Premium Essay

Missions and Domains

In: Religion Topics

Submitted By lisawaite
Words 621
Pages 3
There are many comparisons between Grand Canyon University’s (GCU) Mission and Domains, the College of Nursing’s (CON) Mission and Program Competencies and the American Association of Colleges of Nursing's (AACN) Essentials for Master's Education for Advanced Practice Nursing, similar components are discussed below.
GCU mission is to prepare student learners to become global citizens recognizing differences in cultures, living values and having the ability to give care nonjudgmentally, to be critical thinkers, effective communicators, and responsible leaders by providing an academically challenging, value-based curricular framework of Christian culture (GCU, 2014). The College of Nursing and Health Care Professions faculty believes in educating nurses within a dedicated and supportive community of Christian values and a holistic patient centered approach.
The American Association of Colleges of Nursing has the same mission in the form of research, policy, organization, finance, ethics, and professional development with nursing practice in human diversity, social issues, and health promotion and disease prevention by implementing a comprehensive holistic care model. (AACN, 2011).
GCU uses a challenging curriculum to prepare learners with the knowledge and skills needed in the current career arena by pushing learners to utilize and maximize personal intellectual motivational tools. GCU offers flexibility to students from various backgrounds, situations and workforce necessities and has created the best learning modality for their needs based on requirements of accrediting committees. Many would not have the opportunity to advance their educational cravings and professional status if there was not diversity in the educational delivery. GCU offers complete online participation in addition to campus learning environment and individualized...

Similar Documents

Premium Essay

What Comparisons Can Be Found Between the Gcu Mission and Domains/Con Mission and Program Competencies (for Your Selected Specialty Track, Links Located in the Course Materials) with the Aacn's Essentials for Master's

...| Admission Essay to University of Miami Elizabeth Akande | | | My name is Elizabeth Akande and I am seeking for an admission into the Master’s degree program at University of Miami (UM) at the School of Nursing. I have always believed in giving back to the community and in sharing my competencies and skills with others. My desire to help people in the field of nursing has powered my decision to take up a graduate degree in Nursing. Overcoming the many challenges in my life has helped me to believe that I can reach any goal I have set for myself, and one of these lifelong goals is to become a nurse practitioner and to obtain my graduate diploma from a respectable institution. I have had my fair share of obstacles and trials, and if not for the generosity and kindness of others and of the Almighty God, I may not have gone this far in my journey. My life has been one great challenge, but the trials that I have faced did not discourage me from my goals. Taking care of my family, working full time, and looking after my two elderly parents may not be the picture of a perfect life, but I have managed to make the best use of my time and my resources, to give equal attention to the people I love as well as the career that I have chosen for myself. My father has had spinal stenosis for 16 years now and is currently living with me. My mother, who is now 73 years old,......

Words: 643 - Pages: 3

Free Essay


...The United States Air Force Blueprint for Cyberspace November 2, 2009 Foreword Cyberspace is a critical global domain, in which the USAF will conduct integrated operations in support of Joint Force Commanders’ needs. The United States is not alone in recognizing the asymmetrical advantages of this domain. Potential adversaries worldwide are rapidly improving or pursuing their own cyber capabilities. Attempts to disrupt or penetrate our networks are relentless. The blueprint that follows provides a framework to meet these challenges by evolving our culture and improving our capabilities. Air Force Space Command as the lead USAF Major Command (MAJCOM) for cyberspace will execute this blueprint as a unified effort--working closely within the Air Force, and with sister services, combatant commands, Joint Staff and other partners to fully provide the necessary capabilities for the future. C. ROBERT KEHLER General, USAF Commander, AFSPC 2 November 2009 Table of Changes Date 17 Mar 2010 No. 1 Page 13 Description Reference to Minuteman crossed out in Objective 5 Table of Contents Purpose .................................................................................................... 1 Current Situation ................................................................................. 2 Presidential Guidance ........................................................................ 2 Joint Guidance ....................................................................

