{"id":31773,"date":"2024-09-02T20:06:38","date_gmt":"2024-09-02T20:06:38","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/psy-6513-v1-threat-management-assignment-assign-plan-develop-and-deliver-communication-plan\/"},"modified":"2024-09-02T20:06:38","modified_gmt":"2024-09-02T20:06:38","slug":"psy-6513-v1-threat-management-assignment-assign-plan-develop-and-deliver-communication-plan","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/psy-6513-v1-threat-management-assignment-assign-plan-develop-and-deliver-communication-plan\/","title":{"rendered":"PSY-6513 v1: Threat Management :   Assignment &#8211; Assign, Plan, Develop, and Deliver Communication Plan"},"content":{"rendered":"<p>&nbsp;<\/p>\n<h2 style=\"margin-right: 0px; margin-bottom: 20px; margin-left: 0px; font-weight: bold; line-height: 1; cursor: auto;\"><span style=\"font-size: 1.5em; cursor: auto; color: inherit;\">see attachments:&nbsp;&nbsp;<\/span><span style=\"color: inherit; font-size: 14px; background-color: var(--color-6); font-variant-ligatures: inherit; font-variant-caps: inherit; font-weight: 400;\">PSY-6513 WK5 Assignment 08292024.docx and&nbsp;<\/span><\/h2>\n<p><span style=\"font-size: 14px; cursor: auto; color: inherit;\">PSY-6513 WK6 Assignment 08312024.docx and&nbsp;<\/span><span style=\"color: inherit; font-size: 14px; background-color: var(--color-6); font-variant-ligatures: inherit; font-variant-caps: inherit;\">wk61 outline.docx<\/span><\/p>\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<div style=\"cursor: auto; color: inherit;\">\n<ul style=\"margin-left: 48px; cursor: auto; color: inherit;\">\n<li style=\"padding: 0px 4px 0px 0px; font-size: 14px; line-height: 1.5715; cursor: auto; color: inherit;\"><i style=\"font-size: 20px; line-height: 1; cursor: auto; color: inherit;\"><\/i><\/li>\n<\/ul>\n<\/div>\n<div style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\"><\/div>\n<h2 style=\"margin-right: 0px; margin-bottom: 20px; margin-left: 0px; font-weight: bold; line-height: 1; cursor: auto;\"><span style=\"font-size: 1.5em; cursor: auto; color: inherit;\"><br \/><\/span><\/h2>\n<h2 style=\"margin-right: 0px; margin-bottom: 20px; margin-left: 0px; font-weight: bold; line-height: 1; cursor: auto;\"><span style=\"font-size: 1.5em; cursor: auto; color: inherit;\">Instructions<\/span><\/h2>\n<h2 style=\"margin-right: 0px; margin-bottom: 20px; margin-left: 0px; font-weight: bold; line-height: 1; cursor: auto;\">\n<p style=\"margin: 0.5em 0px 1em; font-weight: 400; font-size: 19px; cursor: auto; color: inherit;\">Using the information from the resources and other information that you have gathered to this point in the program, take the information from your case example during Lesson 5, and imagine an interaction with the victim a week prior to the incident occurring.&nbsp; In this communication, created as a spoken narrative (i.e., speech) in a Word document, you will need to provide the risk factors you see present, the summary risk rating of the case (i.e., low, moderate, high, or some other quantification of the risk) that you believe is posed in the case, and what security measures that you think should be taken to reduce the risk to this person and why you believe they are necessary and would be helpful.&nbsp; Remember to consider the victim\u2019s perspective and emotional reactions to what tone of voice you use, words you use, how you phrase your comments, and in what order you might share the information so that it is most likely to be retained by the victim and influence then to follow your advice.&nbsp; After you have created this narrative, video record yourself providing this communication.<\/p>\n<p style=\"margin: 0.5em 0px 1em; font-weight: 400; font-size: 19px; cursor: auto; color: inherit;\">&nbsp;<a style=\"cursor: auto;\"><\/a>Upload both the narrative and the video recording and click the<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><i style=\"cursor: auto; color: inherit;\">Submit to Dropbox<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><\/i>button.<\/p>\n<p style=\"margin: 0.5em 0px 1em; font-weight: 400; font-size: 19px; cursor: auto; color: inherit;\">Length of the narrative: 1-2 pages<br style=\"cursor: auto; color: inherit;\"><br style=\"cursor: auto; color: inherit;\">Your presentation should demonstrate thoughtful consideration of the ideas and concepts presented in the course.&nbsp; Be sure to adhere to Northcentral University&#8217;s Academic Integrity Policy.&nbsp;<\/p>\n<p style=\"margin: 0.5em 0px 1em; font-weight: 400; font-size: 19px; cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin: 0.5em 0px 1em; font-weight: 400; font-size: 19px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\">Learning Outcomes:<\/b><\/p>\n<ul style=\"margin-top: 1em; margin-right: 0px; margin-left: 0px; font-weight: 400; font-size: 19px; cursor: auto; color: inherit;\">\n<li style=\"cursor: auto; color: inherit;\">Examine the key concepts relevant to the practical application of threat management approaches. (4)&nbsp;<\/li>\n<li style=\"cursor: auto; color: inherit;\">Explore the various threat management tools, focusing on implementation and operational considerations. (5)&nbsp;<\/li>\n<li style=\"cursor: auto; color: inherit;\">Demonstrate an understanding of threat management strategy development and practical implementation. (3)&nbsp;<\/li>\n<\/ul>\n<\/h2>\n<h2 style=\"margin-right: 0px; margin-bottom: 20px; margin-left: 0px; font-weight: bold; line-height: 1; cursor: auto;\">\n<div style=\"font-weight: 400; font-size: 19px; cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\">\n<div style=\"cursor: auto; color: inherit;\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/h2>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; see attachments:&nbsp;&nbsp;PSY-6513 WK5 Assignment 08292024.docx and&nbsp; PSY-6513 WK6 Assignment 08312024.docx and&nbsp;wk61 outline.docx Instructions Using the information from the resources and other information that you have gathered to this point in the program, take the information from your case example during Lesson 5, and imagine an interaction with the victim a week prior to the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[7],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/31773"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=31773"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/31773\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=31773"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=31773"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=31773"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=31773"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}