REPLY TO CLASSMATE’S DISCUSSION

Do you think that companies place enough emphasis on environmental scanning? Why, or why not? In your discussion, give an example of a company that does or does not place enough emphasis on environmental scanning.

PLEASE EXPLAIN WHETHER YOU AGREE WITH MY CLASSMATE RESPONSE TO THE ABOVE QUESTION AND WHY? (A MININUM OF 125 WORDS) 

                                                         CLASSMATE’S POST

“Environmental scanning is the internal communication of external information about issues that may potentially influence an organization’s decision making process. Environmental scanning focuses on the identification of emerging issues, situations and potential pitfalls that may affect an organizations future” (Albright, 2004, p. 40). Technology is changing at a pace that some organizations are unable to keep up with. For example, in my home town of El Paso, Texas, there is a widely known locally ran business, which (up until only less than a year ago) has never accepted any form of payment, other than cash. It becomes a hassle anytime you want to go eat here, because you have to have cash on you, or make a pit stop at some ATM. Let us be real, who carries cash anymore? This eatery for years (in my opinion) failed to environmentally scan and keep up with the technology of today. Furthermore, this company failed to focus their business on emerging trends and the pitfalls that running a cash only business would incur. After years and years of running their business this way, I learned that very recently, they finally started accepting debit/credit cards and now their business is booming again. “Because of rapid changes in today’s marketplace and new and emerging business practices, it is easy for an organization to fall behind by not keeping up in areas such as technology, regulations and various rising trends” (Albright, 2004, p. 40). In my opinion, if a company is okay with just making ends meet, then environmental scanning probably is not so important. Maybe a mom and pop shop only wants to stay small and only appeal to a certain customer base, but if an organization wants to grow and compete, then environmental scanning becomes important. I have been doing quite a bit of research on Walmart, we have all come to know, and love WalMart becomes it is everywhere. You can physically shop at a Walmart and find pretty much everything you need. I have found, that although Walmart is one of the most successful brick and mortar stores today, it continues to expand its reach via the internet, as it competes with companies such as Amazon. WalMart realizes that times are changing and that a new (and large) customer base wants to shop only online. Rather than remain stagnant, WalMart has invested millions of dollars, building up their own online shopping, thereby expanding their customer base and their profitability. “The focus on environmental scanning is on strategic thinking and planning. Its value comes from the identification and understanding of complex issues facing the organization” (Albright, 2004, p. 40). WalMart has definitely made strategic plans to move into the future, by bolstering its organization through technology. While WalMart also needs to prepare for certain threats and vulnerabilities with this, their organization as a whole has adopted the new culture and together they can take advantage of the positives, while doing their best to mitigate any negatives. 

                                                                       Reference:

Albright, K. S. (2004). Environmental scanning: Radar for success. Information Management Journal, 38(3), 38-45. Retrieved from https://libraryresources.waldorf.edu/login?auth=CAS&url=http://search.ebscohost.com.libraryresource s.waldorf.edu/login.aspx?direct=true&db=bcr&AN=13108082&site=ehost-live&scope=site

Assignment 1: Digital Computer Crime

Write a three to four (3-4) page paper in which you:

  1. Explain the four (4) major categories of computer crimes, and provide at least one (1) example for each.
  2. Explain the most common forms of digital crime.
  3. Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response.
  4. Summarize the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Next, suggest one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime.
  5. Use at least three (3) quality references for this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  6. Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. 

Points: 210

Assignment 1: Digital Computer Crime

Criteria

 

Unacceptable

Below 60% F

Meets Minimum Expectations

60-69% D

 

Fair

70-79% C

 

Proficient

80-89% B

 

Exemplary

90-100% A

1. Explain the four (4) major categories of computer crimes, and provide at least one (1) example for each.

Weight: 15%

Did not submit or incompletely explained the four (4) major categories of computer crimes; did not submit or incompletely provided at least one (1) example for each.

Insufficiently explained the four (4) major categories of computer crimes; insufficiently provided at least one (1) example for each.

Partially explained the four (4) major categories of computer crimes; partially provided at least one (1) example for each.

Satisfactorily explained the four (4) major categories of computer crimes; satisfactorily provided at least one (1) example for each.

Thoroughly explained the four (4) major categories of computer crimes; thoroughly provided at least one (1) example for each.

2. Explain the most common forms of digital crime.
Weight: 15%

Did not submit or incompletely explained the most common forms of digital crime.

Insufficientlyexplained the most common forms of digital crime.

Partially explained the most common forms of digital crime.

Satisfactorilyexplained the most common forms of digital crime.

Thoroughly explained the most common forms of digital crime.

3. Determine the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Provide a rationale to support your response.

Weight: 25%

Did not submit or incompletely determined the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Did not submit or incompletely provided a rationale to support your response.

Insufficiently determined the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Insufficiently provided a rationale to support your response.

Partially determined the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Partially provided a rationale to support your response.

Satisfactorilydetermined the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Satisfactorilyprovided a rationale to support your response.

Thoroughlydetermined the category of computer crimes or cyber terrorism that presents the greatest overall threat at the present time. Thoroughly provided a rationale to support your response.

4. Summarize the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Next, suggest one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime.

Weight: 30%

Did not submit or incompletely summarized the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Did not submit or incompletely suggested one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime.

Insufficiently summarized the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Insufficiently suggested one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime.

Partially summarized the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Partially suggested one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime.

Satisfactorily summarized the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Satisfactorily suggested one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime.

Thoroughly summarized the roles and responses that the U.S. government, court systems, and law enforcement agencies in combatting computer crime. Thoroughly suggested one (1) additional way—i.e., one not discussed in the textbook—that the law enforcement agencies can better counteract computer crime.

5. 3 references

Weight: 5%

No references provided

Does not meet the required number of references; all references poor quality choices.

Does not meet the required number of references; some references poor quality choices.

Meets number of required references; all references high quality choices.

Exceeds number of required references; all references high quality choices.

6. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 8 errors present

7-8 errors present

5-6 errors present

3-4 errors present

0-2 errors present

REPLY TO CLASSMATE’S POST

Obviously, it is extremely important to reduce bias and to reduce confounding for valid epidemiologic research. As a practicing epidemiologist, how would you work to reduce bias in your studies? Also, how would you work to control confounding in your studies? Provide some specific examples of strategies that you would employ.

PLEASE EXPLAIN WHETHER YOU AGREE WITH MY CLASSMATE RESPONSE TO THE ABOVE QUESTION AND WHY? (A MININUM OF 125 WORDS) 

                                                          

                                                          CLASSMATE’S POST

One of the best way researchers can avoid bias in their studies is to be objective. Being objective means being open to changes and events that may help further their research along. Researchers should stay focused on their research and never base their research on their own personal feelings. For example, if a research is researching lung cancer, then he or she should focus on lung cancer and all the aspects of such, void of how the researcher feels personally about lung cancer. Such personal feelings could alter the outcomes of the research. Another way a researcher can avoid bias concerns selection of subjects for the study. Researchers should not choose studies in which they already know the outcome. For example, choosing subjects for the study that are not randomly picked, but known subjects in whom the outcome of the study is known. To control confounding in a study, researchers should have a plan and get organized before the study, not while the study is in progress.   

phd isaac newton/LG

PLEASE USE ATTACHED TEMPLATE – THANK YOU 

 

Use the Milestone Three Assignment Template to complete this milestone. The PEST analysis is designed to help you analyze the political, economic, socio-cultural, and technological changes in your business environment. It can also help you understand the big-picture forces of change as well as the opportunities that are present. The PEST analysis is useful for several reasons:

  • It helps you spot business and/or personal opportunities
    • Gives you advance warning of significant threats
  • It can help reveal the direction of change within your business environment, which can help you work with change rather than against it
  • It helps you avoid starting projects that are likely to fail for reasons beyond your control
  • It can help you break free of unconscious assumptions when you enter a new market or region by giving you a more objective view of this new area

The PEST analysis differs from the SWOT analysis because the PEST looks at the big-picture factors that may influence a decision, market, or potential new business, while the SWOT analysis looks at these factors at an individual or product level. In using the PEST, consider thinking about the changes that are happening around you. Think about opportunities that arise from these changes and threats or issues that could result from them. Read PEST Analysis: Identifying “Big Picture” Opportunities and Threats to understand the four quadrants and questions that you should be asking yourself. View the video or read the transcript of the associated video in the article. Use the assignment template to fill in the boxes in the template with elements that relate to your organization and industry. You are encouraged to use results from your self-assessments that deal with groups/teams and the organization as you complete the analysis. 

case

Case Assignment

1   Look up the definition of counterterrorism (please, no Wikipedia or other nonprofessional sources). What is the definition?

2  Look up the definition of intelligence. What is the relationship of intelligence to counterterrorism? Explain with examples.

3  Relate counterterrorism and intelligence with the military

4  From the Background Information section, review your readings/audio/websites and: Explain how a specific counterterrorism team, unit, or partnership operates to counter a terrorist episode. Use a specific example and “walk it through” the process. 

 

 

Required Reading

Bjelopera, J. P. (2013). The Federal Bureau of Investigation and terrorism investigations. Congressional Research Service. Retrieved from: http://www.fas.org/sgp/crs/terror/R41780.pdf

Implementing 9/11 Commission recommendations: Progress report 2011. DHS. Retrieved from: http://www.dhs.gov/xlibrary/assets/implementing-9-11-commission-report-progress-2011.pdf [read passages pertaining to counterterrorism]

Joint Counterterrorism Assessment Team (2013). National Counterterrorism Center. Retrieved from: http://www.nctc.gov/jcat.html

Required Websites

Counterterrorism and Criminal Exploitation Unit, ICE. http://www.ice.gov/counterterrorism-criminal-exploitation/

Counterterrorism Committees & Working Groups, DHS. http://www.dhs.gov/counterterrorism-committees-working-groups

Counterterrorism Laws & Regulations, DHS: http://www.dhs.gov/counterterrorism-laws-regulations#6

Homeland Security and Counterterrorism Program. Center for Strategic & International Studies. https://csis.org/program/homeland-security-program

National Counterterrorism Center. http://www.nctc.gov/

ITACG Intelligence guide for first responders (2nd ed.) (2011). NCTC. Retrieved from: http://www.nctc.gov/jcat/docs/ITACG_Guide_for_First_Responders_2011.pdf

 

Discussion : “Technology Plus’s Benefit Dilemma”

FOR DISCUSSION QUESTION : ANSWER THE QUESTION FOR THIS CASE INCIDENT WITH CITATION AND REFERENCE.

 

Case INCIDENT

Technology Pius’s Benefit Dilemma

To stay competitive, many organizations today

are choosing to restructure their benefit programs.

Technology Plus is an example of such a company.

Technology Plus has 150 employees, including upper

managen1ent, skilled tradespersons, sales representatives,

and customer service representatives. Five years

ago this company was enjoying huge profits and

could afford their current benefits progra.m; however,

times have changed and no>v they need to find cost

savings without laying off any of the staff.

Up to this point, Technology Plus has offered all

of their staff a premium benefits program, including

much more than governn1ent-required benefits

of employment insurance, Canada Pension Plan,

worker’s compensation, standard vacation of two

weeks per year, and access to legislated leaves of

absence. They offer group life insurance of three

times salary, accidental death and dismemberment

insurance of three times salary, extended healthcare

benefits (with vision care, dental care, hearing aids,

and n1ore), long-term disability of 75 percent of salary

(employer paid), and a defined benefit pension plan.

They also provide a wellness program, an employee

assistance plan, and many other services such as

subsidized childcare and assistance with eldercare.

However, now they need your help in deciding how

to restructure their benefit plan to find significant

cost savings but still provide meaningful benefit coverage

for their employees.

QUESTIONS

1 What voluntary employer-sponsored benefits

should this company maintain and which

ones should they not maintain in your

opinion? Why?

2 Would a flexible benefit program save this organization

money if administered properly?

HRM 531 WEEK 6 – Final Examination -100% CORRECT

1. The Civil Rights Act of 1991 offered what for victims of unintentional discrimination?

a. Race-norming

b. Monetary damages and jury trials

c. Affirmative action

d. Adverse impact

 

2. Which of the following is a distinctive feature of the U.S. system compared with other countries?

a. Exclusive representation

b. All agreements are of unlimited duration

c. Wages set by arbitration councils

d. Low union dues and small union staffs

 

3. A _____ occurs when parties are unable to move further toward settlement.

a. bargaining impasse

b. lockout

c. mediation

d. grievance

 

4. _____ proceeds from an oral warning to a written warning to a suspension to dismissal.

a. Procedural justice

b. Positive discipline

c. Progressive discipline

d. Due process

 

5. In _____, workers have been fired for refusing to quit smoking, for living with someone without being married, drinking a competitor’s product, motorcycling, and other legal activities outside of work.

a. constructive discharge

b. defamation

c. invasion of privacy

d. lifestyle discrimination

 

6. ________________ include everything in a work environment that enhances a worker’s sense of self respect and esteem by others.

a. Internal pay objectives

b. General business strategies

c. Social responsibilities

d. Nonfinancial rewards

 

7. Title VII of the _____________ states that top executives in companies receiving government support can retract bonuses, retention awards, or incentives paid to the top five senior executive officers or the next 20 most highly compensated employees based on corporate information that is later found to be inaccurate.

a. Equal Pay Act (1963)

b. Sarbanes–Oxley Act (2002)

c. American Recovery and Reinvestment Act (2009)

d. Pay for Performance Act (2009)

 


 

8. ____________ is the biggest hurdle to overcome in a pay-for-performance plan.

a. Inflation

b. Merit-pay increases

c. Compensation equation

d. Salary cap performance level

 

9. Properly designed incentive programs work because they are based on two well-accepted psychological

principles: (1) increased motivation improves performance and (2)

a. the Scanlon plan

b. the Rucker plan

c. recognition is a major factor in motivation

d. control-based compensation

 

10. In determining the competitiveness of benefits, senior management tends to focus mainly on

a. cost

b. value

c. security

d. worth

 

11. This made extensive changes to the Employee Retirement Income Security Act (ERISA) of 1974 that governs employer-sponsored, qualified (for tax deferral) retirement-benefit plans.

a. The Pension Protection Act (PPA) of 2006

b. Short-Term Disability laws

c. Short-Term Severance Pay laws

d. Employer Cost Shifting laws

 

12. What is our country’s income maintenance program?

a. Social Security

b. ERISA (1974)

c. PPA (2006), 401(k)

d. COBRA (1985)

 

13. _____ implies that appraisal systems are easy for managers and employees to understand and use.

a. Reliability

b. Practicality

c. Sensitivity

d. Acceptability

 

14. If objective performance data are available, which of the following is the best strategy to use?

a. MBO

b. BARS

c. summated rating scales

d. work planning and review

 


 

15. To avoid legal difficulties related to performance appraisals and enhance credibility in court, employers should

a. have friends testify

b. present only the manager’s perspective

c. present only the employee’s perspective

d. document appraisal ratings and reason for termination

 

16. When conducting a performance feedback discussion, active listening requires

a. verbal communications only

b. interruptions to get your point across

c. summarizing your key points

d. summarizing what was said and what was agreed to

 

17. Employee demotions usually involve.

a. a decrease in status and privilege but no loss of opportunity or pay

b. a reduction in pay but no loss of opportunity, status, or privilege

c. an increase in pay and more responsibility

d. a cut in pay, status, privilege, or opportunity

 

18. For organizations, _________ is an indirect cost associated with downsizing.

a. severance pay

b. outplacement

c. administrative processing

d. an increase in the unemployment tax rate

 

19. _____ analysis is the level of analysis that focuses on employees specifically.

a. Operations

b. Environmental

c. Employee

d. Individual

 

20. Training that results in ______ is costly because of the cost of training (which proved to be useless) and the cost of hampered performance.

a. applicability of training

b. simulation of training

c. negative transfer of training

d. reinforcement of training

 

21. Mary arrives at her new job. Before she can begin actually doing the work, she must complete a series of activities including role playing and virtual reality interactions. What type of training method does Mary’s new employer use?

a. Organizational development

b. On-the-job training

c. Simulation

d. Information presentation


 

22. Which question should not be important in evaluating the value of training?

a. Did change occur?

b. Is the change due to training?

c. Is the change positive related to organizational goals?

d. Was the cost of training within the budget?

 

23. ___________ is the process where managers provide feedback to the employees regarding their past and present job performance proficiency, as well as a basis for improving performance in the future.

a. Performance management

b. Selection

c. Placement

d. Recruiting

 

24. Hard quotas

a. represent a mandate to hire or promote specific numbers or proportions of women or minority group members

b. systematically favor women and minorities in hiring and promotion decisions

c. are a concerted effort by the organization to actively expand the pool of applicants so that no one is excluded because of past or present discrimination

d. are a commitment to treat all races and sexes equally in all decisions about hiring, promotion, and pay

 

25. Organizations periodically turn to _________ to meet demands for talent brought about by business growth and a desire for fresh ideas, or to replace employees who leave.

a. their subsidiaries

b. entry-level employees

c. outside labor markets

d. former employees

 

26. Because practical considerations make job tryouts for all candidates infeasible, it is necessary to __________ the relative level of job performance for each candidate on the basis of available information.

a. assign

b. predict

c. abandon

d. accept

 

27. If employers fail to check closely enough on a prospective employee who then commits a crime in the course of performing his or her job duties, they can be held liable for

a. quid pro quo

b. negligent hiring

c. loss of consortium

d. hostile environment

28. When companies discover they can communicate better with their customers through employees who are similar to their customers, those companies then realize they have increased their _____

a. primary

b. secondary

c. internal

d. external

 

29. What can affirmative action assist organizations in achieving that diversity initiatives cannot?

a. Increased productivity

b. Maximizing creativity

c. Maximizing workforce commitment

d. Correcting specific problems of the past

 

30. Which is not a quality of Generation Y?

a. Inability to handle numerous projects

b. The constant need for stimulation/entertainment

c. A blurring of the lines between work and leisure time while on the job

d. Short attention spans

***Reserved for Ultimate_Writer**

Question 2: The Instructional Design Process

Your book refers to the Training Program Development Model and provides a really nice graphic of the flow presented in Figure 8.6 on page 19. For years, I’ve known this process as the Instructional Design Process. Whatever the title, the process flow is standard.

To respond to this topic, I would like you to discuss and describe in detail the instructional design process or as our book refers to it, the Program Development Model. Demonstrate your understanding of the process. What are the major components? Why do trainers follow this process flow? What are characteristics and/or consideration of each of component? Do you think one stage is any more important than another? Be sure to explain your answer and include citations from your research to support your ideas.

Question 3: Critique this Training Proposal (Everyone responds)

Now that we have discussed the stages of training design including the needs assessment, the design and the evaluation steps, I am asking you to apply your knowledge and understanding. Review the following proposed training design and then develop a critique of its effectiveness and make your recommendations for improvement. Let’s do it!

Your analysis might be guided by the following questions: What do you think is done well in the design and what suggestions do you have for improving the training? Why? Do you think the design met the stated training outcomes and is the evaluation as designed substantial enough? Are the evaluation goals Specific, Measurable, Acceptable, Realistic and Time Bound? Imagine yourself as an attendee at the training. How effective would this session be for you?

Your specific program analysis might include determining if the right intended audience is included in the training, if their possible learning styles have been taken into consideration, and if the goals and objectives of the program are clear and appropriate. Is the delivery of the program effective? Is the assessment of the training sufficient?

As an aside and a suggestion:

You might want to conduct supplemental research on Learning Styles and Learning Style Preferences and include a review of the proposed training as it meets/does not meet the learning style preferences of the attendees. As we design our training content we need to include activities that entice the various learning styles of our training audience.

There are five recognized learning styles but we usually focus on just three: VISUAL, AUDITORY, and KINESTHETIC. Visual learners process information best by reading the material. Auditory learners prefer to hear their information. Kinesthetic learners like “hands-on” reinforcement of the course ideas. Know that we cannot meet all of the preferences, all of the time. Our goal as content developers is to recognize the varying preferences and attempt to design specific exercises to meet each – when possible. When you take HRMN 406, you will focus on this concept in more depth. But if you’re interested, research the topic Learning Style Preferences and enjoy!

 

Training Program: Safe Driving for Schools

Audience: 50 School bus drivers

Duration: 2 hours

Desired Outcomes:

– understand the potential dangers, risks, and statistics associated with a variety of road safety issues

– avoid behaviors that may put students in danger while on the school bus

Materials:

– Flip chart

– Internet access

Delivery:

  1. In a lecture, explain to trainees that according to the National Highway Traffic Safety Administration, motor vehicle crashes are the leading cause of death among Americans up to 34 years old. Factors such as alcohol, high-speed driving and other dangerous behaviors contribute to these crashes. Most accidents could be avoided by following common safety practices.
  2. On a flipchart, draw two columns for the “dos and don’ts” of driving. Ask trainees to brainstorm about items for both lists.
  3. Divide students into five groups, and assign one of the following topics to each group to research on the Internet and then present to the class:

– Impaired driving (DUI/DWI)

– Seat belts

– Speeding

– Distracted driving (such as driving while eating or talking on a cell phone or texting)

– Drowsy driving

– Lack of knowledge, skills or abilities

 Equipment failures

Learning and Skill Evaluation: Trainees will take a multiple choice question exam with 20 questions. They must get at least 17 correct in order to pass the Safe Driving for Schools course.

