Respond with 250 words

The greatest threat in my opinion would be a cyber threat. This is believed because if computers and machines cannot communicate, it would shut down the economy very quickly. There would be no connections between people, cities, towns, states or even countries and continents. Things as we know it would come to a halt. I feel that an EMP event would be warfare on America. There would be no electricity which could make the port a target for looters that could loot the containers the looters could take what resources that are left. There would not be just fear of an attack from another country, but on our own soil could be mayhem.

The threat vectors that I believe are most probably in one of America’s top twenty ports are cyber attacks, bomb threats through dirty bombs of tyrants and of war Port Security Transportation (2014). As a result, unrestricted commerce warfare of the type pursued by the U.S. Navy against Japan in 1941-45 makes our ports vulnerable. On the other hand, anything short of a strategically counterproductive ‘sink-on-sight’ policy might not produce sufficient strategic impact to justify the cost of embarking on such a risky course of action in the first place. Once we move beyond the context of open interstate warfare, multilateral economic sanctions offer the possibility of causing many of the same effects at markedly lower cost to the attacker’s international standing Michael Haas (2013).

The following recommendations are in place to ensure that the maritime risk management assessment includes cyber-relates, vulnerabilities, potential consequences for tyrant and warfare bombs that destroy the maritime ports. Then use the risk management assessments to inform how guidelines for area maritime security plans, facilities security plans, determine if the Modial Sector Coordination Council should be reestablished to better facilitate stakeholders and information-sharing across the maritime environment at the national level GAO (2014)

If there were a cyber security attack we are as vulnerable as stated in the April newsletter from maritime cyber security consulting firm CyberKeel contained a scary stat. According to a spot check the group conducted, 37 percent of maritime companies with Windows web servers haven’t been keeping up with installing security patches from Microsoft. As a result, more than one-third of these sites are vulnerable to denial of service attacks and certain types of remote access Newman H (2015). We express the need for high tech technology. We need highly trained employees to operate the high technology so that it works properly. High technology should not replace people. Highly trained people should manage the technology. 

U.S. House Homeland Security Subcommittee Chairman Dan Lungren (R-CA) and Rep. Jane

Harman (D-CA) have introduced the Security and Accountability for Every (SAFE) Port Act. The SAFE Port Act is a comprehensive proposal that will take steps to: prevent threats from reaching the United States, track and protect containers en route, and harden security at U.S. ports (Maritime Transportation Security Act of 2002).

discussion question due

 

Considering Human Resource Planning from Different Perspectives

Two Olympic Gold Medalist in skiing married in 2014, Jason and LeAnn  Benson opened Adventurers and Explorers (A&E) outdoor sporting store  that sales gear and clothing.  The couple’s concept is different than  many of the other sporting goods stores, they design and sell their own  lines of specialized products.  LeAnn’s focus is on the design of  products and Jason’s focus is on the financials; therefore, no one is  worrying about the organizational policies or controls.

Jason and LeAnn encourages their employees to continue their favorite  outdoor sport from skiing, mountain climbing, white-water rafting, etc.  Employees are given two weeks of paid vacation. However, many employees  were allowed to take up to two months off at half pay so they could  fulfill their life-long dreams.  Samantha just returned from a  successful climb of Mount Everest.  Beth will use her two months off to  backpack around Europe. Around the office there was a joke of having the  weekend flu where employees would take (Friday-Monday off) to enjoy the  outdoors.  The office often ran below staffing levels depending on the  season. In addition, because Jason and LeAnn were Gold Medalist they  attract more employees who are interested in skiing.  The skiers want  time off during the peak season.  This is also the peak time for A&E  orders and service requests. 

In the last three (3) years the company has grown from 30 employees  to 100.  Jason and LeAnn need advice on controlling the daily staffing  levels so A&E are able to meet or exceed customer expectations for  responsiveness without sacrificing its own identity as a company.   Choose one of the issues facing A&E and propose a solution and  rationale for your response.

  • Paid vacation along with the most valuable times for vacation (peak season time off)
  • Attendance Issue-The Weekend Flu (Friday-Monday)
  • A&E needs to know whether customers are satisfied with the products and responsive to their needs as outdoor enthusiasts.

1 discussion for $4 free of plagiarism and grammar errors

International Strategies

Prior to beginning this discussion, review Chapter 11 in the Abraham’s textbook on Diversified, Global, and Other Types of Organizations and listen to this audio snippet covering International Strategies. When companies expand into the international arena, they do so either because their home market has matured or because they see real opportunities in the foreign market.

Increasing the number of strategic business units requires a more complex business strategy. Sometimes the road to success in a foreign market can be a bumpy one. For insights into some of the more extreme cultural challenges posed when entering foreign markets as experienced by one of the United States’ largest fast food chains, read How McDonald’s conquered India (Kannan, 2014) and  McDonald’s Settles Beef Over Fries (Grace, 2002).

For this discussion, determine whether or not the company operates in the international marketplace. If so, research the company’s international strategy and evaluate it in terms of effectiveness in regards to one of the issues below. If your company is not involved internationally, then choose one that is and evaluate that company’s international strategy in terms of effectiveness in regards to one of the following issues:

  • Cultural Barriers
  • Monetary Exchange Rates
  • Political Instability 

Then,

  • Assess how your chosen issue potentially affects the strategic considerations of your organization involved in a global economic environment.
  • Propose language to add to the organization’s strategic plan that addresses the potential impacts to the organization’s global strategy.

Guided Response: Respond to at least two of your fellow students’ posts in a substantive manner and provide recommendations to extend their thinking. Support your position by using information from the week’s readings, or examples from current events, and/or other scholarly or credible resources, as outlined in the Scholarly, Peer Reviewed, and Other Credible Sources document. Properly cite any references in APA style as outlined in the Ashford Writing Center.

Defining Performance

REQUIRMENTS:

 

Read below Case: Choosing a Performance Management Approach at Paychex, Inc.

·      After reading the Paychex case study,  In one page:

·      answer the two questions posted at the end of the case.

·      Justify and support your responses.

·      Do you agree or disagree with others’ assessments?

·      Why or why not?

·      Use at least 2 creditable references + the book

·      Use academic writing and in-text citations and list APA style references to support your response.

·      No plagiarism.

 

 

CASE STUDY

CASE STUDY 4-3

Choosing a Performance Measurement Approach at Paychex, Inc.

The following job description is for an account executive at Paychex, Inc. (www.paychex.com). Paychex, Inc., is a leading national provider of payroll, human resources, and benefits outsourcing solutions for small- to medium-sized businesses. Paychex is headquartered in Rochester, New York, but the company has more than 100 offices and serves hundreds of thousands of clients nationwide. Because account executives often make sales calls individually, their managers do not always directly observe their performance. Furthermore, man- agers are also responsible for sales in their markets and for staying up-to-date on payroll laws. However, account execu- tives are responsible for training new account executives and networking in the industries in which they sell products. For example, if an account manager is responsible for retail companies, then that account executive is expected to attend retail trade shows and professional meetings to identify potential clients and to stay current with the issues facing the retail industry.

ACCOUNT EXECUTIVE JOB RESPONSIBILITIES

• Performing client needs analysis to ensure that the major market services product can meet a client’s requirements and expectations.

• Establishing clients on the host processing system.


• Acting as primary contact for the client during the conversion process

.
• Supporting clients during the first few payrolls.

    Completing the required documentation to turn the client over to customer service for ongoing support. 


    Scheduling and making client calls and, when necessary, supporting sales representatives in presales efforts. 


    Keeping abreast of the major market services system and software changes, major changes and trends in the PC industry, and changes in wage and tax law. 


      

       Behavior approach to measuring performance is most appropriate when

       the link between behaviors and results is not obvious outcomes occur in the distant future
poor results are due to causes beyond the performer’s control

       Results approach to measuring performance is most appropriate when

       workers are skilled in the necessary behaviors behaviors and results are obviously related results show consistent improvement over time there are many ways to do the job right

QUESTIONS:

1. Based on the above description, assess whether Paychex should use a behavior approach, a results approach, or a combination of both to measure performance.

