CUSTOMER SEGMENTATION ANALYSIS OF ELECTRONIC GOODS
A MACHINE LEARNING APPROACH - Machine Learning and Optimization
Abstract
There seems to be a lot of competition among competing firms to attract new customers and hold on to existing ones as a result of the creation of numerous competitors and entrepreneurs. Because of the above, providing excellent customer service is necessary regardless of the size of the company. Furthermore, the capacity of any company to comprehend the requirements of each of its clients will enhance client assistance in offering focused client services and creating unique client care strategies. Structured customer service makes it possible to have this understanding. Customers in each segment are similar in terms of market characteristics.
Introduction
Data mining algorithms are now frequently used to uncover vital and strategic information that is concealed in organizational data as a result of growing company competition and the accessibility of large-scale historical data. (Rajaraman, 2011) Data mining is the process of removing logical information from a dataset and presenting it for decision support in a way that is easily understandable by humans. Data mining techniques set apart disciplines like statistics, AI, machine learning, and data systems. Applications for data mining range from biology to weather forecasting, fraud detection, financial research, and customer insights, among others. The main goal of this article is to use data mining to find client segments in a commercial enterprise.
These differences are based on factors that directly or indirectly affect the market or business such as product preferences or expectations, location, behavior and so on. The importance of customer segmentation includes, inter alia, the ability of a business to customize market plans that would be appropriate for each segment of its customers.Support for business decisions based on risky environments such as credit relationships with its customers (Rogers, 2016); Identify products related to individual components and how to manage demand and supply power; Interdependence and interaction between consumers, between products, or between customers and products are revealed, which the business may not be aware of; The ability to predict customer declines, and which customers are likely to have problems and raise other market research questions and provide clues to find solutions. Buried in a database of integrated data proved to be effective for detecting subtle but subtle patterns or relationships.
This mode of learning is classified under supervised learning. Integration algorithms include the KMeans algorithm, K-nearest algorithm, sorting map (SOM), and more (Morrisson, 2014). These algorithms, without prior knowledge of the data, are able to identify groups in them by repeatedly comparing input patterns, as long as static aptitude in training examples is achieved based on subject matter or process. Each set has data ...
Organization Theory and DesignOrganization Analysis Proposal.docxhopeaustin33688
Organization Theory and Design
Organization Analysis Proposal
Due: Sunday February 7 End of day (via email)
Length: maximum 5 pages excluding appendices
IMPORTANT!!!
Saving your document: Please use YOUR CLASS SECTION (e.g. 1pm, 2:30pm), GROUP ORGANIZATION NAME, AND GROUP NUMBER as your file name. For example 1pm_companyname_group#.doc
(Att: 1pm section, you will be assigned a group number on Tuesday January)
Also include your organization name, group number, and section in the subject of your email.
Please note: I need to know and approve your organization of study by Friday February 5.
Information your report should include:
1)The name of the organization the group proposes to study and a list of group members.
2)Description of the organization
A brief description of the organization (i.e. product or service that it provides, location, size, external environment (describe the environmental sectors that have a direct impact on the companies operations, and any other relevant information you think would be appropriate).
3) Assignment of roles and responsibilities
Assignment of roles and responsibilitiesfor each group member, identify task that need to be completed, and deadlines associated with each task. This will clarify who is doing what and timelines for various tasks.
My suggestion is to assign topics according to the chapters of the text. For instance, you could assign each group member one or more chapter(s). The most important or relevant chapters are: structural and contextual variables (chapter #1), strategy and goals (chapter #2), organization structure (chapter #3) , external environment (chapter #4), lifecycle and size (chapter #9) and organizational culture (chapter #11). Other chapters that are important and could be included are: interorganizational relationships (chapter #5), international challenges (chapter #6), mfg technology (chapter #7), (chapter #10), innovation and change (chapter #11), and conflict, power, and politics (chapter #13)
4) Problem Definition:
This section will require you to identify a possible problem, issue, challenge that your organization is facing. If your organization is a publicly traded company, you’ll be able to look online for various problems/challenges facing the company. Otherwise, you may need to contact someone at the organization directly to identify a possible problem/issue facing your organization. Please note that you’ll be able to change your problem/issue at a later date. Provide a reference(s) and citations to explain where you obtained this information.
An except from a previous proposal
There are several issues with UNB’s structure but the main concern is that there is too much centralization and concentration of power at the administration level (org. design issue – relates back to what we’ve discussed in class). Some of the organizational design issues have led to conflicting goals and hinder the capability to meet the overarching strategic go.
AP P E N D I X 1
630
AP P E N D I X 1
Hands-On Guide: How to Analyze a Case Study
Management Information Systems, Ninth Edition provides a
number of case studies for you to analyze. Included in these
cases are questions to help you understand and analyze the
case. You may, however, be assigned other case studies that
do not have questions. This Hands-On Guide presents a
structured framework to help you analyze such cases as well
as the case studies in this text. Knowing how to analyze a case
will help you attack virtually any business problem.
A case study helps students learn by immersing them in a
real-world business scenario where they can act as problem
solvers and decision makers. The case presents facts about a
particular organization. Students are asked to analyze the
case by focusing on the most important facts and using this
information to determine the opportunities and problems
facing that organization. Students are then asked to identify
alternative courses of action to deal with the problems they
identify.
A case study analysis must not merely summarize the
case. It should identify key issues and problems, outline and
assess alternative courses of action, and draw appropriate
conclusions. The case study analysis can be broken down
into the following steps:
1. Identify the most important facts surrounding the case.
2. Identify the key issue or issues.
3. Specify alternative courses of action.
4. Evaluate each course of action.
5. Recommend the best course of action.
Let’s look at what each step involves.
1. Identify the most important facts surrounding the case.
Read the case several times to become familiar with
the information it contains. Pay attention to the infor-
mation in any accompanying exhibits, tables, or fig-
ures. Many case scenarios, as in real life, present a great
deal of detailed information. Some of these facts are
more relevant that others for problem identification.
One can assume the facts and figures in the case are
true, but statements, judgments, or decisions made by
individuals should be questioned. Underline and then
list the most important facts and figures that would
help you define the central problem or issue. If key
facts and numbers are not available, you can make
assumptions, but these assumptions should be reason-
able given the situation. The “correctness” of your con-
clusions may depend on the assumptions you make.
2. Identify the key issue or issues. Use the facts provided
by the case to identify the key issue or issues facing
the company you are studying. Many cases present
multiple issues or problems. Identify the most impor-
tant and separate them from more trivial issues. State
the major problem or challenge facing the company.
You should be able to describe the problem or chal-
lenge in one or two sentences. You should be able to
explain how this problem affects the strategy or per-
formance of the organization.
You will need to explain why the problem occurred.
Does the proble.
Business Driven Information Systems 8th Edition by Paige Baltzan solution man...ssuserf63bd7
https://qidiantiku.com/solution-manual-for-business-driven-information-systems-8th-edition-by-paige-baltzan.shtml
Full download please contact u84757(at)protonmail(dot)com or qidiantiku(dot)com
https://qidiantiku.com/solution-manual-for-business-driven-information-systems-8th-edition-by-paige-baltzan.shtml
Question 1 quCompanies with reputations as good places to work TatianaMajor22
Question 1 : quCompanies with reputations as good places to work have generated superior financial performance." Explain your answer using informed sources?
Companies with reputations as good places to work such as Adobe, Google, LinkedIn, Facebook, and so on have generated superior financial performance because these companies incorporate organizational behavior principles, which are studies that investigates the impact of individuals, groups, and structure have on behavior within organizations for the purpose of applying such knowledge toward improving an organization’s effectiveness into their workplaces. By doing that these companies have been able to yield many important organizational outcomes, that could affect them. Also, these companies with reputations of good places to work at have incorporated the importance of using interpersonal skills within the workplace. By them incorporating interpersonal skills it has helped built a strong association between the quality of workplace relationships and job satisfaction.
Not only does it have a strong association between the quality or workplace relationships and job satisfaction, but it helps when it comes to stress and turnover rates. Incorporating interpersonal skills has resulted in a lower turnover of quality employees and higher quality applications for recruitment. Furthermore, by increasing the OB principles in an organization and incorporating interpersonal skills, it can help foster social responsibility awareness. Which is good for that company or organization because it incorporates social entrepreneurship education into that company to train future leaders in addressing social issues within their organizations.
Robbins, S. P., & Judge, T. A. (2018). Organizational Behavior (18th Edition). Pearson Education (US). https://monroecollege.vitalsource.com/books/9780134729749
Question #2 Regarding the use of technology, how is customer and competitor behavior monitored and measured? Explain your answer using scholarly sources and citations within the text.
Technology is used by big companies such as Google and Facebook, who rely on advertising income for their revenue, which is why they need technology to predict user behavior. Similarly, to Google and Facebook companies like Netflix and Uber use technology to predict when and where customers may want to use their service. Although Netflix and Uber may reply on user subscriptions for revenue, they mostly use technology to track user behavior to provide them with what is best suited for that specific user. An example of how companies use technology to monitor, and measure would be Kroger a U.S grocery store electronically collects information from 55 million customers who have loyalty cards and sells that data to vendors. When we think of companies using technology, we think about big companies or companies who it would benefit the most but according to our textbook insurance firms also use technology for their benefit too. In the t ...
Short Answer questions Part 11.What is the difference between.docxmaoanderton
Short Answer questions Part 1:
1.What is the difference between a database and a DBMS?
Would you consider a DBMS an intermediator between you and the database? Explain your answer.
2.Conduct a search and identify the popular DBMS used in business?
3.Conduct a search and identify an article that describes how databases are used to improve a business. Write a brief summary of the article and provide a link.
4.What is you major? How are databases used to improve the productivity of your particular major? Cite your sources used to answer this question.
5.What type of statements are used to CREATE Tables? DDL or DML?
6.What type of statements are used to INSERT Rows into a Table? DDL or DML?
7.What type of statements are used to UPDATE Rows in a Table? DDL or DML?
8.What type of statements are used to remove a table? DDL or DML?
9.What are some possible tables that you would include if you were building a University database?
10.Pick a table from question 9 and identify potential Columns that would be included in each table.
11.Are all Primary Keys also Candidate Keys? Explain.
12.What makes for a good Primary Key?
13.What are the main disadvantages of using composite Primary Kays?
14.Why do surrogate keys make great primary keys?
15.What is the purpose of a foreign key? Why are they needed in a relational database?
