BUSI 692
Faith Integration Essay Rubric
PART 1
The student will write a minimum 750-word research paper using current APA formatting guidelines that examines one of major topics in the course in light of the Bible. The focus of this paper will be to bridge the gap between Christianity and theory.
Criteria
Levels of Achievement
Content 70%
Advanced
Proficient
Developing
Not present
Topic Chosen
19 to 20 points
The course topic chosen is a very important concept covered in the course, and the relevance of the topic is clearly explained.
17 to 18 points
The course topic chosen is an important concept covered in the course, and the relevance of the topic is explained, but there is some lack of clarity of either the relevance or the topic.
1 to 16 points
The course topic chosen is a somewhat important concept covered in the course, and the relevance of the topic is somewhat explained, but the student has not presented a clear explanation of either.
0 points
Not present.
Integration of the Bible in relation to the chosen course topic
38 to 40 points
Integration of the Bible in relation to a course topic is clearly established and explained.
35 to 37 points
Integration of the Bible in relation to a course topic is established, but there are gaps in the explanation.
1 to 34 points
Integration of the Bible in relation to a course topic is not really explained, but there is an attempt at the explanation.
0 points
Not present.
Clarity and Relevance of Support of Key Topics
10 points
There is a clear, logical flow to the major points to the paper.
9 points
There is a mostly clear and mostly logical flow to the major points to the paper.
1 to 8 points
There is a little clarity and the flow is not in a coherent logical manner.
0 points
Not present.
Structure 30%
Advanced
Proficient
Developing
Not present
Word Limit Met
10 points
The 1000 word limit was fully met.
9 points
Student wrote less than the minimum, but more than 800 words.
1 to 8 points
Student wrote less than 800 words, but more than 400 words.
0 points
Not present.
Proper Spelling, Grammar, APA
10 points
There were no more than two spelling, grammar, or APA errors.
9 points
There were three spelling, grammar, or APA errors.
1 to 8 points
There were four spelling, grammar, or APA errors.
0 points
Not present.
Number of Sources Used
10 points
Student used two peer reviewed references plus to Bible.
9 points
Student used one peer reviewed reference plus to Bible.
1 to 8 points
Student used no peer reviewed references or did not use the Bible.
0 points
Not present.
PART 2
Integration of Faith and Learning Paper Instructions
Business ethics is defined as the set of moral rules that govern how businesses operate, how business decisions are made, and how people are treated. Unfortunately, some companies violate these basic principles. More often than not, ethical violations happen because a company does not have a clearly defined code of ethics and/or the code is not an integral part of the cor.
4Type name of case study hereType Your Full Name H.docxalinainglis
4
Type name of case study here
Type Your Full Name Here
Professor Dr. Lynda Marshall
University Of The Cumberlands
Organization Leadership
And
Decision Making
Type Date Here
Abstract
Type a paragraph that briefs your audience/ reader about your paper. Synthesize each topic of discussion. The abstract section is always typed on page 2 following the title page. Font type is Times New Roman with 12 font size letters.
Introduction
Type a paragraph that prepares your audience/ reader on what you are about to say. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.
1. Type question here
Type your response to the question here. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.
2. Type question here
Type your response to the question here. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.
3. Type question here
Type your response to the question here. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.
Summary
Type a paragraph that summarizes to your audience/ reader what you just said. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.
REFERENCES
Take note that the first line of the reference is left aligned with second line as hanging indentation. See example below.
Last Name, Abbreviate First Name. Abbreviate Middle Name. (Year). Type title of article here and in Italic font. (Web Article). Retrieved from Type or Paste URL Address here
IT STraTegy:
ISSueS and PracTIceS
This page intentionally left blank
IT STraTegy:
ISSueS and PracTIceS
T h i r d E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco Upper Saddle River
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
Editor in Chief: Stephanie Wall
Acquisitions Editor: Nicole Sam
Program Manager Team Lead: Ashley Santora
Program Manager: Denise Vaughn
Editorial Assistant: Kaylee Rotella
Executive Marketing Manager: Anne K. Fahlgren
Project Manager Team Lead: Judy Leale
Project Manager: Thomas Benfatti
Procurement Specialist: Diane Peirano
Cover Designer: Lumina Datamantics
Full Service Project Management: Abinaya Rajendran at Integra Software Services, Pvt. Ltd.
Cover Printer: Courier/Westford
Composition: Integra Software Services, Pvt. Ltd.
Printer/Binder: Courier/Westford
Text F.
MGMT 501Satterlee Chapters 1 – 2 OverviewsChapter One provideDioneWang844
MGMT 501
Satterlee: Chapters 1 – 2 Overviews
Chapter One provides an introduction to the field of management. The introduction is based on five essential concepts:
· Management vs. leadership.
· The roles, work, and importance of management.
· The effective vs. ineffective manager.
· The manager’s relationship with organizational constituents.
· Managerial career development.
First, the similarities and differences between management and leadership are discussed as well as the related concept of followership.
Second, the reader is introduced to the work of management—specifically why managers are important to the organization—the differing organizational roles managers play, and the general types of managers.
· The first essential concept focuses on the work and relevance of management to the organization.
· The second and third essential concept focuses on the relationships of managers within the organization.
· The fourth essential concept focuses on the skills and characteristics of the effective and ineffective manager and how they differentiate.
· The fifth essential concept concerns managerial relationships—in terms of the overall organizational levels, environments, and stakeholders.
The chapter concludes with a discussion of managerial career development.
Chapter Two provides the historical development of the field of management covered in four essential categories:
· Scientific management theory.
· Administrative management theory.
· Quantitative management theory.
· Modern management “gurus.”
The chapter begins with a summary of the historical development of modern management thinking, from Adam Smith (1776) through the Industrial Revolution (late 1800s).
Next, the three historical eras of modern theory are discussed, specifically scientific management (early twentieth century), administrative management (mid twentieth century), and quantitative management (later twentieth century).
Finally, the chapter concludes with historical development of management gurus, including their impact on contemporary management thought.
IT STraTegy:
ISSueS and PracTIceS
This page intentionally left blank
IT STraTegy:
ISSueS and PracTIceS
T h i r d E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco Upper Saddle River
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
Editor in Chief: Stephanie Wall
Acquisitions Editor: Nicole Sam
Program Manager Team Lead: Ashley Santora
Program Manager: Denise Vaughn
Editorial Assistant: Kaylee Rotella
Executive Marketing Manager: Anne K. Fahlgren
Project Manager Team Lead: Judy Leale
Project Manager: Thomas Benfatti
Procurement Specialist: Diane Peirano
Cover Designer: Lumina Datamantics
Full Service Project Management: Abinaya Rajendran at Integra Software Services, Pvt. Ltd.
