The COSO framework provides five components for effective internal control: control environment, risk assessment, control activities, information and communication, and monitoring activities. These components work together to help businesses achieve objectives, ensure reliable reporting, and comply with laws and regulations. Risk assessment involves identifying risks that could impact objectives, while control activities are policies and procedures used to mitigate risks. Information and communication allows for effective communication of responsibilities, and monitoring activities provide feedback to improve the system. The framework is useful for auditing and helps ensure accountability, reliability and regulatory compliance within an organization.
2/17/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=eb5800fc-c244-4b4d-88b8-038202f12d6b&course_id=… 1/4
%34
%7
SafeAssign Originality Report
Spring 2020 - InfoTech Import in Strat Plan (ITS-831-0… • Week 6 Research Paper: COSO Framework
%41Total Score: High risk
Vikeshkumar Dipakkumar Desai
Submission UUID: e820677a-7610-9ad7-18b2-99cfcb3c15b2
Total Number of Reports
1
Highest Match
41 %
COSO Framework.docx
Average Match
41 %
Submitted on
02/16/20
02:54 AM GMT+5:30
Average Word Count
1,404
Highest: COSO Framework.…
%41Attachment 1
Institutional database (8)
Student paper Student paper Student paper
Student paper Student paper Student paper
Student paper Student paper
Internet (3)
squarmilner ijeba protiviti
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 1,404
COSO Framework.docx
1 2 11
7 4 6
10 3
5 9 8
1 Student paper 2 Student paper 11 Student paper
Running head: COSO FRAMEWORK 1
COSO FRAMEWORK 2
COSO Framework
Name: Vikesh Desai
University of the Cumberland’s
Info Tech Import in Strat Plan (ITS-831-02) Date: February 15, 2020
COSO Framework
In 1985, five largest finance, accounting, and auditing oversight committees in the U.S established the Committee of Sponsoring Organizations
(COSO) to patron National Committee on Fraudulent Financial Reporting. The National Committee established a guide to guide tackle internal con-
trols, fraud prevention, and enterprise risk, management. This paper focuses on internal controls. The COSO framework expresses internal control
as an approach intended to offer practical assurance of objective attainment, including operations efficiency and effectiveness, financial reporting
dependability, and pertinent laws and regulations compliance. The COSO framework comprises of five components which affect these objec-
tives, the core of internal control. The control environment is the initial constituent. This component encompasses a set of ideals, structures, and
processes, offering a footing for the implementation of internal control throughout an organization (Pearlson, Saunders & Galletta, 2019). The board
of directors and executives in an organization set the tone with regard to internal control significance in the organization. Senior management
reinforces expectations at various organizational levels. Control environment entails organizational ethics and integrity, organizational structure and
authority and responsibility assignment, the parameters to empower the board of directors to fulfil its responsibility of governance oversight, and
1
2
2
3
2
4
5
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=eb5800fc-c244-4b4d-88b8-038202f12d6b&course_id=_113940_1&download=true&includeDeleted=true&print=true&force=true
2/17/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5.
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
· Processed on 09-Dec-2014 9:01 PM CST
· ID: 488406360
· Word Count: 1969
Similarity Index
47%
Similarity by Source
Internet Sources:
46%
Publications:
2%
Student Papers:
N/A
sources:
1
30% match (Internet from 27-Mar-2009)
http://www.isaca.org/Content/ContentGroups/Journal1/20023/The_IS_Audit_Process.htm
2
13% match (Internet from 29-Mar-2011)
http://www.scribd.com/doc/36655995/Chapter-1-the-Information-System-Audit-Process
3
2% match (publications)
Athula Ginige. "Web site auditing", Proceedings of the 14th international conference on Software engineering and knowledge engineering - SEKE 02 SEKE 02, 2002
4
1% match (Internet from 26-Feb-2012)
http://www.dc.fi.udc.es/~parapar/files/ai/The_IS_Audit_Process_isaca_sayana.pdf
5
1% match (Internet from 01-Apr-2009)
http://www.idkk.gov.tr/web/guest/it_audit_manual_isaca
paper text:
Running head: AUDITING INFORMATION SYSTEMS PROCESS Auditing information systems process Student’s Name University Affiliation Auditing information systems 2process Information systems are the livelihood of any huge business. As in past years, computer systems do not simply record transactions of business, but essentially drive the main business procedures of the enterprise. In such a situation, superior management and business managers do have worries concerning information systems. Auditing is a methodical process by which a proficient, independent person impartially obtains and assesses evidence concerning assertions about a financial entity or occasion for the reason of outlining an outlook about and reporting on the extent to which the contention matches to an acknowledged set of standards. Auditing of information systems is the administration controls assessment inside the communications of Information Technology. The obtained proof valuation is used to decide if systems of information are defensive assets, maintenance reliability of data, and also if they are efficiently operating in order to attain organization’s goals or objectives (Hoelzer, 2009). Auditing of Information Systems has become an essential part of business organization in both large and small business environments. This paper examines the preliminary points for carrying out and Information system audit and some of the, techniques, tools, guidelines and standards that can be employed to build, manage, and examine the review function. The Certified Information Systems Auditor (CISA) qualifications is recognized worldwide as a standard of accomplishment for those who assess, monitor, control and audit the information technology of an organization and business systems. Information Systems experts with a concern in information systems security, control and audit. At least five years of specialized information systems security, auditing and control work practice is necessary for certification. An audit contract should be present to evidently state the responsibility of the management, 2objectives for, and designation of authority to Information .
2/17/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=eb5800fc-c244-4b4d-88b8-038202f12d6b&course_id=… 1/4
%34
%7
SafeAssign Originality Report
Spring 2020 - InfoTech Import in Strat Plan (ITS-831-0… • Week 6 Research Paper: COSO Framework
%41Total Score: High risk
Vikeshkumar Dipakkumar Desai
Submission UUID: e820677a-7610-9ad7-18b2-99cfcb3c15b2
Total Number of Reports
1
Highest Match
41 %
COSO Framework.docx
Average Match
41 %
Submitted on
02/16/20
02:54 AM GMT+5:30
Average Word Count
1,404
Highest: COSO Framework.…
%41Attachment 1
Institutional database (8)
Student paper Student paper Student paper
Student paper Student paper Student paper
Student paper Student paper
Internet (3)
squarmilner ijeba protiviti
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 1,404
COSO Framework.docx
1 2 11
7 4 6
10 3
5 9 8
1 Student paper 2 Student paper 11 Student paper
Running head: COSO FRAMEWORK 1
COSO FRAMEWORK 2
COSO Framework
Name: Vikesh Desai
University of the Cumberland’s
Info Tech Import in Strat Plan (ITS-831-02) Date: February 15, 2020
COSO Framework
In 1985, five largest finance, accounting, and auditing oversight committees in the U.S established the Committee of Sponsoring Organizations
(COSO) to patron National Committee on Fraudulent Financial Reporting. The National Committee established a guide to guide tackle internal con-
trols, fraud prevention, and enterprise risk, management. This paper focuses on internal controls. The COSO framework expresses internal control
as an approach intended to offer practical assurance of objective attainment, including operations efficiency and effectiveness, financial reporting
dependability, and pertinent laws and regulations compliance. The COSO framework comprises of five components which affect these objec-
tives, the core of internal control. The control environment is the initial constituent. This component encompasses a set of ideals, structures, and
processes, offering a footing for the implementation of internal control throughout an organization (Pearlson, Saunders & Galletta, 2019). The board
of directors and executives in an organization set the tone with regard to internal control significance in the organization. Senior management
reinforces expectations at various organizational levels. Control environment entails organizational ethics and integrity, organizational structure and
authority and responsibility assignment, the parameters to empower the board of directors to fulfil its responsibility of governance oversight, and
1
2
2
3
2
4
5
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=eb5800fc-c244-4b4d-88b8-038202f12d6b&course_id=_113940_1&download=true&includeDeleted=true&print=true&force=true
2/17/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5.
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
· Processed on 09-Dec-2014 9:01 PM CST
· ID: 488406360
· Word Count: 1969
Similarity Index
47%
Similarity by Source
Internet Sources:
46%
Publications:
2%
Student Papers:
N/A
sources:
1
30% match (Internet from 27-Mar-2009)
http://www.isaca.org/Content/ContentGroups/Journal1/20023/The_IS_Audit_Process.htm
2
13% match (Internet from 29-Mar-2011)
http://www.scribd.com/doc/36655995/Chapter-1-the-Information-System-Audit-Process
3
2% match (publications)
Athula Ginige. "Web site auditing", Proceedings of the 14th international conference on Software engineering and knowledge engineering - SEKE 02 SEKE 02, 2002
4
1% match (Internet from 26-Feb-2012)
http://www.dc.fi.udc.es/~parapar/files/ai/The_IS_Audit_Process_isaca_sayana.pdf
5
1% match (Internet from 01-Apr-2009)
http://www.idkk.gov.tr/web/guest/it_audit_manual_isaca
paper text:
Running head: AUDITING INFORMATION SYSTEMS PROCESS Auditing information systems process Student’s Name University Affiliation Auditing information systems 2process Information systems are the livelihood of any huge business. As in past years, computer systems do not simply record transactions of business, but essentially drive the main business procedures of the enterprise. In such a situation, superior management and business managers do have worries concerning information systems. Auditing is a methodical process by which a proficient, independent person impartially obtains and assesses evidence concerning assertions about a financial entity or occasion for the reason of outlining an outlook about and reporting on the extent to which the contention matches to an acknowledged set of standards. Auditing of information systems is the administration controls assessment inside the communications of Information Technology. The obtained proof valuation is used to decide if systems of information are defensive assets, maintenance reliability of data, and also if they are efficiently operating in order to attain organization’s goals or objectives (Hoelzer, 2009). Auditing of Information Systems has become an essential part of business organization in both large and small business environments. This paper examines the preliminary points for carrying out and Information system audit and some of the, techniques, tools, guidelines and standards that can be employed to build, manage, and examine the review function. The Certified Information Systems Auditor (CISA) qualifications is recognized worldwide as a standard of accomplishment for those who assess, monitor, control and audit the information technology of an organization and business systems. Information Systems experts with a concern in information systems security, control and audit. At least five years of specialized information systems security, auditing and control work practice is necessary for certification. An audit contract should be present to evidently state the responsibility of the management, 2objectives for, and designation of authority to Information .
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxjeffsrosalyn
Running Head: ZIFFCORP AUDIT PROPOSAL 1
ZiffCorp Audit IT Security Audit Proposal
Brian A. McDougall
Central Washington University
Author Note:
Final Paper – IT 677 – Summer 2018
ZIFFCORP AUDIT PROPOSAL 2
Table of Contents
Title Page .......................................................................................................................................................................... 1
Table of Contents .......................................................................................................................................................... 2
Audit Proposal ................................................................................................................................................................ 3
Entity-Level Controls .................................................................................................................................................. 4
Data Center ...................................................................................................................................................................... 8
Database ......................................................................................................................................................................... 11
Web Server .................................................................................................................................................................... 13
Cloud ................................................................................................................................................................................ 14
Disaster Preparedness Plan .................................................................................................................................. 15
References ..................................................................................................................................................................... 16
ZIFFCORP AUDIT PROPOSAL 3
Audit Proposal
July 26, 2018
Artie Ziff, CEO
ZiffCorp
1066 3rd St
Springfield, VA 22150
Dear Mr. Ziff:
Thank you for the opportunity to present my proposal to perform an informal audit of
certain critical IT security policies and controls at ZiffCorp. Because of recent changes in
privacy regulations, GDPR in particular, I feel it expedient to review certain controls in
preparation for a formal audit that will verify ZiffCorp’s compliance to GDPR across the
organization. This audit is essential to maintaining quality operations and further help in
mitigating organizational risk, which can easily end up in dollars lost (Collins, 2017).
Let me stress that this will be an informal audit to be performed in order to assess our
security footing in certain areas of the company’s IT infrastructure. Our auditors will
review security controls and issue recommendations for.
Benefits of Data Analytics for External Audit.docxtangyechloe
Benefits of Data Analytics for External Audit
Benefits of Data Analytics for External Audit
Data analytics has emerged as an essential contributor in the field of auditing. The contribution of data analytics is diverse weighed on the basis of application with various forms of data used in auditing both internally and on an external basis. However, data analytics is a wider area of study with big data inclusive. Pence (2014) defines big data to include a vast form of information with a higher level of complexity and variety. The speed at which the data is analyzed and delivered is also part of the definition of big data as it relies on a high level of technology to handle the data within a shorter time than would have occurred using the traditional data handling approaches. For this reason, data analytics have benefited external audit in a number of ways including an improvement in value, an enhancement of audit quality and ensuring the process of transformation is possible and achievable. Comment by Microsoft Office 用户: Not sure what this sentence means...consider revising.
Comment by Microsoft Office 用户: This is unclear.
Comment by Microsoft Office 用户: To whom? What value?
First, the ability of auditors to attain an additional value to audit emanates from the presence of data analytics which enables the possibilities of using external market prices to re-price investments. The ability to adjust prices as above emanates from the increased ability of the auditors to handle vast volumes of data at a faster rate and hence improving the level of accuracy. Data analytics boasts of improved processes and systems that external auditors rely on in their work to attain the required results. Reliance on exceptions and outliers in auditing has proven possible through the process of auditing with big data analytics providing avenues of improvement and attainment of this objective (Kogan, Vasarhelyi & Appelbau, 2017, May 25). The resulting information obtained is what is used in repricing of investments to ensure the returns are adequate and a true and fair reflection of the investment. The process involved in auditing also includes encounters with data presented on the interest and foreign exchange rates of the country. Changes in GDP of an economy and other growth metrics are also part of the data presented in companies and contribute towards the success of companies. However, the decision-making process is based on the ability to choose from a number of options with a high degree of uncertainty which affects the entire value of the processes and operations of the enterprise. External auditors have relied on data analytics to examine historical data on the above and hence reducing the margin of error or failure that the organization encounters. A reduced margin of error enables external auditors therefore add value to the entire process as reduced costs of errors are evident with improved performance and quality. Therefore, data analytics .
The importance of using a computerized information system becomes a vital urgency to be resolved.
The existence of this need is based on the status quo condition or problems in the company, especially related to
real-time data and quality control conditions that affect decision-making for companies that are currently in a
"developing" condition with an "entrepreneur" -based leadership style where fluctuations and policy changes
can happen at any time.
This contents in this document is for academic purpose and those who are practicing internal and external audits. It is open for recommendations and opinions.
The endeavor of the report is in the direction of scrutinizing the effectiveness of project management in expressions of managerial structures, technological proficiency, and management skill along with the features of an effectual venture manager.
Before exploring the main content of the report let us consider the general concepts of the key words of relative topic or respective report.
Efficacy simply coded, is the core skill, aptitude or the capacity on the way to bring into being a required or projected outcome. The extent in the direction of which a touch is victorious in generating a looked-for outcome is effectiveness
Crafting a CMMI V2 Compliant Process for Governance Practice Area: An Experie...Dr. Mustafa Değerli
Değerli, M. (2020). Crafting a CMMI V2 Compliant Process for Governance Practice Area: An Experiential Proposal. 14th Turkish National Software Engineering Symposium (UYMS 2020). 10.1109/UYMS50627.2020.9247068 – https://ieeexplore.ieee.org/xpl/conhome/9247008/proceeding
The role of Operational and Performance-based Auditing on Government and the ...paul young cpa, cga
Many companies and various levels of government have internal audit departments. The problem many times with audits is the lack of resources. Analytics can play a bigger role in terms of expanding audits.
Information Assurance Framework for Web Services .docxjaggernaoma
Information Assurance Framework for Web Services 12
Information Assurance Framework for Web Services
Running head: Information Assurance Framework for Web Services 1
Table of Contents
Proposal14
Visual Representation16
Iteration -116
Understanding IA Challenges Plan16
Action17
Observation20
Reflection21
Iteration -2Conducting Survey22
Plan22
Action23
Observation25
Reflection27
Iteration -3 Structuring the Information28
Plan28
Action29
Observation30
Reflection32
Iteration-4 Developing Framework33
Plan33
Action34
Observation35
Reflection36
Summary of Learning37
References39
List of Tables
Table 1 Elements Considered in Quesionnaire23
Table 2 Standard Security Features24
Table 3 Security Elements28
List of Figures
Figure 1 Web Security Compromises3
Figure 2 Information Assurance Model5
Figure 3 Key Components of IA Implementation6
Figure 4 Action Research Process8
Figure.5 IA Reference Model Framework10
Figure 6 Web Frameworks12
Figure 7 Visual Representation14
Figure 8 IA for Web Applications Search16
Figure 9 Keyword Search Results18
Introduction
Internet based solutions, and web based services that are offered to the customers has become a common practice in the businesses. Right from B2B segment, to B2c and C2C, there are many web services and web based applications that are predominantly used in the business environment (Kahonge, 2013).
Adaptation and implementation of web based application systems has certainly supported the stakeholders of business in improving the ease of business communication, transaction processing and other such key business functions. However, one of the critical challenges that are envisaged in the business process are about issues pertaining to the information assurance issues in the web based application systems and processes that are adapted by the organizations (Al-hamami & et.al, 2012).
Globally, web based applications systems has become an integral part of the organizational requirements that could support in managing the business process in more effective ways. With the emergence of contemporary web technologies like Web 2.0, cloud based solutions and many other such developments emerging, there are potential developments that are taking place in the environment (DAN J KIM & et.al, 2004).
An organizational website that is poorly designed security features can open the door to security vulnerabilities. IT professionals may be put in a compromising position to prioritize system administrative tasks that are beneficial to a company’s bottom line over evaluating and proactively defending against security risks.
According to a research report that is published in the recent past on website security solutions and features, the study emphasize the key elements that impact the web security solutions and the need for companies to focus on improving the perform.
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORKHaresh Lalwani
This presentation is my endeavor to bring to notice the new position that internal audit enjoys today in the corporate framework, expectations of the industry and emerging opportunities for the professionals.
After the data are collected and before program evaluators meet with.docxmilissaccm
After the data are collected and before program evaluators meet with management, the data must be analyzed to ensure that it will provide the right type of information for the evaluation. Of vital importance is ensuring that the data fit the indicators identified for analysis. Then, it must be decided how the data and results will be presented. It is important to present the information in ways that make it easy to understand, demonstrate relationships to other data, and allow the information to be used to support decision-making processes. In this assignment, you will write about the methods of analyzing and reporting the study data.
Based on the data-collection procedures chosen in the Module 5 assignment, write a paper of 1,000-1,250 words explaining how you would analyze and report the data collected. Use language that can be understood by someone without training in statistics and research methods. The adequacy of your response depends on its technical correctness and its appropriateness to the intended audience. Do the following in your paper:
Specify and describe the statistical analysis techniques that will be used to compile and summarize the data gathered to determine how the program is operating and whether the program is fulfilling its goals and objectives.
Explain how the qualitative data would be analyzed in order to identify trends and patterns in the qualitative responses collected.
Explain the benefits of the analysis type selected for the evaluation.
