Please use the Recommended syllabus components. I was told that that article will help with designing the syllabus. The M10 Learning-centered paper is the instructions and points guide.

Read:
Mattila, A. (2014, November). The critical components of an online course syllabus. In HASSACC- Human and Social Sciences at the Common Conference (No. 1) (pp. 189-194). Retrieved from https://www.hassacc.com/archive/?vid=1&aid=2&kid=150201-43
Weimer, M. (2013, January 18). The assessment movement: Revisiting faculty resistance. Faculty Focus. Retrieved from http://www.facultyfocus.com/articles/educational-assessment/the-assessment-movement-revisiting-faculty-resistance/

In order to complete this assignment, refer to the scenario that you chose in Assignment 1.

Note: You may create and / or make all necessary assumptions needed for the completion of these assignments.

Scenario 1

You are a Human Resources Manager of an expanding technology company consisting of 170 employees that develops and distributes small electronic devices. Over the past two (2) years, a research group formed, designed, and built prototypes of small remote surveillance cameras used for security. Recently, your company won a contract to build and provide these remote surveillance cameras to various government agencies. The contract will begin with your company supplying these cameras to agencies within your home state. If all orders are fulfilled sufficiently, the contract will be expanded to supplying agencies outside of your home state.

For the immediate future, you will need to secure a larger facility and hire more staff to sustain the first part of the contract. This staff will consist of ten (10) Assembly Technicians, one (1) Certified Quality Control Engineer, one (1) Contract Administrator, and one (1) Office Support Paraprofessional. Meanwhile, there is a contract clause requiring that you provide a staffing plan in order to ensure future product deliveries and sustain the possible future growth.

Using the scenario from Assignment 1, write a six to seven (6-7) page paper in which you:

Identify three (3) job requirements (e.g., needed certifications, previous work experience, external influences, etc.) that could apply to your chosen scenario. Determine two (2) ways these requirements could impact staffing at your organization. Next, suggest one (1) strategy that you could utilize to ensure that all applicants meet the identified job requirements for your organization. Justify your response.
Outline a long-term recruitment plan that contains at least four (4) components, is aligned with your companys recruitment strategy, but also addresses possible job skill or credential shortages. Note: Consider concepts such as succession planning and hiring retirees.
Describe three (3) branding strategies that you would employ to attract qualified applicants to your organization. Next, suggest three (3) communication methods that you would utilize to reach out to applicants. Predict the outcome of integrating your branding strategies and communication methods at your organization. Provide a rationale for your response.
Determine two (2) selection processes for recruiting new employees that could apply to your chosen scenario and then identify five (5) selection criteria that you could use when hiring new employees. Next, analyze the effect of the five (5) identified selection criteria on long-term employee retention and preservation of organizational knowledge. Justify your response.
Suggest two (2) assessment methods that you could employ to select new employees for your organization and then analyze the validity and reliability of each method in regards to the job your organization is offering. Next, identify four (4) job predictors that you believe can assess candidates knowledge, skills, abilities, and other skills and experiences (KSAOs). Provide support for your rationale.
Go to https://research.strayer.edu to locate at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
Format your assignment according to the following formatting requirements:
Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page is not included in the required page length.
Include a reference page. Citations and references must follow APAthe Strayer Writing Standards format. The reference page is not included in the required page length.
This course requires the use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
The specific course learning outcomes associated with this assignment are:

Explain the role of staffing to support an organizations strategy and improve productivity.
Explain the planning considerations for staffing organizations, the use of job analysis, and the components of a staffing plan.
Develop recruitment plans using both internal and external recruitment.
Design a selection process that incorporates a variety of assessment methods and a supporting decision method for candidate selection.
Use technology and information resources to research issues in staffing organizations.
Write clearly and concisely about staffing organizations using proper writing mechanics.

This discussion board focuses upon chapters 3 and 4 of the book What is Critical Environmental Justice? Complete the following tasks:
Required Post 1: Which example of environmental injustice as related to the U.S. prison system, did you find most shocking, thought provoking, or interesting. Explain your example and describe your response to it.

