Tuesday, May 19, 2020

Toys Project - 34340 Words

UNIVERZA V LJUBLJANI EKONOMSKA FAKULTETA SPECIALISATION THESIS Tatjana MEDIC UNIVERZA V LJUBLJANI EKONOMSKA FAKULTETA PODIPLOMSKI STUDIJ SPECIALISATION THESIS International Business Strategy Of Toysâ€Å"R†Us For The Norwegian Market Ljubljana, May 2002 Tatjana MEDIC Conformation Tatjana Medic, a student of the University of Economics in Ljubljana, hereby confirms to be the author of this specialisation thesis written under the guidence of Professor Tone Hrastelj. Pursuant to 1st paragraph of the 21st article of the Law of the author and legal rights I give the University of Economics in Ljubljana the right to use and publish this thesis. Ljubljana, 23 May 2002 Tatjana Medic Izjava Studentka Tatjana Medic†¦show more content†¦However, as recently as the 1970s, some governments and firms saw international marketing as an â€Å"optional extra† of minor importance. International business was typically considered a field reserved for a few trading companies and specialists. Other firms were content to focus on their domestic markets and disregarded international dimensions. Conditions have changed. Global trade has rapidly increased in both volume and value, reaching nowadays more than $4 trillion in 1997 (Daniels J.D., Radebaugh, 1998, pg. 529). Competition is fierce from all corners of the world. Failure at the global level can backfire and may consume existing brands and business relationships. At the same time, global opportunities have emerged that offer possibilities for growth, profit, and an improvement in worldwide standards of living. Today, firms have to deal with a global marketplace; marketers have no other choice. Participation in global marketing has begun to shift from a mere â€Å"option† to an imperative. The world is becoming more homogeneous. Distinctions between national marketsShow MoreRelatedToy Store And Gender Project1350 Words   |  6 Pages Toy Store and Gender Project On Saturday, the tenth of September 2016 I went to Target at 5pm with my roommates. As I walk to the toy aisle I saw parent with their young children. The store was busy but not crowded their where about five to ten families at the toy section. The adults in the toy section with children or without where mostly female. Target had multiple aisles for children’s toys it was divided pretty evenly between girls and boy’s toys with one or two aisles for newborns. Read MoreCourse Project – Sai Toys Essay3664 Words   |  15 PagesA Review of the IT System Course Project – SAI Toys A Review of the IT System Executive Summary The overview for SAI Toys is the company sells are manufactured in-house and shipped to brick-and-mortar retailers, such as Best Buy and Target, as well as e-Commerce only sites, such as ThinkGeek.com and Buy.com. The company has no direct interaction with the final purchasers (individuals) of their products other than through warranty service. SAI Toys is one of the leading manufacturers of productsRead MoreScope Statement For Sustainable Solar Toy Car Project1256 Words   |  6 PagesScope Statement for Sustainable Solar Toy Car Project Project Scope: Enough for everyone, forever. These words resonate with the ideas of limited resources, responsible consumption, equality and equity and a long-term perspective, all of them corresponding to important concepts of sustainable development (Coelho, D., Fernandes, S. (2013), Sustainable development includes addressing present needs without trading off the capacity of future generations to additionally meet theirs. The early childhoodRead MorePiaget Toy Project1500 Words   |  6 PagesPiaget’s Toy Experiment: What is safe for our children? Bergen Community College Abstract Piaget believed everyone had to go through each stage of development. Although some kids may show characteristics of more than one stage at a time, he was certain that cognitive development always followed the sequence of the stages, stages cannot be skipped, and each stage is marked by new intellectual abilities and more complex understandings of the world. With this experiment I will prove how each toy canRead MoreManagerial Finance Project Toys R1497 Words   |  6 PagesFinance - 1 - Managerial Finance Project Toys R in Brazil Managerial Finance - 2 - Summary My paper term paper is 8 - page for my managerial finance class that analyzes the prospects of Toys R for international expansion into Brazil . The analysis consists of financial analysis of the company and en vironment analysis of the country. It relies on eight external sources presented in APA format. Body of the paper Introduction Toys R Us Inc., is a leading toy and baby products retail companyRead MoreMy Child Develop Project On Matthew James Slusher1733 Words   |  7 PagesIntroduction I conducted my child develop project on Matthew James Slusher, a four year old little boy who resides in Southern California. He was born on May 14, 2012. He is an only child raised by his single mother Noemi Mamauag who gave me permission to use him for the experiment. I have known Matthew since he was born because he is my little cousin. I conducted the first observation on the 26th of November in his home in Fontana. The other two were done at my house in Fremont while they wereRead MoreAnne s First Street Preschool872 Words   |  4 Pagesused for this project is named C and he is almost 2 years old. The other girls named L, B, K, and T. L and B were twins who were 2 years old. K was almost 2. T was almost 3 years old. The boys, not including C, were D and M. D and M were both around the same age, almost 2 years old. The observation took place from 8 to 9:30, when the children went outside to play. The room was a small room. It had a table on one side with 8 chairs stacked together. The middle of the room was empty with toy bins aroundRead MoreToy Retailing in India7399 Words   |  30 PagesPROJECT REPORT ON Identification of locations for the toy retail venture between Reliance and Hamleys Table of Content: 1. Introduction 4 2. Problem Definition 4 3. Review of Literature 5 4. Research Gap Analysis 7 5. Problem objective 7 6. Data to be Used 8 7. Research Design 8 Type of research 8 Methodology 8 Primary Survey 8 Experiential Survey 8 Data Collection Method 9 Secondary Sources 9 8. Toy Industry In India: 9 ToysRead MoreThe Necessity For An Alternative Toy For Girls2302 Words   |  10 Pages Mature Barbie: The Necessity for an Alternative Toy for Girls What is the first toy someone thinks to give a little girl? A doll or perhaps the most popular doll the Barbie. Many people’s first instinct to give a little girl for a toy is a Barbie doll. But, why does many believe that a Barbie doll is the most appropriate toy for young girls? Throughout history parents and others are influenced by the media that Barbie dolls make the best gift for girls. Despite the fact that many girls play withRead More The Benefits of Play Time for Children Essay1218 Words   |  5 Pagescalculate in his head what needs to go where (Strickland par. 1). The balancing, lifting, and carrying will help develop his cognitive skills because he will be using his mind to complete his project just the way he imagines it (Strickland par. 2). The movements and strategies that are accompanied by outdoor projects will enhance his motor coordination, and hone his timing skills (Muller par. 38). Dr. Katheleen Alfano, director research at Fisher Price, states tha t â€Å"a great deal of research has been