Module 5 Assignement:
The paper explores on data collection techniques that can be used in program evaluation of Verizon Communications Company. It utilizes both quantitative and qualitative techniques in this endeavor. The quantitative method chosen for use is checklist while the qualitative approach chosen is observation. The basis for selection of the techniques is the strengths that they hold. Combination of the two approaches was is a bid to reinforce weaknesses of individual approach (
Posavac, 2015).
The checklist is applicable in this case because it entails the order of tasks that the project sought to engage in its onset. Available outputs can be market on as present while the unavailable ones are absent. The basis of selection of the checklist approach is its viability in the collection of data. It is simple in administering and goes straight to the point. Availability of the list of items captured in the planning stage serves as the best basis for evaluating effectiveness of the program (
Posavac, 2015)
. This basis on that what has been achieved can be compared with what has not been achieved. In the case of Verizon Communications, data from the planning stage is used as the basis of analyzing what the company has achieved or not.
The available outputs in the company are ticked against the corresponding items in the list and the deficit thereof noted. For example, the number of mobile phones in respective brands made by the company can be marketed against their .
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docxlorainedeserre
4.1 EXPLORING INCENTIVE PAY
4-1 Explore the incentive pay approach.
Incentive pay
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/bm01#bm01goss212) or
variable pay
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/bm01#bm01goss462)
rewards employees for partially or completely attaining a predetermined work objective.
Incentive or variable pay is defined as compensation, other than base wages or salaries that
fluctuate according to employees’ attainment of some standard, such as a preestablished
formula, individual or group goals, or company earnings.
Effective incentive pay systems are based on three assumptions:
Individual employees and work teams differ in how much they contribute to the
company, both in what they do as well as in how well they do it.
The company’s overall performance depends to a large degree on the performance of
individuals and groups within the company.
To attract, retain, and motivate high performers and to be fair to all employees, a
company needs to reward employees on the basis of their relative performance.
Much like seniority and merit pay approaches, incentive pay augments employees’ base pay,
but incentive pay appears as a one-time payment. Employees usually receive a combination
of recurring base pay and incentive pay, with base pay representing the greater portion of
core compensation. More employees are presently eligible for incentive pay than ever before,
as companies seek to control costs and motivate personnel continually to strive for exemplary
performance. Companies increasingly recognize the importance of applying incentive pay
programs to various kinds of employees as well, including production workers, technical
employees, and service workers.
Some companies use incentive pay extensively. Lincoln Electric Company, a manufacturer of
welding machines and motors, is renowned for its use of incentive pay plans. At Lincoln
Electric, production employees receive recurring base pay as well as incentive pay. The
company determines incentive pay awards according to five performance criteria: quality,
output, dependability, cooperation, and ideas. The company has awarded incentive payments
every year since 1934, through prosperous and poor economic times. In 2014, the average
profit sharing payment per employee was $33,984.
Coupled with average base
pay, total core compensation for Lincoln employees was $82,903. Over the past 10 years,
Lincoln’s profit-sharing payments averaged approximately 40 percent of annual salary.
1
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end1)
2
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end2)
3
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end3)
4
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end4)
4.1 Exploring Incentive Pay
4/15/20, 8:49 PM
Page 1 ...
More Related Content
Similar to 3282020 Originality Reporthttpsucumberlands.blackboar.docx
Running Head ZIFFCORP AUDIT PROPOSAL 1 ZiffCo.docxjeffsrosalyn
Running Head: ZIFFCORP AUDIT PROPOSAL 1
ZiffCorp Audit IT Security Audit Proposal
Brian A. McDougall
Central Washington University
Author Note:
Final Paper – IT 677 – Summer 2018
ZIFFCORP AUDIT PROPOSAL 2
Table of Contents
Title Page .......................................................................................................................................................................... 1
Table of Contents .......................................................................................................................................................... 2
Audit Proposal ................................................................................................................................................................ 3
Entity-Level Controls .................................................................................................................................................. 4
Data Center ...................................................................................................................................................................... 8
Database ......................................................................................................................................................................... 11
Web Server .................................................................................................................................................................... 13
Cloud ................................................................................................................................................................................ 14
Disaster Preparedness Plan .................................................................................................................................. 15
References ..................................................................................................................................................................... 16
ZIFFCORP AUDIT PROPOSAL 3
Audit Proposal
July 26, 2018
Artie Ziff, CEO
ZiffCorp
1066 3rd St
Springfield, VA 22150
Dear Mr. Ziff:
Thank you for the opportunity to present my proposal to perform an informal audit of
certain critical IT security policies and controls at ZiffCorp. Because of recent changes in
privacy regulations, GDPR in particular, I feel it expedient to review certain controls in
preparation for a formal audit that will verify ZiffCorp’s compliance to GDPR across the
organization. This audit is essential to maintaining quality operations and further help in
mitigating organizational risk, which can easily end up in dollars lost (Collins, 2017).
Let me stress that this will be an informal audit to be performed in order to assess our
security footing in certain areas of the company’s IT infrastructure. Our auditors will
review security controls and issue recommendations for.
Benefits of Data Analytics for External Audit.docxtangyechloe
Benefits of Data Analytics for External Audit
Benefits of Data Analytics for External Audit
Data analytics has emerged as an essential contributor in the field of auditing. The contribution of data analytics is diverse weighed on the basis of application with various forms of data used in auditing both internally and on an external basis. However, data analytics is a wider area of study with big data inclusive. Pence (2014) defines big data to include a vast form of information with a higher level of complexity and variety. The speed at which the data is analyzed and delivered is also part of the definition of big data as it relies on a high level of technology to handle the data within a shorter time than would have occurred using the traditional data handling approaches. For this reason, data analytics have benefited external audit in a number of ways including an improvement in value, an enhancement of audit quality and ensuring the process of transformation is possible and achievable. Comment by Microsoft Office 用户: Not sure what this sentence means...consider revising.
Comment by Microsoft Office 用户: This is unclear.
Comment by Microsoft Office 用户: To whom? What value?
First, the ability of auditors to attain an additional value to audit emanates from the presence of data analytics which enables the possibilities of using external market prices to re-price investments. The ability to adjust prices as above emanates from the increased ability of the auditors to handle vast volumes of data at a faster rate and hence improving the level of accuracy. Data analytics boasts of improved processes and systems that external auditors rely on in their work to attain the required results. Reliance on exceptions and outliers in auditing has proven possible through the process of auditing with big data analytics providing avenues of improvement and attainment of this objective (Kogan, Vasarhelyi & Appelbau, 2017, May 25). The resulting information obtained is what is used in repricing of investments to ensure the returns are adequate and a true and fair reflection of the investment. The process involved in auditing also includes encounters with data presented on the interest and foreign exchange rates of the country. Changes in GDP of an economy and other growth metrics are also part of the data presented in companies and contribute towards the success of companies. However, the decision-making process is based on the ability to choose from a number of options with a high degree of uncertainty which affects the entire value of the processes and operations of the enterprise. External auditors have relied on data analytics to examine historical data on the above and hence reducing the margin of error or failure that the organization encounters. A reduced margin of error enables external auditors therefore add value to the entire process as reduced costs of errors are evident with improved performance and quality. Therefore, data analytics .
The importance of using a computerized information system becomes a vital urgency to be resolved.
The existence of this need is based on the status quo condition or problems in the company, especially related to
real-time data and quality control conditions that affect decision-making for companies that are currently in a
"developing" condition with an "entrepreneur" -based leadership style where fluctuations and policy changes
can happen at any time.
This contents in this document is for academic purpose and those who are practicing internal and external audits. It is open for recommendations and opinions.
The endeavor of the report is in the direction of scrutinizing the effectiveness of project management in expressions of managerial structures, technological proficiency, and management skill along with the features of an effectual venture manager.
Before exploring the main content of the report let us consider the general concepts of the key words of relative topic or respective report.
Efficacy simply coded, is the core skill, aptitude or the capacity on the way to bring into being a required or projected outcome. The extent in the direction of which a touch is victorious in generating a looked-for outcome is effectiveness
Crafting a CMMI V2 Compliant Process for Governance Practice Area: An Experie...Dr. Mustafa Değerli
Değerli, M. (2020). Crafting a CMMI V2 Compliant Process for Governance Practice Area: An Experiential Proposal. 14th Turkish National Software Engineering Symposium (UYMS 2020). 10.1109/UYMS50627.2020.9247068 – https://ieeexplore.ieee.org/xpl/conhome/9247008/proceeding
The role of Operational and Performance-based Auditing on Government and the ...paul young cpa, cga
Many companies and various levels of government have internal audit departments. The problem many times with audits is the lack of resources. Analytics can play a bigger role in terms of expanding audits.
Information Assurance Framework for Web Services .docxjaggernaoma
Information Assurance Framework for Web Services 12
Information Assurance Framework for Web Services
Running head: Information Assurance Framework for Web Services 1
Table of Contents
Proposal14
Visual Representation16
Iteration -116
Understanding IA Challenges Plan16
Action17
Observation20
Reflection21
Iteration -2Conducting Survey22
Plan22
Action23
Observation25
Reflection27
Iteration -3 Structuring the Information28
Plan28
Action29
Observation30
Reflection32
Iteration-4 Developing Framework33
Plan33
Action34
Observation35
Reflection36
Summary of Learning37
References39
List of Tables
Table 1 Elements Considered in Quesionnaire23
Table 2 Standard Security Features24
Table 3 Security Elements28
List of Figures
Figure 1 Web Security Compromises3
Figure 2 Information Assurance Model5
Figure 3 Key Components of IA Implementation6
Figure 4 Action Research Process8
Figure.5 IA Reference Model Framework10
Figure 6 Web Frameworks12
Figure 7 Visual Representation14
Figure 8 IA for Web Applications Search16
Figure 9 Keyword Search Results18
Introduction
Internet based solutions, and web based services that are offered to the customers has become a common practice in the businesses. Right from B2B segment, to B2c and C2C, there are many web services and web based applications that are predominantly used in the business environment (Kahonge, 2013).
Adaptation and implementation of web based application systems has certainly supported the stakeholders of business in improving the ease of business communication, transaction processing and other such key business functions. However, one of the critical challenges that are envisaged in the business process are about issues pertaining to the information assurance issues in the web based application systems and processes that are adapted by the organizations (Al-hamami & et.al, 2012).
Globally, web based applications systems has become an integral part of the organizational requirements that could support in managing the business process in more effective ways. With the emergence of contemporary web technologies like Web 2.0, cloud based solutions and many other such developments emerging, there are potential developments that are taking place in the environment (DAN J KIM & et.al, 2004).
An organizational website that is poorly designed security features can open the door to security vulnerabilities. IT professionals may be put in a compromising position to prioritize system administrative tasks that are beneficial to a company’s bottom line over evaluating and proactively defending against security risks.
According to a research report that is published in the recent past on website security solutions and features, the study emphasize the key elements that impact the web security solutions and the need for companies to focus on improving the perform.
POSITION OF INTERNAL AUDIT IN THE CORPORATE FRAMEWORKHaresh Lalwani
This presentation is my endeavor to bring to notice the new position that internal audit enjoys today in the corporate framework, expectations of the industry and emerging opportunities for the professionals.
After the data are collected and before program evaluators meet with.docxmilissaccm
After the data are collected and before program evaluators meet with management, the data must be analyzed to ensure that it will provide the right type of information for the evaluation. Of vital importance is ensuring that the data fit the indicators identified for analysis. Then, it must be decided how the data and results will be presented. It is important to present the information in ways that make it easy to understand, demonstrate relationships to other data, and allow the information to be used to support decision-making processes. In this assignment, you will write about the methods of analyzing and reporting the study data.
Based on the data-collection procedures chosen in the Module 5 assignment, write a paper of 1,000-1,250 words explaining how you would analyze and report the data collected. Use language that can be understood by someone without training in statistics and research methods. The adequacy of your response depends on its technical correctness and its appropriateness to the intended audience. Do the following in your paper:
Specify and describe the statistical analysis techniques that will be used to compile and summarize the data gathered to determine how the program is operating and whether the program is fulfilling its goals and objectives.
Explain how the qualitative data would be analyzed in order to identify trends and patterns in the qualitative responses collected.
Explain the benefits of the analysis type selected for the evaluation.
Module 5 Assignement:
The paper explores on data collection techniques that can be used in program evaluation of Verizon Communications Company. It utilizes both quantitative and qualitative techniques in this endeavor. The quantitative method chosen for use is checklist while the qualitative approach chosen is observation. The basis for selection of the techniques is the strengths that they hold. Combination of the two approaches was is a bid to reinforce weaknesses of individual approach (
Posavac, 2015).
The checklist is applicable in this case because it entails the order of tasks that the project sought to engage in its onset. Available outputs can be market on as present while the unavailable ones are absent. The basis of selection of the checklist approach is its viability in the collection of data. It is simple in administering and goes straight to the point. Availability of the list of items captured in the planning stage serves as the best basis for evaluating effectiveness of the program (
Posavac, 2015)
. This basis on that what has been achieved can be compared with what has not been achieved. In the case of Verizon Communications, data from the planning stage is used as the basis of analyzing what the company has achieved or not.
The available outputs in the company are ticked against the corresponding items in the list and the deficit thereof noted. For example, the number of mobile phones in respective brands made by the company can be marketed against their .
Similar to 3282020 Originality Reporthttpsucumberlands.blackboar.docx (20)
4.1 EXPLORING INCENTIVE PAY4-1 Explore the incentive pay a.docxlorainedeserre
4.1 EXPLORING INCENTIVE PAY
4-1 Explore the incentive pay approach.
Incentive pay
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/bm01#bm01goss212) or
variable pay
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/bm01#bm01goss462)
rewards employees for partially or completely attaining a predetermined work objective.
Incentive or variable pay is defined as compensation, other than base wages or salaries that
fluctuate according to employees’ attainment of some standard, such as a preestablished
formula, individual or group goals, or company earnings.
Effective incentive pay systems are based on three assumptions:
Individual employees and work teams differ in how much they contribute to the
company, both in what they do as well as in how well they do it.
The company’s overall performance depends to a large degree on the performance of
individuals and groups within the company.
To attract, retain, and motivate high performers and to be fair to all employees, a
company needs to reward employees on the basis of their relative performance.
Much like seniority and merit pay approaches, incentive pay augments employees’ base pay,
but incentive pay appears as a one-time payment. Employees usually receive a combination
of recurring base pay and incentive pay, with base pay representing the greater portion of
core compensation. More employees are presently eligible for incentive pay than ever before,
as companies seek to control costs and motivate personnel continually to strive for exemplary
performance. Companies increasingly recognize the importance of applying incentive pay
programs to various kinds of employees as well, including production workers, technical
employees, and service workers.
Some companies use incentive pay extensively. Lincoln Electric Company, a manufacturer of
welding machines and motors, is renowned for its use of incentive pay plans. At Lincoln
Electric, production employees receive recurring base pay as well as incentive pay. The
company determines incentive pay awards according to five performance criteria: quality,
output, dependability, cooperation, and ideas. The company has awarded incentive payments
every year since 1934, through prosperous and poor economic times. In 2014, the average
profit sharing payment per employee was $33,984.
Coupled with average base
pay, total core compensation for Lincoln employees was $82,903. Over the past 10 years,
Lincoln’s profit-sharing payments averaged approximately 40 percent of annual salary.
1
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end1)
2
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end2)
3
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end3)
4
(http://content.thuzelearning.com/books/Martocchio.7916.16.1/sections/ch04lev1sec11#ch04end4)
4.1 Exploring Incentive Pay
4/15/20, 8:49 PM
Page 1 ...
38 u December 2017 January 2018The authorities beli.docxlorainedeserre
38 u December 2017 / January 2018
T
he authorities believe he slipped across the United States-Mexico
border sometime during the summer of 2016, likely deep in the
night. He carried no papers. The crossing happened in the rugged
backcountry of southeastern Arizona, where the main deterrent to
trespassers is the challenging nature of the terrain—not the metal
walls, checkpoints, and aerial surveillance that dominate much of the border.
But the border crosser was des-
ert-hardy and something of an expert
at camouflage. No one knows for cer-
tain how long he’d been in the United
States before a motion-activated cam-
era caught him walking a trail in the
Dos Cabezas Mountains on the night
of November 16. When a government
agency retrieved the photo in late Feb-
ruary, the image was plastered across
Arizona newspapers, causing an imme-
diate sensation.
The border crosser was a jaguar.
Jaguars once roamed throughout
the southwestern United States, but
are now quite rare. A core population
resides in the mountains of northern
Mexico, and occasionally an adventur-
ous jaguar will venture north of the bor-
der. When one of these elusive, graceful
cats makes an appearance stateside,
Mrill Ingram is The Progressive’s online media editor.
‘The Border Is
a Beautiful Place’
For Many, Both Sides of the
Arizona-Mexico Border Are Home
B
O
R
D
ER
A
R
TS
C
O
R
R
ID
O
R
By Mrill Ingram
Artists Ana Teresa Fernández in Agua Prieta, Mexico, and Jenea Sanchez in Douglas, Arizona, worked with dozens of community members to paint sections
of the border fence sky blue, “erasing” it as a symbolic act of resistance against increasing violence and oppression of human rights along the border.
https://apnews.com/79c83219af724016b8cfa2c505018ac4/agency-reports-rare-jaguar-sighting-mountains-arizona
The Progressive u 39
usually via a motion-triggered camera,
it may get celebrity status.
“We’ve had positive identifications
of seven cats, alive and well, in the last
twenty years in the United States,” says
Diana Hadley of the Mexico-based
Northern Jaguar Project, which works
with people in both countries to pro-
tect the big cat. One of those cats be-
came known as El Jefe, after he took
up residence in 2011 in the Santa Rita
Mountains south of Tucson, Arizona.
His presence was proof that the United
States still had enough wild habitat to
support a jaguar.
The new cat was especially excit-
ing because, based on size and shape,
observers initially thought it might
be female. “A lot of people in Arizona
would be very happy to have jaguars
from Mexico breeding in Arizona,” re-
marks Hadley.
In September 2017, the Arizo-
na-based Center for Biological Di-
versity released new video of the cat,
apparently a male, caught on a mo-
tion-triggered camera ambling through
the oak scrub forest in the Chiricahua
Mountains. He’s been named Sombra,
or Shadow, by schoolkids in Tucson.
Such things will no longer ...
3Prototypes of Ethical ProblemsObjectivesThe reader shou.docxlorainedeserre
3
Prototypes of Ethical Problems
Objectives
The reader should be able to:
• Recognize an ethical question and distinguish it from a strictly clinical or legal one.
• Identify three component parts of any ethical problem.
• Describe what an agent is and, more importantly, what it is to be a moral agent.
• Name two prototypical ethical problems.
• Distinguish between two varieties of moral distress.
• Compare the fundamental difference between moral distress and an ethical dilemma.
• Describe the role of emotions in moral distress and ethical dilemmas.
• Describe a type of ethical dilemma that challenges a professional’s desire (and duty) to treat everyone fairly and equitably.
• Discuss the role of locus of authority considerations in ethical problem solving.
• Identify four criteria to assist in deciding who should assume authority for a specific ethical decision to achieve a caring response.
• Describe how shared agency functions in ethical problem solving.
NEW TERMS AND IDEAS YOU WILL ENCOUNTER IN THIS CHAPTER
legal question
disability benefits
ethical question
prototype
clinical question
agent
moral agent
locus of authority
shared agency
moral distress
moral residue
ethical dilemma
Topics in this chapter introduced in earlier chapters
Topic
Introduced in chapter
Ethical problem
1
Integrity
1
Interprofessional care team
1
Professional responsibility
2
A caring response
2
Accountability
2
Social determinants of care
2
Justice
2
Introduction
You have come a long way already and are prepared to take the next steps toward becoming skilled in the art of ethical decision making. The first part of this chapter guides you through an inquiry regarding how to know when you are faced with an ethical question instead of (or in addition to) a clinical or legal question. A further question is raised: How do you know whether the situation that raised the question is a problem that requires your involvement? This chapter helps you prepare to answer that question too. You will learn the basic components of an ethical problem and be introduced to two prototypes of ethical problems. We start with the story of Bill Boyd and Kate Lindy.
 The Story of Bill Boyd and Kate Lindy
Bill Boyd is a 25-year-old soldier who lives in a large city. Bill served in the U.S. Army for more than 6 years and was deployed to both Iraq and Afghanistan for multiple military missions in the past 4 years. During his final deployment, Bill suffered a blast injury in which he sustained significant shoulder and neck trauma and a mild traumatic brain injury (TBI) and posttraumatic stress. He was treated in an inpatient military hospital and transitioned back to his hometown, where he moved into his childhood home with his mother.
Kate Lindy is the outpatient psychologist who has been treating Bill for pain and posttraumatic stress. Bill is in a structured civilian reentry program. This competitive program is administered by a government subcontractor; its goal is to help in ...
4-5 Annotations and Writing Plan - Thu Jan 30 2111Claire Knaus.docxlorainedeserre
4-5 Annotations and Writing Plan - Thu Jan 30 21:11
Claire Knaus
Annotations:
Bekalu, M. A., McCloud, R. F., & Viswanath, K. (2019). Association of Social Media Use With Social Well-Being, Positive Mental Health, and Self-Rated Health: Disentangling Routine Use From Emotional Connection to Use. Health Education & Behavior, 46(2_suppl), 69S-80S. https://doi.org/10.1177/1090198119863768
It seems that this source is arguing the effect of social media on mental health. This source uses this evidence to support the argument: Provided studies focusing on why individuals use social media, types of social network platforms, and the value of social capital. A counterargument for this source is: Studies that focus more on statistical usage rather than emotion connection. Personally, I believe the source is doing a good job of supporting its arguments because it provides an abundance of study references and clearly portrays the information and intent. I think this source will be very helpful in supporting my argument because of the focus on emotional connection to social media and its effects on mental health.
Matsakis, L. (2019). How Pro-Eating Disorder Posts Evade Filters on Social Media. In Gale Opposing Viewpoints Online Collection. Farmington Hills, MI: Gale. (Reprinted from How Pro-Eating Disorder Posts Evade Filters on Social Media, Wired, 2018, June 13) Retrieved from https://link-gale-com.ezproxy.snhu.edu/apps/doc/UAZKKH366290962/OVIC?u=nhc_main&sid=OVIC&xid=2c90b7b5
It seems that this source is arguing that social media platforms are not doing enough to eliminate harmful pro-ED posts. This source uses this evidence to support the argument: Information about specific platforms and what they have done to moderate content, links for more information, and what constitutes as harmful content. A counterargument for this source is that it is too difficult for platforms to remove the content and to even find it. In addition, it is believed there may be harmful effects on vulnerable people posting this type of content. Personally, I believe the source is doing a good job of supporting its arguments because it provides opposing viewpoints as well as raising awareness of some of the dangers of social media posts. I think this source will be very helpful in supporting my argument because it provides information on specifically what is being done to moderate this type of content on social media, and what some of the difficulties in moderating are.
Investigators at University of Leeds Describe Findings in Eating Disorders (Pro-ana versus Pro-recovery: A Content Analytic Comparison of Social Media Users' Communication about Eating Disorders on Twitter and Tumblr). (2017, September 4). Mental Health Weekly Digest, 38. Retrieved from https://link-gale-com.ezproxy.snhu.edu/apps/doc/A502914419/OVIC?u=nhc_main&sid=OVIC&xid=5e60152f
It seems that this source is arguing that there are more positive, anti-anorexia posts on social media than harmful, pro-ED content. ...
3NIMH Opinion or FactThe National Institute of Mental Healt.docxlorainedeserre
3
NIMH: Opinion or Fact
The National Institute of Mental Health (NIMH) was formed in 1946 and is one of 27 institutes that form the National Institute of Health (NIH) (NIMH, 2019). The mission of the NIMH is “To transform the understanding and treatment of mental illnesses through basic and clinical research, paving the way for prevention, recovery, and cure.” (NIMH, 2019). There are many different mental illnesses discussed on the NIMH website to include Attention-Deficit/Hyperactivity Disorder (ADHD). The NIMH website about ADHD is effective at providing the public general information and meets the criteria of authority, objectivity, and currency.
The NIMH website about ADHD provides an overview of ADHD, discusses signs and symptoms, and risk factors. The NIMH continues with information about treatment and therapies. Information provided by the NIMH is intended for both children and adults. The NIMH concludes on the page with studies the public can join and more resources for the public such as booklets, brochures, research and clinical trials.
As described by Jim Kapoun authority can be identified by who or what institution/organization published the document and if the information in the document is cited correctly (Cornell, 2020). The information on the website is published by the NIMH which is the lead research institute related to mental health for the last 70 plus years (NIMH, 2019). On the page related to ADHD the NIMH references the program of Children and Adults with Attention-Deficit/Hyperactivity Disorder (CHADD) and provides a hyperlink to access the resources available with the agency (NIMH,2019). This link can be found under the support groups section in the treatment and therapies. On the website to the right of the area describing inattention the NIMH has a section on research. In this block there is a link to “PubMed: Journal Articles about Attention Deficit Hyperactivity Disorder (ADHD)” which will take you to a search of the National Center for Biotechnology Information (NCBI) published by PubMed on ADHD (NIMH, 2019). Throughout the entire page the NIMH provides sources and hyperlinks to the sources as citations. Based on the reputation of the NIMH and the citations to the source material the website meets the criteria of authority.
According to Kapoun objectivity can be identified looking for areas where the author expresses his or her opinion (Cornell, 2020). Information provided on the NIMH page about ADHD does not express the opinion of the author. The author produces only factual information based on research. The NIMH makes it a point not to mention the names of medications when discussing treatments and only explains the medications fall in two categories stimulants and non-stimulants (NIMH, 2019). In this same area the NIMH provides hyperlinks to the NIMH Mental Health Medication and FDA website for information about medication. The extent at which the NIMH goes to not provide an opinion on the website meet ...
4.1
Updated April-09
Lecture Notes
Chapter 4
Enterprise Excellence
Implementation
ENTERPRISE EXCELLENCE
4.2
Updated April-09
Learning Objectives
• Management & Operations Plans
• Enterprise Excellence Projects
• Enterprise Excellence Project decision Process
• Planning the Enterprise Excellence Project
• Tollgate Reviews
• Project Notebook
4.3
Updated April-09
MANAGEMENT AND OPERATIONS PLANS
• The scope and complexity of the
implementation projects will vary from the
executive level, to the management level, to
the operational level
• Each plan, as it is developed and deployed,
will include projects to be accomplished
• Conflicts typically will occur amongst
requirements of quality, cost, and schedule
when executing a project
4.4
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• An Enterprise Excellence project will be one of three
types:
1. Technology invention or innovation
2. New product, service, or process development
3. Product, service, or process improvement
• Enterprise Excellence uses the scientific method
• The scientific method is a process of organizing
empirical facts and their interrelationships in a
manner that allows a hypothesis to be developed and
tested
4.5
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• The scientific method consists of the
following steps:
1. Observe and describe the situation
2. Formulate a hypothesis
3. Use the hypothesis to predict results
4. Perform controlled tests to confirm the hypothesis
4.6
Updated April-09
ENTERPRISE EXCELLENCE PROJECTS
• Figure 4.1 shows the project decision process
4.7
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Inventing/Innovating Technology:
Technology development is accomplished using
system engineering
This system approach enables critical functional
parameters and responses to be quickly transferred
into now products, services, and processes
The process is a four-phase process (I2DOV):
Invention & Innovation – Develop – Optimize – Verify
4.8
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Development of Products, Services, and
Processes
The Enterprise Excellence approach for developing
products, services, and processes is the Design for
Lean Six Sigma strategy.
This strategy helps to incorporate customer
requirements and expectations into the product
and/or service.
Concept – Design – Optimize - Verify (CDOV) is a
specific sequential design & development process
used to execute the design strategy.
4.9
Updated April-09
ENTERPRISE EXCELLENCE PROJECT
DECISION PROCESS
• Improving Products, Services, and Processes:
Improving products, services and processes usually
involves the effectiveness and efficiency of operations.
A product or service is said to be effective when it meets
all of its customer requirements.
Effectiveness can be simply expressed as "doing the
right things the first time ...
3Type your name hereType your three-letter and -number cours.docxlorainedeserre
3
Type your name here
Type your three-letter and -number course code here
The date goes here
Type instructor’s name here
Your Title Goes Here
This is an electronic template for papers written in GCU style. The purpose of the template is to help you follow the basic writing expectations for beginning your coursework at GCU. Margins are set at 1 inch for top, bottom, left, and right. The first line of each paragraph is indented a half inch (0.5"). The line spacing is double throughout the paper, even on the reference page. One space after punctuation is used at the end of a sentence. The font style used in this template is Times New Roman. The font size is 12 point. When you are ready to write, and after having read these instructions completely, you can delete these directions and start typing. The formatting should stay the same. If you have any questions, please consult with your instructor.
Citations are used to reference material from another source. When paraphrasing material from another source (such as a book, journal, website), include the author’s last name and the publication year in parentheses.When directly quoting material word-for-word from another source, use quotation marks and include the page number after the author’s last name and year.
Using citations to give credit to others whose ideas or words you have used is an essential requirement to avoid issues of plagiarism. Just as you would never steal someone else’s car, you should not steal his or her words either. To avoid potential problems, always be sure to cite your sources. Cite by referring to the author’s last name, the year of publication in parentheses at the end of the sentence, such as (George & Mallery, 2016), and page numbers if you are using word-for-word materials. For example, “The developments of the World War II years firmly established the probability sample survey as a tool for describing population characteristics, beliefs, and attitudes” (Heeringa, West, & Berglund, 2017, p. 3).
The reference list should appear at the end of a paper (see the next page). It provides the information necessary for a reader to locate and retrieve any source you cite in the body of the paper. Each source you cite in the paper must appear in your reference list; likewise, each entry in the reference list must be cited in your text. A sample reference page is included below; this page includes examples (George & Mallery, 2016; Heeringa et al., 2017; Smith et al., 2018; “USA swimming,” 2018; Yu, Johnson, Deutsch, & Varga, 2018) of how to format different reference types (e.g., books, journal articles, and a website). For additional examples, see the GCU Style Guide.
References
George, D., & Mallery, P. (2016). IBM SPSS statistics 23 step by step: A simple guide and reference. New York, NY: Routledge.
Heeringa, S. G., West, B. T., & Berglund, P. A. (2017). Applied survey data analysis (2nd ed.). New York, NY: Chapman & Hall/CRC Press.
Smith, P. D., Martin, B., Chewning, B., ...
3Welcome to Writing at Work! After you have completed.docxlorainedeserre
3
Welcome to Writing at Work! After you have completed the reading for the week, write an email to introduce yourself to your peers. The name of your thread should be what you would include in the subject of the email.
As you compose your email, keep in mind the following:
· You are addressing a group you will work with in a professional capacity for at least 15 weeks. Let us know something about you, but don't share anything you wouldn't want repeated.
· You should include what you perceive to be your relative strengths with regard to writing at work. What types of tasks would you feel most comfortable taking on?
· You should also include what aspects of writing at work make you feel least comfortable. What types of tasks would you not be as suited for?
· What do you hope to learn in the next several months?
Next, in an attachment, choose one of the following two prompts and write a letter, taking into account the purpose, audience, and appropriate style for the task.
1. Your organization has been contracted to complete a project for an important client, and you were charged with managing the project. It has unfortunately become clear that your team will not meet the deadline. Your supervisor has told you to contact the client in writing to alert them to the situation and wants to be cc'd on the message. Write a letter, which you will send via email, addressing the above.
2. After a year-long working relationship, your organization will no longer be making use of a freelancer's services due to no fault of their own. Write a letter alerting them to this fact.
Name:
HRT 4760 Assignment 01
Timeliness
First, you will choose one particular organization where you will conduct each of your 15 different observational assignments. Stick with this same organization throughout your coursework. (Do not switch around assignment locations at different organizations or locations.) The reason for continuing your observational assignments at the same organization is to give you a deeper understanding of this particular organization across the 15 different assignments. As you read on, you will get a more complete understanding as to how these 15 assignments come together.
Tip: Many students choose the organization where they are currently working. This works particularly well. If you are working there, you have much opportunity to gain access to the areas that will give you a more complete understanding of the quality of entire service package (the 15 different elements) that the organization offers to its customers.
This is one of a package of 15 different assignments that comprise the Elements of Service, which you will study this term. For this assignment, you will observe elements of service in almost any particular service establishment. A few examples of service establishments would include, but not be limited to these: Hotel, resort, private club, restaurant, airline, cruise line, grocery store, doctor’s office, coffee house, and scores of oth ...
3JWI 531 Finance II Assignment 1TemplateHOW TO USE THIS TEMP.docxlorainedeserre
3
JWI 531 Finance II Assignment 1Template
HOW TO USE THIS TEMPLATE:
This is a template and checklist corresponding to your Assignment 1 paper: Enterprise Risk Management and Moat Strength. See below for an explanation of the color-coding in this template:
· All green text includes instructions to support your writing. You should delete all green text before submitting your final paper.
· All blue text indicates areas where you need to replace text with your own information. Replace the blue text with your own words in black.
· Headings and subheadings are written in black, bold type. Keep these in your paper.
TIPS:
· Write in the third person, using “he” or “she” or “they”, or using specific names. Do not use the second person “you”.
· The body of this paper has one-inch margins and uses a professional font (size 10-12); we recommend Arial or Times New Roman fonts.
· The Assignment template is already formatted with all needed specifications like margins, appropriate font, and double spacing.
· Before submitting your paper, use Grammarly to check for punctuation and usage errors and make the required corrections. Then read aloud to edit for tone and flow.
· You should also run your paper through SafeAssign to ensure that it meets the required standards for originality.
FINALIZING YOUR PAPER
Your submission should be a maximum of 4 pages in length. The page count doesnotinclude the Cover Page at the beginning and the References page at the end. The final paper that you submit for grading should be in black text only with all remaining green text and blue text removed. Assignment 1: Enterprise Risk Analysis and Moat Strength
Author’s Name
Jack Welch Management Institute
Professor’s Name
JWI 531
Date
Introduction
An Introduction should be succinct and to the point. Start your Introduction with a general and brief observation about the paper’s topic. Write a thesis statement, which is the “road map” for your paper - it helps your reader to navigate your work. In your thesis statement, be specific about the major areas you plan to address in your paper.
The headings below should guide your introduction, since they identify the topics to be addressed in your paper. The introduction is not a graded part of your rubric but it helps your reader to understand what your assignment will be about. We recommend that you write this part of your Introduction after you complete the other sections of your paper. It only needs to be one paragraph in length.
Analysis and Recommendations
You must answer each of the following questions in your paper. Keep your responses focused on the topic. Straying off into additional areas, even if they are interesting, will not earn additional marks, and may actually detract from the clarity of your responses.
I. Where is each company in its corporate lifecycle (startup, growth, maturity or decline)? Explain.
Before writing your response to this question, make sure you understand what characterizes ea ...
3Big Data Analyst QuestionnaireWithin this document are fo.docxlorainedeserre
3
Big Data Analyst Questionnaire
Within this document are four different questions. Each question is structured in the following manner:
1) Premise
- Contains any needed background information
2) Request
- The actual question, what you are to solve
3) Notes
- A space if you feel like including notes of any kind for the given question
Please place your answer for each question in a separate file, following this naming convention:
Name_Qn.docx, where n = the question number (i.e., 1, 2 ...). So the file for the first question should be named ‘Name_Q1.docx’.
When complete, please package everything together and send email responses to the designated POCs.
Page | 1
Premise:
You have a table named “TRADES” with the following six columns:
Column Name
Data Type
Description
Date
DATE
The calendar date on which the trade took place.
Firm
VARCHAR(255)
A symbol representing the Broker/Dealer who conducted the trade.
Symbol
VARCHAR(10)
The security traded.
Side
VARCHAR(1)
Denotes whether the trade was a buy (purchase) or a sell (sale) of a security.
Quantity
BIGINT
The number of shares involved in the trade.
Price
DECIMAL(18,8)
The dollar price per share traded.
You write a query looking for all trades in the month of August 2019. The query returns the following:
DATE
FIRM
SYMBOL
SIDE
QUANTITY
PRICE
8/5/2019
ABC
123
B
200
41
8/5/2019
CDE
456
B
601
60
8/5/2019
ABC
789
S
600
70
8/5/2019
CDE
789
S
600
70
8/5/2019
FGH
456
B
200
62
8/6/2019
3CDE
456
X
300
61
8/8/2019
ABC
123
B
300
40
8/9/2019
ABC
123
S
300
30
8/9/2019
FGH
789
B
2100
71
8/10/2019
CDE
456
S
1100
63
Questions:
1) Conduct an analysis of the data set returned by your query. Write a paragraph describing your analysis. Please also note any questions or assumptions made about this data.
2) Your business user asks you to show them a table output that includes an additional column categorizing the TRADES data into volume based Tiers, with a column named ‘Tier’. Quantities between 0-250 will be considered ‘Small’, quantities greater than ‘Small’ but less than or equal to 500 will be considered ‘Medium’, quantities greater than ‘Medium’ but less than or equal to 500 will be considered ‘Large’, and quantities greater than ‘Tier 3’ will be considered ‘Very Large’ .
a. Please write the SQL query you would use to add the column to the table output.
b. Please show the exact results you expect based on your SQL query.
3) Your business user asks you to show them a table output summarizing the TRADES data (Buy and Sell) on week-by-week basis.
a. Please write the SQL query you would use to query this table.
b. Please show the exact results you expect based on your SQL query.
Notes:
1
Premise:
You need to describe in writing how to accomplish a task. Your audience has never completed this task before.
Question:
In a few paragraphs, please describe how to complete a task of your choice. You may choose a task of your own liking or one of the sample tasks below:
1) How to make a p ...
3HR StrategiesKey concepts and termsHigh commitment .docxlorainedeserre
3
HR Strategies
Key concepts and terms
High commitment management •
High performance management •
HR strategy •
High involvement management •
Horizontal fi t •
Vertical fi t •
On completing this chapter you should be able to defi ne these key concepts.
