Choose a Research Topic
Hiba Al Mehdi
School of Business, Northcentral University
BUS-7100: Scholarly Literature Review
Dr. Richard Thompson
October 3, 2021
Richard C. Thompson, Ph.D.
Grade – 9.5/10
10/6/2021
Assignment: Choose a Research Topic
Week 7 Requirements
Feedback
The problem statement is between 250-300 words. It describes the gap in the literature or the problem found in the research. It is something that has not been solved. A problem statement is used to describe what the researcher intends to solve. Include the following items in your draft:
I see you changed your topic since Week 5 – this is acceptable and I think the topic is clearer as well.
See comment on formatting of your Problem Statement and need for supporting research.
See comments on Purpose Statement.
See comments on your Theoretical Framework.
I look forward to your revisions in Week 8’s assignment
1. Write a problem statement with no more than 250 words.
1. Write a purpose statement using the directions below.
1. Include two or three paragraphs about a theory or conceptual framework.
1. Add your annotated bibliography from previous work.
From the dissertation template, use the following points to write a purpose statement: Begin with a succinct purpose statement that identifies the study method, design, and overarching goal: “The purpose of this [identify research methodology] [identify research design] study is to [identify the goal of the dissertation that directly reflects and encompasses the research questions that will follow].”
1. Indicate how the study is a logical, explicit research response to the stated problem and the research questions that will follow.
1. Continue with a brief and clear step-by-step overview of how the study will be (proposal) or was (manuscript) conducted.
1. Identify the variables/constructs, materials/instrumentation, and analysis.
1. Identify the target population and sample size that will be needed (proposal) or was obtained (manuscript).
Length: 10-12 pages total, not including title and reference pages.
Include a minimum of seven scholarly resources.
Work is free of spelling, punctuation, grammar, & word usage errors. APA was used for citations and references.
Running head: DRAFT OF RESEARCH TOPIC 2
Business Performance Risks Caused by Outsourcing of Information Technology.
The information technology (IT) growth has resulted in the rise of transaction demand by consumers and businesses. The majority of the organization's technical teams are ever-present to solve any emerging needs. Following rampant business needs growth, organizations are on a mission to keep the source and demand of particular information technology functions intact. The world's globalization has changed the production mode of enterprises from insourcing to outsourcing. The management of cost and time management efficiency are the determiners of the organization's business performance.
Furthermore, several factors ...
Illustration of an exam template Please do not make up youhe45mcurnow
Illustration of an exam template
Please do not make up your own template. Please do not copy what I placed in italics. Discussion 1 (so
forth)
Reference: In APA
Citation: In APA
Major theme of the essay
This is an abstract.
Arguments used to support this theme
This is a summary of the selected reading.
Ideas that support the problem under review
This identifies ideas from the summary that specifically address the problem. It will be redundant from the
summary, just focused/concise.
Discussion of the problem
This is your analysis placing this article within the context of the problem under review.
Now do the same for the next three. Use articles from the library, or through an Internet search. A few are
computerworld.com; cio.com; informationweek.com; & imm.arma.org. There are others.
How long? Depends on the original. Strive to perfect your understanding of the authors’ intent and
argument. This exam provides an opportunity for you to place your understanding within the context of
the discussion problem.
Illustration of an exam
Discussion 1
Reference: Arandjelovic, P. (2015, February). Why CIOs should be business-strategy partners. McKinsey &
Company. Retrieved from http://www.mckinsey.com/business-functions/digital-mckinsey/our-
insights/why-cios-should-be-business-strategy-partners
Citation: (Arandjelovic, 2015)
Major theme of the essay Executives report that IT performance and business tasks improve if CIOs
play an active role in business strategy (Arandjelovic, 2015). In addition, when CIOs don’t play that active
role, view of IT within the business can suffer greatly.
Arguments used to support this theme Study of over 350 firms by McKinsey & Company. A survey found
that executives are not satisfied with almost all parts of IT, from IT infrastructure to IT governance, let
alone introducing innovative technologies to drive new business opportunities. Moreover, the survey
found significant misaligned priorities between IT executives and non-IT executives. For example, when
determining what they believe to be their current IT’s priorities are at their own organization, 43% of IT
executives listed reducing IT costs while only 18% of non-IT executives thought the same was a priority
(Ibid.).
http://www.mckinsey.com/business-functions/digital-mckinsey/our-
The good news is that at those firms where the CIO is more involved and active in business strategy the
same survey among non-IT and IT executives showed completely effective or very effective IT
organizations in a number processes. For example, delivering new projects or enhancements on time and
within budget showed that 72% of non-IT executives believed the process was completely or very
effective. For managing IT infrastructure, 93% of IT executives believed the process was completely or
very effective (Ibid.).
So, although there is widespread unhappiness around most of the IT performance within those surveyed as
well as ...
Illustration of an exam template Please do not make up you.docxsheronlewthwaite
Illustration of an exam template
Please do not make up your own template. Please do not copy what I placed in italics. Discussion 1 (so
forth)
Reference: In APA
Citation: In APA
Major theme of the essay
This is an abstract.
Arguments used to support this theme
This is a summary of the selected reading.
Ideas that support the problem under review
This identifies ideas from the summary that specifically address the problem. It will be redundant from the
summary, just focused/concise.
Discussion of the problem
This is your analysis placing this article within the context of the problem under review.
Now do the same for the next three. Use articles from the library, or through an Internet search. A few are
computerworld.com; cio.com; informationweek.com; & imm.arma.org. There are others.
How long? Depends on the original. Strive to perfect your understanding of the authors’ intent and
argument. This exam provides an opportunity for you to place your understanding within the context of
the discussion problem.
Illustration of an exam
Discussion 1
Reference: Arandjelovic, P. (2015, February). Why CIOs should be business-strategy partners. McKinsey &
Company. Retrieved from http://www.mckinsey.com/business-functions/digital-mckinsey/our-
insights/why-cios-should-be-business-strategy-partners
Citation: (Arandjelovic, 2015)
Major theme of the essay Executives report that IT performance and business tasks improve if CIOs
play an active role in business strategy (Arandjelovic, 2015). In addition, when CIOs don’t play that active
role, view of IT within the business can suffer greatly.
Arguments used to support this theme Study of over 350 firms by McKinsey & Company. A survey found
that executives are not satisfied with almost all parts of IT, from IT infrastructure to IT governance, let
alone introducing innovative technologies to drive new business opportunities. Moreover, the survey
found significant misaligned priorities between IT executives and non-IT executives. For example, when
determining what they believe to be their current IT’s priorities are at their own organization, 43% of IT
executives listed reducing IT costs while only 18% of non-IT executives thought the same was a priority
(Ibid.).
http://www.mckinsey.com/business-functions/digital-mckinsey/our-
The good news is that at those firms where the CIO is more involved and active in business strategy the
same survey among non-IT and IT executives showed completely effective or very effective IT
organizations in a number processes. For example, delivering new projects or enhancements on time and
within budget showed that 72% of non-IT executives believed the process was completely or very
effective. For managing IT infrastructure, 93% of IT executives believed the process was completely or
very effective (Ibid.).
So, although there is widespread unhappiness around most of the IT performance within those surveyed as
well as ...
Propose a Human Resource Management strategy and specific organiza.docxbriancrawford30935
Propose a Human Resource Management strategy and specific organizational behaviors that are best suited for global business organizations.
The due diligence analyses on the three countries chosen – Canada, South Africa and China - will wrap up in this assignment with the exploration of management decision making processes. For each of the countries, you will discuss:
· the benefits bringing the diversity of the workforce will have for your company.
· compare and contrast the various aspects of U.S. human resource management against those of each country, Cananda, South Africa and China.
· examine what motivates the local workforce and the style of leadership which is prevalent in each of the countries - contrast those against what our U.S. company would utilize.
A minimum of two pages per country is required and you will follow APA (6th edition) formatting (no abstract is required for this milestone) with title and reference pages, indented paragraphs and a minimum of four APA formatted references and associated in-text citations.
GO to TED.com; search for and watch the TED talk by Roselinde Torres, What it takes to be a great leader.
Discussion 2
Data Management
After studying this week’s assigned readings, discussion the following:
1. What are the business costs or risks of poof data quality? Support your discussion with at least 3 references.
2. What is data mining? Support your discussion with at least 3 references.
3. What is text mining? Support your discussion with at least 3 references.
Please use APA throughout.
Post your initial response no later than Friday of week 3. Please note that initial post not completed on the due date will receive zero grade. See class syllabus for late assignment policies. Review posting/discussion requirements.
Read and respond to at two (2) of your classmates no later than the last day of week 3. In your response to your classmates, consider comparing your articles to those of your classmates. Below are additional suggestions on how to respond to your classmates’ discussions:
· Ask a probing question, substantiated with additional background information, evidence or research.
· Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives.
· Offer and support an alternative perspective using readings from the classroom or from your own research.
· Validate an idea with your own experience and additional research.
· Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings.
· Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence.
1) Respond to the below discussion with 150 words
Last 45 mins ago
1. What are the business costs or risks of poor data quality?
The individuals benefits of the business might make decided at the individuals majority of the data gathered besides poor info.
ENGIN 36 Final Exam Take Home Exam May 15, 2020 .docxkhanpaulita
ENGIN 36 Final Exam
Take Home Exam
May 15, 2020
Laney College
Name ________________________________________________________
Read all of the instructions below before starting the exam
1. Turn in the exam on Canvas by 5:00 PM on Wednesday, May 20.
2. Be sure to read the instructions for each problem carefully. Read the question
statement fully and be sure to answer all components of the question.
3. You may use your homework, class notes, the textbook, references posted to Canvas,
and other study references as you work through the exam. You may not consult with
classmates.
4. Show all of your work! It’s much easier for me to give you partial credit if you clearly
document all of your steps when solving a problem.
5. Remember to write your units in your answer!
6. Box your answers!
7. If you run into algebra or math problems, write how you would have continued to solve
the problem to receive partial credit.
Sign the honor statement below after finishing the exam (a digital “signature” is acceptable)
I have neither given nor received help on this work, nor am I aware of any infraction of the
Honor Code.
Problem 1
A sign is supported on a hollow steel post that is fully fixed at its base, as shown in the diagram.
The internal forces and geometric properties shown were computed in the last exam.
A B
14
6 ft
A B
y
x
A
B
y
x
X X
Section X-X
4"
6"
3
8
3
8
3 8" 3 8"
W = 6,000 lbs
I ® 32.8in4
A ® 6.94in2
Geometric Properties:
The hollow steel post is replaced by the wood post with two steel plates fastened to the faces shown on the
next page. Showing all work, find:
(a) The normal stress in the steel at the point labeled Asteel caused by bending only
(b) The normal stress in the wood at the point labeled Awood caused by bending only
(c) If the normal stress due to axial load is disregarded, is the composite member adequate? Why?
(d) What equations would you use to find the normal stress in the wood and the steel? (HINT: remember
compatibility relationships)
A B
N = 6 kips
M = 432 kip×in
page 1 of 6
Asteel
Awood
Material Properties:
Esteel=29,000 ksi Ewood=1,200 ksi
3
8
3
8
6"
4"
sall,steel=60 ksi sall,wood=1.15ksi
Problem 1 cont'd
page 2 of 6
Problem 2
The sign post from Problem 1 is now braced by cable KM which is tensioned with a force of 3,000 lbs.
A B
8'
-0
"
6 ft
A B
y
x
A
B
y
x
Section X-X
4"
6"
3
8
3
8
3 8" 3 8"
W = 6,000 lbs
I ® 32.8in4
A ® 6.94in2
Geometric Properties:
60.0°
J
K L
M
XX
2'
-0
"
C
K
J
(a) Draw the FBD of forces at point K:
A B
page 3 of 6
Normal Force, NShear Force, V Moment, M
Problem 2 cont'd
(b) Draw the internal force diagrams for shear, moment, and normal force:
page 4 of 6
t
Shear Stress
sb
Normal Stress,
Bending
sa
Normal Stress,
Axial
A BC A BC A BC
(c) Draw the stress profiles for shear stress and normal stress due to bending and axial force. You only need
to draw the shape; m.
Illustration of an exam template Please do not make up youhe45mcurnow
Illustration of an exam template
Please do not make up your own template. Please do not copy what I placed in italics. Discussion 1 (so
forth)
Reference: In APA
Citation: In APA
Major theme of the essay
This is an abstract.
Arguments used to support this theme
This is a summary of the selected reading.
Ideas that support the problem under review
This identifies ideas from the summary that specifically address the problem. It will be redundant from the
summary, just focused/concise.
Discussion of the problem
This is your analysis placing this article within the context of the problem under review.
Now do the same for the next three. Use articles from the library, or through an Internet search. A few are
computerworld.com; cio.com; informationweek.com; & imm.arma.org. There are others.
How long? Depends on the original. Strive to perfect your understanding of the authors’ intent and
argument. This exam provides an opportunity for you to place your understanding within the context of
the discussion problem.
Illustration of an exam
Discussion 1
Reference: Arandjelovic, P. (2015, February). Why CIOs should be business-strategy partners. McKinsey &
Company. Retrieved from http://www.mckinsey.com/business-functions/digital-mckinsey/our-
insights/why-cios-should-be-business-strategy-partners
Citation: (Arandjelovic, 2015)
Major theme of the essay Executives report that IT performance and business tasks improve if CIOs
play an active role in business strategy (Arandjelovic, 2015). In addition, when CIOs don’t play that active
role, view of IT within the business can suffer greatly.