Cover Printer: Courie ...
Submission Requirements Format Microsoft Word (or compatible).docxdeanmtaylor1545
Submission Requirements
? Format: Microsoft Word (or compatible)
? Font: Arial, size 12, double-space
? Citation Style: Follow your school�s preferred style guide
? Length: 2 page
? APA Format
? No resources before 2015
? Must complete all parts to answer the questions
*** will be reviewed for plagiarism prior to all grading
“Your Company” is expanding. The company wants additional network controls to protect their growing network.
Tasks
Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend at least four possible controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security.
Summarize your network security controls in a summary report to management.
You must provide rationale for your choices by explaining how each control makes the environment more secure and what potential flaws the controls have as well.
Global
editionGlo
b
a
l
ed
it
io
n
this is a special edition of an established
title widely used by colleges and universities
throughout the world. Pearson published this
exclusive edition for the benefit of students
outside the United States and Canada. if you
purchased this book within the United States
or Canada you should be aware that it has
been imported without the approval of the
Publisher or author.
Pearson Global Edition
Global
edition
For these Global editions, the editorial team at Pearson has
collaborated with educators across the world to address a
wide range of subjects and requirements, equipping students
with the best possible learning tools. this Global edition
preserves the cutting-edge approach and pedagogy of the
original, but also features alterations, customization, and
adaptation from the north american version.
it
Strategy:
Issues and Practices
M
cK
een
Sm
ith
it Strategy
Issues and Practices
tHiRd edition
James D. McKeen • Heather A. Smith
t
H
iR
d
e
d
it
io
n
McKeen_1292080264_mech.indd 1 28/11/14 12:56 PM
IT STraTegy:
ISSueS and PracTIceS
A01_MCKE0260_03_GE_FM.indd 1 26/11/14 9:32 PM
A01_MCKE0260_03_GE_FM.indd 2 26/11/14 9:32 PM
IT STraTegy:
ISSueS and PracTIceS
T h i r d E d i t i o n
G l o b a l E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco Hoboken
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
A01_MCKE0260_03_GE_FM.indd 3 26/11/14 9:32 PM
Editor in Chief: Stephanie Wall
Head of Learning Asset Acquisition, Global Edition: Laura Dent
Acquisitions Editor: Nicole Sam
Program Manager Team Lead: Ashley Santora
Program Manager: Denise Vaughn
Editorial Assistant: Kaylee Rotella
Assistant Acquisitions Editor, Global Edition: Debapriya Mu.
Submission Requirements Format Microsoft Word (or compatible).docxdavid4611
Submission Requirements
? Format: Microsoft Word (or compatible)
? Font: Arial, size 12, double-space
? Citation Style: Follow your school�s preferred style guide
? Length: 2 page
? APA Format
? No resources before 2015
? Must complete all parts to answer the questions
*** will be reviewed for plagiarism prior to all grading
“Your Company” is expanding. The company wants additional network controls to protect their growing network.
Tasks
Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend at least four possible controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security.
Summarize your network security controls in a summary report to management.
You must provide rationale for your choices by explaining how each control makes the environment more secure and what potential flaws the controls have as well.
Global
editionGlo
b
a
l
ed
it
io
n
this is a special edition of an established
title widely used by colleges and universities
throughout the world. Pearson published this
exclusive edition for the benefit of students
outside the United States and Canada. if you
purchased this book within the United States
or Canada you should be aware that it has
been imported without the approval of the
Publisher or author.
Pearson Global Edition
Global
edition
For these Global editions, the editorial team at Pearson has
collaborated with educators across the world to address a
wide range of subjects and requirements, equipping students
with the best possible learning tools. this Global edition
preserves the cutting-edge approach and pedagogy of the
original, but also features alterations, customization, and
adaptation from the north american version.
it
Strategy:
Issues and Practices
M
cK
een
Sm
ith
it Strategy
Issues and Practices
tHiRd edition
James D. McKeen • Heather A. Smith
t
H
iR
d
e
d
it
io
n
McKeen_1292080264_mech.indd 1 28/11/14 12:56 PM
IT STraTegy:
ISSueS and PracTIceS
A01_MCKE0260_03_GE_FM.indd 1 26/11/14 9:32 PM
A01_MCKE0260_03_GE_FM.indd 2 26/11/14 9:32 PM
IT STraTegy:
ISSueS and PracTIceS
T h i r d E d i t i o n
G l o b a l E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco Hoboken
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
A01_MCKE0260_03_GE_FM.indd 3 26/11/14 9:32 PM
Editor in Chief: Stephanie Wall
Head of Learning Asset Acquisition, Global Edition: Laura Dent
Acquisitions Editor: Nicole Sam
Program Manager Team Lead: Ashley Santora
Program Manager: Denise Vaughn
Editorial Assistant: Kaylee Rotella
Assistant Acquisitions Editor, Global Edition: Debapriya Mu.
CLINICAL DECISION MAKING4What do you see as the fu.docxShiraPrater50
: CLINICAL DECISION MAKING
4
What do you see as the future in quality measurement? What is the role of technology? What other factors will be important?
Technology is considered to be the driving force behind the improvements in healthcare Thimbleby H. (2013). Thanks to it the healthcare delivery is more efficient, patient-centered, safe and cost-effective compared to two decades ago; however, there is still more room for improvement. According to CMS in 2017, the healthcare spending was approximately $10,739 per capita, and still, the health outcomes were not at its optimal level. With that being said, I strongly believe that quality measurements need restructuring and reinforcement in order to obtain desirable results. But to design and adopt new strategies that lead to an improvement in our healthcare system, it is important to have into account the role of state and federal policies and its function in shaping modern healthcare.
Technology has and will continue assisting in the quality measurement, healthcare organizations now can adopt a system where it can effectively implement a tailored program accordingly with the company’s necessities. Satisfactory results in quality measurements can be achieved only if the government, health organizations and we (patients) have the same goal. One of the obstacles that this change faces are the expensive implementation of health IT, among many others. Fortunately, sometimes it only takes visionary stakeholders to embrace this change to obtain sustainable improvements, while rapidly acquiring their return on investment.
Efforts, aggressive strategies, and technology can definitely change the course of healthcare, desirable results and improvements can be achieved. Understanding the needs and having the resources to fill the gaps in the healthcare system would be beneficial not only for the community but also would significantly reduce healthcare spending.