2. Using the accompanying table as a guide, place check marks next to the descriptions that apply to the job of account executive. Explain why you chose the approach you did

 

Book reference:

Aguinis, H. (2013). Performance management (3rd ed.). Upper Saddle, NJ: Prentice Hall. ISBN-13: 9780132556385

Article Review 2

Article reviews give you an opportunity to research and learn about current events that affect compensation and benefit practices. Their purpose is to demonstrate how information covered in this course applies to the current business world.

This week you begin by researching a current business article based on one of the topics we have discussed thus far.

  • Legal Environment
  • Job Analysis
  • Job Evaluation

For article sources, try:

You may also look for articles at our online college library: https://intranet.rasmussen.edu/library/

Once you have selected an article, you will create a 1-page analysis including the following sections:

  1. Author – List who wrote the article
  2. Title – List the title of the article
  3. Source – List the name of the article’s source as well as the date of the publication (e.g. New York Times, Aug. 3, 2005)
  4. Summary – This is a brief summary (1 paragraph) of the article
  5. Key Points – List at least 3 points that reflect how this article relates to the topic for the week.
  6. Reaction – This is a 1-2 paragraph analysis of what you learned from reading the article.

Click here for an example article review

Your final paper must contain the six sections mentioned above, use standard type sizes and margins, and reflect proper grammar and spelling

Evaluation Criteria:

  • 10% of this assignment grade will be based on the timely submission of the assignment
  • 20% is based upon following the proper format and  utilizing proper grammar and spelling
  • 70% is based upon the content (summary, key points, reaction)

attached is an example of the article review

project proposal

 Propose a topic for your final project. Use one of the topics from the list in this folder. Write  400 words or more explaining why this topic is important for your peers to understand. Be focused and specific. Look into the general topic to find something new and interesting to write about.  

below are the topics – pick one..

    