You should also understand:
Learning outcomes
T • he purpose of HR strategy
Specifi c HR strategy areas •
How HR strategy is formulated •
How the vertical integration of •
business and HR strategies is
achieved
How HR strategies can be set out •
General HR strategy areas •
The criteria for a successful HR •
strategy
The fundamental questions on •
the development of HR strategy
How horizontal fi t (bundling) is •
achieved
How HR strategies can be •
implemented
47
48 Human Resource Management
Introduction
As described in Chapter 2, strategic HRM is a mindset that leads to strategic actions and reac-
tions, either in the form of overall or specifi c HR strategies or strategic behaviour on the part
of HR professionals. This chapter focuses on HR strategies and answers the following ques-
tions: What are HR strategies? What are the main types of overall HR strategies? What are the
main areas in which specifi c HR strategies are developed? What are the criteria for an effective
HR strategy? How should HR strategies be developed? How should HR strategies be
implemented?
What are HR strategies?
HR strategies set out what the organization intends to do about its human resource manage-
ment policies and practices and how they should be integrated with the business strategy and
each other. They are described by Dyer and Reeves (1995) as ‘internally consistent bundles of
human resource practices’. Richardson and Thompson (1999) suggest that:
A strategy, whether it is an HR strategy or any other kind of management strategy must
have two key elements: there must be strategic objectives (ie things the strategy is sup-
posed to achieve), and there must be a plan of action (ie the means by which it is pro-
posed that the objectives will be met).
The purpose of HR strategies is to articulate what an organization intends to do about its
human resource management policies and practices now and in the longer term, bearing in
mind the dictum of Fombrun et al (1984) that business and managers should perform well in
the present to succeed in the future. HR strategies aim to meet both business and human needs
in the organization.
HR strategies may set out intentions and provide a sense of purpose and direction, but they are
not just long-term plans. As Gratton (2000) commented: ‘There is no great strategy, only great
execution.’
Because all organizations are different, all HR strategies are different. There is no such thing as
a standard strategy and research into HR strategy conducted by Armstrong and Long (1994)
and Armstrong and Baron (2002) revealed many variations. Some strategies are simply very
general declarations of intent. Others go into much more detail. ...
3Implementing ChangeConstruction workers on scaffolding..docxlorainedeserre
3
Implementing Change
Construction workers on scaffolding.
hxdbzxy/iStock/Thinkstock
Learning Objectives
After reading this chapter, you should be able to do the following:
Summarize the nine steps in Ackerman and Anderson’s road map for change.
Analyze Cummings and Worley’s five dimensions of leading and managing change.
Describe how to align an organization with its new vision and future state.
Explain how roles/relationships and interventions are used to implement change.
Examine ways to interact with and influence stakeholders.
Change is the law of life and those who look only to the past or present are certain to miss the future.
—John F. Kennedy
Alan Mulally was selected to lead Ford in 2006 after he was bypassed as CEO at Boeing, where he had worked and was expected to become CEO. Insiders and top-level managers at Ford, some of whom had expected to become CEO, were initially suspicious and then outraged when Mulally was hired. They questioned what someone from the airplane industry would know about the car business (Kiley, 2009).
Chair William (Bill) Clay Ford, Jr.—who selected Mulally as CEO—told Ford’s officers that the company needed a fresh perspective and a shake-up, especially since it had lost $14.8 billion in 2008—the most in its 105-year history—and had burned through $21.2 billion, or 61%, of its cash (Kiley, 2009). Because Ford knew that the company’s upper echelon culture was closed, bureaucratic, and rejected outsiders and new ways of thinking, he was not surprised by his officers’ reactions. However, Ford’s managers had no idea that the company was fighting for its life. To succeed, Mulally would need Chair Ford’s full endorsement and support, and he got it.
The company’s biggest cultural challenge was to break down the silos that various executives had built. As we will discuss more in Chapter 4, silos are specific processes or departments in an organization that work independently of each other without strong communication between or among them. A lack of communication can often stifle productivity and innovation, and this was exactly what was happening at Ford.
Mulally devised a turnaround strategy and developed it into the Way Forward Plan. The plan centralized and modernized plants to handle several models at once, to be sold in several markets. The plan was designed to break up the fiefdoms of isolated cultures, in which leaders independently developed and decided where to sell cars. Mulally’s plan also kept managers in positions for longer periods of time to deepen their expertise and improve consistency of operations. The manager who ran the Mazda Motor affiliate commented, “I’m going into my fourth year in the same job. I’ve never had such consistency of purpose before” (as cited in Kiley, 2009, “Meetings About Meetings,” para. 2).
Mulally’s leadership style involved evaluating and analyzing a situation using data and facts and then earning individuals’ support with his determinatio ...
3Assignment Three Purpose of the study and Research Questions.docxlorainedeserre
3
Assignment Three: Purpose of the study and Research Questions
RES 9300
Recently, Autism has become a serious health concern to parents. According to Center for Disease Control and Prevention (2018), about one in fifty nine United States children has been identified with autism spectrum disorder with one in six children developing developmental disability ranging from mild disabilities such as speech and language impairments to serious developmental disabilities, such as intellectual disabilities, cerebral palsy, and autism (CDC,2018). World Health Organization (2019) estimates that 1 in 160 children globally has autism making it one of the most prevalent diseases. Despite the disease prevalence, most population has little knowledge about the disease. Many health practitioners have proposed early care as a means to control the disease effects.
Purpose Statement
The purpose of this study is to determine whether early intervention services can help improve the development of children suffering from autism. This study also aims to explore the general public awareness and perception about autism disorder.
Research Questions
(1) How should service delivery for autistic patients be improved to promote their health? (2) What impact does early intervention services have on development of children suffering from autism? (3) How can public knowledge on autism improve support and care for autistic patients? (4) What effect will early intervention have on patient’s social skills?
References
Center for Disease Control and Prevention. (2018). Autism Spectrum Disorder (ASD). Data & Statistics. Retrieved From https://www.cdc.gov/ncbddd/autism/data.html
World Health Organization. (2019). Autism Spectrum Disorders. Fact Sheet. Retrieved From https://www.who.int/news-room/fact-sheets/detail/autism-spectrum-disorders
3
Assignment Two: Theoretical Perspective and Literature Review
RES 9300
Literature Map
Parenting an Autism Child
(Dependent Variable)
9
Mothers/Father Role
Education
Religious Beliefs
Gender/Age
Financial Resources
Maternal Relationship
Region
Public Awareness
Support
Ethnicity
Independent Variables
Secondary Source I Will Be Using In My Literature Review
Mother/Father Roles
Glynn, K. A. (2015). Predictors of parenting practices in parents of children with autism spectrum disorder.
Religious Beliefs
Huang, C. Y., Yen, H. C., Tseng, M. H., Tung, L. C., Chen, Y. D., & Chen, K. L. (2014). Impacts of autistic behaviors, emotional and behavioral problems on parenting stress in caregivers of children with autism. Journal of Autism and Developmental Disorders, 44(6), 1383-1390.
Education
Brezis, R. S., Weisner, T. S., Daley, T. C., Singhal, N., Barua, M., & Chollera, S. P. (2015). Parenting a child with autism in India: Narratives before and after a parent–child intervention program. Culture, Medicine, and Psychiatry, 39(2), 277-298.
Financial Resources
Zaidm ...
380067.docxby Jamie FeryllFILET IME SUBMIT T ED 22- .docxlorainedeserre
380067.docx
by Jamie Feryll
FILE
T IME SUBMIT T ED 22- MAR- 2019 06:38AM WORD COUNT 3608
CHARACT ER COUNT 204 57
380067 .DOCX (28.82K)
%4
SIMILARIT Y INDEX
EXCLUDE QUOT ES ON
EXCLUDE
BIBLIOGRAPHY
ON
380067.docx
ORIGINALITY REPORT
380067.docx
WRITECHECK REPORT
PAGE 1
PAGE 2
PAGE 3
PAGE 4
PAGE 5
PAGE 6
PAGE 7
PAGE 8
PAGE 9
PAGE 10
PAGE 11
PAGE 12
PAGE 13
PAGE 14
PAGE 15
PAGE 16
380067.docxby Jamie Feryll380067.docxORIGINALITY REPORT380067.docxWRITECHECK REPORT
380067
by Jamie Feryll
FILE
T IME SUBMIT T ED 13- MAR- 2019 03:56PM WORD COUNT 34 63
CHARACT ER COUNT 1957 5
ARCHAEOLOGY.DOCX (31.23K)
%5
SIMILARIT Y INDEX
EXCLUDE QUOT ES ON
EXCLUDE
BIBLIOGRAPHY
ON
380067
ORIGINALITY REPORT
380067
WRITECHECK REPORT
PAGE 1
PAGE 2
PAGE 3
PAGE 4
PAGE 5
PAGE 6
PAGE 7
PAGE 8
PAGE 9
PAGE 10
PAGE 11
PAGE 12
PAGE 13
PAGE 14
PAGE 15
380067by Jamie Feryll380067ORIGINALITY REPORT380067WRITECHECK REPORT
Interpretations of Iron Age Architecture Brochs in Society/Social Identity
Archaeology is a historical field which has advanced over the years based on more discoveries still being experienced by the archaeologists who seek them. According to Kelly and Thomas (2010; p.5), the concession that life existed in more ancient times than stipulated by biblical scholars and human culture allowed the archaeologists to dig deeper into genealogical data. Iron Age architecture and social/society identity relate to one another. For instance, the population, based on their identity and perception will construct buildings that directly reflect their beliefs. This essay will discuss these archaeological concepts of Iron Age architecture and society/social identity. Need a paragraph on brochs and how many and where they are across Scotland with patcialur focus on the atlantc region, this is not relevant for masters essay. Must define broch from its architecture and how long it would take to build and note famous ones and note the ones that will be referred to in this essay – this could be Perhaps incorpated into the next paragraph.
Iron Age architecture has over the years been dominated by differing archaeological concepts and debates. It was defined by settlements and settlement structures such as duns, brochs, wheelhouses, hillforts, stone-built round houses and timber. The social and societal identity which is identified through material remains indicates aspects of differentiation, regional patterns and segregation. According to Kelly and Thomas (2010; p.28), people who existed in Iron Age Scotland were isolated. This is demonstrated by the presence of a burial followed by an assembled chariot at Newbridge. Northern and western Scotland have been the source of the well-structured developments that have provided cultural, architectural and social data over time. Maes Howe, which is the largest Orkney burial cairn, located between Stromne ...
39Chapter 7Theories of TeachingIntroductionTheories of l.docxlorainedeserre
39
Chapter 7
Theories of Teaching
Introduction
Theories of learning are typically only useful to adult learning practitioners when they are applied to the facilitation of learning—a function assigned usually in our society to a person designated as teacher or trainer.
A distinction must be made between theories of learning and theories of teaching. Theories of learning deal with the ways in which people learn, whereas theories of teaching deal with the ways in which one person influences others to learn (Gage, 1972, p. 56).
Presumably, the learning theory subscribed to by a teacher will influence his or her teaching theory.
Early on, Hilgard resisted this fragmentation of learning theory. He identified 20 principles he believed to be universally acceptable from three different families of theories: Stimulus–Response (S–R) theory, cognitive theory, and motivation and personality theory. These principles are summarized in Table 7.1.
Hilgard’s conviction in his belief that his 20 principles would be “in large part acceptable to all parties” was grounded in his limited verification process. The “parties” with whom he checked out these principles were control-oriented theorists. In spite of their differences about the internal mechanics of learning, these theorists are fairly close in their conceptualization of the role of the teacher.
Table 7.1 Summary of Hilgard’s principles
Teaching Concepts Based on Animal and Child Learning Theories
Let’s examine the concepts of a variety of theories about the nature of teaching and the role of the teacher. First, we’ll look at the members of Hilgard’s jury. These include Thorndike, Guthrie, Skinner, Hull, Tolman, and Gagné.
Thorndike
Thorndike essentially saw teaching as the control of learning by the management of reward. The teacher and learner must know the characteristics of a good performance in order that practice may be appropriately arranged. Errors must be diagnosed so that they will not be repeated. The teacher is not primarily concerned with the internal states of the organism, but with structuring the situation so that rewards will operate to strengthen desired responses. The learner should be interested, problem-oriented, and attentive. However, the best way to obtain these conditions is to manipulate the learning situation so that the learner accepts the problem posed because of the rewards involved. Attention is maintained and appropriate S–R connections are strengthened through the precise application of rewards toward the goals set by the teacher. A teacher’s role is to cause appropriate S–R bonds to be built up in the learner’s behavior repertoire (Hilgard and Bower, 1966, pp. 22–23; Pittenger and Gooding, 1971, pp. 82–83).
Guthrie
Guthrie’s suggestions for teaching are summarized as follows:
1. If you wish to encourage a particular kind of behavior or discourage another, discover the cues leading to the behavior in question. In the one case, arrange the situation so that the desired be ...
38 Monthly Labor Review • June 2012TelecommutingThe.docxlorainedeserre
38 Monthly Labor Review • June 2012
Telecommuting
The hard truth about telecommuting
Telecommuting has not permeated the American workplace, and
where it has become commonly used, it is not helpful in reducing
work-family conflicts; telecommuting appears, instead, to have
become instrumental in the general expansion of work hours,
facilitating workers’ needs for additional worktime beyond the
standard workweek and/or the ability of employers to increase or
intensify work demands among their salaried employees
Mary C. Noonan
and
Jennifer L. Glass
Mary C. Noonan is an Associate
Professor at the Department of
Sociology, The University of Iowa;
Jennifer L. Glass is the Barbara
Bush Regents Professor of Liberal
Arts at the Department of Sociol-
ogy and Population Research
Center, University of Texas at
Austin. Email: [email protected]
uiowa.edu or [email protected]
austin.utexas.edu.
Telecommuting, defined here as work tasks regularly performed at home, has achieved enough
traction in the American workplace to
merit intensive scrutiny, with 24 percent
of employed Americans reporting in recent
surveys that they work at least some hours
at home each week.1 The definitions of
telecommuting are quite diverse. In this ar-
ticle, we define telecommuters as employ-
ees who work regularly, but not exclusively,
at home. In our definition, at-home work
activities do not need to be technologically
mediated nor do telecommuters need a
formal arrangement with their employer to
work at home.
Telecommuting is popular with policy
makers and activists, with proponents
pointing out the multiple ways in which
telecommuting can cut commuting time
and costs,2 reduce energy consumption
and traffic congestion, and contribute to
worklife balance for those with caregiving
responsibilities.3 Changes in the structure
of jobs that enable mothers to more effec-
tively compete in the workplace, such as
telecommuting, may be needed to finally
eliminate the gender gap in earnings and
direct more earned income to children,
both important public policy goals.4
Evidence also reveals that an increasing num-
ber of jobs in the American economy could be
performed at home if employers were willing
to allow employees to do so.5 Often, employees
can perform jobs at home without supervision
in the “high-tech” sector, in the financial sector,
and many in the communication sector that are
technology dependent. The obstacles or barriers
to telecommuting seem to be more organiza-
tional, stemming from the managers’ reluctance
to give up direct supervisory control of workers
and from their fears of shirking among workers
who telecommute.6
Where the impact of telecommuting has
been empirically evaluated, it seems to boost
productivity, decrease absenteeism, and increase
retention.7 But can telecommuting live up to its
promise as an effective work-family policy that
helps employees meet their nonwork responsi-
bilities? To do so, tel ...
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
2. Submitted on
03/28/20
06:22 PM EDT
Average Word Count
1,178
Highest: COSO_Framework_Research_Pa…
%26Attachment 1
Institutional database (4)
Student paper Student paper Student paper
Student paper
Internet (4)
wikipedia coso corporatecomplianceinsights
protiviti
Scholarly journals & publications (2)
ProQuest document ProQuest document
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 1,178
COSO_Framework_Research_Paper_BhanuKrishna_Mokka.docx
3. 8 1 9
2
6 4 3
5
7 10
8 Student paper 1 Student paper 6 wikipedia
Running head: COSO FRAMEWORK COMPONENTS 1
COSO FRAMEWORK COMPONENTS 8
COSO Framework Components
BhanuKrishna Mokka
ITS-831 - Infotech Importance in Strategic Planning University
of the Cumberlands
Dr. Eric Hollis
March 28, 2020
Abstract
The utilization of the COSO framework in an internal audit of
firms is imperative in the identification of accomplished
objectives. Additionally, the framework provides
analyses of risks in the external and internal environment,
which can impact business operations. Risks identification has
an impact on the financial performance of
4. the business. Control activities ensure procedures and policies
are followed, whereas a control environment enables integrity
and ethics in the managerial activities of
the employees. This ensures operations, procedures, and
organizational activities are done as per the set standards for
compliance and accountability. Information
and communication effectiveness ensure message conveyance
and feedback. Monitoring and review activities provide
feedback for improvement activities in the
1
2
3
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport?attemptId=05942a1c-
6d92-4c7e-b1b8-
6edc521465b3&course_id=_114545_1&download=true&include
Deleted=true&print=true&force=true
3/28/2020 Originality Report
https://ucumberlands.blackboard.com/webapps/mdb-sa-
BB5a31b16bb2c48/originalityReport/ultra?attemptId=05942a1c-
6d92-4c7e-b1b8-6edc521465… 2/3
Source Matches (15)
evaluation of internal control system effectiveness.
Achievement of objectives and optimal operations assist the
business to operate smoothly within accountability,
compliance, and reliability elements in internal control. The
elements are imperative in financial auditing practices in
5. financial reporting. The integrated internal
control framework provides security in the achievement of
objectives.
Introduction The Committee of Sponsoring Organizations of the
Treadway Commission (COSO) framework components is
imperative in business processes for
efficacy and effectiveness. The framework provides security in
the achievement of objectives with respect to business
operations. The activities within the components
are significant in auditing, as well as internal control during
reporting. The management of the business entity has to ensure
the framework is undertaken to curb
risks in financial performance besides improving management
effectiveness. Accountability, reliability, and compliance with
regulation are upheld through the
framework components. The components can also be used in
evaluating internal operational activities. Framework
Components The components consist of
interrelated concepts that are utilized in the management of the
business. Understanding the scope and dimension of the
components will enable the identification of
its impact on the business objectives. The components are as
discussed below.
Control Environment The control environment entails
managerial activities that create an organizational environment
with internal control in ethical and governance
standards. This is in support of business employees in the
organizational culture. Discipline and structure in the
organizational framework ensure an acceptable and
significant in managing people (Sari et al., 2018). Integrity in
administration also to be upheld in order to ensure
accountability and compliance. The control
environment can impact business objectives in that adopting
6. managerial practices in employee management has to consider
the ethical standards required for
compliance. Additionally, the component also impacts
management style affecting delegation and control of people as
per the standards of conduct.
Risk Assessment The identification and analyses of risks in the
internal and external environment have to be carried out in the
achievement of organization objectives
(Sari, R., Kosala, R., Ranti, B. & Supangkat, S, 2018). This is
to identify ways to manage the risks and how they can impact
business operations. The process results in
the adoption of internal controls to mitigate the risks as per the
assigned objectives. Further, the assessment leads to factor
analysis, which is essential in the
management of risks (Rae et al., 2017). The component impacts
business objectives as their development and achievement have
to consider risks in the environment.
This can affect profits as well as the performance of the
organization, which also influences organizational reputation.
Control Activities The component includes procedures and
policies carried out in operating processes through management
directives. Directives given are
significant in mitigating risks identified in objectives
achievement (Sari et al., 2018). The controls are in all functions
and levels. Approvals, verifications, performance
reviews, and authorizations have to be observed in the processes
for the control activities (Anderson & Eubanks, 2015). The
control activities can impact the reporting
of audits as approval, as well as authorization, has to be
followed in the reporting structures, which might affect
oversight responsibilities of the auditor. Information
and Communication Communication and information systems
enhance effectiveness in the communication processes in
7. operation and control of business
operations. Policies and procedures, as communicated, influence
accountability and compliance (Sari et al., 2018). Further,
communication with external stakeholders
supports the chain supply process.
4
5
6
This is essential in logistics technology in communication with
external parties and data analytics (Jin & Kim, 2018). Data
collected from the processes are utilized in an
analytical application in objectives achievement and enhanced
decision-making. The component can impact objective
achievement in that information obtained has to
be relevant and applicable in control and risk management.
Monitoring and Review Evaluation of the components should be
done in a timely and effective manner in the provision of
feedback. The feedback extends to
compliance reporting besides been essential in financial
reporting (Sari et al., 2018). Deficiencies in the framework
components are reported for corrective action. The
component is a continuous process; hence a continuous
improvement of the operational systems is observed (Anderson
& Eubanks, 2015). Separate and ongoing
evaluations are carried for management and control measures
reporting. The changes from the monitoring and review
processes can impact internal audit assurance
and control due to communication deficiencies. This can
influence the accomplishment of objectives in a systematic
approach.
8. Integrating COSO Framework into Company Integrating the
framework compliance in the warehouse systems organization
can be imperative in internal audit services
offered to clients. This will ensure that all auditors are informed
on the framework components and how changes can impact their
procedures in effectiveness
assurance. Additionally, the framework integration can be
combined with technology, especially on business intelligence
for efficiency. Data obtained from the
business intelligence processes can be utilized in all
components reducing errors and baseline monitoring activities
that utilize data analytics. This will ensure that
real-time information is provided to the warehouse firm, which
is accurate and reliable.
Conclusion The framework components are essential in internal
control processes as well as compliance with regulations. Risks
assessment and management results
in control activities and environment for operational
effectiveness. Further, information and communication systems
enhance reporting of activities through the
identified procedures reducing communication deficiencies.
Monitoring and review as a continuous process ensure
continuous improvement through the evaluation
of defects in the existing components. The framework can be
enhanced through the integration of data analytics and business
intelligence minimizing errors and
promoting data reliability.
References Anderson, D. & Eubanks, G. (2015). Governance
and internal control: Leveraging COSO across the three lines of
defense. COSO. Retrieved from
https://aechile.cl/wp-content/uploads/2015/07/COSO-2015-
3LOD-PDF-1.pdf
9. Jin, D. & Kim, H. (2018). Integrated understanding of big data,
big data analysis, and business intelligence: a case study of
logistics. Sustainability case report.
Retrieved from https://www.mdpi.com/journal/sustainability
Rae, K., Sands, J. & Subramaniam, N. (2017). Associations
among the five components within COSO internal control-
integrated framework as the
underpinning of quality corporate governance. Special issue on
corporate governance 3(11). Retrieved from
https://ro.uow.edu.au/cgi/viewcontent.cgi?
article=1752&context=aabfj
Sari, R., Kosala, R., Ranti, B. & Supangkat, S. (2018). COSO
framework for warehouse management internal control
evaluation: enabling smart warehouse
systems.
7 1
8
9
10 8
7
8 8
11. 1
Student paper
COSO FRAMEWORK COMPONENTS 1
Original source
COMPONENTS OF COSO FRAMEWORK 1
2
Student paper
COSO FRAMEWORK COMPONENTS 8
COSO Framework Components
Original source
Components of COSO Framework
Components of COSO Framework
3
Student paper
March 28, 2020
Original source
Saturday, March 28, 2020
4
Student paper
12. The integrated internal control
framework provides security in the
achievement of objectives.
Original source
Internal Control — Integrated Framework
5
Student paper
The components are as discussed below.
Original source
Seven are discussed below
6
Student paper
Control Activities The component
includes procedures and policies carried
out in operating processes through
management directives.
Original source
Control activities are the policies and
procedures that help ensure that
management directives are carried out
7
Student paper
13. References Anderson, D.
Original source
D., & Anderson, A
1
Student paper
Leveraging COSO across the three lines
of defense.
Original source
Leveraging COSO across the three lines
of defense
8
Student paper
Integrated understanding of big data, big
data analysis, and business intelligence: a
case study of logistics.
Original source
Integrated Understanding of Big Data,
Big Data Analysis, and Business
Intelligence A Case Study of Logistics
9
Student paper
14. Retrieved from
https://www.mdpi.com/journal/sustainab
ility
Original source
Retrieved from
https://www.mdpi.com/journal/sustainab
ility
10
Student paper
Rae, K., Sands, J.
Original source
Rae, K., J
8
Student paper
Associations among the five components
within COSO internal control-integrated
framework as the underpinning of
quality corporate governance.
Original source
Associations among the five components
within COSO internal control-integrated
framework as the underpinning of
quality corporate governance
16. COSO Framework for Warehouse
Management Internal Control Evaluation
Enabling Smart Warehouse Systems
NPV - IRRFIN 615NPV and IRR calculationsCost of
Capital10.00%Time/yr012345Cash flow Input hereDiscounted
CF000000NPV0=cf1/((1+n)^1)=cf2/((1+n)^2)=cf3/((1+n)^3)=cf
4/((1+n)^4)=cf5/((1+n)^5)PV
factor0.90909090910.8264462810.75131480090.68301345540.6
209213231IRR0.00%
Sheet3
Running head: INSERT FIRST 50 CHARACTERS OF TITLE 1
SAMPLE PAPER
Identifying the Best Practices in Strategic Management
Gertrude Steinbeck
ORG500 – Foundations of Effective Management
Colorado State University – Global Campus
Dr. Stephanie Allong
August 6, 2015
Page numbers
17. should be inserted
in the top right
corner.
The Running head is required for CSU-Global
APA Requirements. The title page should
have the words, Running head: followed by
the first 50 characters of the title in all caps.
Use the template paper located in the
Library under the “APA Guide & Resources”
link for a paper that is already formatted in
APA.
Papers should be
typed in a 12 pt,
Times New Roman
font with 1 inch
margins on all 4
sides. The entire
paper is double
18. spaced.
Information on the Title
Page is centered in the
top half of the paper. All
major words should be
capitalized and not bold.
IDENTIFYING THE BEST PRACTICES IN STRATEGIC 2
Identifying the Best Practices in Strategic Management
Strategic management and corporate sustainability are two
important dynamics of
modern-day organizations. It is important for organizational
leaders to have an understanding of
the theoretical applications of strategic management as a means
of addressing corporate
sustainability. The purpose of this paper is to provide
definitions and an understanding of
strategic management and corporate sustainability. An overview
of the Walgreen Company, the
organization of study, is also provided in order to understand
how the company has utilized
19. strategic management to implement sustainability initiatives for
long-term financial performance.
Strategic Management
The function of management is to plan, organize, lead, and
control the operations of an
organization (Robbins & Coulter, 2007) and includes strategic
management. Strategic
management is an approach in which organizations create a
competitive advantage, enhance
productivity, and establish long-term financial performance.
Chandler (as cited in Whittington,
2008) defines strategy as “the determination of the basic long-
term goals and objectives of an
enterprise, and the adoption of courses of action and the
allocation of resources necessary for
carrying out these goals” (p. 268). Similarly, Wheelen and
Hunger (2008) define strategic
management as the managerial decisions and actions of an
organization that achieve long-run
performance of the business, with benefits such as:
organization
20. The Strategic Management Model (SMM) provides the
framework for integrating strategic
planning into an organization so that the aforementioned
benefits are realized.
All subsequent pages should
only have the first 50
characters of the paper’s title
in all caps for the running head.
Repeat the title of your paper at the
beginning. This is not a header;
therefore it is not to be bold, but all
major words are capitalized. Do not add
a header at the beginning of your paper
as the first paragraph should clearly
identify the objective of your paper.
Each paragraph
should be indented
½ inch or 5 spaces
21. from the left
margin.
A level 1 header should be bold,
centered and all major words
capitalized. See
https://owl.english.purdue.edu/owl
/resource/560/16/on how to
format headings in APA.
If you using a source (Whittington) that is
citing another author (Chandler), use the
author’s last name found in your source
(Chandler) at the beginning of your
sentence followed by the citation - (as
cited in Your Source, year). Only the source
you are reading (Whittington) will be listed
in your references. See
https://owl.english.purdue.edu/owl/resour
ce/560/09/for more information.
22. Spell phrase out the first
time in document with
acronym in parentheses.
From that point forward,
the acronym can be used.
https://owl.english.purdue.edu/owl/resource/560/16/
https://owl.english.purdue.edu/owl/resource/560/16/
https://owl.english.purdue.edu/owl/resource/560/09/
https://owl.english.purdue.edu/owl/resource/560/09/
IDENTIFYING THE BEST PRACTICES IN STRATEGIC 3
Strategic Management Model
Research indicates as the concept of strategic management
evolved, many
theoretical models were proposed. Ginter, Ruck, and Duncan
(1985) identify eight
elements of the normative strategic model: vision and mission;
objective setting; external
environmental scanning; internal environmental scanning;
strategic alternatives; strategy
selection; implementation; and control. Long (as cited in Ginter
et al., 1985) stated that
normative strategic management models are an “explicit,
23. intentional, planned and rational
approach” (p. 581) to management. Similar to Ginter et al.,
Wheelen and Hunger (2008)
established the SMM (see Figure 1) which includes four main
elements: environmental
scanning, strategy formulation, strategy implementation, and
evaluation and control.
Environmental scanning is the monitoring, evaluating, and
extracting of information from
the external and internal environments in order for management
to establish plans and
make decisions. Strategy formulation includes creating long-
term plans for the
organization, including the mission, objectives, strategies and
policies. Strategy
implementation is the process of executing policies and
strategies in order to achieve the
mission and objectives. Evaluation and control require
monitoring the performance of the
organization and adjusting the process as necessary in order to
achieve desired results
(Wheelen & Hunger, 2008).
The SMM assumes the organizational learning theory, which
states that an
24. organization adapts to the changing environment and uses
gathered knowledge to
improve the fit between itself and the environment. The SMM
also assumes the
organization be a learning organization in which the gathered
knowledge can be used to
change behavior and reflect new knowledge (Wheelen &
Hunger, 2008).
This is an example of how to cite authors
using a narrative citation. The year must
follow the author(s) last name(s) in
parentheses. The authors are being used as a
part of a sentence, therefore the word “and”
is used and not the symbol “&.”
A level 2 header should
be bold, left-justified
and all major words
capitalized.
When citing 3-5 authors, list all the
authors the first time (see above)
and then use et al. for the following
25. in-text citations. If you have 6 or
more authors, use et al. for all in-
text citations.
When quoting, you must include the
page number or the paragraph
number of where you found the
quote and cite the source and/or page
number immediately after the
quotation marks even it if it is in the
middle of a sentence.
IDENTIFYING THE BEST PRACTICES IN STRATEGIC 4
Environmental
Scanning
Strategy
Formulation
Strategy
Implementation
28. organizational leaders have the responsibility of increasing
shareholder value through
corporate sustainability (Epstein, 2008). Corporate
sustainability is defined in a variety of
ways. Hollingworth (2009) described a sustainable organization
as “one that strives for
and achieves 360-organizational sustainability” (p. 1). The
author claimed an
organization is sustainable when it can endure, or maintain,
over a long-term without
permanently damaging or depleting resources including: the
organization itself; its human
resources (internal and external); the community/society/ethno-
sphere; and the planet’s
environment. He then claimed that if one of the four resources
is not sustainable, issues
with the remaining resources will eventually develop
(Hollingworth, 2009). Brundtland
(as cited in Epstein, 2008) described sustainability as the
economic development that
addresses the needs of the present generation without depleting
resources needed by
When using a Figure in your paper, make sure there
29. is no title above the figure. Underneath the figure
you must have the word, “Figure” italicized and the
figure number in your paper followed by a period.
Then mention where the information was adapted or
general information about the figure. Follow the
example above. Notice it does not follow the
reference citation format.
1
2
3
When you are using the same source for a
paragraph, you need to start the paragraph with
a 1- narrative citation, 2- refer to the author
again so your reader knows you are still talking
about the same author (try not to use pronouns
such as “he” or “she” as APA believes this could
lead to a gender bias), and 3-end the paragraph
with a parenthetical citation.
30. IDENTIFYING THE BEST PRACTICES IN STRATEGIC 5
future generations Epstein (2008) adds to the definition from a
business perspective by
including corporate social responsibility. Epstein also states
that organizations have a
responsibility to stakeholders to improve management practices
in order to add value by
addressing corporate social, environmental and economic
impacts (Epstein, 2008).
Organizational leaders are the strategic decision makers of a
company and have a
responsibility to stakeholders (Wheelen & Hunger 2008).
Therefore, it is important to
have an understanding of why corporate sustainability is
important, and how the nine
principles of sustainability performance guide strategic
management.
Importance of Corporate Sustainability
In addition to making a profit, organizations have a
responsibility to society,
which includes addressing its economic, social, and
environmental impacts, otherwise
31. known as social responsibility. Friedman and Carroll had two
opposing views of
corporate social responsibility. Friedman argued that the sole
responsibility of business
was to use resources and activities that enhanced profits
(Wheelen & Hunger, 2008).
Carroll (1979) argued that social responsibility included much
more that making a profit;
he proposed businesses must include the economic, legal,
ethical and discretionary
categories of business performance.
services to meet the
needs/wants of society in order to make a profit;
company is expected to
abide by;
statements, but also
include the norms and beliefs held by society;
This is another example of
narrative citation. The year must
32. follow the author(s) last name(s). If
there was a quotation, the page or
paragraph number would be listed
immediately after the quote in
parentheses.
This is an example of a parenthetical
citation. It includes the author(s) last
name(s) and the year. If there was a
quotation, a page or paragraph
number would also be included.
Notice that the period is at the end
of the parentheses.
IDENTIFYING THE BEST PRACTICES IN STRATEGIC 6
on by the
organization including voluntary activities and philanthropic
contributions
(Carroll, 1979).
33. The importance of corporate sustainability, therefore, is that an
organization is
responsible for financial performance, but it also has additional
responsibilities to
stakeholders and society in general.
The Nine Principles of Sustainability Performance
The nine principles, as presented by Epstein and Roy (2003)
(see Table 1), further
define sustainability, are measureable, and can easily be
incorporated into strategic
management (Epstein, 2008). These principles include ethics,
governance, transparency,
business relationships, financial return, community
involvement, value of products and
services, employment practices and protection of the
environment.
A table or figure should fit all on one
page even if there is a gap left in
your paper. It is easier for the reader
to view the table or figure when
34. presented as a whole instead of split
on two pages.
IDENTIFYING THE BEST PRACTICES IN STRATEGIC 7
Table 1
The Nine Principles of Sustainability Performance
1. Ethics The company establishes, promotes, monitors and
maintains ethical
standards and practices in dealing with all of the company
stakeholders.
2. Governance The company manages all of its resources
conscientiously and effectively,
recognizing the fiduciary duty of corporate boards and managers
to focus
on the interests of all company stakeholders.
3. Transparency The company provides timely disclosure of
information about its
products, services and activities, thus permitting stakeholders to
make
informed decisions.
4. Business
relationships
The company engages in fair-trading practices with suppliers,
distributors
35. and partners.
5. Financial return The company compensates providers of
capital with a competitive return
on investment and the protection of company assets.
6. Community
involvement/
economic
development
The company fosters a mutually beneficial relationship between
the
corporation and community in which it is sensitive to the
culture, context
and needs of the community.
7. Value of
product and
services
The company respects the needs, desires and rights of its
customers and
strives to provide the highest levels of product and service
values.
8. Employment
practices
36. The company engages in human-resource management practices
that
promote personal and professional employee development,
diversity and
empowerment.
9. Protection of the
environment
The company strives to protect and restore the environment and
promote
sustainable development with products, processes, services and
other
activities.
Note. There should be a general note about the table here.
Adapted from “Improving
sustainability performance: Specifying, implementing and
measuring key principles” by M.
Epstein, & M. Roy, 2003, Journal of General Management,
29(1), pp.15-31.
Walgreens Company
Walgreens Company is a retail drugstore that is in the primary
business of prescription
and non-prescription drugs, and general merchandise including
beauty care, personal care,
37. household items, photofinishing, greeting cards, and seasonal
items (Reuters, 2010). More
recently, the organization diversified its offerings through
worksite healthcare facilities, home
care facilities, specialty pharmacies, and mail service
pharmacies (Walgreens Company, 2010).
When using a Table in your paper, make
sure you use the word “Table” with the
Table number. Then insert the title of the
Table in italics, with all major words
capitalized. Underneath the Table you must
have the word, “Note” italicized followed by
a period. Mention where the information
was adapted from or general information
about the Table. Follow this example.
Notice it does not follow the Reference
citation format.
IDENTIFYING THE BEST PRACTICES IN STRATEGIC 8
38. Walgreen Company established a strong organizational culture
focusing on consumer and
employee satisfaction. The mission of Walgreens is:
We will provide the most convenient access to consumer goods
and services . . .
and pharmacy, health and wellness services . . . in America. We
will earn the trust
of our customers and build shareholder value. We will treat
each other with
respect and dignity and do the same for all we serve. We will
offer employees of
all backgrounds a place to build a career. (Walgreens, 2010a,
para. 1)
Walgreens was established in 1901 by pharmacist Charles R.
Walgreen Sr. (Walgreens, 2010b).
Prior to establishing the company, Mr. Walgreen struggled with
the direction the pharmacy
industry was headed; the lack of quality customer service and
care for people concerned him.
Today, Walgreens is the largest drugstore chain in the United
States employing over 238,000
people. Sales in 2009 exceeded $63 billion, in which 65% of
sales were from prescriptions
drugs. The organization has expanded into all 50 states, as well
39. as the District of Colombia and
Puerto Rico, for a total of 7,496 stores and 350 Take Care
clinics (Walgreens Company, 2010,
para. 3).
Conclusion
Strategic management and corporate sustainability are two
important practices in today’s
competitive global environment. In order to effectively
implement strategic management in light
of corporate sustainability, leaders must have an understanding
of such concepts. This paper has
provided a background and understanding of strategic
management and corporate sustainability.
An overview and history of Walgreen Company was also
presented in order to identify best
practices in strategic management that enhance corporate
sustainability.
If you are using information from
multiple web pages from one
website, you need to distinguish
which citation came from which
40. web page. You can distinguish each
page, by putting the letters, “a,”
“b”, etc. with the year.
If a quotation is longer than 40 words, it
must be in a block format. The block
format is indented ½ inch (or 5 spaces
from the left) from the left margin. Do not
use quotation marks for this quote.