Words: 4766 - Pages: 20

Premium Essay

Security Domains and Strategies Project

...User Domain: The first layer of security in a multi-layer security plan. It’s also the weakest in the IT Infrastructure. Certain protocols and procedures need to be followed. • Implement and Conduct Security Awareness Training. • Implement Acceptable Use Policy (AUP). • Monitor employee behaviors. • Restrict access to users to certain programs and areas. Workstation Domain: The second layer of security in a MLS plan. This is where most users connect via Workstation computers, PDA’s, Laptops and smartphones. • Admins create a strong password policy, by making a minimum amount of characters with capitalization and numbers • Enable Up to date anti-virus programs. • Implement a mandated Employee Security Awareness Training. • Limit access to company approved devices only. • Disable CD drives and USB ports. LAN Domain: The third layer of security in the MLS plan. This is the collection of computers in an area to one another or to a common connection medium. To prevent the unauthorized access, recommend implementing the following: • Physically secure the wiring closets and data centers. • Implement encryption procedures. • Implement strict access policies and second-level authentication. • Implement WLAN network keys that require a password for wireless access. • Implement LAN server and configuration standards, procedures, and guidelines. LAN-to-WAN Domain: The fourth layer in the MLS plan. This is where the IT infrastructure is linked to a wide area network and......

Words: 574 - Pages: 3

Premium Essay

Planetree Model

...assistance and has shown to reduce stress. With this model in mind we are able to apply the (PFCC) tool to NCCH and NCCC. The overall assessment of this Hospital with a large focus placed specifically on the NCCC, found that the NCCC scored threes, fours, and fives on a number of areas that included leadership, Mission and Values, Environment Design, Diversity, and Care Support, these domains will be discussed in this area of the paper. Other areas did not score...

Words: 509 - Pages: 3

Premium Essay

Nt2580- Project Part 1

...month by the networking division, to senior management along with a security plan for the month. 1. User Domain a. This Domain includes Individuals within an organization who access its information. b. An acceptable use policy to define what users can and cannot do with company IT information will be created. c. Managers should review security awareness training and review acceptable use policies with employees periodically. d. Internal CD drives and USB ports will be disabled. e. Content filtering and antivirus scanning on any downloaded media, and emails will be setup. f. Restrict access for users to only applications, data and systems needed to perform their job. g. Monitor and track employee behavior and their use of IT infrastructure during off hours. 2. Workstation Domain a. Systems where most users connect to the IT infrastructure. i. Workstations can be any desktop, laptop, or other device that connects to an organizations network. b. Password protection on all workstations. c. Auto screen lockout for inactive times. d. Strict access control procedures, standards, policies, and guidelines. e. All CD, DVD, and USB ports will be disabled. f. Automated antivirus solution that updates and scans each workstation automatically. g. Vulnerability policies for workstation operating systems and application software 3. LAN Domain a. LAN domain includes both Logical configuration and physical network components. b. Wiring closets, data centers, and......

Words: 779 - Pages: 4

Premium Essay

Squad Training Management Practical Exercise

...keystone doctrine for training • Field Manuel (FM) 7-1 Battle Focused Training (RESCINDED 1 JUL 09) Slide 2 The Role of Training SPECTRUM SPECTRUM OF CONFLICT Increasing Violence Stable Peace Unstable Peace General War Insurgency OPERATIONAL THEMES FULL SPECTRUM OPERATIONS Offense Offense Stability Stability Defense Defense Offense Stability Defense Offense Stability Defense Aim point for Army training and leader development Slide 3 Meeting the Challenges • Challenges: – Where Army forces will operate? – What the mission will be? • Core METLs or CMETLs Slide 4 Change in Mindset • Step one – Cdr to Cdr dialog to discuss: – Training condition & corresponding – – – resources Proportion of efforts (Offense, defense, stability, and civil support) Risk to readiness Training focus to prepare for directed mission Slide 5 Change in Mindset (cont) • Step two - Training briefing during which the senior commander enters into a “contract” with subordinate commanders addressing: – Task to be trained – Training conditions – Risk associated with training – Resource requirements Slide 6 Stability Tasks • Provide essential services and support • Sustaining proficiency in offensive and defensive operations • Collecting accurate bottom-up intelligence • Receiving and acting on top-down intelligence at the tactical level Slide 7 Unit Training Conditions •......

Words: 1148 - Pages: 5

Premium Essay

Comparison of Gcu & Aacn

...What comparisons can be found between the GCU Mission and Domains/CON Mission and Program Competencies (for your selected specialty track, links located in the Course Materials) with the AACN's Essentials for Master's Education for Advanced Practice Nursing (link located in the Week 1 Topic Materials)? Explain your rational. As for me, the Comparisons that can be found between the Grand Canyon University (GCU) Mission and Domains/College of Nursing (CON) Mission and Program Competencies with the American Association of Colleges of Nursing’s (AACN) Essentials for Master Education for Advance Practice Nursing are as follows: First, Grand Canyon University mission and domains prepares the students to become global citizens, critical thinkers, effective communicators, and responsible leaders by providing an academically challenging, values-based curriculum from the context of Christian heritage (, whereas with the American Association of Colleges of Nursing’s (AACN) Essentials for Master’s Education for Advance Practice Nursing focus predominantly on the education of nurses for advanced practice nursing in direct care roles which comprises two elements, Master’s Education: Societal Role , which is practice oriented with a goal that professional s develop advanced skills and knowledge for their professional roles and those......

