International Business
Research, Teaching and Practice
The iourrral of ttre AIB-SE
Intemational Basinest: Rnearch Teaching ad Prattice
2008 2(1)
CusrouER REr-ATroNSHrp MANAGEMENT
StnetBcv
(A TnecHrNG Cesu Sruov)
Tamilla Curtis.
Nova Southeastcrn University
317 Aleatha Drive, Davtona Beach, FL 32114
Donald Barerc
Nova Southcastcrn Univcrsifi,
1900 Pelican Landing Blvd, #1t)23, Clear-water, FL 33762
Tom Griffin
N c.rva Southeastern University
2900 NE 30th St. Unit 8G, Fort Lauderdale, FL 3330(r
Despite the benefit afered lry ilte integration of cuttomer relationsltip management (CkM) strategy
with aduanced lechno/0g,, manlt companiu ii//fail to see competitiae aduautage results protnbed b1
CRM.'I'his case stadl proaides a platformfor student anafisis and discassion in lhis area.
This case ttud1 is presented in two parts. Tlte frst part descibu the unvccessfal inplemenlation of
an integrated CRM ysteru witbin a ntidsiqefnancialfrm based in the (J.l; the second partprouides
an oueruiew 0f CkNI deueloptrent in kusia af huo telecomruunication companies. Suge$ed tlueilions
.for discassion are presenled. Appendix A prauides an oueruiea of CkM that can be eruplayd al the
option rf an instractor tct transition between a spectfic curicu/urt and the case. Teaching ncttes
(inckding exanple respzltrr,i for each discussion question) are aaailable b), contacting the
come$onding author.
Telephone: 386 226 7173
e-mail: cuttist(@erau.edu
53
a
fnternational Business: Research, Teaching and Ptactice 2008 (2) 1
MesnrcN GRoup
N{ashkin Group Inc. (N{ashkin), a wholly owned subsidiary of Amir Inc., a British
financial conglomerate, is a medium-size, asset-managemerit group based in the
US. Mashkin consists of three primary dir.isions: a mutual fund company with
$10 billion in assets; a separate, but closelr,- affiiiated asset management companv
rvith $15 billion in assets; and a financial services company. Since the early 1990s,
these three enterprises have shared the same client database and other software
programs. The first program utilized, an inexpensive, off-the-shelf system with
limited capabilities, was used by the sales department of both the mutual fund
company and the asset maflagement company primarily to store names,
telephone numbers, and notes of salespeople. A second progtam was used by the
IT department to update the database as new clients arrived and record daily sales
data. A third program was installed at all internal and external salespersons'
workstations and laptops to provide current data to the sales force. In addition,
the Client Service Call Center used a sepa(ate designed-in-house program to track
incoming call activity.
The technology systems utilized by employees in N{ashkin were designed to
support general sales activities. None of the software was designed specifically for
the needs of their financial divisions (either the murual fund or the asset
management side) and lacked the anaiytic functionality as weil as the.
The Case for Mobility: How New-Age Utilities Can Energize Operations and Boos...Cognizant
For utilities feeling the pinch, mobility offers a vast array of potential increased efficiencies and customer service activities. We outline a multi-stage path to become a mobility-enabled utility enterprise.
Data Mining in Telecommunication Industryijsrd.com
Telecommunication companies today are operating in highly competitive and challenging environment. Vast volume of data is generated from various operational systems and these are used for solving many business problems that required urgent handling. These data include call detail data, customer data and network data. Data Mining methods and business intelligence technology are widely used for handling the business problems in this industry. The goal of this paper is to provide a broad review of data mining concepts.
The Case for Mobility: How New-Age Utilities Can Energize Operations and Boos...Cognizant
For utilities feeling the pinch, mobility offers a vast array of potential increased efficiencies and customer service activities. We outline a multi-stage path to become a mobility-enabled utility enterprise.
Data Mining in Telecommunication Industryijsrd.com
Telecommunication companies today are operating in highly competitive and challenging environment. Vast volume of data is generated from various operational systems and these are used for solving many business problems that required urgent handling. These data include call detail data, customer data and network data. Data Mining methods and business intelligence technology are widely used for handling the business problems in this industry. The goal of this paper is to provide a broad review of data mining concepts.
Using Predictive Analytics to Optimize Asset Maintenance in the Utilities Ind...Cognizant
Predictive analytics is a process of using statistical and data mining techniques to analyze historic and current data sets, create rules and predict future events. This paper outlines a game plan for effective implementation of predictive analytics.
Driven by challenges on competition, rising customer expectation and shrinking
margins, banks have been using technology to reduce cost. Apart from competitive
environment, there has been deregulation as to rate of interest, technology intensive
delivery channel like Internet Banking, Tele Banking, Mobile banking and Automated
Teller Machines (ATMs) etc have created a multiple choice to user of the bank. The
banking business is becoming more and more complex with the changes emanating from
the liberalization and globalization. For a new bank, customer creation is important, but
an established bank it is the retention is much more efficient and cost effective
mechanism.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
[Infographic] Are Data Center Demons Keeping You Up at Night?CA Technologies
Are data center demons keeping you up at night? You’re not alone. 84% of data centers report that deficiencies related to power, space and cooling issues are creating a multitude of challenges such as delayed application rollouts and disruptions in customer-facing services. As organizations expand their development efforts and application portfolios, data center managers must find new ways to get the most value from their existing resources and improve capacity planning in order to optimize operations.
Defeat the data center demons and stay competitive in the application economy by optimizing existing resources and increasing insight and visibility into your data center operations.
CA Data Center Infrastructure Management (DCIM) offers the ability to capture detailed, real-time information and achieve a 360-degree view of data center operations that can rein in runaway costs, reduce downtime and mitigate other risk factors that can wreak havoc on the application lifecycle. Learn how to defeat the data center demons and stay competitive in the application economy in this DCIM infographic.
Learn more about CA DCIM: http://bit.ly/1Bo7MDk
Customer segmentation for a mobile telecommunications company based on servic...Shohin Aheleroff
Competition between the mobile operators is becoming more based on subscriber’s behavior. In order to improve mobile operator’s competitiveness and customer value, several data mining technologies can be used.Most telecommunications carriers cluster their mobile customers by billing system data. This paper discusses how to cluster mobile customers based on their call detail records and analyze their consumer behaviors.
Issues Identify at least seven issues you see in the case1..docxbagotjesusa
Issues: Identify at least seven issues you see in the case
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
What is the Key issue you see in the case: __________________________
What facts pertain to the case: Identify at least three important facts that pertain to the case
1.
2.
3.
4.
5.
What assumptions do you plan to make in your analysis: None is an acceptable answer
1.
2.
3
What people and organizations may have an impact on the case: There should be at least five.
1.
2.
3.
4.
5.
6.
7.
8.
9.
You are writing the case from the perspective of which person or organization:______________
What tools of Analysis would you use in this case: You only need to identify them and explain what information each will give you that you feel is important.
Based upon the above information – provide three alternatives
Alternative 1 is the Status Quo or to do nothing different that the current situation.
Identify at least three arguments in favor and three against this approach
Pros
1.
2.
3.
4.
5.
Cons
1.
2.
3.
4.
5.
Alternative 2 ____________________________________________________
Identify at least three arguments in favor and three against this approach
Pros
1.