Short Answer Questions Part 1:
1. How does the Rule of One Theme relate to Normalization? Would you consider this part of, or all of the normalization process? Explain.
2.In your own words, describe a DELETE unintended consequence problem. Provide an example.
3.In your own words, describe an UPDATE unintended consequence problem. Provide an
example.
4.In your own words, describe an INSERT unintended consequence problem.
5.Describe an example of a Rule of One Instance problem. How would you fix this problem?
6.Consider A B. In this example, what is A (determinate or functionally dependent)? What is B
(determinate or functionally dependent)?
7.Consider ABDPC. If A B, D, P, C and P C, is this normalized to 3rd NF? If not, explain. In addition, how would you fix it?
8.Consider ABDPC. If ABDPC and BP, is this normalized to 3rd NF? If not, explain. In addition, how would you fix it?
9.Consider ABDPC. If ABDPC, is this normalized to 3rd NF? If not, explain. In addition, how would you fix it?
10. In your own words, what does the term, “every determinate must be a candidate key” mean?
SWOT Analysis
Click on the speaker symbol on each slide
To hear the presentation
Welcome to this session on SWOT analysis.
As part of this week’s discussion on strategic planning we will review the purpose, process and application of SWOT analysis.
1
What is SWOT Analysis
Stands for Strengths, Weaknesses, Opportunities and Threats
A tool to identify and summarize strengths, weaknesses, opportunities and threats of a strategic environment
Tool credited to Albert Humphrey, who led a research .
Organization Theory and DesignOrganization Analysis Proposal.docxhopeaustin33688
Organization Theory and Design
Organization Analysis Proposal
Due: Sunday February 7 End of day (via email)
Length: maximum 5 pages excluding appendices
IMPORTANT!!!
Saving your document: Please use YOUR CLASS SECTION (e.g. 1pm, 2:30pm), GROUP ORGANIZATION NAME, AND GROUP NUMBER as your file name. For example 1pm_companyname_group#.doc
(Att: 1pm section, you will be assigned a group number on Tuesday January)
Also include your organization name, group number, and section in the subject of your email.
Please note: I need to know and approve your organization of study by Friday February 5.
Information your report should include:
1)The name of the organization the group proposes to study and a list of group members.
2)Description of the organization
A brief description of the organization (i.e. product or service that it provides, location, size, external environment (describe the environmental sectors that have a direct impact on the companies operations, and any other relevant information you think would be appropriate).
3) Assignment of roles and responsibilities
Assignment of roles and responsibilitiesfor each group member, identify task that need to be completed, and deadlines associated with each task. This will clarify who is doing what and timelines for various tasks.
My suggestion is to assign topics according to the chapters of the text. For instance, you could assign each group member one or more chapter(s). The most important or relevant chapters are: structural and contextual variables (chapter #1), strategy and goals (chapter #2), organization structure (chapter #3) , external environment (chapter #4), lifecycle and size (chapter #9) and organizational culture (chapter #11). Other chapters that are important and could be included are: interorganizational relationships (chapter #5), international challenges (chapter #6), mfg technology (chapter #7), (chapter #10), innovation and change (chapter #11), and conflict, power, and politics (chapter #13)
4) Problem Definition:
This section will require you to identify a possible problem, issue, challenge that your organization is facing. If your organization is a publicly traded company, you’ll be able to look online for various problems/challenges facing the company. Otherwise, you may need to contact someone at the organization directly to identify a possible problem/issue facing your organization. Please note that you’ll be able to change your problem/issue at a later date. Provide a reference(s) and citations to explain where you obtained this information.
An except from a previous proposal
There are several issues with UNB’s structure but the main concern is that there is too much centralization and concentration of power at the administration level (org. design issue – relates back to what we’ve discussed in class). Some of the organizational design issues have led to conflicting goals and hinder the capability to meet the overarching strategic go.
AP P E N D I X 1
630
AP P E N D I X 1
Hands-On Guide: How to Analyze a Case Study
Management Information Systems, Ninth Edition provides a
number of case studies for you to analyze. Included in these
cases are questions to help you understand and analyze the
case. You may, however, be assigned other case studies that
do not have questions. This Hands-On Guide presents a
structured framework to help you analyze such cases as well
as the case studies in this text. Knowing how to analyze a case
will help you attack virtually any business problem.
A case study helps students learn by immersing them in a
real-world business scenario where they can act as problem
solvers and decision makers. The case presents facts about a
particular organization. Students are asked to analyze the
case by focusing on the most important facts and using this
information to determine the opportunities and problems
facing that organization. Students are then asked to identify
alternative courses of action to deal with the problems they
identify.
A case study analysis must not merely summarize the
case. It should identify key issues and problems, outline and
assess alternative courses of action, and draw appropriate
conclusions. The case study analysis can be broken down
into the following steps:
1. Identify the most important facts surrounding the case.
2. Identify the key issue or issues.
3. Specify alternative courses of action.
4. Evaluate each course of action.
5. Recommend the best course of action.
Let’s look at what each step involves.
1. Identify the most important facts surrounding the case.
Read the case several times to become familiar with
the information it contains. Pay attention to the infor-
mation in any accompanying exhibits, tables, or fig-
ures. Many case scenarios, as in real life, present a great
deal of detailed information. Some of these facts are
more relevant that others for problem identification.
One can assume the facts and figures in the case are
true, but statements, judgments, or decisions made by
individuals should be questioned. Underline and then
list the most important facts and figures that would
help you define the central problem or issue. If key
facts and numbers are not available, you can make
assumptions, but these assumptions should be reason-
able given the situation. The “correctness” of your con-
clusions may depend on the assumptions you make.
2. Identify the key issue or issues. Use the facts provided
by the case to identify the key issue or issues facing
the company you are studying. Many cases present
multiple issues or problems. Identify the most impor-
tant and separate them from more trivial issues. State
the major problem or challenge facing the company.
You should be able to describe the problem or chal-
lenge in one or two sentences. You should be able to
explain how this problem affects the strategy or per-
formance of the organization.
You will need to explain why the problem occurred.
Does the proble.
Business Driven Information Systems 8th Edition by Paige Baltzan solution man...ssuserf63bd7
https://qidiantiku.com/solution-manual-for-business-driven-information-systems-8th-edition-by-paige-baltzan.shtml
Full download please contact u84757(at)protonmail(dot)com or qidiantiku(dot)com
https://qidiantiku.com/solution-manual-for-business-driven-information-systems-8th-edition-by-paige-baltzan.shtml
Question 1 quCompanies with reputations as good places to work TatianaMajor22
Question 1 : quCompanies with reputations as good places to work have generated superior financial performance." Explain your answer using informed sources?
Companies with reputations as good places to work such as Adobe, Google, LinkedIn, Facebook, and so on have generated superior financial performance because these companies incorporate organizational behavior principles, which are studies that investigates the impact of individuals, groups, and structure have on behavior within organizations for the purpose of applying such knowledge toward improving an organization’s effectiveness into their workplaces. By doing that these companies have been able to yield many important organizational outcomes, that could affect them. Also, these companies with reputations of good places to work at have incorporated the importance of using interpersonal skills within the workplace. By them incorporating interpersonal skills it has helped built a strong association between the quality of workplace relationships and job satisfaction.
Not only does it have a strong association between the quality or workplace relationships and job satisfaction, but it helps when it comes to stress and turnover rates. Incorporating interpersonal skills has resulted in a lower turnover of quality employees and higher quality applications for recruitment. Furthermore, by increasing the OB principles in an organization and incorporating interpersonal skills, it can help foster social responsibility awareness. Which is good for that company or organization because it incorporates social entrepreneurship education into that company to train future leaders in addressing social issues within their organizations.
Robbins, S. P., & Judge, T. A. (2018). Organizational Behavior (18th Edition). Pearson Education (US). https://monroecollege.vitalsource.com/books/9780134729749
Question #2 Regarding the use of technology, how is customer and competitor behavior monitored and measured? Explain your answer using scholarly sources and citations within the text.
Technology is used by big companies such as Google and Facebook, who rely on advertising income for their revenue, which is why they need technology to predict user behavior. Similarly, to Google and Facebook companies like Netflix and Uber use technology to predict when and where customers may want to use their service. Although Netflix and Uber may reply on user subscriptions for revenue, they mostly use technology to track user behavior to provide them with what is best suited for that specific user. An example of how companies use technology to monitor, and measure would be Kroger a U.S grocery store electronically collects information from 55 million customers who have loyalty cards and sells that data to vendors. When we think of companies using technology, we think about big companies or companies who it would benefit the most but according to our textbook insurance firms also use technology for their benefit too. In the t ...
Short Answer questions Part 11.What is the difference between.docxmaoanderton
Short Answer questions Part 1:
1.What is the difference between a database and a DBMS?
Would you consider a DBMS an intermediator between you and the database? Explain your answer.
2.Conduct a search and identify the popular DBMS used in business?
3.Conduct a search and identify an article that describes how databases are used to improve a business. Write a brief summary of the article and provide a link.
4.What is you major? How are databases used to improve the productivity of your particular major? Cite your sources used to answer this question.
5.What type of statements are used to CREATE Tables? DDL or DML?
6.What type of statements are used to INSERT Rows into a Table? DDL or DML?
7.What type of statements are used to UPDATE Rows in a Table? DDL or DML?
8.What type of statements are used to remove a table? DDL or DML?
9.What are some possible tables that you would include if you were building a University database?
10.Pick a table from question 9 and identify potential Columns that would be included in each table.
11.Are all Primary Keys also Candidate Keys? Explain.
12.What makes for a good Primary Key?
13.What are the main disadvantages of using composite Primary Kays?
14.Why do surrogate keys make great primary keys?
15.What is the purpose of a foreign key? Why are they needed in a relational database?
Short Answer Questions Part 1:
1. How does the Rule of One Theme relate to Normalization? Would you consider this part of, or all of the normalization process? Explain.
2.In your own words, describe a DELETE unintended consequence problem. Provide an example.
3.In your own words, describe an UPDATE unintended consequence problem. Provide an
example.
4.In your own words, describe an INSERT unintended consequence problem.
5.Describe an example of a Rule of One Instance problem. How would you fix this problem?
6.Consider A B. In this example, what is A (determinate or functionally dependent)? What is B
(determinate or functionally dependent)?
7.Consider ABDPC. If A B, D, P, C and P C, is this normalized to 3rd NF? If not, explain. In addition, how would you fix it?
8.Consider ABDPC. If ABDPC and BP, is this normalized to 3rd NF? If not, explain. In addition, how would you fix it?
