Why should resources be a concern in a global strategy

2 pages

Mike, one of the marketing strategists on your team, stops at your office door wanting to talk. “We use fabrics that are made domestically; however, there are issues with using these same fabrics globally. There are laws and regulations that prevent us from shipping these fabrics to other countries. This is a huge concern. One of our primary selling points is the consistency of quality of our product.”

You confirm Mike’s concern, “That’s an excellent point,” you say. “Now you’ve just given yourself and our team more work for the presentation. I’m sure that will come up. One of the board members used to run a textile plant in China.”

Mike nods his head in agreement. “I imagine textiles will not be the only resource concern,” he says.

Consider the following in your response:

  1. Why should resources be a concern in a global strategy?
  2. What resources may be a concern in the country you      selected?
  3. How will this impact the decision to move to the      country that you selected?
  4. How will this impact your competitive strategy in your      global market?

How do you define a global strategy

Unit 1 DC #2

500 words

  1. As the firm looks for ways to offset the domestic downturn in sales, Deborah, the CEO of your company, wants to determine if a global strategy is a good fit for the organization.  She has designated you as the manager for this project.  You will work with your team to develop a global marketing plan for your organization.
  2. You begin your research in deciding if and what the global strategy should be. You get your team together and begin to discuss a plan on how you will research this possibility.
  3. You start the meeting by saying “Let’s brainstorm and start to get a plan together for a possible globalization strategy. Tiffany, I’d like you work with me to begin researching possible locations.”
  4. Tiffany says, “I think we need to research some locations, but I think there is more to it than that. There still needs to be a decision on the type of strategy or approach we are taking. Would we use a multidomestic approach, a global approach, or a transnational approach? I’m still not entirely convinced a global strategy is the answer.”
  5. “Great point, Tiffany. It is obvious to me as well that we need to explore a strategy that will put us in a better position to handle the economic downturn. We have to provide the board with the facts. They seem to be leaning in the direction of a global strategy, but I’m not sure it’s the right move either. That’s why we need to do research.”
  6. Domestic profit margins have dropped by 2% this quarter. You wonder how you and your team can help fix this. Is a global strategy the answer, or should the company continue to focus on the domestic market?
  7. You call a team meeting to learn about the progress of their research.
  8. Tiffany, one of your team members, begins the discussion. “I think we need to look at some of the internal factors,” she says. “We know what our capabilities are on the domestic front, but what about in the global market? We have a fairly strong market presence here in higher-end markets, but how does that translate globally?”
  9. Discuss the following:
  1. How do you define a global strategy? Compare and      contrast global strategy with other international expansion strategies.
  2. Identify a minimum of 3 possible countries for      globalization. Research each of these locations in the furniture industry,      and document both the pros and cons of using these in global strategy.
  3. What country would you choose? What evidence can you      provide in support of your choice?
  4. What evidence might somebody else, who does not agree      with you, provide to support an alternative choice?
  5. Recommend two or three areas to benchmark in      preparation for the decision regarding global expansion. MUSE materials      provide information regarding this topic.

Briefly interpret the descriptive data analysis

Instructions

For this assignment, you will undertake an analysis based on a self-designed fictitious study that utilizes statistical methodologies. You will first develop a fictitious problem to examine – it can be anything. For example, maybe you want to look at whether scores on a standardized college placement test (like the SAT) are related to the level of income a person makes 10 years after college; Or, whether those who participate in a Leadership Training program rated as better managers compared to those who do not; Or, whether ones political affiliation is related to gender. These are just a few examples; be creative and think about what piques your interest. You might also address a problem that you may want to look at in future research for a dissertation.
Your analysis report should include the following components:

1. Describe your research study.

2. State a hypothesis.

3. List and explain the variables you would collect in this study. There must be a minimum of three variables and two must meet the assumptions for a correlational analysis.

4. Create a fictitious data set that you will analyze. The data should have a minimum of 30 cases, but not more than 50 cases.

5. Conduct a descriptive data analysis that includes the following:

a. a measure of central tendency

b. a measure of dispersion

c. at least one graph

6. Briefly interpret the descriptive data analysis.

7. Conduct the appropriate statistical test that will answer your hypothesis. It must be a statistical test covered in this course such as regression analysis, single t-test, independent t-test, cross-tabulations, Chi-square, or One-Way ANOVA. Explain your justification for using the test based on the type of data and the level of measurement that the data lends to for the statistical analysis.

8. Report and interpret your findings. Use APA style and include a statement about whether you reject or fail to reject the null hypothesis.

9. Copy and paste your data output and place it in an appendix.

Remember, the goal of this project is to show what you have learned in the course. Therefore, this project becomes a cumulative learning project where you can demonstrate what you have learned through all the previous assignments, readings and video presentations that you have watched.

Length: 12-15 pages not including title and reference pages
References: Minimum of 5 scholarly resources.
Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your paper should reflect scholarly writing and current APA standards.

Explain the positives and negatives of the implementation process

Please write a 2-3 page paper outlining either an opportunity that you had implementing an organizational policy or being the recipient (client) of an organizational policy being implemented. Please consider the information in lesson two as you write this assignment. If you have not had this experience, please interview someone that you know in an organization who has had either of the two experiences.

· Identify the type of policy that was implemented. Explain the reasons supporting the implementation of the policy.

· Explain the positives and negatives of the implementation process. This section could include feedback received from the clients using the policy.

· Identify challenges or successes of the policy being implemented.

· As a human resources consultant involved in the implementation process, what changes or different strategies would you recommend to the implementation process.

Must be in APA format.

Please write a 2-3 page paper outlining either an opportunity that you had implementing an organizational policy or being the recipient (client) of an organizational policy being implemented. Please consider the information in lesson two as you write this assignment. If you have not had this experience, please interview someone that you know in an organization who has had either of the two experiences.

· Identify the type of policy that was implemented. Explain the reasons supporting the implementation of the policy.

· Explain the positives and negatives of the implementation process. This section could include feedback received from the clients using the policy.

· Identify challenges or successes of the policy being implemented.

· As a human resources consultant involved in the implementation process, what changes or different strategies would you recommend to the implementation process.

Must be in APA format.

Identify and describe the diverse population and the unique characteristics and/or the distinctive needs of the population in 3 to 4 brief sentences

Piedra and Engstrom (2009) noted how the life model “remains general and unspecific regarding factors that affect immigrant families” (p. 272). Recall that there will never be one theory or a model that can fully explain a phenomenon or lay out all the steps and procedures when working with complex issues that clients present to social workers. Recognizing this, Piedra and Engstrom selected another theory in the immigration literature—segmented assimilation theory. They identified concepts from segmented assimilation theory to “fill in” the gaps that the life model does not address.

In this Discussion, you examine gaps in the life model by applying it to your field experience.

Post:

Using an example from your fieldwork experience (Georgia Department of Family and Children Services) and a diverse population you encountered at the agency (for example, in Piedra and Engstrom’s article, it was immigrant families), respond to the following:

  • Identify and describe the diverse population and the unique characteristics and/or the distinctive needs of the population in 3 to 4 brief sentences.
  • Explain how the life model can be applied for the population.
  • Explain where the gaps are in applying the life model for this population.
  • When looking at the gaps, explain which theory might be helpful in filling the gaps of the life model when working with this population.

https://www.jstor.org/stable/30015414?seq=1#page_scan_tab_contents

Explain how each fundamental design principle is integral to process improvement within the logistics and distribution industry

“Fundamental Design Principles” Please respond to the following:

  • Explain how each fundamental design principle is integral to process improvement within the logistics and distribution industry.
  • Explain why adhering to the four fundamental design principles are important considerations when developing secure applications.
  • Explain how each fundamental design principle is integral to process improvement within the logistics and distribution industry.
  • Explain why adhering to the four fundamental design principles are important considerations when developing secure applications.
  • Explain how each fundamental design principle is integral to process improvement within the logistics and distribution industry.
  • Explain why adhering to the four fundamental design principles are important considerations when developing secure applications.

Explain  the difference between a threat and a vulnerability

Question 1

W2DQ Week 2 Discussion Question

Explain  the difference between a threat and a vulnerability.

Your initial response is due by Thursday 11:59PM. It must be at least 250 words and have references.

Your grade will reflect both the quality of your initial post and the depth of your responses. Refer to the Discussion Forum Grading Rubric under the Settings icon above for guidance on how your discussion will be evaluated.

Guided Response: Respond to at least two of your classmates’ posts. Evaluate their discussions by agreeing, disagreeing, or adding other ideas to strengthen or enhance the perspectives presented in their initial posts.

Question 2

W2P Week 2 Paper

Discuss the the threats and vulnerabilities to Access Control and what business must do to be protected.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Question 3

JW2 Journal Week 2

Enter a brief paragraph of what you learned this week.

Question 1

W2DQ Week 2 Discussion Question

Explain  the difference between a threat and a vulnerability.

Your initial response is due by Thursday 11:59PM. It must be at least 250 words and have references.

Your grade will reflect both the quality of your initial post and the depth of your responses. Refer to the Discussion Forum Grading Rubric under the Settings icon above for guidance on how your discussion will be evaluated.

Guided Response: Respond to at least two of your classmates’ posts. Evaluate their discussions by agreeing, disagreeing, or adding other ideas to strengthen or enhance the perspectives presented in their initial posts.

Question 2

W2P Week 2 Paper

Discuss the the threats and vulnerabilities to Access Control and what business must do to be protected.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Question 3

JW2 Journal Week 2

Enter a brief paragraph of what you learned this week.

Discuss how cloud computing can reduce costs while providing a robust technological environment to improve organizational effectiveness

“Cloud Computing” Please respond to the following:

  • Consider the three component layers of cloud computing, and explain in your own words how each layer of technology is related. Ensure that each layer is addressed.
  • Discuss how cloud computing can reduce costs while providing a robust technological environment to improve organizational effectiveness. Support your answer by using a specific business sector or industry (i.e., manufacturing, distribution, government, educational services, technology, and computing).
  • Consider the three component layers of cloud computing, and explain in your own words how each layer of technology is related. Ensure that each layer is addressed.
  • Discuss how cloud computing can reduce costs while providing a robust technological environment to improve organizational effectiveness. Support your answer by using a specific business sector or industry (i.e., manufacturing, distribution, government, educational services, technology, and computing).
  • Consider the three component layers of cloud computing, and explain in your own words how each layer of technology is related. Ensure that each layer is addressed.
  • Discuss how cloud computing can reduce costs while providing a robust technological environment to improve organizational effectiveness. Support your answer by using a specific business sector or industry (i.e., manufacturing, distribution, government, educational services, technology, and computing).

Compare and contrast the assessment steps provided by the OPM3 Model presented in the first article with the CMMI-DEV-v1.2 process framework presented in Appendix 1A of the textbook

  • OPM3® Case Study: OPM3 in Action: Pinellas County IT Turns Around Performance and Customer Confidence”.
  • “IT project management and virtual teams”. SIGMIS CPR ’04 Proceedings of the 2004 SIGMIS conference on Computer personnel research: Careers, culture, and ethics in a networked environment, pages 129-133. Note: This article can be found in the ACM Digital Library

Write a two to three (2-3) page paper in which you:

  1. Identify the common challenges that exist within IT projects based on the first article. Highlight the best practices that could be linked to the successful performance of IT project teams.
  2. Determine at least three (3) challenges that exist when working with virtual teams based on the second article titled “IT project management and virtual teams”. Analyze how the efficient management of these challenges influences the success of project deliverables.
  3. Based on the lessons learned within the first article titled “ OPM3® Case Study: OPM3 in Action: Pinellas County IT Turns Around Performance and Customer Confidence”, draw a workflow diagram to show how a project should initiate to gain support from the various project stakeholders. Use the graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.
  4. Compare and contrast the assessment steps provided by the OPM3 Model presented in the first article with the CMMI-DEV-v1.2 process framework presented in Appendix 1A of the textbook. Discuss how the CMMI maturity levels are related to the assessment steps.
  5. Summarize at least three (3) CMMI processes that can improve the productivity of virtual teams. Determine the three (3) most significant measures and the activities associated with each process. Note: Refer to table 1A.4 in Chapter 1 of the textbook for information on purposes of the CMMI-DEV-v1.2 processes.