2.
3.
4.
5.
Cons
1.
2.
3.
4.
5.
Alternative 3 ______________________________________________
Identify at least three arguments in favor and three against this approach
Pros
1.
2.
3.
4.
5.
Cons
1.
2.
3.
4.
5.
Given the information above select your recommended alternative and explain why you feel it is the best alternative: This should take three to five paragraphs and be based upon the information presented in your case.
.
Issues and disagreements between management and employees lead.docxbagotjesusa
Issues and disagreements between management and employees lead to formation of labor unions. Over the decades, the role of labor unions has been interpreted in various ways by employees across the globe.
What are some of the reasons employees join labor unions?
Did you ever belong to a labor union? If you did, do you think union membership benefited you?
If you've never belonged to a union, do you think it would have benefited you in your current or past employment? Why or why not?
.
More Related Content
Similar to International BusinessResearch, Teaching and PracticeThe.docx
Using Predictive Analytics to Optimize Asset Maintenance in the Utilities Ind...Cognizant
Predictive analytics is a process of using statistical and data mining techniques to analyze historic and current data sets, create rules and predict future events. This paper outlines a game plan for effective implementation of predictive analytics.
Driven by challenges on competition, rising customer expectation and shrinking
margins, banks have been using technology to reduce cost. Apart from competitive
environment, there has been deregulation as to rate of interest, technology intensive
delivery channel like Internet Banking, Tele Banking, Mobile banking and Automated
Teller Machines (ATMs) etc have created a multiple choice to user of the bank. The
banking business is becoming more and more complex with the changes emanating from
the liberalization and globalization. For a new bank, customer creation is important, but
an established bank it is the retention is much more efficient and cost effective
mechanism.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
[Infographic] Are Data Center Demons Keeping You Up at Night?CA Technologies
Are data center demons keeping you up at night? You’re not alone. 84% of data centers report that deficiencies related to power, space and cooling issues are creating a multitude of challenges such as delayed application rollouts and disruptions in customer-facing services. As organizations expand their development efforts and application portfolios, data center managers must find new ways to get the most value from their existing resources and improve capacity planning in order to optimize operations.
Defeat the data center demons and stay competitive in the application economy by optimizing existing resources and increasing insight and visibility into your data center operations.
CA Data Center Infrastructure Management (DCIM) offers the ability to capture detailed, real-time information and achieve a 360-degree view of data center operations that can rein in runaway costs, reduce downtime and mitigate other risk factors that can wreak havoc on the application lifecycle. Learn how to defeat the data center demons and stay competitive in the application economy in this DCIM infographic.
Learn more about CA DCIM: http://bit.ly/1Bo7MDk
Customer segmentation for a mobile telecommunications company based on servic...Shohin Aheleroff
Competition between the mobile operators is becoming more based on subscriber’s behavior. In order to improve mobile operator’s competitiveness and customer value, several data mining technologies can be used.Most telecommunications carriers cluster their mobile customers by billing system data. This paper discusses how to cluster mobile customers based on their call detail records and analyze their consumer behaviors.
Issues Identify at least seven issues you see in the case1..docxbagotjesusa
Issues: Identify at least seven issues you see in the case
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
What is the Key issue you see in the case: __________________________
What facts pertain to the case: Identify at least three important facts that pertain to the case
1.
2.
3.
4.
5.
What assumptions do you plan to make in your analysis: None is an acceptable answer
1.
2.
3
What people and organizations may have an impact on the case: There should be at least five.
1.
2.
3.
4.
5.
6.
7.
8.
9.
You are writing the case from the perspective of which person or organization:______________
What tools of Analysis would you use in this case: You only need to identify them and explain what information each will give you that you feel is important.
Based upon the above information – provide three alternatives
Alternative 1 is the Status Quo or to do nothing different that the current situation.
Identify at least three arguments in favor and three against this approach
Pros
1.
2.
3.
4.
5.
Cons
1.
2.
3.
4.
5.
Alternative 2 ____________________________________________________
Identify at least three arguments in favor and three against this approach
Pros
1.
2.
3.
4.
5.
Cons
1.
2.
3.
4.
5.
Alternative 3 ______________________________________________
Identify at least three arguments in favor and three against this approach
Pros
1.
2.
3.
4.
5.
Cons
1.
2.
3.
4.
5.
Given the information above select your recommended alternative and explain why you feel it is the best alternative: This should take three to five paragraphs and be based upon the information presented in your case.
.
Issues and disagreements between management and employees lead.docxbagotjesusa
Issues and disagreements between management and employees lead to formation of labor unions. Over the decades, the role of labor unions has been interpreted in various ways by employees across the globe.
What are some of the reasons employees join labor unions?
Did you ever belong to a labor union? If you did, do you think union membership benefited you?
If you've never belonged to a union, do you think it would have benefited you in your current or past employment? Why or why not?
.
ISSA Journal September 2008Article Title Article Author.docxbagotjesusa
ISSA Journal | September 2008Article Title | Article Author
1�1�
ISSA The Global Voice of Information Security
Extending the McCumber Cube
to Model Network Defense
By Sean M. Price – ISSA member Northern Virginia, USA chapter
This article proposes an extension to the McCumber
Cube information security model to determine the best
countermeasures to achieve a desired security goal.
Confidentiality, integrity, and availability are the se-curity services of a system. In other words they are the security goals of system defense, intangible at-
tributes� providing assurances for the information protected.
Each service is realized when the appropriate countermea-
sures for a given information state are in place. But, it is not
enough to select countermeasures ad hoc. Countermeasures
should be selected to defend a system and its information
against specific types of attacks. When attacks against partic-
ular information states are considered, the necessary coun-
termeasures can be selected to achieve the desired security
service or goal. This article proposes an extension to the Mc-
Cumber Cube information security model as a way for the
security practitioner to consider the best countermeasures to
achieve the desired security goal.
Security models
Models are useful tools to help understand complex topics. A
well-developed model can often be represented graphically,
allowing a deeper understanding of the relationships of the
components that make the whole. A formal security model
is broadly applicable and rigorously developed using formal
methods.2 In contrast, an informal model is considered lack-
ing one or both of these qualities. There are a variety of in-
formal models in the information security world which are
regularly used by security practitioners to understand basic
information and concepts.
� Security goals often lack explicit definitions and are difficult to quantify. They are
usually based on policies with broad interpretations and tend to be qualitative. It is
true that security goals emerge from the confluence of information states and coun-
termeasures which have measurable attributes. But, the subjective nature of security
goals combined with informal modeling characterizes their attributes as intangible.
2 P. T. Devanbu and S. Stubblebine, “Software Engineering for Security: A Roadmap,”
Proceedings of the Conference on The Future of Software Engineering (2000), 227-239.
One such informal model is the generally accepted risk as-
sessment framework. This model is used to assess risk by
estimating asset values, vulnerabilities, threats with their
likelihood of exploiting a vulnerability, and losses. Figure �
illustrates this model. Note that this commonly used model
requires a substantial amount of estimating on the part of
the risk assessment participants. This is problematic when
reliable estimates cannot be obtained. Another problem with
this model is that it does not guide th.