Arguments used to support this theme Study of over 350 firms by McKinsey & Company. A survey found
that executives are not satisfied with almost all parts of IT, from IT infrastructure to IT governance, let
alone introducing innovative technologies to drive new business opportunities. Moreover, the survey
found significant misaligned priorities between IT executives and non-IT executives. For example, when
determining what they believe to be their current IT’s priorities are at their own organization, 43% of IT
executives listed reducing IT costs while only 18% of non-IT executives thought the same was a priority
(Ibid.).
http://www.mckinsey.com/business-functions/digital-mckinsey/our-
The good news is that at those firms where the CIO is more involved and active in business strategy the
same survey among non-IT and IT executives showed completely effective or very effective IT
organizations in a number processes. For example, delivering new projects or enhancements on time and
within budget showed that 72% of non-IT executives believed the process was completely or very
effective. For managing IT infrastructure, 93% of IT executives believed the process was completely or
very effective (Ibid.).
So, although there is widespread unhappiness around most of the IT performance within those surveyed as
well as ...
Illustration of an exam template Please do not make up you.docxsheronlewthwaite
Illustration of an exam template
Please do not make up your own template. Please do not copy what I placed in italics. Discussion 1 (so
forth)
Reference: In APA
Citation: In APA
Major theme of the essay
This is an abstract.
Arguments used to support this theme
This is a summary of the selected reading.
Ideas that support the problem under review
This identifies ideas from the summary that specifically address the problem. It will be redundant from the
summary, just focused/concise.
Discussion of the problem
This is your analysis placing this article within the context of the problem under review.
Now do the same for the next three. Use articles from the library, or through an Internet search. A few are
computerworld.com; cio.com; informationweek.com; & imm.arma.org. There are others.
How long? Depends on the original. Strive to perfect your understanding of the authors’ intent and
argument. This exam provides an opportunity for you to place your understanding within the context of
the discussion problem.
Illustration of an exam
Discussion 1
Reference: Arandjelovic, P. (2015, February). Why CIOs should be business-strategy partners. McKinsey &
Company. Retrieved from http://www.mckinsey.com/business-functions/digital-mckinsey/our-
insights/why-cios-should-be-business-strategy-partners
Citation: (Arandjelovic, 2015)
Major theme of the essay Executives report that IT performance and business tasks improve if CIOs
play an active role in business strategy (Arandjelovic, 2015). In addition, when CIOs don’t play that active
role, view of IT within the business can suffer greatly.
Arguments used to support this theme Study of over 350 firms by McKinsey & Company. A survey found
that executives are not satisfied with almost all parts of IT, from IT infrastructure to IT governance, let
alone introducing innovative technologies to drive new business opportunities. Moreover, the survey
found significant misaligned priorities between IT executives and non-IT executives. For example, when
determining what they believe to be their current IT’s priorities are at their own organization, 43% of IT
executives listed reducing IT costs while only 18% of non-IT executives thought the same was a priority
(Ibid.).
http://www.mckinsey.com/business-functions/digital-mckinsey/our-
The good news is that at those firms where the CIO is more involved and active in business strategy the
same survey among non-IT and IT executives showed completely effective or very effective IT
organizations in a number processes. For example, delivering new projects or enhancements on time and
within budget showed that 72% of non-IT executives believed the process was completely or very
effective. For managing IT infrastructure, 93% of IT executives believed the process was completely or
very effective (Ibid.).
So, although there is widespread unhappiness around most of the IT performance within those surveyed as
well as ...
Propose a Human Resource Management strategy and specific organiza.docxbriancrawford30935
Propose a Human Resource Management strategy and specific organizational behaviors that are best suited for global business organizations.
The due diligence analyses on the three countries chosen – Canada, South Africa and China - will wrap up in this assignment with the exploration of management decision making processes. For each of the countries, you will discuss:
· the benefits bringing the diversity of the workforce will have for your company.
· compare and contrast the various aspects of U.S. human resource management against those of each country, Cananda, South Africa and China.
· examine what motivates the local workforce and the style of leadership which is prevalent in each of the countries - contrast those against what our U.S. company would utilize.
A minimum of two pages per country is required and you will follow APA (6th edition) formatting (no abstract is required for this milestone) with title and reference pages, indented paragraphs and a minimum of four APA formatted references and associated in-text citations.
GO to TED.com; search for and watch the TED talk by Roselinde Torres, What it takes to be a great leader.
Discussion 2
Data Management
After studying this week’s assigned readings, discussion the following:
1. What are the business costs or risks of poof data quality? Support your discussion with at least 3 references.
2. What is data mining? Support your discussion with at least 3 references.
3. What is text mining? Support your discussion with at least 3 references.
Please use APA throughout.
Post your initial response no later than Friday of week 3. Please note that initial post not completed on the due date will receive zero grade. See class syllabus for late assignment policies. Review posting/discussion requirements.
Read and respond to at two (2) of your classmates no later than the last day of week 3. In your response to your classmates, consider comparing your articles to those of your classmates. Below are additional suggestions on how to respond to your classmates’ discussions:
· Ask a probing question, substantiated with additional background information, evidence or research.
· Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives.
· Offer and support an alternative perspective using readings from the classroom or from your own research.
· Validate an idea with your own experience and additional research.
· Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings.
· Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence.
1) Respond to the below discussion with 150 words
Last 45 mins ago
1. What are the business costs or risks of poor data quality?
The individuals benefits of the business might make decided at the individuals majority of the data gathered besides poor info.
ENGIN 36 Final Exam Take Home Exam May 15, 2020 .docxkhanpaulita
ENGIN 36 Final Exam
Take Home Exam
May 15, 2020
Laney College
Name ________________________________________________________
Read all of the instructions below before starting the exam
1. Turn in the exam on Canvas by 5:00 PM on Wednesday, May 20.
2. Be sure to read the instructions for each problem carefully. Read the question
statement fully and be sure to answer all components of the question.
3. You may use your homework, class notes, the textbook, references posted to Canvas,
and other study references as you work through the exam. You may not consult with
classmates.
4. Show all of your work! It’s much easier for me to give you partial credit if you clearly
document all of your steps when solving a problem.
5. Remember to write your units in your answer!
6. Box your answers!
7. If you run into algebra or math problems, write how you would have continued to solve
the problem to receive partial credit.
Sign the honor statement below after finishing the exam (a digital “signature” is acceptable)
I have neither given nor received help on this work, nor am I aware of any infraction of the
Honor Code.
Problem 1
A sign is supported on a hollow steel post that is fully fixed at its base, as shown in the diagram.
The internal forces and geometric properties shown were computed in the last exam.
A B
14
6 ft
A B
y
x
A
B
y
x
X X
Section X-X
4"
6"
3
8
3
8
3 8" 3 8"
W = 6,000 lbs
I ® 32.8in4
A ® 6.94in2
Geometric Properties:
The hollow steel post is replaced by the wood post with two steel plates fastened to the faces shown on the
next page. Showing all work, find:
(a) The normal stress in the steel at the point labeled Asteel caused by bending only
(b) The normal stress in the wood at the point labeled Awood caused by bending only
(c) If the normal stress due to axial load is disregarded, is the composite member adequate? Why?
(d) What equations would you use to find the normal stress in the wood and the steel? (HINT: remember
compatibility relationships)
A B
N = 6 kips
M = 432 kip×in
page 1 of 6
Asteel
Awood
Material Properties:
Esteel=29,000 ksi Ewood=1,200 ksi
3
8
3
8
6"
4"
sall,steel=60 ksi sall,wood=1.15ksi
Problem 1 cont'd
page 2 of 6
Problem 2
The sign post from Problem 1 is now braced by cable KM which is tensioned with a force of 3,000 lbs.
A B
8'
-0
"
6 ft
A B
y
x
A
B
y
x
Section X-X
4"
6"
3
8
3
8
3 8" 3 8"
W = 6,000 lbs
I ® 32.8in4
A ® 6.94in2
Geometric Properties:
60.0°
J
K L
M
XX
2'
-0
"
C
K
J
(a) Draw the FBD of forces at point K:
A B
page 3 of 6
Normal Force, NShear Force, V Moment, M
Problem 2 cont'd
(b) Draw the internal force diagrams for shear, moment, and normal force:
page 4 of 6
t
Shear Stress
sb
Normal Stress,
Bending
sa
Normal Stress,
Axial
A BC A BC A BC
(c) Draw the stress profiles for shear stress and normal stress due to bending and axial force. You only need
to draw the shape; m.
Evaluating Estimates and MaterialityInstructionsReview the fo.docxSANSKAR20
Evaluating Estimates and Materiality
Instructions:
Review the form 10-K or annual reports for Ford Motor Company and Toyota Motor Corporation, then answer the following questions by referring to the item number in the forms:
1a. Some common numerical thresholds and benchmarks for overall materiality judgments are 5% of net income and 1% of assets. The materiality level at which items are considered clearly trivial—materiality level where the auditor believes errors below that level would not, even when aggregated with all other misstatements, be material to financial statements—is generally 5% to 10% of overall materiality. Calculate these numerical thresholds for Ford and Toyota, assuming 5% for misstatements considered clearly trivial.
1b. Assume that you discover a $10,000,000 error in inventory. What difficulties would you encounter in deciding whether or not that amount is material?
1c. The numerical thresholds differ across the two companies. Why does that present a problem for the auditor? For third-party users?
1d. What is the SEC’s position on the use of numerical thresholds?
1e. What other characteristics of potential misstatements should auditors consider when evaluating their materiality?
2a. What does the term netting mean in the context of misstatement judgments?
2b. What is the SEC’s guidance concerning netting?
2c. Why is it helpful to financial statement users to have companies avoid netting?
3. One of Ford’s most significant liabilities concerns pensions and postretirement benefits. What is the nature of the estimates required to value these liabilities? What risks do these estimates pose for the audit firm?
4. Read Ford’s MD&A disclosure concerning goodwill and impairments. Describe the nature of estimates that management needs to make in order to estimate the impairments. What audit evidence would you want to gather to be assured that management’s estimates are reasonable?
5a. See the notes in Toyota’s and Ford’s financial statements dealing with warranties. What are the amounts for accrued warranty liabilities and annual warranty expense for each company?
5b. What is the nature of estimates required for warranty liabilities?
5c. What planning analytical procedures can you develop to help you understand the relative size of warranty accounts for both companies. What inferences do you draw from the comparison of these analytics?
Your paper should meet the following requirements:
· 4-5 pages in length
· Formatted according to CSU-Global Guide to Writing and APA Requirements
Include at least two or three outside sources. The CSU-Global Library is a great place to start.
Friends, not foes?: Work design and formalization in the modern work context
Author(s): TINA L. JUILLERAT
Source: Journal of Organizational Behavior, Vol. 31, No. 2/3, Putting Job Design in
Context (FEBRUARY 2010), pp. 216-239
Published by: Wiley
Stable URL: http://www.jstor.org/stable/41683903
Accessed: 01-04-2017 21:17 UTC
REFERENCES
Linked refe ...
Individual Assignment 2 Research, Analysis & Outline for Final PaLizbethQuinonez813
Individual Assignment 2: Research, Analysis & Outline for Final Paper
CLO #3 Analyze the need for increasing creative thought in a complex global environment including designing strategies to increase cash, profit and growth through understanding competitive dynamics.
CLO#5 Analyze and apply decision matrices for creative opportunities, or to mitigate risk and/or legal considerations in the global marketplace including compliance with Foreign Corrupt Practices Act (FCPA).
Due:Wednesday Week 6
Value: 150
Length: 5 - 7 page informal outline.
The purpose of this assignment is for students to write an outline that presents their research for the final paper (the Signature Assignment) for this class. Students are not writing the final paper (yet). For this assignment, and thus for the final paper students are to identify a business that corresponds to the assigned business sectors (each student is to identify a separate business). In this outline, students will bring options and opportunities, creative problem solving to either solve a problem or create an opportunity. Remember we do not tell companies what they “must or should do.” We present options and opportunities. Students will apply creative innovative thought to the analysis. You can use bullet points for this outline. Students should apply any feedback received from this assignment to the final assignment.
Some important items to note before writing Assignment 2:
· Please go to Week 8 and read the Handout and Rubric for Assignment 3.
· The research is very detailed, double-spaced, Times New Roman, APA Headings, Title Page, References and APA citations. This is an example of an APA sample paper.
· Long quotes are not to be used in short papers of this nature; thus, all quotes should be from seven to 12 words and of course must use APA citations.
· The outline is to detail key points supported with corresponding citations.
· The outline must use at least three levels of Use APA headings. Sources (must be current - one year) other than the textbook can include: New York Times, Wall Street Journal, Harvard Business Review, Wired Magazine, (all can be found in the our University Library). You can also use any government website (usually “.gov”). You can use academic research but it must be recent (five years or newer).
Directions
After reading assigned chapters in your textbook and other course materials, continue your research to gain additional knowledge on industries and business sectors. This following link, located here, has access to a breakdown of all industries. The links after each industry provides additional data.
For the outline, briefly describe the business that you have chosen and the global footprint of their broader industry [e.g. number of subsidiaries in other countries, information on profit and growth strategies, key suppliers and customers. List three (3) major competitors (supported by data), and explain the percentage of the market share the business occup ...
Individual Assignment 2 Research, Analysis & Outline for Final PaLaticiaGrissomzz
Individual Assignment 2: Research, Analysis & Outline for Final Paper
CLO #3 Analyze the need for increasing creative thought in a complex global environment including designing strategies to increase cash, profit and growth through understanding competitive dynamics.
