Sunday, August 23, 2020

Grand Challenge - Novelty and Action-Ability- myassignmenthelp.com

Question: Examine about theGrand Challenge,Novelty and Action-Ability in Research. Answer: The Topic Choice The excellent test according to Colquitt and George (2011) is the capacity of an examination to introduce substantial issues that uncover testing new zones of research where an investigation can be attempted. The grandness introduced need to yield uncertain issues that when seen from the specialists point of view may show up as a prevention however will summon and imbue new thoughts and open more regions of examination to different scientists. Colquitt and George (2011) called attention to that the David Hilberts uncertain issues opened roads of development in the wake of the twentieth century in arithmetic as well as in another control which they place the fabulous test and this is what is named as research. The fantastic test gets guided by two central standards. The first is the quest for strong thoughts. In investigate strength in thoughts is the way to settling issues that inundate mankind is their undertaking for presence. It suggests that thoughts must be one of a kind and unique. The second crucial rule according to Colquitt and George (2011) is the utilization of the less traditional strategy in managing the fundamental issue. The purpose for is that an issue within reach requires a most brief, secure and exact technique to achieve the arrangement. These two are fantastic test key mystery. The essentialness of the terrific test is that it permits scientists to deal with more concerning issues that are not handled in a given writing or examination and handle them in a strong way with the utilization of unusual implies that is path past the given clarification. The jump followed regularly give new ideal models just as opening new territories of academic exchange (Denscombe, 2014). Furthermore, the great test opens up a road of warmed solid conversations of hypothetical significance and wide point of view that the general public and the people profit by the enterprising just as the financial action figured it out. Because of the stupendous test, the theme can't don't respect new thoughts yet the constant work and progress in sociology called for expanding on earlier work. Likewise, the stupendous test that prompts basic issues are not the equivalent but rather fluctuates starting with one writing then onto the next over some stretch of time (Sekaran and Bougie, 2016). Regardless of the abovementioned, checking every point with the structure of the great test gives a voice to the examination. This, consequently, permits enunciation of how the exploration will take care of a bigger issue in this manner pushing the field forward with painstakingness and hugeness (Colquitt and George, 2011). The themes ought to be clear, interpretable and liberated from uncertainty for others to comprehend with no interruption. It is likewise a need that the theme ought to have the correct bearing that set the whole system inferring it must be all around expressed and drained of the twofold barrelled impression. Another part of a decent research point is the capacity to be impartial (Sekaran and Bougie, 2016). According to Denscombe (2014), a decent research theme must be to such an extent that it uncovers the need to remain importance for a more drawn out timeframe and subsequently expanding with Colquitt and George (2011) that there must be a stupendous test in investigate. It follows that while choosing a subject of research dependent on the region of study, the top must be conjured with the goal that it makes numerous issues that require settling. In the article by Jose and Mampilly (2012), in the assessment of the social trade comparable as per the general inclination of workers commitment and the HR rehearses, the stupendous test is obvious. The subject of worker commitment has made a great deal of thought among various human resource pros, specialists and academic researchers over the globe. It has created as a champion among the most basic topics in the hover of human asset. The idea of agent commitment has been unequivocally introduced by human asset firms that offer urging on how it tends to be made and used. Worker commitment is an obvious and stand-out develop that involves scholarly, eager, and conduct parts that are identified with individual execution. The circle of delegate commitment is a vital part of the organization everywhere throughout the globe. The thought is expanding centrality among executives and academic circles in business. Despite its unmistakable importance, little research has been done for recognizing the forerunners of delegate commitment. The representatives that are locked in accept the basic job in gaining ground in the association and making upper hand. The fantastic test is seen when scientists are making basic examinations in to show up at the potential relations among commitment and execution related outcome factors that upgrade commitment of worker and that could make an upper hand to foundation comprehensively. The explanation is that commitment plays a fundamental and legitimate when authoritative achievement is considered, regardless of the conduct of the economy. The representative fulfillment and commitment are the territories of worry for directors just as pioneers in associations around the world since it influences viability, intensity, and development. The significance of worker commitment is presently driving specialists to concentrate on the drivers of commitment and methods for improving representative commitment. The human asset rehearses as the strategies through which specialist observations, perspectives, and practices are shaped. Along these lines, the act of human in improving laborer commitment is hard to be disregarded. The great test is found in the point since it opens up a road of warmed solid conversations. The hypothetical significance and wide viewpoint of worker commitment and fulfillment of human asset rehearses advantage from the pioneering just as the monetary in the association. Subsequently the subject yields new thoughts that are ceaseless and advances in sociology by expanding on earlier work. Additionally, the fabulous test that prompts fundamental issues are not the equivalent but rather changes starting with one writing then onto the next over some undefined time frame (Iyengar, and Henkin, 2015). The inspiration driving this article is the introduction of the writing audit on the creating thought of laborer commitment. The center is representative commitment, laborer commitment pervasiveness, its centrality and how workforces' satisfaction with practices of human asset in the affiliation quickens and supports the commitment in the affiliation. The point is clear, interpretable and liberated from vagueness. It is reasonable with no interruption. Likewise, the theme has a legitimate heading that set the whole strategy, very much expressed and drained of a twofold barrelled impression. Curiosity Colquitt and George (2011), in utilizing the term information recombination implied that examination that is novel is conceivable with the production of new thoughts. It completes by a mix of various writing from various territories of study and gets new unfamiliar thoughts. The oddity of the theme radiates from the blend of information in what Colquitt and George (2011) named as information recombination. Despite the fact that George, Kotha, and Zheng, (2008) debate that the blend of two sorts of writing or trains become isolated as time passes by and diminishes the chance of the development of novel arrangements, this is opposite in the field of the executives. Information recombination is utilized as a methods for producing new thoughts. The thinking is that associations go through it to accompany new just as imaginative thoughts through the investigation of new mechanical crises. These new imaginative thoughts rise up out of what has been in presence in the association. This impl ies they are just summoned by a blend of innovation and the accessible writing in the association (Mosyjowski, Daly and Peters, 2017). The discussion of research must be propped up among the researchers and this is conceivable for a situation where the point under investigation is representing the stupendous difficulties. Along these lines the discussion that is occurring in the writing must touch off and quicken the force of conversation as opposed to going of the writing and in this manner diverting the focal point of the examination hole. The discussion is enlarged and made pertinent and intriguing through the expansion of new thoughts or develops. It ought to get the new knowledge that has never been verbalized by earlier specialists and in this manner brings new measurement up in the examination by making interest and the need to realize discover more in the exploration region. In introduction discoveries and realities, the specialists will never stop people in their tracks down however will long for additional on the outcomes and the exploration (Colquitt and George, 2011). In any endeavor of concocting clever thoughts, the association must maintain a strategic distance from the propensity of preferring recognizable, develop and close to approaches and grasp handling new issues, early and totally new thoughts. Consequently during the time spent choosing a subject, there is have to think about recognition, development, and closeness parts of the investigation. A subject that is natural is get seen as an augmentation of the accessible discussion, one that is adult give a recognition that the commitment presented is repetitive and the point that is close is viewed as covering and floating far separated from the accessible viewpoint on the primary wonder. For instance the utilization of turn out which is an endeavor of making a stride ahead and contending in a similar situation with the utilization the organizations past information and procedures (Croes et al., 2018). In this manner, it is basic for analysts to utilize information recombination so that there is an introduction of new thoughts that clear a method of new more research just as acquiring new novel items that guide in comprehending societys challenges and fi