References
https://www.cms.gov/Research-Statistics-Data-and-Systems/Statistics-Trends-and-Reports/NationalHealthExpendData/NationalHealthAccountsHistorical.html
Global
editionGlo
b
a
l
ed
it
io
n
this is a special edition of an established
title widely used by colleges and universities
throughout the world. Pearson published this
exclusive edition for the benefit of students
outside the United States and Canada. if you
purchased this book within the United States
or Canada you should be aware that it has
been imported without the approval of the
Publisher or author.
Pearson Global Edition
Global
edition
For these Global editions, the editorial team at Pearson has
collaborated with educators across the world to address a
wide range of subjects and requirements, equipping students
with the best possible learning tools. this Global edition
preserves the cutting-edge approach and pedagogy of the
original, but also features alterations, customization, and
adaptation from the north american version.
it
Strategy:
Issue ...
Research Review Forms – Student NameResearch Review Forms Template.docxgholly1
Research Review Forms – Student NameResearch Review Forms TemplateResearch Review Form #1
· APA Reference
· Type of Research
Please specify the type of research (e.g., quantitative, qualitative, meta-analysis) and research design, if applicable (e.g., correlational design, causal comparative design, phenomenology).
· Independent and Dependent Variables or Variable of Interest (if applicable)
If the article is quantitative, identify the independent and dependent variables. If the article is qualitative, identify the phenomenon/phenomena.
· Research Question(s) and Hypothesis(es)
State the Research Question(s) and/or Hypothesis(es).
Example: There is no stated hypothesis. 2 research questions are proposed: (a) “What is the relationship between the sense of community and student learning?” and (b) “Do the sense of community and learning differ by culture in an asynchronous learning network (ALN) environment?” It is implied that the researchers believe that culture will influence the students’ sense of community and learning. It is implied that there will be an achievement gap between African-American students and Caucasian students participating in online courses.
· Sample
Briefly describe the sample and sampling type. Include the number of participants. Also consider including race and gender.
Example: The subjects were 108 educators (96 females, 12 males; 40 African Americans, 64 Caucasians, 4 others) enrolled in an online Doctor of Education program. The convenience sample was taken from 4 course sections, which had a 96% volunteer rate.
· Methodology
Instruments:
Identify the measuring instrument and reliability and validity of the instrument, if discussed.
Example: The Classroom Community Scale (CCS; Rovai, 2002) was used to measure social community (connectedness) and learning community (learning and satisfaction). As purported, the CCS has high construct validity.
· Results
Results and Conclusions/Primary Findings:
State major results and conclusions.
Example: For the correlational design, the results suggested a positive correlation between all 3 community variables and the 2 learning variables in the ALN environment. Since the findings indicated that there was a weak relationship between perceived learning and course grades, this suggests the learning variables captured 2 different aspects of student learning. In addition, results revealed large variability of classroom community among the students sampled in the 4 course sections. This indicated that individual traits of students may impact feelings about social community. For the causal-comparative, the results revealed that the African-American group scored significantly lower than the Caucasian group on each of the 5 dependent variables. This suggests that there is an achievement gap between African-Americans and Caucasians in graduate ALN programs. This gap also extended to the sense of community.
· Analysis
Identify analysis procedures and any important resul.
Research Request Agreement Report A. BackgroundThe Western Con.docxgholly1
Research Request Agreement Report
A. Background
The Western Connecticut State University Alumni Association allows students and Western Connecticut State University Alumni to develop mutually beneficial relationships by raising awareness of alumni philanthropy and fundraising. This association allows students and alumni to build lasting relationships with each other, as well as students, staff and the greater Danbury area.
Members of the association receive benefits and privileges including invitation to special WCSU and alumni events, career services, Alumni travel program, insurance saving programs, as well as U-Save membership and business. The purpose of the Alumni Association is to give alumni resources to stay connected to their roots at Western Connecticut State University through a number of different events on and off campus, allowing alumni of any age the opportunity to meet through a mutual interest and create personal as well as business bonds.
Problem:
Currently, the WCSU Alumni Association is struggling with engaging and encouraging young alumni to participate in alumni events. The lack of responsiveness from young alumni ranges from students who graduated 2010 to those who will be graduating this May 2020. Currently, the WCSU Alumni Association is having trouble identifying the reason for the lack of response from younger alumni. The Alumni Association is unable to identify what events will attract young alumni in order to engage them to the association. Some factors could be that alumni have moved far from the University, they’ve started families and it’s hard to come back when they have responsibilities, they aren’t receiving the information to a relevant source. These are just ideas not actual facts so the association wants to know the reasoning behind the lack of students that aren’t returning. This way they can find ways that would interest students to return.
Marketing Mix:
Price:
Most of the events the WCSU Alumni Association holds are at a discounted price for off campus outings. The events held on campus are either free for members or at a discounted, affordable price.
Product:
The products being offered are the events held by the Alumni Association. The Alumni Association are the ones planning and holding the events that occur either on or off campus. Events are not solely focused on any one specific major, or even involving a specific theme or topic relating to a major. The events are held in order to bring together alumni with similar interests, such as “Sip & Sculpt '', WCSU Opera, or Alumni Golf Tournament.
Place:
Majority of the events the WCSU Alumni Association holds are located on campus in Danbury, CT. However, off-campus events are offered as well. Although off-campus events may include a cost, it is at an outstandingly affordable cost and provides tickets and transportation to a given event.
Promotion:
The Alumni Association promotes events through email, social media, word of mouth, WOW Alumn.
More Related Content
Similar to Research Problem AssignmentInstructions For completing th.docx
BUSI 692
Faith Integration Essay Rubric
PART 1
The student will write a minimum 750-word research paper using current APA formatting guidelines that examines one of major topics in the course in light of the Bible. The focus of this paper will be to bridge the gap between Christianity and theory.
Criteria
Levels of Achievement
Content 70%
Advanced
Proficient
Developing
Not present
Topic Chosen
19 to 20 points
The course topic chosen is a very important concept covered in the course, and the relevance of the topic is clearly explained.
17 to 18 points
The course topic chosen is an important concept covered in the course, and the relevance of the topic is explained, but there is some lack of clarity of either the relevance or the topic.
1 to 16 points
The course topic chosen is a somewhat important concept covered in the course, and the relevance of the topic is somewhat explained, but the student has not presented a clear explanation of either.
0 points
Not present.
Integration of the Bible in relation to the chosen course topic
38 to 40 points
Integration of the Bible in relation to a course topic is clearly established and explained.