  1. With      different types of cloud service delivery, what are the different      licensing requirements that an owner must be aware of when moving to the      cloud.
  2. Discuss      Shared technology vulnerabilities in the cloud, 
  3. How does a      customer know what software versions cloud providers are using? Without      that knowledge how can they do a proper risk assessment? 
  4. What      policies should be in place for users to help reduce cloud based threats.
  5. How can a      consumer evaluate the physical security of their cloud provider? What      standards should apply. What external and internal barriers should be in      place? What access controls? What sort of surveillance should be provided,      power redundancy, and fire suppression? Is a service contract sufficient?      Should physical inspection be available? What about physical location? Are      their volcanoes, tornadoes, earthquakes or other natural disasters common?      Is the site near political unrest? Access to water? Outside temperature?      Is there a physical buffer? Should the walls be made of ballistic material      to withstand explosions? Staffing
  6. Discuss the      four tiers of Uptime Institutes functional recommendations for physical      security for data centers. 
  7. What is a      hypervisor? Differentiate between type I and type II. What are the      security vulnerabilities of each? 
  8. Which is      better for security server virtualization or application isolation? Why?
  9. What are      desktop virtualization, storage virtualization, memory virtualization,      network virtualization? What are the security issues and benefits for each
  10. Global      boundaries and the cloud – separating politics from security
  11. The      relationship of net neutrality and cloud security
  12. Ensuring      Proper Access Control in the Cloud?
  13. Cloud      security risks from misconfiguration
  14. Cloud service      interruptions from DDOS
  15. Preventive      controls for Internal (non-routable) security threats
  16. Detective      Controls for routable and non-routable addresses
  17. How security      zones, groups or domains have      replaced traditional zones and      tiers
  18. On being a      cloud broker -tasks and challenges
  19. Trust      boundaries and division of responsibilities
  20. Elasticity      effect on threat surface
  21. How to      insure that your cloud provider has appropriate detective and preventive      controls in place
  22. How to      secure virtualization layer
  23. Threats to the      hypervisor
  24. What      hardening means
  25. Top ten      recommendations for securing virtual servers
  26. Vulnerabilities      resulting from web programming frameworks
  27. Preventing      attacks on web applications
  28. The      relationship between DOS attacks and your cloud invoice
  29. Good browser      hygiene and cloud security
  30. Compartmentalization      and isolation in virtual multi-tenant environments
  31. Security      standards in PaaS API design
  32. FIPS
  33. Data      Protection techniques under the The Data Accountability and Trust Act
  34. Comparing      block symmetric algorthms with streaming symmetric algorthms
  35. Message      authentication codes and hash functions.
  36. Externalizing      authentication: Trust Boundaries and IAM
  37. Sustaining      IAM with rapid turnover and job changes
  38. IAM      Compliance Management
  39. Identity      Federation Management
  40. OAUTH
  41. ITIL
  42. ISO      27001/27002
  43. Vulnerability      and Risk assessment
  44. Incident      response
  45. What can we      learn from CCID (Cloud Computing Incidents Database
  46. Cloud Health      monitoring (internal and 3rd party)
  47. Reading a Cloud Security Provider      agreement
  48. Discussing      the data life cycle in the context of cloud computing
  49. Facebook’s new privacy initiative
  50. Cloud Security and the Federal Rules of      Civil Procedure
  51. With      different types of cloud service delivery, what are the different      licensing requirements that an owner must be aware of when moving to the      cloud.
  52. Discuss      Shared technology vulnerabilities in the cloud, 
  53. How does a      customer know what software versions cloud providers are using? Without      that knowledge how can they do a proper risk assessment? 
  54. What      policies should be in place for users to help reduce cloud based threats.
  55. How can a      consumer evaluate the physical security of their cloud provider? What      standards should apply. What external and internal barriers should be in      place? What access controls? What sort of surveillance should be provided,      power redundancy, and fire suppression? Is a service contract sufficient?      Should physical inspection be available? What about physical location? Are      their volcanoes, tornadoes, earthquakes or other natural disasters common?      Is the site near political unrest? Access to water? Outside temperature?      Is there a physical buffer? Should the walls be made of ballistic material      to withstand explosions? Staffing
  56. Discuss the      four tiers of Uptime Institutes functional recommendations for physical      security for data centers. 
  57. What is a      hypervisor? Differentiate between type I and type II. What are the      security vulnerabilities of each? 
  58. Which is      better for security server virtualization or application isolation? Why?
  59. What are      desktop virtualization, storage virtualization, memory virtualization,      network virtualization? What are the security issues and benefits for each
  60. Global      boundaries and the cloud – separating politics from security
  61. The      relationship of net neutrality and cloud security
  62. Ensuring      Proper Access Control in the Cloud?
  63. Cloud      security risks from misconfiguration
  64. Cloud service      interruptions from DDOS
  65. Preventive      controls for Internal (non-routable) security threats