Friday, August 21, 2020

Infectious Disease and Public Health (Microbiology) Essay

Irresistible Disease and Public Health (Microbiology) - Essay Example Hence, this uncovered individuals, who are close by to these microscopic organisms, along these lines expanding odds of being contaminated. In reality, TB microscopic organisms are initiated by the condition of low resistance framework in an individual, who is tainted. In United States, the legislature has made vital arrangements planned for disposing of TB since 1989, which was a period that America experienced reappearance of TB (CDC, 2005). Truth be told, the high commonness of HIV contributed essentially to resurgence of TB, however there were different factors, for example, expanded migration of individuals from nations with high TB predominance and accessibility of multidrug-safe TB (CDC, 2005). Then again, the legislature has put forth important attempt to improve foundation to encourage control of TB in America. Along these lines, this prompted amendment of the difficult that had decayed, through essential organization of assets at a state and neighborhood levels in the nation. Also, CDC (2005) clarifies that exertion made by American government to manage the negative ramifications of TB prompted a forty-four percent decline of its commonness during the period somewhere in the range of 1993 and 2003. Government’s exertion to manage ramifications of TB is inferable from articulate national methodology, which encouraged reaction to introductory return of TB (CDC, 2005). Besides, this exertion can likewise be ascribed to coordination of government authorities in human services field at the neighborhood and state level. By the by, the legislature has been guaranteeing that there are adequate assets to manage this issue; in this way prompting fabulous lessening of TB cases among Americans. In any case, government exertion expanded chance of disposing of TB in 1999 and reaffirmation of targets to erase TB through America by Advisory Council for the Elimination of Tuberculosis (ACET) (CDC, 2005). As per an ongoing exploration by CDC (2012), there were 10,528 frequencies of

Thursday, July 9, 2020

The Story About How Someone Got To The Girls Soul - 2200 Words

The Story About How Someone Got To The Girls Soul (Essay Sample) Content: THE WAY TO HER SOUL.Beatrice had the voice of an angel. Music was in her soul. She could feel it every day and every night. It was the one thing on her mind since she joined middle school in Midtown Junior School, Wisconsin. Since she was a little child in first grade, she sang her little heart out during talent shows and singing competitions knowing that some day she would sing for the world and more and more people would recognize her.Beatrice then got to college and decided to pay less attention to music and more on her college education. She was doing a Bachelors in Education and hoped that she would achieve a first class honors by the end of her course. Four years passed and Beatrice never sang a single song, not even when she was busy cooking or doing the laundry. She realized how miserable her life was without music. Now through with her college education, she sought for a job in some of the high schools around but gave up easily. At her uncles coffee shop, she found hope as a waitress, busting tables.She never really got the essence of her job, but she somehow realized that she belonged there, tending to people who were quite fond of her. Her confidence grew much stronger and with time she began humming in the kitchen as she cleaned up after closing time every evening. She made it a habit to hum because she loved it. However, she felt she was being watched by someone. She was taken away by the mood and danced away as she reached the climax of her song. The stranger, eager to join in kept his distance because he did not want to be seen.The next morning, Beatrices uncle came up with a brand new idea. He decided to introduce karaoke as a way of bringing more customers to his coffee shop. Now the coffee shop was a bit lively and people enjoyed the country music they listened to but something was still missing. A lot of people got up to sing the hoarse voices when they heard their songs playing. Beatrice listened to them and clapped along wit h them as they enjoyed themselves. The stranger too found himself clapping along with them once he saw Beatrice clapping. This setting was just right for Beatrices big break that she dreamt of once upon a time.The stranger, still at his corner got up one afternoon and walked to the karaoke machine. He stopped the music and everybody stared at him in shock wanting to question his intentions.What is your problem mister?  Beatrice asked him.Come sing with me.  He said.Beatrice looked at him and ignored what he said as she remembered seeing him once as she was cleaning and humming. The stranger decided to tune the karaoke machine to a love song by John Legend. Beatrice stopped but did not turn around to look at his face. She realized he was singing to her. With her hands on her waist, she turned around and looked at the stranger from his head to his newly shined shoes, walked up to the karaoke machine and unplugged it. Everybody was so disappointed because they were eager to see t he drama that would unfold after the stranger had gone down on his knees. She left him on his knees and went about her normal job cleaning tables.The stranger stood up and everyone clapped and cheered at his fantastic voice. He introduced himself as Alex and said he was there to stay. Beatrice looked at him with her right eye and caught a glimpse of his charm right from his silky hair to his shapely sideburns. She clicked and smirked and realized she was in total denial.Later on that day, as Beatrice left the coffee shop after her shift, she saw Alex from a distance. She decided to ignore after he waved for her to wait for him. She hastened her pace as Alex tried to catch up with her. She found herself running from Alex. All this was just for him to formally introduce himself. Beatrice did not seem to be interested.Okay, okay, you win, I dont deserve your attention, but please let me just know your name.  Alex said from a distance.Beatrice knew that if she turned her head to look at him, she would regret having to never forget his face. But she did so anyway.Why do you want to know who I am, I have never seen you in my life.  She said as she looked into his eyes.She almost melted trying to get a grip from seeing that he had blue eyes. The touch of his face was a dream come true to her and his lips were just the right size for the perfect first kiss. She realized after a second that she had already started stroking his cheeks and gazing into his eyes. Alex too tried touching her hand but to his surprise, Beatrice slapped him hard.Dont touch me!  She shouted. You have no right. She turned back around and left Alex dumbfounded and confused of what had just happened a few seconds that had just passed. Alex just gazed at her as she cat walked away in silence.We all have flaws and make mistakes. Man is to error and correction is inevitable. However, Alex, even though he had a better self on the outside, he had a deep darker inside that nobody knew about except himself. Alex was a serial killer and Beatrice was apparently his next victim. Alex slept with a number of women, whether fat, thin, small, big, tall or short and all these women, he killed immediately he was done with them to hide his identity. Was Beatrice really safe?Even though his dark side overshadowed his bright side, he had a few good things e did in his life. Alex knew how to sing like an angel. He started as an altar boy in church on Sundays and he slowly grew into a man and joined the choir. Everybody loved his sweet voice back then and that was West Virginia. That was before he met his first love who changed his life and tore his heart out for good. Now his way of relieving his anger and sorrow is infecting other women with the disease his first love decided to give him intentionally.Selling his music on the streets next to the coffee shop was the only chance he had of seeing her again before she got too busy in the shop. His luck ran out and he decided to go in a fter he had earned a couple of dollars. He was shocked to find Beatrice had been given the day off. This was the perfect moment to make his move he thought.That night, he looked for her address, found it and dressed to kill. He put on some of his best cologne and took a walk to the address he had been given. A small house, manageable and very cozy he thought. He knocked once, no answer. The second and the third time he knocked, he did not think she was even home. But as he was leaving, beautiful Beatrice opened the door and after she saw him, she closed the door and this time locked it. The usual state of dilemma he was left in was getting to him and so he decided to take things up a notch. He sang her a song.When will I see you again, you left with no regrets, not a single word you said,No final kiss, to see your pretty face He heard her hum the song and got courage to sing even louder. She opened the door and sang along with him till their eyes met and they smiled at each other .Please go away, said Beatrice.Alex was speechless after the magical moment they had was spoilt by her telling him to leave. He had no choice of the matter, he took his leave.Beatrice too had some secrets that she was not willing to share with anyone. All she knew was that she did not want to fall in love again after what an old boyfriend in high school did to her. She cried that night after the memories vividly came back to her and that was when she remembered to take her antiretroviral drugs. She had AIDS.Alex kept coming back to her home with the same old approach and Beatrice decided to give the hard to get attitude a rest. She let him in for the first time one Monday night and offered him coffee in her living room. She asked him a lot that night and she felt she could trust him even with her heart. But she forg...

Tuesday, May 19, 2020

Strategic planning and its development - Free Essay Example

Sample details Pages: 18 Words: 5368 Downloads: 8 Date added: 2017/06/26 Category Statistics Essay Did you like this example? ACKNOWLEDGMENTS Many thanks to my Lecturer Mr. Andrew; who helped me a lot in completing this course work. Without his support I had not been able to complete these tasks. Don’t waste time! Our writers will create an original "Strategic planning and its development" essay for you Create order I would also like to thanks the Manchester International College and its staff who were very helpful in every step of my studies. I owe too much to my friend Mr. Mudasser who helped me a lot in getting most of the course books and gave me access to Universitys electronic library. Here I would also like to mention the name of Mr. Raheel, who taught us Computer Network Management. Mr. Raheel explained me how to complete a course work and how to write and present it in a word document. And finally I would like to thank my family and children who were very supportive and understanding during my studies. SUMMARY In this assignment author is producing a report which evaluates how external events influence IS strategy and design within ASDA Wal-Mart a food retail supermarkets. In task one author evaluate different modes of enquiry and give an overview of selected Multi-National Corporation. In task two author focuses on the impact of online shopping technologies in ASDA Wal-Mart and finally author use some tools to analyze and reconcile external pressure and IS strategic planning and design. The rapid IT development has caused changes and impacts on a society. This report will evaluate how an organization use IT to remain competitive and how external events influence IS strategy and design within Multi-National Corporations (MNCs) from the food retail sector (e.g. ASDA, Sainsbury, Tesco). TASK 1 DIFFERENCES BETWEEN MODES OF ENQUIRY. Enquiry is an action taken by an observer to find out the true reasons behind a failure or a problem situation. Or it can also be defined as an action for collecting the knowledge and information required to solve a problem. There could be many modes of enquiries to choose from depending upon the situation and the industry involved, and the researcher could choose them depending on his own preference too, as there is no hard and fast rule that applies to these modes of enquiries. There are three basic modes of enquiry and each mode of enquiry is built on two basic parts, the information collection and the validation of that collected information as described below. SIMPLE MODE OF ENQUIRY. a) INDUCTIVE / CONSENSUAL. Inductive enquiry technique is a simple technique in which solution to a problem is derived from a limited amount of observations. These observations which are directly related to the problem could be based on analogous, historical or multiple sourced data. Analogous data helps observers to specify a problem to be simpler than one but complex than the other. Historical data explains that what the solution of the problem or similar problems was in the past. And multiple sourced data is the average of advices from a group of experts regarding that particular problem. b) ANALYTIC / DEDUCTIVE. This technique shares many similarities to inductive technique discussed above and derives only one single solution or answer to a problem that could be a number or a truth. This technique breaks down the problem into its components, find a solution for each of those and extracts only one answer to the major problem. COMPLEX MODE OF ENQUIRY. a) MULTIPLE REALITIES. In this mode of enquiry the observer places the observed data from the problem against his own theory which is unique to him and extracts multiple answers towards the solution of problem based on different theories. The result is many different aspects of the problem itself including many different solutions to those problems which can be implemented. But the person who is responsible for decision making is having difficult situation in front because of many options that are available and many routes of action that could be taken. Just because of this fact there is definitely a risk factor involved in this method of enquiry. b) DIALECTIC. Dialectic is often referred as a practical decision making tool which depends on looking into the methods, assumptions and theories by which the problems are defined rather than looking into the data or observations to find out an answer. Two possible solutions are derived from the problem which then results in one single and accurate solution. This method of enquiry dugs deep into the problems and is used widely in practical world. INNOVATIVE MODE OF ENQUIRY. a) UNBOUNDED SYSTEMS THINKING. The concept of understanding the problem situation in context of a mess or focussing on the problem as a whole keeping in mind that the sum of different individual sections of the problem is smaller than the problem itself is the basis of unbounded systems thinking (Anne and Tenzin, 2006). A problem is considered as a mess which demands a creative approach to the solution. Emergence attributes which are functions of the whole are the resultant because of these messes. According to Ian Mitroff, à ¢Ã¢â€š ¬Ã…“the Unbounded Systems Thinking depends on adopting multiple perspectives when making an enquiryà ¢Ã¢â€š ¬?. This means that the Unbounded Systems Thinking utilises all previous modes of enquiries and it creates dependencies between all modes of enquiries (Ian and Harold, 1993). This mode of enquiry considers the technical, organisational and human aspects of the problem situation and merges them all to create a solution. In other words the Unbounded Systems Thinking is a way to reveal real world pressures on information systems design and implementations as these problems demand a creative solution and this solution always involves human activity as humans are the ones to be directly affected by such information systems implementation. PLAN TO CARRY OUT THE RESEARCH. As described earlier, there could be many modes of enquiries that could be suitable for a problem situation or a research, a lot depends on personal preference too, but the mode of enquiry which will be used to carry out the research is the Unbounded Systems Thinking. This mode of enquiry uses the TOP (Technical, Organisational and personnel ) perspective which is a way of looking at complex or messy problem situations. ASDA Plc, is choosen for this purpose, which is a part of American retail multinational conmpany Wal-Mart. Author have decided to investigate how online shopping has affected ASDA Plc by collecting data from different websites which will define the à ¢Ã¢â€š ¬Ã…“ T à ¢Ã¢â€š ¬? in à ¢Ã¢â€š ¬Ã…“ TOP à ¢Ã¢â€š ¬? and what impact the technology had in the organisational IS strategic planning and IS development as a whole, which should complete the à ¢Ã¢â€š ¬Ã…“ O à ¢Ã¢â€š ¬Ã…“ and finally the personnel aspect is analysed by discussing the ethical issues in ter ms of IS strategic design and the professional code of conduct. The choosen mode of enquiry will be helpful in a better understanding of the organisation as it combines all the modes of enquiries. Technological issues will be analysed in the organisation and problems will be discussed. Cultural issues will be raised in the organisation as a whole and this will help the author to investigate what could be the best strategy to fit the organisational requirements. Personnel aspects are very important as every single technology or strategic planning directly relates to humans and this mode of enquiry will evaluate how a firms strategic planning and technology implimentations has affected its employees. STRENGTHS AND WEAKNESSES OF CHOSEN MODE OF ENQUIRY. Unbounded systems thinking is the sum of almost all the modes of enquiries. In other words it will be true to describe this mode of enquiry as the best solution where all other modes of enquiries fail and the problem is complex and messy. Complex problems are the ones where large MNCs are considering the injection of new technology in the organisation or when a large acquisition is being considered (Arnold, 2007). Any such problem where the consequences of taking wrong decision could be disastrus, such mode of enquiry brings forward all the aspects of action being taken and brings the factor of human interaction into consideration. Some modes of enquiries considers only the technical aspect and brings forward one possible solution and does not take into account the organisational or human factor, which results into the failure of the project or the actions taken on behalf of such enquiries. The only drawback of such a mode of enquiry is that it provides a three dimensional view of th e real world and it does not provide a way in which methods and methodologies could be combined together to find a solution to the problem (Davies, 2006 ). TASK 2 ONLINE SHOPPING. Online shopping is simply when a customer buys products from the internet. Online shopping has grown more popular with customers as people are finding shopping online more efficient and as most will be using the internet in their homes it allows them to shop in a comfortable environment. Many companies now have online websites where you are able to buy the same products from the internet as in the actual stores in the high street. The online shopping facilities offered by the supermarkets, ASDA and Tesco. Both sites have been designed using similar layouts, frames to separate hyperlinks etc, this ensures the users of one site will be comfortable using the other i.e. they will know what to expect. The registration processes in both sites are simple and straightforward with only a limited amount of information required from the user. It is important to note that neither site uses H1, H2 elements as recommended by W3C, therefore there is no hierarchy of heading levels which may cause confusion to users of aural browsers. The shopping experience itself was simplified with Tesco due to the à ¢Ã¢â€š ¬Ã‹Å"express shopper search facility which enables the user to type an entire shopping list onto a à ¢Ã¢â€š ¬Ã‹Å"notepad and then conduct a search; it looks for the first product on the list and transfers the whole list onto the left hand bar allowing the user to then click on the links in the list to search for their items one by one. Asda provides individual searches using a product search box, which does not highlight data within it when clicked; this can result in errors when searching due to the previous search not being deleted properly. Search results provided very different results; Tesco searches were very succinct with only a few relevant items offered as options whereas the Asda searches resulted in a multitude of choices within different departments, many of which were often inappropriate, resulting in subsequent searches having to be carried out. Both sites use tables in order that the user can choose a time and date for delivery, the Asda site is very self-explanatory and easy to understand whereas Tesco is confusing with different prices for various time and day slots with no explanation as to why. Tesco do offer an alternative website designed for users with impairments and accessibility IMPACT OF ONLINE SHOPPING. As more and more customers are shopping online that results in far more money being spent online. Businesses earn a vast majority of their profits in the run up to Christmas. According to the leading e-commerce trade body IMRG, shoppers spent  £4.98bn in 2005 during this Christmas period and for 2005 as a whole it calculated shoppers spent  £19.2bn. Here is a graph from the IMRG to show the growth in UK online shopping from April 2000- Dec 2008. This chart shows UK online shopping sales April 2000 to December 2008 Source, IMRG Capgemini e-Retail Sales Index Tesco is an example of a very successful company online. According to the research company comScore, Tesco has a huge 66% of the UKs online shopping market. In 2006 Tesco took an average of 30,000 orders per day which amounts to  £2.5m. Other successful online companies include Asda and Sainsburys. There are many advantages of shopping online rather than physically going out and buying the product, here are few that author believe are the most important to people when buying online: à ¢Ã¢â€š ¬Ã‚ ¢ Shopping online can be very convenient as it can be a quick and easy process. It also has the convenience of being able to shop in a comfortable environment (your own home). Another benefit is the ease to find products when doing online shopping as you are able to search for products as soon as you enter the website using a search box or other links, this is a big difference from actually going to the store as you spend time looking for the product (Warren, 2000). à ¢Ã¢â€š ¬Ã‚ ¢ Online shopping also allows people to compare prices on the product in a quick and easy way. This cannot be done in a very effective way if you physically go to the store as it would take a long time to compare prices from one store to the next. Once you have found a product you want to purchase you simply can do so with a click of a button rather than waiting in queues. à ¢Ã¢â€š ¬Ã‚ ¢ At times some online stores give special online deals which cant be found on the high street. There are also some disadvantages of online shopping. I have chosen a few which might give people reasons as not to shop online: à ¢Ã¢â€š ¬Ã‚ ¢ Online fraud is probably the biggest reason as to why people are cautious of online shopping. Some people find it hard to trust websites with their personal information and their payment details. Identity theft is still a big concern as hackers can break into websites and steal personal information such as name, address and credit card numbers. To protect their networks e-commerce websites can install anti-virus software, firewalls etc. General advices given to consumers on this matter include using websites that they are familiar with and trust. à ¢Ã¢â€š ¬Ã‚ ¢ Another big problem with online shopping is that you dont have the opportunity to physically encounter the goods as websites only provide images. This means people may purchase items from the internet which is quite different in real-life. This can also be a tool for fraudsters on unreliable websites as they can describe a product which on the internet may satisfy however once delivered it wont be what was expected. à ¢Ã¢â€š ¬Ã‚ ¢ Another disadvantage of online shopping is the waiting that you will have to do for the product to arrive. In a store you can purchase the goods and take it home straight away however with online shopping you must wait for you product to be delivered. Author produces a Pest analysis which describes the impact of online shopping in ASDA Wal-Mart Ltd. Political The political element of the external environment remains the same for the local and national levels because the ASDA Superstores are only in Britain. At present the changing trend of globalised business could be a challenge as well as an opportunity for the ASDA Plcs because they would have to compete against new forces from all over the world to maintain best quality of the products and services they offer. For example online shopping play an important role in todays competitive retail make environment and have become a main element of business success. Economic ASDA offers Britains best value weekly shop with prices 10 15% lower than their main competitors (The Economist, 2007) and an unmatchable mix of fresh food, grocery, clothing, home, leisure and entertainment goods. ASDA continues to widen the gap between their competitors and is 11.2% cheaper than their competitors, especially in online shopping. In home shopping ASDA give their customers lots of promotional offers. Social ASDA Plc introduces lots of varieties of products and services online, for their local and national level customers. For example ASDAs new recipes of ready meals, fresh vegetables, fresh meat and milk are very well popular in its customers. So, for customer satisfaction and to make its social values stronger, ASDA Plc delivers online shopped products or services on time and with cheaper price to match the ongoing trend. Technological It is predicted that by 2011 the online retail sales in Europe will hit approximately 263 Billion Euro because of the rapid increase of online shopping in which the shoppers in UK may be accounting for more than a third of all revenue. ASDA Plcs can take the advantage of utilizing internet as an advertising media as 8% of the global advertising is spent on the internet and the percentage is increasing day by day. It will be very cost effective and help the company to globalize very easily. Overall author feels that online shopping can be a very useful tool, especially for people who may not have enough time to shop in stores. This can also be useful to the elderly as they do not need to leave the house to purchase goods that they would like. There are some issues that still need to be resolved such as online fraud and security. ASDA is a well-established organization and offering brilliant online products and services to its customers and in future have a plan to make a lot of improvements in their online shopping sector. IMPACT OF TECHNOLOGY ON IS STRATEGIC PLANNING AND IS DEVELOPMENT. Information system is a rapidly changing field and emergence of new technologies influences every single person on the face of the earth. Almost every single business is tied to information technology one way or the other and new technologies are bound to affect these businesses as they race to gain competitive advantage over their rivals. Injection of these new technologies affects each and every aspect of large multinational companies and this also includes the strategic planning and development of information systems. Soft System Methodology has had a significant impact on the understanding and development of methods. It is a qualitative methodology and was developed by Professor Peter Check land and his colleagues at Lancaster University (Hawkes, 2008). To allow a better understanding of the complexities of the situation, the method allows the problem situation to be suited from many points of view. The methodology consists of a seven stage process that provide the means of progressing through these levels which are system thinking, finding out about the situation and then taking the necessary actions. In other words, SSM is a process used by managers to find out the solution of complex problems which could be related to policy making, organisational structure or even the problems faced by management. These seven stages of SSM are as follows. Finding the problem Looking for Information about the problem Selection of different cases Model Building Comparing models with reality Assessing feasible changes Action to improve the problem situation Few early stages of Soft System Methodology will be used to assess the impact of technology on Information Systems strategic planning and development. The first stage would be to find out the problem. Online shopping had a drawback that seller is not in direct contact with the customer even though the internet is a communication media. The problem was identified by few MNCs and search was started to find more relevant content about this problem. Then few scenarios came out to overcome the problem such as live customer support, customer feedback, online contact forms and email support. Nowadays almost every single MNC had a customer feedback and e-mail contact system so that the shopping experience could be as smooth as possible for every customer. Through e-commerce, firms will have to move much of the customer service and after-sales service online so that customers can access databases or à ¢Ã¢â€š ¬Ã…“smartà ¢Ã¢â€š ¬? manuals directly. This builds better quality customer relationships. E-commerce reduces production cost by providing self-service online and making automated transactions, payment, and order fulfilment possible. Many firms save money on staff and paperwork via electronic order processing, billing and e-mail services. As technology grows, newer newer appliances are available. One of the latest popular communications innovations is the Video Conferencing (VC) which is the computer telephony Integration (CTI).VC changes the ways of human communication. In the past, written letters and telephone calls were the main communication channels.VC has a dramatic effect on the way people do business and the increase of productivities. It can share any type of info such as pictures, graphs, slides and software, etc. Decisions are made faster; bringing products or services to market quicker; and enabling firms to stay ahead of their competitors. People do not need to travel long distance for business by using VC. It helps to save travel time. The hiring cycles for key employees is shortening. It also reduces travel cost. The postal services and letter/documents delivery service is affected due to the needs of written document are lower. However, the standard and quality of VC depends on telecommunication connectivity and bandwidth, country infrastructure resources. Indeed the data security problem is a threat not only to the firms but also to customers. Online payment, transactions, money transfer, etc. all require personal information and password to access. If the online security is low, it may cause a great loss (money) to customers and even cause the firm to bankrupt. To protect safety of the customers, and the business of themselves, the firms must develop high security system and up-date the system from time to time. In order to maintain competitiveness, the firms must provide more additional services (e.g. storage volume, security) to their customers. This greatly increases their production costs. However, the costs cant be transferred to customers. To fix the problem, IT professional should take sensible precautions in general and using up-to-date software. These were the few factors affecting the IS strategic planning and development for MNCs. Much depends on the organisational structure and the requirements of the business and whenever a decision is made, it should be in accordance with these seven factors of SSM, so that a situation is completely analysed to get the maximum possible results. TASK3 HARD AND SOFT PROBLEMS IN IS STRATEGIC PLANNING. Consequences analysis technique is a process which helps managers or decision makers to work out the possible outcome of certain decisions or new technology implementations on the organizational level. It is a way of measuring the impact of a particular decision on everyone who is going to be affected by that decision. While measuring this impact, there are some hard and soft issues to be considered so as to know how the decision is going to affect the organization in the long term, that is in respect of budget constraints (which is the hard issue) and how is it going to affect the humans in terms of their attitude and mindset towards the new system (which is the soft issue). The brief overview of hard and soft systems thinking is as follows. à ¢Ã¢â€š ¬Ã‹Å"Hard systems thinking are goal-directed as the particular study begins with the definition of the desirable goal to be achieved. It is essentially concerned with the question of à ¢Ã¢â€š ¬Ã‹Å"how to achieve a predetermined aim. à ¢Ã¢â€š ¬Ã‹Å"Soft is concerned with defining the options for improvement thus addressing the à ¢Ã¢â€š ¬Ã‹Å"what to do question. It is also committed to the examination of human activity, which is the other soft part of the equation. Whereas hard systems thinking is concerned with the à ¢Ã¢â€š ¬Ã‹Å"how à ¢Ã¢â€š ¬Ã‹Å" of the problem, in soft systems thinking, the objectives of the systems are assumed to be more complex than a simple goal that can be achieved and measured (Pun et al, 1998). Every system can be said to have a set of purposes or missions rather than goals. Understanding of soft systems can be achieved through debate with the actors in the systems. Emphasis is placed on the à ¢Ã¢â€š ¬Ã‹Å"what as well as the à ¢Ã¢â€š ¬Ã‹Å"how o f the system. Some of the hard and soft problems faced by MNCs during IS strategic planning and development are discussed below. The first hard problem faced by organizations is the financial or budget constraint. Information systems are constantly changing and to keep up with this ever growing field, managers face a difficult time in terms of finances available to update the systems and to stay ahead in the field of the technology. Stake holders are never going to realise the long term benefits of new technologies and managers have to develop a plan to fight the drawbacks of old technology and where appropriate keep some financial space to overcome this hurdle. While considering the drawbacks of the old technology, managers must also consider the compatibility of the old technology with the new one existing in the market. If we consider the e-commerce technology only, there have been many developments regarding the online transactions during the past few years and managers must consider the benefits of adapting these advancements as the new systems produce much better results and online shopping experience fo r the customers (Ledere et al, 1996). Another hard issue faced by managers is the need for highly trained personnel