Required Post 2: Describe one way in which control over agriculture is related to the Israeli/Palestinian conflict (there are several examples in the book). Then, briefly reflect upon why the example you chose is connected to  environmental justice.

Based on the assigned readings and other outside resources, reflect how the following bible verse is applicable to human resources.

Bible Verse Reflection: Let us not become weary in doing good, for at the proper time we will reap a harvest if we do not give up.  Galatians 6:9

Develop and submit a short reflection response on how this bible verse can impact human resources and an entire organization.  Explain how insight gained from this bible verse can impact human resource activities and help you become a more effective leader.

Your reflection should be a minimum of 150 words, Use APA formatting, including two different in-text citations in addition to your assigned course readings.

For grading, requirements refer to the discussion rubric.

Many works of literature contain a character who intentionally deceives others. The characters dishonesty may
be intended either to help or to hurt. Such a character, for example, may choose to mislead others for personal safety,
to spare someones feelings, or to carry out a crime. Choose a novel or play in which a character deceives others.
Then, in a well-written essay, analyze the motives for that characters deception and discuss how the deception
contributes to the meaning of the work as a whole.

The character I’m using is Huey Long in “All the King’s men”

Hello- Please see the attachment for the instruction and this is very IMPORTANT. Paper should be 2-3 pages and I am aware That i put 2pg but if it is 2 then complete 2 pages i want or can be more than that.

<<<write report EITHER on a concert you’ve seen in the recent past (last six months or so) WHICH I NEVER BEEN TO CONCERT or a FULL concert on youtube. Remember… for your concert report, you must write about a concert where the artist is playing a style of music that we have discussed (or will discuss) in class. No Jazz, no classical.>>>

Above instruction was sent by my professor. I haven’t pick any concert on you tube. Please go head and pick any concert that matches the instruction and write about it. For more info see the attachment.

Preparedness, Response, and Recovery

Over the last couple years it seems the number and severity of natural disasters has markedly increased. Since the low point of the response to Hurricane Katrina and the subsequent legislation to fix the federal response to disasters, is the Department of Homeland Security doing better in its coordinated responses? Is the current National Response Framework working? How do we balance the response and the need for controlling budget costs? In this assignment select one national level response to a hurricane, wild fire, or other natural hazard to evaluate the preparedness, response, and recovery efforts to the event. Your response should be written from a local, state, or federal perspective. Or you may examine the response from the perspective of a not-for-profit such as the International Red Cross of the Salvation Army.

To begin your research for this assignment, go to the Ashford University Library and conduct a search with the keywords Federal Response to Disasters. It is recommended that you do not use quotation marks for this search.
In your paper,
    Summarize the natural disaster.
    Evaluate the response from a local, state, or federal perspective.
    Identify the core issues that delayed or hindered the response.
    Identify what went right with the disaster response.
    Analyze the current Department of Homeland Security processes and procedures to determine their effectiveness for similar future disasters.
The Preparation, Response, and Recovery paper
    Must be two to three double-spaced pages in length (not including title and references pages) and formatted according to.
    Must use at least two scholarly sources in addition to the course text.
o    The Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types.
    Must document all sources in APA style
   

REQUIRED RESOURCES
Text
Brians, C.L, Willnat, L., Manheim, J.B., & Rich, R.C. (2011). Empirical political analysis (8th ed.). Retrieved from https://redshelf.com

The full-text version of this e-book is available through your online classroom.
Articles
Brands, H., & Feaver, P. (2017). Trump and terrorism: U.S. strategy after ISIS. Foreign Affairs, 96(2), 28-36. Retrieved from https://www.foreignaffairs.com/

Kelly, J. F., Schumer, C., McCaskill, C., Slaughter, L., Biggs, A., Carter, J., Stodder, S. M M., & Camarota, S. A. (2017). The pros and cons of a Mexico border wall: Should congress fund the construction of a wall along the U.S. southern border? Congressional Digest, 96(8), 8-29. Retrieved from http://congressionaldigest.com/#gsc.tab=0