  66. Detective      Controls for routable and non-routable addresses
  67. How security      zones, groups or domains have      replaced traditional zones and      tiers
  68. On being a      cloud broker -tasks and challenges
  69. Trust      boundaries and division of responsibilities
  70. Elasticity      effect on threat surface
  71. How to      insure that your cloud provider has appropriate detective and preventive      controls in place
  72. How to      secure virtualization layer
  73. Threats to the      hypervisor
  74. What      hardening means
  75. Top ten      recommendations for securing virtual servers
  76. Vulnerabilities      resulting from web programming frameworks
  77. Preventing      attacks on web applications
  78. The      relationship between DOS attacks and your cloud invoice
  79. Good browser      hygiene and cloud security
  80. Compartmentalization      and isolation in virtual multi-tenant environments
  81. Security      standards in PaaS API design
  82. FIPS
  83. Data      Protection techniques under the The Data Accountability and Trust Act
  84. Comparing      block symmetric algorthms with streaming symmetric algorthms
  85. Message      authentication codes and hash functions.
  86. Externalizing      authentication: Trust Boundaries and IAM
  87. Sustaining      IAM with rapid turnover and job changes
  88. IAM      Compliance Management
  89. Identity      Federation Management
  90. OAUTH
  91. ITIL
  92. ISO      27001/27002
  93. Vulnerability      and Risk assessment
  94. Incident      response
  95. What can we      learn from CCID (Cloud Computing Incidents Database
  96. Cloud Health      monitoring (internal and 3rd party)
  97. Reading a Cloud Security Provider      agreement
  98. Discussing      the data life cycle in the context of cloud computing
  99. Facebook’s new privacy initiative
  100. Cloud Security and the Federal Rules of      Civil Procedure  
  101. With      different types of cloud service delivery, what are the different      licensing requirements that an owner must be aware of when moving to the      cloud.
  102. Discuss      Shared technology vulnerabilities in the cloud, 
  103. How does a      customer know what software versions cloud providers are using? Without      that knowledge how can they do a proper risk assessment? 
  104. What      policies should be in place for users to help reduce cloud based threats.
  105. How can a      consumer evaluate the physical security of their cloud provider? What      standards should apply. What external and internal barriers should be in      place? What access controls? What sort of surveillance should be provided,      power redundancy, and fire suppression? Is a service contract sufficient?      Should physical inspection be available? What about physical location? Are      their volcanoes, tornadoes, earthquakes or other natural disasters common?      Is the site near political unrest? Access to water? Outside temperature?      Is there a physical buffer? Should the walls be made of ballistic material      to withstand explosions? Staffing
  106. Discuss the      four tiers of Uptime Institutes functional recommendations for physical      security for data centers. 
  107. What is a      hypervisor? Differentiate between type I and type II. What are the      security vulnerabilities of each? 
  108. Which is      better for security server virtualization or application isolation? Why?
  109. What are      desktop virtualization, storage virtualization, memory virtualization,      network virtualization? What are the security issues and benefits for each
  110. Global      boundaries and the cloud – separating politics from security
  111. The      relationship of net neutrality and cloud security
  112. Ensuring      Proper Access Control in the Cloud?
  113. Cloud      security risks from misconfiguration
  114. Cloud service      interruptions from DDOS
  115. Preventive      controls for Internal (non-routable) security threats
  116. Detective      Controls for routable and non-routable addresses
  117. How security      zones, groups or domains have      replaced traditional zones and      tiers
  118. On being a      cloud broker -tasks and challenges
  119. Trust      boundaries and division of responsibilities
  120. Elasticity      effect on threat surface
  121. How to      insure that your cloud provider has appropriate detective and preventive      controls in place
  122. How to      secure virtualization layer
  123. Threats to the      hypervisor
  124. What      hardening means
  125. Top ten      recommendations for securing virtual servers
  126. Vulnerabilities      resulting from web programming frameworks
  127. Preventing      attacks on web applications
  128. The      relationship between DOS attacks and your cloud invoice
  129. Good browser      hygiene and cloud security
  130. Compartmentalization      and isolation in virtual multi-tenant environments
  131. Security      standards in PaaS API design
  132. FIPS
  133. Data      Protection techniques under the The Data Accountability and Trust Act
  134. Comparing      block symmetric algorthms with streaming symmetric algorthms
  135. Message      authentication codes and hash functions.
  136. Externalizing      authentication: Trust Boundaries and IAM
  137. Sustaining      IAM with rapid turnover and job changes
  138. IAM      Compliance Management
  139. Identity      Federation Management
  140. OAUTH
  141. ITIL
  142. ISO      27001/27002
  143. Vulnerability      and Risk assessment
  144. Incident      response
  145. What can we      learn from CCID (Cloud Computing Incidents Database
  146. Cloud Health      monitoring (internal and 3rd party)
  147. Reading a Cloud Security Provider      agreement
  148. Discussing      the data life cycle in the context of cloud computing
  149. Facebook’s new privacy initiative
  150. Cloud Security and the Federal Rules of      Civil Procedure