35 to 37 points
Integration of the Bible in relation to a course topic is established, but there are gaps in the explanation.
1 to 34 points
Integration of the Bible in relation to a course topic is not really explained, but there is an attempt at the explanation.
0 points
Not present.
Clarity and Relevance of Support of Key Topics
10 points
There is a clear, logical flow to the major points to the paper.
9 points
There is a mostly clear and mostly logical flow to the major points to the paper.
1 to 8 points
There is a little clarity and the flow is not in a coherent logical manner.
0 points
Not present.
Structure 30%
Advanced
Proficient
Developing
Not present
Word Limit Met
10 points
The 1000 word limit was fully met.
9 points
Student wrote less than the minimum, but more than 800 words.
1 to 8 points
Student wrote less than 800 words, but more than 400 words.
0 points
Not present.
Proper Spelling, Grammar, APA
10 points
There were no more than two spelling, grammar, or APA errors.
9 points
There were three spelling, grammar, or APA errors.
1 to 8 points
There were four spelling, grammar, or APA errors.
0 points
Not present.
Number of Sources Used
10 points
Student used two peer reviewed references plus to Bible.
9 points
Student used one peer reviewed reference plus to Bible.
1 to 8 points
Student used no peer reviewed references or did not use the Bible.
0 points
Not present.
PART 2
Integration of Faith and Learning Paper Instructions
Business ethics is defined as the set of moral rules that govern how businesses operate, how business decisions are made, and how people are treated. Unfortunately, some companies violate these basic principles. More often than not, ethical violations happen because a company does not have a clearly defined code of ethics and/or the code is not an integral part of the cor.
4Type name of case study hereType Your Full Name H.docxalinainglis
4
Type name of case study here
Type Your Full Name Here
Professor Dr. Lynda Marshall
University Of The Cumberlands
Organization Leadership
And
Decision Making
Type Date Here
Abstract
Type a paragraph that briefs your audience/ reader about your paper. Synthesize each topic of discussion. The abstract section is always typed on page 2 following the title page. Font type is Times New Roman with 12 font size letters.
Introduction
Type a paragraph that prepares your audience/ reader on what you are about to say. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.
1. Type question here
Type your response to the question here. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.
2. Type question here
Type your response to the question here. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.
3. Type question here
Type your response to the question here. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.
Summary
Type a paragraph that summarizes to your audience/ reader what you just said. Indent the first sentence of each paragraph and include in-text citations using the list from your reference list. Font type is Times New Roman with 12 font size letters.
REFERENCES
Take note that the first line of the reference is left aligned with second line as hanging indentation. See example below.
Last Name, Abbreviate First Name. Abbreviate Middle Name. (Year). Type title of article here and in Italic font. (Web Article). Retrieved from Type or Paste URL Address here
IT STraTegy:
ISSueS and PracTIceS
This page intentionally left blank
IT STraTegy:
ISSueS and PracTIceS
T h i r d E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco Upper Saddle River
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
Editor in Chief: Stephanie Wall
Acquisitions Editor: Nicole Sam
Program Manager Team Lead: Ashley Santora
Program Manager: Denise Vaughn
Editorial Assistant: Kaylee Rotella
Executive Marketing Manager: Anne K. Fahlgren
Project Manager Team Lead: Judy Leale
Project Manager: Thomas Benfatti
Procurement Specialist: Diane Peirano
Cover Designer: Lumina Datamantics
Full Service Project Management: Abinaya Rajendran at Integra Software Services, Pvt. Ltd.
Cover Printer: Courier/Westford
Composition: Integra Software Services, Pvt. Ltd.
Printer/Binder: Courier/Westford
Text F.
MGMT 501Satterlee Chapters 1 – 2 OverviewsChapter One provideDioneWang844
MGMT 501
Satterlee: Chapters 1 – 2 Overviews
Chapter One provides an introduction to the field of management. The introduction is based on five essential concepts:
· Management vs. leadership.
· The roles, work, and importance of management.
· The effective vs. ineffective manager.
· The manager’s relationship with organizational constituents.
· Managerial career development.
First, the similarities and differences between management and leadership are discussed as well as the related concept of followership.
Second, the reader is introduced to the work of management—specifically why managers are important to the organization—the differing organizational roles managers play, and the general types of managers.
· The first essential concept focuses on the work and relevance of management to the organization.
· The second and third essential concept focuses on the relationships of managers within the organization.
· The fourth essential concept focuses on the skills and characteristics of the effective and ineffective manager and how they differentiate.
· The fifth essential concept concerns managerial relationships—in terms of the overall organizational levels, environments, and stakeholders.
The chapter concludes with a discussion of managerial career development.
Chapter Two provides the historical development of the field of management covered in four essential categories:
· Scientific management theory.
· Administrative management theory.
· Quantitative management theory.
· Modern management “gurus.”
The chapter begins with a summary of the historical development of modern management thinking, from Adam Smith (1776) through the Industrial Revolution (late 1800s).
Next, the three historical eras of modern theory are discussed, specifically scientific management (early twentieth century), administrative management (mid twentieth century), and quantitative management (later twentieth century).
Finally, the chapter concludes with historical development of management gurus, including their impact on contemporary management thought.
IT STraTegy:
ISSueS and PracTIceS
This page intentionally left blank
IT STraTegy:
ISSueS and PracTIceS
T h i r d E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco Upper Saddle River
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
Editor in Chief: Stephanie Wall
Acquisitions Editor: Nicole Sam
Program Manager Team Lead: Ashley Santora
Program Manager: Denise Vaughn
Editorial Assistant: Kaylee Rotella
Executive Marketing Manager: Anne K. Fahlgren
Project Manager Team Lead: Judy Leale
Project Manager: Thomas Benfatti
Procurement Specialist: Diane Peirano
Cover Designer: Lumina Datamantics
Full Service Project Management: Abinaya Rajendran at Integra Software Services, Pvt. Ltd.
Cover Printer: Courie ...
Submission Requirements Format Microsoft Word (or compatible).docxdeanmtaylor1545
Submission Requirements
? Format: Microsoft Word (or compatible)
? Font: Arial, size 12, double-space
? Citation Style: Follow your school�s preferred style guide
? Length: 2 page
? APA Format
? No resources before 2015
? Must complete all parts to answer the questions
*** will be reviewed for plagiarism prior to all grading
“Your Company” is expanding. The company wants additional network controls to protect their growing network.
Tasks
Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend at least four possible controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security.
Summarize your network security controls in a summary report to management.
