CHCPOL003 Research and apply evidence to practice Assignment

Assignment Help Computer Network Security
Reference no: EM133187404

CHCPOL003 Research and apply evidence to practice

Part 1: Research-based - Literature reviews

To complete this assessment students must select two of the following topics that are relevant to theirprofessional context and work practices:
• health informatics
• social determinants of health
• patient/person-centred care

For each topicstudents must then:
1. Gather at least three credible sources of information on the topic and explain how they did this by completing Task 1.
2. Analyse the information gathered and present their findings by completing Task 2.
3. Provide a reference list of the resources used, in the APA referencing style.

Topic 1
Task 1: Plan and gather information

Address each of the following criteria for the first topic. Each answer should be approximately 100 words. Ensure at least one of the information sources should be one you have found and is in addition to the list provided.
a) Introduce the topic you have chosen and identify how researching the literature in this area may support and improve your work practices.
b) Provide a clear statement defining the research objectives of your literature review.
c) Describe the methods you used to systematically gather information for your literature review and provide a rationale for why these were appropriate.
d) Describe at least three credible sources of data and information you accessed for your literature review- of which is one is a resource you have found.
e) Explain how you determined whether the information you gathered was relevant to your chosen topic and research objectives.
f) Describe how you organised the data and information you gathered in a way that helped you to use it in your literature review.
g) Describe how you prioritised which sources of data and information to discuss in your literature review.

Task 2: Analyse and present findings
Use the following headings to write a literature review that analyses three or more credible sources of information, and assesses how the findings might be applied in your professional context. Each answer should be approximately 100 words. In your literature review you must address each of the criteria.

a) Identify at least two current trends in this topic area and evaluate their relevance to your area of professional practice.
b) Compare and contrast the different sources of literature that you have accessed and comment on their merits in terms of their:
i. strength (the robustness of the studies)
ii. relevance to your professional context
iii. (statistical) reliability
iv. currency of the information.
c) Assess and discuss the feasibility of incorporating the findings of the research into your professional context, and any benefits or risk associated with this.
d) Identify areas of the research that warrant further investigation, either because of the limited scope of the research you have undertaken, or the limitations of the studies cited.
e) Provide a summary of your findings and conclusions based on the literature that you have reviewed.
f) Outline ways in which the information may be used, and recommend two actions based on your research findings and conclusions. These may be in relation to further research, or implementing the findings of the research, or both.
g) Outline how you will use the information and learnings from your research to make changes in your current work practices

Task 3: Referencing
Include a reference list using the APA style of referencing.

Reference no: EM133187404

Questions Cloud

What amount of manufacturing overhead would be allocated : The following information was gathered for the Snipes Corporation for the most recent year. What amount of manufacturing overhead would be allocated
Deliberate five dimensions of culture : Culture refers to the influence of religious, family, educational, and social systems on people, how they live their lives, and the choices they make.
Determining the marketing innovation : You are the Chief Marketing Officer of Future Com , a digital communications company that just invented FoldPro(FP) the first ever foldable phone . FP is consid
Determine the annual yield to the nearest hundredth : You purchase TEK stock for $15.53 per share. Dividends are $1.48 per share. Determine the annual yield to the nearest hundredth of a percent
CHCPOL003 Research and apply evidence to practice Assignment : CHCPOL003 Research and apply evidence to practice Assignment Help and Solution - Describe the methods you used to systematically gather information
Describe the organisation and department : Describe the organisation and department that you work for. Analyse a specific process to highlight two (2) or more problems that are concerning for your organi
Monitoring and maintaining digital communications : Contribute to a plan for monitoring and maintaining digital communications
Is Milo Enterprise experiencing onerous type of contract : The aftermath of the election is seen to further bring in more uncertainties. Is Milo Enterprise experiencing "onerous" type of contract
What is the present value of your windfall : The prize will be awarded on your 100th birthday (assuming you're around to collect), 80 years from now. What is the present value of your windfall

Reviews

Write a Review

Computer Network Security Questions & Answers

  Program to encrypt messages using the caesar cypher

The field of cryptography concerns methods for per-forming encryption, which takes a message, called the plaintext, and converts it into a scrambled message, called the ciphertext

  Description of the state-of-the-art in your technology

Description of the state-of-the-art in your technology, a discussion of where the sources that you read believe the technology is heading in the near future

  For a typical network environment

For a typical network environment (that includes an Internet-facing Website, a human resources database and application, and development workstations that contain copyrighted material), describe some typical devices or assets and vulnerabilities that..

  Prevent software upgrade problems

What precautions did the organizations in the case take to prevent software upgrade problems? To what extent do you believe those precautions helped?

  Case study - guest satisfaction and loyalty

Analyse the attached case study on "Guest Satisfaction and Loyalty with Great Wi-Fi for Luxury Hotel in Greece", to complete the assignment.

  How are students with exceptional needs

What is the impact of Common Core on education today? How are students with exceptional needs affected by this new initiative?

  Discuss the importance of network monitoring software

Discuss the importance of network monitoring software and Discuss how critical log management is in identifying security incidents

  Identify the virus software running on your computer

Identify the Virus Software running on your computer

  Prepare a paper on new approaches in cryptography

Prepare a paper on new approaches in cryptography - Cryptography of the Modern Era - This a 6-pages research paper, cite your sources and use apa citation

  What conclusions can you make after using the two methods

Compare and contrast the results from the two methods used to crack the accounts for the three passwords each encrypted by the two hash algorithms. What conclusions can you make after using these two methods?

  Below are the supply and demand schedules

Below are the supply and demand schedules for fresh coffee in Vancouver:

  What is the man-in-the-middle attack

What is the certificate? Please explain the meaning of CRL (certificate revocation list).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd