SlideShare a Scribd company logo
1 of 28
Atha Corporation
[Type text]
To: All Employees
CC: Executive Management Team
From: Mary Atha, CEO
Date: July 1, 20XX
Re: Doubling Sales
A goal of doubling our sales has been established by my
executive management team. This is a newly created, bold, and
audacious goal made possible by a win-win relationship with a
white knight in the form of a venture capital firm. Retaining and
hiring high quality human capital will be made possible by this
new investment. Adoption of new leading edge technology and
increased capacity will also be made possible by this infusion of
new investment. Our company’s executive management team
sees an exciting future for the organization.
Our goal can only be met with your help and that of the other
middle managers of the company. We want you to empower
your people, create synergy by re-organizing your department,
and establish operational goals that can be measured, reported,
and continuously improved.
The latent talents of our employees, we believe, are a source of
untapped sustainable competitive advantage for the company.
Reaching our goal of doubling sales is reliant on successfully
engaging employees; our management team feels strongly about
that. These efforts stand to be derailed by employee
dissatisfaction if we do not do something about it right away.
The sources of dissatisfaction must be found and fixed with the
help of our human resources department. Accomplishing this
objective is believed to be one of your highest priorities.
My executive management team and I believe that to efficiently
manage your departments’ limited resources you must
effectively plan, organize, lead, and control your department.
Mistakes were made in the past. Taking the goals given to you
by your vice president, breaking them down to supporting
activities, communicating them to your staff, and measuring the
results is the way for you to be a successful manager.
Good luck with your plans; we are counting on you.
Sincerely,
Mary Atha, CEO
Atha Corporation
The benefits of implementing access controls for Ben's office
Implementing access control systems will be an asset because of
their customizability. You can allow some employees unlimited
access, and others access at certain times. Your daytime
employees might be granted access between 8-6, while your
night staff might have different access. You can go for a
keyless system using key codes, fingerprints or facial
recognition. With a key card is a good option they can because
it can be duplicated. Keeping track of who comes and goes will
not only help you be aware of who is inside your building, but
will provide a detailed record in the event that there is an issue.
A great feature of access control systems is their ability to be
controlled remotely. Let’s say someone wants to get inside a
room or building and you do not want them to have the code
you can let them in remotely. To cut down on cost You can
program your access control system to turn off lights, turn down
your heat, and control other cost-saving factors.
1
Customizable System
You Won’t Lose Your Keys
Key Cards are Harder to Duplicate
Easy to Log Activity
Remote Access
Cut Costs
The ways you can use authorization and authentication to
protect the company's data
While password authentication is the most common way to
confirm a user’s identity it not very secure anyone can get in if
they know your password. There different ways of
authentication. One is Email authentication that allows users to
securely log in using just an email address.. Two is Biometric
authentication includes any type of authentication method that
requires a user’s biology. And Key point authentication
confirms an online user’s identity.
2
Password authentication
Email Authentication
Biometric Authentication
Key point Authentication
How the use of temporary employees can make data vulnerable
to social engineering attacks
The security risks from the rise in temporary staff
Companies vulnerable to a new kind of fraud executive-level
impersonation. Organized criminal gangs employing executive
impersonation techniques.
3
Methods to mitigate social engineering threats and damage
When people aren't educated to the types of attacks being used,
then they cannot possibly defend against them. Make sure you
are careful what you post on social media. Companies that
actively seek to protect themselves from social engineering
attacks often focus on protecting the wrong things. So make
sure you know what to protect. Write a security policy for
protecting your data assets. Then back up that policy with good
awareness training.
4
Educate
Be aware
Determine which of your assets are most valuable to criminals
Write a policy and back it up with good awareness training
Information Security Policy
Benefits of Implementing Access control
It increases safety
Increases security of sensitive data
Helps to reduce theft and accidents
Account for incoming and outgoing individuals
Curtails unwanted strangers
(Rittinghouse & Ransome, 2016)
Increases safety
it increases the safety of employees getting into the business. It
becomes faster to swipe access cards and it is not easily
duplicated by malicious persons.
Increases security of sensitive data
The employees with the required clearance are the only ones
that are given access to the company’s sensitive data. through
this, the company is able to regulate the number of people that
have access to some data that is deemed sensitive to be
disclosed to the competitors or the general public.
Reduce theft and accidents
The business will be able to give only approved employees the
access to some designated areas. This makes usre that theft or
accidents are greatly reduced.
Account for incoming and outgoing individuals
Each individual accessing the system should be accounted for as
this will be useful in ensuring that their actions are always
accounted. Some of them might access the systems with
malicious intent which needs to be identified fast for the good
of the company.
Curtail unwanted strangers
Access control denies unwanted strangers the ability to log into
the company’s systems to cause havoc in them or steal
confidential data.
1
Ways to use Authentication and Authorization to protect
Company Data
Single-factor and Multi-factor authentication
Biometrics
Federations
(Ting et al., 2015).
Single and multi-factor authentication
Single-factor and multi-factor authentication will require any
employee to produce some credentials e.g. passwords or PINS
as well as usernames before they can be granted access to the
company’s data or information
Biometrics
it is one of the secure ways to implement access control. They
include fingerprint scanners, full hand scanners, eye scanners,
facial recognition and voice recognition. This will help protect
company data and sensitive information from malicious persons
Federations
Set by a means of federated identity that links system users
identity with their privileges and hence restricting from
accessing data and information that is beyond their clearance.
2
How Temporary Employees Make Data Vulnerable To Social
Engineering Works.
Temporary employees make data vulnerable due to various
reasons;
Lack of adequate knowledge about the working of the
organization. This way the employees make the data vulnerable
because they do not understand the threats facing the system
(Berson, 2011).
Some have malicious intentions and therefore expose data to
social engineering works.
Vulnerabilities to Social Engineering works
Some employees have ill-intentions and therefore expose data to
vulnerabilities. Such employees can distribute confidential
information over the internet.
Ignorance among some of employees maybe harmful to an
organization. Such employees may fail to follow important data
security protocols which in turn exposes data to vulnerabilities.
3
Methods To Mitigate Social Engineering Threats
Ways of mitigating social engineering threats include;
Educating employees about securing their personal information
that can be used for social engineering attacks.
Ensuring that the software in use is up-to date.
Establishing policies that protect confidential information from
exposure (DeLuccia,2008).
Mitigating Social Engineering Threats
Most social engineering criminals tend to success due to
ignorance among people. It is the responsibility of the
organization to teach its employees about these attacks to
prevent future attacks.
Criminals ten to exploit updated software when executing their
attacks. It is therefore important for organizations to ensure that
they software are always up to date.
Having a security policy is a step towards mitigating social
engineering threats.
4
This image depicts how
social engineering
attacks are planned
and executed
REFERENCES
Rittinghouse, J. W. & Ransome, J. F. (2016). Access Control:
implementation, management and security. CRC Press.
Berson, A., & Dubov, L. (2011). Master data management and
data governance. New York: McGraw-Hill.
DeLuccia, J. J. (2008). IT compliance and controls: Best
practices for implementation. Hoboken, N.J: John Wiley &
Sons.
Ting, D. M. Hussain, O., & LaRoche, G. (2015). Systems and
methods for multi-factor authentication.
Atha Corporation
Executive Department Management Instructions
Atha Corporation owner, Mary Atha has declared a goal of
doubling the company’s current $5 million in sales in the next
year. Atha markets its product, unique lighting products (wall,
pendant, floor, table, and nightlights) made of 50% recycled
materials, through as series of regional distributors and directly
online. It is currently the end of the third quarter and you have
three months to complete your planning and execute your
strategy in order to have your functional areas prepared. There
is no time to waste in meeting the goal. Plans have to be
developed, current employees retained, and new employees
hired. Company communications must be clear and concise and
the management cycle must be followed throughout the process.
You will serve as the department manager for two functional
areas. One is the human resources department; the other is your
choice of one of three other areas: accounting and finance,
marketing and sales, or operations and production.
Ms. Atha has assigned specific goals to the vice president of
your functional area. The vice president has determined what
your department needs to do to help the entire functional area
succeed. Those goals are in alignment with the overall company
goal of doubling sales. Your responsibility is to break those
goals into activities and tasks for your department.
You have one or more supervisors in your department. Each
supervisor has several employees to lead and control. Each
individual must know what he or she is to do, how or why to do
it, what the quality and performance standard is, and how well
he or she is doing. It is your responsibility to align the work of
your team with the company goal. You will provide your team
members with the information they need, and ensure that they
complete the work on time while meeting performance and
quality standards.Functional Area Background
Planning: You have been assigned additional employees and
(possibly) new assets in order to meet your goals. You must
determine what skills, strengths, and talents they must have.
How will you retain and motivate your existing employees and
attract, hire, train, and retain new ones with the help of human
resources? How will you break down your functional goals into
departmental activities? How will you measure success? What is
the frequency of your activities?
Organizing: You have the old department organizational chart.
Create a new organizational chart for your functional area,
showing how you will allocate your employees efficiently in
order to achieve your department goals. The company has made
a decision not to hire based solely on industry experience. Can
you identify non-traditional industries or positions in which
employee skills can be effectively transferred to Atha?
Leading and Controlling: What are the purpose statements for
both of your functional areas? How do these reflect strategic
alignment with the organization? What are the performance
standards? How will you measure and report the performance
and quality standards? How do these support the people in your
organization through promoting trust, motivating employees,
and supporting collaboration?Additional Resources Available to
Each Department Manager
Additional resources have been allocated to each manager.
Below is a list of resources for each department. Include this
information in your planning, organizing, leading, and
controlling functions.
Accounting and Finance: Three additional employees, one of
whom is a financial analyst, have been approved for your
department. You have as much technical budget as reasonably
needed to support a world-class computer system.
Sales and Marketing: You can hire seven new employees.
Position them in your department as necessary to meet the
company goals.
Human Resources: You will be helping department managers to
hire 30 new employees for the company. Executive management
has authorized you to hire two new human resource generalists
for your department. They will begin by assisting in the
screening, interviewing, and hiring of new employees. Be sure
to discuss how their role will transition once new employees
have been hired and trained.
Operations and Production: In order to double your sales, you
must first increase your production capacity. Therefore, the
company will add a third shift to maximize the production
capacity of the existing production line. You will need to hire
18 new employees to fully staff the three shifts. Further
consideration is under review to purchase a second production
line.
Resources
Functional Area
Accounting and Finance
Sales and Marketing
Human Resources
Operations and Production
Current number of employees:
8
12
4
34
Total employees needed:
11
19
6
52
Employees to hire:
3
7
2
18
Supervisor tenure:
New
New
10 years
New
Existing organizational chart:
Yes
Yes
Yes
Yes
Atha Corporation
Strategic Alignment Worksheet: Human Resources Functional
Area
Your Name:
Overview
Use this strategic alignment worksheet (SAW) to complete your
management activities in planning, organizing, leading, and
controlling for the Atha Corporation scenario. Refer to each
course assessment for further instructions.Checklist for the
Human Resources Area SAW
Mary Atha, CEO, has provided this checklist of overall
organization goals for the human resources area. Read the
checklist and use it as a point of reference for your development
of this SAW.
Ensure staffing requirements are met.
Retain existing staff.
Hire and train new staff.
Plan, organize, lead, and direct the human resources of the
company to meet the goal of growing the business by 100%.
Section 1: Goals and Activities
Develop goals for this functional area and create supporting
activities for achieving each goal. (Add more rows if needed.)
Goals:
Supporting activities:
1. Retain existing employees.
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
2. Add two human resources generalists.
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
3. Assist department managers in the hiring of new employees.
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
4. Assist department managers with the improvement of
employee performance.
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
5. Create a new organizational chart for the human resources
functional area.
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
6. [Insert new goal here.]
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
7. [Insert new goal here.]
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
8. [Insert new goal here.]
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
Section 2: Purpose Statement
Write a purpose statement for this functional area of the
organization.
Most of us are aware of the term purpose statement, but we may
be unsure of what its real meaning is within an organization. It
is a statement describing the organization or functional team’s
purpose, or the reason for its existence. The purpose of an
organization reflects a desired position in the marketplace. It
should be a written summary that accurately answers the four
questions outlined in the table below. The most effective
purpose statements are short, concise, and direct. A good
purpose statement should be between 2–3 sentences in length.
Purpose Statement
Who are we?
What do we do?
For whom do we do this?
How do we know when we are getting it done?
Compile your answers to the four questions above into a concise
(2–3 sentence) summary statement. This is your purpose
statement.
[Insert your purpose statement here.]
Section 3: Performance Standards
Identify performance standards for measuring this functional
area team’s performance. (Add more rows if needed.)
Performance standard:
Rationale for including this performance standard:
1.
2.
3.
4.
5.
6
Atha Corporation
Strategic Alignment Worksheet: Operations and Production
Functional Area
Your Name:
Overview
Use this strategic alignment worksheet (SAW) to complete your
management activities in planning, organizing, leading, and
controlling for the Atha Corporation scenario. Refer to each
course assessment for further instructions.Checklist for the
Operations and Production Area SAW
Mary Atha, CEO, has provided this checklist of overall
organization goals for the operations and production area. Read
the checklist and use it as a point of reference for your
development of this SAW.
Double current production rate.
Add one production line.
Reduce scrap and waste.
Organize the newly increased staff to efficiently use resources
and create a new organizational chart.
Lead the employees by providing a clear mission and goals
through carefully crafted communications.
Create adequate controls and communicate performance to the
company to ensure organizational focus.
Section 1: Goals and Activities
Develop goals for this functional area and create supporting
activities for achieving each goal. (Add more rows if needed.)
Goals:
Supporting activities:
1. Retain existing employees.
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
2. Hire eighteen new employees.
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
3. Create new organizational chart for the operations and
production area.
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
4. Improve employee performance.
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
5. [Insert new goal here.]
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
6. [Insert new goal here.]
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
7. [Insert new goal here.]
What are the supporting activities?
How will this activity achieve the goal?
What is the achievement deadline?
Section 2: Purpose Statement
Write a purpose statement for this functional area of the
organization.
Most of us are aware of the term purpose statement, but we may
be unsure of what its real meaning is within an organization. It
is a statement describing the organization or functional team’s
purpose, or the reason for its existence. The purpose of an
organization reflects a desired position in the marketplace. It
should be a written summary that accurately answers the four
questions outlined in the table below. The most effective
purpose statements are short, concise, and direct. A good
purpose statement should be between 2–3 sentences in length.
Purpose Statement
Who are we?
What do we do?
For whom do we do this?
How do we know when we are getting it done?
Compile your answers to the four questions above into a concise
(2–3 sentence) summary statement. This is your purpose
statement.
[Insert your purpose statement here.]
Section 3: Performance Standards
Identify performance standards for measuring this functional
area team’s performance. (Add more rows if needed.)
Performance standard:
Rationale for including this performance standard:
1.
2.
3.
4.
5.
6