Words: 641 - Pages: 3

Premium Essay

Risk Management

...+922135293208 1 2 3 Abstract— It is a very well established and understood aspect, that to be successful in a mission/project, the executing organization must be dedicated to deal with the management of the risks, proactively and constantly, during all the phases of the project/ mission. In fact the mission risks have their origins in the unpredictability factor that is there in all the missions; whereas the major aims of the risk management strategy are to maximize the likelihood and consequence of the constructive actions, and minimize the possibility and consequence of the actions undesirable to the mission. The Cooperation European for Space Standardization (ECSS), Management of Risks standard provides a state of the art model for integrated risk management, in space related projects; describing the principles and requirements, to enforce a mission-incorporated, management of risks policy, undertaken by the mission stakeholders. In this presented research work, we have customized the Risk Management ECSS standard, for the specific characteristics and constraints of the remote sensing satellite mission project of the Pakistan Space Agency (SUPARCO). After a brief back ground and theory of the risk management domain, the implementation plan/system of the risk management procedures for the Pakistan Space Agency’s remote sensing satellite, are presented; a system is developed for the......

Words: 3140 - Pages: 13

Premium Essay

Nt2580 Projectparti

...of emerging technologies, to be able to make recommendations to upper management. The sophistication and organization of those intent on breaching systems of today has never been greater, and they will only get better as time goes on. The purpose of this of this outline is to provide necessary information for the Networking Division Monthly Report, aimed at addressing security concerns for the seven domains of IT infrastructure for Richmond Investments. Beginning with the User Domain, the first and most important step to be taken is education of all employees on the Policies and Procedures that are already in place. It is recommended that monthly training take place and be documented. There should also be monthly auditing, to ensure that the training is taking place, who is participating, and that report should be seen by upper management. The Users should be aware of the consequences of violations of the security policy, and they should expect and anticipate that there will be random and routine monitoring of their actions. Actions to protect the Workstation Domain is also a critical link, since most of the issues can originate from this location. Strict access privilege should be implemented and enforced. The use of protective programs, such as malware and virus detection and eradication is paramount. Very stringent control should be placed upon what the Users can or cannot insert into the workstations is a key safeguard, via media ports, such as thumb drives,...

Words: 796 - Pages: 4

Premium Essay


...o User Domain • Conduct security awareness training, insert reminders in banner greetings, and send e-mail reminders to employees. • Enable automatic antivirus scans for inserted media drives, files, and e-mail attachments. Set up antivirus scanning for e-mails with attachments. • Enable content filtering and antivirus scanning for e-mail attachments. Content filtering network devices are configured to permit or deny specific domain names in accordance with AUP definition. • Track and monitor abnormal employee behavior and use of IT infrastructure during off-hours. • Enable intrusion detection system/intrusion prevention system (IDS/IPS) monitoring for sensitive employee position and access. Alarms and alerts programmed within an IDS/IPS help identify abnormal traffic and can block IP traffic as per policy definition. o Workstation Domain • Enable password protection on workstations for access, Enable auto screen lockout for inactive times. • Define workstation operating system vulnerability window policy definition. A vulnerability window is the gap in time that you leave a computer unpatched with a security update. • Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. o LAN Domain • Make sure wiring closets, data centers, and computer rooms are secure. Do not allow anyone access without proper ID. • Define a strict software vulnerability window......

Words: 651 - Pages: 3

Premium Essay

Multi-Layered Security Outline Plan

...(OUTLINE) FOR RICHMAN INVESTMEN The following Multi-Layered Security Plan outline I am submitting for approval and implementation for Richman Investments, will provide a sound security plan for the firms most important mission critical assets, identifying and reducing vulnerabilities, Risks and threats to the firms confidential proprietary intelligence, sensitive customer data and other important assets within each of the Seven Domains that make up the core for the IT infrastructure as a whole. An aggressive approach should be mapped out in a 3-5 year progressive implementation achievement plan starting with one or two security initiatives where success can be clearly demonstrated and evaluated. The FFIEC now has mandated financial institutions mitigate online threats by intergrading endpoint encryption pushing it out to all users in a non pre-boot fashion then using the console to migrate users to pre-boot encryption which would provide immediate protection and increased visibility and control of our overall risk posture. First, indentifying Risk, Threat and Vulnerabilities within each of the seven Domains that make-up the firms IT infrastructure. Secondly, proposed security measures and controls for headquarters and each branch office. USER DOMAIN Risk Threats and Vulnerabilities Security measures and controls Lack of user awareness, Security Policy Violations, user destruction of Systems Applications and Data Conduct security awareness training, post......