ISOL 536Security Architecture and DesignThreat Modeling.docxbagotjesusa
ISOL 536
Security Architecture and Design
Threat Modeling
Session 6a
“Processing Threats”
Agenda
• When to find threats
• Playing chess
• How to approach software
• Tracking threats and assumptions
• Customer/vendor
• The API threat model
• Reading: Chapter 7
When to Find Threats
• Start at the beginning of your project
– Create a model of what you’re building
– Do a first pass for threats
• Dig deep as you work through features
– Think about how threats apply to your mitigations
• Check your design & model matches as you
get close to shipping
Attackers Respond to Your Defenses
Playing Chess
• The ideal attacker will follow the road you
defend
– Ideal attackers are like spherical cows — they’re a
useful model for some things
• Real attackers will go around your defenses
• Your defenses need to be broad and deep
“Orders of Mitigation”
Order Threat Mitigation
1st Window smashing Reinforced glass
2nd Window smashing Alarm
3rd Cut alarm wire Heartbeat signal
4th Fake heartbeat Cryptographic signal integrity
By Example:
• Thus window smashing is a first order threat, cutting
alarm wire, a third-order threat
• Easy to get stuck arguing about orders
• Are both stronger glass & alarms 1st order
mitigations? (Who cares?!)
• Focus on the concept of interplay between
mitigations & further attacks
How to Approach Software
• Depth first
– The most fun and “instinctual”
– Keep following threats to see where they go
– Can be useful skill development, promoting “flow”
• Breadth first
– The most conservative use of time
• Best when time is limited
– Most likely to result in good coverage
Tracking Threats and Assumptions
• There are an infinite number of ways to
structure this
• Use the one that works reliably for you
• (Hope doesn’t work reliably)
Example Threat Tracking Tables
Diagram Element Threat Type Threat Bug ID
Data flow #4, web
server to business
logic
Tampering Add orders without
payment checks
4553 “Need
integrity controls on
channel”
Info disclosure Payment
instruments sent in
clear
4554 “need crypto”
#PCI
Threat Type Diagram Element(s) Threat Bug ID
Tampering Web browser Attacker modifies
our JavaScript order
checking
4556 “Add order-
checking logic to
server”
Data flow #2 from
browser to server
Failure to
authenticate
4557 “Add enforce
HTTPS everywhere”
Both are fine, help you iterate over diagrams in different ways
Example Assumption Tracking
Assumption Impact if it’s
wrong
Who to talk
to
Who’s
following up
Follow-up
by date
Bug #
It’s ok to
ignore
denial of
service
within the
data center
Availability
will be
below spec
Alice Bob April 15 4555
• Impact is sometimes so obvious it’s not worth filling out
• Who to talk to is not always obvious, it’s ok to start out blank
• Tracking assumptions in bugs helps you not lose track
• Treat the assumption as a bug – you need to resolve it
The Customer/Vendor Boundary
• There is always.
ISOL 533 Project Part 1OverviewWrite paper in sections.docxbagotjesusa
ISOL 533 Project Part 1
Overview
Write paper in sections
Understand the company
Find similar situations
Research and apply possible solutions
Research and find other issues
Health network inc
You are an Information Technology (IT) intern
Health Network Inc.
Headquartered in Minneapolis, Minnesota
Two other locations
Portland Oregon
Arlington Virginia
Over 600 employees
$500 million USD annual revenue
Data centers
Each location is near a data center
Managed by a third-party vendor
Production centers located at the data centers
Health network’s Three products
HNetExchange
Handles secure electronic medical messages between
Large customers such as hospitals and
Small customers such as clinics
HNetPay
Web Portal to support secure payments
Accepts various payment methods
HNetConnect
Allows customers to find Doctors
Contains profiles of doctors, clinics and patients
Health networks IT network
Three corporate data centers
Over 1000 data severs
650 corporate laptops
Other mobile devices
Management request
Current risk assessment outdated
Your assignment is to create a new one
Additional threats may be found during re-evaluation
No budget has been set on the project
Threats identified
Loss of company data due to hardware being removed from production systems
Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops
Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on
Internet threats due to company products being accessible on the Internet
Insider threats
Changes in regulatory landscape that may impact operations
Part 1 project assignment
Conduct a risk assessment based on the information from this presentation
Write a 5-page paper properly APA formatted
Your paper should include
The Scope of the risk assessment i.e. assets, people, processes, and technologies
Tools used to conduct the risk assessment
Risk assessment findings
Business Impact Analysis
.
Is the United States of America a democracyDetailed Outline.docxbagotjesusa
Is the United States of America a democracy?
Detailed Outline:
-Introduction (2-3 Paragraphs):
Define and discuss the criteria for democracy.
What does a country need to be democratic?
-Thesis Statement (1 Paragraph):
Clearly state whether or not you think America is a democracy. Briefly preview the three pieces of evidence you are going to use. Your thesis statement is your argument. It must be clear and strongly stated so I know what you are arguing.
-Supporting Evidence 1 (1-3 Paragraphs)
Using Freedom House’s 2021 (2020 if 21 is not available)analysis of the U.S., support your argument regarding democracy in the U.S analysis of the U.S., support your argument regarding democracy in the U.S.
Supporting Evidence 2 (1-3 Paragraphs)
Choose a news article and explain the event covered in the article and how it
supports your argument.
Supporting Evidence 3 (1-3 Paragraphs)
Choose another news article
-Conclusion (1-2 Paragraphs)
Summarize your supporting evidence and how it supports your overall argument. This should include a brief discussion about how the other argument could be right
Citations: You will need outside sources for this paper. All sources must be properly cited. This means that the sources need to be parenthetically cited in the text of the paper and need to be included in a bibliography page. You are not allowed to use any user edit web sites (Wikipedia, Yahoo Answers, Ask.com, etc.) or social media as sources
4-5 papers
.
Islamic Profession of Faith (There is no God but God and Muhammad is.docxbagotjesusa
Islamic Profession of Faith (There is no God but God and Muhammad is his prophet.)
1. [contextualize] How are they a reflection of the time and culture which produced them?
2. [evaluate] What were the implications of these beliefs and values during the Middle Ages?
3. [compare] How do the beliefs and values of these cultures compare to your own?
.
IS-365 Writing Rubric Last updated January 15, 2018 .docxbagotjesusa
IS-365 Writing Rubric
Last updated: January 15, 2018
Student:
Score (out of 50):
General Comments:
Other comments are embedded in the document.
Criterion <- Higher - Quality - Lower ->
Persuasiveness The reader is
compelled by solid
critical reasoning,
appropriate usage of
sources, and
consideration of
alternative
viewpoints.
The document is
logical and coherent
enough that the
reader can accept its
points and
conclusions
Gaps in logic and
uncritical review of
sources cause the
reader to have some
doubts about the
points made by the
document, or
whether they’re
relevant to the
question asked.
The reader is unsure
of what the document
is trying to
communicate, or is
wholly unconvinced
by its arguments
Not
applicable
Evidence and support Exceptional use of
authoritative and
relevant sources,
properly cited,
providing strong
support of the
document’s points
Sufficient relevant
and authoritative
sources give
confidence that the
document is based
on adequate
research
Sources are
insufficient in
number, not
authoritative, not
relevant, or
improperly cited
No sources are used,
undermining the
document’s
foundations
Not
applicable
Writing Word choices, flow
of logic, and
sentence and
paragraph structure
engage the reader,
making for a
pleasurable
experience
Writing is clear and
adequately fulfills
the document’s
purpose
Some issues with
word choice and
sentence and
paragraph structure
interfere with the
conveyance of the
document’s ideas
Frequent questionable
choices in writing
make it difficult to
read and understand
Not
applicable
Language Essentially free of
language errors
Minor errors in
grammar,
punctuation, or
spelling
Noticeable language
errors that detract
from the readability
of the document
Significant language
errors that call the
credibility of the
document into
question
Not
applicable
Formatting (heading
styles, fonts, margins,
white space, tables
and graphics)
Professional and
consistent formatting
that enhances
readability.
Appropriate use of
tables and graphics.
Generally acceptable
formatting choices.
Some missed
opportunities for
displaying data via
tables or graphics.
Inconsistent or
questionable
formatting choices
that detract from the
document’s
readability
Critical formatting
issues that make the
document
unprofessional-
looking
Not
applicable
Page 1
Page 1
Page 2
(Name deleted)
IS-365
Art Fifer
2/17/2017
Technical Documents for Varying Audiences
In this paper, I’ll be exploring the differences in presenting technical communications to audiences of varying knowledge. The topic of these two general summaries will be the manner in which computers connect to each other, including summaries of several communication protocols, how information traverses the network, and how it arrives at its destination and is read by th.
ISAS 600 – Database Project Phase III RubricAs the final ste.docxbagotjesusa
ISAS 600 – Database Project Phase III Rubric
As the final step to your proposed database, you submitted your Project Plan. This document should communicate how you intend to complete the project. Include timelines and resources required.
Area
Does not meet expectations
Meets expectations
Exceeds expectations
A. Analysis - how will you determine the needs of the database
Did not identify appropriate plan for analysis phase
Identified appropriate plan for analysis phase
Identified appropriate plan for analysis phase and included additional content
Design - what process will you use to design the database (tables, forms, queries, reports)
Did not sufficiently identify detail on the appropriate process for design phase
Identified appropriate process for design phase
Identified appropriate process for design phase and included additional detail
Prototype/End user feedback - Will you show users a prototype before building the system?
Did not sufficiently identify method for feedback and prototypes during building of the system
Identified method for feedback and prototypes during building of the system
Identified method for feedback and prototypes during building of the system and provided additional detail
Coding - what process will you use to build the database?
Did not sufficiently identify appropriate process for coding the database
Identified appropriate process for coding the database
Identified appropriate process for coding the database and provided additional detail.
Testing - How will you test it?
to build the database?
Did not sufficiently identify appropriate process for testing the database
Identified appropriate process for testing the database
Identified appropriate process for testing the database and provided additional detail.
User Acceptance - describe the final step of determining if you met the user's needs?
Did not sufficiently identify an appropriate process for User Acceptance phase - How to determine if the database meets user’s needs.
Identified appropriate process for User Acceptance phase - How to determine if the database meets user’s needs.
Identified appropriate process for User Acceptance phase - How to determine if the database meets user’s needs. Answer provided additional detail
Training - what is the plan for training end users?
Did not identify appropriate detail for training plan
Identified appropriate detail for training plan
Identified appropriate detail for a training plan and provided additional detail.
Project close out - what steps will you take to finalize the project?
Did not sufficiently identify appropriate steps for closing out the project
Identified appropriate steps for closing out the project
Identified appropriate steps for closing out the project and provided additional detail.
Entity Relationship Diagram1
ERD:
Normalization:
1NF:
For the 1st NF we will have to check the tables’ attributes, like there must not be any multivalued attribute, if there is any multivalued at.
Is teenage pregnancy a social problem How does this topic reflect.docxbagotjesusa
Is teenage pregnancy a social problem? How does this topic reflect the social construction of problems? How does social location impact if you view this as a social problem?
Explain why media representation of social problems is an important issue using the example of teenage pregnancy. What is an example of a problematic representation? Does this vary across race, ethnicity, religion, socioeconomic status and gender?
.
Is Texas so conservative- (at least for the time being)- as many pun.docxbagotjesusa
Is Texas so conservative- (at least for the time being)- as many pundits and observers claim? Or is that just an opinion not supported by analysis and facts? Not only does Texas vote Republican in many elections but has done so for many years. It is also the birthplace of the so-called Tea Party movement and of Ron Paul's campaigns for president. Texas also appears to espouse conservative approaches to government and to issues. You will need to define in a concrete and operational way what conservative means as conservative is more than voting behavior or party affiliation.
Texas is the 2nd largest state in population compared to California and.like California made up of many differing migrant and immigrant groups. Texas like California was also part of Northern Mexico. but Texas is very, very different from California in voting behavior and positions on social issues. Why? Texas and California are good comparisons or are they? Provide explanations of the differences and similarities in this ideological context
Texas was once "Democratic" but even that was not really the case in terms of either past or current Democratic ideals and goals but a historic reaction to the consequences of the civil war and the fact that Texas was on the losing side in that war and of the attempt to defend agrarian interests in the form of slavery.. Being Democratic from post civil war to the middle of the 20th century in part meant for decades being in favor of inequality for minorities and defenders in spirit, if not in fact, of slavery.net
So Texas was never "Democratic" and never a more liberal interpretation of reality but a reflection of conservative thought and a particular view of individualistic man.
Is Texas conservative and why? ( you will need a social, cultural, historical and economic analysis here
with supporting evidence)?
? Need much more than opinions here.
.
Irreplaceable Personal Objects and Cultural IdentityThink of .docxbagotjesusa
Irreplaceable: Personal Objects and Cultural Identity
Think of a
personal object
that is
irreplaceable
to you.
Please answer the following:
1. Describe the item and tell a brief story, memory, or ritual related to the item.
2. How does this possession influence your identity?
3. How does this item represent your cultural identity?
4. How is your selection of this item influenced by your identity and culture?
Instructions:
please answer all 4 questions accordingly. Each answer should have the question re-typed following the answer. A minimum of 500 words in all excluding the re-typed questions. No reference is needed.
.
IRB is an important step in research. State the required components .docxbagotjesusa
IRB is an important step in research. State the required components one should look for in a project to determine if IRB submission is needed. Discuss an example of a research study found in one of your literature review articles that needed IRB approval. Specifically, describe why IRB approval was needed in this instance.
.
irem.org/jpm | jpm® | 47
AND
REWARD
RISK
>>
BY KRISTIN GUNDERSON HUNT
THE FIGHT TO FILL VACANT COMMERCIAL REAL ESTATE SPACE IN RECENT YEARS
HAS FORCED REAL ESTATE OWNERS AND MANAGERS TO CONSIDER NEW USES
FOR THEIR PROPERTIES—EVEN IF THEY REQUIRE TAKING ADDITIONAL RISKS.
especially vacancies,” said Janice
Ochenkowski, managing director
for Jones Lang LaSalle and the com-
mercial real estate firm’s director of
global risk management in Chicago.
“But property owners and manag-
ers have been very creative in how
to use their existing facilities.”
Traditional retail stores have been
transformed into everything from
medical office space and churches
to fitness centers and breweries. In
addition, special events and pop-
up stores are more commonplace;
traditional office spaces have been
converted to daycare centers; in-
dustrial warehouses are being used
as practice facilities for youth base-
ball teams; and the list goes on.