Discussion

 

John Deere CEO Samuel Allen aims toincrease total sales to $50 billion by 2018, with half coming from outside theU.S. and Canada, up from 39 percent today. In the last few years, the companyhas finally begun to make significant gains in Brazil and other countries whereits rivals mainly Agco and CNH Global of Amsterdam, which makes Case and NewHolland have deeper roots. Twenty years ago, Deere had two tractor factoriesoutside the U.S. Today it has nine, in Germany, India, China, Mexico, andBrazil. Last year in Europe, Deere introduced more than 100 products. Nearlyhalf of Deere’s 61,300 full-time employees work outside the U.S.

Replicatingits domestic success overseas hasn’t been easy for Deere. For years, tractorsit designed for the Great Plains were too big or otherwise unsuitable foroverseas growers, who have to contend with smaller plots, roadway driving, anduneven terrain. You can’t go with a German tractor and conquer the world or aU.S. tractor and conquer the world, says Markwart von Pentz, who manages Deere’ssales outside the U.S. You have to design to the requirements of the market.European farmers tend to want more speed and turning ability, while ricegrowers in India prefer compact vehicles that won’t sink in paddies.

Onekey to Deere’s global expansion is the 8R tractor line, the first the companydesigned for farmers worldwide. The 8R is still too big for some places. India,for example, but it is suited to the growing number of large farms outsideNorth America. A base 8R is about 20 feet long, with a narrow snout juttingfrom a boxy, 11-foot-high cab. Depending on which attachments it carries, an 8Rcan weigh more than 30,000 pounds. Allen likes to boast that its technology hasmore lines of software code than a space shuttle.

Deere’s global ambitions areimportant not just to the company and its shareholders but also to the world.To feed a population expected to hit 9 billion by 2050, food production mustincrease by 60 percent, according to the United Nations Food and AgricultureOrganization. With arable land available, Brazil, Russia, India, and China haveemerged as new agricultural powers. But even they lack enough acres to meetdemand. Advances in seed, fertilizer, and pesticide technology must workhand-in-hand with tractors and other equipment to help farmers squeeze every lastbushel of yield from their fields. World tractor unit sales are expected togrow about 1.8 percent a year through 2015, to about 1.4 million; higher pricesand the mix of products may push revenue up about 5 percent, says consultingfirm AlixPartners.

Deere started developing the 8R in2006. After interviewing growers around the world, the company in 2009introduced the 8R with bigger cabs and easier-to-use displays. Even as the 8Rmade its debut, Deere was working on the next version, in part to meet stricteremissions standards in some countries. The company interviewed 1,500 customers.Many spoke of a labor shortage as the world’s population shifts to urban areas,putting a bigger premium on automated machinery.

Last year, Deere reconfigured theWaterloo tractor assembly line to be less linear. Major modules engines and front axles in the northeastcorner of the plant, transmissions and rear axles in the northwest are puttogether separately so that a mistake in either area won’t halt assemblyaltogether.

From March 2011 to March 2012,Deere says, customers ordered more than 7,800 different configurations of the8R. On average, each configuration was built only 1.5 times. More than half the8Rs were built just once, for a single customer. Thus, the global tractor: Onesize does not fit all, from Kansas to Kazakhstan.

 Please discuss the following two Questions:

1.What are the business reasons behind John Deere’s offshoring of tractorproduction from the U.S. to other countries?

2.How can offshoring production be good operations management? Can it be badoperations management?

Assignment: Journal Entry–Intersection and Religious Discrimination

When pieces of cloth are sewn together, you might have trouble discerning the individual pieces of cloth that make the final garment, but by looking carefully, you can find the seams. You may have experienced similar difficulty in the first week of this course when asked to explore the individual aspects of culture that combine to create your unique self-identity. Forms of oppression can come together often in almost imperceptible ways to form the complex environment in which you and your clients live and interact. As a social worker, you must examine carefully the intersections between religious discrimination, sexism, classism, and racism so you can respond accordingly.

To prepare: Consider this week’s resources that describe how religion intersects with other forms of oppression.

Submit your response to those resources and analyze what you think is the role of religion in reinforcing sexism, classism, and racism. Provide at least one specific example for each -ism (sexism, classism, and racism). As a social worker, how can you address these issues on a micro and macro level?

 Reference to use in APA Format only: 

Adams, M., Blumenfeld, W. J., Castaneda, C., Catalano, D. C. J., DeJong, K., Hackman, H. W,… Zuniga, X. (Eds.). (2018). Readings for diversity and social justice (4th ed.). New York, NY: Routledge Press.