More Related Content

Similar to Atha Corporation[Type text]To All EmployeesCC Exec.docx

Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docxharrisonhoward80223
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
Secure Group Management Model
Secure Group Management ModelSecure Group Management Model
Secure Group Management ModelSecure Group
 
Account Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full ProtectionAccount Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full ProtectionKalin Hitrov
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenCMR WORLD TECH
 
5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docxSameerShaik43
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingDanielle Bowers
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber SecurityStacy Willis
 
Ahearn security-presentation
Ahearn security-presentationAhearn security-presentation
Ahearn security-presentationjohnjamesahearn
 
Ahearn Security Presentation
Ahearn Security PresentationAhearn Security Presentation
Ahearn Security Presentationjohnjamesahearn
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docxMohsin Abbas
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxjeanettehully
 

Similar to Atha Corporation[Type text]To All EmployeesCC Exec.docx (20)

Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docx
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
Secure Group Management Model
Secure Group Management ModelSecure Group Management Model
Secure Group Management Model
 
Account Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full ProtectionAccount Takeover: The Best Practices for Full Protection
Account Takeover: The Best Practices for Full Protection
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx5 Best Identity Verification Software to Look Into in 2022.docx
5 Best Identity Verification Software to Look Into in 2022.docx
 
Business Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information TechnologyBusiness Impact of Identity Management In Information Technology
Business Impact of Identity Management In Information Technology
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
Ahearn security-presentation
Ahearn security-presentationAhearn security-presentation
Ahearn security-presentation
 
Ahearn Security Presentation
Ahearn Security PresentationAhearn Security Presentation
Ahearn Security Presentation
 
Manual user provisioning is dangerous
Manual user provisioning is dangerousManual user provisioning is dangerous
Manual user provisioning is dangerous
 
Identity Security.docx
Identity Security.docxIdentity Security.docx
Identity Security.docx
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
 
The 10 most trusted identity and access management solution providers 2018
The 10 most trusted identity and access management solution providers 2018The 10 most trusted identity and access management solution providers 2018
The 10 most trusted identity and access management solution providers 2018
 

More from jaggernaoma

Attached is a joint letter to Capitol Hill to advocate for increased.docx
Attached is a joint letter to Capitol Hill to advocate for increased.docxAttached is a joint letter to Capitol Hill to advocate for increased.docx
Attached is a joint letter to Capitol Hill to advocate for increased.docxjaggernaoma
 
Attached is a copy of an interview done with a Tribal member regardi.docx
Attached is a copy of an interview done with a Tribal member regardi.docxAttached is a copy of an interview done with a Tribal member regardi.docx
Attached is a copy of an interview done with a Tribal member regardi.docxjaggernaoma
 
Attached Files Week 5 - trace IP Physical Location.rtf (38..docx
Attached Files Week 5 - trace IP Physical Location.rtf (38..docxAttached Files Week 5 - trace IP Physical Location.rtf (38..docx
Attached Files Week 5 - trace IP Physical Location.rtf (38..docxjaggernaoma
 
Attached here is a psychology article I need to be summarized. Pleas.docx
Attached here is a psychology article I need to be summarized. Pleas.docxAttached here is a psychology article I need to be summarized. Pleas.docx
Attached here is a psychology article I need to be summarized. Pleas.docxjaggernaoma
 
Attached Files News Analysis Sample.docxNews Analysis Sam.docx
Attached Files News Analysis Sample.docxNews Analysis Sam.docxAttached Files News Analysis Sample.docxNews Analysis Sam.docx
Attached Files News Analysis Sample.docxNews Analysis Sam.docxjaggernaoma
 
Attached Files  SOC-220_SOCIAL PROBLEMS PRESENTATION.docx
Attached Files     SOC-220_SOCIAL PROBLEMS PRESENTATION.docxAttached Files     SOC-220_SOCIAL PROBLEMS PRESENTATION.docx
Attached Files  SOC-220_SOCIAL PROBLEMS PRESENTATION.docxjaggernaoma
 
Attached below you will find the series of 4 questions. This assignm.docx
Attached below you will find the series of 4 questions. This assignm.docxAttached below you will find the series of 4 questions. This assignm.docx
Attached below you will find the series of 4 questions. This assignm.docxjaggernaoma
 
Attached below isWEEK 4 As always, include references. As alwa.docx
Attached below isWEEK 4 As always, include references. As alwa.docxAttached below isWEEK 4 As always, include references. As alwa.docx
Attached below isWEEK 4 As always, include references. As alwa.docxjaggernaoma
 
Attached are two articles in one document. Write thoughtful resp.docx
Attached are two articles in one document. Write thoughtful resp.docxAttached are two articles in one document. Write thoughtful resp.docx
Attached are two articles in one document. Write thoughtful resp.docxjaggernaoma
 
Attached are the instructions to the assignment.Written Assign.docx
Attached are the instructions to the assignment.Written Assign.docxAttached are the instructions to the assignment.Written Assign.docx
Attached are the instructions to the assignment.Written Assign.docxjaggernaoma
 
Attached are the instructions and rubric! Research Paper #2.docx
Attached are the instructions and rubric! Research Paper #2.docxAttached are the instructions and rubric! Research Paper #2.docx
Attached are the instructions and rubric! Research Paper #2.docxjaggernaoma
 
Attached are the guidelines for the Expertise Sharing Project. M.docx
Attached are the guidelines for the Expertise Sharing Project. M.docxAttached are the guidelines for the Expertise Sharing Project. M.docx
Attached are the guidelines for the Expertise Sharing Project. M.docxjaggernaoma
 
Attached are the documents needed to complete the assignment. The in.docx
Attached are the documents needed to complete the assignment. The in.docxAttached are the documents needed to complete the assignment. The in.docx
Attached are the documents needed to complete the assignment. The in.docxjaggernaoma
 
Attached are the 3 documents1. Draft copy submitted2. Sam.docx
Attached are the 3 documents1. Draft copy submitted2. Sam.docxAttached are the 3 documents1. Draft copy submitted2. Sam.docx
Attached are the 3 documents1. Draft copy submitted2. Sam.docxjaggernaoma
 
attached are directions needed to complete this essay! Please make s.docx
attached are directions needed to complete this essay! Please make s.docxattached are directions needed to complete this essay! Please make s.docx
attached are directions needed to complete this essay! Please make s.docxjaggernaoma
 