CLO#5 Analyze and apply decision matrices for creative opportunities, or to mitigate risk and/or legal considerations in the global marketplace including compliance with Foreign Corrupt Practices Act (FCPA).
Due:Wednesday Week 6
Value: 150
Length: 5 - 7 page informal outline.
The purpose of this assignment is for students to write an outline that presents their research for the final paper (the Signature Assignment) for this class. Students are not writing the final paper (yet). For this assignment, and thus for the final paper students are to identify a business that corresponds to the assigned business sectors (each student is to identify a separate business). In this outline, students will bring options and opportunities, creative problem solving to either solve a problem or create an opportunity. Remember we do not tell companies what they “must or should do.” We present options and opportunities. Students will apply creative innovative thought to the analysis. You can use bullet points for this outline. Students should apply any feedback received from this assignment to the final assignment.
Some important items to note before writing Assignment 2:
· Please go to Week 8 and read the Handout and Rubric for Assignment 3.
· The research is very detailed, double-spaced, Times New Roman, APA Headings, Title Page, References and APA citations. This is an example of an APA sample paper.
· Long quotes are not to be used in short papers of this nature; thus, all quotes should be from seven to 12 words and of course must use APA citations.
· The outline is to detail key points supported with corresponding citations.
· The outline must use at least three levels of Use APA headings. Sources (must be current - one year) other than the textbook can include: New York Times, Wall Street Journal, Harvard Business Review, Wired Magazine, (all can be found in the our University Library). You can also use any government website (usually “.gov”). You can use academic research but it must be recent (five years or newer).
Directions
After reading assigned chapters in your textbook and other course materials, continue your research to gain additional knowledge on industries and business sectors. This following link, located here, has access to a breakdown of all industries. The links after each industry provides additional data.
For the outline, briefly describe the business that you have chosen and the global footprint of their broader industry [e.g. number of subsidiaries in other countries, information on profit and growth strategies, key suppliers and customers. List three (3) major competitors (supported by data), and explain the percentage of the market share the business occup ...
God søk er essentielt for et godt intranett. Likevel investeres det hverken i nødvendig teknologi eller kompetanseutvikling på søk. Resultatet er skremmende: dobbeltarbeid, dårlige beslutninger, forsinkelser og overskridelser, kaste bort ansattes tid på leting etter informasjon, treg respons på marked, konkurrenter osv. Med forholdsvis enkle grep kan du gjøre noe med dette i dag.
- Hjelp - intranettet flyter over av innhold
- Sammenhengen mellom søk, informasjon, arkitektur og hyperkoblinger
- Viktigheten av kontekst
- Hva har tillit å gjøre med søk
- Hva med mobilen og søk
- Eksempler på dårlig och god søk
4020 Crews 1
4020 Crews 4
The Least Privilege Principle in Contemporary HR
Nancy Pier
Human Resource Management
The Least Privilege Principle in Contemporary HR
There is a recent trend in contemporary business where enterprises seem to have achieved a collaboration with information technology aimed at improving business efficiency and consequently result in sustainable success. This development has however come with the liability of protecting key identifiable information of each party in a business organization (Dhillon et al., 2017). As it is, governments have put it as a legal obligation for organizations to protect the information of their people as they work towards protecting sensitive information related to business. In the United States alone in 2018, there were 65 successful litigations by employees towards the employer for exposing their information to malicious parties leading to closure of 80% of these businesses due to hefty legal fees (Cockcroft, 2020). Previous studies have attributed secure employee and business information to 45% success in business based on more motivated employees, confidentiality of business information of the firms and favorable reputation by clients (Porter et al., 2019).
The current situation points to the necessity in the application of the least privilege principle based on the numerous success stories upon its application. There is evidence that the implementation of this principle in the homeland department of security led to 78% reduction of loss of crucial information for the department, 71 % reduction of witness and whistle blower information leakage and efficient classification of information an aspect that aids investigative efficiency in the departments (Hammad et al., 2019). Experts aver that cloud computing, is not enough to protect important information and point to role based access, the foundation of the least privilege principle, as the next reliable pillar for workplace and business safety. This subject is particularly vital in human resource management practice as the department is the custodian of employee information and is tasked with capacitating employees.
Interestingly, under the period of the boom in internet technologies and their application in business processes, there has been cases of insider trading where businesses have lost huge investment money and their operating reputations. A study on the effects of employee data insecurity, in Texas, indicated that last year, 2019, 28% of employees reached by the survey reported at least one case of bullying as unauthorized parties accessed their key identifiable information (Sennewald & Baillie, 2020). The study further indicated that this.
Organization Theory and DesignOrganization Analysis Proposal.docxhopeaustin33688
Organization Theory and Design
Organization Analysis Proposal
Due: Sunday February 7 End of day (via email)
Length: maximum 5 pages excluding appendices
IMPORTANT!!!
Saving your document: Please use YOUR CLASS SECTION (e.g. 1pm, 2:30pm), GROUP ORGANIZATION NAME, AND GROUP NUMBER as your file name. For example 1pm_companyname_group#.doc
(Att: 1pm section, you will be assigned a group number on Tuesday January)
Also include your organization name, group number, and section in the subject of your email.
Please note: I need to know and approve your organization of study by Friday February 5.
Information your report should include:
1)The name of the organization the group proposes to study and a list of group members.
2)Description of the organization
A brief description of the organization (i.e. product or service that it provides, location, size, external environment (describe the environmental sectors that have a direct impact on the companies operations, and any other relevant information you think would be appropriate).
3) Assignment of roles and responsibilities
Assignment of roles and responsibilitiesfor each group member, identify task that need to be completed, and deadlines associated with each task. This will clarify who is doing what and timelines for various tasks.
My suggestion is to assign topics according to the chapters of the text. For instance, you could assign each group member one or more chapter(s). The most important or relevant chapters are: structural and contextual variables (chapter #1), strategy and goals (chapter #2), organization structure (chapter #3) , external environment (chapter #4), lifecycle and size (chapter #9) and organizational culture (chapter #11). Other chapters that are important and could be included are: interorganizational relationships (chapter #5), international challenges (chapter #6), mfg technology (chapter #7), (chapter #10), innovation and change (chapter #11), and conflict, power, and politics (chapter #13)
4) Problem Definition:
This section will require you to identify a possible problem, issue, challenge that your organization is facing. If your organization is a publicly traded company, you’ll be able to look online for various problems/challenges facing the company. Otherwise, you may need to contact someone at the organization directly to identify a possible problem/issue facing your organization. Please note that you’ll be able to change your problem/issue at a later date. Provide a reference(s) and citations to explain where you obtained this information.
An except from a previous proposal
There are several issues with UNB’s structure but the main concern is that there is too much centralization and concentration of power at the administration level (org. design issue – relates back to what we’ve discussed in class). Some of the organizational design issues have led to conflicting goals and hinder the capability to meet the overarching strategic go.
my professor ask me this question what should be answer(your resea.docxJinElias52
my professor ask me this question what should be answer(
your research does a very good job of explaining the topic and the changes in FASB. How did you plan to incorporate your reading from the Daniels, Radebaugh, and Sullivan text?
Daniels, J., Radebaugh, L., and Sullivan, D. (2015). International Business: Environments and Operations 15e. Upper Saddle River, NJ: Pearson Education, Inc. ISBN: 13:978-0-13-345723-0.
i want only answer this question
.
My assignment is to create a 12-page argumentativepersuasive rese.docxJinElias52
My assignment is to create a 12-page argumentative/persuasive research paper given one of the following option:
Argue for or against a business decision, organizational plan, business philosophy, policy decision, or concept related to the class. On Corporate Social Responsibility
.
Myths in Neolithic Cultures Around the Globe Please respond to th.docxJinElias52
Myths in Neolithic Cultures Around the Globe"
Please respond to the following,
using sources under the Explore heading as the basis of your response
:
Describe the functions of ancient myths, using examples from two (2) different neolithic cultures, and comment on whether myth is inherently fictional. Using modern examples, discuss ways modern belief systems, secular or religious, function for modern cultures in a similar fashion.
Explore
Neolithic societies and myths
Chapter 1 (pp. 6-8. 18-23, 29), myths in prehistory and early cultures
Ancient myths in regions around the globe at
http://www.windows2universe.org/mythology/worldmap_new.html
and
http://www.pantheon.org/areas/mythology/
.
.
Myths in Neolithic Cultures Around the GlobePlease respond to .docxJinElias52
"Myths in Neolithic Cultures Around the Globe"
Please respond to the following,
using sources under the Explore heading as the basis of your response
:
Describe the functions of ancient myths, using examples from two (2) different neolithic cultures, and comment on whether myth is inherently fictional. Using modern examples, discuss ways modern belief systems, secular or religious, function for modern cultures in a similar fashion.
Explore
Neolithic societies and myths
Ancient myths in regions around the globe at
http://www.windows2universe.org/mythology/worldmap_new.html
and
http://www.pantheon.org/areas/mythology/
.
.
Mycobacterium tuberculosisYou must review the contents of your n.docxJinElias52
Mycobacterium tuberculosis
You must review the contents of your news article and discuss what type of microorganism it is, if the organism is in nature or is used in industry or causes disease. If it causes disease you must discuss transmission, increasing incidence, factors contributing to the spread of the organism, lab culturing, etc.
300-400 words
.
My TopicI would like to do my case application on Helen Keller’s.docxJinElias52
My Topic:
"I would like to do my case application on Helen Keller’s fight with learning disability. I chose Helen Keller because she is one of the most important personality and the first person without hearing or sight to earn a BA. Her story is narrated in the movie “The Miracle Worker.”
For additional details, please refer to the Milestone Two Rubric document and the Final Project Document in the Assignment Guidelines and Rubrics section of the course.
.
My topic is the terms a Congress person serves and debate on adding .docxJinElias52
My topic is the terms a Congress person serves and debate on adding limitations to how long a person can be in Congress.
The Pros and Cons of the unlimited terms in congress
Do members of congress to support position people of the state they represent therefore should be able to change and if it will benefit.
How to Add limitations on the term served by congress
Follow the directions below for the completion of the Annotated Bibliography assignment for Unit II.
Purpose: The purpose of the annotated bibliography is to summarize the sources that you have gathered to support your research proposal project. These summaries help you to think about the complex arguments presented in your sources. Description: In this assignment, you will create an annotated bibliography consisting of seven sources. Each entry will consist of a reference list citation, a summary of the source’s information, and a one-sentence assessment. Each annotation should be between 150 to 200 words. If an entry is shorter than 150 words, it is likely you have not fully developed your summary, and this lack of development can severely impact your grade for this assignment.
.
My topic is anywhere, anytime information work, which means tele-wor.docxJinElias52
My topic is anywhere, anytime information work, which means tele-work, and we choose ( AT&T toggle)
I've done all the questions but i need more detail , deep answers .
1- write an introduction about ( anywhere, anytime information work) in details and conclusion about the company and application
2-write a brief explanation about the company it self ( AT&T)
3- plagiarism not accepted
4- use simple words
5- make it 12 or 11 pages
.
My topic for module-2 reaction paper was on news, data, and other me.docxJinElias52
My topic for module-2 reaction paper was on news, data, and other media means of delivering information to the public. When gathering all the information and reflecting on my personal experience when watching, reading or listening to the news outlets was very addicting. To see news clips from the wars past or deployments after the fact was real-time history for most of us (me), yet our families, friends and other members not physically at that location waiting to hear something can be very overwhelming. My question is the methods and absorbing of news
: Are citizens informed about terrorism and is it overwhelming?
.
My Topic for the paper I would like to do my case application on He.docxJinElias52
My Topic for the paper: I would like to do my case application on Helen Keller’s fight with learning disability. I chose Helen Keller because she is one of the most important personality and the first person without hearing or sight to earn a BA. Her story is narrated in the movie “The Miracle Worker.”
.
n a 2 page paper, written in APA format using proper spellinggramma.docxJinElias52
n a 2 page paper, written in APA format using proper spelling/grammar, address the following:
Briefly explain Piaget's and Erikson's theories of development. Who had a better theory of human development: Erikson or Piaget? Please offer detail to explain your choice.
What tips would you give to someone who has just suffered a major loss, now that you know the stages of grief?
.
My research proposal is on fall prevention WRTG 394 s.docxJinElias52
My research proposal is on fall prevention
WRTG 394 students,
Your next writing assignment will be a
memo to your instructor for the final report.
Steps to Take in Completing this Assignment:
•
Identify the decision-maker or group of decision-makers to whom you will write your final report
• Describe the specific problem you are attempting to address.
• Prepare some primary research for your report.
• Write a memo to your instructor using the template provided below.
The Role of this Assignment for your Research Report:
This assignment is designed to help you put together the final paper in WRTG 394.
Remember, your final paper in WRTG 394 will be a report in which you do the following:
•
define a problem in your workplace or community persuasively and accurately
•
propose a solution or solutions to the problem or issue
Previous assignments in the class pointed out some sample topics for the report:
• a report to your manager at work suggesting that more teleworking options be given to employees at your workplace
• a report to your supervisor at work suggesting that email be used less frequently for communication and that another application be used to improve communication.
• a report to your manager at work suggesting that your office become paperless
• a report to the board of directors at your townhouse community to argue that the playground area in your community should be renovated
• a report to the manager of your unit at work noting that recycling facilities in the workplace should be improved
For writing assignment #2, you completed a background and synthesis of the literature on your topic.
For this writing assignment, you are going to identify the specific needs in your workplace or community that will be identified for your final report.
