Premium Essay

Missions and Domains

In: Religion Topics

Submitted By lisawaite
Words 621
Pages 3
There are many comparisons between Grand Canyon University’s (GCU) Mission and Domains, the College of Nursing’s (CON) Mission and Program Competencies and the American Association of Colleges of Nursing's (AACN) Essentials for Master's Education for Advanced Practice Nursing, similar components are discussed below.
Mission
GCU mission is to prepare student learners to become global citizens recognizing differences in cultures, living values and having the ability to give care nonjudgmentally, to be critical thinkers, effective communicators, and responsible leaders by providing an academically challenging, value-based curricular framework of Christian culture (GCU, 2014). The College of Nursing and Health Care Professions faculty believes in educating nurses within a dedicated and supportive community of Christian values and a holistic patient centered approach.
The American Association of Colleges of Nursing has the same mission in the form of research, policy, organization, finance, ethics, and professional development with nursing practice in human diversity, social issues, and health promotion and disease prevention by implementing a comprehensive holistic care model. (AACN, 2011).
Curriculum
GCU uses a challenging curriculum to prepare learners with the knowledge and skills needed in the current career arena by pushing learners to utilize and maximize personal intellectual motivational tools. GCU offers flexibility to students from various backgrounds, situations and workforce necessities and has created the best learning modality for their needs based on requirements of accrediting committees. Many would not have the opportunity to advance their educational cravings and professional status if there was not diversity in the educational delivery. GCU offers complete online participation in addition to campus learning environment and individualized...

Similar Documents

Premium Essay

What Comparisons Can Be Found Between the Gcu Mission and Domains/Con Mission and Program Competencies (for Your Selected Specialty Track, Links Located in the Course Materials) with the Aacn's Essentials for Master's

...| Admission Essay to University of Miami Elizabeth Akande | | | My name is Elizabeth Akande and I am seeking for an admission into the Master’s degree program at University of Miami (UM) at the School of Nursing. I have always believed in giving back to the community and in sharing my competencies and skills with others. My desire to help people in the field of nursing has powered my decision to take up a graduate degree in Nursing. Overcoming the many challenges in my life has helped me to believe that I can reach any goal I have set for myself, and one of these lifelong goals is to become a nurse practitioner and to obtain my graduate diploma from a respectable institution. I have had my fair share of obstacles and trials, and if not for the generosity and kindness of others and of the Almighty God, I may not have gone this far in my journey. My life has been one great challenge, but the trials that I have faced did not discourage me from my goals. Taking care of my family, working full time, and looking after my two elderly parents may not be the picture of a perfect life, but I have managed to make the best use of my time and my resources, to give equal attention to the people I love as well as the career that I have chosen for myself. My father has had spinal stenosis for 16 years now and is currently living with me. My mother, who is now 73 years old,......

Words: 643 - Pages: 3

Free Essay

Carrers

...The United States Air Force Blueprint for Cyberspace November 2, 2009 Foreword Cyberspace is a critical global domain, in which the USAF will conduct integrated operations in support of Joint Force Commanders’ needs. The United States is not alone in recognizing the asymmetrical advantages of this domain. Potential adversaries worldwide are rapidly improving or pursuing their own cyber capabilities. Attempts to disrupt or penetrate our networks are relentless. The blueprint that follows provides a framework to meet these challenges by evolving our culture and improving our capabilities. Air Force Space Command as the lead USAF Major Command (MAJCOM) for cyberspace will execute this blueprint as a unified effort--working closely within the Air Force, and with sister services, combatant commands, Joint Staff and other partners to fully provide the necessary capabilities for the future. C....

Words: 4766 - Pages: 20

Premium Essay

Security Domains and Strategies Project

...WAN Domain: The...

Words: 574 - Pages: 3

Premium Essay

Nt2580- Project Part 1

...User Domain a. This Domain includes Individuals within an organization who access its information. b. An acceptable use policy to define what users can and cannot do with company IT information will be created. c. Managers should review security awareness training and review acceptable use policies with employees periodically. d. Internal CD drives and USB ports will be disabled. e. Content filtering and antivirus scanning on any downloaded media, and emails will be setup. f. Restrict access for users to only applications, data and systems needed to perform their job. g. Monitor and track employee behavior and their use of IT infrastructure during off hours. 2. Workstation Domain a. Systems where most users connect to the IT infrastructure. i. Workstations can be any desktop, laptop, or other device that connects to an organizations network. b. Password protection on all workstations. c. Auto screen lockout for inactive times. d. Strict access control procedures, standards, policies, and guidelines. e. All CD, DVD, and USB ports will be disabled. f. Automated antivirus solution that updates and scans each workstation automatically. g. Vulnerability policies for workstation operating systems and application software 3. LAN Domain a. LAN domain includes both Logical configuration and physical network components. b. Wiring closets, data centers, and computer rooms need to be secured. c. Strict access control procedures, standards,...