“From a risk management per-
spective, these new uses can bring
new challenges,” Ochenkowski said.
“However, it is the primary goal
of the risk manager to support the
business, which means we need to
be more creative in the way we deal
with these risks.”
DOESN’T MEAN YOU HAVE TO WALK AWAY.”–JANICE OCHENKOWSKI, JONES
LANG LASAL
LE
DO THE ASSESSMENT HONESTLY. JUST BECAUSE THERE IS A HI
GHER RISK
“DON’T BE AFRAID TO THINK ABOUT WHAT THE RISKS ARE.
the tough economy has resulted in a lot of challenges—“
DUE DILIGENCE
The risks associated with new-use tenants are as varied as the tenants them-
selves.
First and foremost, certain tenants could present additional life safety
risks, said Jeffrey Shearman, a Pittsburgh-based senior risk engineering con-
sultant and real estate industry practice leader for commercial insurance
provider, Zurich.
For example, restaurant tenants create increased exposure to fire; church
and/or educational institutions might spur egress concerns because they en-
courage large gatherings in spaces formerly used for different occupancy;
and hazardous waste can be a risk with some medical tenants.
“You have to recognize that certain types of work are going to create cer-
tain types of hazards,” Shearman said.
Beyond life safety risks, certain tenants might be more susceptible than
previous tenants to codes and regulations imposed by state or federal laws,
such as licensing regulations for daycares or American Disabilities Act re-
quirements for medical tenants, said Pat Pollan, CPM, principal at Pollan
Hausman Real Estate Services in Houston.
New-use tenant risks don’t stop there: financial risks also exist. Replac-
ing a unique tenant with a similar occupant after the lease expires can be
difficult—a particular concern if a lot of money was spent customizing the
space for an alternative use.
“It’s not just the risk of liability, it’s the risk of the tenant going out of busi-
ness and losing any money you put into the tenant, or its space, .
IoT References:
https://www.techrepublic.com/article/how-to-secure-your-iot-devices-from-botnets-and-other-threats/
https://www.peerbits.com/blog/biggest-iot-security-challenges.html
https://www.bankinfosecurity.asia/securing-iot-devices-challenges-a-11138
https://www.sumologic.com/blog/iot-security/
https://news.ihsmarkit.com/press-release/number-connected-iot-devices-will-surge-125-billion-2030-ihs-markit-says
https://cdn.ihs.com/www/pdf/IoT_ebook.pdf
https://go.armis.com/hubfs/Buyers%E2%80%99%20Guide%20to%20IoT%20Security%20-Final.pdf
https://www.techrepublic.com/article/smart-farming-how-iot-robotics-and-ai-are-tackling-one-of-the-biggest-problems-of-the-century/
Video Resources:What is the Internet of Things (IoT) and how can we secure it?
https://www.youtube.com/watch?v=H_X6IP1-NDc
What is the problem with IoT security? - Gary explains
https://www.youtube.com/watch?v=D3yrk4TaIQQ
Classmate 1
The Rise of the Republican Party
The Republican Party was formed due to a split in the Whig Party. The anti-slavery
“Conscience Whigs” split from the pro-slavery “Cotton Whigs”. Some anti-slavery Whigs joined
the American “Know-Nothing” Party, while the remainder joined with independent Democrats
and Free-Soilers to form a new party, the Republicans. The initial members stood for one
principle: the exclusion of slavery from the western territories (Shi, p. 462). Knowing the
Republicans ideology, we will look at how the events leading up to the Kansas-Nebraska Act led
to greater political division that eventually caused the formation of the Republican Party and it’s
rise to the presidency in 1860.
In the 1850’s, America was becoming increasingly divided between those for and against
slavery. The Compromise of 1850 had temporarily appeased both sides by admitting California
as a free state, allowing no slavery restrictions in New Mexico and Utah, paying Texas,
abolishing slave trade but no slavery in the District of Columbia, establishing the Fugitive Slave
Act, and denying congress authority to interfere with interstate slave trade (Shi, p. 457). This
Fugitive Slave Act was highly contested, although very few slaves were returned to the south
under this Act. In fact, it ended up uniting anti-slavery people, more than aiding the South. It was
during this time that Uncle Tom’s Cabin was written, selling more than a million copies
worldwide and detailing the harsh brutality of slavery (Shi, p. 460-461).
In the mid-1850’s, the Kansas-Nebraska Act was passed. The main reason for it was to the
settle the vast territory west of Missouri and Iowa, and to create a transcontinental railroad to
capitalize on Asian markets and goods. New territories brought up questions of whether slavery
would be allowed, with many supporting “popular sovereignty” where voters chose whether they
would have slavery or not. The issue here was that the 1820 Missouri Compromise had said there
would be no new slaver.
In two paragraphs, respond to the prompt below. Journal entries .docxbagotjesusa
In two paragraphs, respond to the prompt below. Journal entries must contain proper grammar, spelling and capitalization.
Consider the communication pattern within your family of origin. How does your family's conversation orientation (how open your family is to discuss a range of topics) and conformity orientation (how strongly your family reinforces the uniformity of attitudes, values and beliefs) affect your interactions with your partner? If you don't think there is any effect, explain your reasoning.
.
Investigative Statement AnalysisInitial statement given by Ted K.docxbagotjesusa
Investigative Statement Analysis
Initial statement given by Ted Kennedy in reference to the accident that occurred on July 18, 1969 in Chappaquiddick, Massachusetts.
Date:
October 30, 2007
Analyst Comments:
Narrative Balance: The Prologue begins with sentence #1 and ends with sentence #3. The Central Issue begins with sentence #4 and ends with sentence #9. The Epilogue begins with sentence #10 and ends with sentence #14. Thus the breakdown is:
Prologue = 3 sentences
Central Issue = 6 sentences
Epilogue = 5 sentences
The narrative is somewhat unbalanced due to the short Prologue and thus can be considered to be possibly deceptive on its face. It is not unbalanced enough to say this conclusively.
Mean Length of Unit:
The narrative has 14 sentences and 237 words, thus giving a MLU of 16.9 rounded to 17. Thus any sentences 23 words or longer and any sentences 11 words or less can be considered deceptive on their face.
Structure of Analysis:
The actual sentences from the narrative are in bold italicized type. After each sentence are the number of words in the sentence, whether or not it is deceptive on its face, and the analyst’s comments. All of these will be in normal type.
1.
On July 18th, 1969, at approximately 11:15 P.M. in Chappaquiddick, Martha’s Vineyard, Massachusetts, I was driving my car on Main Street on my way to get the ferry back to Edgartown.
30 words – Deceptive on its face. There is no mention of the passenger in this sentence. All of the pronouns are singular. It is “my car” “on my way”, etc. When the passenger is mentioned later, it is almost an afterthought. The deception in this sentence may be the last part of the sentence where he relates why he was driving the car. He very well may have been driving for some reason other than to get the ferry. This would be an area to be further explored in an interview.
2.
I was unfamiliar with the road and turned right onto Dike Road, instead of bearing hard left on Main Street.
20 words. “I was unfamiliar with the road” is an explanatory phrase telling us why he ended up on Dike Road. The phrase “instead of bearing hard left on Main Street” is a strange way of phrasing. Most people would say something like “instead of staying on Main Street.”
3.