Examples of Primary Research for Specific Topics:
•
If you write a report to your manager at work suggesting that more teleworking options be given to employees at your workplace, you cannot simply prepare a report on teleworking. You must show that teleworking will
solve a specific problem or problems in your organization
.
•
If you write a a report to your supervisor at work suggesting that email be used less frequently for communication and that another application be used to improve communication, you cannot simply prepare a report on the benefits of social media in the workplace. You must
show that your specific office has problems in communicating by email and indicate the benefits of using alternative communication systems for your workplace environment
.
•
If you write a report to your manager at work suggesting that your office become paperless, you cannot simply prepare a report on the benefits of a paperless office. You must
show that your specific office can go paperless and indicate the benefits of your specific office going paperless
.
•
If you write a report to the board of directo.
More Related Content
Similar to Choose a Research TopicHiba Al MehdiSchool of Business, Northc
Evaluating Estimates and MaterialityInstructionsReview the fo.docxSANSKAR20
Evaluating Estimates and Materiality
Instructions:
Review the form 10-K or annual reports for Ford Motor Company and Toyota Motor Corporation, then answer the following questions by referring to the item number in the forms:
1a. Some common numerical thresholds and benchmarks for overall materiality judgments are 5% of net income and 1% of assets. The materiality level at which items are considered clearly trivial—materiality level where the auditor believes errors below that level would not, even when aggregated with all other misstatements, be material to financial statements—is generally 5% to 10% of overall materiality. Calculate these numerical thresholds for Ford and Toyota, assuming 5% for misstatements considered clearly trivial.
1b. Assume that you discover a $10,000,000 error in inventory. What difficulties would you encounter in deciding whether or not that amount is material?
1c. The numerical thresholds differ across the two companies. Why does that present a problem for the auditor? For third-party users?
1d. What is the SEC’s position on the use of numerical thresholds?
1e. What other characteristics of potential misstatements should auditors consider when evaluating their materiality?
2a. What does the term netting mean in the context of misstatement judgments?
2b. What is the SEC’s guidance concerning netting?
2c. Why is it helpful to financial statement users to have companies avoid netting?
3. One of Ford’s most significant liabilities concerns pensions and postretirement benefits. What is the nature of the estimates required to value these liabilities? What risks do these estimates pose for the audit firm?
4. Read Ford’s MD&A disclosure concerning goodwill and impairments. Describe the nature of estimates that management needs to make in order to estimate the impairments. What audit evidence would you want to gather to be assured that management’s estimates are reasonable?
5a. See the notes in Toyota’s and Ford’s financial statements dealing with warranties. What are the amounts for accrued warranty liabilities and annual warranty expense for each company?
5b. What is the nature of estimates required for warranty liabilities?
5c. What planning analytical procedures can you develop to help you understand the relative size of warranty accounts for both companies. What inferences do you draw from the comparison of these analytics?
Your paper should meet the following requirements:
· 4-5 pages in length
· Formatted according to CSU-Global Guide to Writing and APA Requirements
Include at least two or three outside sources. The CSU-Global Library is a great place to start.
Friends, not foes?: Work design and formalization in the modern work context
Author(s): TINA L. JUILLERAT
Source: Journal of Organizational Behavior, Vol. 31, No. 2/3, Putting Job Design in
Context (FEBRUARY 2010), pp. 216-239
Published by: Wiley
Stable URL: http://www.jstor.org/stable/41683903
Accessed: 01-04-2017 21:17 UTC
REFERENCES
Linked refe ...
Individual Assignment 2 Research, Analysis & Outline for Final PaLizbethQuinonez813
Individual Assignment 2: Research, Analysis & Outline for Final Paper
CLO #3 Analyze the need for increasing creative thought in a complex global environment including designing strategies to increase cash, profit and growth through understanding competitive dynamics.
CLO#5 Analyze and apply decision matrices for creative opportunities, or to mitigate risk and/or legal considerations in the global marketplace including compliance with Foreign Corrupt Practices Act (FCPA).
Due:Wednesday Week 6
Value: 150
Length: 5 - 7 page informal outline.
The purpose of this assignment is for students to write an outline that presents their research for the final paper (the Signature Assignment) for this class. Students are not writing the final paper (yet). For this assignment, and thus for the final paper students are to identify a business that corresponds to the assigned business sectors (each student is to identify a separate business). In this outline, students will bring options and opportunities, creative problem solving to either solve a problem or create an opportunity. Remember we do not tell companies what they “must or should do.” We present options and opportunities. Students will apply creative innovative thought to the analysis. You can use bullet points for this outline. Students should apply any feedback received from this assignment to the final assignment.
Some important items to note before writing Assignment 2:
· Please go to Week 8 and read the Handout and Rubric for Assignment 3.
· The research is very detailed, double-spaced, Times New Roman, APA Headings, Title Page, References and APA citations. This is an example of an APA sample paper.
· Long quotes are not to be used in short papers of this nature; thus, all quotes should be from seven to 12 words and of course must use APA citations.
· The outline is to detail key points supported with corresponding citations.
· The outline must use at least three levels of Use APA headings. Sources (must be current - one year) other than the textbook can include: New York Times, Wall Street Journal, Harvard Business Review, Wired Magazine, (all can be found in the our University Library). You can also use any government website (usually “.gov”). You can use academic research but it must be recent (five years or newer).
Directions
After reading assigned chapters in your textbook and other course materials, continue your research to gain additional knowledge on industries and business sectors. This following link, located here, has access to a breakdown of all industries. The links after each industry provides additional data.
For the outline, briefly describe the business that you have chosen and the global footprint of their broader industry [e.g. number of subsidiaries in other countries, information on profit and growth strategies, key suppliers and customers. List three (3) major competitors (supported by data), and explain the percentage of the market share the business occup ...
Individual Assignment 2 Research, Analysis & Outline for Final PaLaticiaGrissomzz
Individual Assignment 2: Research, Analysis & Outline for Final Paper
CLO #3 Analyze the need for increasing creative thought in a complex global environment including designing strategies to increase cash, profit and growth through understanding competitive dynamics.
CLO#5 Analyze and apply decision matrices for creative opportunities, or to mitigate risk and/or legal considerations in the global marketplace including compliance with Foreign Corrupt Practices Act (FCPA).
Due:Wednesday Week 6
Value: 150
Length: 5 - 7 page informal outline.
The purpose of this assignment is for students to write an outline that presents their research for the final paper (the Signature Assignment) for this class. Students are not writing the final paper (yet). For this assignment, and thus for the final paper students are to identify a business that corresponds to the assigned business sectors (each student is to identify a separate business). In this outline, students will bring options and opportunities, creative problem solving to either solve a problem or create an opportunity. Remember we do not tell companies what they “must or should do.” We present options and opportunities. Students will apply creative innovative thought to the analysis. You can use bullet points for this outline. Students should apply any feedback received from this assignment to the final assignment.
Some important items to note before writing Assignment 2:
· Please go to Week 8 and read the Handout and Rubric for Assignment 3.
· The research is very detailed, double-spaced, Times New Roman, APA Headings, Title Page, References and APA citations. This is an example of an APA sample paper.
· Long quotes are not to be used in short papers of this nature; thus, all quotes should be from seven to 12 words and of course must use APA citations.
· The outline is to detail key points supported with corresponding citations.
· The outline must use at least three levels of Use APA headings. Sources (must be current - one year) other than the textbook can include: New York Times, Wall Street Journal, Harvard Business Review, Wired Magazine, (all can be found in the our University Library). You can also use any government website (usually “.gov”). You can use academic research but it must be recent (five years or newer).
Directions
After reading assigned chapters in your textbook and other course materials, continue your research to gain additional knowledge on industries and business sectors. This following link, located here, has access to a breakdown of all industries. The links after each industry provides additional data.
For the outline, briefly describe the business that you have chosen and the global footprint of their broader industry [e.g. number of subsidiaries in other countries, information on profit and growth strategies, key suppliers and customers. List three (3) major competitors (supported by data), and explain the percentage of the market share the business occup ...
God søk er essentielt for et godt intranett. Likevel investeres det hverken i nødvendig teknologi eller kompetanseutvikling på søk. Resultatet er skremmende: dobbeltarbeid, dårlige beslutninger, forsinkelser og overskridelser, kaste bort ansattes tid på leting etter informasjon, treg respons på marked, konkurrenter osv. Med forholdsvis enkle grep kan du gjøre noe med dette i dag.
- Hjelp - intranettet flyter over av innhold
- Sammenhengen mellom søk, informasjon, arkitektur og hyperkoblinger
- Viktigheten av kontekst
- Hva har tillit å gjøre med søk
- Hva med mobilen og søk
- Eksempler på dårlig och god søk
4020 Crews 1
4020 Crews 4
The Least Privilege Principle in Contemporary HR
Nancy Pier
Human Resource Management
The Least Privilege Principle in Contemporary HR
There is a recent trend in contemporary business where enterprises seem to have achieved a collaboration with information technology aimed at improving business efficiency and consequently result in sustainable success. This development has however come with the liability of protecting key identifiable information of each party in a business organization (Dhillon et al., 2017). As it is, governments have put it as a legal obligation for organizations to protect the information of their people as they work towards protecting sensitive information related to business. In the United States alone in 2018, there were 65 successful litigations by employees towards the employer for exposing their information to malicious parties leading to closure of 80% of these businesses due to hefty legal fees (Cockcroft, 2020). Previous studies have attributed secure employee and business information to 45% success in business based on more motivated employees, confidentiality of business information of the firms and favorable reputation by clients (Porter et al., 2019).
The current situation points to the necessity in the application of the least privilege principle based on the numerous success stories upon its application. There is evidence that the implementation of this principle in the homeland department of security led to 78% reduction of loss of crucial information for the department, 71 % reduction of witness and whistle blower information leakage and efficient classification of information an aspect that aids investigative efficiency in the departments (Hammad et al., 2019). Experts aver that cloud computing, is not enough to protect important information and point to role based access, the foundation of the least privilege principle, as the next reliable pillar for workplace and business safety. This subject is particularly vital in human resource management practice as the department is the custodian of employee information and is tasked with capacitating employees.
Interestingly, under the period of the boom in internet technologies and their application in business processes, there has been cases of insider trading where businesses have lost huge investment money and their operating reputations. A study on the effects of employee data insecurity, in Texas, indicated that last year, 2019, 28% of employees reached by the survey reported at least one case of bullying as unauthorized parties accessed their key identifiable information (Sennewald & Baillie, 2020). The study further indicated that this.
Organization Theory and DesignOrganization Analysis Proposal.docxhopeaustin33688
Organization Theory and Design
Organization Analysis Proposal
Due: Sunday February 7 End of day (via email)
Length: maximum 5 pages excluding appendices
IMPORTANT!!!
Saving your document: Please use YOUR CLASS SECTION (e.g. 1pm, 2:30pm), GROUP ORGANIZATION NAME, AND GROUP NUMBER as your file name. For example 1pm_companyname_group#.doc
(Att: 1pm section, you will be assigned a group number on Tuesday January)
Also include your organization name, group number, and section in the subject of your email.
Please note: I need to know and approve your organization of study by Friday February 5.
Information your report should include:
1)The name of the organization the group proposes to study and a list of group members.
2)Description of the organization
A brief description of the organization (i.e. product or service that it provides, location, size, external environment (describe the environmental sectors that have a direct impact on the companies operations, and any other relevant information you think would be appropriate).
3) Assignment of roles and responsibilities
Assignment of roles and responsibilitiesfor each group member, identify task that need to be completed, and deadlines associated with each task. This will clarify who is doing what and timelines for various tasks.
My suggestion is to assign topics according to the chapters of the text. For instance, you could assign each group member one or more chapter(s). The most important or relevant chapters are: structural and contextual variables (chapter #1), strategy and goals (chapter #2), organization structure (chapter #3) , external environment (chapter #4), lifecycle and size (chapter #9) and organizational culture (chapter #11). Other chapters that are important and could be included are: interorganizational relationships (chapter #5), international challenges (chapter #6), mfg technology (chapter #7), (chapter #10), innovation and change (chapter #11), and conflict, power, and politics (chapter #13)
4) Problem Definition:
This section will require you to identify a possible problem, issue, challenge that your organization is facing. If your organization is a publicly traded company, you’ll be able to look online for various problems/challenges facing the company. Otherwise, you may need to contact someone at the organization directly to identify a possible problem/issue facing your organization. Please note that you’ll be able to change your problem/issue at a later date. Provide a reference(s) and citations to explain where you obtained this information.
An except from a previous proposal
There are several issues with UNB’s structure but the main concern is that there is too much centralization and concentration of power at the administration level (org. design issue – relates back to what we’ve discussed in class). Some of the organizational design issues have led to conflicting goals and hinder the capability to meet the overarching strategic go.
Similar to Choose a Research TopicHiba Al MehdiSchool of Business, Northc (10)
my professor ask me this question what should be answer(your resea.docxJinElias52
my professor ask me this question what should be answer(
your research does a very good job of explaining the topic and the changes in FASB. How did you plan to incorporate your reading from the Daniels, Radebaugh, and Sullivan text?
Daniels, J., Radebaugh, L., and Sullivan, D. (2015). International Business: Environments and Operations 15e. Upper Saddle River, NJ: Pearson Education, Inc. ISBN: 13:978-0-13-345723-0.
i want only answer this question
.
My assignment is to create a 12-page argumentativepersuasive rese.docxJinElias52
My assignment is to create a 12-page argumentative/persuasive research paper given one of the following option:
Argue for or against a business decision, organizational plan, business philosophy, policy decision, or concept related to the class. On Corporate Social Responsibility
.