Words: 779 - Pages: 4

Premium Essay

Squad Training Management Practical Exercise

...– What the mission will be? • Core METLs or CMETLs Slide 4 Change in Mindset • Step one – Cdr to Cdr dialog to discuss: – Training condition & corresponding – – – resources Proportion of efforts (Offense, defense, stability, and civil support) Risk to readiness Training focus to prepare for directed mission Slide 5 Change in Mindset (cont) • Step two - Training briefing during which the senior commander enters into a “contract” with subordinate commanders addressing: – Task to be trained – Training conditions – Risk associated with training – Resource requirements Slide 6 Stability Tasks • Provide essential services and support • Sustaining proficiency in offensive and defensive operations • Collecting accurate bottom-up intelligence • Receiving and acting on top-down intelligence at the tactical level Slide 7 Unit Training Conditions • Realistically replicate the projected operational environment • OPFOR conditions should incorporate – Cultures – Languages – key leaders in the projected AO...

Words: 1148 - Pages: 5

Premium Essay

Comparison of Gcu & Aacn

...What comparisons can be found between the GCU Mission and Domains/CON Mission and Program Competencies (for your selected specialty track, links located in the Course Materials) with the AACN's Essentials for Master's Education for Advanced Practice Nursing (link located in the Week 1 Topic Materials)? Explain your rational....

Words: 641 - Pages: 3

Premium Essay

Risk Management

...In this presented research work, we have customized the Risk Management ECSS standard, for the specific characteristics and constraints of the remote sensing satellite mission project of the Pakistan Space Agency (SUPARCO). After a brief back ground and theory of the risk management domain, the implementation plan/system of the risk management procedures for the Pakistan Space Agency’s remote sensing satellite, are presented; a system is developed for the risk identification, analysis, control and...

Words: 3140 - Pages: 13

Premium Essay

Nt2580 Projectparti

...The purpose of this of this outline is to provide necessary information for the Networking Division Monthly Report, aimed at addressing security concerns for the seven domains of IT infrastructure for Richmond Investments. Beginning with the User Domain, the first and most important step to be taken is education of all employees on the Policies and Procedures that are already in place. It is recommended that monthly training take place and be documented. There should also be monthly auditing, to ensure that the training is taking place, who is participating, and that report should be seen by upper management. The Users should be aware of the consequences of violations of the security policy, and they should expect and anticipate that there will be random and routine monitoring of their actions. Actions to protect the Workstation Domain is also a critical link, since most of the issues can originate from this location. Strict access privilege should be implemented and enforced. The use of protective programs, such as malware and virus detection and eradication is paramount. Very stringent control should be placed upon what the Users can or cannot insert into the workstations is a key safeguard, via media ports, such as thumb drives, CDs, or any...

Words: 796 - Pages: 4

Premium Essay

Richman

...o LAN-to-WAN Domain • Apply strict security monitoring controls for intrusion detection and prevention. Monitor for inbound IP traffic anomalies and malicious-intent traffic. Block...

Words: 651 - Pages: 3

Premium Essay

Information Security

...The User Domain defines the people who access an organization’s information system. Users can access systems, applications, and data depending upon their defined access rights. In this domain is where you will find an acceptable use policy (AUP), which defines what users are allowed to do with organization-owned IT assets. It’s like a rule book that employees must follow....

Words: 1445 - Pages: 6

Premium Essay

Multi-Layered Security Outline Plan

...USER DOMAIN Risk Threats and Vulnerabilities Security measures and controls Lack of user awareness, Security Policy Violations, user destruction of Systems Applications and Data Conduct security awareness training, post Security posters, send monthly security email reminders to all employees, implement Acceptable Use...