After proceeding for approximately one-half mile on Dike Road I descended a hill and came upon a narrow bridge.
20 words. There is nothing particularly deceptive about this sentence. The phrasing of the sentence is very formal. The phrasing is almost like a police type report or a legal/lawyer way of phrasing. It also appears that the phrase “came upon a narrow bridge” is almost a passive way of phrasing that indicates he was taken by surprise and had no control over what he was doing.
4.
The car went off the side of the bridge.
9 words – This sentence is deceptive on its face. This is the very first sentence of the Central Issue. It is interesting to note that four of the six s.
Investigating Happiness at College SNAPSHOT T.docxbagotjesusa
Investigating Happiness at College
SNAPSHOT:
TOPIC Either a specific group related to college or a factor within
college life that possibly affects a specified group of college
students or students in general.
PITCH Present your topic and your research question to the class—
shark tank! Sound too scary? How about guppy tank ?).
Tentative due date: 2/5 & 2/7
ESSAY 1 The prospectus and the annotated bibliography.
Tentative due date: 2/21
ESSAY 2 Change in your topic or conducting your own study
Tentative due date: 3/16
ESSAY 3 Argument about a specific controversy within your topic
Tentative due date: 4/6
ESSAY 4 Answers and argues your refined research question about the
importance of your topic.
Tentative due date: 4/24
♥ Rough drafts with reflections about what is working and not working and
WHY will be required for the prospectus and essays 2 and 3. The work
on the rough draft and the reflections will count toward your essay grade.
♥ Final reflections submitted the class period after you submit your final
draft for essays 2-4 will also count as part of your essay grade.
♥ You will upload your drafts on Moodle. You will be asked to identify the
portions of the sources you used and submit hard copies of your sources
in a folder or files of your sources online.
Investigating Happiness at College:
Some questions that will help you form your own research
questions:
● Is happiness a necessity or a perk in college life?
● What do the expectations of happiness and the pursuit of
happiness reveal about a specific college group, college
students in general, or another college-related group?
● Considering both on-campus factors and off-campus factors
(at least at first), what most influences your group’s
happiness (or unhappiness)?
● Is there one major factor (on campus or off campus) you
would want to investigate that affects students’ happiness?
● How do the expectations about happiness that society has in
general or a certain specific segment of society (for
instance, parents) has, relate to college or college students?
● How much do preconceived notions and expectations about
college life affect student happiness?
● Hard work is hard to enjoy. So how do students balance that
hard work with the .
Investigate Development Case Death with Dignity Physician-Assiste.docxbagotjesusa
Investigate Development Case: Death with Dignity / Physician-Assisted Suicide
MAKE A DECISION: Is Ben's decision making being affected by his depression?
Yes
No
Why? Give reasons for why you chose the way you did. Consider the following factors in your reasons:
The effects of depression on decision making
Other stresses in Ben's life contributing to his state of mind
Ben's current quality of life
The family's values and beliefs
Your own values and beliefs
Please see attachment
.
This presentation provides an introduction to quantitative trait loci (QTL) analysis and marker-assisted selection (MAS) in plant breeding. The presentation begins by explaining the type of quantitative traits. The process of QTL analysis, including the use of molecular genetic markers and statistical methods, is discussed. Practical examples demonstrating the power of MAS are provided, such as its use in improving crop traits in plant breeding programs. Overall, this presentation offers a comprehensive overview of these important genomics-based approaches that are transforming modern agriculture.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
Andreas Schleicher presents at the OECD webinar ‘Digital devices in schools: detrimental distraction or secret to success?’ on 27 May 2024. The presentation was based on findings from PISA 2022 results and the webinar helped launch the PISA in Focus ‘Managing screen time: How to protect and equip students against distraction’ https://www.oecd-ilibrary.org/education/managing-screen-time_7c225af4-en and the OECD Education Policy Perspective ‘Students, digital devices and success’ can be found here - https://oe.cd/il/5yV
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
International BusinessResearch, Teaching and PracticeThe.docx
1. International Business
Research, Teaching and Practice
The iourrral of ttre AIB-SE
Intemational Basinest: Rnearch Teaching ad Prattice
2008 2(1)
CusrouER REr-ATroNSHrp MANAGEMENT
StnetBcv
(A TnecHrNG Cesu Sruov)
Tamilla Curtis.
Nova Southeastcrn University
317 Aleatha Drive, Davtona Beach, FL 32114
Donald Barerc
Nova Southcastcrn Univcrsifi,
1900 Pelican Landing Blvd, #1t)23, Clear-water, FL 33762
Tom Griffin
N c.rva Southeastern University
2900 NE 30th St. Unit 8G, Fort Lauderdale, FL 3330(r
Despite the benefit afered lry ilte integration of cuttomer
relationsltip management (CkM) strategy
with aduanced lechno/0g,, manlt companiu ii//fail to see
competitiae aduautage results protnbed b1
CRM.'I'his case stadl proaides a platformfor student anafisis
2. and discassion in lhis area.
This case ttud1 is presented in two parts. Tlte frst part descibu
the unvccessfal inplemenlation of
an integrated CRM ysteru witbin a ntidsiqefnancialfrm based in
the (J.l; the second partprouides
an oueruiew 0f CkNI deueloptrent in kusia af huo
telecomruunication companies. Suge$ed tlueilions
.for discassion are presenled. Appendix A prauides an oueruiea
of CkM that can be eruplayd al the
option rf an instractor tct transition between a spectfic
curicu/urt and the case. Teaching ncttes
(inckding exanple respzltrr,i for each discussion question) are
aaailable b), contacting the
come$onding author.
Telephone: 386 226 7173
e-mail: cuttist(@erau.edu
53
a
fnternational Business: Research, Teaching and Ptactice 2008
(2) 1
MesnrcN GRoup
N{ashkin Group Inc. (N{ashkin), a wholly owned subsidiary of
Amir Inc., a British
financial conglomerate, is a medium-size, asset-managemerit
group based in the
US. Mashkin consists of three primary dir.isions: a mutual fund
company with
$10 billion in assets; a separate, but closelr,- affiiiated asset
3. management companv
rvith $15 billion in assets; and a financial services company.
Since the early 1990s,
these three enterprises have shared the same client database and
other software
programs. The first program utilized, an inexpensive, off-the-
shelf system with
limited capabilities, was used by the sales department of both
the mutual fund
company and the asset maflagement company primarily to store
names,
telephone numbers, and notes of salespeople. A second progtam
was used by the
IT department to update the database as new clients arrived and
record daily sales
data. A third program was installed at all internal and external
salespersons'
workstations and laptops to provide current data to the sales
force. In addition,
the Client Service Call Center used a sepa(ate designed-in-
house program to track
incoming call activity.
The technology systems utilized by employees in N{ashkin were
designed to
support general sales activities. None of the software was
designed specifically for
the needs of their financial divisions (either the murual fund or
the asset
management side) and lacked the anaiytic functionality as weil
as the collaborative
functionaLitv to interface with other systems rvithin Mashkrn.
This limited
functionaliry of technologv forced emplovees to spend an
inordinate amount of
time manuall1, jumping bctween applicauons and creating new
4. reports to import
and export data between applications that could not be cr-
rrrentil, integrated.
Srgnificant effort was also expended in e-mail and other
communications
between users throughout the firm to collect information that
rvas not recorded
in the system.