IDENTIFYING THE BEST PRACTICES IN STRATEGIC 9
References
Carroll, A. B. (1979). A three-dimensional conceptual model of
corporate performance. The
Academy of Management Review, 4(4), 497.
Collins, J. (2001). Good to great. New York, NY: HarperCollins
Publishers Inc.
Epstein, M. J. (2008). Making sustainability work. San
Francisco, CA: Greenleaf
Publishing Limited.
Epstein, M., & Roy, M. (2003). Improving sustainability
41. performance: Specifying, implementing
and measuring key principles. Journal of General Management,
29(1), 15-31.
French, S. (2009). Critiquing the language of strategic
management. The Journal of Management
Development, 28(1), 6-17. doi: 10.1108/02621710910923836
Ginter, P., Ruck, A., & Duncan, W. (1985). Planners’
perceptions of the strategic management
process. Journal of Management Studies, 22(6), 581-596.
Hollingworth, M. (2009, November/December). Building 360
organizational sustainability. Ivey
Business Journal, 73(6), 2.
Walgreens. (2010a). Mission statement. Retrieved from
http://news.walgreens.com/article_display.cfm?article_id=1042
Walgreens. (2010b). Our past. Retrieved from
http://www.walgreens.com/marketing/about/history/default.html
Reuters. (2010). Walgreen Co. Retrieved from
http://www.reuters.com/finance/stocks/companyProfile?symbol
=WAG.N
Robbins, S. P., & Coulter, M. (2007). Management (9th ed.).
42. Upper Saddle River, NJ: Pearson
Prentice Hall.
Walgreens Company. (2010). 2009 Annual report. Retrieved
from
List sources in
alphabetical order.
The word, References
should be capitalized,
centered, but not bold.
When a citation
runs over to the
second line,
indent 5 spaces to
the right. This is a
“hanging indent.”
Make sure that the links
are not live (you should
not be able to click on
them to go to the
43. website). If they are live,
right click and then click
on “Remove Hyperlink.”
If you are using information
from multiple web pages
from one website, you need
to be able to distinguish
what information came from
each web page. To do this,
you need to add the letters,
“a,” “b,” etc. to the year of
each citation.
IDENTIFYING THE BEST PRACTICES IN STRATEGIC 10
http://investor.walgreens.com/annual.cfm
Wheelen, T. L., & Hunger, J. D. (2008). Strategic management
and business policy (11th ed.).
Upper Saddle River, NJ: Pearson Prentice Hall.
44. Whittington, R. (2008). Alfred Chandler, founder of strategy:
Lost tradition and renewed
inspiration. Business History Review, 82(2), 267-277.
Note: Level Headers 3, 4, and 5 are also used but much less
frequently. Click here for
more information on their format and use.
For more information on CSU-
Global APA requirements for
formatting in APA, and examples of
in-text and reference citations, see
the CSU-Global Guide to Writing
and APA Requirements.
https://owl.english.purdue.edu/owl/resource/560/16/
IDENTIFYING THE BEST PRACTICES IN STRATEGIC 11
References
Carroll, A. B. (1979). A three-dimensional conceptual model of
corporate performance. The
45. Academy of Management Review, 4(4), 497. [This is a journal
article citation. Articles
from the Library databases are based on print journals so the
citation will end with page
numbers.]
Collins, J. (2001). Good to great. New York, NY: HarperCollins
Publishers Inc. [This is a book
citation.]
Epstein, M. J. (2008). Making sustainability work. San
Francisco, CA: Greenleaf
Publishing Limited.
Epstein, M., & Roy, M. (2003). Improving sustainability
performance: Specifying, implementing
and measuring key principles. Journal of General Management,
29(1), 15-31.
French, S. (2009). Critiquing the language of strategic
management. The Journal of Management
Development, 28(1), 6-17. doi: 10.1108/02621710910923836
[This is a journal article
citation from a Library database. Include a doi number if
available.]
Ginter, P., Ruck, A., & Duncan, W. (1985). Planners’
perceptions of the strategic management
46. process. Journal of Management Studies, 22(6), 581-596.
Hollingworth, M. (2009, November/December). Building 360
organizational sustainability. Ivey
Business Journal Online. Retrieved from
http://www.iveybusinessjournal.com/article.asp?intArticle_ID=
868 [This is a journal that
is published online, so you would include the URL.]
Reuters. (2010). Walgreens Co. (WAG.N). Retrieved from
http://www.reuters.com/finance/stocks/companyProfile?symbol
=WAG.N
IDENTIFYING THE BEST PRACTICES IN STRATEGIC 12
Walgreens. (2010a). Mission statement. Retrieved from
http://news.walgreens.com/article_display.cfm?article_id=1042
[This is a website citation
with a corporate author. If you retrieve information from
various pages of this particular
website, you need to cite each web page. However, because the
author and the year will
be exactly the same, the lowercase letters, “a,” “b,” etc. need to
be added to the year. The
in-text citation would be: (Walgreens, 2010a).]
48. University, Jakarta, Indonesia 11480
[email protected]
Raymond Kosala
Computer Science Department, BINUS
Graduate Program – Doctor of
Computer Science, Bina Nusantara
University, Jakarta, Indonesia 11480
[email protected]
Benny Ranti
Faculty of Computer Science,
Universitas Indonesia,
Depok 16424, Indonesia
[email protected]
Suhono Harso Supangkat
Sekolah Teknik Elektro dan
Informatika,
Institut Teknologi Bandung,
Bandung, Indonesia
[email protected]
49. Abstract— There are many ways for the company to
improve its performance, one of them is optimizing the
internal control of the company's activities. Internal
control is intended to evaluate company activities and
operations. This study took a case study at PT. XYZ
related to the evaluation of internal controls in
warehouse management using the COSO framework
approach. From 5 elements and 17 Principle, study
found, there are 2 principles that have not been applied
in PT. XYZ; enforced accountability and control over
technology. The recommendation given is system
improvement as intended the inventory system to be
more accurate and reliable to enable smart warehouse
systems inside organizations.
Keywords: internal control, COSO framework, warehouse
management, evaluation
I. INTRODUCTION
50. There are many ways for the company to improve its
performance, one of them is optimizing the internal control
of the company's activities and also implementation of the
new system to increase efficiency and effectiveness in all
business process activities [4]. Internal control is a process
undertaken by company management to assist the
achievement of operations, reporting and in accordance with
the compliance [9]. The internal optimization is needed
because it describes the overall rules and procedures used by
management to improve management effectiveness in the
business and identify lack of internal control in the business
processes that it can make the organization vulnerable and
possible risks occurs, eventually all these risks can have an
impact on a company's financial performance [2].
In warehouse management, internal controls devoted to
optimizing the functions, including the process of finished
goods inventory, and it useful to organize the distribution
process to the market. According to Rita Makumbi (2013)
51. [6] the function of the warehouse management is one of a
service that can help the company's operational functions
run smoothly as a store of raw material, unfinished goods,
until stock the finished goods or inventory. One of the
problem in warehouse management is high production of
manufacture, company must pay attention to the process
from the beginning of production, to the process of goods
delivery, and inventory calculations.
One of famous approach for warehouse management
control is using COSO framework. COSO framework is one
of tools to maintain the effectiveness and efficiency of
inventory process in organizations [12]. COSO framework
also known as integrated framework that can help company
to:(1) warehouse operation process more effective and
efficient; (2) accountable and reliable of inventory stock
calculation; (3) compliances with government law and
regulations [8].
This research took case study from PT. XYZ as one of
52. company who implemented the warehouse management.
Based on observing in PT. XYZ, we found that company
still difficulty to balance the production and inventory
storage in warehouse which impact to lack of inventory
control.
II. LITERATURE REVIEW
Early definition of internal control is the plan of
organization to coordinate methods and measure all the
element in process business safe, accurate, reliable,
encourage the prescribed managerial policies [10]. Another
definition of internal control is philosophy of risk alignment,
risk management, ethics, policies, resources, tasks and
responsibilities according to organizational capacity to
manage risk [12].
In warehousing planning and control, company produces
various product, company needs good control over its
inventory which two main objectives such as (1) warehouse
inventory planning and control; (2) reliable inventory report
53. to support financial statements [11]
Related to COSO framework, basic concepts of internal
control are:(a) internal control is an integrated process and a
tool that can be used to achieve organization goals; (b)
Internal control is not only limited to policies and
procedures but should include all levels within the
organization; (c) Internal control can only provide a
reasonable guarantee, not an absolute guarantee, because
there are limitations that can obstruct the absoluteness of the
internal control itself; (d) Internal Control will ultimately
result in achievement of goals in categories of financial
statements, compliance, operational activities [13].
Using COSO framework for evaluating the internal
control helps company to calculate the probability of risk
which can occur adversely [2]. However COSO can
maintain and support the company to maintain risk which
known can give positive feedback nor negative [12].
54. COSO framework is consist of five: (1) Control
environment; (2) Risk assessment; (3) Control activities; (4)
Information & Communication; (5) Monitoring activities
[7].
Figure 1. The COSO Cube [3]
Table 1. Component of Internal Control in COSO [1]
III. METHODOLOGY
With COSO framework approach this research starting
with process business analysis as preliminary measurement
and basic analysis in PT. XYZ then continue with internal
control evaluation as follow:
Figure 2. The Research Flow for Warehouse Management
Evaluation in PT. XYZ
For detail performed as follows:
55. 1) Meeting related to explaining flow of evaluation
process.
2) Conducting interviews with stakeholders such as IS
team leader operations, IS analyst, supervisor factory
logistics, team leader factory logistics, warehouse staff,
forklift drivers, internal control, and IPG (Information
Protection & Governance) to observe and also learn
detail about how the business process run, systems
used and also the company's internal control
procedures.
3) Documents checking related to the process of the
finished goods inventory.
4) Doing directly observations in order to learn and
understand more clearly about the working procedures
associated with the process of finished goods
inventory.
IV. ANALYSIS AND RESULT
A. FINDINGS
Based on the results of research and interviews as
part of internal control evaluation, here are the results:
56. Based on the result above, total of 17 principles from
COSO framework known as 2 principles is in red area for
medium and high risk area, 6 principles is in yellow area
which “not fully adapted” for medium and high risk area
and green area for total 9 principles from low and high
risk area.
For the red area, we conducted deeply investigation
as high level evaluation for give the best
recommendation. We found incorrect procedure during
the process of inventory cycle in warehouse, due to goods
receipt in warehouse is not loaded to the shelf directly
and it put to wrong shelf. The impact, a lot of expired
inventory due to incorrect process in goods issue. The
inventory are stored in a multilevel shelf. During the
good issue and shipment for delivery, it was taken
randomly.
Another issued for the red area is control activities for
control over technology. PT. XYZ not only use
warehouse management but also already used one of the
systems like robot machine systems for put the inventory
during the goods receipt. The process starts when
shipping case sent by the conveyor and the systems will
create into one pallet by robot machine then the next step
is data will be stored in the robot database, but once in
while systems went down, there is no back up so the
process will be stopped or create manually. The effect for
this case is lack of control for goods receipt.
57. B. RECOMMENDATION
After we found the fact findings about internal control
evaluation for warehouse management in PT. XYZ, the
recommendation is as follow:
• Conducting customization through warehouse
management system at PT. XYZ.
• Change business processes related to system
requirements.
The recommendation above expected, will support and
improved the process in PT. XYZ such as:(1) Eliminate the
manual process; (2) Provide reliable information about
location of inventory stored and retrieved; (3) Trackable
inventory; (4) Provide real-time information related to
inventory in the warehouse.
The recommendation of design architecture for
warehouse management customization is using Three-Tier
Architecture. While the warehouse management will
integrated with robot machine and the application will store
into one single application server. This design purpose with
benefit: (1) optimized the server for storage, data process
58. and retrieving database; (2) Reduce data duplication [5].
Figure 3. Three-Tier Architecture [5]
The business process changes purposed as follow:
Robot Machine
Systems
Warehouse
Management
Systems
DATABASE
Interface Process Integration
Mobile Scanner (Goods Issue)
Inventory Barcode Create
Automatic Inventory Stock Calculation
Recommendation for Goods Issue
Movement (First In First Out Method
Adoption)
59. Figure 4. System Design
System design from figure 4, describes about additional
interface process integration as bridging between warehouse
management systems and robot machine systems which all
data from the systems will save into single database.
Otherwise the process will improve since the inventory
movement will follow with FEFO (First Expired First Out),
like picture describe in figure 5.
Table 2. Coso Matrix Performance in PT. XYZ
In the figure 5 shown the inventory movement while
systems automatically will scan and check the criteria. If the
criteria of the product proper the next step systems will
input into inventory systems and robot systems will take the
product into the pallet specifically based on criteria and
60. create delivery notes, afterwards the inventory staff will put
into shelf storing. For the next process, PT. XYZ move the
process of inventory into FEFO System (First Expired First
Out): the systems will create the delivery note (inventory
selection based on expired date) and show which the
inventory should out and help the inventory staff find the
correct inventory.
V. CONCLUSION
COSO framework not only providing better internal
control but also measurement of compliance risk due to
reviewing the organization operational as well. COSO
framework can support the risk mitigation, which can give
recommendation and also solution to the company.
Through 5 elements and 17 principles, it will help
company reach the objective nor goal of effectiveness and
efficiency company operation. Another opinion COSO
framework is likely common audit that enables controls not
the business operations but also all personnel inside of
company.
REFERENCES
61. [1] COSO Framework. (2016). Retrieved from
http://www.bussvc.wisc.edu/intcntrls/cosoframework.h
tml
[2] Diane J. Janvrin, E. A. (2012). The Updated COSO
Internal Control— Integrated Framework:
Recommendations and Opportunities for Future
Research. JOURNAL OF INFORMATION SYSTEMS,
189-213.
[3] J. Stephen McNally, C. (2013, June 2013). The 2013
COSO Framework & SOX Compliance : ONE
APPROACH TO AN EFFECTIVE TRANSITION.
Retrieved from
https://www.coso.org/documents/COSO%20McNallyT
ransition%20Article-
Final%20COSO%20Version%20Proof_5-31-13.pdf
[4] Jokipii, A. (2009). Determinants and consequences of
internal control in firms: a contingency theory based
analysis. Springer Science-Business Media, 115-144
62. [5] Kambalyal, C. (2010). Three Tier Architecture.
Retrieved from
http://channukambalyal.tripod.com/NTierArchitecture.
pdf
[6] Makumbi, R. (2013). Introduction to Warehousing
Principles and Practices. Lambert Academic
Publishing.
Figure 5 – The Process of Inventory Movement
[7] Martin, K., Sanders, E., & Scalan, G. (2014). The
Potential Impact of COSO Internal Control Integrated
Framework Revision on Internal Audit Structured
SOX Work Program . Elsivier - Research in
Accounting Regulations.
[8] Mary B. Curtis, F. H. (2000). The components of a
comprehensive framework of internal control. The
CPA Journal, 64-66.
63. [9] Miles E.A. Everson, S. E. (2013). Internal Control —
Integrated Framework. NY: Committee of Sponsoring
Organizations of the Treadway Commission.
[10] Procedure, A. I. (2008). Codification of auditing
standards and procedures . University of Mississippi
Library. Accounting Collection.
[11] Ravee, J. M. (2009). Pengantar Akuntansi-Adaptasi
Indonesia . Jakarta: Salemba Empat.
[12] Thomas V. Scannell, S. C. (2013). Supply Chain Risk
Management within the Context of COSO’s Enterprise
Risk Management Framework. Journal of Business
Administration Research, 15-28, Vol. 2, No. 1.
[13] Tsay, B.-Y. (2010). Designing an Internal Control
Assessment Program Using COSO's Guidance on
Monitoring. New York: The CPA Journal.
sustainability
64. Case Report
Integrated Understanding of Big Data, Big Data
Analysis, and Business Intelligence: A Case Study
of Logistics
Dong-Hui Jin and Hyun-Jung Kim *
Seoul Business School, aSSIST, 46 Ewhayeodae 2-gil,
Seodaemun-gu, Seoul 03767, Korea; [email protected]
* Correspondence: [email protected]; Tel.: +82-70-7012-2722
Received: 5 October 2018; Accepted: 17 October 2018;
Published: 19 October 2018
����������
�������
Abstract: Efficient decision making based on business
intelligence (BI) is essential to ensure
competitiveness for sustainable growth. The rapid development
of information and communication
technology has made collection and analysis of big data
essential, resulting in a considerable increase
in academic studies on big data and big data analysis (BDA).
However, many of these studies are
not linked to BI, as companies do not understand and utilize the
concepts in an integrated way.
Therefore, the purpose of this study is twofold. First, we review
the literature on BI, big data,
and BDA to show that they are not separate methods but an
integrated decision support system.
Second, we explore how businesses use big data and BDA
practically in conjunction with BI through
a case study of sorting and logistics processing of a typical
courier enterprise. We focus on the
65. company’s cost efficiency as regards to data collection, data
analysis/simulation, and the results from
actual application. Our findings may enable companies to
achieve management efficiency by utilizing
big data through efficient BI without investing in additional
infrastructure. It could also give them
indirect experience, thereby reducing trial and error in order to
maintain or increase competitiveness.
Keywords: business application; big data; big data analysis;
business intelligence; logistics;
courier service
1. Introduction
A growing number of corporations depend on various and
continuously evolving methods of
extracting valuable information through big data and big data
analysis (BDA) for business intelligence
(BI) to make better decisions. The term “big data” refers to
large amounts of information or data at
a certain point in time and within a particular scope. However,
big data have a short lifecycle with
rapidly decreasing effective value, which makes it difficult for
academic research to keep up with their
fast pace. In addition, big data have no limits regarding their
type, form, or scale, and their scope is
too vast to narrow them down to a specific area of study.
Big data can also simply refer to a huge amount of complex
data, but their type, characteristics,
scale, quality, and depth vary depending on the capabilities and
purpose of each company.
The same holds for the reliability and usability of the results
gathered from analysis of the data.
Previous studies generally agree on three main properties that
66. define big data, namely, volume,
velocity, and variety, or the “3Vs” [1–4], which have recently
been expanded to “5Vs” with the addition
of veracity/verification and value [5–10].
There are numerous multi-dimensional methods for choosing
how much data to gather and how
to analyze and utilize the data. In brief, the methodology for
extracting valuable information and
taking full advantage of it could be more important than the
data’s quality and quantity. A substantial
amount of research has been devoted to establishing and
developing theories concerning big data,
Sustainability 2018, 10, 3778; doi:10.3390/su10103778
www.mdpi.com/journal/sustainability
http://www.mdpi.com/journal/sustainability
http://www.mdpi.com
https://orcid.org/0000-0003-3698-4665
http://www.mdpi.com/2071-
1050/10/10/3778?type=check_update&version=1
http://dx.doi.org/10.3390/su10103778
http://www.mdpi.com/journal/sustainability
Sustainability 2018, 10, 3778 2 of 15
BDA, and BI to address this need, but it is still challenging for
a company to find, understand, integrate,
and use the findings of these studies, which are often conducted
independently and cover only select
aspects of the subject.
BDA refers to the overall process of applying advanced analytic
skills, such as data mining,
67. statistical analysis, and predictive analysis, to identify patterns,
correlations, trends, and other useful
techniques [11–15]. BDA contributes to increasing the
operational efficiency and business profits,
and is becoming essential to businesses as big data spreads and
grows rapidly.
BI is a decision support system that includes the overall process
of gathering extensive data,
extracting useful data, and providing analytical applications. In
general, BI has three common
technological elements: a data warehouse integrating an online
transaction processing system;
a database addressing specific topics; online analytical
processing that is used to analyze data in
multi-dimensions in order to use those data; and data mining,
which involves a series of technological
methods for extracting useful knowledge from the gathered data
[16–20].
Some areas of BI and BDA, such as data analysis and data
mining, overlap. This is to be expected,
as the raw data in BI have recently expanded to become big data
in volume and scope. This has
necessitated reorganization of the field and concepts of BI to
provide business insights and enable
better decision making based on BDA [21]. Although BI and
BDA are generally studied independently,
it is challenging and often unnecessary to distinguish between
the two concepts when performing
business tasks.
Given the cost of gathering and analyzing big data, it is
important to identify what data to collect,
the range of the data, and the most cost-effective purpose of the
data using BI. For this purpose, it is
68. effective to understand and apply the methodology based on
experiences of companies shared through
a case study. Therefore, the present study has the following
aims. First, we explore the meaning of BI,
big data, and BDA through a literature review and show that
they are not separate methods, but rather
an organically connected and integrated decision support
system. Second, we use a case study to
examine how big data and BDA are applied in practice through
BI for greater understanding of the
topic. The case study is conducted on a large and rapidly
growing courier service in the logistics
industry, which has a long history of research. In particular, we
examine how the company efficiently
allocates vehicles in hub terminals by collecting, analyzing, and
applying big data to make informed
decisions quickly, as well as uses BI to enhance productivity
and cost-effectiveness.
The rest of the paper proceeds as follows. Section 2 reviews the
research background and literature
related to BI, big data, and BDA. Section 3 presents the case
study for the company and industry and
discusses the case in detail. Finally, Section 4 concludes by
discussing the implications and directions
for future research.
2. Literature Review
Big data have become a subject of growing importance,
especially since Manyika et al. pointed out
that they should be regarded as a key factor to increase
corporate productivity and competitiveness [22].
Many researchers have shown interest in big data, as the rapid
development of information and
communication technology (ICT) generates a significant amount
69. of data. This has led to lively
discussions about the collection, storage, and application of
such data. In 2012, Kang et al. argued that
the value of big data lies in making forecasts by recognizing
situations, creating new value, simulating
different scenarios, and analyzing patterns through analysis of
the data on a massive scale [23]. In 2011,
only 38 studies related to big data and BDA were listed in the
Science Citation Index Expanded (SCIE),
Social Science Citation Index (SSCI), Arts & Humanities
Citation Index (AHCI), and Emerging Sources
Citation Index (ESCI), but in 2012, this number increased to 92,
and then rapidly increased to 1009 in
2015 and 3890 in 2017 [24].
Sustainability 2018, 10, 3778 3 of 15
2.1. Toward an Integrated Understanding of Big Data, BDA, and
BI
The research boom regarding big data has led to the
development of BDA, through which
valuable information is extracted from a company’s data.
Companies are well aware of the increasing
importance and investment need for BDA, as shown by Tankard
[25], who claimed that a company can
secure higher market share than its rivals and has the potential
to increase its operating profit margin
ratio by up to 60% by using big data effectively [25,26]. In the
logistics industry, big data are used
more widely than ever for supporting and optimizing
operational processes, including supply chain
management. Big data have been instrumental in developing
new products and services, planning
70. supply, managing inventory and risks, and providing customized
services [26–29].
BI has a longer history of research than that of big data. In
1865, Richard Millar Devens mentioned
the concept in the Cyclopaedia of Commercial and Business
Anecdotes [30], after which Luhn began
using it in its modern meaning in 1958 [31]. Thereafter, Vitt et
al. defined BI as an information system
and method for decision making that incorporates the four-step
cycle of analysis, insight, action,
and performance measurement [32]. Solomon suggested a
framework of BI and argued that research
in the area was necessary [20]. Then, Turban et al. [33]
expanded the scope of research to embrace
data mining, warehousing and acquisition, and business
analysis, and a growing number of studies
followed. Miškuf and Zolotová studied BI using Cognos—a BI
solution system adopted by IBM—and
the case of U.S. Steel to ascertain how to best apply
enterprise/manufacturing intelligence to manage
manufacturing data efficiently [30]. Van-Hau pointed out the
lack of a general framework in BI that
would allow businesses to integrate results and systematically
use them, as well as discussed issues
that needed to be researched further [34]. In summary, the
concept of BI has been expanding with
regard to application systems and technologies that support
enterprises in making better choices by
gathering, storing, analyzing, and accessing data more
effectively [35].
Previous research has dealt mostly with management and
decision support systems and
applications in BI, as well as technological aspects such as
algorithms and computing for big data
71. and BDA. However, the research areas are broadening, and
topics are becoming more diverse
based on different macroeconomic environments, pace of
technological progress, and division of
the research field. Therefore, many studies on BI, big data, and
BDA have been conducted separately.
More importantly, big data research has a relatively short
history, as it only started attracting significant
attention since around 2012, when rapid development of ICTs
led to discussions on how to gather
and use the unprecedented amount of data generated. On the
other hand, BI has long been a point of
interest among researchers.
The boundaries between these concepts—big data, BDA, and
BI—are often unclear and ambiguous
for companies. Generally, BI consists of an information value
chain for gathering raw data,
turning these data into useful information, management decision
making, driving business results,
and raising corporate value [36]. However, considering that
“raw data” have been expanded to “big
data” owing to the development of ICT and data storage, it is
safe to say that BI and big data/BDA are
presently not independent methods but organically coexist as an
integrated decision support system,
incorporating all processes from data gathering to management
decision making in business.
As research interest in big data began to grow since 2012, Chen
et al. grouped previous works
in the literature into BI and analytics and divided the evolution
process of the subject into stages to
examine the main characteristics and features of each stage
[37]. Subsequently, Wixom et al. proposed
the necessity of studying BI—including big data/BDA—and
72. business analytics to address changes
in the field, since there was increasing awareness about the use
and need of big data after the BI
Conference of the Communications of the Association for
Information Systems in 2009 and 2010 [38].
Fan et al. studied BI in the marketing sector in a big data
environment and concluded that big data
and BDA are disruptive technologies that reorganize the
processes of BI to gain business insights for
better decision making [21]. In addition, Bala and Balachandran
defined cloud computing and big
data as the two of the most important technologies in recent
years and explored the improvement
of decision-making processes through BI by integrating these
two key technologies for storing and
Sustainability 2018, 10, 3778 4 of 15
distributing data using cloud computing [39]. These cases
illustrate that an increasing number of
researchers are approaching BI and big data/BDA as an
integrated concept.
2.2. In-Depth Research through Case Studies
The growing interest in big data/BDA and rapid development in
this area have strengthened
BI as a decision support system, thereby promoting corporate
management and enhancing business
value by providing more valuable information to generate
innovative ideas for new products and
services. This has led to a rise in customer satisfaction,
improved inventory and risk management,
improved supply chain risk management, creation of
73. competitive information, and provision of
real-time business insights [26–29,40–42].
Considering the short lifecycle of big data and their use in
companies, there are numerous,
multi-dimensional methods for deciding how much data to
gather and how to analyze and utilize the
data speedily and effectively. As David et al. emphasized in The
Parable of Google Flu: Traps in Big Data
Analysis, the essential element is turning data into valuable
information, not the quantity of data or
new data itself [43]. It is thus important to establish a database
of integrated convergent knowledge
and continue to develop this by accumulating knowledge and
experiences through case studies based
on practical use that apply the principals of BI and big
data/BDA effectively. Below, we list examples
of successful studies on the use and application of big
data/BDA in practice.
• Zhong et al. examined a big data approach that facilitates
several innovations that can guide
end-users to implement associated decisions through radio
frequency identification (RFID) to
support logistics management with RFID-Cuboids, map tables,
and a spatiotemporal sequential
logistics trajectory [44].
• Marcos et al. studied both the environment and approaches to
conduct BDA, such as data
management, model development, visualization, user
interaction, and business models [45].
• Kim reported several successful cases of big data application.
Examples include analysis of
competing scenarios through 66,000 simulated elections
74. conducted per day to understand the
decisions of individual voters during the 2012 reelection
campaign of former US president Barack
Obama and delivery routes and time management based on
vehicle and parcel locations adopted
by UPS, a US courier service company [46].
• Wang et al. redefined big data business analytics of logistics
and supply chain management as
supply chain analytics and discussed its importance [47].
• Queiroz and Telles studied the level of awareness of BDA in
Brazilian companies through surveys
conducted via questionnaires and proposed a framework to
analyze companies’ maturity in
implementing BDA projects in logistics and supply chain
management [48].
• Hopkins analyzed the impact of BDA and Internet of things
(IoT), such as truck telematics and
geo-information in supporting large logistics companies to
improve drivers’ safety and operating
cost-efficiency [49].
The above examples of big data/BDA used by governments or
corporations, as well as entities
dealing with methods in either specific or general areas, make it
clear that there is an abundance of
studies on the need for and efficiency of big data. However, big
data and BDA have not been studied
until recently, and few studies use real corporate examples—
especially in the logistics industry—that
provide valuable business insights through detailed methods and
results.
Researchers should endeavor to provide second-hand experience
75. through specific case studies
using big data/BDA-based BI, and then accumulate and
integrate such case studies to establish a
database of integrated convergent knowledge. This could enable
corporations to adjust to changing
environments and improve the productivity and efficiency of the
organization.
Sustainability 2018, 10, 3778 5 of 15
3. Practical Business Application
The present study aims to examine the overall status of the
logistics industry (an industry with
continuously growing demand and prominence) and the courier
service industry (an industry used
by more consumers than any other logistics market segment) as
well as business applications related
to big data/BDA and BI. The final aim is to assist corporations
in reducing trial-and-error periods in
management, establishing long-term strategies, and enhancing
cost-effectiveness of the corporations.
3.1. Courier Service Overview
Given consumers’ increasing focus on personal service and
convenience in consumer products, as
well as global economic development, the manufacturing sector
is converting from mass production of
limited items to multi-item, small-scale production. This is
rapidly increasing the volume and sales of
courier services as more consumers buy online. Increased online
purchases are also a result of ICT
advances. According to the Korean Statistical Information
76. Service, Korea’s e-retail sales amounted
to KRW 79,954,478 million in 2017, an increase of 21.85%
from KRW 65,617,046 million in 2016,
and a massive 107.69% increase from 2013 [50]. The courier
service industry has become the biggest
beneficiary of this dramatic increase in the volume of goods
transported and is a suitable yardstick to
measure the growth of the logistics industry [51,52].
Traditionally, logistics was considered a support
industry for manufacturing and consumption and was mainly
perceived as a cost, but it has since
emerged as the main industry connecting producers and
consumers. Manufacturing corporations
regard supply expansion based on ICT to meet consumers’
demands as a key growth strategy, and the
courier service industry has shown remarkable growth owing to
the sharp increase in the need for
parcel transportation [53].
A courier service is generally defined as comprising the entire
process of transportation,
from receiving a parcel to packaging, transporting, and
delivering the parcel to the final destination
under the transporter’s responsibility and at the customer’s
request [54,55]. The courier service
industry usually faces oligopolistic market competition, as it is
an enormous service system
that requires huge initial investment. Courier service companies
are normally large operational
organizations that deal with large amounts of cargo, hub
terminals, general information systems, and a
wide range of transportation vehicles and consist of a
complicated network of labor and equipment [51].
Davis previously examined the usefulness of courier services by
using information technology
77. in the logistics industry [56]. DeLone and McLean showed that
a successful information system
environment is a significant factor influencing user satisfaction
as it models its influences on
individuals and organizations [57]. Kim et al. focused on the
use of transportation routes,
freight distribution centers, and brokerage points for efficient
parcel transportation via main roads [58].
Visser and Lanzendorf [59] analyzed the effects of business-to-
consumer (B2C) e-commerce for cargo
transportation, revealing that an increase in the demand for
courier services leads to changes in
freight per ton, distance, size, and fill rate of trucks. The
authors illustrated the relationship between
consolidation and transportation routes in courier companies
[59]. Jeong et al. discussed the allocation
of service centers to terminals with a given number of cargo
terminals and locations [60], while Goh
and Min examined the time of delivery by the capacity of cargo
terminals [61]. Meanwhile, Sherif et al.
presented an integrated model of the number and location of
warehouses, allocation of customers to
warehouses, and number and routes of vehicles to minimize
transportation cost, fixed cost, operational
cost, and route cost [62]. Lim et al. focused on the improvement
of service quality while considering
price reduction due to the increase of online demand, volume of
delivery, and short-term responses,
as well as the lack of mid- and long-term responses due to
increase in online transactions [63]. Park et al.
investigated methods of increasing productivity while
considering both logistics and employees by
utilizing a wireless Internet system [64], while Kim and Choi
explored the effects of a corporation’s
logistics technology on courier services based on online
shopping malls as courier service users [65].
78. In summary, most previous research concerning the courier
service industry focused on the
analysis of courier service networks and delivery efficiency in
terms of optimal logistics structures,
Sustainability 2018, 10, 3778 6 of 15
methods for improving service quality, and minimization of
costs in terms of operational requirements.
Only a few case studies gathered and analyzed big data or BI
applications in the field, considering the
increase in e-commerce delivery demand.
3.2. Case Study: CJ Logistics
This study uses the case of CJ Logistics, Korea’s largest
logistics company. It examines the sorting
process, especially regarding decisions about loading/unloading
docks and hub terminals, which are
at the core of courier services, to examine the effective use of
big data/BDA through BI.
CJ Logistics was selected as the research subject as it is the
largest logistics service provider in
Korea with the highest market share and sales revenue of KRW
7110.3 billion in 2017 [66]. In addition,
as shown in Figure 1 (big data case of CJ Logistics, March
2018), the company is an innovation
leader in the industry. It is traditionally considered a 3D
business that uses BI based on high-tech
automation-oriented technology, engineering, and system and
solution plus consulting (TES + C),
while actively and rapidly adopting big data/BDA at the same
79. time.
Sustainability 2018, 10, x FOR PEER REVIEW 6 of 15
3.2. Case Study: CJ Logistics
This study uses the case of CJ Logistics, Korea’s largest
logistics company. It examines the sorting
process, especially regarding decisions about loading/unloading
docks and hub terminals, which are
at the core of courier services, to examine the effective use of
big data/BDA through BI.
CJ Logistics was selected as the research subject as it is the
largest logistics service provider in
Korea with the highest market share and sales revenue of KRW
7110.3 billion in 2017 [66]. In addition,
as shown in Figure 1 (big data case of CJ Logistics, March
2018), the company is an innovation leader
in the industry. It is traditionally considered a 3D business that
uses BI based on high-tech
automation-oriented technology, engineering, and system and
solution plus consulting (TES + C),
while actively and rapidly adopting big data/BDA at the same
time.
Figure 1. Technology, engineering, system and solution plus
consulting (TES + C) of CJ Logistics.
CJ Logistics is a market leader equipped with cutting-edge
logistics technologies, including real-
time tracking of freight, an integrated courier and freight
tracking system that enables users to view
customer information and requirements, satellite vehicle
80. tracking, and temperature control systems
[67]. In 2017, CJ Logistics invested more than KRW 120 billion
to automate its sorting process through
sub-terminals to aid sustainable growth. CJ Logistics’
infrastructure is more than three times bigger
than that of its closest competitor in the courier service
industry. With five hub terminals, more than
270 sub-terminals, and more than 16,000 vehicles, CJ Logistics
processes more than 5.3 million
packages per day. Its mega hub terminal in Gwangju, Gyeonggi-
do Province—which was due for
completion in August 2018 with an investment of more than
KRW 400 billion—will utilize
convergence technologies such as big data, robots, and IoT to
expand its services for the convenience
of its customers across Korea. This will include same-day
delivery, same-day return, and scheduled
delivery services. The company is simultaneously moving
forward with its planned international
growth. At the end of 2017, CJ Logistics had a global network
of 238 centers in 137 cities and 32
countries. It opened the Shenyang Flagship Center, a mammoth
logistics center in Shenyang, China,
on 15 June 2018. The purpose of this investment was to
accelerate the company’s business in northern
Asia, including three provinces of northeastern China—
Liaoning, Jilin, and Heilongjiang. The
company has implemented huge capital expenditure to broaden
its business efficiently, laying the
groundwork for sustainable growth and expansion by raising the
entrance barrier for rivals (big data
case of CJ Logistics, March 2018).
CJ Logistics mainly uses a hub-and-spoke system, which
connects points via hubs or logistics
centers dealing with massive cargo volumes in its courier
81. service; it also uses a point-to-point
operational system directly connecting origins and destinations.
The point-to-point system delivers
Figure 1. Technology, engineering, system and solution plus
consulting (TES + C) of CJ Logistics.
CJ Logistics is a market leader equipped with cutting-edge
logistics technologies,
including real-time tracking of freight, an integrated courier and
freight tracking system that enables
users to view customer information and requirements, satellite
vehicle tracking, and temperature
control systems [67]. In 2017, CJ Logistics invested more than
KRW 120 billion to automate its sorting
process through sub-terminals to aid sustainable growth. CJ
Logistics’ infrastructure is more than
three times bigger than that of its closest competitor in the
courier service industry. With five hub
terminals, more than 270 sub-terminals, and more than 16,000
vehicles, CJ Logistics processes more
than 5.3 million packages per day. Its mega hub terminal in
Gwangju, Gyeonggi-do Province—which
was due for completion in August 2018 with an investment of
more than KRW 400 billion—will
utilize convergence technologies such as big data, robots, and
IoT to expand its services for the
convenience of its customers across Korea. This will include
same-day delivery, same-day return,
and scheduled delivery services. The company is simultaneously
moving forward with its planned
international growth. At the end of 2017, CJ Logistics had a
global network of 238 centers in 137 cities
and 32 countries. It opened the Shenyang Flagship Center, a
mammoth logistics center in Shenyang,
China, on 15 June 2018. The purpose of this investment was to
82. accelerate the company’s business in
northern Asia, including three provinces of northeastern
China—Liaoning, Jilin, and Heilongjiang.
The company has implemented huge capital expenditure to
broaden its business efficiently, laying the
Sustainability 2018, 10, 3778 7 of 15
groundwork for sustainable growth and expansion by raising the
entrance barrier for rivals (big data
case of CJ Logistics, March 2018).
CJ Logistics mainly uses a hub-and-spoke system, which
connects points via hubs or logistics
centers dealing with massive cargo volumes in its courier
service; it also uses a point-to-point
operational system directly connecting origins and destinations.