9.Consider ABDPC. If ABDPC, is this normalized to 3rd NF? If not, explain. In addition, how would you fix it?
10. In your own words, what does the term, “every determinate must be a candidate key” mean?
SWOT Analysis
Click on the speaker symbol on each slide
To hear the presentation
Welcome to this session on SWOT analysis.
As part of this week’s discussion on strategic planning we will review the purpose, process and application of SWOT analysis.
1
What is SWOT Analysis
Stands for Strengths, Weaknesses, Opportunities and Threats
A tool to identify and summarize strengths, weaknesses, opportunities and threats of a strategic environment
Tool credited to Albert Humphrey, who led a research .
Number of Pages 5 (Double Spaced)Number of sources 4Writin.docxhopeaustin33688
Number of Pages: 5 (Double Spaced)
Number of sources: 4
Writing Style: APA
Assignment 4: HR Training Class
Due Week 8 and worth 200 points
Imagine that you are a member of the HR department of a small retail company and upper management has asked you to create a new employee customer service training class for all new employees.
Write a six to seven (6-7) pages paper in which you:
1. Justify the use of a needs assessment of your company’s proposed employee customer service training, stressing five (5) ways in which such an assessment would expose any existing performance deficiencies.
2. Develop a customer service training implementation plan and determine the method of training (i.e., presentation, discussion, case study, discovery, role play, simulation, modeling, or on-the-job training).
3. Justify why you selected the training method that you did.
4. Propose two (2) ways to motivate an employee who has no interest in attending a training class.
5. Develop a survey to collect feedback from the employees who attend the training.
6. Use at least three (3) quality academic resources in this assignment. Note: Wikipedia and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Assignment Component
Proficiency
Maximum Points
Mission, Vision, and Values:
Assess the organization’s understanding of the mission, vision, and values, and how they relate the business strategy. Is there consensus on the mission and vision of the organization? What are the shared values of the organization? What are the behaviors espoused by these values?
Assessment of the organization’s understanding of mission, vision, and values is clear and complete. It includes direct examples of relationship to the business strategy.
6/12 points
Strategy Clarification:
Assess the organization’s understanding of the business strategy through interviews with mid-level and senior managers. Assess their understanding and agreement of the business unit’s value proposition, market position, and competitive advantage (these are inputs from M5: Assignment 1).
Assessment of the organization’s understanding of business strategy is clear, complete, and grounded in reason. Examples from the interviews with mid-level and senior managers are used to illustrate or expand ideas.
Assessment of the understanding and agreement of the business unit is clear, complete, and grounded in reason.
9/12 points
Cultural Assessment:
Explain the unwritten rules and shared values.
Here is the brief overview of this cumulative Session Long Project (mealsdeidre
Here is the brief overview of this cumulative Session Long Project (SLP). In this research project, you would work as a marketing consultant to develop a feasible marketing plan for your client. You would conduct secondary research in SLP1 and SLP2 to glean the necessary information for your marketing plan in SLP3 and SLP4.
It is important to conduct quality market research on your focal product/company in order to develop realistic and workable marketing plans. Generally speaking, there are two types of research. One is secondary research, which refers to data collection using existing sources, and the other is primary research, which is your own data collection for the specific study at hand. The purpose of market research is to collect usable information to make more informed decisions on the business problem, thus increasing the chance of business success in the marketplace.
Please check the
outline of the
marketing plan
, which provides information on:
The final format for this cumulative Session Long Project;
A list of topics for the whole project;
The continuity and connections among SLPs 1-4.
In this module SLP1, identify a company and a charge (or task) for this marketing research project and conduct situation analysis related to your charge. This is the first step of this cumulative research project. You need to review all four SLPs first in order to better understand the requirements for this project.
Product Statement
In this section, describe the company and the product that is going to be the focus of interest for your marketing plan. For example, if your client is Apple, provide background information on the organization (e.g., what it is, what it does, history, success in what it is doing, etc.). If the charge is to market a new product (such as iPad 6), describe what iPad is, how long it has been around, how successful it has been, and who the target audience is. Be specific and detail-oriented, and do not assume that the reader is familiar with the company and product.
Identify a company and a charge for your research project at the very beginning, based on the detailed requirements for this cumulative Session Long Project. The new charge is a hypothetical task, which should be based on one of the company’s existing brands or products. It is also better to identify a new product charge for existing public firms so that you can find enough information for your task. For example, you may pick one of the following companies and charges.
Apple needs to increase its market share for iPhone 8.
Microsoft intends to increase sales of Xbox One S 10TB console.
Fitbit plans a successful release of Charge 3 wristband.
Ford needs to have a successful introduction of the 2018 Fusion.
Amazon wants to increase brand awareness for Echo digital media streamer in Japan.
Do not choose the product that is the basis of Case 1.
It is best to check with your instructor regarding the company and the charge you choose to analyz ...
ASB 100Spring 2019Writing Assignment 3In this assignme.docxrandymartin91030
ASB 100
Spring 2019
Writing Assignment 3
In this assignment, you must select a topic, condition, or problem related to ‘water, sanitation, and hygiene’ or climate change that you consider to be a global health priority. This priority needs to be specific rather than a general concept such as ‘climate change.’
After describing the issue and justifying why it is a priority, design a health intervention to address the issue. The intervention must include at least two components: an educational component (e.g. dealing with beliefs and behavior); and an infrastructure or policy component (for example new construction, policy to limit emissions, etc.). For each component, state what you would do as well, why and how your intervention would have an effect, and how you would measure success (e.g. increasing handwashing rates).
You are encouraged to use visuals to help explain your intervention or to provide examples of your interventions. If you use images from the internet, please provide the website where you found the image.
Make sure that you address the ‘who, what, where, when, and why’ issues in both your justification as well as your proposed intervention. For example, do you focus on areas that lack access to adequate sanitation versus places where the quality of services may be an issue? Do you focus on areas that are at highest risk of climate change impacts, or areas that contribute the most to greenhouse gases? Do you focus on urban or rural areas? For the educational component, do you provide ads on tv, billboards, or in schools? Do you focus on adults, teenagers, or children? Do you propose policy at the global or national level?
You must include at least one unique source for each section of the proposal (justification, education/behavior, infrastructure/policy). You may use the same author or institution for each section (such as the World Health Organization), but the documents must be unique for each part. Please make sure that you identify the source of any information you use by using in-text citations (e.g. the WHO (2016) states…), and well as identifying any direct quotations with quotation marks (“”).
Topic:
Justification: (approximately 200 words)
Educational / Behavioral Component: (approximately 300-400 words)
Infrastructure / Policy Component: (approximately 300-400 words)
Citations:
· Ulrich, D. & Smallwood, N. 2004. Capitalizing on capabilities. Harvard Business Review, 82(6):119-127 (C)
· Porter, M. E. (2001). The value chain and competitive advantage. Understanding business processes, Chapter 5, pp. 50-59. The reading is available online at the following link.
· https://books.google.com/books?hl=en&lr=&id=lNEl9R4MWawC&oi=fnd&pg=PT54&dq=porter+value+chain&ots=XCm72AmYMJ&sig=gYW0LThqprzbiDfB1NNnPxIEKA8#v=onepage&q=porter%20value%20chain&f=false
· Porter’s Value Chain Analysis: https://www.toolshero.com/management/value-chain-analysis-porter/
www.hbr.org
A R T I C L E
H B R S
P.
4020 Crews 1
4020 Crews 4
The Least Privilege Principle in Contemporary HR
Nancy Pier
Human Resource Management
The Least Privilege Principle in Contemporary HR
There is a recent trend in contemporary business where enterprises seem to have achieved a collaboration with information technology aimed at improving business efficiency and consequently result in sustainable success. This development has however come with the liability of protecting key identifiable information of each party in a business organization (Dhillon et al., 2017). As it is, governments have put it as a legal obligation for organizations to protect the information of their people as they work towards protecting sensitive information related to business. In the United States alone in 2018, there were 65 successful litigations by employees towards the employer for exposing their information to malicious parties leading to closure of 80% of these businesses due to hefty legal fees (Cockcroft, 2020). Previous studies have attributed secure employee and business information to 45% success in business based on more motivated employees, confidentiality of business information of the firms and favorable reputation by clients (Porter et al., 2019).
The current situation points to the necessity in the application of the least privilege principle based on the numerous success stories upon its application. There is evidence that the implementation of this principle in the homeland department of security led to 78% reduction of loss of crucial information for the department, 71 % reduction of witness and whistle blower information leakage and efficient classification of information an aspect that aids investigative efficiency in the departments (Hammad et al., 2019). Experts aver that cloud computing, is not enough to protect important information and point to role based access, the foundation of the least privilege principle, as the next reliable pillar for workplace and business safety. This subject is particularly vital in human resource management practice as the department is the custodian of employee information and is tasked with capacitating employees.
Interestingly, under the period of the boom in internet technologies and their application in business processes, there has been cases of insider trading where businesses have lost huge investment money and their operating reputations. A study on the effects of employee data insecurity, in Texas, indicated that last year, 2019, 28% of employees reached by the survey reported at least one case of bullying as unauthorized parties accessed their key identifiable information (Sennewald & Baillie, 2020). The study further indicated that this.
Case StudyIn March 1994, Randal Schwartz was indicted on three f.docxwendolynhalbert
Case Study
In March 1994, Randal Schwartz was indicted on three felony counts under the Oregon State Computer Crime Law and sentenced to 5 years of probation. 480 hours of community service, 90 days of deferred jail time, $68,000 of restitution to Intel, and disclosure of full details surrounding conviction to any future employer. The complaint against Randal Schwartz was brought by Intel Corporation, a multinational microchip manufacturer. The charges related to altering two computer systems without authorization and accessing a computer with intent to commit theft. Randal Schwartz is a perfect example of someone who does not fit into the stereotype of hackers. Anyone familiar with Perl will know Schwartz as the author of the definitive Perl instruction guide, Learning Perl. Schwartz is a frequent columnist for such technical magazines as Unix Review and Web Techniques. Randal Schwartz was a consultant for Intel in Oregon for three years before the indictment. Schwartz’s crimes are a result of what he says were “good intentions.” Although Schwartz is well respected in the community, he has been criticized for his unprofessional and irresponsible conduct as a consultant, thus being subjected to a lot of controversy. Schwartz claimed that because of jos travels and invitations to lecture on Perl, he needed an easy way to access his e-mail at Intel. Without seeking requisite permissions, Schwartz modified the systems so as to access his account outside of the organization. He also installed the Crack software on the systems, which enabled him to capture nearly 50 passwords.