STorking around the limitations of the technologies had been
possible when
the sales volume and number of clients was small, but with the
expansion of the
company the situation had become unacceptable. Management
felt that it was
time to implement a comprehensive CRM strategy with
integrated technology
specific to the needs of their financial divisions (both the
mutual fund and the
asset management sides). The three companies undet the
umbrella of Mashkin
shared the same objectives for their new CRM approach:
1.To pror.,ide superior service to customers inaddition to the
benefit of
the core ptoduct;
2. To identify, focus on and retain key customers;
3. To develop customer's profiles; and
4. To improve managerial decisions and workflow.
54
Cunis, Barerc & Gdffin
5. CRM Case Srudy
The desired (and expected) outcome of the new strategic
approach, whichincluded the internar
'rorguniru,ion or the use oi ,.rorr..s, was increasedproductiviq'
through ar,""r ".."* to comprehensive client recofcrs;
fasterresponse ro customer needs; better reporting ana
^rrri1.ri.ai capabilities; reducingdupti c a ti o n o f e fro rts ;
^"
d il ;;;, ".;;;;;;,;# lr.i,io,u r,. r.
:
THB CRM pnoyecr
In order to deal with the- complex issues of identification
anclimplemcntation of ,r,. ,pprofrirr.^cnu pr'"grr-,'^ iiM
trrkforce was formedconsisting or m1119eriri i.rr.i "-ptoy..r.
wi.,it. ir;g;^;;_, have rhe resourcesrequired to buy
comprehenrir," ..,jtom svstems, ,r.r4r.. firms are often forcecl
touse low cost, off-the--shelf p."au.,r, -odify produ.i, a*"r"pecr
for other firms,or build a sysrem in-house; ,"d l; Mu"tLir,r;;;rir"
budgetary constraintsprohibited the outrigh, p.rr.hrr" o i^a fury-
"gr;;;;:;;;.- sysrem. ,{n outsidecRN[ consurtant wai hired to
ur.ir,'i.r rrr. pr"'gr;'rrii'rr.rp se]ect an off_the_shelf integrated
sysrem for use trlro,rgho.l; ,r- ?Im. working with theconsultant's
input, the task force determh.a tn. :";d;., the
impremenradonprocess inciuding sofrware ,.qoir.-.rtr, r,endor
,Ii..tio.r, budget, projecttimeframe, p.rs.,i-rn.r involved ;;;-;r..
training. Aft.r Lorrth, oi.._,mpuringprograms thar could be
adaptecr to the unique leeds or-,r_,. companies withinMashkin,
one was seiected ,i-,^, *^ successfu,y^- ,r. Ly a sim,ar, but
rarger,firm' Mashkin finany ."-*iii.a'io , .rror.n CRM ,yri._ and
the softwarelicenses were purch^r.a. ,r. ii dJprrr*.r, ensured that
arnerworks for thenew CRM prog.ram were in pt"... fi. new
system was popuiated with currenrdata that was tia.,sfer..a
6. rroirli-,-"
"ra ar,^u^J;. ;; ;;;J'," minimize risk, thelr1],.J:"-s were left in
pir."*,i
"rr,
purnu.t with th. ,rewty instat.led cRM
Despite careful planning Mashkin faccd major challenses c'rrino
rh^ ^-^:^^-implemen tation. rhe co s t o i the ".* cry,1,: ;; #ffiff
;i::i:.Hr.Tli.jbc subsrantialJl' grcater rhan was budgetcd.
conrrovcrsiar issoverruns began surfacing ar eve{, b;;r"J
meeting. iues concerning cost
In the process o_f dataffansfer tens-of thousands of client fires
with contactnotes and crient prof,es were ,ru.,rr.r..d ura ^gu;;.i,
,iun.r, regard to theirchr,nol.gy. This rack ,f .hr,,n.,r.rg1.-..rn,
users had r'scr', through years ofnores ro iocare recenr enrries
nnd ,iou. rhem near ,n" ;;;, rhe fire in order rorender them
useabr5. .The nt., -o*'nrr..,.a *.r;'il"r". -Jr to.,g_,r_e
crients,many of whom had. done b.rsin"ss *r,i ,f.. firm for 10
orclients had lengthv fires-that *;;;;j" .,.-b.r.o-. ,"i irin.I:i:
ffi;:i:r;result of rhe data rransfer. a-"rg;hl'ri.r., tho,se doing
heavy sares vorume ancrthose atrempting to grean useabr: ;;;r-
;r, of the ,..rirul.i' fires were afFecreclmost' user efficienciis in
this ,.rr-,rrr"].ptimal system declined further.
iir;1,-*
ir
55
7
Intemational Business: Research, Teaching and Practice 2008
7. (2) 1
Another shortcoming was user training. The firm provided on-
line training
of sales personnel in the new CRM system, but the system $/as
based on on-
demand user training and there was no structure in place that
ensured employees
completed the training instead of merely employing it as a
"Help" system. As
employees left and new ones replaced them training deteriorated
to an associate
spending a few miriutes demonstrating the system to a new
employee, who was
ultimately left to figure it out on their own. While an integrated
CRM application
specific to the financial industry was implemented, financial
advisots and
salespeople were not utilizing it. The end users prefetted to rely
on old
technologies and iuggled different applications instead of using
the newly
installed, comprehensive CRM system. Ultimately, the outcome
of the CRM
implementation at Mashkin was completely the oppo$te of what
management
envisioned with end results of employee confusion, whsted
money and lost time.
AMIR LrurtBo
AMIR, a British financial conglomerate with a large
telecommunication
division, was interested in further expanding its business
operations and was
investigating opportunities in the former Soviet Union for its
8. financial services
division. AMIR's Board of Directors sought information on the
current state of
CRM practices in Russia with particular intetest in any specific
challenges that
might be faced in implementing CRM strategies in Russian
ftms.
James Williams, a senior project advisor with AMIR's
intetnational division
was tasked with developing a presentation on CRM in Russia
for the Board of
Directors. Prior to joining AMIR, Williams had been program
manager ^tMashkin and a member of the task force that had
steered the unsuccessfi.rl CRM
project.
l7illiams was given the following report ptepated by a manager
at AMIR's
telecommunications division who had been given a similar
tesearch task focusing
on the communications market.
, ,' it'
,, i 1.,, i-,r,
REPORTTOMANAGEMENT
:
CRM IN THE TELECOMMUNICAT'OilS
'IVDUSTRY'IV
RUSS'A
Srnce fhe collapse of the Sovief Union in 1991, market reform
in
9. Russra has resulted in dramatic changes in the business crmafe.
Economic
reform resulted in a massive transfer of government ownership
to the
private secfor (Hisrich, 1996). The economic restructuring
reform promoted
economic growth ln Russra by making a transition from central
government
control to a market-based economy with large opportunities for
foreign
capital and investment,
56
Curtis, Barrere & Griffin CRM Case Study
There is an indication that foreign and Russran parTners have
different
views of underlying busrness principles. Due to the emphasts of
Russian
management on collectivistic approaches fo buslness and
reliance on
capital and functional aspecfs over human assefs (Katsioloudes
and
lsichenko, 2007), a large number of foreign investment
companies sfarted
joint ventures with Russian companies. Ihe Russian market's
orientation
had previously focused on processrng inventory with emphasis
placed on
supply rather than on consumer demand. As a result, Russlan
companies
largely ignored the consumer (Hisrich, 1996). ln the changing
economic
10. conditions, many firms ln Russia were forced to create new
methods of
dolng busrness.