The point-to-point system delivers
to and from terminals, saving time on package arrivals while
alleviating capacity issues during the
peak season. However, growing volumes may increase costs, as
they require more investment in
terminals; a volume imbalance among terminals can cause
unnecessary additional costs. On the other
hand, in the hub-and-spoke system, packages are gathered and
sorted in a large terminal before being
delivered to a destination terminal. The advantage of this
system is that it reduces arrival time to
the terminals, easing the imbalance in volume. However, the
disadvantages are that it may delay
deliveries to distant or rural areas during the peak season and
requires a large-scale hub terminal [67].
Since CJ Logistics mostly uses the hub-and-spoke system,
83. whose core is the logistics process
at the hub terminal, this study focuses on decisions concerning
the loading/unloading docks in the
process. This focus point was selected for the following
reasons. First, few previous studies have
focused on this segment, even though it has greater room for
improvement regarding productivity and
efficiency than other segments. Second, the importance of this
segment may have been overlooked,
since standardizing the process is challenging owing to
differences in the environment, such as the
distance between buildings or shape of the space. Third, there
are many other difficulties to address,
including outsourcing, warehouse management, freight payment,
inventory management, packing,
customs clearance, and customer claims [51]. Many courier
service providers allocate hub terminal
docks for loading/unloading simply according to terminal
conditions, such as the distance between
docks and number of packages, mostly based on past
experience. By contrast, CJ Logistics has
dramatically improved productivity and efficiency by “seeing
the unseen” through the use of big
data/BDA and promoting faster and better decision making
through BI.
The hub terminal process was selected from the three general
stages of courier services, namely,
pick-up, transport/sorting, and delivery (Figure 2). This process
was selected because it is the central
process connecting pick-ups from different locations with
delivery to different destinations [68,69].
Sustainability 2018, 10, x FOR PEER REVIEW 7 of 15
84. to and from terminals, saving time on package arrivals while
alleviating capacity issues during the
peak season. However, growing volumes may increase costs, as
they require more investment in
terminals; a volume imbalance among terminals can cause
unnecessary additional costs. On the other
hand, in the hub-and-spoke system, packages are gathered and
sorted in a large terminal before being
delivered to a destination terminal. The advantage of this
system is that it reduces arrival time to the
terminals, easing the imbalance in volume. However, the
disadvantages are that it may delay
deliveries to distant or rural areas during the peak season and
requires a large-scale hub terminal
[67].
Since CJ Logistics mostly uses the hub-and-spoke system,
whose core is the logistics process at
the hub terminal, this study focuses on decisions concerning the
loading/unloading docks in the
process. This focus point was selected for the following
reasons. First, few previous studies have
focused on this segment, even though it has greater room for
improvement regarding productivity
and efficiency than other segments. Second, the importance of
this segment may have been
overlooked, since standardizing the process is challenging
owing to differences in the environment,
such as the distance between buildings or shape of the space.
Third, there are many other difficulties
to address, including outsourcing, warehouse management,
freight payment, inventory
management, packing, customs clearance, and customer claims
[51]. Many courier service providers
allocate hub terminal docks for loading/unloading simply
according to terminal conditions, such as
85. the distance between docks and number of packages, mostly
based on past experience. By contrast,
CJ Logistics has dramatically improved productivity and
efficiency by “seeing the unseen” through
the use of big data/BDA and promoting faster and better
decision making through BI.
The hub terminal process was selected from the three general
stages of courier services, namely,
pick-up, transport/sorting, and delivery (Figure 2). This process
was selected because it is the central
process connecting pick-ups from different locations with
delivery to different destinations [68,69].
Figure 2. General courier service structure.
An incident that occurs at the hub terminal can have a serious
impact on the entire cycle—from
pick-up to delivery—and could cause a bottleneck effect at hub
terminals. This is a significant issue
that needs to be addressed to secure growth in the industry, as it
can paralyze transportation and
delivery within a company on a large scale. Resolving this issue
alongside difficulties in other areas
by using big data/BDA could improve company productivity and
efficiency as a whole.
Figure 2. General courier service structure.
Sustainability 2018, 10, 3778 8 of 15
An incident that occurs at the hub terminal can have a serious
impact on the entire cycle—from
86. pick-up to delivery—and could cause a bottleneck effect at hub
terminals. This is a significant issue
that needs to be addressed to secure growth in the industry, as it
can paralyze transportation and
delivery within a company on a large scale. Resolving this issue
alongside difficulties in other areas by
using big data/BDA could improve company productivity and
efficiency as a whole.
3.2.1. Data and Methodology
CJ Logistics witnessed a drastic rise in online and offline B2C
transactions, experiencing a
compound annual growth rate of 9.9% from 2011 to 2016. In
addition, the courier company’s market
share rose from 42% in 2015 to 46% in 2017. To accommodate
this growth, the company increased
the number and size of its vehicles, established a demand
forecasting system, and improved its
peer-to-peer (P2P) network. These measures increased the daily
delivery per person from 262 boxes
to 344 boxes between 2015 and 2017, while the sorting capacity
of hub terminals was improved from
around 4.4 million cases to 5.3 million cases during the same
period. However, since the company’s
hub terminal capacity had reached its limit, bottlenecks in the
logistics process were becoming serious.
As a result, the rate of remaining cargo increased by 3.1%, and
the overnight delivery rate dropped by
2.3% between 2015 and 2017. This situation makes it clear that
it is imperative for the company to find
a solution through methods that could enhance hub terminal
capacity.
To address this issue, CJ Logistics decided to integrate BDA
into its existing decision-making
87. processes to understand the current situation better, enabling the
company to make better-informed
choices and identify future directions. Daejeon hub was chosen
for the pilot test. First, information
was gathered on roughly 75 million inbound invoices and 240
million packages at Daejeon hub
terminal out of a total of 260 million inbound invoices and 720
million packages at hub terminals.
The information was gathered over a three-month period
between November 2016 and January 2017.
This information was used to generate extensive data on the
unloading docks at the hub terminal
as well as on routes, transition points, moving time, loading
docks, remaining cargo, and sorting
personnel for BDA. Based on the results, the shortest distance
between loading and unloading docks,
time metrics, and vehicle loading information were integrated
with application methods (as shown
later in this subsection). The simulation produced results that
would have been impossible to obtain by
conventional dock allocation methods that are based on
classification codes and number of packages.
By reflecting the results at different sites, CJ Logistics was able
to increase its hub terminal capacity, as
shown in the following paragraphs.
Packages delivered by customers are collected at sub-terminals
in each region and transported
to hub terminals by truck. Vehicles entering the hub terminal
wait for dock allocation and are then
unloaded or loaded after being allocated, as per the process
shown in Figure 3. In the entire dock
allocation process, CJ Logistics reflected at least two types of
objective functions to identify the
first-in-line vehicle to unload among those waiting, the closest
unloading chute, and the second-in-line
88. chute and vehicle in terms of waiting time while unloading
vehicles to optimize dock allocation in the
hub terminal.
Objective function (1) sets the weighting factor for unloading
priority and reflects the number of
packages using the volume information in the vehicles for
application based on four types of “reference
information”, namely, (1) loading priority of waiting vehicles
by route; (2) customer classification
according to special sale customers, premium customers, and
general customers; (3) vehicle
classification according to unloading only, unloading/loading,
and loading only; and (4) content
classification according to console, produce, and general. These
unloading priorities were set within
the “constraints” of the remaining vehicles that had not been
unloaded, and vehicles waiting for more
than three hours that should have been unloaded first. Table 1
presents vehicle unloading priorities
based on weighting factor and time.
Sustainability 2018, 10, 3778 9 of 15
Sustainability 2018, 10, x FOR PEER REVIEW 9 of 15
Figure 3. Optimization of dock allocation process.
Objective function (1): Selection of vehicles to unload first
= ∗ (1)
W: weighting factor for unloading priority, N: number of
packages.
89. Table 1. Selection of vehicle unloading priorities according to
weighting factor and time.
Order Category W (Before 0:00) W (After 0:00)
1 Special sale customer 50 3
2 Route for loading first 30 50
3 Console volume 8 15
4 Produce 7 10
5 Premium customer 3 20
6 First-in, first-out (FIFO) 2 2
Note: W: weighting factor for unloading priority.
Objective function (2) pertains to optimum unloading chute
allocation. This was calculated using
volume by loading chute for each vehicle, travel time between
unloading/loading chutes, content
information, and reflected travel time under the constraints. The
function includes minimization of
congestion through equal allocation of vehicles, minimization
of travel between buildings, and
allocation of vehicles with more than 30% console content to a
special console unloading zone, based
on two types of reference information. The reference
information includes (1) travel time between
Figure 3. Optimization of dock allocation process.
Objective function (1): Selection of vehicles to unload first
Selection of vehicles to unload first = ∑( W ∗ N ) (1)
W: weighting factor for unloading priority, N: number of
packages.
90. Table 1. Selection of vehicle unloading priorities according to
weighting factor and time.
Order Category W (Before 0:00) W (After 0:00)
1 Special sale customer 50 3
2 Route for loading first 30 50
3 Console volume 8 15
4 Produce 7 10
5 Premium customer 3 20
6 First-in, first-out (FIFO) 2 2
Note: W: weighting factor for unloading priority.
Objective function (2) pertains to optimum unloading chute
allocation. This was calculated
using volume by loading chute for each vehicle, travel time
between unloading/loading chutes,
content information, and reflected travel time under the
constraints. The function includes
minimization of congestion through equal allocation of
vehicles, minimization of travel between
buildings, and allocation of vehicles with more than 30%
console content to a special console unloading
zone, based on two types of reference information. The
reference information includes (1) travel
time between loading/unloading chutes and (2) unloading
service time for maximum, minimum,
and average volume.
Sustainability 2018, 10, 3778 10 of 15
Objective function (2): Optimum unloading chute allocation
91. Optimum unloading chute allocation = ∑( L ∗ T ) (2)
L: Volume in the vehicles by loading chutes, T: Travel time
between loading/unloading chutes.
Although vehicles are assigned to docks through optimum
chutes, by considering operational
status at the docks and the fact that unloading procedures can
change at any time, the function repeats
the optimization of the dock allocation process to decide
whether a vehicle should be placed on hold
or assigned to a second dock, or whether a second-in-line
vehicle should be sent first to increase
efficiency. Information from the BDA was used in connection
with balancing the volume among
loading docks through tracking analysis of individual products,
fast delivery by development of
new P2P routes, expansion of hub terminal capacity, and
volume analysis of products for higher
productivity and efficiency.
3.2.2. Simulation and Adoption Result
On 6 November 2016, vehicle number “98 Ba 3490” loaded with
cargo from Jungrang sub-terminal
arrived at Daejeon hub terminal, unloaded, and then should have
reloaded 249 items (52.8% of the
total load) on the B1 and 1st floors of Building A, 177 items
(37.5% of the total load) on the 1st and 2nd
floors of Building B, and 46 items (9.7% of the total load) on
the 1st floor of Building C as can be seen
in Figure 4a, and the number of items in the red box indicate the
quantity that should be loaded in the
individual dock. Therefore, the vehicle was allocated to Dock
D7 of Building A, since there were more
packages to load at Building A than at the other docks (see the
92. purple dot in Figure 4a). It took 57 min
and 34 s to complete the unloading/loading process.
However, a simulation based on big data/BDA revealed that
dock allocation according to the
number of items to load, as shown earlier in this subsection,
was very inefficient. The choice of
Dock D7, Building A was ranked 41st, as evident from the
ranking table in Figure 4b, in terms of
efficiency, and unloading at Dock F8, Building B proved most
efficient (see the blue dot in Figure 4b).
This information could not be determined before the BDA. The
simulation results showed that
unloading at Dock F8, Building B could decrease the vehicle’s
travel time to around one-fifth of
the actual time it took when using Dock D7, Building A. The
actual travel time was three times greater
than the simulated travel time. When a simulation was
conducted using the entire fleet of vehicles,
the overall efficiency of the hub terminal rose, reducing travel
time by more than 20 min, even when
unloading at Dock D7, Building A.
CJ Logistics shared the simulation results through the internal
reporting system using BI,
thus enabling management to make decisions optimizing dock
allocations and considering the flow
of cargo traffic in hub terminals. As a result, the flow of
products improved dramatically, raising the
processing rate per hour as well as the rate of overnight
deliveries, while lowering the rate of remaining
freight. In Daejeon hub terminal, the average distribution time
per vehicle was 52 min and 42 s during
the thanksgiving season in 2016. This time decreased to 44 min
and 7 s during the same period in 2017,
a remarkable improvement of 16.3%. Building on such positive
93. results, CJ Logistics subdivided the
distribution model by days of the week, seasons, and events,
and fine-tuned the metrics of optimum
paths. This system was applied to mega hubs in metropolitan
areas. By late 2017, the system had
been applied throughout the country. The remaining cargo was
reduced by 14% from the previous
year, and the overnight delivery rate increased by 2.8% in 2017.
In summary, CJ Logistics achieved a
phenomenal rise in productivity and cost-effectiveness through
the use of big data/BDA. It still used
the existing infrastructure but expanded the application of BI
based on BDA to make decisions across
business segments, for long-term strategies, and for additional
investment by management.
Sustainability 2018, 10, 3778 11 of 15
Sustainability 2018, 10, x FOR PEER REVIEW 11 of 15
Figure 4. (a) Before optimization of dock allocation; DaeJeon
Hub Terminal of CJ Logistics; (b) After
optimization of dock allocation using BDA; DaeJeon Hub
Terminal of CJ Logistics.
4. Discussion and Conclusions
Business activities that are believed to be sufficiently empirical
and productive to ensure
efficiency can benefit from different perspectives and
breakthroughs upon acquiring and analyzing
big data, and can be realized through BI. The value of big data
depends on the types of data extracted
94. and how they are utilized. The crucial factor, however, is the
method of turning raw data into
valuable information, and not the quality or quantity of the data.
Therefore, it is vital to identify the
type and scope of data to be collected according to their purpose
and focus area. The efficient use of
Figure 4. (a) Before optimization of dock allocation; DaeJeon
Hub Terminal of CJ Logistics; (b) After
optimization of dock allocation using BDA; DaeJeon Hub
Terminal of CJ Logistics.
4. Discussion and Conclusions
Business activities that are believed to be sufficiently empirical
and productive to ensure efficiency
can benefit from different perspectives and breakthroughs upon
acquiring and analyzing big data,
and can be realized through BI. The value of big data depends
on the types of data extracted and
how they are utilized. The crucial factor, however, is the
method of turning raw data into valuable
information, and not the quality or quantity of the data.
Therefore, it is vital to identify the type and
scope of data to be collected according to their purpose and
focus area. The efficient use of big data
Sustainability 2018, 10, 3778 12 of 15
may provide an opportunity to a small or medium enterprise to
become a large corporation or market
leader by taking advantage of meaningful information, and for a
large corporation to maintain its
market share and ensure sustainable growth and
95. competitiveness. Many studies have been conducted
on BI, big data, and BDA so far, but for enterprises to
implement changes, it is necessary for them
to understand intuitively that BI, big data, and BDA cannot be
separated, but should be integrated
and utilized in the management decision support system as a
whole. As the case study of CJ Logistics
shows, the process of collecting and analyzing big data and
applying it through BI is separated neither
individually nor progressively.
The limitations of this case study include the facts that the big
data have been derived from a
limited date range, there are differences in the infrastructure
and situation of each company, and the
case study represents only a portion of a company within a
specific industry. Nonetheless, we believe
that this case study can be directly applied to other logistics
companies within the same sector and,
therefore, can help these companies achieve time and cost
efficiency without much trial and error.
Our study can also have a positive long-run impact by informing
companies in the logistics industry,
as well as in other industries, of the possibility of increasing the
efficiency and productivity of their
existing infrastructure without additional investment. CJ
Logistics’ process of expanding and applying
the experience gained through the combined use of BI, big data,
and BDA to all of its business
divisions can be a valuable example for other companies and
may provide insights concerning future
business directions and reduced trial and error. Future studies
can expand on this research to provide
practical knowledge and experience by collecting and sharing
similar case studies, including those
about volumetric analysis through ITS (Intelligence Scanner) of
96. goods, volume management through
production of boxes for each customer, classification of
customers based on volume density, and etc.
which are based on practical business applications to build
integrated knowledge.
Author Contributions: Conceptualization, D.-H.J. and H.-J.K.;
methodology, D.-H.J.; software, D.-H.J.; validation,
D.-H.J. and H.-J.K.; formal analysis, D.-H.J.; investigation, D.-
H.J.; resources, D.-H.J.; data curation, D.-H.J.;
writing—original draft preparation, D.-H.J.; writing—review
and editing, D.-H.J. and H.-J.K.; visualization,
D.-H.J.; supervision, D.-H.J. and H.-J.K.; project
administration, D.-H.J. and H.-J.K.
Funding: This research received no external funding.
Conflicts of Interest: CJ Logistics provided some part of the
data for the case study to Dong Hui Jin and validated
all the data used in this study.
References
1. Laney, D. 3D Data Management: Controlling Data Volume,
Velocity and Variety; Application Delivery Strategy;
META Group: Stamford, CT, USA, 2001; Volume 949.
2. McAfee, A.; Brynjolfsson, E. Big data: The management
revolution. Harv. Bus. Rev. 2012, 90, 60–68. [PubMed]
3. Fosso Wamba, S.; Akter, S.; Edwards, A.; Chopin, G.;
Gnanzou, D. How ‘big data’ can make big impact:
Findings from a systematic review and a longitudinal case
study. Int. J. Prod. Econ. 2015, 165, 234–246.
[CrossRef]
97. 4. Wang, Y.; Kung, L.; Wang, W.Y.C.; Cegielski, C.G. An
integrated big data analytics-enabled transformation
model: Application to health care. Inf. Manag. 2018, 55, 64–79.
[CrossRef]
5. White, M. Digital workplaces: Vision and reality. Bus. Inf.
Rev. 2012, 209, 205–214. [CrossRef]
6. Kambatla, K.; Kollias, G.; Kumar, V.; Grama, A. Trends in
big data analytics. J. Parallel Distrib. Comput. 2014,
74, 2561–2573. [CrossRef]
7. Addo-Tenkorang, R.; Helo, P.T. Big data applications in
operations/supply-chain management: A literature
review. Comput. Ind. Eng. 2016, 101, 528–543. [CrossRef]
8. Richey, R.G.; Morgan, T.R.; Lindsey-Hall, K.; Adams, F.G.
A global exploration of big data in the supply
chain. Int. J. Phys. Distrib. Logist. Manag. 2016, 46, 710–739.
[CrossRef]
9. Yu, W.; Chavez, R.; Jacobs, M.A.; Feng, M. Data-driven
supply chain capabilities and performance:
A resource-based view. Transp. Res. E Logist. 2018, 114, 371–
385. [CrossRef]
http://www.ncbi.nlm.nih.gov/pubmed/23074865
http://dx.doi.org/10.1016/j.ijpe.2014.12.031
http://dx.doi.org/10.1016/j.im.2017.04.001
http://dx.doi.org/10.1177/0266382112470412
http://dx.doi.org/10.1016/j.jpdc.2014.01.003
http://dx.doi.org/10.1016/j.cie.2016.09.023
http://dx.doi.org/10.1108/IJPDLM-05-2016-0134
http://dx.doi.org/10.1016/j.tre.2017.04.002