Saturday, May 16, 2020

Characteristics of an Entrepreneur Free Essay Example, 1500 words

Thirdly, Kirzner s view of the entrepreneur is who possesses unique knowledge, which enables him/her to extract economic rent from ignorance. Drucker refers to entrepreneurship as the attitude to change, to which he proposes: the entrepreneur always searches for change, responds to it and exploits it as an opportunity (2007; p. However, management researchers like Carlock (1994) and Grant and Perren (2002) and others have asserted that there no single accepted definition of entrepreneur in literature (Kruger, 2004). Based on different views, Carsrud and Brannback (2007; p. 10) have defined entrepreneurship as the process by which individuals-either on their own or inside organisations-pursue opportunities without regard to the resources they currently control. Al Shapero described entrepreneurial behaviour as the kind of behaviour that includes: taking initiative; organising or reorganising of social and economic mechanisms to turn resources and situations to practical account; an d the acceptance of risk and failure (Carsrud Brannback, 2007). Entrepreneurial persons are innovative and creative, but not necessarily inventors. They have a sense of excellence and highly self motivated which drives performance and achievement. Entrepreneurs work effectively in an impendent setting, and can flourish in an altruistic setting. We will write a custom essay sample on Characteristics of an Entrepreneur or any topic specifically for you Only $17.96 $11.86/page Keen observation and learning can help entrepreneurs to enhance their knowledge.

