.

a) Identify at least two current trends in this topic area and evaluate their relevance to your area of professional practice.
b) Compare and contrast the different sources of literature that you have accessed and comment on their merits in terms of their:
i. strength (the robustness of the studies)
ii. relevance to your professional context
iii. (statistical) reliability
iv. currency of the information.
c) Assess and discuss the feasibility of incorporating the findings of the research into your professional context, and any benefits or risk associated with this.
d) Identify areas of the research that warrant further investigation, either because of the limited scope of the research you have undertaken, or the limitations of the studies cited.
e) Provide a summary of your findings and conclusions based on the literature that you have reviewed.
f) Outline ways in which the information may be used, and recommend two actions based on your research findings and conclusions. These may be in relation to further research, or implementing the findings of the research, or both.
g) Outline how you will use the information and learnings from your research to make changes in your current work practices

Task 3: Referencing
Include a reference list using the APA style of referencing.

Topic 2
Task 1: Plan and gather information

Address each of the following criteria for the first topic. Each answer should be approximately 100 words. Ensure at least one of the information sources should be one you have found and is in addition to the list provided.
a) Introduce the topic you have chosen and identify how researching the literature in this area may support and improve your work practices.
b) Provide a clear statement defining the research objectives of your literature review.
c) Describe the methods you used to systematically gather information for your literature review and provide a rationale for why these were appropriate.
d) Describe at least three credible sources of data and information you accessed for your literature review- of which is one is a resource you have found.
e) Explain how you determined whether the information you gathered was relevant to your chosen topic and research objectives.
f) Describe how you organised the data and information you gathered in a way that helped you to use it in your literature review.
g) Describe how you prioritised which sources of data and information to discuss in your literature review.

Task 2: Analyse and present findings
Use the following headings to write a literature review that analyses three or more credible sources of information, and assesses how the findings might be applied in your professional context. Each answer should be approximately 100 words. In your literature review you must address each of the criteria.

a) Identify at least two current trends in this topic area and evaluate their relevance to your area of professional practice.
b) Compare and contrast the different sources of literature that you have accessed and comment on their merits in terms of their:
i. strength (the robustness of the studies)
ii. relevance to your professional context
iii. (statistical) reliability
iv. currency of the information.
c) Assess and discuss the feasibility of incorporating the findings of the research into your professional context, and any benefits or risk associated with this.
d) Identify areas of the research that warrant further investigation, either because of the limited scope of the research you have undertaken, or the limitations of the studies cited.
e) Provide a summary of your findings and conclusions based on the literature that you have reviewed.
f) Outline ways in which the information may be used, and recommend two actions based on your research findings and conclusions. These may be in relation to further research, or implementing the findings of the research, or both.
g) Outline how you will use the information and learnings from your research to make changes in your current work practices

Reference no: EM133187398

Questions Cloud

Monitoring and maintaining digital communications : Contribute to a plan for monitoring and maintaining digital communications
Is Milo Enterprise experiencing onerous type of contract : The aftermath of the election is seen to further bring in more uncertainties. Is Milo Enterprise experiencing "onerous" type of contract
What is the present value of your windfall : The prize will be awarded on your 100th birthday (assuming you're around to collect), 80 years from now. What is the present value of your windfall
What would be an employee net pay for the year : A federal income tax rate of 20% on all wages, what would be an employee's net pay for the year if he earned $230400 for the year
CHCPOL003 Research and apply evidence to practice Assignment : CHCPOL003 Research and apply evidence to practice Assignment Help and Solution - Describe the methods you used to systematically gather information
Quantitative analysis-what was the hardest to grasp : Review and reflect on what you learned in the past 8 weeks. What is the most practical and easily applied lesson you learned? What was the hardest to grasp?
What amount must the company borrow : Cocoa and Cookies Corporation has an agreement with its bank to maintain a cash balance of $25,000. What amount, if any, must the company borrow
How many units must be sold : The total fixed costs for the firm are $210,000. If the firm desires to earn a pretax income of $94,000, how many units must be sold
How much is he entitled to claim as a deduction : Assuming John does not qualify for the small business entities concessions of Subdiv 328-D ITAA97, how much is he entitled to claim as a deduction

Reviews

Write a Review

Computer Network Security Questions & Answers

  Define end-user access controls

Use the Web to conduct research on User Domain Security Policy and Access Management. Write a report which describes and differentiates the following: End-User Access Controls, Administrator Access Controls

  How would you train hhf employees to recognize malware

If HHF had a widespread infection of a new variant of the Blaster worm, how might you disinfect HHF?

  Explain how to identify the file headers

Compose a 2-3 page paper describing the procedures for retrieving the evidence with some of the forensic tools and hexadecimal editors.

  Describe the information stored in each log file

To ensure that Arif 's machine is free of rootkit programs which may alter the investigation results, he decides to run a thorough scan. Choose at least two programs and provide the screenshots of the scanning results.

  What are the components of cryptography

What are some of the documents or artifacts that are needed for ensuring that the implementation of cryptography is successful?

  Create a threat model for your own blog setup

Create a threat model for your own blog setup. Additionally, explain the purpose of building a threat model, and how it applies to this case.

  Define the it security framework

Identify and write policies and procedures on how to manage IT and Network Security - Prepare a project report which should include the policies and procedures

  Identify threats to private and public organizations

Define "cyber security," and identify threats to private and public organizations. Identify the pillars of personal security that assist in personal protection.

  Internet working equipment

Discuss and explain any of the internet working equipment that you have experience with and the advantages and disadvantages of them.

  Cyber crime research

Conduct an Internet search of cyber crimes. Find a cyber crime, a crime where a computer is used to commit a majority of the crime that has occurred in the last three months. Write a 1 ½ to 2 page synopsis of the crime, using APA style formatting.

  Analyze and discuss the vulnerabilities

Analyze and discuss the vulnerabilities and recommend what security management can do to minimize the potential of a government or private organization being at risk for cybersecurity damage

  What are guest-hopping attacks

Identify the security advantages of cloud-based solutions.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd