Strategic Management

Create a hypothetical organization offering product /service of your choice. Identify a real potential competitor in the market.

1. Name your product/service as well as organization.

2. Write the mission and objectives.

3. Scan and assess the external environment to determine the strategic factors that pose opportunities and threats.

4. Scan and assess the internal corporate environment to determine the strategic factors that are Strengths (especially core competencies) and Weaknesses.

5. Analyze strategic (SWOT) factors to (a) pinpoint problem areas and (b) review and revise the corporate mission and objectives, as necessary.

6. Generate, evaluate, and select the best alternative strategy in light of the analysis conducted in step 5.

7. State how you are going to implement selected strategies via programs, budgets, and procedures.

8. State how you are going to evaluate implemented strategies via feedback systems, and the control

of activities to ensure their minimum deviation from plans.

Guidelines

Before carrying out a SWOT analysis, consider the following guidelines:

• Be realistic about strengths and weaknesses. When performing a SWOT analysis on your business, be neither modest nor overly optimistic.

• Consider answers from the company’s point of view and from the point of view of customers, vendors, distributors, and others who do business with them.

• Distinguish between where the organization is today and where it could be in the future.

• Note that the SWOT is subjective. No two persons will come up with the same SWOT.

please upload the file in PDF format.  ONE page only.

KIM WOODS

Respond to Peers: By Day 7, respond to at least two of your classmates’ initial posts. Your peer responses should be substantive and at least 100 words each. As your reply to your classmates, attempt to take the conversation further by examining their claims or arguments in more depth or responding to the posts that they reply to you with. Keep the discussion on target and try to analyze things in as much detail as you can. For instance, you might consider reflecting on why the legislation selected by one of your classmate’s is impacted differently than the one you selected.  100 WORDS • Trinity Woods  I am currently pursuing a major in Criminal Justice that will prepare me for my future profession of juvenile detention counselor.  This career provides counseling services to juvenile offenders and their families in a juvenile detention center or correctional facility. Juvenile detention counselors are typically employed by state and local government offices.  Federalism is a term that describes the U.S. system of dividing power and authority, derived from the people, between the national and state governments (Fine, T. S., & Levin-Waldman, O. M. (2016). Congress enacted the Juvenile Justice and Delinquency Prevention Act in 1974 (JJDPA)and was reauthorized most recently May 23, 2017.  This act is based on the idea that all juveniles and their families that are involved with the judicial system should be guarded by federal standards for care, while also upholding the interests of the community’s safety.  The JJDPA provides a nationwide juvenile justice planning and advisory system spanning all states, territories, and the District of Columbia, federal funding for delinquency prevention and improvements in state and local juvenile justice programs and practices; and the operation of a federal agency, the Office of Juvenile Justice and Delinquency PreventionLinks to an external site., which is dedicated to training, technical assistance, model programs, and research and evaluation, to support state and local efforts (“Juvenile Justice and Delinquency Prevention Act | CJJ”, n.d.).  The most important part of the JJDPA in my opinion is the protection it gives juveniles from being held in a jail or prison if their crime is only considered a crime because of their age, this is called a status offense. Fine, T. S., & Levin-Waldman, O. M. (2016). American government (2nd ed.) [Electronic version]. Retrieved from https://content.ashford.edu/ Juvenile Justice and Delinquency Prevention Act | CJJ. Juvjustice.org. Retrieved 5 September 2017, from http://www.juvjustice.org/federal-policy/juvenile-justice-and-delinquency-prevention-actLinks to an external site.     • Chad Brayshaw  100 WORDS I am a Correctional Officer working for the California Department of Corrections and Rehabilitation.  Being a sworn peace officer, the issue of gun control is very important to me.  And living in California, one of the more restrictive states in the country, can be very frustrating at times.  While it is difficult to definitively define Federalism, Fine’s and Levin-Waldman’s (2016) many interpretations can be summed up into a process in which the powers between the Federal Government and the individual States are either separated or shared between the two sovereignties.  And over the years those powers have fluctuated depending on personal opinion of the sitting Supreme Court Justices.  On the issue of Gun Control, the Gun Control Act of 1968 “Regulated interstate and foreign commerce in firearms, including importation, “prohibited persons”, and licensing provisions” (ATF, 2016).  While at the time, this law infringed upon the actions of individual states, the Federal Government relied upon the supremacy clause of the constitution that stated that any state law that contradicted a federal law would be found unconstitutional in order to enforce the Act.  Beyond that, today the issue of Gun Control has not actually been about the Federal Government doing too much but that individual states (such as California) have felt that the Federal level has not done enough.  For example, in Heller vs. District of Columbia the District of Columbia was attempting a complete ban on handguns (de Leeuw, 2012). The Supreme Court had to step in and limit the power the District of Columbia was attempting to impose upon its citizens when it ruled that a complete ban on handguns, even within a person’s home, was unconstitutional and violated the 2nd Amendment (de Leeuw, 2012). Not only did the Supreme Court’s actions limit the districts power in this regarded it also expanded the Federal Governments power by limiting (in this instance) the restrictions that individual states can place upon its citizens.  Thus defining (although just) the lines of authority between individual states and the Federal Government on this specific issue.    Alcohol, Tobacco, and Firearms (2016, September 22). Gun Control Act of 1968. Retrieved from https://www.atf.gov/rules-and-regulations/gun-control-act de Leeuw, M. B. (2012). The (new) New Judicial Federalism: State Constitutions and the Protection of the Individual right to Bear Arms. Fordham Urban Law Journal, (5), 1449-1502.  Fine, T. S., & Levin-Waldman, O. M. (2016). American government (2nd ed.) [Electronic version]. Retrieved from https://content.ashford.edu/

03/21(BE cs1)

  

Read The CEO of Starbucks and the Practice of Ethical Leadership and complete the questions below

https://www.scu.edu/ethics/focus-areas/leadership-ethics/resources/the-ceo-of-starbucks-and-the-practice-of-ethical-leadership/ 

  1. Creating Community:  Did      Johnson use Starbucks’ shared values as the cornerstone of his decision      making after the arrests?  Did his decision to close all Starbucks      stores for unconscious bias training and to create a new “Third Space      Policy” align with Starbucks’ mission and goals?  Did his handling of      the incident promote positive relationships between employees and      customers? Did it encourage a sense of connectedness and shared values? (200 words)

2. Encouraging Ethical Conduct:  Did Johnson openly acknowledge that his decision was based in ethics and morality?  Did his apology and actions promote awareness of an ethical issue? Did it create a positive or negative difference in the communities Starbucks serves? Did it make a positive or negative difference for Starbucks employees and customers? (200 words)

3. Showing Discipline in One’s Role:  Does Johnson explicitly accept responsibility for the incident and provide direction for a course correction? Does he identify ways to collaborate with others when necessary?  Does he show he understands what his role is in fixing this problem? (200 words)

4. Clarifying Culture:  Did Johnson clarify his values and the company’s values in his apology and with his subsequent actions?  Did Johnson’s apology and follow-up actions uphold Starbucks’ mission and core values? Did he identify gaps between stated and actual values?  Did Johnson’s apology help Starbucks employees figure out if their personal values align with the company’s? (200 words)

5. Designing Ethical Systems:  Did Johnson’s actions have impact beyond Starbucks?  Did they sent a precedent for other companies to follow? Did his apology create a conversation about unconscious bias in the workplace? How do his apology and the subsequent follow-up actions compare to other companies and CEOs that have faced similar problems? (200 words) 

response for ne

Why is it best to have six or less life-cycle phases in an EPM system?

Dividing or organizing the project into phases is a key aspect of Enterprise Project Management. Breaking down the series of tasks into smaller components and grouping them into phases helps in reviewing the project direction. Usually each phase has gate review meetings to track the progress of the project. Having more phases increases the time the project mangers has to spend in preparing the project documents and attending the review meetings. The most commonly used phasing model is discusses below.

This model consists of six phases namely Initiation, Definition, Design, Development, Implementation, Closure/Follow-up.

In the Initiation phase the project proposals are made and reviewed by all the parties. Feasibility and scope of the project and budget  are discussed and “proof of concept” and  reports are generated with the terms. The project officially start with the approvals at end of the initiation phase.

In the Definition phase the functional and operative requirements are discussed and presented for approval. The list of guidelines and requirements are finalized in the definition phase and can’t be modified further.

The design phase involves the planning, communication methods and risk assessment for the project. It is often said that success of a project is evaluated based on the project design and planning. Work allocation to the resources and timelines are key factors developed in the  design phase.

In the development phase the developers work on creating the product according to the requirements. The team managers play an important role in this phase by allocating the work to the resources and extracting the output.

In the Implementation phase the actual result of the project is visible and evaluated based on the requirements met in the definition and design phases.

In the Closure/Follow-up phase is the final reports are generated, training to users and instructions  on using the product are provided. 

Daniel Raymond (2008), Project Management Handbook,The Six phases of project Management. https://pmhut.com/the-six-phases-of-project-management-introduction

Assignment 1 – Data Analysis in R

 Attached Files:

This will be the first of 2 assignments this semester. You will find 2 files to download. 

1) zipIncomeAssignment.csv is the dataset file you will use for the asignment.

2) ITS836 Assignment 1.docx is the actual assignment instructions.

Note: When you read through the docx file, you’ll notice that some words are in bold. That was intentional. Consider those words very strong hints to the solution. 

This assignment is worth 20 points (20% of your final grade.) You will use R to perform basic data analysis on the supplied dataset. Please refer to the discussion forum for additional information. 

Please note that questions #8 and #9 will likely be quite challenging. I want you to discuss challenges and strategies in the discussion forum. Don’t just give up the answers to other students if you figure out how to solve the problems, but try to offer insights and answer other students’ questions when you can. I’ll be in on the discussion as well. The point is for each of you to learn about R. The best way to get there is to encounter some challenges and collaborate to resolve them. I look at questions #8 and #9 as opportunities to learn more about R, not ways for me to count off points. I’m interested in the outcome. 

Of course, you will need a functioning R implementation to do this exercise. See the discussion forum for more details if you need to acquire R.

Comments on discussion

1. Separation Within a Network

            Cybersecurity on our national infrastructures can be achieved through separation. Separation is a technique used to protect assets from malicious intruders using several separation methods. Separation of networks is critical since it prevents attackers from causing a malicious attack (Amoroso, 2012). The firewall has been the most commonly used method to protect network assets. It provides security through antivirus filtering, identity management, and intrusion detection. Despite the fact that the firewall is an important security technique, it does not work in protecting large-scale networks. This is because networks and systems that are associated with national infrastructure assets are more complex. Therefore, it contains a multitude of entry points that intruders can use to attack caused by internet service providers.

            Nevertheless, traditional perimeter firewalls are essential in providing security to national infrastructures. When protecting large scale, national networks, separation can be achieved by using three different firewall approaches. These include network-based separation, internal separation, and tailored separation. The purpose of using a separation technique in protecting network assets is to separate the network from an attacker in order to reduce the risk of a direct attack (Amoroso, 2012). Component distribution is also an important purpose of separation. This involves separating components in the networks infrastructure in order to distribute risks. Firewalls are also necessary for protecting unsecured networks such as the internet.

            The future of firewall functionality in the protection of the national infrastructure is the use of a firewall in the cloud (Stewart, 2013). This will be effective with the development of a new partnership that will be between carriers and end-user group for effective protection. Additionally, the network-based firewall can be applied distributed denial of service (DDOS) filtering. It is usually placed in a wide area network with the aim of throttling DDOS attacks. This approach is essential in modern networking. It is important to note that filtering DDOS attacks at the edge do not provide effective protection. Therefore, it is important to move it into the network.

References

Amoroso, E., (2012). Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION. Amsterdam: Elsevier.

Stewart, J. M., (2013). Network Security, Firewalls, and VPNs. Burlington: Jones & Bartlett Publishers.

2 nd Discussion 

2. Separation within a network

Mainly SOD has two objectives. The first is the prevention of conflict of interest (real or apparent), wrongful acts, fraud, abuse and errors. The second is the location of control disappointments that incorporate security breaks, data burglary and circumvention of security controls. Right SOD is intended to guarantee that people don’t have clashing obligations or are not in charge of writing about themselves or their unrivaled. 

Separation of duties (SOD) is main key role of all internal controls and most expensive to achieve the goal in sometime because of difficulty. For a specific security process in many people, the objective to achieve by disseminating the tasks. It is basically financial systems for account. Even in all types or sizes in companies can know or understand the not to combine the roles. The main theme of the separation of roles is to became more relevant to the IT organization when the regulatory mandates. An extremely high part of SOX inner control issues, for instance, originate from or depend on IT. This constrained IT associations to put more prominent accentuation on SOD over all IT capacities, particularly security.

There are few examples for separations:

 Receipt and distribution of Mail

Verification and development for Application

Analysis for network administration

Payments and payment authorization.

With regards to isolation of obligations, private company best practices are particularly significant. An absence of isolation of obligations is a noteworthy contributing component in practically all events of misrepresentation, and is regularly observed to be a weakness during post-analysis of system compromises.

References

        Behr, A., & Coleman, K. (2017, August 03). Separation of duties and IT security. Retrieved May 23, 2019, from https://www.csoonline.com/article/2123120/separation-of-duties-and-it-security.html

Segregation of duties: Small business best practices. (n.d.). Retrieved May 23, 2019, from https://www.computerweekly.com/tip/Segregation-of-duties-Small-business-best-practicesk

Account

  

Part 1

•Exercise 1-9A on page 40

Exercise 1-9A Components of the accounting equation 

Jones Enterprises was started when it acquired $6,000 cash from creditors and $10,000 from 

owners. The company immediately purchased land that cost $12,000. 

Required 

a. Record the events under an accounting equation. 

b. After all events have been recorded, Jones’s obligations to creditors represent what percent of 

total assets? 

c. After all events have been recorded, Jones’s stockholders’ equity represents what percent of 

total assets? 

d. Assume the debt is due. Given that Jones has $10,000 in stockholders’ equity, can the company repay the creditors at this point? Why or why not?

•Exercise 1-10A on page 40

Exercise 1-10A Components of the accounting equation 

Common Retained

Assets 5 Liabilities 1 Stock 1 Earnings

Allen $10,000 5 $7,500 1 $2,000 1 $ 500

White $12,000 5 $3,000 1 $7,200 1 $1,800 

Required 

a. Based on this information alone, can you determine whether White can pay a $2,000 cash 

dividend? Why or why not? 

b. Reconstruct the accounting equation for each company using percentages on the right side 

of the equation instead of dollar values. Which company is more financially stable? Why? 

c. Assume Allen incurs a $3,500 operating loss. The remaining assets are sold for the value 

shown on the books, and the cash proceeds are distributed to the creditors and investors. 

How much money will be paid to creditors and how much will be paid to investors? 

d. Assume White incurs a $3,500 operating loss. The remaining assets are sold for the value 

shown on the books, and the cash proceeds are distributed to the creditors and investors. 

How much money will be paid to creditors and how much will be paid to investors?

•Exercise 1-4A on page 38

Exercise 1-4A Missing information in the accounting equation 

Required 

Calculate the missing amounts in the following table. 

Stockholders’ Equity 

Company Retained 

Company Assets 5 Liabilities 1 Stock 1 Earnings 

A $ ? $25,000 48,000 $50,000 

B 40,000 ? 7,000 30,000 

C 75,000 15,000 ? 42,000 

D 125,000 45,000 60,000 ?

•Exercise 1-7A on page 39

Exercise 1-7A Missing information and recording events 

As of December 31, 2016, Moss Company had total cash of $195,000, notes payable of $90,500, 

and common stock of $84,500. During 2017, Moss earned $42,000 of cash revenue, paid $24,000 for cash expenses, and paid a $3,000 cash dividend to the stockholders. 

Required 

a. Determine the amount of retained earnings as of December 31, 2016. 

b. Create an accounting equation and record the beginning account balances under the appropriate elements. 

c. Record the revenue, expense, and dividend events under the appropriate elements of the accounting equation created in Requirement b . 

d. Prove the equality of the accounting equation as of December 31, 2017. 

e. Identify the beginning and ending balances in the Cash and Common Stock accounts. Explain why the beginning and ending balances in the Cash account are different but the beginning and ending balances in the Common Stock account remain the same.

•Exercise 1-6A on page 39

Exercise 1-6A Effect of transactions on general ledger accounts 

At the beginning of 2016, Better Corp.’s accounting records had the following general ledger accounts and balances.

BETTER CORP. 

Accounting Equation 

Acct. Titles 

Event Assets 5 Liabilities 1 Stockholders’ Equity for RE 

Notes Common Retained 

Cash Land Payable Stock Earnings 

Balance 

1/1/2016 10,000 20,000 12,000 7,000 11,000

Better Corp. completed the following transactions during 2016: 

1. Purchased land for $5,000 cash. 

2. Acquired $25,000 cash from the issue of common stock. 

3. Received $75,000 cash for providing services to customers. 

4. Paid cash operating expenses of $42,000. 

5. Borrowed $10,000 cash from the bank. 

6. Paid a $5,000 cash dividend to the stockholders. 

7. Determined that the market value of the land purchased in event 1 is $35,000. 

Required 

a. Record the transactions in the appropriate general ledger accounts. Record the amounts of 

revenue, expense, and dividends in the Retained Earnings column. Provide the appropriate 

titles for these accounts in the last column of the table. 

b. As of December 31, 2016, determine the total amount of assets, liabilities, and stockholders’ 

equity and present this information in the form of an accounting equation. 

c. What is the amount of total assets, liabilities, and stockholders’ equity as of January 1, 2017?

•Exercise 1-8A on page 39

Exercise 1-8A Account titles and the accounting equation 

The following account titles were drawn from the general ledger of Holt Food Supplies, Incorporated (HFSI): Computers, Operating Expenses, Rent Revenue, Building, Cash, Notes Payable, Land, Utilities Payable, Utilities Expense, Trucks, Gasoline Expense, Retained Earnings, Supplies, Accounts Payable, Office Furniture, Salaries Expense, Common Stock, Service Revenue, Interest Expense, Dividends, Supplies Expense.

Required 

a. Create an accounting equation using the elements assets, liabilities, and stockholders’ equity. 

List each account title under the element of the accounting equation to which it belongs. 

b. Will all businesses have the same number of accounts? Explain your answer.

Part 2

•Question 1: What is the accounting equation? Why is this important to the practice of accounting? Please provide an example of how the accounting equation works with recording transactions within a business.

•Question 2: Is there a difference between bookkeeping and accounting? Discuss.

•Question 3: Accounting reports past performance. How can this be useful when planning future operations?

disscussion reply minimum word 50 need in 10 hours

1:  i think that implementing a naming convention for your files is a great  best practicein my experience,  when I have naming conventions on files that  I  am  using, when looking at the code, I have a good idea of where those files are located, because the location is used within the naming convention,. It also helps me know if a file is in the wrong place within the file structure, when I am viewing the folders. Lastly and most importantly it makes it easier to code when working with other developers , on the same project, since everyone is using the same format. It also makes the code look cleaner when reviewing it.

 

2:  Cassandra, 

When organization files it’s important to organize in your own way and then once you go back  to look for something or file you won’t have a problem finding the right folder. When filing it’s important to keep all like documents together in its own folder, for example store reports,  letters, presentation nottes, spreadsheet,  and graphics related to a particular project in a  single folder rather than having one folder for presentation for all projects and another folder for spreadsheet for all projects. 

 

3::  I get asked by various people all the time. Where do you keep all your files when you are working on things in photoshop? I have different folders on my computer for premades. What are premades? Premade pictures are like blends of people or places that I do in photoshop, some extra edited some with a filter on them. I keep a folder for my PSD’s which are photoshop documents of different layers that I use on different photos. Then I  have a folder for my textures.  My textures I use when I m making a particular blend, some are easier to use than the others. It all depends  on what type of photo you are making. When doing the filing system  of your own do what feels right.

 

4:  hello Stacey I agree, when you are creating a filing system it is important do what you feel is right because after all it will be used mostly by you I like the way you came up with different names for your folders because your named them especially for you and I am pretty sure you know exactly where to find your photos without any second guessing one of the easiest things to do during the process is name each and every LAyer of  your documents and then group goes layers into folders the best practice that you can put in place is to name in layers as u go the benefits can be realized immediately and never quit paying off actually

Essay

 

Briefly summarize the article you selected for this research project in no more than one paragraph for this discussion. Explain why you thought this article was interesting enough to read for this assignment.

 Briefly summarize the article you selected for this research project in no more than one paragraph for this discussion. Explain why you thought this article was interesting enough to read for this assignment. 

 

https://www.us-cert.gov/

http://www.consumer.ftc.gov/topics/computer-security

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

http://www.esecurityplanet.com/views

http://www.onlinesecurity.com/

http://www.sans.org/newsletters/

http://www.cnet.com/topics/security/

https://www.consumer.ftc.gov/features/scam-alerts

http://www.dhs.gov/topic/cybersecurity

https://www.eff.org/

http://www.computerworld.com

http://www.networkcomputing.com

http://www.informationweek.com/

http://www.infosecurity-magazine.com/related-publications/

http://www.itworld.com/