Motivational Interview Paper
A. Introduction: Overview of Motivational Interviewing:
Begin your paper by providing an overview of Motivational Interviewing (MI). Ensure you include one article and summarize the main components of MI and populations that are appropriate to use the MI principles.
B. Assessment of Videos:
Using the key components of MI, assess the role play videos in your chosen video for appropriate integration.
C. Discriminatory Analysis Section:
What would you do differently or similarly in the video you chose to analyze? Provide rationales that are specific utilizing sources for substance and depth.
D. Plan and Summary:
Integrate evidence-based information using one to two scholarly articles in your plan and summary of the scenario you watched (opioid or alcohol). How does the concept of coping play out in the scenario you watched? Integrate coping psychotherapeutic skills, as well as teaching and education, into your plan and summary.
Paper Requirements
Your paper should be three to four pages in length, excluding a required cover sheet and references page that includes one to two textbooks and two to three scholarly articles (that were published no longer than three years ago). Use APA formatting for all components of your paper.
https://youtu.be/XsmY1VVxUIE
https://youtu.be/67I6g1I7Zao
Writing Assignment Rubric
Note: Scholarly resources are defined as evidence-based practice, peer-reviewed journals; textbook (do not rely solely on your textbook as a reference); and National Standard Guidelines. Review assignment instructions, as this will provide any additional requirements that are not specifically listed on the rubric.
Writing Assignment Rubric – 100 Points
Criteria
Exemplary
Exceeds Expectations
Advanced
Meets Expectations
Intermediate
Needs Improvement
Novice
Inadequate
Total Points
Content of Paper
The writer demonstrates a well-articulated understanding of the subject matter in a clear, complex, and informative manner. The paper content and theories are well developed and linked to the paper requirements and practical experience. The paper includes relevant material that fulfills all objectives of the paper.
Follows the assignment instructions around expectations for scholarly references. Uses scholarly resources that were not provided in the course materials.
All instruction requirements noted.
30 points
The writer demonstrates an understanding of the subject matter, and components of the paper are accurately represented with explanations and application of knowledge to include evidence-based practice, ethics, theory, and/or role. Course materials and scholarly resources support required concepts. The paper includes relevant material that fulfills all objectives of the paper.
Follows the assignment instructions around expectations for scholarly references.
All instruction requirements noted.
26 points
The writer demonstrates a moderate understanding of the subject matter as evidenced by components of t.
Motivational Interview PaperA. Introduction Overview of Motivat.docx
1. Motivational Interview Paper
A. Introduction: Overview of Motivational Interviewing:
Begin your paper by providing an overview of Motivational
Interviewing (MI). Ensure you include one article and
summarize the main components of MI and populations that are
appropriate to use the MI principles.
B. Assessment of Videos:
Using the key components of MI, assess the role play videos in
your chosen video for appropriate integration.
C. Discriminatory Analysis Section:
What would you do differently or similarly in the video you
chose to analyze? Provide rationales that are specific utilizing
sources for substance and depth.
D. Plan and Summary:
Integrate evidence-based information using one to two scholarly
articles in your plan and summary of the scenario you watched
(opioid or alcohol). How does the concept of coping play out in
the scenario you watched? Integrate coping psychotherapeutic
skills, as well as teaching and education, into your plan and
summary.
Paper Requirements
Your paper should be three to four pages in length, excluding a
required cover sheet and references page that includes one to
two textbooks and two to three scholarly articles (that were
published no longer than three years ago). Use APA formatting
for all components of your paper.
https://youtu.be/XsmY1VVxUIE
https://youtu.be/67I6g1I7Zao
2. Writing Assignment Rubric
Note: Scholarly resources are defined as evidence-based
practice, peer-reviewed journals; textbook (do not rely solely on
your textbook as a reference); and National Standard
Guidelines. Review assignment instructions, as this will provide
any additional requirements that are not specifically listed on
the rubric.
Writing Assignment Rubric – 100 Points
Criteria
Exemplary
Exceeds Expectations
Advanced
Meets Expectations
Intermediate
Needs Improvement
Novice
Inadequate
Total Points
Content of Paper
The writer demonstrates a well-articulated understanding of the
subject matter in a clear, complex, and informative manner. The
paper content and theories are well developed and linked to the
paper requirements and practical experience. The paper includes
relevant material that fulfills all objectives of the paper.
Follows the assignment instructions around expectations for
scholarly references. Uses scholarly resources that were not
provided in the course materials.
All instruction requirements noted.
30 points
The writer demonstrates an understanding of the subject matter,
and components of the paper are accurately represented with
explanations and application of knowledge to include evidence-
3. based practice, ethics, theory, and/or role. Course materials and
scholarly resources support required concepts. The paper
includes relevant material that fulfills all objectives of the
paper.
Follows the assignment instructions around expectations for
scholarly references.