Attach is the checklist For this Assignment, write a 3 and half pa.docx
Attach is the checklist For this Assignment, write a 3 and half pa.docxAttach is the checklist For this Assignment, write a 3 and half pa.docx
Attach is the checklist For this Assignment, write a 3 and half pa.docxjaggernaoma
 
Attach and submit the final draft of your Narrative Essay. Remember .docx
Attach and submit the final draft of your Narrative Essay. Remember .docxAttach and submit the final draft of your Narrative Essay. Remember .docx
Attach and submit the final draft of your Narrative Essay. Remember .docxjaggernaoma
 
Atomic Theory Scientists and Their ContributionsScientist .docx
Atomic Theory Scientists and Their ContributionsScientist .docxAtomic Theory Scientists and Their ContributionsScientist .docx
Atomic Theory Scientists and Their ContributionsScientist .docxjaggernaoma
 
Atomic models are useful because they allow us to picture what is in.docx
Atomic models are useful because they allow us to picture what is in.docxAtomic models are useful because they allow us to picture what is in.docx
Atomic models are useful because they allow us to picture what is in.docxjaggernaoma
 
Atoms and Electrons AssignmentLook at these websites to he.docx
Atoms and Electrons AssignmentLook at these websites to he.docxAtoms and Electrons AssignmentLook at these websites to he.docx
Atoms and Electrons AssignmentLook at these websites to he.docxjaggernaoma
 

More from jaggernaoma (20)

Attached is a joint letter to Capitol Hill to advocate for increased.docx
Attached is a joint letter to Capitol Hill to advocate for increased.docxAttached is a joint letter to Capitol Hill to advocate for increased.docx
Attached is a joint letter to Capitol Hill to advocate for increased.docx
 
Attached is a copy of an interview done with a Tribal member regardi.docx
Attached is a copy of an interview done with a Tribal member regardi.docxAttached is a copy of an interview done with a Tribal member regardi.docx
Attached is a copy of an interview done with a Tribal member regardi.docx
 
Attached Files Week 5 - trace IP Physical Location.rtf (38..docx
Attached Files Week 5 - trace IP Physical Location.rtf (38..docxAttached Files Week 5 - trace IP Physical Location.rtf (38..docx
Attached Files Week 5 - trace IP Physical Location.rtf (38..docx
 
Attached here is a psychology article I need to be summarized. Pleas.docx
Attached here is a psychology article I need to be summarized. Pleas.docxAttached here is a psychology article I need to be summarized. Pleas.docx
Attached here is a psychology article I need to be summarized. Pleas.docx
 
Attached Files News Analysis Sample.docxNews Analysis Sam.docx
Attached Files News Analysis Sample.docxNews Analysis Sam.docxAttached Files News Analysis Sample.docxNews Analysis Sam.docx
Attached Files News Analysis Sample.docxNews Analysis Sam.docx
 
Attached Files  SOC-220_SOCIAL PROBLEMS PRESENTATION.docx
Attached Files     SOC-220_SOCIAL PROBLEMS PRESENTATION.docxAttached Files     SOC-220_SOCIAL PROBLEMS PRESENTATION.docx
Attached Files  SOC-220_SOCIAL PROBLEMS PRESENTATION.docx
 
Attached below you will find the series of 4 questions. This assignm.docx
Attached below you will find the series of 4 questions. This assignm.docxAttached below you will find the series of 4 questions. This assignm.docx
Attached below you will find the series of 4 questions. This assignm.docx
 
Attached below isWEEK 4 As always, include references. As alwa.docx
Attached below isWEEK 4 As always, include references. As alwa.docxAttached below isWEEK 4 As always, include references. As alwa.docx
Attached below isWEEK 4 As always, include references. As alwa.docx
 
Attached are two articles in one document. Write thoughtful resp.docx
Attached are two articles in one document. Write thoughtful resp.docxAttached are two articles in one document. Write thoughtful resp.docx
Attached are two articles in one document. Write thoughtful resp.docx
 
Attached are the instructions to the assignment.Written Assign.docx
Attached are the instructions to the assignment.Written Assign.docxAttached are the instructions to the assignment.Written Assign.docx
Attached are the instructions to the assignment.Written Assign.docx
 
Attached are the instructions and rubric! Research Paper #2.docx
Attached are the instructions and rubric! Research Paper #2.docxAttached are the instructions and rubric! Research Paper #2.docx
Attached are the instructions and rubric! Research Paper #2.docx
 
Attached are the guidelines for the Expertise Sharing Project. M.docx
Attached are the guidelines for the Expertise Sharing Project. M.docxAttached are the guidelines for the Expertise Sharing Project. M.docx
Attached are the guidelines for the Expertise Sharing Project. M.docx
 
Attached are the documents needed to complete the assignment. The in.docx
Attached are the documents needed to complete the assignment. The in.docxAttached are the documents needed to complete the assignment. The in.docx
Attached are the documents needed to complete the assignment. The in.docx
 
Attached are the 3 documents1. Draft copy submitted2. Sam.docx
Attached are the 3 documents1. Draft copy submitted2. Sam.docxAttached are the 3 documents1. Draft copy submitted2. Sam.docx
Attached are the 3 documents1. Draft copy submitted2. Sam.docx
 
attached are directions needed to complete this essay! Please make s.docx
attached are directions needed to complete this essay! Please make s.docxattached are directions needed to complete this essay! Please make s.docx
attached are directions needed to complete this essay! Please make s.docx
 