Words: 751 - Pages: 4

Premium Essay

Information Security

...threats that may bypass one level are dealt with at another. In addition, layering security helps mitigate the risk of an employee who disables protection on his or her desktop. The gateway serves as an entry and exit point to the company network. By installing a security solution such as antivirus and content filtering at this tier, mass-mailer worms are scanned and deleted and spam is moved to quarantines. Mail servers should also be equipped with security. These systems receive, send, and store email, and an email security solution work together with the email program to provide a greater degree of protection against malicious code. The User Domain defines the people who access an organization’s information system. Users can access systems, applications, and data depending upon their defined access rights. In this domain is where you will find an acceptable use policy (AUP), which defines what users are allowed to do with organization-owned IT assets. It’s like a rule book that employees must follow....

Words: 1445 - Pages: 6

Premium Essay

Transformational Leadership Paper

...These leaders can command troops as large as 300,000 or are responsible for billion dollar budgets, war fighting, or peacekeeping missions. Transformational leadership can be a focus on this level due to the need to the complexity and nature of goal attainment from a diverse range of objectives. The very nature of war itself lends to the question of how organizational change takes place in the military organization and how military leaders create a shared...

Words: 2766 - Pages: 12

Premium Essay


...model what more fit for the event in the end. The event can be described as a success, project management model to consider for event delivery. This report will be divided into 7 sections follow the model. In the end, it will explain recommendation for the IFS. In the report, mission statement, the risk management, other process and the evaluation will be changed. According to the change model, the event management can be improve than the previous. Content Executive summary 3 1.Introduction 5 1.1 Project Management 6 2. Team building 6 2.1 Integration 8 3. Defining the event 8 3.1 Brief and Expectation 9 3.2 Core Value(Embok) 9 3.3 Mission Statement (EPARS) 10 4. Project Definition 11 4.1 Aims and Objectives 11 4.2 SMART analysis 12 4.3 Secondary research 13 4.4 Primary Research 15 5. Planning 16 5.1 Stakeholder Analysis 16 5.2 Scope of work 18 5.2.1 EPARS Scope Management 18 5.2.2 Scope of work(Project management cascade) 19 5.2.3 Maylor’s Four-phase Approach 20 5.3 Feasibilities 20 5.4 Strategic Planning 21 5.4.1 PESTLE 21 5.4.2 SWOT analysis 22 5.6 Work Breakdown Structure 23 5.6.1 What is the WBS? (EMBOK) 23 5.6.2 Domains 23 5.6.3 WBS vs. Domains 24 5.6.4 Administration 25 5.6.5 Design 25 5.6.6 Risk 26 5.6.7 Operations 28 5.7 Responsibility 29 5.8 Other Management Process 29 5.8.1 PDCA cycle(1950) 29 5.8.2 Kolb's Learning Cycle(1984) 30 5.8.3 EMBOK process 30 6.......

Words: 8038 - Pages: 33

Free Essay

Security Systems Project 1

...* User Domain - defines the people who access the organization’s information system. * User Accountability – the most important measure to be taken in this domain is to make sure that the users are well trained and are aware of the risks that are out there. * Workstation Domain - Any device that users use to connect to your network. * Viruses or malware – to keep viruses and malware at bay it is best to use workstation antivirus software frequently and definitely keep this software up to date. As without the updates antivirus software is almost worthless. * LAN Domain – consists of all machines connected to your network in a local setting. * Unauthorized access to the LAN commonly comes from unlocked wiring closets and data-centers. Simply keep these items under lock and key and well organized and at least the hard lines are secure. * LAN-to-WAN Domain – where the IT infrastructure links to a wide area network and the Internet. * If local users download unknown file type attachments from unknown sources, then you should apply file transfer monitoring, scanning, and alarming for unknown file types from unknown sources. * WAN Domain- connects remote locations to your domain. * If you are vulnerable to eavesdropping, use encryption and VPN tunnels for end to end secure IP communications. Also, follow your data classification standards and guidelines. * Remote Access Domain- connects remote users to your......

Words: 299 - Pages: 2