You must provide rationale for your choices by explaining how each control makes the environment more secure and what potential flaws the controls have as well.
Global
editionGlo
b
a
l
ed
it
io
n
this is a special edition of an established
title widely used by colleges and universities
throughout the world. Pearson published this
exclusive edition for the benefit of students
outside the United States and Canada. if you
purchased this book within the United States
or Canada you should be aware that it has
been imported without the approval of the
Publisher or author.
Pearson Global Edition
Global
edition
For these Global editions, the editorial team at Pearson has
collaborated with educators across the world to address a
wide range of subjects and requirements, equipping students
with the best possible learning tools. this Global edition
preserves the cutting-edge approach and pedagogy of the
original, but also features alterations, customization, and
adaptation from the north american version.
it
Strategy:
Issues and Practices
M
cK
een
Sm
ith
it Strategy
Issues and Practices
tHiRd edition
James D. McKeen • Heather A. Smith
t
H
iR
d
e
d
it
io
n
McKeen_1292080264_mech.indd 1 28/11/14 12:56 PM
IT STraTegy:
ISSueS and PracTIceS
A01_MCKE0260_03_GE_FM.indd 1 26/11/14 9:32 PM
A01_MCKE0260_03_GE_FM.indd 2 26/11/14 9:32 PM
IT STraTegy:
ISSueS and PracTIceS
T h i r d E d i t i o n
G l o b a l E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco Hoboken
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
A01_MCKE0260_03_GE_FM.indd 3 26/11/14 9:32 PM
Editor in Chief: Stephanie Wall
Head of Learning Asset Acquisition, Global Edition: Laura Dent
Acquisitions Editor: Nicole Sam
Program Manager Team Lead: Ashley Santora
Program Manager: Denise Vaughn
Editorial Assistant: Kaylee Rotella
Assistant Acquisitions Editor, Global Edition: Debapriya Mu.
Submission Requirements Format Microsoft Word (or compatible).docxdavid4611
Submission Requirements
? Format: Microsoft Word (or compatible)
? Font: Arial, size 12, double-space
? Citation Style: Follow your school�s preferred style guide
? Length: 2 page
? APA Format
? No resources before 2015
? Must complete all parts to answer the questions
*** will be reviewed for plagiarism prior to all grading
“Your Company” is expanding. The company wants additional network controls to protect their growing network.
Tasks
Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend at least four possible controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security.
Summarize your network security controls in a summary report to management.
You must provide rationale for your choices by explaining how each control makes the environment more secure and what potential flaws the controls have as well.
Global
editionGlo
b
a
l
ed
it
io
n
this is a special edition of an established
title widely used by colleges and universities
throughout the world. Pearson published this
exclusive edition for the benefit of students
outside the United States and Canada. if you
purchased this book within the United States
or Canada you should be aware that it has
been imported without the approval of the
Publisher or author.
Pearson Global Edition
Global
edition
For these Global editions, the editorial team at Pearson has
collaborated with educators across the world to address a
wide range of subjects and requirements, equipping students
with the best possible learning tools. this Global edition
preserves the cutting-edge approach and pedagogy of the
original, but also features alterations, customization, and
adaptation from the north american version.
it
Strategy:
Issues and Practices
M
cK
een
Sm
ith
it Strategy
Issues and Practices
tHiRd edition
James D. McKeen • Heather A. Smith
t
H
iR
d
e
d
it
io
n
McKeen_1292080264_mech.indd 1 28/11/14 12:56 PM
IT STraTegy:
ISSueS and PracTIceS
A01_MCKE0260_03_GE_FM.indd 1 26/11/14 9:32 PM
A01_MCKE0260_03_GE_FM.indd 2 26/11/14 9:32 PM
IT STraTegy:
ISSueS and PracTIceS
T h i r d E d i t i o n
G l o b a l E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco Hoboken
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo
A01_MCKE0260_03_GE_FM.indd 3 26/11/14 9:32 PM
Editor in Chief: Stephanie Wall
Head of Learning Asset Acquisition, Global Edition: Laura Dent
Acquisitions Editor: Nicole Sam
Program Manager Team Lead: Ashley Santora
Program Manager: Denise Vaughn
Editorial Assistant: Kaylee Rotella
Assistant Acquisitions Editor, Global Edition: Debapriya Mu.
CLINICAL DECISION MAKING4What do you see as the fu.docxShiraPrater50
: CLINICAL DECISION MAKING
4
What do you see as the future in quality measurement? What is the role of technology? What other factors will be important?
Technology is considered to be the driving force behind the improvements in healthcare Thimbleby H. (2013). Thanks to it the healthcare delivery is more efficient, patient-centered, safe and cost-effective compared to two decades ago; however, there is still more room for improvement. According to CMS in 2017, the healthcare spending was approximately $10,739 per capita, and still, the health outcomes were not at its optimal level. With that being said, I strongly believe that quality measurements need restructuring and reinforcement in order to obtain desirable results. But to design and adopt new strategies that lead to an improvement in our healthcare system, it is important to have into account the role of state and federal policies and its function in shaping modern healthcare.
Technology has and will continue assisting in the quality measurement, healthcare organizations now can adopt a system where it can effectively implement a tailored program accordingly with the company’s necessities. Satisfactory results in quality measurements can be achieved only if the government, health organizations and we (patients) have the same goal. One of the obstacles that this change faces are the expensive implementation of health IT, among many others. Fortunately, sometimes it only takes visionary stakeholders to embrace this change to obtain sustainable improvements, while rapidly acquiring their return on investment.
Efforts, aggressive strategies, and technology can definitely change the course of healthcare, desirable results and improvements can be achieved. Understanding the needs and having the resources to fill the gaps in the healthcare system would be beneficial not only for the community but also would significantly reduce healthcare spending.
References
https://www.cms.gov/Research-Statistics-Data-and-Systems/Statistics-Trends-and-Reports/NationalHealthExpendData/NationalHealthAccountsHistorical.html
Global
editionGlo
b
a
l
ed
it
io
n
this is a special edition of an established
title widely used by colleges and universities
throughout the world. Pearson published this
exclusive edition for the benefit of students
outside the United States and Canada. if you
purchased this book within the United States
or Canada you should be aware that it has
been imported without the approval of the
Publisher or author.
Pearson Global Edition
Global
edition
For these Global editions, the editorial team at Pearson has
collaborated with educators across the world to address a
wide range of subjects and requirements, equipping students
with the best possible learning tools. this Global edition
preserves the cutting-edge approach and pedagogy of the
original, but also features alterations, customization, and
adaptation from the north american version.
it
Strategy:
Issue ...