Attach is the checklist For this Assignment, write a 3 and half pa.docx
Attach is the checklist For this Assignment, write a 3 and half pa.docxAttach is the checklist For this Assignment, write a 3 and half pa.docx
Attach is the checklist For this Assignment, write a 3 and half pa.docx
 
Attach and submit the final draft of your Narrative Essay. Remember .docx
Attach and submit the final draft of your Narrative Essay. Remember .docxAttach and submit the final draft of your Narrative Essay. Remember .docx
Attach and submit the final draft of your Narrative Essay. Remember .docx
 
Atomic Theory Scientists and Their ContributionsScientist .docx
Atomic Theory Scientists and Their ContributionsScientist .docxAtomic Theory Scientists and Their ContributionsScientist .docx
Atomic Theory Scientists and Their ContributionsScientist .docx
 
Atomic models are useful because they allow us to picture what is in.docx
Atomic models are useful because they allow us to picture what is in.docxAtomic models are useful because they allow us to picture what is in.docx
Atomic models are useful because they allow us to picture what is in.docx
 
Atoms and Electrons AssignmentLook at these websites to he.docx
Atoms and Electrons AssignmentLook at these websites to he.docxAtoms and Electrons AssignmentLook at these websites to he.docx
Atoms and Electrons AssignmentLook at these websites to he.docx
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Atha Corporation[Type text]To All EmployeesCC Exec.docx

