The ACME Company is experiencing significant losses of inventory due to employee theft. As the Corporate Security Director, you called a meeting with security and legal teams to discuss establishing an administrative search program. Such programs require consideration of legal issues like privacy, discrimination, and reasonableness. The meeting discussed reviewing the Chenkin v. Bellevue case, where the court approved a hospital's search procedure after evaluating its constitutionality and features. You must now write a policy proposal exploring the legalities and impacts of such a program.
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
tmp47759bcbABC Business.movScenario The ACME Company manuf
1. tmp47759bcb/ABC Business.mov
Scenario: The ACME Company manufactures various electronic
devices for a variety of well-known brands. This includes cell
phones, cameras, camcorders, stereos, computers, tablets, video
games, and more. At any given time, many of these products
are fully assembled and stored at the plant awaiting shipment to
the vendors. Also stored at the plant are the expensive
components used to manufacture the devices. As the Corporate
Security Director for the ACME Company, you have been
alerted that significant inventory shortages have been occurring
for the assembled devices and the stock components used to
manufacture the electronic devices resulting in substantial
company losses. You also have obtained information that these
losses are the result of extensive employee theft.
During previous discussions with private security leaders from
other organizations, you sought more information about the
effectiveness of an administrative search program as an option
to address internal theft. You call a meeting with your security
team and other company directorate heads, to include the
organization’s legal counsel, to discuss possible security
options to thwart the reported losses. The discussion at this
meeting centers on the fact that in private industry/business,
some employers institute an administrative, non-coercive, care
taking search programs to address real or perceived property
losses at the hands of their employees. But in establishing such
a program, there are various issues that must be considered
beyond the impact it might have on employee morale. Everyone
agreed that company executives must thoroughly vet the legality
of an administrative search under consideration and consider the
potential for civil lawsuits filed against the company and its
security operatives for such reasons as invasion of privacy,
assault, false imprisonment, intentional infliction of emotional
2. distress, and defamation. Everyone was also concerned about
legal claims that may result from the manner in which the
search is conducted. For instance, search protocols that are
found by a court to be unreasonable, discriminatory,
discourteous, unfair, highly intrusive, socially unacceptable
conduct, or instituted for frivolous reasons will likely lead to
successful claims by employees. All participants at the meeting
agreed this would be a significant threat to company assets that
must be avoided.
Writing Assignment: Based on your independent research that
includes at least three sources, in preparation for developing a
possible policy proposal to establish an administrative search
program (not criminal) for presentation to the corporate
executive staff, write an academic paper that explores the use
and legalities of an administrative, non-coercive, care taking
search program instituted by private security operatives to
address real or perceived company losses resulting from
significant internal theft. After reading and evaluating Judge
Edward Weinfeld’s opinion in Chenkin v. BELLEVUE HOSP.
CTR., NYC, ETC., 479 F. Supp. 207 (S.D.N.Y. 1979), found in
the eReadings section of the online classroom, consider the
opinion and respond to the following:
(1) Write a strong introduction, first stating the purpose of the
paper, then providing a succinct recitation of the significant
facts in this case.
(2) Describe the issues related to the search program the court
needed to resolve.
(3) Explain the positions that Chenkin and Bellevue advanced to
the court regarding Chenkin’s claim that the hospital’s package
control system was unconstitutional.
(4) Provide details of the court’s ruling and rationale and be
sure to describe the important features of the search procedure
instituted by Belleville that in the view of the court rejected
Chenkin’s claims.
(5) As a practical matter, evaluate how this court decision
impacts security operations. Be specific and
3. comprehensive.
(6) Explain how the results of this case will be used in any
policy proposals you make to the corporate executives.
The length of the proposal will be between 1,000 and 1,500
words and students will use and properly cite and reference in
APA format at least three sources, including the court’s
opinion. Course instructional material may be used and cited,
but may not be included in the three sources required.