Research Review Forms – Student NameResearch Review Forms Template.docxgholly1
Research Review Forms – Student NameResearch Review Forms TemplateResearch Review Form #1
· APA Reference
· Type of Research
Please specify the type of research (e.g., quantitative, qualitative, meta-analysis) and research design, if applicable (e.g., correlational design, causal comparative design, phenomenology).
· Independent and Dependent Variables or Variable of Interest (if applicable)
If the article is quantitative, identify the independent and dependent variables. If the article is qualitative, identify the phenomenon/phenomena.
· Research Question(s) and Hypothesis(es)
State the Research Question(s) and/or Hypothesis(es).
Example: There is no stated hypothesis. 2 research questions are proposed: (a) “What is the relationship between the sense of community and student learning?” and (b) “Do the sense of community and learning differ by culture in an asynchronous learning network (ALN) environment?” It is implied that the researchers believe that culture will influence the students’ sense of community and learning. It is implied that there will be an achievement gap between African-American students and Caucasian students participating in online courses.
· Sample
Briefly describe the sample and sampling type. Include the number of participants. Also consider including race and gender.
Example: The subjects were 108 educators (96 females, 12 males; 40 African Americans, 64 Caucasians, 4 others) enrolled in an online Doctor of Education program. The convenience sample was taken from 4 course sections, which had a 96% volunteer rate.
· Methodology
Instruments:
Identify the measuring instrument and reliability and validity of the instrument, if discussed.
Example: The Classroom Community Scale (CCS; Rovai, 2002) was used to measure social community (connectedness) and learning community (learning and satisfaction). As purported, the CCS has high construct validity.
· Results
Results and Conclusions/Primary Findings:
State major results and conclusions.
Example: For the correlational design, the results suggested a positive correlation between all 3 community variables and the 2 learning variables in the ALN environment. Since the findings indicated that there was a weak relationship between perceived learning and course grades, this suggests the learning variables captured 2 different aspects of student learning. In addition, results revealed large variability of classroom community among the students sampled in the 4 course sections. This indicated that individual traits of students may impact feelings about social community. For the causal-comparative, the results revealed that the African-American group scored significantly lower than the Caucasian group on each of the 5 dependent variables. This suggests that there is an achievement gap between African-Americans and Caucasians in graduate ALN programs. This gap also extended to the sense of community.
· Analysis
Identify analysis procedures and any important resul.
Research Request Agreement Report A. BackgroundThe Western Con.docxgholly1
Research Request Agreement Report
A. Background
The Western Connecticut State University Alumni Association allows students and Western Connecticut State University Alumni to develop mutually beneficial relationships by raising awareness of alumni philanthropy and fundraising. This association allows students and alumni to build lasting relationships with each other, as well as students, staff and the greater Danbury area.
Members of the association receive benefits and privileges including invitation to special WCSU and alumni events, career services, Alumni travel program, insurance saving programs, as well as U-Save membership and business. The purpose of the Alumni Association is to give alumni resources to stay connected to their roots at Western Connecticut State University through a number of different events on and off campus, allowing alumni of any age the opportunity to meet through a mutual interest and create personal as well as business bonds.
Problem:
Currently, the WCSU Alumni Association is struggling with engaging and encouraging young alumni to participate in alumni events. The lack of responsiveness from young alumni ranges from students who graduated 2010 to those who will be graduating this May 2020. Currently, the WCSU Alumni Association is having trouble identifying the reason for the lack of response from younger alumni. The Alumni Association is unable to identify what events will attract young alumni in order to engage them to the association. Some factors could be that alumni have moved far from the University, they’ve started families and it’s hard to come back when they have responsibilities, they aren’t receiving the information to a relevant source. These are just ideas not actual facts so the association wants to know the reasoning behind the lack of students that aren’t returning. This way they can find ways that would interest students to return.
Marketing Mix:
Price:
Most of the events the WCSU Alumni Association holds are at a discounted price for off campus outings. The events held on campus are either free for members or at a discounted, affordable price.
Product:
The products being offered are the events held by the Alumni Association. The Alumni Association are the ones planning and holding the events that occur either on or off campus. Events are not solely focused on any one specific major, or even involving a specific theme or topic relating to a major. The events are held in order to bring together alumni with similar interests, such as “Sip & Sculpt '', WCSU Opera, or Alumni Golf Tournament.
Place:
Majority of the events the WCSU Alumni Association holds are located on campus in Danbury, CT. However, off-campus events are offered as well. Although off-campus events may include a cost, it is at an outstandingly affordable cost and provides tickets and transportation to a given event.
Promotion:
The Alumni Association promotes events through email, social media, word of mouth, WOW Alumn.
Research ReportsCorporate research is an important but often o.docxgholly1
Research Reports
Corporate research is an important but often overlooked aspect of getting a job. You should learn about the companies you apply to and interview with to demonstrate to them how you could fit with their organization.
· Select two companies that you would like to work for, either ideally or realistically.
· Research those companies. Consider consulting
· Official company Web site
· Lexis-Nexis, Business Search Premier, or other databases for newspaper, magazine, and journal articles related to your companies
· Hoovers.com and other business sources on the Web
· In a memo addressed to me, write up your findings.
· Organize the memo thoughtfully. Consider using graphic highlighting such as bullets and subheadings to organize your information.
· Each memo should be at least 1 page long and provide a well-rounded picture of the company. To be both concise and thorough, aim for 1½ - 2 pages.
· Research report #1 is due on Monday, October 22.
· Research report #2 is due on Monday, October 29.
· Each report is worth 25 points towards Research Report final grade.
· Reports will be graded on
· Thoroughness of company profile
· Organization of information in memo
· Conciseness of expression
· Memo format
· Correctness (spelling, punctuation, mechanics)
· Neatness
· You must address at least 7 of the 9 areas listed below to have a complete report. In the 7, you must include“Employment Prospects” and “Your Connection.”
Suggested Areas to Address in Research Reports
Business Overview
· What does the company do?
· What are the major products or services offered?
· Where is the company headquartered? Where are branch offices located?
History
· How old is the company?
· What are the major accomplishments or milestones in its history?
Financials
· What is the company’s operating budget?
· What is the status of the company’s finances?
· Is the company’s stock traded publicly? How has the stock fared?
People
· How many employees work for this company?
· Who runs the company?
· What kinds of salaries and benefits does this company offer to employees?
Perceptions
· How does the public perceive this company?