  • 1. Atha Corporation [Type text] To: All Employees CC: Executive Management Team From: Mary Atha, CEO Date: July 1, 20XX Re: Doubling Sales A goal of doubling our sales has been established by my executive management team. This is a newly created, bold, and audacious goal made possible by a win-win relationship with a white knight in the form of a venture capital firm. Retaining and hiring high quality human capital will be made possible by this new investment. Adoption of new leading edge technology and increased capacity will also be made possible by this infusion of new investment. Our company’s executive management team sees an exciting future for the organization. Our goal can only be met with your help and that of the other middle managers of the company. We want you to empower your people, create synergy by re-organizing your department, and establish operational goals that can be measured, reported, and continuously improved. The latent talents of our employees, we believe, are a source of untapped sustainable competitive advantage for the company. Reaching our goal of doubling sales is reliant on successfully engaging employees; our management team feels strongly about that. These efforts stand to be derailed by employee dissatisfaction if we do not do something about it right away. The sources of dissatisfaction must be found and fixed with the help of our human resources department. Accomplishing this objective is believed to be one of your highest priorities. My executive management team and I believe that to efficiently
  • 2. manage your departments’ limited resources you must effectively plan, organize, lead, and control your department. Mistakes were made in the past. Taking the goals given to you by your vice president, breaking them down to supporting activities, communicating them to your staff, and measuring the results is the way for you to be a successful manager. Good luck with your plans; we are counting on you. Sincerely, Mary Atha, CEO Atha Corporation The benefits of implementing access controls for Ben's office Implementing access control systems will be an asset because of their customizability. You can allow some employees unlimited access, and others access at certain times. Your daytime employees might be granted access between 8-6, while your night staff might have different access. You can go for a keyless system using key codes, fingerprints or facial recognition. With a key card is a good option they can because it can be duplicated. Keeping track of who comes and goes will not only help you be aware of who is inside your building, but will provide a detailed record in the event that there is an issue. A great feature of access control systems is their ability to be controlled remotely. Let’s say someone wants to get inside a room or building and you do not want them to have the code you can let them in remotely. To cut down on cost You can program your access control system to turn off lights, turn down your heat, and control other cost-saving factors. 1
  • 3. Customizable System You Won’t Lose Your Keys Key Cards are Harder to Duplicate Easy to Log Activity Remote Access Cut Costs The ways you can use authorization and authentication to protect the company's data
  • 4. While password authentication is the most common way to confirm a user’s identity it not very secure anyone can get in if they know your password. There different ways of authentication. One is Email authentication that allows users to securely log in using just an email address.. Two is Biometric authentication includes any type of authentication method that requires a user’s biology. And Key point authentication confirms an online user’s identity. 2 Password authentication Email Authentication Biometric Authentication Key point Authentication
  • 5. How the use of temporary employees can make data vulnerable to social engineering attacks The security risks from the rise in temporary staff Companies vulnerable to a new kind of fraud executive-level impersonation. Organized criminal gangs employing executive impersonation techniques. 3
  • 6. Methods to mitigate social engineering threats and damage When people aren't educated to the types of attacks being used, then they cannot possibly defend against them. Make sure you are careful what you post on social media. Companies that actively seek to protect themselves from social engineering attacks often focus on protecting the wrong things. So make sure you know what to protect. Write a security policy for protecting your data assets. Then back up that policy with good awareness training. 4 Educate Be aware Determine which of your assets are most valuable to criminals Write a policy and back it up with good awareness training
  • 7. Information Security Policy Benefits of Implementing Access control It increases safety Increases security of sensitive data Helps to reduce theft and accidents Account for incoming and outgoing individuals Curtails unwanted strangers (Rittinghouse & Ransome, 2016) Increases safety it increases the safety of employees getting into the business. It becomes faster to swipe access cards and it is not easily duplicated by malicious persons. Increases security of sensitive data The employees with the required clearance are the only ones that are given access to the company’s sensitive data. through this, the company is able to regulate the number of people that have access to some data that is deemed sensitive to be disclosed to the competitors or the general public. Reduce theft and accidents The business will be able to give only approved employees the access to some designated areas. This makes usre that theft or accidents are greatly reduced. Account for incoming and outgoing individuals Each individual accessing the system should be accounted for as this will be useful in ensuring that their actions are always accounted. Some of them might access the systems with malicious intent which needs to be identified fast for the good
  • 8. of the company. Curtail unwanted strangers Access control denies unwanted strangers the ability to log into the company’s systems to cause havoc in them or steal confidential data. 1 Ways to use Authentication and Authorization to protect Company Data Single-factor and Multi-factor authentication Biometrics Federations (Ting et al., 2015). Single and multi-factor authentication Single-factor and multi-factor authentication will require any employee to produce some credentials e.g. passwords or PINS as well as usernames before they can be granted access to the company’s data or information Biometrics it is one of the secure ways to implement access control. They include fingerprint scanners, full hand scanners, eye scanners, facial recognition and voice recognition. This will help protect company data and sensitive information from malicious persons Federations Set by a means of federated identity that links system users
  • 9. identity with their privileges and hence restricting from accessing data and information that is beyond their clearance. 2 How Temporary Employees Make Data Vulnerable To Social Engineering Works. Temporary employees make data vulnerable due to various reasons; Lack of adequate knowledge about the working of the organization. This way the employees make the data vulnerable because they do not understand the threats facing the system (Berson, 2011). Some have malicious intentions and therefore expose data to social engineering works. Vulnerabilities to Social Engineering works Some employees have ill-intentions and therefore expose data to vulnerabilities. Such employees can distribute confidential information over the internet. Ignorance among some of employees maybe harmful to an organization. Such employees may fail to follow important data security protocols which in turn exposes data to vulnerabilities. 3 Methods To Mitigate Social Engineering Threats Ways of mitigating social engineering threats include; Educating employees about securing their personal information
  • 10. that can be used for social engineering attacks. Ensuring that the software in use is up-to date. Establishing policies that protect confidential information from exposure (DeLuccia,2008). Mitigating Social Engineering Threats Most social engineering criminals tend to success due to ignorance among people. It is the responsibility of the organization to teach its employees about these attacks to prevent future attacks. Criminals ten to exploit updated software when executing their attacks. It is therefore important for organizations to ensure that they software are always up to date. Having a security policy is a step towards mitigating social engineering threats. 4 This image depicts how social engineering attacks are planned and executed REFERENCES Rittinghouse, J. W. & Ransome, J. F. (2016). Access Control: implementation, management and security. CRC Press. Berson, A., & Dubov, L. (2011). Master data management and data governance. New York: McGraw-Hill. DeLuccia, J. J. (2008). IT compliance and controls: Best practices for implementation. Hoboken, N.J: John Wiley &
  • 11. Sons. Ting, D. M. Hussain, O., & LaRoche, G. (2015). Systems and methods for multi-factor authentication. Atha Corporation Executive Department Management Instructions Atha Corporation owner, Mary Atha has declared a goal of doubling the company’s current $5 million in sales in the next year. Atha markets its product, unique lighting products (wall, pendant, floor, table, and nightlights) made of 50% recycled materials, through as series of regional distributors and directly online. It is currently the end of the third quarter and you have three months to complete your planning and execute your strategy in order to have your functional areas prepared. There is no time to waste in meeting the goal. Plans have to be developed, current employees retained, and new employees hired. Company communications must be clear and concise and the management cycle must be followed throughout the process. You will serve as the department manager for two functional areas. One is the human resources department; the other is your choice of one of three other areas: accounting and finance, marketing and sales, or operations and production. Ms. Atha has assigned specific goals to the vice president of your functional area. The vice president has determined what your department needs to do to help the entire functional area succeed. Those goals are in alignment with the overall company goal of doubling sales. Your responsibility is to break those goals into activities and tasks for your department. You have one or more supervisors in your department. Each