In his defense, Schwartz argued that he was merely helping the company by checking the security of systems. This could have been an excellent explanation except for the fact that in police reports. Randal told the officers that thought he could be criminally prosecuted for these incidents. “When asked why he stole 40 or 50 passwords. Schwartz told detectives. “I needed them in case they caught me doing it and I knew they would shut me down, so the more passwords I had, the longer I could continue doing what I wanted to do.” Schwartz also admitted that this wasn’t the first time he had done things against Intel’s policy. He had been previously caught accessing the systems from outside the company and had been warned on several occasions.
Schwartz Case Study
Organizations need to be concerned with breaches of security from internal sources as much (if not more) as from outside sources. Employees and consultants in an organization often need sensitive information. How can the organization provide access, but still protect against improper usage of this information?
Read the Case Study at the end of Chapter 10. With your group, act as hired consultants and write a 1- to 2-page group report that determines what steps you would recommend for the company to ensure that their security policies are not violated. One of the CEO's goals is to keep from burdening the employees with ...
this assignment is about Mesopotamia and Egypt. Some of these cu.docxOllieShoresna
this assignment is about
Mesopotamia and Egyp
t. Some of these cultures lasted centuries, others such as Egypt lasted millennia. The goal of this prompt is to dig deeper into the power of religion and visual representations of power from rulers on human culture.
The themes of religion and power dominate artwork from this era of art history. What is the importance of these themes relative to the civilizations at the time? How do these themes manifest themselves in works of art? Choose one culture (Sumerian, Babylonian, Assyrian, Egyptian, etc) and support your answer to that one culture describing specific artifacts.
The goal here is an analysis of a single artifact in support of the theme. Be sure to review week 1's material on writing about art to help you with structuring a response.
Please remember to use MLA format when organizing your response. This means proper in-text citations, captions for images, and references for any work that is cited in-text.
.
This assignment has two goals 1) have students increase their under.docxOllieShoresna
This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly use the tools and techniques within Word to format a research paper, including use of available References and citation tools. These skills will be valuable throughout a student’s academic career. The paper will require a title page, NO abstract, three to four full pages of content with incorporation of a minimum of 3 external resources from credible sources and a Works Cited/References page. Wikipedia and similar general information sites, blogs or discussion groups are not considered creditable sources for a research project. No more than 10% of the paper may be in the form of a direct citation from an external source.
.
This assignment has two parts 1 paragraph per questionIn wh.docxOllieShoresna
This assignment has two parts: 1 paragraph per question
In what instances would Wikipedia be of benefit in conducting research necessary to develop quality deliverables?
what are the drawbacks of using Wikipedia as a primary academic source for conducting research necessary to develop quality deliverables.
.
This assignment is a minimum of 100 word all parts of each querstion.docxOllieShoresna
This assignment is a minimum of 100 word all parts of each querstion MUST be answered
1)
What is an example of past trends pertaining to the development and operation of community based corrections? How does institutional corrections and community corrections differ in relation to operations and development? How can we improve the development and operation of corrections by utilizing past, current, and future trends?
2)
What are the technological functions within correctional environments? How do technological functions relate to security and management functions within correctional environments? What would happen if there was a disconnect among these areas of a correctional facility?
3)
What are the technological functions within correctional environments? How do technological functions relate to security and management functions within correctional environments? What would happen if there was a disconnect among these areas of a correctional facility?
.
This assignment has three elements a traditional combination format.docxOllieShoresna
This assignment has three elements: a traditional combination format resume, a cover letter, and a reference sheet
. Cover letter is no more than one page (3-6 paragraphs) in length
The cover letter must be written to a real company for a real job in Pittsburg, PA.
Please direct a person's name with a complete address. Be sure to use the appropriate salutation such as Mr., Ms., Dr., etc.
Make sure that you have varied your sentence structure so that every sentence does not begin with "I"
Important information about myself:
Name : Nicolas J, an international student from France
Major: Management Information System
Skills: speak two language, native language is France, and second language is English.
Experience: five years working in Freeze company (from 2007 to 2012) in France at IT department before I came to the U.S. to study MIS.
Note: see the attached document for samples of a cover letter and a reference sheet
.
This assignment has four partsWhat changes in business software p.docxOllieShoresna
This assignment has four parts:
What changes in business software platforms have you experienced, and what was the driving force behind the change?
What important trends in business hardware are occurring? What relationship do you see happening between hardware changes and software? In your experience, which seems to drive the other and why?
How important do you perceive databases and data mining to business? How could a small business take advantage of the technology?
In your opinion, should software dictate business processes or should the business process dictate the software structure? Why? What are the risks?
.
This assignment consists of two partsthe core evaluation, a.docxOllieShoresna
This assignment consists of two parts:
the core evaluation,
and
the plan for extending the evaluation through research
in the
Illinois University
, and in sources that will increase the context of the evaluation even further.
My core essay (4 pages) would discuss these criteria through examples, and explanation of why they are important. In developing this essay, I could also use description, definition, comparison/contrast and cause and effect, since these are also ways to evaluate something. My goal is to provide an evaluation that readers find reasonable and thorough.
What I want to come up with based on this questioning, is a plan for research that includes discussion of who I would go to for information and why, a list of potential survey and interview questions and an annotated bibliography with a minimum of three sources accessed through Booth Library databases.
this project is related to my university just look the attached paper for further information.
.
This assignment asks you to analyze a significant textual elemen.docxOllieShoresna
This assignment asks you to analyze a significant textual element from “Welcome to Dataland”. First, provide a brief summary (1-2 sentences) of the essay, including an explanation of Bogost’s main claim. Next, using your tools for textual analysis, identify
one
key element of the text from Bogost’s essay and analyze the significance of this element. How does it contribute to the text’s purpose? In what ways does it relate to the essay’s main claim? How does it impact how an audience receives or interprets the text?
.
This assignment allows you to learn more about one key person in Jew.docxOllieShoresna
This assignment allows you to learn more about one key person in Jewish history and to relate that person to any specific rituals in Judaism today. In doing so, you will also learn how your chosen individual fits into the larger history of the religion.
Part 1
Complete
the University of Phoenix Material: Common Holy Days in Jewish Religious Traditions Worksheet to help you as you reflect on Part 2 of this assignment.
Part 2
Write
a 750-word paper that includes the following:
A summary of the life and importance of one key person in ancient Jewish history (chosing either Abraham, Moses, David, Solomon, Esther or Ezra will make it the easiest to complete the next two instructions)
An explanation of one key event in the history of Judaism that is connected to that person
A description of any rituals, symbols, or sacred texts in Judaism associated with this event or person
An example of how this person's story helped to develop the ideas of Jewish ethics
Format
your assignment according to appropriate course-level APA guidelines.
.
This assignment allows you to explore the effects of social influe.docxOllieShoresna
This assignment allows you to explore the effects of social influences on personal development.
Write
a 1,050- to 1,400-word paper in which you examine the concept of the self. Address the following:
·
Identify who was in the radius of significant others that shaped your development through your toddler, child, and adolescent years.
·
Identify verbal messages you recall that suggested situational or dispositional attributions about you.
·
Describe how you developed your current attitudes toward authority, competitors, subordinates, the opposite sex, or another generation.
·
Explore the effects your social world has had on your developing professional identity.
Cite
at least 2 scholarly references.
Format
your paper according to APA guidelines.
Click
the Assignment Files tab to submit your assignment.
This assignment is based on my low-self-esteem. My mother would be the one who shaped my
development. Follow the instructions. Please have the heading
The Self in the Social World
and the running head.
.
This assignment addresses pretrial procedures that occur prior to th.docxOllieShoresna
This assignment addresses pretrial procedures that occur prior to the trial but not the trial itself. Subjects included
but are not limited to
: first appearance, alternatives to bail, Grand Jury proceedings, plea-bargaining, and federal rules of procedures for plea-bargaining. In addition to topics listed in the syllabus, additional information from the textbook and research references is required.
.
This assignment allows you to learn more about one key person in J.docxOllieShoresna
This assignment allows you to learn more about one key person in Jewish history and to relate that person to any specific rituals in Judaism today. In doing so, you will also learn how your chosen individual fits into the larger history of the religion.
Part 1
Complete
the University of Phoenix Material: Common Holy Days in Jewish Religious Traditions Worksheet to help you as you reflect on Part 2 of this assignment.
Part 2
Write
a 700- to 1,050-word paper that includes the following:
A summary of the life and importance of one key person in Jewish history
An explanation of one key event in the history of Judaism that is connected to that person
A description of any rituals, symbols, or sacred texts in Judaism associated with this event or person
Brief explanation of Jewish ethics
Format
your assignment according to appropriate course-level APA guidelines.
Submit
your assignment to the Assignment Files tab
.
This assignment allows you to explore the effects of social infl.docxOllieShoresna
This assignment allows you to explore the effects of social influences on personal development.
Write
a 1,050- to 1,400-word paper in which you examine the concept of the self. Address the following:
Identify who was in the radius of significant others that shaped your development through your toddler, child, and adolescent years.
Identify verbal messages you recall that suggested situational or dispositional attributions about you.
Describe how you developed your current attitudes toward authority, competitors, subordinates, the opposite sex, or another generation.
Explore the effects your social world has had on your developing professional identity.
Cite
at least 2 scholarly references.
Format
your paper according to APA guidelines.
.
this about communication please i eant you answer this question.docxOllieShoresna
this about communication >>>
please i eant you answer this question from book Milestones in Mass Communication Research: Media Research, 3rd ED
Lowery &Defleur ISBN 0-8013-1437-2
I will submit the question and please the answer re write and own word i want rephrase the answer
i add some answor to help you to answer the question and please rephrase and write own words please i want use the book to find correct answer
.
Think of a time when a company did not process an order or perform a.docxOllieShoresna
Think of a time when a company did not process an order or perform a service for you in a timely manner.
What was your reaction?
What actions did the company take to correct the situation?
What actions would you have liked for the company to take?
Discuss possible reasons why the company was not able to complete your order/service in a timely manner and suggest potential areas for improvement.
4 Paragraph minimum.
.
