Premium Essay

Online Risk Assessment

In:

Submitted By jhayes228
Words 1113
Pages 5
Online Risk Assessment Analysis
John Hayes
University of Illinois at Chicago

Online Risk Assessment Analysis

Several models of health beliefs and behaviors have been developed to help determine whether an individual is likely to participate in disease prevention and health promotion activities. The purpose of the health assessment is to establish a database for the client’s normal abilities, risk factors that can contribute to dysfunction, and any current alterations in function (Pender, 2001). Of the two models, Health Belief Model and Health Promotion Model, the model that most reflect my belief is the Health Promotion Model. The Health Promotion Model is a way of thinking that revolve around the philosophy of promoting better health physically, emotionally, socially, spiritually, occupationally, environmentally and intellectually. Because I am aware of the relationship between lifestyle and illness, I strive to develop health-promoting habits, such as getting adequate exercise, rest, and relaxation, maintaining good nutrition and reducing stress to lead a better quality life. The following are the results of my health assessment.
Perceived benefits of action

* According to my health assessment, the data reflects that I have a sense of self-responsibility and personal accountability for my health. I have a tendency to be more engage in maintaining health-promoting behaviors, due to past experiences of poor health with family members. Much of my attitude and behavior is solidified, due to poor health choices that caused many uneventful and early deaths among the women in my family, including my mother. Cancers and diabetes run rampart in my family. Yet, because of my stance on health promotion, cancer and diabetes are not an issue with me. Another important note to consider is my commitment to exercise. I believe that weight is contributory to a host

Similar Documents

Premium Essay

Health and Safety in Health and Social Care

...Health and Safety in the health and social workplace Name: OLUWOLE. F. OMITOYIN Introduction: This essay intends to demonstrate a clear understanding of health and safety legislation and its implementation in health and social care settings. A review of systems, policies and procedures for communicating information in relation to legislations and individual responsibilities in term of managing health and safety will be considered. While safety priorities and how they are being implemented will be looked into. The use of information from care plan; the importance of risk assessment, the impact of policies on health care practices and how dilemma situation are managed and in addition consequences of non-compliance with law and regulation will be discussed. Lastly, the essay will critically look at how health and safety arrangement are monitored and review and also analyse the effectiveness of positive health and safety culture in health care organisation. In conclusion, my own contribution to health and safety needs will be discussed and recommendation made. Task 1: 1.1 According to oxford English dictionary (2014) “Policy is defined as a course or principle of action adopted or proposed by an organisation to direct and limit its action in pursuit of a long term goals,” examples smoking policy, manual handling policy. While a procedure on the other hand is an established or official ways of doing things or a series of actions conducted in a certain order or manner...

Words: 5662 - Pages: 23

Premium Essay

Sdsdsd

...factors of prevention and early detection at the forefront of its employee health rewards. Medtronic’s Total Health global employee wellness brand focused on investing in health rather than the cost of treatment and improving employee health through behaviour change. Seeing that the web was critical to delivery and collection of information in this environment it sought an online health and wellbeing platform with the capability to be deployed globally. The ability to monitor and measure health and wellbeing across the organisation was also vital in giving Medtronic key insight, through analytics, into the impact that employee health had on the business. Findings Implications… Initial health assessments conducted through the online platform have provided essential baseline data to understand overall global health trends as well as territory specific differences and priorities. Medtronic has been able to establish an average employee health score. Digging deeper it has noted priority health indicators for our global employees based on the number who are recorded to be ‘at risk’ in each case. Successful use of analytics and web based tools has helped Medtronic accelerate towards its vision of personalised, consistent wellbeing support for all employees. It now has greater insight into their health status to define the right strategy, and the tools to drive targeted initiatives where they are needed. We realised that people needed...

Words: 2713 - Pages: 11

Free Essay

Unit 3

...asleep and suffocateTry eating books | 11 | 35 | Make sure child doesn’t fall asleep sitting upDo not let children read books unsupervised | Taking children to toilets | Not cleaning child properlySlip on water | 32 | 34 | Making sure the child has been cleaned properly to prevent cross contaminationMake sure children are supervised | Playtime | Eat sand Weather | 23 | 43 | Make sure child is supervised at all timesMake sure child is correctly dressed at all times | P3: Carry out a risk assessment in a health or social care setting. M2: Assess the hazards identified in the health and social care setting. D1: Make recommendations in relation to the identified hazards to minimise the risks to the service user group. In this assignment I will be talking about the risk assessment that I carried out in a nursery. I will be talking about the risks that could take place and how likely it would be of the risk to take place, also I will be talking about the severity of the risk. A risk assessment is simply a careful examination of what, in your work, could cause harm to people, so that you can weigh up whether you have taken enough precautions or should do more to prevent harm. Workers and service users have the right to be protected from harm caused by a failure to take reasonable control measures (Hse.gov.uk, 2015). Drawing (Arts and Crafts) Sharp pencils - A child can poke their eyes with sharp pencils or another child’s eye with a sharp pencil, if they are having a...