Klassen, J. (2013). Immigration and U.S. policy. In Research Starters: Sociology (Online Edition). Retrieved from https://www.ebscohost.com/discovery/content/research-starters

President Trump’s executive order on immigration. (2017). Congressional Digest, 96(3), 4-7. Retrieved from http://congressionaldigest.com/#gsc.tab=0

Multimedia
Mullins, B. (2016, January 20). Defeating the hackers – BBC documentary (Links to an external site.) [Video file]. Retrieved from https://youtu.be/HQJMg6FdcvQ

Wollman, L. (2013, January 3). Hypothesis 101 (and other Social Science concepts) (Links to an external site.). Center for Homeland Defense and Security Course: Research Methods, Naval Post Graduate School. Retrieved from https://www.chds.us/m/media/player?id=2928

Web Pages
Legal Information Institute. (n.d.). U.S. Constitution: Fifth Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/fifth_amendment

Legal Information Institute. (n.d.). U.S. Constitution: First Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/first_amendment

Legal Information Institute. (n.d.). U.S. Constitution: 14th Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/amendmentxiv

Legal Information Institute. (n.d.). U.S. Constitution: Fourth Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/fourth_amendment

Legal Information Institute. (n.d.). U.S. Constitution: Sixth Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/sixth_amendment

Research Reports
Bjelopera, J. P. (2017). Domestic terrorism: An overview (Links to an external site.) [Research report]. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/terror/R44921.pdf

Bjelopera, J. P. (2016). The Islamic States acolytes and the challenges they pose to U.S. law enforcement (Links to an external site.) [Research report]. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/terror/R44521.pdf

U.S. Department of Homeland Security. (2010). Bottom-Up review report (Links to an external site.). Retrieved from https://www.dhs.gov/sites/default/files/publications/bur_bottom_up_review.pdf

RECOMMENDED RESOURCES
Articles
Deflem, M., & McDonough, S. (2015). The fear of counterterrorism: Surveillance and civil liberties since 9/11. Society, 52(1), 70-79. doi:10.1007/s12115-014-9855-1

Lewis, C. W. (2005). The clash between security and liberty in the U.S. response to terror. Public Administration Review, 65(1), 18-30. doi:10.1111/j.1540-6210.2005.00427.x

Mondale, W. F., Stein, R. A., & Fisher, C. (2016). No longer a neutral magistrate: The Foreign Intelligence Surveillance Court in the wake of the war on terror. Minnesota Law Review, 100(6), 2251-2312. Retrieved from http://www.minnesotalawreview.org/

Pea, A. (2007). Protecting Muslim civil and human rights in America: The role of Islamic, national, and international organizations. Journal of Muslim Minority Affairs, 27(3), 387-400. doi:10.1080/13602000701737236

Reinhardt, S. (2008). Weakening the Bill of Rights: A victory for terrorism. Michigan Law Review, 106(6), 963-973. Retrieved from http://michiganlawreview.org

Sutherland, D. W. (2005). Homeland security and civil liberties: Preserving America’s way of life (Links to an external site.). Notre Dame Journal of Law, Ethics & Public Policy, 19(1), 289-308. Retrieved from http://scholarship.law.nd.edu

West, D. M. (2012). A vision for Homeland Security in the Year 2025 (Links to an external site.).  Retrieved from http://www.insidepolitics.org/brookingsreports/homeland_security.pdf

Multimedia
Jennings, T. (Producer, Director & Writer). (2015). American terrorist. Retrieved from http://fod.infobase.com/PortalPlaylists.aspx?wID=100753&xtid=114683

Smith, M. (Producer & Writer), & Hirsch, L. (Producer). (2014). The rise of ISIS. Retrieved from http://fod.infobase.com/PortalPlaylists.aspx?wID=100753&xtid=60691

Smith, S. (Producer and Director). (2017). The new Al Qaeda. British Broadcasting Corp. Retrieved from https://youtu.be/-f7yxaw78dU