All instruction requirements noted.
26 points
The writer demonstrates a moderate understanding of the
subject matter as evidenced by components of the paper being
summarized with minimal application to evidence-based
practice, theory, or role-development. Course content is present
but missing depth and or development.
Does not follow the assignment instructions around expectations
for scholarly references. Only uses scholarly resources that
were provided in the course materials.
Most instruction requirements are noted.
23 points
Absent application to evidence-based practice, theory, or role
development. Use of course content is superficial.
Demonstrates incomplete understanding of content and/or
inadequate preparation.
Content of paper is inaccurately portrayed or missing.
Does not follow the assignment instructions around expectations
for scholarly references. Does not use scholarly resources.
Missing some instruction requirements.
4. 20 points
30
Analysis and Synthesis of Paper Content and Meaning
Through critical analysis, the submitted paper provides an
accurate, clear, concise, and complete presentation of the
required content.
Information from scholarly resources is synthesized, providing
new information or insight related to the context of the
assignment by providing both supportive and alternative
information or viewpoints.
All instruction requirements noted.
30 points
Paper is complete, providing evidence of further synthesis of
course content via scholarly resources.
Information is synthesized to help fulfill paper requirements.
The content supports at least one viewpoint.
All instruction requirements noted.
26 points
Paper lacks clarification or new information. Scholarly
reference supports the content without adding any new
information or insight. The paper’s content may be confusing or
unclear, and the summary may be incomplete.
Most instruction requirements are noted.
23 points
Submission is primarily a summation of the assignment without
further synthesis of course content or analysis of the scenario.
5. Demonstrates incomplete understanding of content and/or
inadequate preparation.
Missing some instruction requirements.
Submits assignment late.
20 points
30
Application of Knowledge
The summary of the paper provides information validated via
scholarly resources that offer a multidisciplinary approach.
The student’s application in practice is accurate and plausible,
and additional scholarly resource(s) supporting the application
is provided.
All questions posed within the assignment are answered in a
well-developed manner with citations for validation.
All instruction requirements noted.
30 points
A summary of the paper’s content, findings, and knowledge
gained from the assignment is presented.
Student indicates how the information will be used within their
professional practice.
All instruction requirements noted.
26 points
Objective criteria are not clearly used, allowing for a more
superficial application of content between the assignment and
the broader course content.
6. Student’s indication of how they will apply this new knowledge
to their clinical practice is vague.
Most instruction requirements are noted.
23 points
The application of knowledge is significantly lacking.
Student’s indication of how they will apply this new knowledge
to their clinical practice is not practical or feasible.
Demonstrates incomplete understanding of content and/or
inadequate preparation.
Application of knowledge is incorrect and/or student fails to
explain how the information will be used within their personal
practice.
Missing several instruction requirements.
Submits assignment late.
20 points
30
Organization
Well-organized content with a clear and complex purpose
statement and content argument. Writing is concise with a
logical flow of ideas.
5 points
Organized content with an informative purpose statement and
supportive content and summary statement. Argument content is
developed with minimal issues in content flow.
4 points
Poor organization, and flow of ideas distract from content.
7. Narrative is difficult to follow and frequently causes reader to
reread work.
Purpose statement is noted.
3 points
Illogical flow of ideas. Missing significant content. Prose
rambles. Purpose statement is unclear or missing.
Demonstrates incomplete understanding of content and/or
inadequate preparation.
No purpose statement.
Submits assignment late.
2 points
5
APA, Grammar, and Spelling
Correct APA formatting with no errors.
The writer correctly identifies reading audience, as
demonstrated by appropriate language (avoids jargon and
simplifies complex concepts appropriately).
Writing is concise, in active voice, and avoids awkward
transitions and overuse of conjunctions.
There are no spelling, punctuation, or word-usage errors
5 points
Correct and consistent APA formatting of references and cites
all references used. No more than two unique APA errors.
The writer demonstrates correct usage of formal English
language in sentence construction. Variation in sentence
8. structure and word usage promotes readability.
There are minimal to no grammar, punctuation, or word-usage
errors.
4 points
Three to four unique APA formatting errors.
The writer occasionally uses awkward sentence construction or
overuses/inappropriately uses complex sentence structure.
Problems with word usage (evidence of incorrect use of
thesaurus) and punctuation persist, often causing some
difficulties with grammar. Some words, transitional phrases,
and conjunctions are overused.
Multiple grammar, punctuation, or word usage errors.
3 points
Five or more unique formatting errors or no attempt to format in
APA.
The writer demonstrates limited understanding of formal written
language use; writing is colloquial (conforms to spoken
language).
The writer struggles with limited vocabulary and has difficulty
conveying meaning such that only the broadest, most general
messages are presented.
Grammar and punctuation are consistently incorrect. Spelling
errors are numerous.
Submits assignment late.