Wednesday, May 6, 2020

Analysis of Tintern Abbey by William Wordsworth Essay

Analysis of Tintern Abbey by William Wordsworth William Wordsworth existed in a time when society and its functions were beginning to rapidly pick up. The poem that he Composed a Few Miles Above Tintern Abbey, on Revisiting the Banks of the Wye, gave him a chance to reflect upon his quick paced life by taking a moment to slow down and absorb the beauty of nature that allows one to see into the life of things; (line 49). Wordsworths Tintern Abbey; takes you on a series of emotional states by trying to sway readers and himself, that the loss of innocence and intensity over time is compensated by an accumulation of knowledge and insight.; Wordsworth accomplishes to prove that although time was lost along with his innocence, he†¦show more content†¦Wordsworth stood on the cliff not only with the sense of present pleasure; (63) but he joyfully anticipated the moments for future years; (65). He came back to reality and began to analyze the situation after his reminiscing. Wordsworth realized that he had lost some guidance and w as searching for the presence of nature when returning to the Wye. He remembered when he used to wander and roam as free as a roe but as he matured he felt content with tapping into his memories of his youth because as Wordsworth stated, That time is past? other gifts have allowed; for such loss, I would believe, abundant recompense; (83-88). He realized that he was involved with more mature things in life because he had become more intelligent through the years and saw nature in the light of his intelligence. Yet, he insisted that he was still a lover of the meadows and the woods, and the mountains; and of all that we behold from this green earth; (102-105) but indeed, in a more composed way. Nature played a major role in this poets life but it was not all about his physical senses that he took as reality. It was due to the fact that he was a worshipper of Nature (152) and he knew that nature never did betray (122) him. And those thoughts were what had comforted and encouraged him to connect with nature through his mind. He wanted to affirm to his readers that his mind not only receives sensation andShow MoreRelated Analysis of William Wordsworths Lines Composed a Few Miles Above Tintern Abbey1065 Words   |  5 PagesAnalysis of William Wordsworths Lines Composed a Few Miles Above Tintern Abbey William Wordsworth poem Lines Composed a Few Miles above Tintern Abbey; was included as the last item in his Lyrical Ballads. The general meaning of the poem relates to his having lost the inspiration nature provided him in childhood. Nature seems to have made Wordsworth human.The significance of the abbey is Wordsworths love of nature. Tintern Abbey representes a safe haven for Wordsworth that perhaps symbolizesRead MoreComparing Tintern Abbey and I wandered lonely as a cloud1119 Words   |  5 PagesAn Analysis of Tintern Abbey and I wandered lonely as a cloud As in â€Å"Tintern Abbey†, â€Å"I wandered lonely as a cloud† portrays William’s mind working as a mirror by reflecting what comes to it. They are both experiential poems and contain glimpses of recollections from the inner mind. In both poems he speaks of the exquisite effect in which the outside world has upon him. He concludes â€Å"Tintern Abbey† with, â€Å"And this green pastoral landscape, were to me More dear, both for themselves and for thyRead More Tintern Abbey: Summary Essay1767 Words   |  8 PagesTintern Abbey: Summary William Wordsworth reflects on his return to the River Wye in his poem â€Å"Lines: Composed a Few Miles Above Tintern Abbey on Revisiting the Banks of the Wye During a Tour†. Having visited Wye five years prior, he is familiar with how enchanting the place is. He describes the natural wonders of the Wye, which travels past Tintern Abbey, a medieval abbey in the village of Tintern, which is in Monmouthshire, Wales. This Cistercian Abbey was founded by Walter de Clare, Lord ofRead MoreFew Miles Above Tintern Abbey Essay2283 Words   |  10 PagesLines Composed a Few Miles above Tintern Abbey Full Title: Lines Composed a Few Miles above Tintern Abbey; On Revisiting the Banks of the Wye During a Tour, July 13, 1798. Man and the Natural World This is one of the most important ideas of Tintern Abbey. The speaker of this poem has discovered, in his maturity, that his appreciation of natural beauty has allowed him to recognize a divine power in nature. Wordsworth comes up with this idea in Tintern Abbey, and then really explores and developsRead MoreContrast and Comparison of Wordsworths Tintern Abbey and Colderidges Kubla Khan1591 Words   |  7 PagesContrast and Comparison of Wordsworths Tintern Abbey and Colderidges Kubla Khan When comparing William Wordsworths Tintern Abbey, and Samuel Colderidges Kubla Khan, one notices a distinct difference in the use of imagination within the two poems. Even though the two poets were contemporaries and friends, Wordsworth and Colderidge each have an original and different way in which they introduce images and ideas into their poetry. These differences give the reader quite a unique experience whenRead MoreA Romantic And Modernist Perspective2041 Words   |  9 PagesKyle D. Brubaker Dr. Vernooy ENG-237-01 11 December 2014 Memory: A Romantic and Modernist Perspective During an age when Britain was producing more writing than perhaps ever before in its history; romantic writers such as Wordsworth and Coleridge place a large emphasis on nature and what impact this construct has on the mind and imagination, while modernist writers such as Hardy, Lawrence, and Yeats attempt to exercise a strong break from tradition. This ideal of â€Å"straying from the pack† createsRead More Critical Analysis of William Wordsworth and Samuel Taylor Coleridge2513 Words   |  11 PagesCritical Analysis of William Wordsworth and Samuel Taylor Coleridge William Wordsworth and Samuel Taylor Coleridge spearheaded a philosophical writing movement in England in the late 18th and early 19th century. Although Wordsworth and S.T. Coleridge are often considered the fathers of the English Romantic movement, their collective theologies and philosophies were often criticized but rarely taken serious by the pair of writers due to their illustrious prestige as poets. The combined effortRead MoreWilliam Wordsworth And Coleridge Vs. Coleridge2220 Words   |  9 Pagespublication of Lyrical Ballads, which featured the poetry of William Wordsworth and Samuel Taylor Coleridge.   Wordsworth and Coleridge both had strong, and sometimes conflicting  opinions about what came with well-written poetry.   Their ideas were mainly about the creation of poetry and the role of poetry in the world. These major idea led to the creation of poetry that is complex to support a wide area of critical readings in a modern day. Wordsworth is famous for changing the diction thought acceptableRead MoreEssay on The Gothic Genre and What it Entails6177 Words   |  25 Pagesneglect by frantic novels, sickly and stupid German Tragedies, and deluges of idle and extravagant stories in verse. The human mind is capable of being excited without the application of gross and violent stimulants.. William Wordsworth, Preface to The Lyrical Ballads, 1802. ..Phantasmagoric kind of fiction, whatever one may think of it, is not without merit: twas the inevitable result of revolutionary shocks throughout Europe thus to compose works of interestRead MoreEssay on Structuralism as a Literary Movement2595 Words   |  11 Pagesmeaning. In literature, it tends to emphasize the coherence of a text by reducing complex phenomenon to simple conventional elements which allows meaning to be constructed. The narrative analysis of literary text is highly influenced by structuralism. According to Jean-Marie Benoist: An analysis is structural if, and only if, it displays the content as a model, i.e., if it can isolate a formal set of elements and relations in terms of which it is possible to argue without entering upon the

The Nation of Israel Essay - 4548 Words

The Nation of Israel The nation of Israel has played a critical role in the formation of Western and Eastern ideologies and has had an unmistakably profound impact upon the theological and cultural evolution of mankind. Former U.S. President John Adams, commenting on the historical importance of the Hebrews, once said the following: I will insist the Hebrews have [contributed] more to civilize men than any other nation. If I was an atheist and believed in blind eternal fate, I should still believe that fate had ordained the Jews to be the most essential instrument for civilizing the nations †¦ They are the most glorious nation that ever inhabited this Earth. The Romans and their empire were but a bubble in comparison to the Jews.†¦show more content†¦Within the three great religions it is generally recognized that the Hebrew patriarch Abraham, through his recognition of one God, initiated the primary and pivotal acceptance of the necessity of monotheism. This embrace of the reality of the existence of the one, supreme, and infinite God was called â€Å"Kiddush Hashem†, or â€Å"sanctifying the name of God† by the Hebrews (Aish). Reflections of the Kiddush Hashem can be found in the three primary prayers of the monotheistic religions: The Islamic Shahada: â€Å"la ilaha illa Allahâ €  (there is no God but God)(George 27); The Jewish Shema: Shema Yisrael Adonai Eloheinu Adonai Echad†¦ (Hear Israel! The Lord our God, the Lord is One); The Catholic Nicene Creed: â€Å"We believe in one God†¦Ã¢â‚¬  (Catholic Encyclopedia). In the formations of these religions we can see foreshadowed the current strife and often deadlocked political state of Israel. The Christian Bible (and thusly the Jewish Torah, which is contained within its Old Testament) and the Islamic Quran both admonish their readers to respect life and live a life of love and service to others. In fact, in Surah 5:28 of the Quran Muhammad is quoted as saying â€Å"You will surely find that the nearest in affection to those who believe are the ones who say, ‘We are Christians’†(George 20). However, despite their undeniable ties, history has leftShow MoreRelatedNation of Israel Essay2927 Words   |  12 PagesNation of Israel Background: History and general facts about Israel Along the eastern coastline of the Mediterranean Sea, at the junction of three continents, lies a much disputed piece of land, now known as the country of Israel. Although this land is now controlled by its original inhabitants, the Jewish people have only had political power for the past half-century. After the Jewish people lost authority, the control of this piece of land changed hands numerous times. This land hasRead MoreIsrael and the United Nations520 Words   |  2 PagesWhen Israel joined the UN in 1948, they did not agree with the resolution (194) that all Palestinian refugees from the war had the right to return back to their homes and receive compensation for their losses. Israel managed to exclude the UN from the politics of the issue and there was tension amongst Arab states. The US was in full support of Israel as they helped aid advanced planes and missiles. The violations of international laws resulted the UN circle having great anger towards Israel. TheRead More The Religion Of The Nation Of Israel1228 Words   |  5 PagesAbram, a pagan gentile called from a pagan land and culture, became the patriarch of the Nation of Israel. Moreover, through God’s covenant with him his numerous descendants inherited Palestine and from them came Messiah, the blessing to all peoples on earth. Understanding the culture of Ur of the Chaldeans, Abram’s place of origin, requires a determination of where this area was located and analyzing archaeological discoveries of that area in conjunction with other disciplines of biblical studyRead MoreEssay on Israel is a Blessing to All Nations847 Words   |  4 Pages I will make of you a great nation†¦And you shall be a blessing†¦And all the families of the earth shall bless themselves by you (Gen. 12:2-3). Israel is a blessing to the other nations. As long as Israel succeeds in informing other peoples and proving that Yahweh is God, it will be understood to be a blessing to these nations. The very examples often employed to dispel the idea of Israels being a blessing serve as evidence to support it. The plagues in Genesis actually prove that Yahweh is GodRead MoreArab Israeli Conflict Between Arab Nations And Israel1508 Words   |  7 Pagesconflicts amongst certain Arab nations and Israel. The conflict began as a struggle over land, or the area now known as Palestine. This conflict began at the end of the nineteenth century with the rise of Zionism and Arab nationalism. Arab nationalism was a reaction response to Zionism in relation to this conflict. While the Arab nation initiated four wars, Israel defended itself and won each time . What use to be a large-scale conflict between the Arab nation and Israel, as shifted over the years toRead MoreThe Prospect Of A Two State Nation Solution For Israel Palestine2970 Words   |  12 PagesThe Israel-Palestine conflict is one of the most long-term, pressing, and largely confounding social, political, and national quandaries of our age. Since we have been moving with surprising velocity into the vast horizons of globalization, the conflict has built up tremendous momentum and has called into question the adequacy of our current attempts at coming to a peaceful resolution that can simultaneously and successfully address both sides of the struggle. The purpose of this paper has been toRead MoreNew Prophets And Its Impact On The Nation Of Israel, Judah, Jerusalem, And Nineveh1178 Words   |  5 PagesChrist-like characteristics and tell people the good news. God is the shepherd who chooses his prophets to change the future. This was a time where the nation of Israel, Ju dah, Jerusalem and Nineveh were not obeying God. However, God offered hope to the people by exiling the nation and offering the people a new opportunity for a personal relationship. The nations existed to be a disappointment to God because he had clearly informed the people to walk humbly with him in order to experience the good life. GodRead MoreArab Nation’s Position Towards Israel1500 Words   |  6 Pages Arab Nation’s Position Towards Israel The Arab nations in the middle east have for the most part of Israel’s existence been hostile. Arab nations share a tie with the Palestinians who believe they belong to the land on which Israel sits and the Arab nations have supported them in most cases. The Arab nation’s hostile position towards Israel continued through the War of Independence, the Sinai-Suez War, the Six Day War, the War of Attrition, and the Yom Kippur War. After the Arab nation’s longRead MoreEssay about The Arab-Israel Conflict1207 Words   |  5 PagesIsrael and the Arab nations have been conflicting with each other for decades and the violence seem to not stop. Why do these nations conflict with each other in this desert environment? This question would be answer and explained in this paper. The analysis will also show how it was seen from the world and how it influence other nations, including the super powers, during the Cold War Era. There was a rise in Zionism in the area of Palestine and abroad from Jewish who wanted a state. Zionism isRead MoreEssay about Anwar Sadats Decision To Make1565 Words   |  7 Pagesdecision to make peace with Israel has dramatically changed the course of history. Every leader in history has made a decision that has affected the world, or just his nation in some way. After many years of struggling to keep peace among the Jews and Arabs, President Anwar Sadat, finally decided to make peace with Israel. Peace between Israel and Egypt would mean great changes were going to take place. This momentous decision would be a large step up for the two nations and would lead to them better