Words: 2863 - Pages: 12

Premium Essay

Evaluating Comprehensive Approaches to Nursing Assessment for an Older Person with Multiple Health Problems

...A written assignment that evaluates comprehensive approaches to nursing assessment for an older person with multiple health problems. The account should reflect on how the multidisciplinary team and other agencies including the family, may contribute to these assessment approaches. Particular attention should be paid to national policies in this area and evidence of best practice. The patient that will be discussed within this assignment is a 70 year old male admitted to hospital following a stroke. Pressure ulcer risk assessments and nutritional risk assessments will be discussed within this assignment looking at how they are used in the assessment of an older people with multiple health problems. A stroke occurs when there has been a disturbance or cut off of blood flow within the brain, this disturbance damages or destroys brain cells preventing these cells from doing their job. Damage to the brain causes problems with bodily functions and can also affect mental processes (Stroke Association, 2010). A stroke can cause sudden weakness or paralysis which often only affects one side of the body and is one of the most common symptoms of a stroke. It can also cause swallowing difficulties (dysphagia), speech and language (dysphasia) can be affected also, patient may have difficulty in understanding and basic things such as reading and writing following stroke. Problems with eyesight, perception and interpretation, mental processes, bladder and bowels, mood swings, sensation and...

Words: 4850 - Pages: 20

Free Essay

Lego Case

...In this article we describe strategic risk management at the LEGO Group, which is based on an initiative started in late 2006 and led by Hans Læssøe, senior director of strategic risk management at LEGO System A/S. It’s also part of the continuing work of the Strategic Risk Management Lab at DePaul University, which is identifying and developing leading practices in integrating risk management with strategy development and strategy execution. The LEGO Group Strategy To understand strategic risk management at the LEGO Group, you need to understand the company’s strategy. This is consistent with the first step in developing strategic risk management in an organization: to understand the business strategy and the related risks as described in the Strategic Risk Assessment process (see Mark L. Frigo and Richard J. Anderson, “Strategic Risk Assessment,” Strategic Finance, December 2009). The LEGO Group’s mission is “Inspire and develop the builders of tomorrow.” Its vision is “Inventing the future of play.” To help accomplish them, the company uses a growth strategy and an innovation strategy. Growth Strategy: The LEGO Group has chosen a strategy that’s based on a number of growth drivers. One is to increase the market share in the United States.Many Americans may think they buy a lot of LEGO products, but they buy only about a third of what Germans buy, for example. Thus there are potential growth opportunities in the U.S. market. The LEGO Group also wants...

Words: 574 - Pages: 3

Premium Essay

Risk Management in Schools

...Managing Risks in Curriculum Activities Information Sheet Managing Risks in Curriculum Activities This document aims to assist staff undertake an effective risk assessment. The information presented here should be seen as the ‘minimum expected standard’ to manage risk, rather than the definitive list of requirements. All the information presented should be carefully considered in respect to specific context, such as: 1. Which students will be involved? (age, maturity, experience, specific needs, number) 2. What will students be doing? (jumping, swimming, cutting, cooking, throwing, etc) 3. What will students be using? (hazardous materials, sporting equipment, tools, stove, etc) 4. Where will students be? (classroom, outdoors, pool, creek, at height, etc) 5. Who will be leading the activity? (experience, qualifications, etc). THE RISK MANAGEMENT PROCESS The workplace health and safety risk management process involves the following steps: 1. Identify the potential hazards 2. Assess the risk 3. Decide on the control measures 4. Implement the control measures 5. Monitor and review. Ideally, this risk management process should be integrated into routine lesson planning. Risk assessments are best completed by more than one person thinking about the hazards and controls. Therefore, you are encouraged to involve those planning and delivering the activity in the risk assessment process...