  • Section 4 Introduction (pp. 247-258)
  • Chapter 45, America’s changing religious landscape by Pew Research Center (pp. 259-264)
  • Chapter 46, Examples of Christian privilege (pp. 264-265)
  • Chapter 51, Working it out (pp. 291-298)
  • Chapter 52, Native American religious liberty: 500 years after Columbus (pp.  298-301)
  • Chapter 53, Religious freedom advocates are divided over how to address LGBT rights (pp. 302-204)
  • Chapter 56, Jews in the US: The rising costs of whiteness (pp. 312-316)
  • Ch 57, Oral history of (pp. 317-319)
  • Chapter 58, Modesto-area atheists speak up, seek tolerance (pp. 319-321)
  • Chapter 60, Creating identity-safe spaces on college campuses for Muslim students (pp.  325-328)
  • Chapter 62, Critical reflections on interfaith movement (pp. 330-339)  

Reference :

Reference:

Crafting and executing strategy-Thompson , Strickland, Gamble, Peterae,Janes & Sutton CH12

Crafting and executing strategy-Thompson , Strickland, Gamble, Peterae,Janes & Sutton CH12

 

1    
Which one of the following is not something that shapes and helps define a company’s culture?
    A)
The core values and business principles that executives espouse together with the operating practices and behaviors that define “how we do things around here”
    B)
The company’s standards of what is ethically acceptable and what is not, along with the legends and stories that people repeat to illustrate and reinforce the company’s core values, traditions, and business practices
    C)
A company’s approach to people management and its style of operating
    D)
The strategy and business model that the company has adopted
    E)
The “chemistry” and “personality” that permeates its work environment
    

 
2    
Which one of the following is not something to look for in identifying a company’s culture?
    A)
The company’s approach to people management and the official policies, procedures, and operating practices that paint the white lines for the behavior of company personnel
    B)
The company’s track record in meeting or beating its financial and strategic performance targets
    C)
How managers and employees interact and relate to each other
    D)
The spirit and character that pervades the work climate
    E)
The strength of peer pressures to do things in particular ways and conform to expected norms
    

 
3    
Which of the following statements about a strong-culture company is false?
    A)
Decisive leadership on the part of top executives, an industry-leading market share, and strict enforcement of long-standing company policies are all important traits of a strong culture company.
    B)
In strong culture companies, senior managers make a point of reiterating key principles and core values to organization members; more importantly, they make a conscious effort to display these principles and values in their own actions and behavior—they walk the talk.
    C)
Continuity of leadership, small group size, stable group membership, geographic concentration, and considerable organizational success all contribute to the emergence and sustainability of a strong culture.
    D)
In a strong-culture company, culturally-approved behaviors and ways of doing things are nurtured while culturally-disapproved behaviors and work practices get squashed.
    E)
Senior managers insist that company values and business principles be reflected in the decisions and actions taken by all company personnel; moreover, individuals encounter strong peer pressures from co-workers to observe culturally-approved norms and behaviors.
    

 
4    
The characteristics of a weak company culture include
    A)
deep hostility to change and to people who champion new ways of doing things.
    B)
no code of ethics or statement of core values, a highly centralized managerial hierarchy, and a big corporate bureaucracy.
    C)
a lack of values and principles that are consistently preached or widely shared, little co-worker peer pressure to do things in particular ways, and no strong employee allegiance to what the company stands for or to operating the business in well-defined ways.
    D)
no strong sense of empowerment among company members, little or no top management commitment to a clearly-defined competitive strategy, and a poor track record in producing good financial results.
    E)
All of the above are traits of a weak company culture.
    

 
5    
Which of the following is not one of the four types of unhealthy company cultures?
    A)
Bureaucratic cultures
    B)
Change-resistant cultures
    C)
Unethical and greed-driven cultures
    D)
Politicized cultures
    E)
Insular, inwardly-focused cultures
    

 
6    
Companies with insular, inwardly-focused cultures
    A)
are typically opposed to performance-based incentive compensation and employee empowerment.
    B)
are prone to be preoccupied with avoiding risks, are unlikely to pursue bold actions to capture emerging opportunities, are frequently lax when it comes to product innovation and continuous improvement in performing value chain activities, and prefer following rather than leading market change.
    C)
are typically gung-ho about adapting to changing market conditions so as to protect the company’s culture from shareholder criticism.
    D)
tend to resist recruiting people who can offer fresh thinking and outside perspectives and typically refrain from looking outside the company for best practices, new managerial approaches, and innovative ideas.
    E)
are typically run by empire-building managers who jealously guard their decision-making prerogatives; they have their own agendas and operate the work units under their supervision as autonomous “fiefdoms,” and the positions they take on issues is usually aimed at protecting or expanding their turf.
    