More Related Content
Similar to CUSTOMER SEGMENTATION ANALYSIS OF ELECTRONIC GOODS A MACHINE LEA
Number of Pages 5 (Double Spaced)Number of sources 4Writin.docxhopeaustin33688
Number of Pages: 5 (Double Spaced)
Number of sources: 4
Writing Style: APA
Assignment 4: HR Training Class
Due Week 8 and worth 200 points
Imagine that you are a member of the HR department of a small retail company and upper management has asked you to create a new employee customer service training class for all new employees.
Write a six to seven (6-7) pages paper in which you:
1. Justify the use of a needs assessment of your company’s proposed employee customer service training, stressing five (5) ways in which such an assessment would expose any existing performance deficiencies.
2. Develop a customer service training implementation plan and determine the method of training (i.e., presentation, discussion, case study, discovery, role play, simulation, modeling, or on-the-job training).
3. Justify why you selected the training method that you did.
4. Propose two (2) ways to motivate an employee who has no interest in attending a training class.
5. Develop a survey to collect feedback from the employees who attend the training.
6. Use at least three (3) quality academic resources in this assignment. Note: Wikipedia and other Websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
· Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
· Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Assignment Component
Proficiency
Maximum Points
Mission, Vision, and Values:
Assess the organization’s understanding of the mission, vision, and values, and how they relate the business strategy. Is there consensus on the mission and vision of the organization? What are the shared values of the organization? What are the behaviors espoused by these values?
Assessment of the organization’s understanding of mission, vision, and values is clear and complete. It includes direct examples of relationship to the business strategy.
6/12 points
Strategy Clarification:
Assess the organization’s understanding of the business strategy through interviews with mid-level and senior managers. Assess their understanding and agreement of the business unit’s value proposition, market position, and competitive advantage (these are inputs from M5: Assignment 1).
Assessment of the organization’s understanding of business strategy is clear, complete, and grounded in reason. Examples from the interviews with mid-level and senior managers are used to illustrate or expand ideas.
Assessment of the understanding and agreement of the business unit is clear, complete, and grounded in reason.
9/12 points
Cultural Assessment:
Explain the unwritten rules and shared values.
Here is the brief overview of this cumulative Session Long Project (mealsdeidre
Here is the brief overview of this cumulative Session Long Project (SLP). In this research project, you would work as a marketing consultant to develop a feasible marketing plan for your client. You would conduct secondary research in SLP1 and SLP2 to glean the necessary information for your marketing plan in SLP3 and SLP4.
It is important to conduct quality market research on your focal product/company in order to develop realistic and workable marketing plans. Generally speaking, there are two types of research. One is secondary research, which refers to data collection using existing sources, and the other is primary research, which is your own data collection for the specific study at hand. The purpose of market research is to collect usable information to make more informed decisions on the business problem, thus increasing the chance of business success in the marketplace.
Please check the
outline of the
marketing plan
, which provides information on:
The final format for this cumulative Session Long Project;
A list of topics for the whole project;
The continuity and connections among SLPs 1-4.
In this module SLP1, identify a company and a charge (or task) for this marketing research project and conduct situation analysis related to your charge. This is the first step of this cumulative research project. You need to review all four SLPs first in order to better understand the requirements for this project.
Product Statement
In this section, describe the company and the product that is going to be the focus of interest for your marketing plan. For example, if your client is Apple, provide background information on the organization (e.g., what it is, what it does, history, success in what it is doing, etc.). If the charge is to market a new product (such as iPad 6), describe what iPad is, how long it has been around, how successful it has been, and who the target audience is. Be specific and detail-oriented, and do not assume that the reader is familiar with the company and product.
Identify a company and a charge for your research project at the very beginning, based on the detailed requirements for this cumulative Session Long Project. The new charge is a hypothetical task, which should be based on one of the company’s existing brands or products. It is also better to identify a new product charge for existing public firms so that you can find enough information for your task. For example, you may pick one of the following companies and charges.
Apple needs to increase its market share for iPhone 8.
Microsoft intends to increase sales of Xbox One S 10TB console.
Fitbit plans a successful release of Charge 3 wristband.
Ford needs to have a successful introduction of the 2018 Fusion.
Amazon wants to increase brand awareness for Echo digital media streamer in Japan.
Do not choose the product that is the basis of Case 1.
It is best to check with your instructor regarding the company and the charge you choose to analyz ...
ASB 100Spring 2019Writing Assignment 3In this assignme.docxrandymartin91030
ASB 100
Spring 2019
Writing Assignment 3
In this assignment, you must select a topic, condition, or problem related to ‘water, sanitation, and hygiene’ or climate change that you consider to be a global health priority. This priority needs to be specific rather than a general concept such as ‘climate change.’
After describing the issue and justifying why it is a priority, design a health intervention to address the issue. The intervention must include at least two components: an educational component (e.g. dealing with beliefs and behavior); and an infrastructure or policy component (for example new construction, policy to limit emissions, etc.). For each component, state what you would do as well, why and how your intervention would have an effect, and how you would measure success (e.g. increasing handwashing rates).
You are encouraged to use visuals to help explain your intervention or to provide examples of your interventions. If you use images from the internet, please provide the website where you found the image.
Make sure that you address the ‘who, what, where, when, and why’ issues in both your justification as well as your proposed intervention. For example, do you focus on areas that lack access to adequate sanitation versus places where the quality of services may be an issue? Do you focus on areas that are at highest risk of climate change impacts, or areas that contribute the most to greenhouse gases? Do you focus on urban or rural areas? For the educational component, do you provide ads on tv, billboards, or in schools? Do you focus on adults, teenagers, or children? Do you propose policy at the global or national level?
You must include at least one unique source for each section of the proposal (justification, education/behavior, infrastructure/policy). You may use the same author or institution for each section (such as the World Health Organization), but the documents must be unique for each part. Please make sure that you identify the source of any information you use by using in-text citations (e.g. the WHO (2016) states…), and well as identifying any direct quotations with quotation marks (“”).
Topic:
Justification: (approximately 200 words)
Educational / Behavioral Component: (approximately 300-400 words)
Infrastructure / Policy Component: (approximately 300-400 words)
Citations:
· Ulrich, D. & Smallwood, N. 2004. Capitalizing on capabilities. Harvard Business Review, 82(6):119-127 (C)
· Porter, M. E. (2001). The value chain and competitive advantage. Understanding business processes, Chapter 5, pp. 50-59. The reading is available online at the following link.
· https://books.google.com/books?hl=en&lr=&id=lNEl9R4MWawC&oi=fnd&pg=PT54&dq=porter+value+chain&ots=XCm72AmYMJ&sig=gYW0LThqprzbiDfB1NNnPxIEKA8#v=onepage&q=porter%20value%20chain&f=false
· Porter’s Value Chain Analysis: https://www.toolshero.com/management/value-chain-analysis-porter/
www.hbr.org
A R T I C L E
H B R S
P.
4020 Crews 1
4020 Crews 4
The Least Privilege Principle in Contemporary HR
Nancy Pier
Human Resource Management
The Least Privilege Principle in Contemporary HR
There is a recent trend in contemporary business where enterprises seem to have achieved a collaboration with information technology aimed at improving business efficiency and consequently result in sustainable success. This development has however come with the liability of protecting key identifiable information of each party in a business organization (Dhillon et al., 2017). As it is, governments have put it as a legal obligation for organizations to protect the information of their people as they work towards protecting sensitive information related to business. In the United States alone in 2018, there were 65 successful litigations by employees towards the employer for exposing their information to malicious parties leading to closure of 80% of these businesses due to hefty legal fees (Cockcroft, 2020). Previous studies have attributed secure employee and business information to 45% success in business based on more motivated employees, confidentiality of business information of the firms and favorable reputation by clients (Porter et al., 2019).
The current situation points to the necessity in the application of the least privilege principle based on the numerous success stories upon its application. There is evidence that the implementation of this principle in the homeland department of security led to 78% reduction of loss of crucial information for the department, 71 % reduction of witness and whistle blower information leakage and efficient classification of information an aspect that aids investigative efficiency in the departments (Hammad et al., 2019). Experts aver that cloud computing, is not enough to protect important information and point to role based access, the foundation of the least privilege principle, as the next reliable pillar for workplace and business safety. This subject is particularly vital in human resource management practice as the department is the custodian of employee information and is tasked with capacitating employees.
Interestingly, under the period of the boom in internet technologies and their application in business processes, there has been cases of insider trading where businesses have lost huge investment money and their operating reputations. A study on the effects of employee data insecurity, in Texas, indicated that last year, 2019, 28% of employees reached by the survey reported at least one case of bullying as unauthorized parties accessed their key identifiable information (Sennewald & Baillie, 2020). The study further indicated that this.
Case StudyIn March 1994, Randal Schwartz was indicted on three f.docxwendolynhalbert
Case Study
In March 1994, Randal Schwartz was indicted on three felony counts under the Oregon State Computer Crime Law and sentenced to 5 years of probation. 480 hours of community service, 90 days of deferred jail time, $68,000 of restitution to Intel, and disclosure of full details surrounding conviction to any future employer. The complaint against Randal Schwartz was brought by Intel Corporation, a multinational microchip manufacturer. The charges related to altering two computer systems without authorization and accessing a computer with intent to commit theft. Randal Schwartz is a perfect example of someone who does not fit into the stereotype of hackers. Anyone familiar with Perl will know Schwartz as the author of the definitive Perl instruction guide, Learning Perl. Schwartz is a frequent columnist for such technical magazines as Unix Review and Web Techniques. Randal Schwartz was a consultant for Intel in Oregon for three years before the indictment. Schwartz’s crimes are a result of what he says were “good intentions.” Although Schwartz is well respected in the community, he has been criticized for his unprofessional and irresponsible conduct as a consultant, thus being subjected to a lot of controversy. Schwartz claimed that because of jos travels and invitations to lecture on Perl, he needed an easy way to access his e-mail at Intel. Without seeking requisite permissions, Schwartz modified the systems so as to access his account outside of the organization. He also installed the Crack software on the systems, which enabled him to capture nearly 50 passwords.
In his defense, Schwartz argued that he was merely helping the company by checking the security of systems. This could have been an excellent explanation except for the fact that in police reports. Randal told the officers that thought he could be criminally prosecuted for these incidents. “When asked why he stole 40 or 50 passwords. Schwartz told detectives. “I needed them in case they caught me doing it and I knew they would shut me down, so the more passwords I had, the longer I could continue doing what I wanted to do.” Schwartz also admitted that this wasn’t the first time he had done things against Intel’s policy. He had been previously caught accessing the systems from outside the company and had been warned on several occasions.
Schwartz Case Study
Organizations need to be concerned with breaches of security from internal sources as much (if not more) as from outside sources. Employees and consultants in an organization often need sensitive information. How can the organization provide access, but still protect against improper usage of this information?
Read the Case Study at the end of Chapter 10. With your group, act as hired consultants and write a 1- to 2-page group report that determines what steps you would recommend for the company to ensure that their security policies are not violated. One of the CEO's goals is to keep from burdening the employees with ...
Similar to CUSTOMER SEGMENTATION ANALYSIS OF ELECTRONIC GOODS A MACHINE LEA (7)
this assignment is about Mesopotamia and Egypt. Some of these cu.docxOllieShoresna
this assignment is about
Mesopotamia and Egyp
t. Some of these cultures lasted centuries, others such as Egypt lasted millennia. The goal of this prompt is to dig deeper into the power of religion and visual representations of power from rulers on human culture.
The themes of religion and power dominate artwork from this era of art history. What is the importance of these themes relative to the civilizations at the time? How do these themes manifest themselves in works of art? Choose one culture (Sumerian, Babylonian, Assyrian, Egyptian, etc) and support your answer to that one culture describing specific artifacts.
The goal here is an analysis of a single artifact in support of the theme. Be sure to review week 1's material on writing about art to help you with structuring a response.
Please remember to use MLA format when organizing your response. This means proper in-text citations, captions for images, and references for any work that is cited in-text.
.
This assignment has two goals 1) have students increase their under.docxOllieShoresna
This assignment has two goals: 1) have students increase their understanding of the concept of Protecting Personal Information (PPI) and other ethical issues related to the use of information technology through research, and 2) learn to correctly use the tools and techniques within Word to format a research paper, including use of available References and citation tools. These skills will be valuable throughout a student’s academic career. The paper will require a title page, NO abstract, three to four full pages of content with incorporation of a minimum of 3 external resources from credible sources and a Works Cited/References page. Wikipedia and similar general information sites, blogs or discussion groups are not considered creditable sources for a research project. No more than 10% of the paper may be in the form of a direct citation from an external source.
.
This assignment has two parts 1 paragraph per questionIn wh.docxOllieShoresna
This assignment has two parts: 1 paragraph per question
In what instances would Wikipedia be of benefit in conducting research necessary to develop quality deliverables?
what are the drawbacks of using Wikipedia as a primary academic source for conducting research necessary to develop quality deliverables.
.
This assignment is a minimum of 100 word all parts of each querstion.docxOllieShoresna
This assignment is a minimum of 100 word all parts of each querstion MUST be answered
1)
What is an example of past trends pertaining to the development and operation of community based corrections? How does institutional corrections and community corrections differ in relation to operations and development? How can we improve the development and operation of corrections by utilizing past, current, and future trends?
2)
What are the technological functions within correctional environments? How do technological functions relate to security and management functions within correctional environments? What would happen if there was a disconnect among these areas of a correctional facility?
3)
What are the technological functions within correctional environments? How do technological functions relate to security and management functions within correctional environments? What would happen if there was a disconnect among these areas of a correctional facility?
.
This assignment has three elements a traditional combination format.docxOllieShoresna
This assignment has three elements: a traditional combination format resume, a cover letter, and a reference sheet
. Cover letter is no more than one page (3-6 paragraphs) in length
The cover letter must be written to a real company for a real job in Pittsburg, PA.
Please direct a person's name with a complete address. Be sure to use the appropriate salutation such as Mr., Ms., Dr., etc.
Make sure that you have varied your sentence structure so that every sentence does not begin with "I"
Important information about myself:
Name : Nicolas J, an international student from France
Major: Management Information System
Skills: speak two language, native language is France, and second language is English.
Experience: five years working in Freeze company (from 2007 to 2012) in France at IT department before I came to the U.S. to study MIS.
Note: see the attached document for samples of a cover letter and a reference sheet
.
This assignment has four partsWhat changes in business software p.docxOllieShoresna
This assignment has four parts:
What changes in business software platforms have you experienced, and what was the driving force behind the change?
What important trends in business hardware are occurring? What relationship do you see happening between hardware changes and software? In your experience, which seems to drive the other and why?
How important do you perceive databases and data mining to business? How could a small business take advantage of the technology?
In your opinion, should software dictate business processes or should the business process dictate the software structure? Why? What are the risks?
.
This assignment consists of two partsthe core evaluation, a.docxOllieShoresna
This assignment consists of two parts:
the core evaluation,
and
the plan for extending the evaluation through research
in the
Illinois University
, and in sources that will increase the context of the evaluation even further.
My core essay (4 pages) would discuss these criteria through examples, and explanation of why they are important. In developing this essay, I could also use description, definition, comparison/contrast and cause and effect, since these are also ways to evaluate something. My goal is to provide an evaluation that readers find reasonable and thorough.
What I want to come up with based on this questioning, is a plan for research that includes discussion of who I would go to for information and why, a list of potential survey and interview questions and an annotated bibliography with a minimum of three sources accessed through Booth Library databases.
this project is related to my university just look the attached paper for further information.
.
This assignment asks you to analyze a significant textual elemen.docxOllieShoresna
This assignment asks you to analyze a significant textual element from “Welcome to Dataland”. First, provide a brief summary (1-2 sentences) of the essay, including an explanation of Bogost’s main claim. Next, using your tools for textual analysis, identify
one
key element of the text from Bogost’s essay and analyze the significance of this element. How does it contribute to the text’s purpose? In what ways does it relate to the essay’s main claim? How does it impact how an audience receives or interprets the text?
.
This assignment allows you to learn more about one key person in Jew.docxOllieShoresna
This assignment allows you to learn more about one key person in Jewish history and to relate that person to any specific rituals in Judaism today. In doing so, you will also learn how your chosen individual fits into the larger history of the religion.
Part 1
Complete
the University of Phoenix Material: Common Holy Days in Jewish Religious Traditions Worksheet to help you as you reflect on Part 2 of this assignment.
Part 2
Write
a 750-word paper that includes the following:
A summary of the life and importance of one key person in ancient Jewish history (chosing either Abraham, Moses, David, Solomon, Esther or Ezra will make it the easiest to complete the next two instructions)
An explanation of one key event in the history of Judaism that is connected to that person
A description of any rituals, symbols, or sacred texts in Judaism associated with this event or person
An example of how this person's story helped to develop the ideas of Jewish ethics
Format
your assignment according to appropriate course-level APA guidelines.
.
This assignment allows you to explore the effects of social influe.docxOllieShoresna
This assignment allows you to explore the effects of social influences on personal development.
Write
a 1,050- to 1,400-word paper in which you examine the concept of the self. Address the following:
·
Identify who was in the radius of significant others that shaped your development through your toddler, child, and adolescent years.
·
Identify verbal messages you recall that suggested situational or dispositional attributions about you.
·
Describe how you developed your current attitudes toward authority, competitors, subordinates, the opposite sex, or another generation.
·
Explore the effects your social world has had on your developing professional identity.
Cite
at least 2 scholarly references.
Format
your paper according to APA guidelines.
Click
the Assignment Files tab to submit your assignment.
This assignment is based on my low-self-esteem. My mother would be the one who shaped my
development. Follow the instructions. Please have the heading
The Self in the Social World
and the running head.
.
This assignment addresses pretrial procedures that occur prior to th.docxOllieShoresna
This assignment addresses pretrial procedures that occur prior to the trial but not the trial itself. Subjects included
but are not limited to
: first appearance, alternatives to bail, Grand Jury proceedings, plea-bargaining, and federal rules of procedures for plea-bargaining. In addition to topics listed in the syllabus, additional information from the textbook and research references is required.
.
This assignment allows you to learn more about one key person in J.docxOllieShoresna
This assignment allows you to learn more about one key person in Jewish history and to relate that person to any specific rituals in Judaism today. In doing so, you will also learn how your chosen individual fits into the larger history of the religion.
Part 1
Complete
the University of Phoenix Material: Common Holy Days in Jewish Religious Traditions Worksheet to help you as you reflect on Part 2 of this assignment.
Part 2
Write
a 700- to 1,050-word paper that includes the following:
A summary of the life and importance of one key person in Jewish history
An explanation of one key event in the history of Judaism that is connected to that person
A description of any rituals, symbols, or sacred texts in Judaism associated with this event or person
Brief explanation of Jewish ethics
Format
your assignment according to appropriate course-level APA guidelines.
Submit
your assignment to the Assignment Files tab
.
This assignment allows you to explore the effects of social infl.docxOllieShoresna
This assignment allows you to explore the effects of social influences on personal development.
Write
a 1,050- to 1,400-word paper in which you examine the concept of the self. Address the following:
Identify who was in the radius of significant others that shaped your development through your toddler, child, and adolescent years.
Identify verbal messages you recall that suggested situational or dispositional attributions about you.
Describe how you developed your current attitudes toward authority, competitors, subordinates, the opposite sex, or another generation.
Explore the effects your social world has had on your developing professional identity.
Cite
at least 2 scholarly references.
Format
your paper according to APA guidelines.
.
this about communication please i eant you answer this question.docxOllieShoresna
this about communication >>>
please i eant you answer this question from book Milestones in Mass Communication Research: Media Research, 3rd ED
Lowery &Defleur ISBN 0-8013-1437-2
I will submit the question and please the answer re write and own word i want rephrase the answer
i add some answor to help you to answer the question and please rephrase and write own words please i want use the book to find correct answer
.
Think of a time when a company did not process an order or perform a.docxOllieShoresna
Think of a time when a company did not process an order or perform a service for you in a timely manner.
What was your reaction?
What actions did the company take to correct the situation?
What actions would you have liked for the company to take?
Discuss possible reasons why the company was not able to complete your order/service in a timely manner and suggest potential areas for improvement.
4 Paragraph minimum.
.
Think_Vision W5- Importance of VaccinationImportance of Vaccinatio.docxOllieShoresna
Think_Vision W5- Importance of Vaccination
Importance of Vaccination
Mary's one year old daughter is due to be given the Measles, Mumps, and Rubella (MMR) vaccine during her next visit to the doctor. Mary is upset and concerned because one of her friend's sons became ill after a similar vaccination. She has also heard rumors that MMR vaccine causes rubella. Mary was also told that her daughter will need to be vaccinated before Mary returns to work.
Mary is not alone. Many parents face this issue. Therefore, it is important for Mary and all such parents to make decisions that are best for their children, based on facts and not emotions.
Place yourself in the role of a health care worker, submit to the discussion area your plan to validate the importance of vaccination by addressing the following questions:
Why are vaccinations necessary components of the healthcare programs?
Are there reasons for people not being vaccinated despite of such elaborate healthcare programs? Explain.
What are the consequences of people not being vaccinated?
What is the impact of religious, cultural, legal, and ethical issues that parents need to consider before vaccination?
What type of information will help the parents make an informed decision about vaccinating their children?
NEED TO BE VERY SPECIFIC VERY DETAILED IS EXTREMLY IMORTANT THIS ONE
.
Thinks for both only 50 words as much for each one1-xxxxd, unf.docxOllieShoresna
Thinks for both only 50 words as much for each one
1
-xxxxd, unfortunately there isn’t any Ethical Code of Conduct that all countries follow to the letter. “When in Rome, you act as the Romans does.” Therefore, Chiquita did what they thought was right under the circumstances. Rather it was for profit or to save the lives of its employees. Their decision may have been considered unethical by the United States standards. But, to them it was the right thing to do to eliminate human causality. A lot of these atrocities stem from the wide gap in wealth distribution, corruption, and greed at the highest level in the government infrastructure. Not too long ago in the distant past in the United States, the government, politicians, influential business men and part of society partake in various atrocities as well against several groups of people all in the name of greed, profit, and racism. At the time, they felt their actions was justified, and continued the course without deviation.
2
-I enjoyed reading your response to question 6 on the civil death policy legal terminology persay. It helped me to understand more clearly that they would be denied rights such as voting, holding public office etc. It is truly not a black or white answer, but a very gray area. I know in some instances yes I could see businesses get that but due to the circumstances they were truly put into a no win situation. Even if they went to the authorities they would probably have been found out and then they would end up still tortured and killed.
this is about the chiquita case.
.
Think of a specific change you would like to bring to your organizat.docxOllieShoresna
Think of a specific change you would like to bring to your organization. Describe the change, the value that you believe the change would bring to the organization, and the methodology that you would use (top-down or bottom-up) in order to implement the change.
I would have mangement work with the employees who would be affected rather than managers making a change and it being a total nightmare. So I would do bottom up.
.
Think of a possible change initiative in your selected organization..docxOllieShoresna
Think of a possible change initiative in your selected organization.
This could be the one you identified in Unit 3. Briefly describe the initiative.
Identify the possible stakeholders – those people or organizations that would positively or negatively affect a successful outcome.
Identify two key stakeholders who would be supportive of the initiative and two who would resist it. Provide recommendations for
PLEASE SEE and FOLLOW the instructions on the Attached Rubric
.
Thinking About Research PaperConsider the research question and .docxOllieShoresna
Thinking About Research Paper
Consider
the research question and hypothesis you created in Week 3, as well as the information you summarized in your literature review in Week 2.
Write
a 4- to 6-page paper that explains the most appropriate research methods for your chosen topic. Keep in mind the following guidelines:
Identify at least two different research methods that could be used to investigate whether your hypothesis is accurate. You may wish to consider quantitative research, secondary data analysis, ethnographic studies, participant observation, or in-depth interviews.
Evaluate the appropriateness of each by explaining their advantages and disadvantages.
Explain which of the two methods you believe is the most appropriate.
Explain specifically how you could use this method to study your research question.
Use
APA writing style guidelines.
Include
an APA-style formatted references page listing the articles you selected.
Hypothesis: Police departments nationwide need to change their mindsets and policies to attract the modern millennial police recruits today.
Must receive by 2/2/2017 by 2000
.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
CUSTOMER SEGMENTATION ANALYSIS OF ELECTRONIC GOODS A MACHINE LEA
1. CUSTOMER SEGMENTATION ANALYSIS OF ELECTRONIC
GOODS
A MACHINE LEARNING APPROACH - Machine Learning and
Optimization
Abstract
There seems to be a lot of competition among competing firms
to attract new customers and hold on to existing ones as a result
of the creation of numerous competitors and entrepreneurs.
Because of the above, providing excellent customer service is
necessary regardless of the size of the company. Furthermore,
the capacity of any company to comprehend the requirements of
each of its clients will enhance client assistance in offering
focused client services and creating unique client care
strategies. Structured customer service makes it possible to have
this understanding. Customers in each segment are similar in
terms of market characteristics.
Introduction
Data mining algorithms are now frequently used to uncover
vital and strategic information that is concealed in
organizational data as a result of growing company competition
and the accessibility of large-scale historical data. (Rajaraman,
2011) Data mining is the process of removing logical
information from a dataset and presenting it for decision
support in a way that is easily understandable by humans. Data
mining techniques set apart disciplines like statistics, AI,
machine learning, and data systems. Applications for data
mining range from biology to weather forecasting, fraud
detection, financial research, and customer insights, among
others. The main goal of this article is to use data mining to
find client segments in a commercial enterprise.
2. These differences are based on factors that directly or indirectly
affect the market or business such as product preferences or
expectations, location, behavior and so on. The importance of
customer segmentation includes, inter alia, the ability of a
business to customize market plans that would be appropriate
for each segment of its customers.Support for business
decisions based on risky environments such as credit
relationships with its customers (Rogers, 2016); Identify
products related to individual components and how to manage
demand and supply power; Interdependence and interaction
between consumers, between products, or between customers
and products are revealed, which the business may not be aware
of; The ability to predict customer declines, and which
customers are likely to have problems and raise other market
research questions and provide clues to find solutions. Buried in
a database of integrated data proved to be effective for
detecting subtle but subtle patterns or relationships.
This mode of learning is classified under supervised learning.
Integration algorithms include the KMeans algorithm, K-nearest
algorithm, sorting map (SOM), and more (Morrisson, 2014).
These algorithms, without prior knowledge of the data, are able
to identify groups in them by repeatedly comparing input
patterns, as long as static aptitude in training examples is
achieved based on subject matter or process. Each set has data
points that have very close similarities but differ greatly from
the data points of other groups.
Results:
Data frame output
Cash Advance vs Balance
3. Customer ID vs Balance Frequency
Balance vs Purchases Observation
Installment Purchase Vs Cash Advance
Purchases Vs Cash Advance Frequency
Credit Limit Vs Payments
Machine Learning K means Clustering Output:
Conclusion
Regardless of the information provided, the results provide a
practical opportunity.For retailers to carry out marketing
campaigns or similar segmentation consumers. Despite the
usefulness of the status quo analysis, there are many ways to
improve and grow. While there was a motive to maintain it. The
number of functions is small, and another function is added in
consideration of timeliness. Consumer percentages provide a
clearer indicator of whether a particular purchase decision has
been made. Profiles are more common now than the store's
4. past. In a similar way find a way to cluster your customers
faster (for example, one or two visits are more likely) (Mattson,
2014). Not only provide insights into the evolutionary aspects
of (3 or more) Although it is clustering, there is also a potential
outflow of customers. Same analysis using many other
clustering algorithms such as k- Means clustering or deep
learning provides insight into stability of cluster formation.
References:
1. Mattson, M. P. (2014), ‘Superior pattern processing is the
essence of the evolved human brain’, Frontiers in Neuroscience
8, 265.
2. Morrison, C., Gruenewald, P. J., Freisthler, B., Ponicki, W.
R. & Remer, L. G. (2014), ‘The economic geography of medical
cannabis dispensaries in california’, International Journal of
Drug Policy 25(3), 508 – 515. URL:
http://www.sciencedirect.com/science/article/pii/S09553959130
02387
3. Rajaraman, A. & Ullman, J. D. (2011), Mining of Massive
Datasets, Cambridge University Press, New York, NY, USA.
4. Rogers, S. & Girolami, M. (2016), A First Course in Machine
Learning, Second Edition, Chapman & Hall/CRC
Prepare a PowerPoint about this company's ethical dilemma and
resulting ethical failure, according to the following instructions.
Sources are provided to assist you getting started (click
company name link). You will need to further research the
company as well as applicable ethical frameworks and related
law in your text and required readings.
The following resources will also assist your PowerPoint.
· What is Ethical Dilemma?
· Checklist of guidelines when you face ethical dilemmas
1. Create a 12
· Title slide with your name, course, date, school, title of
5. presentation;
· Agenda slide - This lists the key points covered in the PPT;
· Content slides containing bullet points information with
illustrations, diagrams, pictures, graphics etc., as appropriate to
the slide's content;
· Speaker's notes on each slide - either text presented in the
Speaker Notes section at the bottom of the slides or Audio
through your Voice speaking (or both); (Note: Speaker's Notes
are not duplication of the text on the slides. They are
explanatory narrative.)
1. Identify the company you selected Topic Purdue Pharma -
opioid crisis, deceptive marketing.
· explain the company and its industry;
· provide the factual background of the problem; and
· clearly state the ethical dilemma presented by the situation.
There should be only ONE ethical dilemma. The company had
two choices: the act it chose and an alternative it did not do.
3. Identify and define at least oneethical framework that the
company apparently employed in making its decision. Note --
Not "Should have used." It is not acceptable to say it did not act
ethically or did not use a framework. Analyze it. Frameworks
include utilitarianism, free market ethics, deontology, virtue
ethics , etc., covered in your course readings.
4. Then, identify and define at least oneethical framework that
the company should have used when the problem arose, and
explain how to apply it for them to have reached a better result
than what actually happened. Be clear.
5. Identify and explain measures the company should implement
to avoid this type of problem in the future.
6. Within your discussion include whether the company had a
code of ethics or policy that seemed to apply to the situation,
and if so, what went wrong with that?
7. Explain what business leadership in any company can learn
from this situation.
8. Have a conclusion that wraps up the key points.
9. Include a Reference slide with at least seven (7) credible
6. sources listed in APA format. (NOTE: Sources must be cited in
slides and speaker's notes for direct quotes, specific facts and
graphics, same as in a paper, per APA format. If you are doing
audio speaker notes, you would mention the source in your
speaking narrative.) (Reminder; we are using APA 7th Ed.
format.)
10. Your PPT should have a professional slide background and
graphics on each slide. (See rubric)
Prepare a PowerPoint about this company's ethical dilemma and
resulting ethical failure, according to the following instructions.
Sources are provided to assist you getting started (click
company name link). You will need to further research the
company as well as applicable ethical frameworks and related
law in your text and required readings.
The following resources will also assist your PowerPoint.
· What is Ethical Dilemma?