2 points
5
9. Total Points
3 hours ago
Vasanth Kumar Reddy Thipparthi
Week 2 Discussion
COLLAPSE
Top of Form
Advantages and disadvantages of a honey pot
With the use of a honey pot, organizations are able to engage in
deception by making use of a feature that deliberately misleads
the attackers or the adversaries, with the aim of pushing them
away from critical assets of an organization. Proper use of the
honey pots makes it easy for an organization to accurately study
the attackers’ behaviors before they actualize their attacks on an
organization’s critical resources. With this understanding, an
organization then gets a good starting point as it seeks to
enhance its overall information and information resources
security (Amoroso, 2011). The use of honeypots has various
advantages as well as disadvantages.
Advantages
The first advantage of using honeypots is that through its
exploitation, an organization is able to develop further security
measures, as it helps in attracting the attackers and studying
their behavior before they have an access to the actual
organizational resources (Amoroso, 2011). This is to mean that
through the use of the honey pot, an organization can
effectively identify the vulnerabilities that the attackers are
likely to use, and will in effect institute measures that will
address those vulnerabilities.
The second advantage is that through the use of honeypots,
organizations are able to understand their working environments
and security status better. Honeypots will assist in studying the
attackers with the aim of understanding how they typically
10. execute their operations. As organizations make use of the
honey pots, they can be observing the real-time events and
occurrences and gain useful insights to improve their security
(Amoroso, 2011).
Disadvantages
Despite its advantages, the use of honeypots has different
disadvantages or shortcomings. One of these disadvantages is
that its effectiveness is highly reliant on the situation where the
attacker does not understand that it is just a decoy which is
being used, for the organization to understand their behavior.
Once the attacker understands this, they cannot proceed with
their malicious intentions (Amoroso, 2011).
The other disadvantage is that it is quite technical or complex
for an organization to ensure that the attacker fully believes that
whatever they are attacking are real resources. These attackers
are knowledgeable, and may be aware of how typical honeypots
look like. In such a case, an organization has an uphill task of
ensuring that the attacker in question does not doubt the
functionality of the honeypot as a critical resource which is
worth an attacking (Amoroso, 2011).
References
Amoroso, E. G. (2011). Cyber attacks: Protecting national
infrastructure. Elsevier.
Bottom of Form
4 hours ago
Rakesh Kalumula
Discussion
COLLAPSE
Top of Form
Hello Everyone,
11. A honeypot is defined as a computer program or a system that is
designed to mimic the likely cyberattacks. It is mainly used in
detecting of attacks and deflect them from the legitimate
targets. In creating understanding, honeypots are important in
understanding how cybercriminal conduct attacks. In the recent
past, honeypots have gained prominence owing to their
contributions in the cyber world. As a result, they have a myriad
of advantage to the entities that have implemented honeypots in
enhancing their security protocols. The following are some
advantages and disadvantages of honeypots.
Advantages
Honeypots works by gathering data only when there is an
interaction taking place, this means that the lesser amount of
data collected, lower costs are incurred by the business, and this
helps an organization in keeping an eye on the costs
(Karthikeyan et al., 2017). IDS usually produce a lot of false
warning that are essentially ignored. For honeypots, any access
to them is usually unauthorized and therefore this makes it
possible to reduce the false warning. Usually, intrusion
detection systems may have a problem in detecting some of
undetermined attacks, this is however different for the case of
honeypots since every access to honeypots is unauthorized and
hence it becomes possible for the honeypot to thwart any
access.
Disadvantages
There are also some disadvantages associated with the
honeypots despite all the mentioned advantages. Mainly,
honeypots tend to monitor activity if there is an outline is an
interaction with honeypot. In the event that an attack is
launched on another system, honeypots might not be able to
recognize such incidents. On the other hand, honeypots are
13. C
h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Introduction
• Deception is deliberately misleading an adversary by
creating a system component that looks real but is in
reality a trap
– Sometimes called a honey pot
• Deception helps accomplish the following security
objectives
– Attention
– Energy
– Uncertainty
– Analysis
17. h
a
p
te
r 2
–
D
e
c
e
p
tio
n
Fig. 2.2 – Stages of deception for
national infrastructure protection
7
• Adversary is scanning for exploitation points
– May include both online and offline scanning
• Deceptive design goal: Design an interface with the
following components
– Authorized services
– Real vulnerabilities
– Bogus vulnerabilities
• Data can be collected in real-time when adversary
19. a
p
te
r 2
–
D
e
c
e
p
tio
n
Fig. 2.3 – National asset service
interface with deception
9
• Deliberately inserting an open service port on an
Internet-facing server is the most straightforward
deceptive computing practice
• Adversaries face three views
– Valid open ports
– Inadvertently open ports
– Deliberately open ports connected to honey pots
• Must take care the real assets aren’t put at risk by