  • 12. supervisor has several employees to lead and control. Each individual must know what he or she is to do, how or why to do it, what the quality and performance standard is, and how well he or she is doing. It is your responsibility to align the work of your team with the company goal. You will provide your team members with the information they need, and ensure that they complete the work on time while meeting performance and quality standards.Functional Area Background Planning: You have been assigned additional employees and (possibly) new assets in order to meet your goals. You must determine what skills, strengths, and talents they must have. How will you retain and motivate your existing employees and attract, hire, train, and retain new ones with the help of human resources? How will you break down your functional goals into departmental activities? How will you measure success? What is the frequency of your activities? Organizing: You have the old department organizational chart. Create a new organizational chart for your functional area, showing how you will allocate your employees efficiently in order to achieve your department goals. The company has made a decision not to hire based solely on industry experience. Can you identify non-traditional industries or positions in which employee skills can be effectively transferred to Atha? Leading and Controlling: What are the purpose statements for both of your functional areas? How do these reflect strategic alignment with the organization? What are the performance standards? How will you measure and report the performance and quality standards? How do these support the people in your organization through promoting trust, motivating employees, and supporting collaboration?Additional Resources Available to Each Department Manager Additional resources have been allocated to each manager. Below is a list of resources for each department. Include this information in your planning, organizing, leading, and controlling functions. Accounting and Finance: Three additional employees, one of
  • 13. whom is a financial analyst, have been approved for your department. You have as much technical budget as reasonably needed to support a world-class computer system. Sales and Marketing: You can hire seven new employees. Position them in your department as necessary to meet the company goals. Human Resources: You will be helping department managers to hire 30 new employees for the company. Executive management has authorized you to hire two new human resource generalists for your department. They will begin by assisting in the screening, interviewing, and hiring of new employees. Be sure to discuss how their role will transition once new employees have been hired and trained. Operations and Production: In order to double your sales, you must first increase your production capacity. Therefore, the company will add a third shift to maximize the production capacity of the existing production line. You will need to hire 18 new employees to fully staff the three shifts. Further consideration is under review to purchase a second production line. Resources Functional Area Accounting and Finance Sales and Marketing Human Resources Operations and Production Current number of employees: 8 12 4 34 Total employees needed: 11
  • 14. 19 6 52 Employees to hire: 3 7 2 18 Supervisor tenure: New New 10 years New Existing organizational chart: Yes Yes Yes Yes Atha Corporation Strategic Alignment Worksheet: Human Resources Functional Area Your Name: Overview Use this strategic alignment worksheet (SAW) to complete your management activities in planning, organizing, leading, and controlling for the Atha Corporation scenario. Refer to each course assessment for further instructions.Checklist for the Human Resources Area SAW Mary Atha, CEO, has provided this checklist of overall organization goals for the human resources area. Read the checklist and use it as a point of reference for your development
  • 15. of this SAW. Ensure staffing requirements are met. Retain existing staff. Hire and train new staff. Plan, organize, lead, and direct the human resources of the company to meet the goal of growing the business by 100%. Section 1: Goals and Activities Develop goals for this functional area and create supporting activities for achieving each goal. (Add more rows if needed.) Goals: Supporting activities: 1. Retain existing employees. What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline? 2. Add two human resources generalists. What are the supporting activities? How will this activity achieve the goal?
  • 16. What is the achievement deadline? 3. Assist department managers in the hiring of new employees. What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline?
  • 17. 4. Assist department managers with the improvement of employee performance. What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline? 5. Create a new organizational chart for the human resources functional area. What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline?
  • 18. 6. [Insert new goal here.] What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline? 7. [Insert new goal here.] What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline?
  • 19. 8. [Insert new goal here.] What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline? Section 2: Purpose Statement Write a purpose statement for this functional area of the organization. Most of us are aware of the term purpose statement, but we may
  • 20. be unsure of what its real meaning is within an organization. It is a statement describing the organization or functional team’s purpose, or the reason for its existence. The purpose of an organization reflects a desired position in the marketplace. It should be a written summary that accurately answers the four questions outlined in the table below. The most effective purpose statements are short, concise, and direct. A good purpose statement should be between 2–3 sentences in length. Purpose Statement Who are we? What do we do? For whom do we do this? How do we know when we are getting it done? Compile your answers to the four questions above into a concise (2–3 sentence) summary statement. This is your purpose statement. [Insert your purpose statement here.] Section 3: Performance Standards Identify performance standards for measuring this functional area team’s performance. (Add more rows if needed.) Performance standard: Rationale for including this performance standard:
  • 21. 1. 2. 3. 4. 5. 6 Atha Corporation Strategic Alignment Worksheet: Operations and Production Functional Area Your Name: Overview Use this strategic alignment worksheet (SAW) to complete your management activities in planning, organizing, leading, and controlling for the Atha Corporation scenario. Refer to each course assessment for further instructions.Checklist for the Operations and Production Area SAW Mary Atha, CEO, has provided this checklist of overall organization goals for the operations and production area. Read the checklist and use it as a point of reference for your
  • 22. development of this SAW. Double current production rate. Add one production line. Reduce scrap and waste. Organize the newly increased staff to efficiently use resources and create a new organizational chart. Lead the employees by providing a clear mission and goals through carefully crafted communications. Create adequate controls and communicate performance to the company to ensure organizational focus. Section 1: Goals and Activities Develop goals for this functional area and create supporting activities for achieving each goal. (Add more rows if needed.) Goals: Supporting activities: 1. Retain existing employees. What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline?
  • 23. 2. Hire eighteen new employees. What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline? 3. Create new organizational chart for the operations and production area. What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline?
  • 24. 4. Improve employee performance. What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline? 5. [Insert new goal here.] What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline?
  • 25. 6. [Insert new goal here.] What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline? 7. [Insert new goal here.] What are the supporting activities? How will this activity achieve the goal? What is the achievement deadline?
  • 26. Section 2: Purpose Statement Write a purpose statement for this functional area of the organization. Most of us are aware of the term purpose statement, but we may be unsure of what its real meaning is within an organization. It is a statement describing the organization or functional team’s purpose, or the reason for its existence. The purpose of an organization reflects a desired position in the marketplace. It should be a written summary that accurately answers the four questions outlined in the table below. The most effective purpose statements are short, concise, and direct. A good purpose statement should be between 2–3 sentences in length. Purpose Statement Who are we? What do we do? For whom do we do this? How do we know when we are getting it done?
  • 27. Compile your answers to the four questions above into a concise (2–3 sentence) summary statement. This is your purpose statement. [Insert your purpose statement here.] Section 3: Performance Standards Identify performance standards for measuring this functional area team’s performance. (Add more rows if needed.) Performance standard: Rationale for including this performance standard: 1. 2. 3. 4. 5.
  • 28. 6