· Have there been any recent high profile legal actions involving this company?
· Have there been any recent news stories involving this company?
Competitors
· What are the company’s major competitors?
· How well are their competitors faring?
Future
· What direction is the company going with its products or services?
Employment Prospects
· Is the company hiring? For what types of positions?
· What benefits does the company provide to employees?
· Where does the company advertise open positions?
Your Connection
· How do you see yourself fitting in with this company?
DATE: January 31, 2005
TO: Bob Smithinson, English Instructor
FROM: A. Student, Business Writing Student ASSUBJECT: Research Report #1: Reynolds & Reynolds
For my first research report I chose Rey.
Research ReportEthical perspective on quality of care the.docxgholly1
Research Report
Ethical perspective on quality of care: the
nature of ethical dilemmas identified by new
graduate and experienced speech pathologists
Belinda J. Kenny
†
, Michelle Lincoln
†
, Katrina Blyth
‡
and
Susan Balandin
§
†Speech Pathology, Faculty of Health Sciences, University of Sydney, Lidcombe,
Australia
‡Medway Maritime Hospital, Gillingham, UK
§Avdeling for helse-og sosialfag, Hogskolen i Molde, Molde, Norway
(Received 27 September 2007; accepted 2 March 2008)
Abstract
Background: Speech pathologists are confronted by ethical issues when they need
to make decisions about client care, address team conflict, and fulfil the range of
duties and responsibilities required of health professionals. However, there has
been little research into the specific nature of ethical dilemmas experienced by
speech pathologists and whether the nature of ethical conflict changes as they
acquire experience in the professional workforce. Speech pathologists’
perceptions of ethical issues provide insight into factors impacting upon quality
of care in contemporary healthcare settings.
Aims: To describe, compare, and contrast the nature of ethical dilemmas
identified by new graduate and experienced speech pathologists.
Methods & Procedures: A narrative methodology was used to explore the ethical
dilemmasthatparticipantsexperiencedintheprofessionalworkplace.Primarydata
were collected through in-depth interviews with ten new graduate and
ten experienced speechpathologists in theirwork settings.During these interviews,
participantswereaskedto‘tell thestory’ofethicaldilemmasthey identifiedatwork.
Outcomes & Results: An ethical story was constructed for each participant based
upon keywords and concepts from interview transcripts. These keywords and
conceptswerecodedintogroupthemesthatreflectedthenatureofethicaldilemmas
experienced by new graduate versus experienced speech pathologists. Comparing
the results of thematic analysis for both groups of participant revealed similarities
and differences in ethical dilemmas identified by new graduate and experienced
health professionals.
International Journal of Language & Communication Disorders
ISSN 1368-2822 print/ISSN 1460-6984 online q 2009 Royal College of Speech & Language Therapists
http://www.informahealthcare.com
DOI: 10.1080/13682820902928711
Address correspondence to: Belinda J. Kenny, Speech Pathology, Faculty of Health Sciences,
The University of Sydney, PO Box 170, Lidcombe 1825, Australia; e-mail: [email protected]
INT. J. LANG. COMM. DIS., JULY-AUGUST 2009,
VOL. 44, NO. 4, 421–439
Conclusions & Implications: Participants identified ethical dilemmas in the
professional practice areas of client management, professional relationships, service
delivery, and personal/professional identity. Themes from new graduates’ ethical
dilemmas included: making safe choices; avoiding conflict, following service
delivery rules, and building professional identity. Experienced speech pathologists’
themes .
Research Report Topic Security of Social NetworksReport m.docxgholly1
Research Report Topic:
Security of Social Networks
Report
may
have the following organization:
Title
Abstract
Introduction
Previous work
Your Research
Conclusions
Bibliography
Expected is a
10 page
report (This is at least 10 pages of
content,
not including the Title Page, or Bibliography, Double spaced, 12pt font). Images/Screenshots are encouraged, however, they should not compose of the majority of the document. Also, it is expected that the work be primarily in your own wording. Citation is fine for supporting your work, but the vast majority of the work should be in your own wording, not quoted.
.
Research Report #2 Emerging Issues Risk Analysis and Report.docxgholly1
Research Report #2: Emerging Issues Risk Analysis and Report
Scenario
The Entertainment Team (ET -- part of Resort Operations at Padgett-Beale, Inc.) is excited about a new event management platform and is ready to go to contract with the vendor. This platform is a cloud-based service that provides end-to-end management for events (conferences, concerts, festivals). The head of Marketing & Media (M&M) is on board and strongly supports the use of this system. M&M believes that the data collection and analysis capabilities of the system will prove extremely valuable for its efforts. Resort Operations (RO) also believes that the technology could be leveraged to provide additional capabilities for managing participation in hotel sponsored “kids programs” and related children-only events.
For an additional fee, the event management platform's vendor will provide customized RFID bands to be worn by attendees.
The RFID bands and RFID readers use near-field communications to identify the wearer and complete the desired transactions (e.g. record a booth visit, make a purchase, vote for a favorite activity or performer, etc.).
The RFID bands have unique identifiers embedded in the band that allow tracking of attendees (admittance, where they go within the venue, what they "like," how long they stay in a given location, etc.).
The RFID bands can also be connected to an attendee's credit card or debit card account and then used by the attendee to make purchases for food, beverages, and souvenirs.
For children, the RFID bands can be paired with a parent’s band, loaded with allergy information, and have a parent specified spending limit or spending preauthorization tied to the parent’s credit card account.
The head of Corporate IT has tentatively given approval for this outsourcing because it leverages cloud-computing capabilities. IT's approval is very important to supporters of this the acquisition because of the company's ban on "Shadow IT." (Only Corporate IT is allowed to issue contracts for information technology related purchases, acquisitions, and outsourcing contracts.) Corporate IT also supports a cloud-based platform since this reduces the amount of infrastructure which IT must support and manage directly.
The project has come to a screeching halt, however, due to an objection by the Chief Financial Officer. The CFO has asked that the IT Governance Board investigate this project and obtain more information about the benefits and risks of using RFID bands linked to an external system which processes transactions and authorizations of mobile / cashless payments for goods and services. The CFO is concerned that the company’s PCI Compliance status may be adversely affected.
The Chief Privacy Officer has also expressed an objection about this project. The CPO is concerned about the privacy implications of tracking both movement of individuals and the tracking of their purchasing behaviors.
The IT Governance Board agreed that the conce.
Research Proposal DraftBy the due date assigned, write a 2 page .docxgholly1
Research Proposal Draft
By the due date assigned, write a 2 page paper addressing the sections below of the research proposal.