Words: 1188 - Pages: 5

Premium Essay

Business at It's Best

...Management Fall 2009 Non-financial risk assessment in mergers, acquisitions and investments Identifying sources of business risk in the ICT industry Bachelors thesis Erik Allenstr¨m, 1984-11-26 o Fredrik Njurell, 1984-01-30 ¨ Tutor: Osten Ohlsson January 14, 2010 Abstract The number of company mergers and acquisition activities has increased dramatically the last two decades. The reasons for conducting these activities are many and the uncertainties of their results are high. To reduce the uncertainties when making an investment, merger or acquisition it is vital to do a thorough assessment of the risks involved with the activity. This thesis focuses on a specific part of this risk assessment, namely the non-financial risks. Mergers and acquisitions are done in almost all industries around the world and the reasons for and benefits of these activities can vary between industries. We have chosen to investigate the risk assessment of non-financial risks in the Information and Communication Technology (ICT) industry. The thesis aims at investigating what business characteristics, for companies in the ICT industry, that give rise to non-financial risks that must be assessed when doing investments, mergers or acquisitions. Further on we present a risk pattern that points out what business characteristics that are the most important when conducting a risk assessment of non-financial risks on companies in the ICT industry. From a literature study we find evidence that ten different...

Words: 24602 - Pages: 99

Premium Essay

Security Risk Assessment

...Executive summary The main purpose of a threat and risk assessment is to provide recommendations that maximize the protection of integrity, confidentiality and availability while still providing usability and functionality. Insider threat has become a serious information security issues within organizations. Best way to determine the answers to these questions a company or organization can perform a threat and risk assessment. This can be accomplished using either internal or external resources. It is quite important that the risk assessment should be a collaborative process. It is proven that involvement of the various organizational levels the assessment can lead to a ineffective and costly security measure. Introduction...

Words: 793 - Pages: 4

Free Essay

Mini Case 1 – Belmont State Bank

...Chapter 11: Mini Case 1 – Belmont State Bank At looking at this case it is clear that we need a secure network. Once major risk we need to ensure is the bank transaction are being transferred securely. Developing a secure network means developing controls that reduce or eliminate threats to the network. Here are some of the preventions we need to review when creating preventive measures to maintain compliance Compliance Methods - All virus definition and DAT file in the organization must be up to date by performing inventory of all employees machine by using a Tool such as SCCM to ensure all machine have the correct version. Push will be performed remotely to ensure all machine have the proper version. Wireless Access- In order to access wireless within the organization all employees will be required to have a SSL certificate to enable access to wireless network. Only authorized authentication will be permitted online Desktop Firewall- To assist in protecting again spywares or a predator using employees machines as a BOT employee must ensure their Desktop firewall are activated or a Group Policy (GPO) can be setup on the administrator side to ensure they are active and restrict any modification from users. All machines will have Desktop firewall enabled to reduce the risk of remote penetration to assist in avoiding Denial-of-Service (DoS) attacks. Router restriction- We need to implement Access Control List (ACL) in the router to control network traffic. The router...

Words: 525 - Pages: 3

Premium Essay

Enterprise Risk Management

...Enterprise Risk Management The Non-Linear Pro salesman told the manager of Quick Takes Video that the editing system leased would allow the employees to edit material twice as fast after only a day and a half of set up and training. After all employees received the one-day training course, completed the video tutorial, and read the manual, problems with the equipment stopped production of a Quick Takes Video project. During an attempt to insert a CD, an employee cut her finger on a sharp edge of the poorly designed equipment. Two different types of torts arose in the Product Liability Video. One type, an intentional tort occurred as a result of the implied warrantee when the salesman described the benefits of the editing system. The employee’s cut finger could result in an unintentional tort because the manufacturer has the requirement of selling a safe product but did not intend to harm the employee. The main tort violation from the video involves the implied warrantee given by the Non-Linear Pro salesman. The manager of Quick Takes Video perceived the quote taken from the video Cheeseman (2010), “Any of your editors, if they’re computer savvy, they’re going to pick this up in a day, day and a half tops” (video, 02:79), as an expressed warrantee. This perception persuaded the manager to lease the equipment. Team A used enterprise risk management (ERM) to analyze the business risk associated with the violation (Harb, 2008). Adequate Compliance Standards and Procedures...

Words: 1504 - Pages: 7

Premium Essay

Auditing Ethics Challenge

...A class website will be established and maintained throughout the course on Blackboard (go to http://www.unt.edu/ and click the link at the top for “Blackboard”). Course materials such as notes will be available on Blackboard. You are responsible for anything that I note through Blackboard emails and announcements. Course Description: Introduction to auditing and the professional responsibilities of a career in any specialty of the accounting profession. Topics include the legal and ethical responsibilities of accountants; professional auditing standards; the audit risk model; the acquisition, evaluation and documentation of audit evidence; reports on the results of the audit engagement. Learning Objectives: When you complete this course, you should:  Understand the audit process, including audit procedures, and audit reports  Understand the professional responsibilities of CPAs  Understand audit risk assessments and planning  Be able to research auditing standards  Be able to identify fraud red flags Methods of Instruction: Lecture, discussion, and application. Course...