who are equipped with the understanding of these new technologies. Once the decision is made and the new systems are in place, the need for keeping these systems updated is felt and search for qualified personnel is started who can do the job for the organization but this task becomes difficult as there are not enough qualified personnel in this short span of time when there are too many organizations searching for the same people. Furthermore the implementation of new systems also requires the training of the staff who will be going to operate or work on those systems. Along with this training, staff must also be familiarized with the benefits and usefulness of the new system so that they could be as comfortable with the new system as they used to be in the past. Along with some hard issues discussed previously, managers have to face some complex problems in the form of soft issues while planning the IS strategy and development. These soft issues do not have any clear solution and managers always have to use their managerial instinct to find a way around these problems. One of them is the history and culture of the organization. IS planning always have direct impact on the cultural issues and to change the culture of the organization is not always the easy thing to do. Furthermore if in any case the implementation of the new system fails in its early stages, the mindset of the staff would be more towards the old systems and this will affect their motivation and willingness to work with the new technologies. One more soft problem to be discussed here is the affect of chain of command on IS strategy planning. Organizational groups are affected by bureaucracy and this tends to mould the IS strategy for their benefits. Currently, ASDA Plc, utilizes IT to achieve its IS strategic planning and is committed to maintaining leadership through use of IT. The future is very dynamic. Innovation and creativity is the key for further utilizing information systems in the future, which improve its service and innovation as a means of achieving differentiation thereby maintaining its position as market leader. ASDA Plc, has actively managed and used IT in the past to acquire its position as the leader. Currently, ASDA has been paying full attention to thrash out the à ¢Ã¢â€š ¬Ã‹Å"hard and à ¢Ã¢â€š ¬Ã‹Å"soft problems on IS strategic planning by adopting new technologies in time and keeping in mind the trends of customers in different parts of the country. At the same time the company has trained its staff to work online so that they feel more comfortable while managing online transactions and they should be more comfortable when receiving customers feedbacks to apply those suggestions in the e-commerce world. ETHICAL ISSUES IN TERMS OF IS STRATEGIC DESIGN Information technology is basic and core part of approximately all multinational organizations to do every task in the day to day life. In MNCs the management has to organize the systems and personnel relating to IT. Managing people and IT systems at the same time is a difficult task in itself. Managers have to consider many issues relating to client privacy and the use of systems in a proper and ethical manner. There are many ethical issues while considering the IS strategic planning and few of them will be discussed here. The professional code of conduct for IT professionals is our guide in explaining different ethical issues that could be encountered in an information systems environment. The first one is the privacy issue. People are in danger of losing their private data as Information Systems grow day by day and more data is being written electronically. Furthermore the privacy of customers or the employees is at risk when project developers require this information for planning a task. This approach will greatly damage the personal privacy and is definitely not ethical in any way. Organizational privacy is also at risk when managers access electronic information and this information become more and more common among personnel. Systems should be in place so that IS strategies include these privacy issues and avoid wide spread of organizational data. Business ethics is the art and discipline of applying ethical principles to examine and solve complex moral dilemmas. Business ethics asks, à ¢Ã¢â€š ¬Ã…“What is right and wrong? good and bad?à ¢Ã¢â€š ¬? in business transactions (Bream, 2008) Although no one à ¢Ã¢â€š ¬Ã…“bestà ¢Ã¢â€š ¬? definition of business ethics exists, the consensus is that business ethics requires reasoning and judgment based on both principles and beliefs for making choices that balance economic self-interests against social and welfare claims. It could be argued that the development of technology has become the cornerstone of business communication. (Bream, 2008) confirmed that through E-Commerce, business transactions can be done effectively and instantaneously through the use of security code called Cryptography. (Dickinson, 2008) In which the funds transaction is processed and confirmed electronically by converting information into algorithm to prevent unauthorized viewing or alteration of information. This form of transaction provides integrity, efficiency, reliability and credibility to parties involved in the transaction and the communication is in line with the ethical code of conduct (Doyle, 2002). CONCLUSION From this report author can see the future direction of information technology. Author tried his best to do this report after a lot of readings and consultation. Nowadays, IT is a major source for Education, Health, and retail and in any kind of business. The rapid growth of the Internet eclipses all other forms of mass-communication in the developed world. Some experts believe that one billion people may be connected to the Internet by 2010. This expansion is driving dramatic increases in investments in computers, software, services, and communications, and has acted as a catalyst for the wide range of business and social changes. All this investment in bigger and better computers and networks ensures that the information technology provide higher services at lower cost even as the volume of consumers increases dramatically. Authors selected Multinational Company was analysed as to how well the organization has been in information systems technology. First of all the impact of new i nformation systems on the organizations strategic planning was assessed as to how online shopping has affected the companys overall planning and performance. Then the potential hard and soft problems were discussed in planning the information system strategic planning. And finally few of the ethical issues were discussed in terms of information systems strategic planning. REFERENCES: * Arnold, M., and Politi, J. (2007). à ¢Ã¢â€š ¬Ã‹Å"Rockier route to buy-out success, Financial Times, London.# * Anne, K. Tenzin, W. (2006), Unbounded Wholeness : Bon, Dzogchen, and the Logic of the Nonconceptual 20/02/2010,oxford university press, USA. https://site.ebrary.com/lib/uclan/docDetail.action?docID=10283722p00=unbounded%20mind * Bream, R. (2008). à ¢Ã¢â€š ¬Ã‹Å"Use less power to cut emissions, Financial Times, London. * Davies, B. A. (2006), Business, Economics and Enterprise- Teaching School Subjects, London, 11-19, Routledge. * Dickinson, H. (2008). https://www. kpmg.co.uk/industries/cm/r/ht.cfm#ii [Online]. * Doyle, P. (2002). Marketing Management and Strategy 3d ed., Pearson Education. * Hawkes,J.(2008).https://business.timesonline.co.uk/tol/business/industry_sectors/retailing/article3827752.ece * Ian, I Mitroff Harold, A Linstone. (1993), The unbounded mind: breaking the chains of traditional business thinking. * Lederer, A. Salmela, H. (1996), Toward a theory of strategic information systems planning.  · Pun, K. Lee, M. (1998), A proposed management model for development of strategic information systems. The International Journal of Technology Management, Special Issue on the Information System Technology on Operations Management, 1998.  · Warren, R. (2000), E-Marketplace, Successful Strategies in B2B E-Commerce, 9780071361231 9780071380126, 21/02/2010, McGraw-Hill Professional Book Group, https://site.ebrary.com/lib/uclan/docDetail.action?docID=5002546p00=ecommerce Image Reference:- Pest Analysis: https://www.marketingteacher.com/IMAGES/pest_logo.gif UK online shopping sales April 2000 to December 2008: https://www.imrg.org [Attiq Ur Rahman] [Strategic Business Analysis]. PGD In SBIT Sept 2009