Thompson, G., & Corcoran, M. (Producers). (2017). Escape from Marawi. Retrieved from http://fod.infobase.com/PortalPlaylists.aspx?wID=100753&xtid=145249

TEDx Talks. (2015, June 29). Cyberwar | Amy Zegart | TEDxStanford (Links to an external site.) [Video file]. Retrieved from https://youtu.be/JSWPoeBLFyQ

TEDx Talks. (2012, April 22). Predicting the 9 biggest weather disasters in the next 30 years | Jeff Masters | TEDxBermuda (Links to an external site.) [Video file]. Retrieved from https://youtu.be/ZlojvcmgfQA

Web Pages
Border Security (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/border-security

Civil Rights and Civil Liberties (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/civil-rights-and-civil-liberties

Cybersecurity (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/cybersecurity

Disasters (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/disasters

Immigration Enforcement (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/immigration-enforcement 

Law Enforcement Partnerships (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/law-enforcement-partnerships

Preventing Terrorism (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/preventing-terrorism

Transportation Security (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/transportation-security

U.S. Department of Homeland Security. (2015, October 27). Written testimony of S&T under Secretary Dr. Reginald Brothers for a House Committee on Science, Space, and Technology hearing titled A Review of Progress by the Department of Homeland Security, Science and Technology Directorate. (Links to an external site.) Retrieved from https://www.dhs.gov/news/2015/10/27/written-testimony-st-under-secretary-house-committee-science-space-and-technology

Research Report
Tehan, R. (2017). Cybersecurity: Critical infrastructure authoritative reports and resources (Links to an external site.). Retrieved from https://fas.org/sgp/crs/misc/R44410.pdf

DISCUSSION POST#1

Cybersecurity / Science Technology

It seems that every day we hear of another cyber-attack on the United States. Some of these attacks are targeting databases of corporations, others are against the government or our critical infrastructure, some are in retaliation and are designed to be destructive, and others are designed to hold information or computers hostage until people or corporations pay ransom to get control of their computers and get their information back. Some of these attacks are by States and others by criminal elements. All of these come under the purview of the Department of Homeland Security.

Prior to posting your initial post go to the Ashford University Library to conduct your initial research. Identify a credible source (this is a step down from a scholarly source and includes editorials from reputable news sources and TV documentaries). Use the Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) document for guidance. Identify issues that are applicable to cyber security. Please ensure your references are less than 5 years old. Then go to the Department of Homeland Security website to review the Safeguard and Secure Cyberspace mission.
As you analyze the types of cyber-attacks, current science and technology, and the mission of the Department of Homeland Security do you believe the Department of Homeland Security is up to the task of defending and securing the nations cyberspace? Does the Department of Homeland Security have the tools, tactics, and techniques available to defend and secure the cyberspace? Your initial post must be a minimum of 300 words in length. Support your claims with in-text citations and provide an APA reference list.

DISCUSSION POST 2

Future of Homeland Security

The Department of Homeland Security and state offices of homeland security were created in large scale after the terrorist attacks of September 11, 2001. Homeland security and emergency response has continued to evolve. New threats from Mexican drug cartels, cyber-attacks, lone-wolf terrorist attacks and new threats to aviation security have expanded the role and scope of homeland security organizations and personnel.
Prior to beginning on this forum review the latest DHS 2014 Quadrennial Homeland Security Review . Based on your collective study in Homeland Security and Emergency Management, identify two or three changes or trends you believe will occur in the Homeland Security and Emergency Response discipline in the next ten years. Identify those threats and sub-disciplines that will become more important between now and the next 10 years. What will be the new homeland security and emergency management challenges the United States will face in the next 10 years?

Your initial post should be at least 300 words in length. Support your claims with examples from required material(s) and/or other scholarly resources, and properly cite any references. Use the Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.) document for guidance. Use APA style.