Words: 1658 - Pages: 7

Premium Essay

Rik Management Audit

...Risk-Based IT Audit Risk-Based Audit Methodology Apply to Organization’s IT Risk Management Kun Tao (Quincy) Cal Poly Pomona Author Note This paper was prepared for GBA 577 Advanced IS Auditing, taught by Professor Manson. March 2014 Page 1 of 26 Risk-Based IT Audit Table of Contents Abstract .......................................................................................................................................... 3 Introduction .................................................................................................................................... 4 Methodology................................................................................................................................... 6 Risk-based auditing methodology: Risk assessment...................................................................... 6 IT Risk Management................................................................................................................... 7 IT Risk Control Framework........................................................................................................ 8 Identifying assets...................................................................................................................... 13 Determining criticality and confidentiality levels......................................................................14 Threat and vulnerability identification................................................................

Words: 6057 - Pages: 25

Premium Essay

New Heritage

...Risk considerations A major concern to be addressed in the New Heritage Doll case study is the risk, the two projects being evaluated having very different risk profiles. The strategy typically employed by New Heritage Company when assessing a projects’ risk is based on customer acceptance, technological uncertainty and high fixed costs. This note suggests an alternate strategy, trying to quantify the strategic growth potential for the New Heritage Doll Company of each project; therefore an integrated risk assessment approach based on both uncertainty and strategic and product positioning advantage delivered by each project will be used for project valuation. The “Match My Doll Clothing Line Expansion” project delivers an increment in the existing market segment by expanding the current warm weather clothing and accessories line, capitalizing on the popularity of the current offering and its premium pricing, having a similar risk profile as the current division business. The “Design Your Own Doll” project would deliver a “one-of-a-kind” doll ownership experience, and is expected to command the premium price associated with a custom doll. But more important, beside the new possibilities opened by the online customization of the dolls for expanding the current New Heritage market segment, the impact of the actual experience delivered by the girl interaction with the software while designing the doll should be further evaluated. This is a gaming-like experience that the project...

Words: 370 - Pages: 2

Free Essay

Manager

...Risk considerations A major concern to be addressed in the New Heritage Doll case study is the risk, the two projects being evaluated having very different risk profiles. The strategy typically employed by New Heritage Company when assessing a projects’ risk is based on customer acceptance, technological uncertainty and high fixed costs. This note suggests an alternate strategy, trying to quantify the strategic growth potential for the New Heritage Doll Company of each project; therefore an integrated risk assessment approach based on both uncertainty and strategic and product positioning advantage delivered by each project will be used for project valuation. The “Match My Doll Clothing Line Expansion” project delivers an increment in the existing market segment by expanding the current warm weather clothing and accessories line, capitalizing on the popularity of the current offering and its premium pricing, having a similar risk profile as the current division business. The “Design Your Own Doll” project would deliver a “one-of-a-kind” doll ownership experience, and is expected to command the premium price associated with a custom doll. But more important, beside the new possibilities opened by the online customization of the dolls for expanding the current New Heritage market segment, the impact of the actual experience delivered by the girl interaction with the software while designing the doll should be further evaluated. This is a gaming-like experience that the project...

Words: 308 - Pages: 2

Free Essay

Week 4 Assignment 2: Organizational Risk Appetite and Risk Assessment

...Week 4 Assignment 2: Organizational Risk Appetite and Risk Assessment Abstract This report will touch on what is needed to prepare in case of untimely disaster and what should be done when the worse has happen and you need to recover. We will take a look at what the business impact analysis look like and the company risk assessment for our company and look for risk that can be handled and risk the most be avoided and try to come up with a plans and policies for how to handle all future risks and problems. ”Business Impact Analysis (BIA) determines the importance of the organization’s activities by assessing the impact over time, if they are interrupted, and establishes continuity and recovery objectives”. (Engemann & Henderson, 2012) When looking to make a Business Impact Analysis we need to talk a look at all the resources of our company and what they do for the company. Then we figure what each piece need in the event of a crisis and how long and how much money it will take to get back on line so let take a look at the most valuable piece of equipment and work our way to the most expandable piece of equipment. The first and most important is the 3 file servers which is the central storage and the managing of data files to the company. These servers house not only private information on the company but also customer information. This means if they are damage or found missing work is loss and vital customer data is either gone or in a worse case stolen. This...

Words: 2047 - Pages: 9