Desirable Future Technology Risk Management â€Myassignmenthelp.Com

Question: Discuss About The Desirable Future Technology Risk Management? Answer: Introduction There are numerous business set ups and units that have been established all across the world that carry out the business operations and activities as per their respective industry type. Some of these sectors are mandatory for every country and some may have a lesser significance as compared to the rest. One of the most significant, mandatory and crucial sectors is the finance sector upon which a major share of the economy is based upon. Aztek is the finance firm from Australia that has a good hold in the market and a decent customer base associated with it. As the business units expand, there comes an increased responsibility and accountability on the organizations to perform better and serve its customers in a better manner. With the business expansion, there are a few infrastructural, operational and technical issues that are being witnessed. It has become required to overcome these issues so that the business continuity and service quality is maintained. The suggestions have been given by the team of directors and leadership in this area including the concept of BYOD, deployment of cloud hosting services and outsourcing of IT functions. On the basis of the suggestions provided and the organizational issues, the project that has been selected is the use of BYOD scheme. Project Details Overview BYOD stands for Bring Your Own Devices and it is a scheme that allows the involvement of the devices owned by the office employees in the business units. One of the growing trends in the present times is that of IT consumerization. There are various mechanisms that are present which can be included to promote the same and BYOD is an initiative associated with IT consumerization. The use of technical gadgets is on a rise in the current times and there are individuals that own many such gadgets and devices. Some of the examples of these devices include mobile phones, desktops, laptops, modems, connecting wires, tablets etc. Most of these devices are portable in nature and be carried from one place to the other. BYOD allows the employees to bring such devices to office and use them to execute business activities, services, tasks and operations. The BYOD project will offer many benefits to the organization, its customers and its stakeholders as well. There will also be certain challenges and drawbacks that may come up. Project Review from Finance Service Sector The business functions and activities in the organizations are guarded and managed by certain guidelines and policies. In the finance sector also there are bodies and agencies that have been set up by the Government to control and monitor the associated operations. One such government body in Australia is termed as Australian Securities and Investments Commission (ASIC). This body regulates the corporate activities of the corporate organizations and firms. The set of rules, policies and laws that are stated by ASIC must be adhered and all the Australian financial firms shall comply with the same. In every business sector, the necessity to maintain and follow the ethical and professional guidelines is mandatory. Australia has specified all these guidelines for the business organizations under Australian Code of Conduct (ASC). The set of tasks that come under BYOD must also conform to the ASC codes. Aztek has the business domain as finance and the frequency of financial transactions and payments in the company is more in number as compared to the other organizations. All the electronic payments and the financial transactions that take place must comply with e-payments code that comes under the ASIC policies and framework. Security and privacy of information is necessary to be maintained and the same shall be made possible by adhering to the Intellectual Property and Privacy laws defined by the government and legal bodies of Australia. BYOD Description: Financial Aspects The objectives that have been defined by Aztek have customer satisfaction and engagement as the focal point. Some of the points under the business objectives are: The customers must be provided with the financial solutions that are reliable, accurate, quick and usable. The percentage of employee satisfaction and engagement with Aztek must not drop down and shall always be maintained. The percentage of customer satisfaction and engagement with Aztek must not drop down and shall always be maintained. The customers must be provided with the release and end products as per the promised delivery dates. All the projects that are taken up by Aztek also have the project goals which shall be in accordance with the goals of the firm to achieve strategic alignment. There are certain tools and applications that are complex in nature and it provides an advantage to the organization if such tools are tested and used by the resources prior to the actual usage. This leads to the deeper understanding and operational ease with the tool and also makes the resource comfortable with its usage leading to avoidance of errors and lesser execution time. The company tools will run on employee devices which will provide them with the ability to experience the functioning of the tools leading to better service execution and solution design. The complexity of operations and their execution will reduce leading to better productivity, efficiency and satisfaction for employees which will in turn improve customer satisfaction as well. The organizational activities and infrastructure will improve as there will be better communication and sharing along with better integration. In terms of the company budget and finances, the BYOD project will offer several advantages to Aztek. Currently, the devices that are used in the organization for the execution of business activities are procured by the organization from its share of expenses. This includes a huge investment for an organization that is under expansion. BYOD scheme will eliminate these costs which may be used in other activities. The employees will be able to explore the tools and application from off-the-office locations which will provide them with better operational ease leading to avoidance of operational costs due to errors, mistakes and reworks (Gessner, 2016). Testing is an activity that is a part of every project and the tools required for test execution and test creation may be different for every project. For instance, a project involving a mobile based financial solution may require different devices like Android based mobile device, iOS based mobile device, Windows based mobile device etc. with different screen sizes and resolutions. This will involve additional costs and the devices may not be required once the project is completed. These additional and unnecessary costs will be avoided after the use of BYOD scheme (Retailwire, 2016). Aztek IT Security Policies Procedures BYOD will offer many benefits and advantages to Aztek in terms of the ability to achieve the organization goals with ease, enhanced engagement of the customers and employees of the organization and many others. One of the major benefits as discussed under the financial aspect of the project above would be the elimination of unnecessary costs and expenses. These benefits will be abundant in number but there will also be many issues that will be related with BYOD in the areas of implementation, integration and usage. Security will be the main issue in this area and there will be numerous risks to the information and network security that might be witnessed. There are many threat and risk agents that will be the carriers of these security issues and these carriers will be required to be checked in all the measures that are implemented from the security point of view. Aztek has always been an organization that has made sure that the state of security in the organization and in association with the applications and services related with the organization are always maintained. BYOD scheme that has been selected for implementation is Aztek has its own set of security issues. The security policies of Aztek do not include the countermeasures that can be executed for the prevention and control of the BYOD related attacks and would be necessary to be updated. It would be required to first analyze the associated security risks and plan out the control, avoidance and prevention measures that shall be applied. The various forms of the risks and security attacks in association with the BYOD scheme can be categorized in three broad categories and areas viz. information security risks, risks to the device security and network security risks. The devices that the employees currently own were brought by them for the personal use. The security aspect of the personal activities and the professional activities are different from one another. There might be basic security precautions that the employee may have taken for the device protection which would not be sufficient for use in Aztek. Therefore, the IT Security team at Aztek must review the device from the security aspect and must also install the necessary security updates and tags for making the device fit to be used in the organization (Coleman, 2011). The security risks associated with the category of information and network security attacks must be controlled and avoided by using the technological tools and administrative checks. The disa ster recovery mechanisms must also be stated carefully. BYOD scheme is a new scheme that will be used in Aztek and the employees will also not be aware of the threats that they might bring along with the use of unsecure networks and applications. The device of the employees, such as the Smartphone will be used for many personal activities along with the professional tasks. There may be certain applications that may not be secure and may cause a negative implication on other applications or the security of the device. There may be malware attacks or eavesdropping activities that may take place. Also, the use of devices on the public Wi-Fi connections may also bring in many unknown risks to the employees Smartphone (Newton, 2015). The employees will be required to be provided with the information on the secure use of the device so that the applications and information related with Aztek is not impacted in a negative manner (Trendmicro, 2016). BYOD Scheme: Risk Assessment There are many risks that may take place in the organization and its associated applications. These risks may belong to different categories and one such category is the security risks (Crane, 2013). A security risk is defined as an occurrence which may lead to the compromise of the security of any of the component associated with the organization which may have serious implication. Process for Risk Management For the management of the risks that will emerge with the implementation of the BYOD scheme in Aztek, there is a process that has been defined to control, avoid, prevent and detect the risks. The process is termed as risk management and it is also one of the knowledge areas that come under the domain of project management. This process will provide the management and leadership with the guidelines and mechanisms on adequate management of the risks. Risk Management Process Risk identification shall be the first stage in the process of risk management and in this stage the security team, management and the IT team of the organization must create a list of sources from which they may attain maximum information on the probable risk areas (Capterra, 2016). A list of these risk areas along with the specific risk events shall be prepared in this stage (Berg, 2016). The risk areas and events that are identified shall then be assessed and their probability and implication on the organization and its components shall be calculated. The prioritization in terms of the treatment of the risk must also be calculated on the basis of the risk factors (Castsoftware, 2016). One the priority, impact and likelihood of the risk is assessed, the response and treatment strategy for the risks shall be calculated. These strategies shall be based upon the nature of the risk and the damage that it may cause. For instance, it would be best to avoid some of the risks while for the other risks the best possible treatment would be to accept or transfer the risk (Microsoft, 2016). The next set of phases shall focus upon the management and senior authorities to marketing that the risk is monitored and controlled by applying the treatment strategies and is also closed after completion (Vila, 2012). Risk Register The risk register that has been prepared for the BYOD project at Aztek includes the risks that have been identified and also suggests the best treatment and response strategy that can be applied for the control of the risk. The category of the risk along with their probability and impact has also been included in the register after the assessment of the risks on different parameters. Risk Name Risk Category Probability Risk Impact Risk Response Treatment Strategy Information Breaches Information Security Risk Moderate High The treatment strategy that shall be followed in this case shall be risk avoidance by using automated technical tools and administrative checks for information protection Information Leakage Information Security Risk Moderate High The treatment strategy that shall be followed in this case shall be risk avoidance by using automated technical tools and administrative checks for information protection (Informationweek, 2016) Loss of the Device Device Security Risk Low High Risk avoidance shall be used as the treatment strategy for this risk which shall be implemented by using device tracking tools, device safety tools and technical controls Message Media Alteration Information/Network Security Risk Moderate High The treatment strategy that shall be followed in this case shall be risk mitigation by enhancing the information integrity by using network safety tools (Grimes, 2016) SQL Injection Information Security Risk Moderate Moderate The treatment strategy that shall be followed in this case shall be risk avoidance by using automated technical tools and administrative checks for information protection (Usask, 2017) Flooding Attacks Information/Network Security Risk Moderate Moderate -High The treatment strategy that shall be followed in this case shall be risk avoidance by using automated technical anti-denial and intrusion detection tools for information and network protection (Stoneburner, 2002) Exploitation of Security Vulnerabilities Information/Network/Device Security Risk Moderate Moderate The treatment strategy that shall be followed in this case shall be risk avoidance by analyzing the security weaknesses and using the parameters and mechanisms for elimination of the same Malware Attacks and Injections Information/Network Security Risk Moderate Moderate-High The treatment strategy that shall be followed in this case shall be risk avoidance by using anti-malware tools and applications Spoofing Attacks Network Security Risk Low Moderate The treatment strategy that shall be followed in this case shall be risk mitigation by enhancing network management and control and creating alerts for the users in such an occurrence Man in the middle Attacks Network Security Risk Moderate Moderate The treatment strategy that shall be followed in this case shall be risk mitigation by enhancing network management and control and creating alerts for the users in such an occurrence Insider threats and attacks may also take place in Aztek in which the threat agents will be the employees. BYOD scheme is a new scheme that will be used in Aztek and the employees will also not be aware of the threats that they might bring along with the use of unsecure networks and applications. The device of the employees, such as the Smartphone will be used for many personal activities along with the professional tasks. There may be certain applications that may not be secure and may cause a negative implication on other applications or the security of the device. There may be malware attacks or eavesdropping activities that may take place. Also, the use of devices on the public Wi-Fi connections may also bring in many unknown risks to the employees Smartphone (Qld, 2016). There are two forms of insider threats viz. deliberate and accidental. The scenario just discussed is an example of the accidental threat as the employee was not aware of the risk and its impact. However, there may be selfish motives that may be involved and the employee may purposely transfer the information to the unauthorized entites (Markovic-Petrovic Stojanovic, 2014). Data Security for the BYOD Scheme An organization has many assets that it requires to manage. Some of these assets come under the category of critical assets and some are classified as non-critical assets. The security requirements of critical assets are more than the non-critical assets. Data and information are the organizational assets that are included in the critical assets classification and the security requirement of these assets is therefore very high (Scu, 2016). Aztek is carrying out its business since a long time and there are many projects that it handles. Due to the involvement of different clients