Source Information: (Should be placed in eReadings)
https://www.courtlistener.com/opinion/2263945/chenkin-v-
bellevue-hosp-ctr-nyc-etc/?
http://www.twc.state.tx.us/news/efte/searches_at_work_legal_is
sues_to_consider.html
http://www.ppspublishers.com/ez/html/060804txtb.html
http:/www.nolo.com/legal-encyclopedia/workplace-searches-
dos-donts-29770.html
http://www.workplacefairness.org/searches
http://definitions.uslegal.com/w/workplace-searches/
You are highly encouraged to use the services of the UMUC
Effective Writing Center (EWC) for this project. Personnel at
the EWC can be contacted using the following website:
http://www.umuc.edu/ewc/.
Formatting Requirements
Use the American Psychological Association (APA) style
manual in writing this paper.
Paper should begin with an appropriate introductory statement
about the topic and a reference page.
You may access the following UMUC website as a reference for
APA style requirements:
http://www.umuc.edu/library/libhow/gethelp-citing.cfm
Paper should be a minimum of 1,000 (minimum) to 1,500
(maximum) words
· · Double space
· · 12 pt. font
· · 1” margins
4. · · Use APA citations for all sources
· · Include reference page using APA format guidelines (not
included in word count)
Additionally -
· · Create a cover page for your assignment (not included in
word count)
· · Include your name
· · Course title and number
· · Project title
· · Date of submission
Scenario: The ACME Company manufactures various electronic
devices for a variety of well-known brands. This includes cell
phones, cameras, camcorders, stereos, computers, tablets, video
games, and more. At any given time, many of these products
are fully assembled and stored at the plant awaiting shipment to
the vendors. Also stored at the plant are the expensive
components used to manufacture the devices. As the Corporate
Security Director for the ACME Company, you have been
alerted that significant inventory shortages have been occurring
for the assembled devices and the stock components used to
manufacture the electronic devices resulting in substantial
company losses. You also have obtained information that these
losses are the result of extensive employee theft.
During previous discussions with private security leaders from
other organizations, you sought more information about the
effectiveness of an administrative search program as an option
to address internal theft. You call a meeting with your security
team and other company directorate heads, to include the
organization’s legal counsel, to discuss possible security
options to thwart the reported losses. The discussion at this
meeting centers on the fact that in private industry/business,
some employers institute an administrative, non-coercive, care
taking search programs to address real or perceived property
losses at the hands of their employees. But in establishing such
5. a program, there are various issues that must be considered
beyond the impact it might have on employee morale. Everyone
agreed that company executives must thoroughly vet the legality
of an administrative search under consideration and consider the
potential for civil lawsuits filed against the company and its
security operatives for such reasons as invasion of privacy,
assault, false imprisonment, intentional infliction of emotional
distress, and defamation. Everyone was also concerned about
legal claims that may result from the manner in which the
search is conducted. For instance, search protocols that are
found by a court to be unreasonable, discriminatory,
discourteous, unfair, highly intrusive, socially unacceptable
conduct, or instituted for frivolous reasons will likely lead to
successful claims by employees. All participants at the meeting
agreed this would be a significant threat to company assets that
must be avoided.
Writing Assignment: Based on your independent research that
includes at least three sources, in preparation for developing a
possible policy proposal to establish an administrative search
program (not criminal) for presentation to the corporate
executive staff, write an academic paper that explores the use
and legalities of an administrative, non-coercive, care taking
search program instituted by private security operatives to
address real or perceived company losses resulting from
significant internal theft. After reading and evaluating Judge
Edward Weinfeld’s opinion in Chenkin v. BELLEVUE HOSP.
CTR., NYC, ETC., 479 F. Supp. 207 (S.D.N.Y. 1979), found in
the eReadings section of the online classroom, consider the
opinion and respond to the following:
(1) Write a strong introduction, first stating the purpose of the
paper, then providing a succinct recitation of the significant
facts in this case.
(2) Describe the issues related to the search program the court
needed to resolve.
(3) Explain the positions that Chenkin and Bellevue advanced to
the court regarding Chenkin’s claim that the hospital’s package
6. control system was unconstitutional.
(4) Provide details of the court’s ruling and rationale and be
sure to describe the important features of the search procedure
instituted by Belleville that in the view of the court rejected
Chenkin’s claims.