Myths in Neolithic Cultures Around the Globe Please respond to th.docxJinElias52
Myths in Neolithic Cultures Around the Globe"
Please respond to the following,
using sources under the Explore heading as the basis of your response
:
Describe the functions of ancient myths, using examples from two (2) different neolithic cultures, and comment on whether myth is inherently fictional. Using modern examples, discuss ways modern belief systems, secular or religious, function for modern cultures in a similar fashion.
Explore
Neolithic societies and myths
Chapter 1 (pp. 6-8. 18-23, 29), myths in prehistory and early cultures
Ancient myths in regions around the globe at
http://www.windows2universe.org/mythology/worldmap_new.html
and
http://www.pantheon.org/areas/mythology/
.
.
Myths in Neolithic Cultures Around the GlobePlease respond to .docxJinElias52
"Myths in Neolithic Cultures Around the Globe"
Please respond to the following,
using sources under the Explore heading as the basis of your response
:
Describe the functions of ancient myths, using examples from two (2) different neolithic cultures, and comment on whether myth is inherently fictional. Using modern examples, discuss ways modern belief systems, secular or religious, function for modern cultures in a similar fashion.
Explore
Neolithic societies and myths
Ancient myths in regions around the globe at
http://www.windows2universe.org/mythology/worldmap_new.html
and
http://www.pantheon.org/areas/mythology/
.
.
Mycobacterium tuberculosisYou must review the contents of your n.docxJinElias52
Mycobacterium tuberculosis
You must review the contents of your news article and discuss what type of microorganism it is, if the organism is in nature or is used in industry or causes disease. If it causes disease you must discuss transmission, increasing incidence, factors contributing to the spread of the organism, lab culturing, etc.
300-400 words
.
My TopicI would like to do my case application on Helen Keller’s.docxJinElias52
My Topic:
"I would like to do my case application on Helen Keller’s fight with learning disability. I chose Helen Keller because she is one of the most important personality and the first person without hearing or sight to earn a BA. Her story is narrated in the movie “The Miracle Worker.”
For additional details, please refer to the Milestone Two Rubric document and the Final Project Document in the Assignment Guidelines and Rubrics section of the course.
.
My topic is the terms a Congress person serves and debate on adding .docxJinElias52
My topic is the terms a Congress person serves and debate on adding limitations to how long a person can be in Congress.
The Pros and Cons of the unlimited terms in congress
Do members of congress to support position people of the state they represent therefore should be able to change and if it will benefit.
How to Add limitations on the term served by congress
Follow the directions below for the completion of the Annotated Bibliography assignment for Unit II.
Purpose: The purpose of the annotated bibliography is to summarize the sources that you have gathered to support your research proposal project. These summaries help you to think about the complex arguments presented in your sources. Description: In this assignment, you will create an annotated bibliography consisting of seven sources. Each entry will consist of a reference list citation, a summary of the source’s information, and a one-sentence assessment. Each annotation should be between 150 to 200 words. If an entry is shorter than 150 words, it is likely you have not fully developed your summary, and this lack of development can severely impact your grade for this assignment.
.
My topic is anywhere, anytime information work, which means tele-wor.docxJinElias52
My topic is anywhere, anytime information work, which means tele-work, and we choose ( AT&T toggle)
I've done all the questions but i need more detail , deep answers .
1- write an introduction about ( anywhere, anytime information work) in details and conclusion about the company and application
2-write a brief explanation about the company it self ( AT&T)
3- plagiarism not accepted
4- use simple words
5- make it 12 or 11 pages
.
My topic for module-2 reaction paper was on news, data, and other me.docxJinElias52
My topic for module-2 reaction paper was on news, data, and other media means of delivering information to the public. When gathering all the information and reflecting on my personal experience when watching, reading or listening to the news outlets was very addicting. To see news clips from the wars past or deployments after the fact was real-time history for most of us (me), yet our families, friends and other members not physically at that location waiting to hear something can be very overwhelming. My question is the methods and absorbing of news
: Are citizens informed about terrorism and is it overwhelming?
.
My Topic for the paper I would like to do my case application on He.docxJinElias52
My Topic for the paper: I would like to do my case application on Helen Keller’s fight with learning disability. I chose Helen Keller because she is one of the most important personality and the first person without hearing or sight to earn a BA. Her story is narrated in the movie “The Miracle Worker.”
.
n a 2 page paper, written in APA format using proper spellinggramma.docxJinElias52
n a 2 page paper, written in APA format using proper spelling/grammar, address the following:
Briefly explain Piaget's and Erikson's theories of development. Who had a better theory of human development: Erikson or Piaget? Please offer detail to explain your choice.
What tips would you give to someone who has just suffered a major loss, now that you know the stages of grief?
.
My research proposal is on fall prevention WRTG 394 s.docxJinElias52
My research proposal is on fall prevention
WRTG 394 students,
Your next writing assignment will be a
memo to your instructor for the final report.
Steps to Take in Completing this Assignment:
•
Identify the decision-maker or group of decision-makers to whom you will write your final report
• Describe the specific problem you are attempting to address.
• Prepare some primary research for your report.
• Write a memo to your instructor using the template provided below.
The Role of this Assignment for your Research Report:
This assignment is designed to help you put together the final paper in WRTG 394.
Remember, your final paper in WRTG 394 will be a report in which you do the following:
•
define a problem in your workplace or community persuasively and accurately
•
propose a solution or solutions to the problem or issue
Previous assignments in the class pointed out some sample topics for the report:
• a report to your manager at work suggesting that more teleworking options be given to employees at your workplace
• a report to your supervisor at work suggesting that email be used less frequently for communication and that another application be used to improve communication.
• a report to your manager at work suggesting that your office become paperless
• a report to the board of directors at your townhouse community to argue that the playground area in your community should be renovated
• a report to the manager of your unit at work noting that recycling facilities in the workplace should be improved
For writing assignment #2, you completed a background and synthesis of the literature on your topic.
For this writing assignment, you are going to identify the specific needs in your workplace or community that will be identified for your final report.
Examples of Primary Research for Specific Topics:
•
If you write a report to your manager at work suggesting that more teleworking options be given to employees at your workplace, you cannot simply prepare a report on teleworking. You must show that teleworking will
solve a specific problem or problems in your organization
.
•
If you write a a report to your supervisor at work suggesting that email be used less frequently for communication and that another application be used to improve communication, you cannot simply prepare a report on the benefits of social media in the workplace. You must
show that your specific office has problems in communicating by email and indicate the benefits of using alternative communication systems for your workplace environment
.
•
If you write a report to your manager at work suggesting that your office become paperless, you cannot simply prepare a report on the benefits of a paperless office. You must
show that your specific office can go paperless and indicate the benefits of your specific office going paperless
.
•
If you write a report to the board of directo.
My portion of the group assignment Must be done by Wednesday even.docxJinElias52
My portion of the group assignment:
Must be done by Wednesday evening
•
EFE Matrix; -
•
SWOT (TOWS) analysis; -
•
IFE Matrix; -
•
A list of alternative strategies, giving advantages and disadvantages for each; -
Walt Disney Company, p. 441, Case 8 (photos of pages upladed)
.
my project is about construcation houses for poor poeple in Denver .docxJinElias52
my project is about construcation houses for poor poeple in Denver
It is 30 pages
produce a 10 knowledge area project notebook enhancing one team members individual project. Assign different team members individual knowledge areas and refine the notebook to demonstrate synergy.
.
my name is abdullah aljedanii am from saudi arabia i graduate fr.docxJinElias52
my name is abdullah aljedani
i am from saudi arabia
i graduate from DHBAN high school 2013
i went to USA to ST
UDY ENGLISH LANGUAGE AND APLLLAY FOR UNIVERSITY
I WANT TO APLLY IN CIVIL ENIGINEERING
I NEED LETTER FOR THE UNIVERSITY EXPLAIN EHAT I DID AFTER HIGH SCHOOL
500 WORD
24 HOURS
.
My hypothesis Being disconnected from social media (texting, Facebo.docxJinElias52
My hypothesis: Being disconnected from social media (texting, Facebook, cell phone use, etc) causes stress in teenagers.
It is my belief partly based on observation (I teach HS students) that we have created a society where even the slightest communication is cause for a teenager’s engagement with his/her electronic device. Being constantly connected to others, or at least knowing that is an option appears to give them some peace of mind and perhaps helps them feel less alone. This worries me because I fear they will be unable to engage in experiences on their own without that constant connection to others. This behavior doesn’t allow for self-reflection, meditation, or other important moments designed to focus the attention inward. In other words, a fear of being alone. On the other hand, teenagers can reach out to others as never before, which is great in many cases.
I would choose the Experimental Research method for the following experiment, being careful to adhere to its two components: 1) that there is a random assignment of participants. I would stress that this should be a double-blind experiment so I do not influence its outcome; and 2) a manipulation of an independent variable.
My experiment: After taking a base level of stress indicators (heart rate, blood pressure, brain waves, perspiration levels, etc) I would randomly assign two separate groups of HS students to spend 2 days camping in the wilderness. I would set up several exciting events to take place such as river rafting, hunting, building a shelter for the night, etc. One group would have their cell phones with them (assuming there is a cell phone connection in this remote area), the second group would not. The first group could contact whomever they chose during the events and during a down time say, at night. The second group would not have cell phones to be able to do this. I would somehow monitor both group’s stress levels while out in the wilderness.
Summary: Because I would want to avoid the Correlation/Causation Fallacy, I would need to not know which students were which in this experiment. And I foresee some challenges that might not be avoidable and might skew this idea. There could be variables such as a student who is naturally highly stressed in the wilderness and his anxiety could spike giving my experiment the expected result but for the wrong reason. Not to mention the difficulty of setting up this experiment in the first place.
Personal note: Thinking about this idea has caused me to think in a more scientific way about the results of all experiments I learn about. The Correlation/Causation issue is one I fall victim to a lot. I like to think that I am an objective observer, but so far in this course, I am not so sure of that anymore. At the same time that I hate to have my thinking challenged in this way, I also feel excited that I am thinking on a deeper level than I ever have.
How would you select the groups at random? Would you use a number system? Perha.
My group is the Los Angeles Rams. We are looking to be sponsors with.docxJinElias52
My group is the Los Angeles Rams. We are looking to be sponsors with Dunkin' Donuts.Attached is an example of the Portland Timbers and a sponsorship with Chevrolet. On the bottom of the excel document you can see there are 4 different tabs. The tabs I need done are Research and Activity.
Thank you.
.
My Captain does not answer, his lips are pale and still;My father .docxJinElias52
My Captain does not answer, his lips are pale and still;
My father does not feel my arm, he has no pulse nor will;
The ship is anchor'd safe and sound, its voyage closed and done;
From fearful trip, the victor ship, comes in with object won;
Exult, O shores, and ring, O bells!
But I, with mournful tread,
Walk the deck my Captain lies,
Fallen cold and dead.
Examine the imagery in the stanza in bold. What is the significance of the two different images?
The speaker does not feel the joy everyone else is experiencing.
The speaker does not feel the misery everyone else is experiencing.
The speaker does not want anyone to know how unhappy he truly is.
The speaker does not want anyone to know how happy he truly is.
.
My character is Phoenix Jackson from the story A Worn PathMLA Form.docxJinElias52
My character is Phoenix Jackson from the story A Worn Path
MLA Format. 1200 words
Must have
Identify the type of character it is dealing with (A single character could be two or thres types.
Describe the character
Discuss the conflict in the story particularly in regards to the character's place in it.
Due tomorrow by 3pm
.
My assignment is to write an original essay of four to fivr parargra.docxJinElias52
My assignment is to write an original essay of four to fivr parargraphs describing a person I admire. My chocie is Lional Messi he is a famous soccer player. I need a hook in the introduction and three body paragraphs. First paragraphs about his childhoods secound paragraphs about join Barcalona fc third parargraph about change of the soccer history and a conclusion. I needed for secound English language person I don't want to too perfect.
.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Choose a Research TopicHiba Al MehdiSchool of Business, Northc
1. Choose a Research Topic
Hiba Al Mehdi
School of Business, Northcentral University
BUS-7100: Scholarly Literature Review
Dr. Richard Thompson
October 3, 2021
Richard C. Thompson, Ph.D.
Grade – 9.5/10
10/6/2021
Assignment: Choose a Research Topic
Week 7 Requirements
Feedback
The problem statement is between 250-300 words. It describes
the gap in the literature or the problem found in the research. It
is something that has not been solved. A problem statement is
used to describe what the researcher intends to solve. Include
the following items in your draft:
I see you changed your topic since Week 5 – this is acceptable
and I think the topic is clearer as well.
See comment on formatting of your Problem Statement and need
for supporting research.
See comments on Purpose Statement.
See comments on your Theoretical Framework.
I look forward to your revisions in Week 8’s assignment
1. Write a problem statement with no more than 250 words.
1. Write a purpose statement using the directions below.
1. Include two or three paragraphs about a theory or conceptual
framework.
1. Add your annotated bibliography from previous work.
2. From the dissertation template, use the following points to write
a purpose statement: Begin with a succinct purpose statement
that identifies the study method, design, and overarching goal:
“The purpose of this [identify research methodology] [identify
research design] study is to [identify the goal of the dissertation
that directly reflects and encompasses the research questions
that will follow].”
1. Indicate how the study is a logical, explicit research response
to the stated problem and the research questions that will
follow.