Wednesday, May 6, 2020

Importance of Cyber Security - 1744 Words

The nation has become dependent on technology, furthermore, cyberspace. It’s encompassed in everything we deliver in our daily lives, our phones, internet, communication, purchases, entertainment, flying airplane, launching missiles, operating nuclear plants, and implicitly, our protection. The more ever-growing technology empower Americans, the more they become prey to cyber threats. The United States Executive Office of the President stated, â€Å"The President identified cybersecurity as one of the top priorities of his administration in doing so, directed a 60-day review to assess polices.† (United States Executive Office of the President, 2009, p.2). Furthermore, critical infrastructure, our network, and internet alike are identified†¦show more content†¦(United States Executive Office of the President, 2009). Though seemingly constructive measures, this order falls short within the administration. The success of the administration’s 60-day policy review relied heavily on report findings, however privacy of information placed barriers on the mission, moreover, the issue of classified information presented challenges. The final report delivery made a powerful statement about cybersecurity threats and urgency, and the administration’s need to communicate a response. (Cate Laurie, 2009). Consequently, this prompted the president to appoint a privacy official reporting to the new cybersecurity coordinator. As the current administration acknowledges the majority of infrastructure is owned and operated by the private sector, it’s noted that the president is adamant that his administration won’t dictate security standards instead they will work together to find technology solutions. (Cate Laurie, 2009). Also noted during the President’s East Room announcement was his promise on a new approach to keep and protect the American’s personal privacy. To date, no real action has been implemented to solidify any legal change. Administrative Policy Differences Cyersecurity has been on the forefront of policy priority for legislative administration for several years, cybersecurity protection doesn’t fit into conventional or traditional security problems. As technology has advanced,Show MoreRelatedThe Importance of Cyber Security1093 Words   |  4 Pagesuse and lack of protection from cyber security, more and more people are becoming victims of cyber bullying, or the teasing and discrimination of others through online sources. The internet not only offers communication tactics, but also ways to keep track of your finances and shop from home. Identity theft through hacking is well known among the ones who risk putting their personal banking information online. Because of all the crime, the demand for cyber security is steadily increasing. With jobRead MoreCyber Defense And Security Issues789 Words   |  4 PagesUnderstanding cyber defense and security issues such as cyber-crime and cyber-attacks ensure efficient functioning of inf ormation systems. Cyber-attacks are real, unexpected and increasing in numbers according to Naumovski and Kenkov (2014) cyber defense is emerging as a high priority with the increased use of information technology. Naumovski et al. (2014) noted that understanding cyber defense and security issues would ensure efficient operation of information systems. Naumovski et al. (2014)Read MoreThe Internet And Its Effects On The Environment1538 Words   |  7 Pagesthe Canadian government has published â€Å"Canada s cyber security strategy: For a stronger and more prosperous Canada†, a strategic platform to secure the Canadian cyberspace. However, although embracing cyber technology and obtain considerable advantages from it, the Canadian cyber security strategy does not reflect as a comprehensive strategic framework. This essay argues that the strategy lacks of substantial elements to deal with a wide range of cyber threats in today’s modern world. For this reasonRead MorePrevention / Containment Measures For Cyber Threats1406 Words   |  6 Pages1. Prevention/Containment Measures for Cyber Threats. Protecting classified documents or valuable information is very hard against any kind of cyber-terrorism, there are no universal safeguards. There is no existence of any agreement or policy to define cyber-terrorism. Threats can come from hackers, criminal group or terrorist group; governments use computers and internet to attack without knowing the victims. It is not easy to stop such attacks but not impossible to stop if following basic preventionRead MoreThe Prospect And Challenges Of Cyber Security Insurance922 Words   |  4 Pages2.0 Introduction This chapter presents the prospect and challenges of cyber security insurance among It practitioners in the United Kingdom based on the literature that had been reviewed in the process of writing this paper. This chapter will draw upon results of earlier studies and reports to provide a theoretical framework to answer the research questions of the paper. 2.1. Cyber security and its importance to the modern lives In line with technological advances and the evolution of the internetRead MoreAmerica And Its Homeland Security Online Essay1587 Words   |  7 PagesAmerica and Its Homeland Security Online Abstract: Everyday security is provided by the states and federal government. These tasks get more difficult as new technology introduces itself. Cybersecurity is one of the most popular security sectors in today’s world. There is not only cyberbullying going on in the world. Terrorism can be planned and sent from person to person over the internet. People’s identities are being stole to help carry out these terrorist acts and this is just the being of itRead MoreThe Threat Of Cyber Security1452 Words   |  6 PagesThe purpose of this briefing is to: †¢ Clarify the importance of cyber security in marketing †¢ Educate employees on the importance of cyber security in the workplace †¢ Explain to marketer why they are targets of cyber security attacks †¢ Educate employees on how they can prevent cyber attacks Informing and educating employees on why cyber-attacks are becoming more prevalent and how to identify and prevent them gives an organization ease of mind. A cyber breach or attack is inevitable, however mitigatingRead MoreThe Impact Of Stuxnet Worm On The World s Nuclear Facilities1340 Words   |  6 Pagesautomatically activates other copies of the worm on the same network, and it activates its rootkit, which allows it to hide its processes and activity on the local computer as well as the entire computer network. Kaspersky Lab, an international software security group operating in almost 200 countries and territories worldwide, concluded that the attack â€Å"is a one-of-a-kind, sophisticated malware attack backed by a well-funded, highly skilled attack team† and that the â€Å"attack could only be conducted withRead MoreInformation Is A Source Of Power In International Relations.967 Words   |  4 Pagesfunctioning of a state. However, when any state places enough impor tance on a resource of power, that resource becomes a target. An attack on informational structures of a state are cyber-attacks or â€Å"the use of computational technologies in cyberspace for malevolent and destructive purposes in order to impact, change, or modify diplomatic and military interactions between entities† Cyber-attacks are increasingly becoming daily security threats in both private and public sectors of a state. In 2016Read MoreCyber Threats931 Words   |  4 PagesTOP FIVE CYBER SECURITY THREATS FOR 2012 11 August 2012 ABSTRACT The ten cyber security threats in the IT world are boosts in mobile drives and in security tasks, increased C-suite targeting, growing use of social media that will contribute to personal cyber threats, being already infected, and everything physical can be digital. This paper discusses what these threats are, how to defeat and/or demonstrate proficiency in defeating the cyber threats, and the rising