CRM, a relatively new concepf ln Russra, started to gain
recognition in
early 2000. The finance and telecommunication industries are
the largest
secfors currently employing CRM strafegies. Wagner indicated,
"Contemporary Russian marketing practices cover only a narrow
spectrum
of the diversity of marketing practices observed in other
nations, and
overall intensity of marketing activities ls low in comparison
with
international benchmarks" (2005:1 99).
Io address the needs of the accelerating Russian'CRM market,
the
CRM Association was founded in July 2004 to:':bonduct CRM
forums,
conferences, and discussions; fo assisf organizations with
training; to
distribute publications in order to increase auvareness about
CRM buslness
practices; and to conduct research. The overall goal of the CRM
Associafion is to build CRM awareness and share the best
technologies
and practices, Ihe first CRM congress was held in Moscow in
December
2004, where the besf Russian CRM projects were presented and
new CRM
systems and approaches were dlscussed. More than 350 top
managers
from Russia n and international companies participated in the
congress.
11. lndustries included financial serulces, pharmaceutical,
marketing,
telecommunication, and others. ln March 2005, Microsoft
Corporation,
together with DataArt (a provider of high-end software
outsourcing serulces
with headquafters in New York), conducted a CRM sysfems
seminar in St.
Petersburg, Russia fo address the development of new CRM
so/ufions.
The leading global busrness technology event, the lnterop
Moscow
Exhibition, supported by the American Chamber of Commerce
in Russia,
was held in April 2008, and provided opportunities for
international
companies to examine fhe Russian market and to display the
latest
technologies available in the CRM area. According fo
speciallsfs, Russla
currently represenfs large investment opportunitiesi'for foreign
CRM
technology and consulting companies, '' ''!:
57
fntemational Business: Reseatch, Teaching and Practice 2008
(2) 1
EXAMPLES OF CRM PROJECIS
Although academic research on CRM developmenf ln Russla is
minimal,
the implementation of CRM practices are evident in the example
of two
12. telecommunication providers: Svyazinvest (a national provider);
and
MegaFon-MoscoLv (a regional provider).
Svyazinvest is a telecommunication investment joint stock
company
that was formed by consolidating shares owned by the federal
government
in regional telecom operations during the priuatization of the
telecommunications secfor. lt is considered one' of the largest
telecommunication holding companies in the wotd (Svyazinvest,
2008).
Svyazinvest incorporates seven large mega-regional
telecommunications
operations, and national domestic long-distance and
international
operations. The holding company's subsidtaries operate public
telephone
networks with capacity exceeding 32.4 million telephone lines.
ln 2005,
Svyazinvest, together with IBM and Amdocs (fhe provider of
billing and
CRM products and seryices for integrated customer
management), began
the largest CRM billing modernization projectin Russia
(GlobalTechnology
Unit, 2005). This project was desrgned to replace more than 180
of
Svyazinvest's billing sysfems across seven regions with Amdocs
products,
and included the implementation of new voice and data services
for ifs
subscribers. The CRM project was conducted in several phases,
including
the introduction of a single billing system across Svyazinvest
operations.
13. The new CRM sfrafegles and technologies eventually will
provide
Svyazinvest with the ability to connect different operations
located in
different geographic regions under one umbrella. This will give
employees
the ability to get a single comprehensive view of consumers.
Overall, the
implementation of new technologies is expected to give the
company a
competitive advantage by developing the efficient, ald',effective
network
infrastructure in order to provide a high-quality
telecoiimunication servrce
fo lfs subscrlbers. i'l
MegaFon-Moscow, a division of the MegaFon Group
telecommunication company, and one of the first Russian
mobile operators
in the Global Sysfem for Mobile communications (GSM,), was
formed at the
end of 2001 due to reorganization of severaltelecommunication
companies
(MegaFon-Moscow, 2008). MegaFon-Moscow ls one of the
three telecom
providers responsib/e for the wrreless network coverage of the
Moscow
region. The cell phone market has experienced tremendous
growth in
recent years in Russra. Currently MegaFon-Moscor,v has more
than five
million subscribers. ln March 2005, company management made
a
decision to implement the Amdocs CRM technology (MegaFon-
Moscow,
2005). The new Amdocs automation resulted in many
14. advantages, such as
58
i ,,.,,J
Cuttis, Bartete & GriIlEfi CR-tuI Case Study
time saving for consumers calling the call center, an increase in
the
number of customer's cal/s taken, and a better call routing
structure. New
CRM technologies allowed MegaFon-Moscow to link call
centers with its
sfores, and to provide better access to customer information
data. Amdocs
CRM was able to consolidate MegaFon-Moscow data into a
single unified
platform, which is fully integrated with existing billing systems.
Customer
seruice employees receive fasf access to customer data, giving
them the
ability to respond quickly to customer's reguesfs and provide a
high level of
customer seruice.
l7illiams finished teading the report and reflected on the
manager's analysis
of CRM practices in Russia and his own experiences at
Mashkin.
QursrIoNs Fon DrscussroN:
Assume you are James $7illiams developing a presentation on
CRM in Russia for
15. the Board of Directors of AMIR limited:
1,. Identify strategies for the CRM project implementation.
2. Identify reasons contributing to thd':'failure of the CRM
implementation at Mashkrn.
Discuss the current state of CRM practice in emerging markets
using the example of Russia.
What additional challenges might companies in Russia face in
implementing CRM projects?
RBrpnpNcss
Hisrich, R. D. (1996) The Russian distribution system:
Problems for entrepreneurs and
new venture efltrance', Manageruent Rttearch News, 19(8) : 1 -
1 8.
Global Technology Unit (2005) IBM and Amdocs undertake
Russia's largest wireline
billing ptoject', [www document]
http://www-05.ibm.com ltl/gru/success/amdocs.html (accessed
15 March 2008).
I(atsioloudes, M. L & Isichenko, D. (2007) 'International joint
ventures in Russia: A recipe
for success,' Man age m e n t Re s e arch l{ e tt s, 30 (2) : | 3 3 -
I 52.
NlegaFon-Moscow (2008), [www documcnt]
http://english.rnegafonmoscow.ru/abourf generalf (accgss3d 20
Apri12008).
MegaFon-Moscow (2005) 'MegaFon-Moscow to implement
Amdocs CRM solution',
[wwv, document] http://u'w-w.crm2day.com f oewsf
16. crm/EEplpFykVkkEN{wltbc.php
(accessed 25 February 2008).
:-.;, .
).
4.
59
Intemational Business: Research, Teaching and Practice 2008
(2) 1
Peppers, D. & Rogers, M. (2004) "Roots of Customer
Relationship Management", in
Managing Customer Relationships: A Sttategic Framework,
John Wiley & Sons, Inc.:
Hoboken, pp.5-8.
Srryazinvest (2008), fwww document)http:/
/eng.sryazinvest.ru/about/ (accessed 25 April,
2008).
X/agner, R. (2005) 'Contemporary marketing practices in
Russia', European Joantal of
Marketing 39(1. /2): 1.99-21.5.
60