REQUIRED RESOURCES
Text
Brians, C.L, Willnat, L., Manheim, J.B., & Rich, R.C. (2011). Empirical political analysis (8th ed.). Retrieved from https://redshelf.com

The full-text version of this e-book is available through your online classroom.
Articles
Brands, H., & Feaver, P. (2017). Trump and terrorism: U.S. strategy after ISIS. Foreign Affairs, 96(2), 28-36. Retrieved from https://www.foreignaffairs.com/

Kelly, J. F., Schumer, C., McCaskill, C., Slaughter, L., Biggs, A., Carter, J., Stodder, S. M M., & Camarota, S. A. (2017). The pros and cons of a Mexico border wall: Should congress fund the construction of a wall along the U.S. southern border? Congressional Digest, 96(8), 8-29. Retrieved from http://congressionaldigest.com/#gsc.tab=0

Klassen, J. (2013). Immigration and U.S. policy. In Research Starters: Sociology (Online Edition). Retrieved from https://www.ebscohost.com/discovery/content/research-starters

President Trump’s executive order on immigration. (2017). Congressional Digest, 96(3), 4-7. Retrieved from http://congressionaldigest.com/#gsc.tab=0

Multimedia
Mullins, B. (2016, January 20). Defeating the hackers – BBC documentary (Links to an external site.) [Video file]. Retrieved from https://youtu.be/HQJMg6FdcvQ

Wollman, L. (2013, January 3). Hypothesis 101 (and other Social Science concepts) (Links to an external site.). Center for Homeland Defense and Security Course: Research Methods, Naval Post Graduate School. Retrieved from https://www.chds.us/m/media/player?id=2928

Web Pages
Legal Information Institute. (n.d.). U.S. Constitution: Fifth Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/fifth_amendment

Legal Information Institute. (n.d.). U.S. Constitution: First Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/first_amendment

Legal Information Institute. (n.d.). U.S. Constitution: 14th Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/amendmentxiv

Legal Information Institute. (n.d.). U.S. Constitution: Fourth Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/fourth_amendment

Legal Information Institute. (n.d.). U.S. Constitution: Sixth Amendment (Links to an external site.). Retrieved from https://www.law.cornell.edu/constitution/sixth_amendment

Research Reports
Bjelopera, J. P. (2017). Domestic terrorism: An overview (Links to an external site.) [Research report]. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/terror/R44921.pdf

Bjelopera, J. P. (2016). The Islamic States acolytes and the challenges they pose to U.S. law enforcement (Links to an external site.) [Research report]. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/terror/R44521.pdf

U.S. Department of Homeland Security. (2010). Bottom-Up review report (Links to an external site.). Retrieved from https://www.dhs.gov/sites/default/files/publications/bur_bottom_up_review.pdf

RECOMMENDED RESOURCES
Articles
Deflem, M., & McDonough, S. (2015). The fear of counterterrorism: Surveillance and civil liberties since 9/11. Society, 52(1), 70-79. doi:10.1007/s12115-014-9855-1

Lewis, C. W. (2005). The clash between security and liberty in the U.S. response to terror. Public Administration Review, 65(1), 18-30. doi:10.1111/j.1540-6210.2005.00427.x

Mondale, W. F., Stein, R. A., & Fisher, C. (2016). No longer a neutral magistrate: The Foreign Intelligence Surveillance Court in the wake of the war on terror. Minnesota Law Review, 100(6), 2251-2312. Retrieved from http://www.minnesotalawreview.org/

Pea, A. (2007). Protecting Muslim civil and human rights in America: The role of Islamic, national, and international organizations. Journal of Muslim Minority Affairs, 27(3), 387-400. doi:10.1080/13602000701737236

Reinhardt, S. (2008). Weakening the Bill of Rights: A victory for terrorism. Michigan Law Review, 106(6), 963-973. Retrieved from http://michiganlawreview.org

Sutherland, D. W. (2005). Homeland security and civil liberties: Preserving America’s way of life (Links to an external site.). Notre Dame Journal of Law, Ethics & Public Policy, 19(1), 289-308. Retrieved from http://scholarship.law.nd.edu

West, D. M. (2012). A vision for Homeland Security in the Year 2025 (Links to an external site.).  Retrieved from http://www.insidepolitics.org/brookingsreports/homeland_security.pdf