Teletech Corporation Case Analysis free essay sample

In this scenario Margret Weston, received a letter. In the letter she found out that Yossarian acquired 10% of the company’s stock. This aggressive move by Yossarian was motivated by the company management not doing their job to maximize shareholders wealth. Moreover, the managers were having issues with the hurdle rate, because it is just generally accepted, but not scientifically proven. On the other hand one TV Commentators opinion about Teletech Corp. is that â€Å"there is no way to have a hostile takeover in this sector, but for the Teletech Corp. there are many reasons to try.† Teletech Corp. has two major business segments, Telecommunication Services and both Product and System Manufacturing make up the other segment we will analyze. The ROC of both the segments combined for a firm Return on Capital of 9.58%. In addition to this, the company is expecting a decrease in revenue in both segments. Margret Weston and company have been calculating returns using method of economic conditions to create value for the company. The economic condition is a model which includes differences between the rate of Capital (ROC) and Hurdle rate multiplied by the Capital employed. This Economic Condition Model is generated on the assumption based and rated according to the Weighted Average Cost of Capital, furthermore the ROC is calculated by Net Operating Profit After Taxes divided by Capital used. See Exhibit #4 The opposing arguments include a variety of topics, such as how the two businesses differ in risk, and the appropriateness of measuring all projects against the corporate hurdle rate of 9.3%. Our discussion will focus on explaining how the company is being mismanaged and how it should respond to Yossarian accusations, starting with hurdle rate. In general, hurdle rate is the minimum amount of return on a project the company is willing to accept before starting a project. Here, Teletech Corp. currently uses the hurdle rate as a tool for evaluating its economic profit and NPV value based on the beta, cost of capital, and the estimation of Teletech’s Weighted Average Cost of Capital (WACC). By using the hurdle rate measurement, they assume both of the two businesses (Telecommunications and Products Systems) are sharing the same risk. Part of management is content with allowing this hurdle rate to manipulate the firms opportunity cost,  while still a handful of managers and the Vice President Rick Phillips disagree. They disagree advocating that it is not scientifically proven, but generally accepted and should be recalculated individually for each segment according to Mr. Phillips. It was suggested by Mr. Phillips that multiple hurdle rates should be implemented since different business units obtain different risks. Therefore, based on the data from exhibit 3 titled Sample of Comparable Firms, we took the average beta and weight of debt (debt/capital) from Telecommunications Services Industry to re-evaluate its WACC (hurdle rate). This calculation gave Teletech’s Telecommunications segment a new hurdle rate of 8.471%. Then we took the mean from average number of betas and weight of debt for P/Ss and found the its new hurdle rate to be 11.399% based on the information of Telecommunications Equipment Industry, Computer and Network Equipment Industry. Our findings conclude that the WACC of Telecommunications is lower than the overall firm, whereas the WACC of P/Ss is higher instead as seen on the table and graph below. 3. Interpret Rick Phillip’s graph (Fig 2). How does the choice of constant vs risk-adjusted hurdle rate affect the evaluation of Teletech’s two segments? What are the implications for Teletech’s resource allocation strategy? Looking at the graph above, when Teletech Corp. uses the constant hurdle rate, Telecommunications services which earns 9.1% on capital is underneath of the company’s hurdle rate. Moreover, the PS which promises to earn 11% on capital is above the company’s hurdle rate. However, the result may be reversed by looking at the graph with adjusted risk hurdle rates. It is clear that company is doing better than they should in the telecommunication segment, because they are getting higher return in comparison to the risk they are taking. On the other hand, PS segment is not doing as well as it should, because return is getting lower than the risk taken by the company. That is to say, constant and risk-adjusted hurdle rate lead to the different results when Teletech Corp. evaluated its ROR. Implications that company are facing in this strategy are that they are going with the constant hurdle rate for all of its segments, which is not viable. For this reason the company is not adding the extra value of the NPV that these segments are producing and resulting in a lower value for the shareholders. 4. Do you agree that â€Å"all money is green†? What are the implications of that view? What are the arguments in favor (against) that view? We are not agreeing on the fact that all money is green when the money from the company is being mismanaged. A firm would logically not accept risky projects that would not provide a significant return, but in the case of Telecommunications Corp. that is exactly what they are doing by using consistent hurdle rate that covers up risky projects. Funds that are used towards risky projects that generate little or no return should not be considered green. If you look at Exhibit #5 which adjust for the individual risk of each segment then you will see that the economic profit adjusted risk puts Telecommunications with $81,692,307.71 Positive and for product and systems it is a Negative (17,454,545.46). From an investors stand point in order for money to be consider green, the company’s money must be used efficiently, and generate decent returns based on risk. This mismanagement  may very well be equivalent to rat-hole investments, which will decrease the company’s value. We disagree with her statement based Teletech Corporation’s, because the assets under the Products and Systems subsidiary are riskier, as is validated by the lower credit rating for the riskier assets (Exhibit). On the other hand, if we invest all of our capital in the telecommunication segment, then we generate an extra value for the company, because it is less risky and it generates more value for the shareholders on the basis of more return on capital. In addition, if we consider Economic profit we can clearly generate a higher profit in telecommunication segment by taking the risk adjusted rates. So, in our opinion Helen Buono was incorrect by saying that management would destroy value if the entire firm’s asset were redeployed in the telecommunication segment. The product and system manufacturing segment is destroying value for the firm because it is making a lower return, in comparison to the risk it is taking. If we going to find its NPV with the rate of 11.4%, than the NPV will come in negative because product and system segment is just producing 11.1%, which will destroy the value of the company by .3% of the capital invested in that segment.(consider Mr. Phillip’s graph) In conclusion, in response to the letter sent by Yossarian, Teletech should say that they are doing well as a company in telecommunication sector. Teletech is generating a higher return on the risk they are taking in telecommunication segment. Teletech is also adding value to its shareholders by generating that extra percent on the capital invested in telecommunication segment. In addition to that we think that Teletech should reduce the investments in the product and system segment, because it is not generating the revenues that it should as an investment in that risky category. So, if Teletech going to lower the investment in product and system segment, and increase the investment in telecommunication segment, than Teletech will generate a higher NPV and higher value for its shareholders.

Wednesday, April 22, 2020

The Constitution in Public Administration A Report on Education

The American constitution is supreme to other laws in the country; with this notion, public administration must follow the demand of the constitution. The constitution should be the overall law that governs issues and management of public institutions; in some instances, the constitution may have some bureaucracy that hinders efficiency among public administrators however it is normative that the administrators understand the requirements of the law and follow them.Advertising We will write a custom essay sample on The Constitution in Public Administration: A Report on Education specifically for you for only $16.05 $11/page Learn More In some cases, the constitution is seen to offer some stuck guidelines that are only needed to be followed for the general good of the law. Some scholars have argued that some of the demand made under the constitution lead to designs of inefficiency among public institutions. Among public administration causes, there have b een debates and recommendations that the rule of law should be taught; this is to facilitate knowledge among them and ensure when they are taking the oath of office, they understand what they are committing themselves to. In general the oath mandates them to uphold the rule of law and act ethically for the general good of the entire society (Rorh, 1982). Ethics and Comparative Administration Public servants of U.S. bureaucracy system are expected to uphold high degrees of ethics when working and performing their tasks; the general belief is that the constitution has some frameworks that can be used as the pillars of ethical code of conducts. The constitution should protect moral aspects of human being respecting ones fundamental rights and freedom. According to the article, democracy has an effect on bureaucratic ethics, there is need to have freedom of choice and expression. Although the bureaucratic ethics notion, the system of operation that administrators should adopt should res pect the rule of law and ensure that they perform their duties diligently, professionally, with the heart and the interests of the larger majority in their heart. I agree with the argument that democratic governance is the foundation of bureaucratic ethics; this is so because when the ruling class adopts effective systems of governance, the policies they make will be ethical and for the general good of the society. For example, the police are expected to ensure justice prevails in the society; they should have effective systems of administration. For instance, when a crime has been committed that calls for the use of public funds, police should not use the amounts selectively, they should have the same policy.Advertising Looking for essay on public administration? Let's see if we can help you! Get your first paper with 15% OFF Learn More According to my belief, the society can attain high levels of bureaucratic ethics however there is need to have a central body that c ontrols the flow and direction that behavior among administration officials follow. In the case that there is conflict of issues, the administrating central body should prevail. In a nation’s administration, democracy backed with the constitution stands a better chance to maintain bureaucratic ethics (Rorh, 2007). Conclusion In the administration of social policy, public officials should uphold professionalism, integrity, and ethical behavior. For uniformity, governments need to enact policies that reinforce the rule of law and administration of justice; the constitution is supreme thus it should have guidelines to governance frameworks that support ethical behavior among citizens. Constitution as a course in tertiary education should not be limited to administrators but should be a common course in all professions; this will facilitate administration of justice and respect of fundamental rights freedoms. References Rorh, J. (1982). The Constitution in Public Administration: A Report on Education. American Review of Public Administration, 16(4), 429-440. Rorh, J. (2007). Ethics and Comparative Administration: A Constitutional Commentary. American Review of Public Administration, 10(1), 65-74. This essay on The Constitution in Public Administration: A Report on Education was written and submitted by user Boston Kline to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.