1. Continue with a brief and clear step-by-step overview of how
the study will be (proposal) or was (manuscript) conducted.
1. Identify the variables/constructs, materials/instrumentation,
and analysis.
1. Identify the target population and sample size that will be
needed (proposal) or was obtained (manuscript).
Length: 10-12 pages total, not including title and reference
pages.
Include a minimum of seven scholarly resources.
Work is free of spelling, punctuation, grammar, & word usage
errors. APA was used for citations and references.
Running head: DRAFT OF RESEARCH TOPIC
2
Business Performance Risks Caused by Outsourcing of
3. Information Technology.
The information technology (IT) growth has resulted in the rise
of transaction demand by consumers and businesses. The
majority of the organization's technical teams are ever-present
to solve any emerging needs. Following rampant business needs
growth, organizations are on a mission to keep the source and
demand of particular information technology functions intact.
The world's globalization has changed the production mode of
enterprises from insourcing to outsourcing. The management of
cost and time management efficiency are the determiners of the
organization's business performance.
Furthermore, several factors must be in consideration during the
process of outsourcing, such as time and financial
considerations, and technology. Outsourcing can also harm
employees, which may translate into risks to business
performance. This paper discusses business performance risks
caused by IT outsourcing in organizations (Munoz, 2017).
Problem Statement
The major challenge to be dealt with in this research is
identifying the risk that information technology outsourcing
brings to the organization's business performance. The process
of outsourcing involves internal work transfer to providers of
external service. This type of outsourcing translates into clients'
satisfaction to gain a competitive advantage, the fundamental
outsourcing target. Besides, the Outsourcing process is
associated with numerous problems such as integrity of
resources, network security, and connectivity. In the long run,
this kind of outsourcing may impact the performance of
employees in business operations. During the process of
outsourcing, some technologies remain associated with
problems. On the other hand, internal resources remain used as
corrective measures to some problems impacting other business
sectors. Comment by Richard Thompson: “The problem to be
examined through this research is…”. You had this formatted
correctly in Week 5, although I see you changed your topic
(which is acceptable) Comment by Richard Thompson: This
4. could be an interesting topic, but I do not see the supporting
research that indicates we do not already know what these risks
are. The interrelationship between risk and outsourcing in
general is well researched. What is there in the InbfoTech
literature?
Update this for Week 8
In addition, this action is likely to results in limited resources
in other business sectors and eventually translate to poor
business performance. This way will ultimately increase the
organization's risk. The relationship between the service risk of
IT (network security or application maintenance) and the
organizational performance of a business lacks conclusive
quantitative analysis caused by outsourcing. Also, outsourcing
brought dissatisfaction with some work because some internal
organization work was closed due to transfer to outsourcing
suppliers. These effects vary depending on the organization
size, the outsourcing organization, and the nature of work
offered by the organization to the outsourcing supplier
(Balogun, 2013).
The Purpose of This Research
Non-experimental quantitative research aims to assess the risks
of outsourcing certain services of IT suppliers of third-party.
Following the perspective business view, outsourcing adds up to
be a fundamental tool for solving multiple issues management
of time and competitive advantage. In this analysis process,
business performance involves the standard variable;
identification of risk and size of the company are the predictor
variables. During the study, around 100 employees were
participants from organizations in the information technology
field. Usually, all the participants remained surveyed online.
According to Brydges (2019), various studied factors determine
the difference between risk factors and business performance.
The predisposing factors for these results will add to the
literature of this paper (Balogun, 2013). Comment by Richard
Thompson: “…to third party suppliers.”? Comment by Richard
5. Thompson: Will be
Until you start writing Chapter 4 in the dissertation which
reports on the results of your research, you will always talk
about your research in the future tense as you have not
conducted the research yetTheoretical Framework
Transaction cost analysis can apply to organizations
participating in IT outsourcing. Transaction cost economics
involves studies of contractual governance and relations. It can
operate to extend the concept of the transaction cost. In this
study, organizations maximize their profits by indulging in
information exchange. Ideally, approximately three dimensions
form the critical determiners of transaction costs, including
specificity of an asset, transaction frequency, and transaction
uncertainty. The frequency of transactions leads to the rise of
the trust of both involved parties and limits their speculation.
The limitations of forecasting trading results lie in the
uncertainty of trading. Comment by Richard Thompson:
Good. Now, source? Cite your sources, even if you paraphrase
The difficulty in using resources for other purposes lies in
the particularity of the assets. According to transaction cost
analysis, when a simple contract gives way to a significant
transaction in the organization, the risk of the contract increases
(Balogun, 2013).
The theory of integrated systems operated to offer analysis
during an organization's participation in the network security
system of an outsourced IT organization. Systematic
interdisciplinary research gives insight into the principles
applicable to all research fields, an integrated systems theory.
This theory sits petty to understand not only information
security management but also information security strategies.
The theory of an integrated system offers a theoretical
framework for the trade-off between both risk and profit. In this
study, integrated systems theory was applied to increase profits
through outsourcing and keeping the network's security. The
organization's scale and risk are under scrutiny as the growth of
outsourcing. Upcoming organizations have a sense of belief that
6. they are not as familiar as large established companies. Larger
and more established companies will receive more improved
packages. Comment by Richard Thompson: Are you proposing
to use Transaction Cost Analysis and Integrated Systems
Theory? In the framework section, after you describe both
(what are the major concepts and how do they interact) then you
need to create a framework that applies both concepts to yoru
particular research problem (Problem Statement).
Sometimes it is useful to make a diagram, or concept map, of
how all of this fits together. See Davis (2011) in your Dropbox.
In contrast, upcoming companies may feel obliged to pay more
to acquire packages of the same kind. Both companies will be
affected if the risk calculation is incorrect, whether small or
large. There should be consideration of the undiscovered costs
when performing risk calculations. In general, large established
companies remain positioned to receive the quality service
associated with reduced risk. However, according to Balogun
(2013), small upcoming companies are forced to wait for
opportunities. In other situations, unlike wise to large
companies, small companies tend to have established good
relationships with companies meant for outsourcing, which may
change the risk level.
Following employees' experience, which becomes examined by
the change process, the expectation theory remains applied in
this theoretical framework. The attribute that contributes to the
behavior of workplace behavior is the expectations theory.
Furthermore, motivation is impacted significantly by three
elements such as valence, instrumentality, and expectation.
Specific results remain produced if hard work becomes
embraced, termed instrumentality.
Also, workers get a particular reward for their hard work,
which is called expectation, while valence involves value worth
trying. According to Munoz (2017), putting all of these
together, especially when the valence (result) is attractive, the
individual will be motivated to take action (instrumental)
7. (Munoz, 2017).
Pan, L. (2019). A big data-based data mining tool for physical
education and technical and tactical analysis. International
Association of Online Engineering (IAOE).
https://doi.org/10.3991/ijet.v14i22.11345
The tools for mining data strongly support physical training and
education and assist in the promotion of both tactical and
technical analysis. This research material gives information
based on using massive data technology to evaluate competitive
data about sports. The author of this article engineered an
algorithm to help establish the mining of data tools for use with
data about sports. The findings in this resource material
intensively enhance big data technology in this particular sports
field (Pan, 2019). Data mining involves a method of processing
information that uses a variety of theories and techniques.
Mining of data relays analysis of statistics which is an essential
tool for extracting and aggregating information. Data mining
relies on the decision tree structure, which embodies offsetting
decisions.
Additionally, the mining of data heavily relies on the structure
of the decision tree, which forms a process of a set of decisions.
Also, mining of data applies the logic of fuzzy and networks of
artificial neural. Generally, data mining analysis uses
visualization techniques to show the concluding presentation
(Pan, 2019).
In this article, the author uses badminton as an example. He is
able to identify data of accurate game data using big data in
assisting coaches in guidance and targeted physical education.
Ideally, the tool has a massive impact on the athletic world
because it assists in the avoidance of weakness while
developing strengths. According to Plan (2019), this tool will
equally aid in technological improvement and tactics.
Cesarotti, V., Gubinelli, S., & Introna, V. (2019). The evolution
of project management (PM): How agile, lean, and Six Sigma
change PM. Journal of Modern Project Management, 7(3), 1-29.
https://doi.org/10.19255/JMPM02107
8. Project managers have several means to deal with projects. For
instance, Frames,
which includes Project Management Body of Knowledge
(PMBOK) and Projects in Controlled Environment (PRINCE2),
assists the project managers who use project management. The
framework of PMBOK was published by the Institute of Project
Management (PMI) in 1996 (Cesarotti et al., 2019). The duties
are simple and straightforward, and there are limits in
traditional project management (TPM). The five essential
processes of various TPM include initiation, planning,
execution, control and monitoring, and closing. For the case of
software projects, there was the creation of Agile Project
Management (APM).
Additionally, APM uses SCRUM and Extreme Programming as
the method of primary project management for any project.
Learning ongoing and adaptation are the fundamental tools to
management methods of an agile project. Furthermore, another
approach is Lean project management which focuses on waste
elimination and value creation. The success of Lean project
management is essential in various areas, such as used in the
production environment. Also, another method is Six Sigma is;
it is a method of driving data for improving processes. The 6
Sigma project uses the DMAIC framework. The DMAIC stages
framework includes control, definition, measurement, analysis,
and improvement (Cesarotti et al., 2019).
In this resource material, the author compares the above four
tools of project management. Moreover, he compares the
following tools: intra-communication, life cycle methods,
leadership style styles, customer roles, rework, risks, costs,
delivery team dimensions, and main applications (Cesarotti et
al., 2019).
Osmyatchenko, V., Oliinyk, V., Mazina, O., Matselyukh, N.,
Ilin, V., & Orzeł, A. (2019). The influence of the global
technological changes on principles and functions of accounting
and the formation of the organization strategy. Journal of
Security & Sustainability Issues.
9. https://doi.org/10.9770/jssi.2019.8.4(7)
In the accounting system, modern technology performs a critical
role in this article's content. The changes in technology occur in
three phases. First, innovation, which is the primary one, occurs
at the onset of technology and economic growth.
Second, the application being the second phase occurs during a
period of growth of the economy. Third, the other phase is
Stagnation which occurs technological products saturate the
market. In the final phase, new technology research for new
processes or products begins (Osmyatchenko et al., 2019).
Accounting as a business process is changing using artificial
intelligence (AI). Resource work is shifting from daily tasks to
management work. With the help of the AI global information
system, the life of accounting is changing. With the process of
globalization and technological changes, accounting principles
have adapted to new operating conditions. At the same time,
standards of accounting remain supervised by local countries or
local governments. The implementation of the international
accounting experience has its challenges. The dynamic changes
in the technology industry require flexible accounting
processes, and the professional skills of accountants need to be
constantly revised. According to Osmyatchenko et al., 2019,
technological change and data processing speed are essential in
the digital world.
This article is majorly yearning to relay the mechanism by
which global information systems can limit the cost of counting.
Turkanović, M., & Polančič, G. (2013). On the security of
certain e-communication types:
Risks, user awareness, and
recommendationshttps://doi.org/https://doi-
org.proxy1.ncu.edu/10.1016/j.jisa.2013.07.003
In the 20th century, communication changed with the
development of electronic products. The continuous innovation
development in communications, social media, and smartphones
has also created multiple security issues. This article discusses
the risk of security and privacy of electronic communications
10. (Turkanović & Polančič, 2013). Exchange of data takes place in
communication via electronic channels. Furthermore, these
communications exist in many forms, such as instant messaging,
smartphones, websites, and social media. Equipment and
applications are two major types of electronic communications.
The scholar of this article discusses device email and
applicable digital communication primarily via social media
handles. The most common online activity is email, and now
social media is approaching it. With the increase in mobile
device usage, email usage is declining, while internet usage is
also increasing (Turkanović & Polančič, 2013).
Usually, there is guaranteed safety in executing communication
electronically because there is no room for accessing
unauthorized data. This way made it possible because everyone
has the legal ground to curb used information. Since security is
an attribute assigned to computers, privacy remains assigned to
individuals in the same way. With the development of
technology, more and more people are using electronic
communication, whether private or professional. As a result,
privacy issues continue to rise (Turkanović & Polančič, 2013).
The 2011 online privacy survey results show that 94% of people
need privacy on online platforms. Around three-quarters of the
users believe that the internet has limited regulation. Also, the
author has given a report based on feedback on privacy online
via numerous surveys. For any smartphone user, privacy is a
massive issue. One of the surveys vividly indicates that privacy
is essential for teenagers and parents with social networks. In
2008, worldwide mobile phones companies sold about 2 billion
mobile phones. With the exponential growth of smartphone
sales, privacy concerns have increased yearly. The majority of
individuals store quite a considerable number of their personal
information in their smartphones which stands a greater risk to
every individual.
According to Turkanović and Polančič (2013), this article
equally mounts intensive focus on risk solutions and awareness
increases.
11. Dobrev, K., & Hart, M. (2015). Benefits, justification, and
implementation planning of real-time business intelligence
systems. Electronic Journal of Information Systems Evaluation,
18(2), 104-118.
http://proxy1.ncu.edu/login?url=https://search.ebscohost.com/lo
gin.aspx? direct=true&db=bth&AN=109261834&site=ehost-
live&scope=site
Compared with delayed intelligence of business (BI), real -time
business intelligence (RTBI) benefits organizations. The subject
of this article is the main topic. Extraction, conversion, and
loading are normal ETL processes, usually an overnight batch
process.
Conventional BI mostly has nothing to do with the process of
real-time business. According to Dobrev and Hart, 2015, the
fundamental mission of RTBI is to lower the time of the action
and grow the value of the business.