and employees along with the execution of many projects simultaneously, there are huge data sets that the organization is required to manage securely. The data sets include the information from different categories, such as, confidential, public, sensitive, private etc (Test-institute, 2016). There are many risks to these data sets in terms of security and the primary reason of these risks is the involvement of different components and sources (Chapman, 2000). The security parameters and mechanisms that are applied for the private information and data set is different form a public data set or confidential data set. This may lead to the presence of security weaknesses and vulnerabilities. There are various operations that can be performed on the data and information sets. These operations may include the read only ability, modification or deletion of the data etc. The users that are allowed to execute these operations must be selected and provided with the privileges on the basis of the user type and the information category. All the modification, deletion and any of the updates on the data shall be allowed to be performed by the data administrator or the security manager only. This will avoid the attacks associated with integrity and availability of the data. The sensitive and confidential data sets shall be allowed to be accessed only by the CEO, Board of directors along with Security Manager and Database Administrator. The private data sets shall be accessible to be read by the stakeholders of the data and the data analysts. The public data sets must be allowed to be read by the stakeholders, data analysts, data scientists and data owners. Conclusion Aztek has decided to implement BYOD scheme in its infrastructure which would lead to various benefits and will also come up with certain issues. The use of technical gadgets is on a rise in the current times and there are individuals that own many such gadgets and devices. Some of the examples of these devices include mobile phones, desktops, laptops, modems, connecting wires, tablets etc. Most of these devices are portable in nature and be carried from one place to the other. BYOD allows the employees to bring such devices to office and use them to execute business activities, services, tasks and operations. BYOD will offer many benefits and advantages to Aztek in terms of the ability to achieve the organization goals with ease, enhanced engagement of the customers and employees of the organization and many others. One of the major benefits as discussed under the financial aspect of the project above would be the elimination of unnecessary costs and expenses. There will also be many issues that will be related with BYOD in the areas of implementation, integration and usage. Security will be the main issue in this area and there will be numerous risks to the information and network security that might be witnessed. There are many threat and risk agents that will be the carriers of these security issues and these carriers will be required to be checked in all the measures that are implemented from the security point of view. The various forms of the risks and security attacks in association with the BYOD scheme can be categorized in three broad categories and areas viz. information security risks, risks to the device security and network security risks. Insider threats and attacks may also take place in Aztek in which the threat agents will be the employees. For the management of the risks that will emerge with the implementation of the BYOD scheme in Aztek, there is a process that has been defined to control, avoid, prevent and detect the risks. The process is termed as risk management and it is also one of the knowledge areas that come under the domain of project management. This process will provide the management and leadership with the guidelines and mechanisms on adequate management of the risks. References Berg, H. (2016). Risk Management. Retrieved 25 September 2017, from https://ww.gnedenko-forum.org/Journal/2010/022010/RTA_2_2010-09.pdf Berg, H. (2010). Risk Management: Procedures, Methods and Experiences. Retrieved 25 September 2017, from https://ww.gnedenko-forum.org/Journal/2010/022010/RTA_2_2010-09.pdf Capterra,. (2016). Best Risk Management Software | 2016 Reviews of the Most Popular Systems. Capterra.com. civil-engineering 25 September 2017, from https://www.capterra.com/risk-management-software/ Castsoftware,. (2016). What is Software Risk How To Prevent Software Risk | CAST Software. Castsoftware.com. Retrieved 25 September 2017, from https://www.castsoftware.com/research-labs/software-risk Chapman, C. (2000). A desirable future for technology risk management. International Journal Of Risk Assessment And Management, 1(1/2), 69. https://dx.doi.org/10.1504/ijram.2000.001488 Cioupdate,. (2016). Effective Measures to Deal with Cloud Security -- CIO Update. Cioupdate.com. Retrieved 25 September 2017, from https://www.cioupdate.com/technology-trends/effective-measures-to-deal-with-cloud-security.html Coleman, T. (2011). A Practical Guide to Risk Management. Cfapubs.org. Retrieved 25 September 2017, from https://www.cfapubs.org/doi/pdf/10.2470/rf.v2011.n3.1 Crane, L. (2013). Introduction to Risk Management. Retrieved 25 September 2017, from https://extensionrme.org/pubs/IntroductionToRiskManagement.pdf Development, C. (2013). What are the 5 Risk Management Process Steps?. Continuing Professional Development. Retrieved 25 September 2017, from https://continuingprofessionaldevelopment.org/risk-management-steps-in-risk-management-process/ Dey, P. (2008). Risk management in information technology projects. International Journal Of Risk Assessment And Management, 9(3), 311. https://dx.doi.org/10.1504/ijram.2008.019747 Gessner, D. (2016). Towards a User-Friendly Security-Enhancing BYOD Solution. Retrieved 25 September 2017, from https://in.nec.com/en_IN/images/120324.pdf Grimes, R. (2016). The 5 cloud risks you have to stop ignoring. InfoWorld. Retrieved 25 September 2017, from https://www.infoworld.com/article/2614369/security/the-5-cloud-risks-you-have-to-stop-ignoring.html InformationWeek,. (2016). 9 Worst Cloud Security Threats - InformationWeek. InformationWeek. Retrieved 25 September 2017, from https://www.informationweek.com/cloud/infrastructure-as-a-service/9-worst-cloud-security-threats/d/d-id/1114085?page_number=2 Markovic-Petrovic, J., Stojanovic, M. (2014). An Improved Risk Assessment Method for SCADA Information Security. Elektronika Ir Elektrotechnika, 20(7). https://dx.doi.org/10.5755/j01.eee.20.7.8027 Microsoft,. (2016). Risk Management Process Overview. Technet.microsoft.com. Retrieved 25 September 2017, from https://technet.microsoft.com/en-us/library/cc535304.aspx Newton, P. (2015). Managing Project Risks. Retrieved 25 September 2017, from https://www.free-management-ebooks.com/dldebk-pdf/fme-project-risk.pdf Proconceptsllc,. (2016). Risk Radar Enterprise, Risk Management Software | Pro-Concepts LLC. Proconceptsllc.com. Retrieved 25 September 2017, from https://www.proconceptsllc.com/risk-radar-enterprise.html Qld,. (2016). Risks of cloud computing | Queensland Government. Business.qld.gov.au. Retrieved 25 September 2017, from https://www.business.qld.gov.au/business/running/technology-for-business/cloud-computing-business/cloud-computing-risks Retailwire,. (2016). Happiness Is Bringing Your Own Computer Devices to Work RetailWire. Retailwire.com. Retrieved 25 September 2017, from https://www.retailwire.com/discussion/16188/happiness-is-bringing-your-own-computer-devices-to-work Scu,. (2016). The Risk Management Process - Risk Management - SCU. Scu.edu.au. Retrieved 25 September 2017, from https://scu.edu.au/risk_management/index.php/8/ Stoneburner, G. (2002). Risk Management Guide for Information Technology Systems. Retrieved 25 September 2017, from https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/nist800-30.pdf Test-institute,. (2016). What Is Software Risk And Software Risk Management? - International Software Test Institute. Test-institute.org. Retrieved 25 September 2017, from https://www.test-institute.org/What_Is_Software_Risk_And_Software_Risk_Management.php Trendmicro,. (2016). BYOD - Consumerization of IT Mobility - Trend Micro USA. Trendmicro.com. Retrieved 25 September 2017, from https://www.trendmicro.com/us/enterprise/challenges/it-consumerization/ Uasask. (2017). IT Risk Management Procedure. Retrieved 25 September 2017, from https://www.usask.ca/ict/documents/IT%20Risk%20Management%20Procedure.pdf Vila, S. (2012). Risk Management Model in ITIL. Retrieved 25 September 2017, from https://fenix.tecnico.ulisboa.pt/downloadFile/395144242579/Risk%20management%20on%