 

If you want to get full credit you have to answer each question separately ( the same post if you wish), using the format I announced ….

….”For Every Question: -short Intro, (about 2-3 sentences); – a summary of the topic you are discussing, (about 2-3 sentences); critical  analysis:  your thoughts and opinions, sharing other resources such as theories, articles  and giving specific examples,  ( a  paragraph and at least  7-8 sentences) ; and -short conclusion, ( 2-3 sentences). References APA, minimum 2 references for each question.  Times New Roman 11 singled-spaced. You MUST  post responses to at least to 2 other posts. Offer meaningful comments. Only substantive comments will count,  Weekly discussions start on Monday and end on Sunday. Make sure to post your response to the assignment as early in the week as possible. Then read what others have posted and respond with your comments about their posts later in the week….”

MKTG 340 IP 5

  15 slides, plus script (2-3 pages)

Managing a Crisis

Crisis management and crisis communications are specialized business disciplines. In times of crisis, companies can act in a number of ways; from ignoring the situation and hoping it passes in the next news cycle to aggressively defending itself after the fact. Smart companies have plans that can be used in any crisis situation.

Using the company developed in the Unit 4 Individual Project, select a crisis that negatively affects the business from a legal or image standpoint. Develop a series of scenario statements that you write ahead of time that you will present to the management and legal departments so that they may be used swiftly in a time of crisis. 

Presentation Script

Create a script to accompany the presentation. It should include background on the crisis, how the situation will be handled, and the rationale for the scenario statements. 

This part of the Individual Project should be at least 2–3 pages (single-spaced).

PowerPoint Presentation

Create a professional PowerPoint presentation. You will be assessed on the design of the presentation, including colors, backgrounds, professionalism, font, and graphics. Optional content includes sound, videos, and animation. 

This part of the Individual Project should be at least 15 slides. Two files that include the following will need to be uploaded:

  • Script: Use the attached template. The template is a .docx file and will need to be uploaded as a self-executing ZIP file. See MKTG340_U5IP Script in the ZIP File. 
  • PowerPoint presentation 

Please submit your assignment as a Word document in APA format using the attached TEMPLATE. Notice that the grading criteria components match up with the headings provided in the template. Do not change the font, page breaks, or margins. Using the template without deleting the headings ensures that you cover each segment of the assignment.

Why Training

DUE TODAY, SUNDAY, 10/08/17, AT 16:30!!!

You are the HRD Manager of a large trucking company called Fleet Trucking. You have been approached by several middle management personnel who are seeking your assistance to improve the productivity and efficiency of the administrative office personnel. Office personnel apparently are not being trained effectively in their job duties, especially with new equipment or procedures, and many aspects of their duties are either being overlooked or not completed properly. 

The first thing that must be done is to convince upper management that a training project, beginning with needs assessment, is necessary. 

For the sake of simplicity and time, randomly choose (without needs assessment, for now) a basic office training task for your project. 

Examples (Choose one from the list or select your own task.)

1. How to inventory office supplies

2. How to appropriately answer a business call

3. How to open a client account

4. How to effectively write an inter-office memo

Next, compose a memo in Word to the upper management personnel of Fleet Trucking, persuading them to allow you to launch this training. . In your memo, be sure to mention the training task you have selected. Be sure to use information gathered from Chapter 1 of your textbook to assist you. A key issue, for example, is to describe how you know training in this particular area will improve the performance of office personnel. Explain how the training will benefit the entire company. In Chapter 1 of your textbook, refer to the material following “A Framework for the HRD Process,” especially “Needs Assessment.”

Note: It is important to mention in your memo that middle management has called for this training, but that an essential part of your plan will be to conduct a needs assessment before you launch the training.