Likewise to traditional BI, RTBI is an evolutionary process. It
is interesting to note that organizations embrace RTBI as a
means of several changes to the existing traditional architecture
of BI. This article digs deep into implementing an enterprise
service bus (ESB) to better pass information on modern
applications and incorporate as many applications as possible.
For instance, the first step indicates that an organization is
required to redesign the business processes, clarify the
requirements, evaluate the area of current BI, and determine
whether to establish from ground zero or purchase. The uses of
RTBI can be in different forms, such as predictive analysis,
dynamic pricing, monitoring of demand, detection of fraud,
improvement of the supply chain, and forecasting (Dobrev &
Hart, 2015). RTBI positively impacts organizations via several
functions such as real-time data, improved processes, and better
forecasts. Most organizations tend to embrace the use of real -
time data as a massive improvement for them. It is crucial for
those who have not decided on which technique to embrace to
choose between near-real-time or real-time. Before moving to
RTBI, the risks and benefits must undergo revision.
12. Chatterjee, S., Sarker, S., & Valacich, J. S. (2015). The
behavioral roots of information systems security: Exploring
critical factors related to unethical IT use. Journal of
Management Information Systems, 31(4), 49-87.
https://doi.org/10.1080/07421222.2014.1001257
The world rate of privacy of software rate was around 42% in
2011. Unethical behavior arises from the ease of use and
presence of both technologies and the internet. Studies indicate
that Unethical IT is the major of certain intentional security
violations (Chatterjee et al., 2015). The process by which
unethical IT use attitudes to impact the world negatively is what
this article discussed.
According to the author, individuals with technological idealism
have a bad attitude towards the immoral use of IT. In some
countries, there is no punishment for the unethical use of IT,
one of the reasons for such unethical use.
On the other hand, the growth of technology remains believed to
be beneficial. However, it is associated with risks increase. In
other words, technological growth remains thought to be a
double-edged sword. Few people try to benefit from unethical
use; this is the primary factor in this behavior. These misguided
behaviors have raised additional concerns about the security of
IT. These actions may bring large-scale security breaches to the
organization.
Yogi, Y. W., Govindaraju, R., Irianto, D., & Sudirman, I.
(2019). Capabilities in managing offshore IT outsourcing
challenges and the influence on outsourcing success from the IT
vendor perspective. International Journal of Technology, 10(4),
841-853. https://doi.org/10.14716/ijtech.v10i4.885
Delivering part or whole functions of the company to other
organizations form part of the definition of outsourcing. One of
the most outsourced processes is information technology to
lower production costs, focus core function of the company, and
performance improvement. Globally, China and India are
known to be the countries where most IT outsourcing occurs.
For purposes of succeeding through offshore IT outsourcing, IT
13. vendors need outstanding strengths. In this article, the author
discusses a model that explains the relationship between the
ability to manage outsourcing challenges and offshore IT and its
impact. The author obtained 64 samples (Yogi et al., 2019) from
IT suppliers of Indonesia who conduct IT offshore projects. The
author concludes that IT vendors should establish interactive
capabilities to achieve offshore outsourcing based on the
research results.
IT vendors need to ensure that they are guaranteed senior
support of management to obtain the right resources. The author
also encourages learning about customer culture to promote
interaction. This article has limitations, such as the samples
come from suppliers but lack customer feedback (Yogi et al.,
2019). This article discusses any supplier company's
capabilities to survive in IT outsourcing, particularly in
Indonesia.
View 64 examples to provide practical information for other
sellers of IT.
14. References
Balogun, S. A. (2013). The effects of risk and size of company
on business performance in information technology outsourcing
(Ph.D.). Available from Dissertations & Theses @ Northcentral
University. (1400224467).
https://proxy1.ncu.edu/login?url=https://www- proquest-
com.proxy1.ncu.edu/dissertations-theses/effects-risk-size-
company-on-business- performance/docview/1400224467/se-
2?accountid=28180
Brydges, C. R. (2019). Effect size guidelines, sample size
calculations, and statistical power in gerontology. Innovation in
Aging, 3(4), igz036. https://doi.org/10.1093/geroni/igz036
Cesarotti, V., Gubinelli, S., & Introna, V. (2019). The evolution
of project management (PM):
How agile, lean, and Six Sigma are changing PM. Journal of
Modern Project Management, 7(3), 1-29.
https://doi.org/10.19255/JMPM02107
Chatterjee, S., Sarker, S., & Valacich, J. S. (2015). The
behavioral roots of information systems security: Exploring
critical factors related to unethical IT use. Journal of
Management Information Systems, 31(4), 49-87.
https://doi.org/10.1080/07421222.2014.1001257
Dobrev, K., & Hart, M. (2015). Benefits, justification, and
implementation planning of real-time business intelligence
systems. Electronic Journal of Information Systems Evaluation,
18(2), 104-118.
http://proxy1.ncu.edu/login?url=https://search.ebscohost.com/lo
gin.aspx? direct=true&db=bth&AN=109261834&site=ehost-
live&scope=site
Munoz, E. (2017). Exploring morale, motivations, and
15. commitment of employees affected by outsourcing and
divestiture (D.B.A.). Available from Dissertations & Theses @
Northcentral University. (1960868768).
https://proxy1.ncu.edu/login?url=https://www-
DRAFT OF RESEARCH TOPIC 2
proquest-com.proxy1.ncu.edu/dissertations-theses/exploring-
morale-motivations- commitment-
employees/docview/1960868768/se-2?accountid=28180
Osmyatchenko, V., Oliinyk, V., Mazina, O., Matselyukh, N.,
Ilin, V., & Orzeł, A. (2019). The influence of the global
technological changes on principles and functions of accounting
and the formation of the organization strategy. Journal of
Security & Sustainability Issues.
https://doi.org/10.9770/jssi.2019.8.4(7)
Pan, L. (2019). A big data-based data mining tool for physical
education and technical and tactical analysis. International
Association of Online Engineering (IAOE).
https://doi.org/10.3991/ijet.v14i22.11345
Turkanović, M., & Polančič, G. (2013). On the security of
certain e-communication types: Risks, user awareness, and
recommendationshttps://doi.org/https://doi-
org.proxy1.ncu.edu/10.1016/j.jisa.2013.07.003
Yogi, Y. W., Govindaraju, R., Irianto, D., & Sudirman, I.
(2019). Capabilities in managing offshore IT outsourcing
challenges and the influence on outsourcing success from the IT
vendor perspective. International Journal of Technology, 10(4),
841-853. https://doi.org/10.14716/ijtech.v10i4.885
Requirements: Market positioning of the flavor cups, the
potential customers of the cups, cups background and the health
condition background.
The flavor is a mixture of smell, sight and taste. It is estimated
that the sense of smell is responsible for approximately 80% of
the flavor experience, and taste only occupies 20%. According
16. to this process, the flavor cup attempts to use smell and sight to
deceive the feeling of taste. When the consumer drinks water,
his nose can detect the fruity aroma, which comes from a
fragrant mass at the rim of cups. Additionally, the upper part of
caps will be designed with different colors, which are matching
the flavor mass. As a result, the overall drinking experience is
improved, encouraging cup owners to drink more water.
For example: This kind of water cup can be widely used for
many specific groups, such as patients, children and beverage
addicts.
(Do some research and use the data to analysis)
Developing Topic and Literature Review
BUS-7100: Scholarly Literature Review February 14h, 2021
The Risk of Business Performance result from Information
Technology Outsourcing
The Information Technology (IT) growth increased the demand
for more transactions within the business and between the
business and consumers. Most of the organization's technology
groups stay internally within the organization to support the
17. needs. With the rapid growth in the business needs,
organizations are trying to sustain the needs and outsource some
of their information technology functions. Globalization of the
world modified the business's approach from insourcing to
outsourcing mode of production. The efficiency of time
management and cost management determines the organization's
business performance.
Outsourcing involves many factors like technology, financial
considerations, and time considerations. Outsourcing can also
negatively impact the employees, which may translate to a risk
on the business performance. In this part of the dissertation, the
author talks about business performance risk due to IT
outsourcing in an organization (Munoz, 2017).Statement of
Problem
The problem to be addressed by this study is to identify the risk
of the organization on business performance resulting from
Information Technology outsourcing. Shifting the internal in-
house work to external service providers is outsourcing. This
outsourcing translates to customer satisfaction and mainly gains
the competitive advantage, which is the primary goal of
outsourcing. Outsourcing may raise multiple issues with
network security, connectivity, and integrity of the resources.
The organizations' data is sometimes very confidential. With
outsourcing, the risk of data sharing increases. The
organization's security checks may be different from an
outsourcing vendor, which brings risks to the organization
through the vendor. This may eventually impact employee’s
performance in the operations of the business. When
outsourcing, a portion of the technology is having issues, other
parts of the internal resources are
10
Developing Topic
18. used to rectify the problems, which may impact other business
areas. This will translate into insufficient resources in other
areas, and it will bring poor business performance. That
eventually raises multiple risks to the organization. There is no
conclusive quantitative analysis of the relationship between
organization business performance due to outsourcing and IT
services' risk, whether network security or application
maintenance. Outsourcing also brings some portion of job
dissatisfaction as some of the internal organization jobs are
closed with moving to an outsourcing vendor. These effects
differ on the organization size, outsourcing organization, and
what portion of the work organization is trying to give to
outsourcing vendors (Balogun, 2013).Purpose of the Study
The purpose of the nonexperimental quantitative study is to
evaluate the risk of outsourcing a portion of IT services to a
third-party vendor. From the business perspective, outsourcing
is a logical solution in multiple factors, including competitive
advantage and time management. Business performance is the
criterion variable; risk identification and company size are the
predictor variables in this analysis. There are around 100
employees from an organization working within Informatio n
Technology are participated in this research. There is an online
survey conducted for these participants. Factorial analysis of
variance is performed to find the difference between business
performance and risk factors. The data from this study is added
to the literature by identifying the risk factors on information
security on the organization, resource satisfaction, and the
effect on the business performance (Brydges, 2019).Conceptual
Framework
Organizations involved in IT outsourcing can be analyzed using
transaction costs. This concept of transaction costs can be
expanded using transaction cost economics, a study of the
contractual relations and governance. In this study, organization
maximized their profits by exchanging information. Three
19. dimensions determine the transaction costs; they are frequency
of transaction, the uncertainty of the transaction, and asset
specificity. A significant influence of transactions happened
with the frequency of transactions. The transaction frequency
increases the trust in both parties and reduces opportunistic
behaviors. The limitation of the forecast of the results of the
transaction is the uncertainty of the transaction. The difficulty
of moving a resource for another use is asset specificity. As per
the transaction cost analysis, the hazards of contracting
increases when simple contracts give way to significant deals in
the organization (Balogun, 2013). Figure 1 provides a
conceptual mapping of the transaction costs.Figure 1
Conceptual mapping for Transaction costs
Integrated system theory is used to analyze when an
organization is involved in outsourcing the IT organization's
network security systems. The transdisciplinary study of
systems to explain the principles to apply in all types of
research fields is integrated systems
theory. This theory is beneficial to understand information
security management and strategies. Integrated systems theory
provides a framework in terms of profit and risk tradeoff. In
this study, integrated systems theory is used to maximize profit
using outsourcing and maintaining network security. The risk
and size of the organization are examined with the growth of
outsourcing. Small organizations think that they are not well
recognized compare to larger companies. Larger companies
receive better packages, and small companies may have to pay
more for similar packages. Whether it is small or large, both
companies will suffer if the risks are not calculated correctly.
Hidden costs need to be considered while calculating the risks.
20. Generally, larger companies get the best service with lower
risks, but the small companies have to wait for the opportunity.
Figure 2 gives the conceptual mapping for integrated systems
theory. In some cases, small companies make good relations
with the outsourcing companies compare to larger companies,
which may change the risk levels. Per the integrated systems
theory, the organizations need to observe if the outsourcing
benefits may outweigh the saving in transaction costs (Balogun,
2013).Figure 2
Conceptual mapping for Integrated System Theory
For the employee experience with the change process
measurement, the expectancy theory of motivation is used in
this framework. Attributes that contribute to workplace
behavior is the expectancy theory. The three elements that
affect motivation are instrumentality, expectancy, and valence.
Hard work produces specific outcomes, and that is called
instrumentality. Employees receive certain rewards for the
effort exerted, and that is called expectancy. The value that
makes an attempt worthwhile is called valence. Putting all these
together, if the outcome (valence) is attractive, individuals are
motivated to take action (instrumentality)(Munoz, 2017). This
conceptual framework guides research information security,
employee satisfaction, and business performance with
outsourcing (Prawesh et al., 2021).IT Outsourcing Challenges
and Success
Sending some or more functions of the company to other
companies is called outsourcing. Information Technology is one
of the most outsourced processes. Cost reduction, focus on core
functionalities of the company, and performance improvement
are some of the reasons companies tend to move toward
outsourcing. India and China are the countries where most IT
21. outsourcing happens these days. To achieve success with
offshore IT outsourcing, the IT vendor needs excellent
capabilities. In this article, the author talks about a model that
explains the relations between capabilities in managing
outsourcing challenges with IT offshore and spoke about its
impact. The author obtained 64 samples from Indonesian IT
vendors conducting IT offshore projects (Yogi et al., 2019).