Tuesday, May 5, 2020

Case Study HR Strategic Tool for Growth free essay sample

The changes implemented by HR made for a better work life for Gratterpalm’s employees. This resulted in the highest satisfaction score among Gratterpalm’s employees to date and cut employee turnover in half. Happier employees translates to more productive employees which allow a business to grow. An example of this is that HR identified each employees’ roles within the company, eliminating confusion as to what is expected of them and who they report to. This allows for better time management as the employees know exactly what to do and to whom they should report. HR put in place a clear career structure showing employees how they can move up to the next level along with systems for posting employee praise and job vacancies which led to 10% of employees being promoted internally in one year along. With internal promoting, less training is needed saving the company time and money. The HR manager introduces flexible work schedules, a â€Å"justification to recruit† process and child care support allowing for the employees to better balance their work/life schedules. We will write a custom essay sample on Case Study HR Strategic Tool for Growth or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page HR also implemented cultural audits to better understand the employees’ views. If a company understands how their employees regard it, it aids the company in successfully maintaining its strategy. As a result of HR, Gratterpalm has become a desired place to work and more and more people are taking notice of the company. The HR activities are driving business growth by increasing productivity through improved time management, internal promoting and employee satisfaction. Reference: Managing Human Resources, 15th Edition by George Bohlander and Scott Snell Answer 2: HR functions are sometimes difficult for small firms to execute because more often than not, small companies do not have a full-time HR manager. The HR responsibilities are often left to someone in the company with limited knowledge of the complicated requirements. HR policies may also be hard to implement if they are not in accordance with the firm’s strategic goals. Further complications can occur when the policies may not be supported by management or the policies are not fair or consistent. There may also be resistance to change in a company especially if the HR implements policies that differ from what employees have become accustomed to. For instance, a family-run company is far less structured than a company that has grown to a 70 person team and undergone a management buyout. Globalization further complicates matters by bringing different cultures into the mix. Once an HR manager is on-board, either internally or outsourced, she must understanding the required amount of structure for the company along with how much flexibility is needed and then develop a company specific HR policy that takes this into account to allow for a successful implementation of HR policies. To be successful, HR policies must also align the firm’s strategic goals with what it hopes to achieve. Additionally, they must have the support of management. Finally, training must take place and people made accountable so that policies are managed fairly and consistently. Reference: Managing Human Resources, 15th Edition by George Bohlander and Scott Snell Answer 3: HR effectiveness is closely linked to the success of the business. Many factors determine whether or not the results of HR activities are successful. To measure HR achievements, one would need to not only consider employee satisfaction, absenteeism and turnover, but also staffing costs and compensations, revenue, sales and customer satisfaction. To see the results of HR activities, one must analyze how well the HR undertakings have supported the organization’s strategic objectives. It is one thing to develop a strategy but it is another thing to actually implement it. There is often a gap between an organization’s ability to cultivate a strategy and an organization’s ability to execute a strategy. Moreover, HR functions are constantly shifting as a business develops and is further complicated by globalization. Reference: Managing Human Resources, 15th Edition by George Bohlander and Scott Snell