TELECOMMUNICATIONS AND NETWORK SECURITY

WEEKLY PAPER and Final paper

Work on your weekly paper. Use APA guidelines.

Final Project  – There is a research paper for this course. We will work on the sections of this paper in our weekly assignments. APA format will be followed for all writing submissions. The topic is based on questions, concerns, or recommendations driven by one of the chapter topics that will be covered in the course. You create the question, then you do the research to support an answer that would add to our body of knowledge on the topic. For this assignment, the student is to select one topic, and then for the next eight weeks write and research about the topic selected. Each week, you will work on the assignment building out the paper. At the end of seven weeks, you will have a research paper which you will submit for the eighth week in a Word Document. Any reference to a text other than the O’Hanley & Tiller Information Security Management Handbook is incorrect. Please see the attachment for text. You must use the Attached Text for the research paper. Any reference to a text other than the attached text is incorrect. This is the sole text for the paper. The chapter topics are in the text attached.

The chapter topics that will be covered in the course are as follows;

TELECOMMUNICATIONS AND NETWORK SECURITY

Securing the Grid

Network Attacks and Countermeasures

INFORMATION SECURITY AND RISK MANAGEMENT

Security in the Cloud

Getting the Best Out of Information Security Projects

Mobility and Its Impact on Enterprise Security

An Introduction to Digital rights Management

Information Security on the Cheap

Organizational Behavior (Including Institutions) Can Cultivate Your Information Security Program

Metrics for Monitoring

Security Implementations of Bring Your Own device, IT Consumerization, and Managing User Choices

Information Assurance: Open Research Questions and Future Directions

Protecting Us from Us: Human Firewall Vulnerability Assessments

APPLICATION DEVELOPMENT SECURITY

Service-Oriented Architecture, Managing the Security Testing Process, Security Resilience in the Software Development Life Cycle

CRYPTOGRAPHY

Cloud Cryptography

SECURITY ARCHITECTURE AND DESIGN

Identity and Access Management Architecture, FedRAMP: Entry or Exit Ramp for Cloud security?

OPERATIONS SECURITY

Data Storage and Network Security

LEGAL, REGULATIONS, COMPLIANCE, AND INVESTIGATIONS

Information Law, National Patient Identifier and patient Privacy in the Digital Era

Addressing Social Media Security and Privacy Challenges, Compliance, PCI Compliance

LEGAL, REGULATIONS, COMPLIANCE, AND INVESTIGATIONS

Investigations, What Is Digital Forensics and What Should You Know about It? eDiscovery

Overview of the Steps of the Electronic Discovery Reference Model, Cell Phone Protocols and Operating Systems, Categories of Computer Crime.

NOTE: After you have selected a topic from the above chapter topics. You follow the weekly instructions below:

Week 1 – Select your topic. Explain why you selected the topic and include a theological statement. (250 – 350 words)

Week 2 – What are the key issues about the topic you selected? (250 – 350 Words)

Week 3 – Compare and contrast your topic as it relates to information security management. (250 – 350 Words)

Week 4 – What information security management technologies can be applied to your topic? (250 – 350 Words)

Week 5 – How can you try to resolve the issues of the topic you selected? (250 – 350 Words)

Week 6 – What is the future of this topic in regard to technology? (250 – 350 Words)

Week 7 – What are future issues to be concerned with about your topic? (250 – 350 Words)

1. Turn-in of final project: Week 8 – Finalize your paper, develop an introduction and conclusion for the paper. Submit your paper (2,000 – 2,500 words). Be sure to address each of the following:

Use APA guidelines.

Check your spelling and grammar

Include at least 14 peer-reviewed sources.

Add narrative transitions where appropriate.

Incorporate what you have learned from the weekly Blackboard discussion questions.

Include a Table of Contents.

Include a References section in the back.