After the research results, the author Yogi concludes that IT
vendors should build interaction capability to achieve offshore
outsourcing. IT vendor needs to make sure that they have the
top management support to get the right resources. The author
also encourages to learn
the client culture to smooth interaction. One of the limitations
in this article is that the samples are from the vendors, but it is
missing the clients' feedback (Yogi et al., 2019). The article
author Yogi talks about the capabilities needed for any vendor
company to survive in IT outsourcing, especially in Indonesia.
Reviewing 64 samples gives better information for other IT
vendors.Data Mining tools
Data mining tools promote physical education and training; it
helps to facilitate tactical and technical analysis. In this article,
the author talked about how big data techniques are used to
analyze competitive data for sports. The author designed an
algorithm to develop the data mining tools used with the data
for sports. This article's findings help promote big data
technology in this particular sports area (Pan, 2019).
Data mining is nothing but an information processing method
using multiple theories and technologies. Data mining relays
statistical analysis, which helps to summarize and extract
information. Data mining depends on the decision tree structure,
which represents set off decisions. Data mining depends on the
decision tree structure, which means a set of decisions in the
process. Data mining also uses fuzzy logic and artificial neural
networks. After all the data analysis, data mining uses
22. visualization technology to present the final presentation (Pan,
2019). The author selected badminton sport as an example in
this article. The author can identify and exact the information
from the competition data and use big data to help coaches
conduct physical education and guidance in a targeted way. This
tool makes a huge difference in the athletes’ world as it helps to
avoid weaknesses and develop strengths. This tool will also
help to improve the tactics and techniques(Pan, 2019).Evolution
of Project Management
There are multiple ways to approach a project by a Proj ect
Manager. A framework like PMBOK (Project Management Body
of Knowledge) and PRINCE2 (Projects in Controlled
Environment) helps project or program managers with project
management tools and techniques. PMBOK framework is
published in 1996 by the Project Management Institute (PMI)
(Cesarotti et al., 2019).
Tasks are straight forward and clear with boundaries in
traditional project management (TPM). Initiating, Planning,
Executing, Controlling & Monitoring, and Closing are the five
primary processes in any TPM. For software projects, Agile
Project Management (APM) is created. APM mostly uses
SCRUM and Extreme Programming as the project management
approach on any project. Continuous learning and adaptation are
the keys to the agile project management approach. Lean Project
Management is another approach; it focuses on removing waste
and creating value. Lean project management is successful and
used more in the product environment. Six Sigma is another
approach; it is a data-driven methodology to improve the
process. Six Sigma projects use the DMAIC framework. Define,
Measure, Analyze, Improve, and Control is the DMAIC
framework phases (Cesarotti et al., 2019). The author of this
article compared the above four project management tools for
analysis. The author compared them around the lifecycle
approach, internal communication, leadership style, customer
role, rework, risk, cost, delivery team dimension, and main
23. application (Cesarotti et al., 2019).Global Technology changes
in Accounting Systems
In Accounting Systems, how modern technologies are playing a
pivotal role is the content in this article. The technological
changes happen in three cycles. Innovation is the first cycle; it
occurs at the beginning of economic growth, a technological
revolution. Application is the second cycle; it happens with a
period of economic growth. Stagnation is the next cycle; it
occurs when the market is at the saturation stage with
technological products. In the last stage, new technical research
starts for a new process or new product (Osmyatchenko et al.,
2019).
The accounting business processes are changing using Artificial
Intelligence (AI). The resources work is moving from routine
tasks to managerial work. With the AI Global Information
Systems, the life of accounting is changing. With the
globalization processes and technology changes, accounting
principles are adapted to new operating conditions.
Simultaneously, the accounting rules are mostly regulated by
the local country or the local government, and implementing
international accounting experience has its challenges. Dynamic
changes in the technology sector demand flexible accounting
processes, and the accounts' professional skills need continuous
modification. In the digital world, technological changes and
data processing speed are crucial (Osmyatchenko et al.,
2019).Risks and Awareness on e-communication
In the 20th century, with electronics growth, communication
changed in the world. It also created multiple security issues
with the innovations growing in the communication field, the
rise in social media and smartphones. In this paper, the author
talked about privacy and security risks with electronic
communication (Turkanović & Polančič, 2013).
Data exchange happens in electronic communication. There are
24. multiple types of e- communications, like smartphones, instant
messaging, social media, and websites. Apparatus and
Application are the two categories in e-communication. The
author discussed apparatus category e-mail and application
category social media in this article. The top online activity is
e- mail, and now social media is coming close to it. As mobile
usage increases, e-mail usage is coming down, and web usage is
going up (Turkanović & Polančič, 2013).
Unauthorized access to personal data is secure in e-
communication. Every individual has the right to control their
personal information usage. As security is a property assigned
to a computer, privacy is assigned to the individual in the same
way. As technology is growing, more people are using e-
communication, whether professional or private. With this, the
privacy concerns are keeping going up (Turkanović & Polančič,
2013).
Online privacy 2011 results say that 94% think they need online
privacy and 75% believe that the internet is not regulated. The
author went through multiple surveys to show us people's
feedback on privacy. For any smartphone user, privacy is a huge
concern. For teens and parents with social networking, one of
the surveys clearly says that privacy is essential for this group.
In 2008 around two billion phones are sold in the world. With
smartphone sales going up exponentially, the concerns on
privacy are growing every year. Most people carry their
personal information on the phone, which is a considerable risk
for that person. The article also discussed solutions and created
awareness about the risks (Turkanović & Polančič,
2013).Benefits of real-time Business Intelligence tools
Real-Time Business Intelligence (RTBI) benefits to the
organization compare to delayed Business Intelligence (BI) is
the main topic in this article. Extract, transform, and load is the
normal ETL process, which generally an overnight batch
process. Regular BI is mostly not linked to the real-time
25. business process. The main objective of RTBI is to reduce
action time and increase business value (Dobrev & Hart, 2015).
Compare to traditional BI, RTBI is an evolutionary process. In
any organization implementing RTBI means multiple changes to
the existing traditional BI architecture. This article discussed
implementing Enterprise Service Bus (ESB) to better
communicate between the
current applications and integrate various applications. As a
first step, organizations need to re- engineer the business
process, clarify the needs, evaluate the current BI area, and
finalize whether to build it from scratch or buy it. RTBI can be
used in predictive analytics, dynamic pricing, demand
monitoring, fraud detection, supply chain improvement, and
forecasting (Dobrev & Hart, 2015).
Overall, RTBI benefits organizations with real-time data, better
prediction, and better process improvements. Moving to real -
time is a massive move for organizations; they need to decide
whether to move real-time or near-time. Risks and benefits need
to be reviewed before moving to RTBI.Information Systems
Security
In 2011 the global software piracy rate was around 42 percent.
Unethical behaviors are created with the ease and availability of
the internet and new technology. Some of the deliberate security
violations are created by unethical IT usage (Chatterjee et al.,
2015).
How unethical IT usage attitude is impacting the world is the
topic in this article. As per the author's notes, the individual
with technical idealism has a negative mindset with IT's
unethical usage. In some countries, unethical use of IT does not
have any punishment, which could also be one of the reasons for
this unethical usage. Technology growth is adding benefits, but
at the same time, it adds risks, too; technology growth is a
double-edged sword. Few individuals try to get some gain from
unethical usage; that is the main factor for this behavior.
26. These unethical behaviors bring more attention to IT security.
These behaviors might bring massive security breaches to the
organization. The author also talks about age groups who are
more into these unethical behaviors (Chatterjee et al., 2015).
Summary
Organizations always look to maximize short term and long
term profits. One of the ways of increasing the profit is to
outsource part of the IT organization. Outsourcing eventually
increases the security risk and resource dissatisfaction
(Mikhael, 2020). The final result may be a poor organization’s
performance. Outsourcing helps to reduce the transactional cost,
but eventually, it increases the security vulnerabilities. It is
crucial for the organization to measure their network security
and other security protocols for the organization involved in
outsourcing. These extra steps will help the organization
minimize the risks and threats from a security perspective,
which may come with the vendor. The organization needs to
keep close monitoring of employee satisfaction and take the
necessary measures as outsourcing can indirectly impact
employee satisfaction.
Literature reviews are used to evaluate policies by reviewing
best practices or by assessing the effectiveness of the specific
application, or only by updating the necessary knowledge
(Koons et al., 2019). Generally, the literature review involves
four main steps: In the first step, the author develops and
refines the literature's scope to be reviewed. In the second step,
the author searches and get the right research material. In the
third step, the author reads through the studies and assess the
information. In the last step, the author writes the report and
summarizes the information. Depends on the dissertation's
complexity, before the author completes the review, there may
be several rounds of searching, reading, and writing (Meth &
Williams, 2020).
The author reviewed two dissertations to understand the
27. literature review. Chapter 1 section contains the statement of
the problem, the purpose of the study, conceptual framework,
research questions, and summary. Chapter 2 discusses a detailed
discussion on the conceptual framework, knowledge sharing,
reasons, and summary. In one of the dissertation's summary, it
is stated that how an extensive literature review showed and
supported the phenomenon expecting part of the dissertation. In
that particular dissertation summary, the author talked about
people differences, team issues, architectural issues, technology
issues, customer issues, and collaboration issues (Murphy,
2020). The conceptual models are discussed in this article as
part of the literature review.
References
Balogun, S. A. (2013). The effects of risk and size of company
on business performance in information technology outsourcing
(Ph.D.). Available from Dissertations & Theses @ Northcentral
University. (1400224467).
https://proxy1.ncu.edu/login?url=https://www- proquest-
com.proxy1.ncu.edu/dissertations-theses/effects-risk-size-
company-on-business- performance/docview/1400224467/se-
2?accountid=28180
Brydges, C. R. (2019). Effect size guidelines, sample size
calculations, and statistical power in gerontology. Innovation in
Aging, 3(4), igz036. https://doi.org/10.1093/geroni/igz036
Cesarotti, V., Gubinelli, S., & Introna, V. (2019). The evolution
of project management (PM):
How agile, lean, and six sigma are changing PM. Journal of
Modern Project Management, 7(3), 1-29.
28. https://doi.org/10.19255/JMPM02107
Chatterjee, S., Sarker, S., & Valacich, J. S. (2015). The
behavioral roots of information systems security: Exploring
critical factors related to unethical IT use. Journal of
Management Information Systems, 31(4), 49.
http://proxy1.ncu.edu/login?
url=https://search.ebscohost.com/login.aspx?
direct=true&db=edb&AN=102702506&site=eds-live
Dobrev, K., & Hart, M. (2015). Benefits, justification, and
implementation planning of real-time business intelligence
systems. Academic Conferences & Publishing International Ltd.
Koons, G. L., Schenke-Layland, K., & Mikos, A. G. (2019).
Why, when, who, what, how, and where for trainees writing
literature review articles. Annals of Biomedical Engineering,
47(11), 2334-2340. https://doi.org/10.1007/s10439-019-02290-5
Meth, P., & Williams, G. (2020). Doing development research;
pages 209-221. (). SAGE Publications, Ltd.
https://doi.org/10.4135/9781849208925
Mikhael, M. (2020). The impact of ethical leadership on
employee job satisfaction (D.B.A.).
Available from Dissertations & Theses @ Northcentral
University. (2425020006).
https://proxy1.ncu.edu/login?url=https://www-proquest-
com.proxy1.ncu.edu/dissertations- theses/impact-ethical-
leadership-on-employee-job/docview/2425020006/se-2?
accountid=28180
Munoz, E. (2017). Exploring morale, motivations, and
commitment of employees affected by outsourcing and
divestiture (D.B.A.). Available from Dissertations & Theses @
Northcentral University. (1960868768).
https://proxy1.ncu.edu/login?url=https://www- proquest-
com.proxy1.ncu.edu/dissertations-theses/exploring-morale-
motivations- commitment-employees/docview/1960868768/se-
2?accountid=28180
29. Murphy, K. J. (2020). Intra-team and inter-team knowledge
sharing in multinational corporation agile projects: A
qualitative phenomenological study (D.B.A.). Available from
Dissertations & Theses @ Northcentral University.
(2435230720). https://proxy1.ncu.edu/login? url=https://www -
proquest-com.proxy1.ncu.edu/dissertations-theses/intra-team-
inter- knowledge-sharing-
multinational/docview/2435230720/se-2?accountid=28180
Osmyatchenko, V., Oliinyk, V., Mazina, O., Matselyukh, N.,
Ilin, V., & Orzeł, A. (2019). The influence of the global
technological changes on principles and functions of accounting
and formation of the organization strategy. Journal of Security
& Sustainability Issues. https://doi.org/10.9770/jssi.2019.8.4(7)
Pan, L. (2019). A big data-based data mining tool for physical
education and technical and tactical analysis. International
Association of Online Engineering (IAOE).
https://doi.org/10.3991/ijet.v14i22.11345
Prawesh, S., Chari, K., & Agrawal, M. (2021). Industry norms
as predictors of IT outsourcing behaviors. International Journal
of Information Management, 56.
https://doi.org/10.1016/j.ijinfomgt.2020.102242
Turkanović, M., & Polančič, G. (2013). On the security of
certain e-communication types: Risks, user awareness, and
recommendations. Journal of Information Security and
Applications, 18(4), 193-205. https://doi.org/https://doi-
org.proxy1.ncu.edu/10.1016/j.jisa.2013.07.003
Yogi, Y. W., Govindaraju, R., Irianto, D., & Sudirman, I.
(2019). Capabilities in managing offshore IT outsourcing
challenges and the influence on outsourcing success from the IT
vendor perspective. International Journal of Technology, 10(4),
841-853. https://doi.org/10.14716/ijtech.v10i4.885