· Checklist of guidelines when you face ethical dilemmas
1. Create a 12
· Title slide with your name, course, date, school, title of
presentation;
· Agenda slide - This lists the key points covered in the PPT;
· Content slides containing bullet points information with
illustrations, diagrams, pictures, graphics etc., as appropriate to
the slide's content;
· Speaker's notes on each slide - either text presented in the
Speaker Notes section at the bottom of the slides or Audio
through your Voice speaking (or both); (Note: Speaker's Notes
are not duplication of the text on the slides. They are
explanatory narrative.)
1. Identify the company you selected Topic Purdue Pharma -
opioid crisis, deceptive marketing.
· explain the company and its industry;
· provide the factual background of the problem; and
· clearly state the ethical dilemma presented by the situation.
There should be only ONE ethical dilemma. The company had
7. two choices: the act it chose and an alternative it did not do.
3. Identify and define at least oneethical framework that the
company apparently employed in making its decision. Note --
Not "Should have used." It is not acceptable to say it did not act
ethically or did not use a framework. Analyze it. Frameworks
include utilitarianism, free market ethics, deontology, virtue
ethics , etc., covered in your course readings.
4. Then, identify and define at least oneethical framework that
the company should have used when the problem arose, and
explain how to apply it for them to have reached a better result
than what actually happened. Be clear.
5. Identify and explain measures the company should implement
to avoid this type of problem in the future.
6. Within your discussion include whether the company had a
code of ethics or policy that seemed to apply to the situation,
and if so, what went wrong with that?
7. Explain what business leadership in any company can learn
from this situation.
8. Have a conclusion that wraps up the key points.
9. Include a Reference slide with at least seven (7) credible
sources listed in APA format. (NOTE: Sources must be cited in
slides and speaker's notes for direct quotes, specific facts and
graphics, same as in a paper, per APA format. If you are doing
audio speaker notes, you would mention the source in your
speaking narrative.) (Reminder; we are using APA 7th Ed.
format.)
10. Your PPT should have a professional slide background and
graphics on each slide. (See rubric)
Machine learning based Customer Segmentation
Introduction
Since it is easy for customers to watch videos and live
streaming programs in mobile phones, several customers are
8. making use of huge amount of data with the support of faster
means of 4G network system. Moreover, the huge collection of
diverse apps in mobile phones also consume a big space of the
memory. Because of this, the data service providers also
increase for mobile providers [9]. In addition, as more apps for
iOS and Android devices are advanced, new customers
download new apps and use them, which in advance increases
their data usage [1]. As of increasing mobile data prices, huge
numbers of subscriber’s churn from one provider to a different
one in pursuit of enhanced taxes. They too churn providers to
obtain assistances for validating up with a new carrier, such as
receiving a free or deeply discounted phone [10]. In addition,
the lower signup fees associated with prepaid mobile services
also encourages customers to churn.
“The ability of mobile customers to keep their existing mobile
numbers through the Wireless local number portability (WLNP)
reduces barriers to churning within the industry, which is a
major problem for companies in the telecommunications
industry [2]. Because of the likelihood of customers to change
providers, the deals that telecommunication companies offer
may differ based on the needs of individual customers and their
wiliness to pay for particular services. ID Mobile Ireland are the
company that is the basis for the work performed in this paper.
They are a start-up telecommunications provider in the Republic
of Ireland. The company differentiates itself in the competitive
Irish market by separating the mobile tariff from the handset
[7]. This allows customers the flexibility to enter or leave a 12,
18 or 24-month contract without penalty, and purchase a new
handset every three months, should they wish to do so once the
previous handset cost is fully paid off”.
Additionally, as the customer is not tied down into an extended
contract where the cost of the phone is subsidized by the tariff
price, customers may change their tariff call, text and data
allowances every month, to suit their individual needs, allowing
them more control over their account charges. They could, for
example, increase their call minutes bundle amount for the
9. month of December should they envisage making more calls
during this peak holiday period. The company has access to a
wide range of data, with the prospect to capture even more data,
growing at a rapid rate. The data that the company can access
are currently not being used to their full potential as a means of
understanding the customers that are served, their sale patterns,
the potential fraud risks, and churn patterns [8]. In this paper,
the goal is to collect, clean, categorize, and gain insight from a
large dataset spanning 16 months of Bill Pay customer account
data that contains 26717 rows and 86 columns of attributes. The
data also contain an additional 11 columns comprised of
formula derived values or classes used to categorize the data.
The primary aim of this effort is to better meet customer needs,
improve customer satisfaction, developing customer loyalty to
the brand as a means of improving customer retention.
“The initial step in carrying out this effort was to acquire the
relevant data to generate the various reports, using the attributes
available, and to cross check the results in the production
customer care system as a means of confirming the accuracy of
the data. This verification step proved to be very important
because as several tables of data where combined, erroneous
results occurred [4]. This meant that separate reports had to be
created because all of the data could not be in one report due to
the database tables not containing the required logic to be
joined together or the report data outputted exceeding the
current maximum capable by the system, which was 70,000
cells of data”.
Literature Review
The variables that are generally used for market segmentation
are Demographic, socioeconomic, and geographic
characteristics of the customers. A very useful technique for
behavioral-based data mining method in the RFM analysis,
which involves the extraction of customer profiles by using a
few criteria, which reduces the complexity of analysis [5]. “In
RFM analysis, customer data are classified by Recency (R),
Frequency (F) and Monetary (M) variables. It has been noted
10. that RFM enables the practitioners to observe customer
behavior, as well as to segment customers in order to determine
immediate customer value [5]. It should also be noted that using
decision rules algorithms for the purpose of customer
segmentation may result in an efficient evaluation of a
segmentation plan [3]. Decision trees can be identified into sets
of if-then rules, which means that they can be used to solve a
variety of problems, such as customer segmentation and
customer churn prediction. In fact, many researchers have used
this method to study customer segmentation”.
A customer satisfaction survey can be used to construct a
customer segmentation system based on demographic variables
and even customer reviews [1]. Researchers have provided ideas
about modelling customer satisfaction using unstructured data
with a Bayesian approach. They explain that the transformation
of unstructured data taken from customer’s reviews into a semi -
structured form associated with each aspect reflecting the
frequency counts for positive, negative, and neutral sentiments.
One assumption of this model is that the rating of each aspect is
based on a particular combination of the positive, neutral, and
negative sentiments of that particular aspect. The result is that
the overall aspect rating depends upon how many times an
aspect has been associated with positive, neutral and negative
sentiments in a single customer review. Furthermore, there is
also an overall rating that is assigned to each review by the
contributor [6].
Research Methodology
The following project is based on identifying potential
customers for a particular product. This project will be
implemented using the python programming language. For
machine learning techniques we will use K-means clustering
with ANFIS. The algorithm used for the project is very
essential. Segmentation is the process of dividing customers
into various groups for targeted selling. This data analytics
project can help sellers a lot in many ways. The sellers can
know about the customer’s mentality hence increasing the
11. market for the sellers. The algorithm is custom developed for
the features trained and the data management is managed
through SQL.
A. K-Means Clustering
“K-means clustering algorithm is one of the clustering
algorithms based on division. It adopts a heuristic iterative
process to re-divide data objects and re-update cluster centers.
The basic idea of the algorithm is: suppose a set with element
objects and the number of clusters to be generated [2]. In the
first round, a sample element is randomly selected as the initial
cluster center [6], and the distance between other sample
elements and the center point is analyzed the clusters are
respectively divided according to the distance. In each of the
following rounds, the iterative operation of the above steps is
continuously performed, and the average value of the element
objects obtained this time is taken as the center point of the
next round of clustering until the condition that the clustering
center point no longer changes in the iteration process is met.
The specific processing steps are as follows”:
Fig. 1 K-Means Algorithm
B. Adaptive Neuro-Fuzzy Inference System (ANFIS)
“Fuzzy logic and neural network are widely used in prediction
problems. ANFIS is a useful technique based on fuzzy logic and
neural network approaches [27]. It takes the advantages of both
fuzzy set theory in applying rule-based systems and neural
networks in automatic learning from data. A fuzzy inference
system in the ANFIS technique consists of if–then rules,
membership functions, inference mechanism (called fuzzy
reasoning), and couples of input–output. In Figure 2, a structure
of a fuzzy inference system is presented. As seen from this
figure, in the first step, the inputs are fuzzified to produce their
degrees of truth. In the second step, the degree of truth of the
consequents is obtained by combining this information through
inference rules. In the last step, final output is obtained by
defuzzification”.
12. Fig. 2 A structure of a fuzzy inference system for revealing
customer satisfaction
References
1. Dullaghan, C., & Rozaki, E. (2017). Integration of machine
learning techniques to evaluate dynamic customer segmentation
analysis for mobile customers. arXiv preprint
arXiv:1702.02215.
2. Ezenkwu, C. P., Ozuomba, S., & Kalu, C. (2015). Application
of K-Means algorithm for efficient customer segmentation: a
strategy for targeted customer services.
3. Smeureanu, I., Ruxanda, G., & Badea, L. M. (2013).
Customer segmentation in private banking sector using machine
learning techniques.
4. Monil, P., Darshan, P., Jecky, R., Vimarsh, C., & Bhatt, B. R.
(2020). Customer Segmentation Using Machine
Learning. International Journal for Research in Applied Science
and Engineering Technology (IJRASET), 8(6), 2104-2108.
5. Kansal, T., Bahuguna, S., Singh, V., & Choudhury, T. (2018,
December). Customer segmentation using K-means clustering.
In 2018 international conference on computational techniques,
electronics and mechanical systems (CTEMS) (pp. 135-139).
IEEE.
6. Hiziroglu, A. (2013). Soft computing applications in
customer segmentation: State-of-art review and critique. Expert
Systems with Applications, 40(16), 6491-6507.
7. Tsiptsis, K. K., & Chorianopoulos, A. (2011). Data mining
techniques in CRM: inside customer segmentation. John Wiley
& Sons.
8. Hung, P. D., Lien, N. T. T., & Ngoc, N. D. (2019, March).
Customer segmentation using hierarchical agglomerative
clustering. In Proceedings of the 2019 2nd International
Conference on Information Science and Systems (pp. 33-37).
9. Ozan, Ş. (2018, September). A case study on customer
segmentation by using machine learning methods. In 2018
International Conference on Artificial Intelligence and Data
13. Processing (IDAP) (pp. 1-6). IEEE.
10. Wu, S., Yau, W. C., Ong, T. S., & Chong, S. C. (2021).
Integrated churn prediction and customer segmentation
framework for telco business. IEEE Access, 9, 62118-62136.
1