(5) As a practical matter, evaluate how this court decision
impacts security operations. Be specific and
comprehensive.
(6) Explain how the results of this case will be used in any
policy proposals you make to the corporate executives.
The length of the proposal will be between 1,000 and 1,500
words and students will use and properly cite and reference in
APA format at least three sources, including the court’s
opinion. Course instructional material may be used and cited,
but may not be included in the three sources required.
Source Information: (Should be placed in eReadings)
https://www.courtlistener.com/opinion/2263945/chenkin-v-
bellevue-hosp-ctr-nyc-etc/?
http://www.twc.state.tx.us/news/efte/searches_at_work_legal_is
sues_to_consider.html
http://www.ppspublishers.com/ez/html/060804txtb.html
http:/www.nolo.com/legal-encyclopedia/workplace-searches-
dos-donts-29770.html
http://www.workplacefairness.org/searches
http://definitions.uslegal.com/w/workplace-searches/
You are highly encouraged to use the services of the UMUC
Effective Writing Center (EWC) for this project. Personnel at
the EWC can be contacted using the following website:
http://www.umuc.edu/ewc/.
Formatting Requirements
Use the American Psychological Association (APA) style
manual in writing this paper.
Paper should begin with an appropriate introductory statement
about the topic and a reference page.
You may access the following UMUC website as a reference for
7. APA style requirements:
http://www.umuc.edu/library/libhow/gethelp-citing.cfm
Paper should be a minimum of 1,000 (minimum) to 1,500
(maximum) words
· · Double space
· · 12 pt. font
· · 1” margins
· · Use APA citations for all sources
· · Include reference page using APA format guidelines (not
included in word count)
Additionally -
· · Create a cover page for your assignment (not included in
word count)
· · Include your name
· · Course title and number
· · Project title
· · Date of submission
Order #152666300 (Status: Writer Assigned) Legal Challenges
for Private Security (4 pages, 0 slides)
Reassign this order
· Instructions
· Files (4)
· Messages
Type of service:
Writing from scratch
Work type:
Research paper
Deadline:
13 Sep, 02:10 PM (20h) Extend deadline
Academic level:
College (3-4 years: Junior, Senior)
Subject or Discipline:
Criminal Justice
8. Title:
Legal Challenges for Private Security
Number of sources:
4
Provide digital sources used:
No
Paper format:
APA
# of pages:
4
Spacing:
Double spaced
# of words:
1100
# of slides:
ppt icon 0
# of charts:
0
Paper details:
Legal Challenges for Private Security: Using course material
and additional scholarly sources the student will compose a
1,000 - 1,250 word paper outlining their response as a role
player to a legal issue involving the Security manager and the
need to conduct a search or other intrusive activity in an effort
to curtail internal (employee) theft.
Comments:
#
Files
Who Uploaded
1
152666300_Legal_Chal..._Instructions_2.docx
Guidelines for writing
19 KB
9. 12 Sep, 01:10 AM
Customer
2
152666300_Legal_Chal..._Instructions_1.docx
Guidelines for writing
19 KB
12 Sep, 01:20 AM
Customer
3
152666300_Legal_Chal..._Instructions_1.docx
Guidelines for writing
19 KB
12 Sep, 01:34 AM
Customer
4
152666300_Legal_Chal..._Instructions_1.docx
Guidelines for writing
19 KB
12 Sep, 02:06 AM
Customer
Scenario: The ACME Company manufactures various electronic
devices for a variety of well-known brands. This includes cell
phones, cameras, camcorders, stereos, computers, tablets, video
games, and more. At any given time, many of these products
10. are fully assembled and stored at the plant awaiting shipment to
the vendors. Also stored at the plant are the expensive
components used to manufacture the devices. As the Corporate
Security Director for the ACME Company, you have been
alerted that significant inventory shortages have been occurring
for the assembled devices and the stock components used to
manufacture the electronic devices resulting in substantial
company losses. You also have obtained information that these
losses are the result of extensive employee theft.