 
7    
The hallmarks of a high performance corporate culture include
    A)
a shared willingness to adapt core values and ethical standards to fit the changing requirements of an evolving strategy, use of a balanced scorecard approach to tracking company performance, and a gung-ho approach to discovering best practices.
    B)
considerable political infighting that typically consumes a great deal of organizational energy, often with the result that what’s best for the company takes a backseat to political maneuvering.
    C)
a “can-do” spirit, pride in doing things right, no-excuses accountability, and a pervasive results-oriented work climate where people go the extra mile to meet or beat stretch objectives.
    D)
charismatic managerial leadership, a lean management bureaucracy, and a must-be-invented-here mindset.
    E)
strong inclinations to adopt a wait-and-see posture, carefully analyze several alternative responses, learn from the missteps of early movers, and then move forward cautiously and conservatively with initiatives that are deemed safe.
    

 
8    
Adaptive cultures are characterized by such traits as
    A)
willingness on the part of organizational members to accept change and take on the challenge of introducing and executing new strategies—company personnel share a feeling of confidence that the organization can deal with whatever threats and opportunities come down the pike; they are receptive to risk taking, experimentation, innovation, and changing strategies and practices.
    B)
orchestrating organizational changes in a manner that (1) demonstrates genuine care for the well-being of all key constituencies (customers, employees, shareowners, suppliers, and the communities where the company operates) and (2) tries to satisfy all their legitimate interests simultaneously.
    C)
a proactive approach to identifying issues, evaluating the implications and options, and quickly moving ahead with workable solutions.
    D)
a willingness to change operating practices and behaviors to adapt to new market and competitive conditions so long as the changes do not compromise core values and long-standing business principles
    E)
All of these.
    

 
9    
Which of the following is not one of the leadership roles that senior managers have to play in pushing for good strategy execution and operating excellence?
    A)
Learning the obstacles in the path of good execution and clearing the way for progress
    B)
Weeding out managers who are consistently in the ranks of the lowest performers (the bottom 10%) and who are not enthusiastic about the strategy or how it is being executed
    C)
Staying on top what is happening and closely monitor progress.
    D)
Putting constructive pressure on the organization and initiate ive actions.
    E)
Delegating authority to middle and lower-level managers and creating a sense of empowerment among employees to move the implementation process forward.
    

 
10    
The task of top executives in making ive adjustments includes
    A)
deciding when adjustments are needed and what adjustments to make.
    B)
knowing when to continue with the present corporate culture and when to shift to a different and better corporate culture.
    C)
being good at figuring out whether to arrive at decisions quickly or slowly in choosing among the various alternative adjustments.
    D)
deciding whether to try to fix the problems of poor strategy execution or simply shift to a strategy that is easier to execute ly.
    E)
deciding how to identify the problems that need fixing.
    

 

Discussion Question for $4

Prepare: Start by reviewing General Education Curriculum found in “Section Five: General Academic Information and Policies (Links to an external site.)Links to an external site.” in the Ashford University Academic Catalog, which addresses the core competencies that the general education courses must cover: Applied Ethics, Communication, Information Technology, Critical Thinking, and Quantitative Reasoning. Review Week Five Resources that are applicable toward career success.      

Reflect Icon

Reflect: Think about the core competencies as previously mentioned and ponder your time taking general education courses. Reflect on the specific courses not associated with your college major and determine the level of new information you have acquired that relates to the core competencies. You must also think about a potential job you might apply to once you graduate and determine what skills you developed through general education courses that make you qualified for a specific job.      

Write Icon

Write: For this discussion, you will address the following prompts:  

  • Review a job description through a job website (e.g., Career Builder, Monster, etc.) in your desired career field and identify at least five skills you have obtained through your general education courses that will make you successful at this job.
  • Demonstrate with at least two examples how your newly acquired knowledge and skills have shaped both your personal and professional development.
  • Describe your plans for putting your education to use within your community.

Your initial post should be at least 250 words in length, which should include a thorough response to each prompt. You are required to provide in-text citations of applicable required reading materials and/or any other outside sources you use to support your claims. Provide full reference information of all sources cited at the end of your response. Please use correct APA format when writing in-text citations (Links to an external site.)Links to an external site. and references (Links to an external site.)Links to an external site..