Multimedia
Jennings, T. (Producer, Director & Writer). (2015). American terrorist. Retrieved from http://fod.infobase.com/PortalPlaylists.aspx?wID=100753&xtid=114683

Smith, M. (Producer & Writer), & Hirsch, L. (Producer). (2014). The rise of ISIS. Retrieved from http://fod.infobase.com/PortalPlaylists.aspx?wID=100753&xtid=60691

Smith, S. (Producer and Director). (2017). The new Al Qaeda. British Broadcasting Corp. Retrieved from https://youtu.be/-f7yxaw78dU

Thompson, G., & Corcoran, M. (Producers). (2017). Escape from Marawi. Retrieved from http://fod.infobase.com/PortalPlaylists.aspx?wID=100753&xtid=145249

TEDx Talks. (2015, June 29). Cyberwar | Amy Zegart | TEDxStanford (Links to an external site.) [Video file]. Retrieved from https://youtu.be/JSWPoeBLFyQ

TEDx Talks. (2012, April 22). Predicting the 9 biggest weather disasters in the next 30 years | Jeff Masters | TEDxBermuda (Links to an external site.) [Video file]. Retrieved from https://youtu.be/ZlojvcmgfQA

Web Pages
Border Security (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/border-security

Civil Rights and Civil Liberties (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/civil-rights-and-civil-liberties

Cybersecurity (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/cybersecurity

Disasters (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/disasters

Immigration Enforcement (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/immigration-enforcement 

Law Enforcement Partnerships (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/law-enforcement-partnerships

Preventing Terrorism (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/preventing-terrorism

Transportation Security (Links to an external site.). (n.d.). Retrieved from https://www.dhs.gov/topic/transportation-security

U.S. Department of Homeland Security. (2015, October 27). Written testimony of S&T under Secretary Dr. Reginald Brothers for a House Committee on Science, Space, and Technology hearing titled A Review of Progress by the Department of Homeland Security, Science and Technology Directorate. (Links to an external site.) Retrieved from https://www.dhs.gov/news/2015/10/27/written-testimony-st-under-secretary-house-committee-science-space-and-technology

Research Report
Tehan, R. (2017). Cybersecurity: Critical infrastructure authoritative reports and resources (Links to an external site.). Retrieved from https://fas.org/sgp/crs/misc/R44410.pdf

In weekly tutorials you are expected to contribute to group discussion, and write in your journals about each weekly topic. Using your journal as a resource, you will write a 1500 word reflective essay drawing from your journal that focuses on your learning and findings of one of the topics (lectures, tutorial discussion/online forum) presented to date. The assessment is designed to assist you to see how your learning has been developed over time.
You should focus on ONE key area of your learning for discussion that relates to the unit, ie if you felt you learnt about Indigenous identity, you may detail what your earlier thoughts or knowledge was, and demonstrate how that has changed, or developed over time.
A comprehensive essay will include:

Scholarly discussion of topic
First thoughts or knowledge on topic
Reflection on how the learning or knowledge has changed or developed over time
How this has or hasnt changed your world view
Indigenous perspective of topic

The 1500 word paper is to be written in an essay style with a minimum of 5 scholarly references, as well as reflections from your journal. It is acceptable to write in first or third person, or a combination.
Papers must be written in 12pt font (Times New Roman, Ariel, Calibri) with double spacing. You must adhere to either Harvard or APA referencing style. Referencing guides are available through the library http://www.mq.edu.au/on_campus/library/research/referencing/ 
You will submit your paper through turnitin on the units ilearn page. Late submissions will receive a penalty of 1 mark per day late.

So I have to write a research paper on my question I have picked at the beginning of the semester. My question is “In breast cancer patients what are the effects of reiki therapy when it comes to better quality life “. We have to use 6 different articles that we have picked and written our summery on throughout the semester. These 6 articles we have to have to include in our paper. We have only done 3 so far. There are specific guidelines that we have to follow. I have attached the instructions below.