During previous discussions with private security leaders from
other organizations, you sought more information about the
effectiveness of an administrative search program as an option
to address internal theft. You call a meeting with your security
team and other company directorate heads, to include the
organization’s legal counsel, to discuss possible security
options to thwart the reported losses. The discussion at this
meeting centers on the fact that in private industry/business,
some employers institute an administrative, non-coercive, care
taking search programs to address real or perceived property
losses at the hands of their employees. But in establishing such
a program, there are various issues that must be considered
beyond the impact it might have on employee morale. Everyone
agreed that company executives must thoroughly vet the legality
of an administrative search under consideration and consider the
potential for civil lawsuits filed against the company and its
security operatives for such reasons as invasion of privacy,
assault, false imprisonment, intentional infliction of emotional
distress, and defamation. Everyone was also concerned about
legal claims that may result from the manner in which the
search is conducted. For instance, search protocols that are
found by a court to be unreasonable, discriminatory,
discourteous, unfair, highly intrusive, socially unacceptable
conduct, or instituted for frivolous reasons will likely lead to
successful claims by employees. All participants at the meeting
agreed this would be a significant threat to company assets that
must be avoided.
11. Writing Assignment: Based on your independent research that
includes at least three sources, in preparation for developing a
possible policy proposal to establish an administrative search
program (not criminal) for presentation to the corporate
executive staff, write an academic paper that explores the use
and legalities of an administrative, non-coercive, care taking
search program instituted by private security operatives to
address real or perceived company losses resulting from
significant internal theft. After reading and evaluating Judge
Edward Weinfeld’s opinion in Chenkin v. BELLEVUE HOSP.
CTR., NYC, ETC., 479 F. Supp. 207 (S.D.N.Y. 1979), found in
the eReadings section of the online classroom, consider the
opinion and respond to the following:
(1) Write a strong introduction, first stating the purpose of the
paper, then providing a succinct recitation of the significant
facts in this case.
(2) Describe the issues related to the search program the court
needed to resolve.
(3) Explain the positions that Chenkin and Bellevue advanced to
the court regarding Chenkin’s claim that the hospital’s package
control system was unconstitutional.
(4) Provide details of the court’s ruling and rationale and be
sure to describe the important features of the search procedure
instituted by Belleville that in the view of the court rejected
Chenkin’s claims.
(5) As a practical matter, evaluate how this court decision
impacts security operations. Be specific and
comprehensive.
(6) Explain how the results of this case will be used in any
policy proposals you make to the corporate executives.
The length of the proposal will be between 1,000 and 1,500
words and students will use and properly cite and reference in
APA format at least three sources, including the court’s
opinion. Course instructional material may be used and cited,
but may not be included in the three sources required.
Source Information: (Should be placed in eReadings)
13. · · Date of submission
Scenario: The ACME Company manufactures various electronic
devices for a variety of well-known brands. This includes cell
phones, cameras, camcorders, stereos, computers, tablets, video
games, and more. At any given time, many of these products
are fully assembled and stored at the plant awaiting shipment to
the vendors. Also stored at the plant are the expensive
components used to manufacture the devices. As the Corporate
Security Director for the ACME Company, you have been
alerted that significant inventory shortages have been occurring
for the assembled devices and the stock components used to
manufacture the electronic devices resulting in substantial
company losses. You also have obtained information that these
losses are the result of extensive employee theft.
During previous discussions with private security leaders from
other organizations, you sought more information about the
effectiveness of an administrative search program as an option
to address internal theft. You call a meeting with your security
team and other company directorate heads, to include the
organization’s legal counsel, to discuss possible security
options to thwart the reported losses. The discussion at this
meeting centers on the fact that in private industry/business,
some employers institute an administrative, non-coercive, care
taking search programs to address real or perceived property
losses at the hands of their employees. But in establishing such
a program, there are various issues that must be considered
beyond the impact it might have on employee morale. Everyone
agreed that company executives must thoroughly vet the legality
of an administrative search under consideration and consider the
potential for civil lawsuits filed against the company and its
security operatives for such reasons as invasion of privacy,
assault, false imprisonment, intentional infliction of emotional
distress, and defamation. Everyone was also concerned about
legal claims that may result from the manner in which the
14. search is conducted. For instance, search protocols that are
found by a court to be unreasonable, discriminatory,
discourteous, unfair, highly intrusive, socially unacceptable
conduct, or instituted for frivolous reasons will likely lead to
successful claims by employees. All participants at the meeting
agreed this would be a significant threat to company assets that
must be avoided.
Writing Assignment: Based on your independent research that
includes at least three sources, in preparation for developing a
possible policy proposal to establish an administrative search
program (not criminal) for presentation to the corporate
executive staff, write an academic paper that explores the use
and legalities of an administrative, non-coercive, care taking
search program instituted by private security operatives to
address real or perceived company losses resulting from
significant internal theft. After reading and evaluating Judge
Edward Weinfeld’s opinion in Chenkin v. BELLEVUE HOSP.
CTR., NYC, ETC., 479 F. Supp. 207 (S.D.N.Y. 1979), found in
the eReadings section of the online classroom, consider the
opinion and respond to the following:
(1) Write a strong introduction, first stating the purpose of the
paper, then providing a succinct recitation of the significant
facts in this case.
(2) Describe the issues related to the search program the court
needed to resolve.
(3) Explain the positions that Chenkin and Bellevue advanced to
the court regarding Chenkin’s claim that the hospital’s package
control system was unconstitutional.
(4) Provide details of the court’s ruling and rationale and be
sure to describe the important features of the search procedure
instituted by Belleville that in the view of the court rejected
Chenkin’s claims.
(5) As a practical matter, evaluate how this court decision
impacts security operations. Be specific and
comprehensive.
(6) Explain how the results of this case will be used in any
15. policy proposals you make to the corporate executives.
The length of the proposal will be between 1,000 and 1,500
words and students will use and properly cite and reference in
APA format at least three sources, including the court’s
opinion. Course instructional material may be used and cited,
but may not be included in the three sources required.
Source Information: (Should be placed in eReadings)
https://www.courtlistener.com/opinion/2263945/chenkin-v-
bellevue-hosp-ctr-nyc-etc/?
http://www.twc.state.tx.us/news/efte/searches_at_work_legal_is
sues_to_consider.html
http://www.ppspublishers.com/ez/html/060804txtb.html
http:/www.nolo.com/legal-encyclopedia/workplace-searches-
dos-donts-29770.html
http://www.workplacefairness.org/searches
http://definitions.uslegal.com/w/workplace-searches/
You are highly encouraged to use the services of the UMUC
Effective Writing Center (EWC) for this project. Personnel at
the EWC can be contacted using the following website:
http://www.umuc.edu/ewc/.
Formatting Requirements
Use the American Psychological Association (APA) style
manual in writing this paper.
Paper should begin with an appropriate introductory statement
about the topic and a reference page.
You may access the following UMUC website as a reference for
APA style requirements:
http://www.umuc.edu/library/libhow/gethelp-citing.cfm
Paper should be a minimum of 1,000 (minimum) to 1,500
(maximum) words
· · Double space
· · 12 pt. font
· · 1” margins
· · Use APA citations for all sources
· · Include reference page using APA format guidelines (not
16. included in word count)
Additionally -
· · Create a cover page for your assignment (not included in
word count)
· · Include your name
· · Course title and number
· · Project title
· · Date of submission
Page 1 of 3
Assignment and Submission - MAF307
1 The assignment is compulsory. To reduce our carbon
footprint, all assignments are to be
submitted electronically through dropboxes in Cloud Deakin
(CD). No hardcopy assignment
submission is required.
2. The assignment due date is 11:59pm, 16 September (Friday).
You should be aware of
your eligibility for special consideration (see the Deakin
University Handbook). Otherwise, in
no case will the extension be granted for the assignment
completion and submission.
3. To reflect the manner in which most corporations conduct
business, students shall form
groups of four to handle this assignment. It is up to the students
17. to form the groups. Faculty
members will not entertain requests relating to group formation.
4. Once a group is formed, you are required to register into a
group under “Groups” on CD,
which also aids you to successfully submit your assignment.