Words: 751 - Pages: 4

Premium Essay

Client

...In the report, mission statement, the risk management, other process and the evaluation will be changed. According to the change model, the event management can be improve than the previous. Content Executive summary 3 1.Introduction 5 1.1 Project Management 6 2. Team building 6 2.1 Integration 8 3. Defining the event 8 3.1 Brief and Expectation 9 3.2 Core Value(Embok) 9 3.3 Mission Statement (EPARS) 10 4. Project Definition 11 4.1 Aims and Objectives 11 4.2 SMART analysis 12 4.3 Secondary research 13 4.4 Primary Research 15 5. Planning 16 5.1 Stakeholder Analysis 16 5.2 Scope of work 18 5.2.1 EPARS Scope Management 18 5.2.2 Scope of work(Project management cascade) 19 5.2.3 Maylor’s Four-phase Approach 20 5.3 Feasibilities 20 5.4 Strategic Planning 21 5.4.1 PESTLE 21 5.4.2 SWOT analysis 22 5.6 Work Breakdown Structure 23 5.6.1 What is the WBS? (EMBOK) 23 5.6.2 Domains 23 5.6.3 WBS vs. Domains 24 5.6.4 Administration 25 5.6.5 Design 25 5.6.6 Risk 26 5.6.7 Operations 28 5.7 Responsibility 29 5.8 Other Management Process 29 5.8.1 PDCA cycle(1950) 29 5.8.2 Kolb's Learning Cycle(1984) 30 5.8.3 EMBOK process 30 6. Evaluation 31 7.Conclusion 31 Reference 32 Appendix 37 Appendix 1 37 1.Introduction The International Fashion Show(IFS) will be a held by the International Office at the Quayside at 18:00 on...

Words: 8038 - Pages: 33

Free Essay

Security Systems Project 1

...* Remote Access Domain- connects remote users to your domain. * To stop brute-force and user ID and password attacks you must establish a strong password policy. Passwords should be changed every 30 to 60 days and must be at least eight characters long. * System/Application Domain- holds all the mission-critical systems, applications and data. * I f your private data is compromised separate private data elements...

Words: 299 - Pages: 2

Free Essay

Entrepreneurial Vision

...Entrepreneurial Vision-is a picture of the new world he or she wishes to create. * Picture into which the entrepreneur fits an understanding of why people will be better off, the source of the new value that will be created, and the relationship that will exist. Vision-is a mental image in that it is something the entrepreneur carries around in their head. * It is a very powerful tool for the management of the venture. * It provides a sense of direction by being the light at the end of the tunnel. * It helps the entrepreneur to define his or her goals. * It provides the entrepreneur with a sense of warmth and encouragement when the going gets tough. * It guides the generation of strategy for the venture. * It gives the venture a moral content and helps define social responsibilities. * It can be used to communicate what the entrepreneur wishes to achieve to other people. * It can be used to attract people to the venture and motivate them to support it. * It plays a crucial role in supporting the entrepreneur’s communication and leadership strategy. Communicating and Sharing Vision-the first stage must be to understand why other people will find the vision attractive. Approaches to Communicating Vision 1. I have a Dream-entrepreneurs are explicit about their vision. * They describe the better world just as they see. 2. Talking Specific Goals-entrepreneurs can break down their vision into a specific goals relating....

Words: 1653 - Pages: 7

Premium Essay

Project 1

...User domain: * Made up of typical IT users and the hardware, software, and data they use. The user domain is the weakest link in an IT infrastructure. Conduct annual security awareness training, implement acceptable use policy, update staff manual and handbook, discuss during performance reviews. 2. Workstation domain: * Roles, tasks, responsibilities and accountability come into play in the workstation domain. Enabling password protection on workstation for access. Enable auto screen lockout for inactive times. 3. LAN domain: * Small network organized by function or department, allowing access to all resources on the LANs. Using NIC cards, Ethernet LAN, LAN switch, UTP cabling are just some ways in connecting to a network. Implementing LAN server and configuration standards procedures and guideline can help a lot in security. 4. LAN-to-WAN domain: * The point at which the IT infrastructure joins a WAN and the Internet.LAN to WAN use different protocols for data transfer. Some are HTTP, FTP, TFTP, Telnet and SSH. A complete list of well know ports numbers from 0 to 1023 is maintained by IANA. Applying file transfer monitoring, scanning and alarming for unknown file types from unknown sources would be a form of security. 5. WAN domain: * The point at which the WAN connects to other WANs via the Internet. What goes on with the WAN domain goes through IP firewalls, IP routers, VPNs, MPLS and more....

Words: 366 - Pages: 2