5. If you submit work to be marked after the due date you will
incur a deduction of 20%
from the total marks, for each calendar day of the week the
assignment is late, for up to 5
calendar days. Further, we will not accept any submission after
11:59pm on Wednesday (21
September). For example, if the due date is Friday 16th
September 2016 and you do not
have an extension approval from the Unit Chair and hand your
work in late on the next day
which is Saturday 17th September 2016, 20% of the total marks,
equivalent of 4 marks, will
be deducted. If your work is marked as worthy of a grade of 16,
you will only receive 12 for
it after applying the penalty.
6. CloudDeakin submission: Each group needs submitti ng only
once. Please use your IDs
naming your files, such as
700374***_600039***_210039***_3600589***_MAF307_Rep
ort_2015T1.doc(x).
7. A copy of the assignment must be kept by students to cover
the possibility of lost
assignments.
Good luck.
18. Page 2 of 3
DEAKIN UNIVERSITY
FACULTY OF BUSINESS & LAW
SCHOOL OF ACCOUNTING ECONOMICS& FINANCE
MAF307 EQUITIES AND INVESTMENT ANALYSIS
ASSIGNMENT - Trimester 2, 2016
This written assignment has three parts:
PART I
In order to approximate business practice, where an individual's
performance evaluation
reflects not only the opinion of supervisors but also that of his
19. or her peers, group members
shall evaluate one another’s investment journals. Each group
member has to critically
analyse another member’s investment strategy, including, but
not limited to, comparing
their investment performance, return expectations, risk appetite,
frequency of trading,
stock selection decisions, those investment strategies that
worked and those that failed.
Students can choose to make their analysis based on the two
submitted journals, or based
on the entire six weekly journals if a group member happens to
have one.
Students can use this written analysis as the base to articulate
their oral presentation.
Please keep the overall length of your group oral presentation to
approximate five minutes
(Hint: Most estimated the number of words/minute around 100.)
(Word limit guidance - 800, 5 marks)
PART II
(a). Identify the best- and worst-performing shares from your
group members. Assess
whether the different performance is due to the different impact
on the shares brought by
1). macroeconomic environment; 2). industry/sector life cycle;
3) government or the central
bank’s policies; 4). foreign economic influence; 5). firm
specific policy or action, etc.
(b). Use last 2-year daily prices data to calculate the above
20. shares’ returns and variances or
standard deviations. Examine and comment on whether your
group’s best- and worst-
performing shares can be identified from this information.
(Hint: The daily prices can be
drawn from websites such as Yahoo finance, Google finance or
the Australian Financial
Review, etc.)
(Word limit guidance - 1000, 7 marks)
Page 3 of 3
PART III
As an analyst for Vandelay brokerage firm, your supervisor has
handed you a video clip – an
interview between Ticky Fullerton of The Business of ABC, and
the fund manager, Roger
Montgomery (You need to watch it first. You can access the
video file in the same folder). During the
interview, Roger Montgomery raised several share names in the
data centre storage business. Focus
on the following two stocks, NXT (NextDC) and VOC (Vocus
Communications). Your supervisor
asked you to write a report: i). to find the share prices of the
above two stocks at the time of the
interview (say, around 25th April of 2013) and their current
21. stock prices. What do you find? ii). to
examine and investigate the background and reasons (or risk
factors) behind this dramatic
share price difference. What are the reasons, if any, resulting in
the price dispersion? iii). to
assess the following statement: share prices fully reflect all
available information on a
particular share according to the efficient market hypothesis
(EMH) (Bodie et al (1997). If
this is the case, can you find any evidence to support that the
market was fully informed?
Does the EMH mean anything to you in explaining the share
price difference? Why and/or
why not? iv). to make a recommendation for both stocks based
on your research on behalf of your
firm to your clients – to buy hold or sell.
(Word limit guidance - 1200, 8 marks)
22. Reference
Zvi Bodie, Mohamed Arif, Raymond da Silva Rosa, Alex Kane
and Alan J Marcus (2007), Investments,
McGraw-Hill Irwin Australia.