Methodology
Extraneous Variables (and plan for how controlled).
Instruments: Description, validity, and reliability estimates, which have been performed (on a pre-established measure). Include plans for testing validity and reliability of generating your own instrument(s).
Description of the Intervention
Data Collection Procedures
.
Research Report Guide A Guide for BA634 Students .docxgholly1
Research Report Guide
A Guide for BA634 Students
Table of Contents
The Research Report 4
Chapter 1- Background/Introduction (3 – 4 pages) 4
Introduction 4
Problem Statement and Purpose of Research 4
Relevance and Significance 4
Research Questions 5
Barriers and Issues 5
Chapter 2 - Review of the Literature (6-8 pages) 5
Chapter 3 - Approach/Methodology (1 - 2 pages) 5
Chapter 4: Findings, Analysis, and Summary of Results (2 - 4 pages) 5
Chapter 5: Conclusions (2 - 4 pages) 5
References 6
Research Report Structure 6
Front Matter 6
Chapter 1 through 5 (12 pages): 6
Back Matter: 6
Document Preparation – Form and Style 6
References and Citations 7
Margins 7
Line Spacing 7
Paragraph Spacing 7
Page Numbering 7
Type Style 8
Title Page 8
The Abstract 8
Chapter Title, Heading 1, Heading 2 8
Tables and Figures in the Text Body 9
Appendix 9
Additional Resources 9
Sample First Page of Table of Contents 10
Sample Reference List 11
The Research Report
The Research Report serves as the deliverable towards partial completion of the requirement for BA634. The requirement of your research is expected to be built and constitutes the five-chapter model. This document is not intended to be a one-time or static document. The Research Report needs to be at least 14 pages and is written in the past and present tense, as appropriate.
The Research Report should be a complete and concise document that establishes your credentials as a relative expert in the domain of your study. In all cases, a good understanding of the specific domain will be necessary for the successful completion of your study. It is vital that you stay current in the literature germane to the study you are conducting and update the chapters accordingly.
The following is the general structure of the Research ReportChapter 1- Background/Introduction (3 – 4 pages)
In this section, present enough information about the proposed work so that the reader understands the general context or setting. It is also helpful to include a summary of how this document is organized. Introduction
This section introduces the reader to the structural content of your Research Report Problem Statement and Purpose of Research
In this section, present a concise statement of a research-worthy problem to be addressed (i.e., why the work should be undertaken – don’t state “it was a requirement of the professor”). Follow the statement of the problem with a well-supported discussion of its scope and nature. The discussion of the problem should include: what the problem is, why it is a problem, how the problem evolved or developed, and the issues and events leading to the problem. Your problem statement must be clear, concise, to the point and able to be articulated in no more than three sentences.Relevance and Significance
This section provides the necessary support for both the problem statement of your study. Consider the following questions and support your discussion by citing the research literature:
· Why is.
Research QuestionORGANIZATIONAL ISSUESCaruana, A. an.docxgholly1
Research Question
ORGANIZATIONAL ISSUES
Caruana, A. and Pitt, L.(1997). INTQUAL-an internal measure of service quality and the link between service quality and business performance. European Journal of Marketing, 31(8), 604-616
Frese, M.(2008). The world is out: we need an active performance concept for modern workplaces. Industrial and Organizational Psychology, 1, 67-69
Frost, F. and Kumar, M.(2001). Service quality between internal customers and internal suppliers in an international airline. International Journal of Quality & Reliability Management, 18(4), 371-386
Graen, G.(2008). Enriched engagement through assistance to systems' change: a proposal. Industrial and Organizational Psychology, 1, 74-75
Johnson, J.(2008). Process models of personality and work behavior. Industrial and Organizational Psychology, 1, 303-307
Lipman-Blumen, J. and Leavitt, H.(2009). Beyond typical teams: hot groups and connective leaders. Organizational Dynamics, 38(3), 225-233
Macey, W. and Schneider, B.(2008). The meaning of employee engagement. Industrial and Organizational Psychology, 1, 3-30
Miles, R., Snow, C., Fjestad, O., Miles, G. and Lettl, C.(2010). Designing organizations to meet the 21st century opportunities and challenges. Organizational Dynamics, 39(2), 93-103
Reynoso, J. and Moores, B.(1995). Towards the measurement of internal service quality. International Journal of Service Industry Management, 6(3), 64-83
A. Independent Variable
-social network
tie quality
B. Dependent Variable
-Effectiveness of change
Initiatives
B1. On time implementation VS resistance
B2. The extent to which the new system is applied VS stuck with past
Literature and
theories
Research Method
Combination of descriptive
and causal researchSurvey-questionnaireQuestions based on scale (Likert)Secondary data (organizational chart, HR statistics, quality dept statistics)
Sample (random sampling) Maximum 4 5 star hotels located in Greece, operate on annual basis, family owned or hotel chainsEmployees from all the hierarchy levels General managers or HR managers
Important references
For further information
For those of you who are interested in learning more or exchanging thoughts and ideas please feel free to contact me !!
Please contact me through
Research proposal
Control
station
HOSPITALITY
Brownell, J.(2008). A commentary on "Leading change with the 5-p model: complexing the swan and dolphin hotels at Walt Disney World. Cornell Hospitality Quarterly, 49(2), 206-210
Humborstad, S. et al.(2008). Burnout and service employees‘ willingness to deliver quality service. Journal of Human Research in Hospitality & Tourism, 7(1), 45-64
Kim, Y.(2006). Managing workforce diversity: developing a learning organization. Journal of Human Resources in Hospitality & Tourism, 5(2), 69-90
Koutoulas, D.(2009). The 2009 Greek hotel branding report. Athens, GREECE
Kuslavan, S. et al.(2010)..
Research Report Cardiac Conditions ProjectStudent Name.docxgholly1
Research Report : Cardiac Conditions Project
Student Name: ________________________________________ Score: ____/56 pts.
CATEGORY
7
5
3
0
Points
Sources
Use of 4 or more scholarly journal sources all no more than 5 years old. (2014)
Use of 3 scholarly journal sources and some textbook or internet sources. Or at least one of the sources is more than 5 years old.
Use of 0-2 scholarly journal sources and a couple textbook or internet sources.
Sources are only from textbook or internet sources.
Citation Style
Cover page, in-text citations, and page layout are in APA style.
Only 2 aspects are in APA style.
Only 1 aspect is in APA style.
None of the paper is in APA style
References
All references are documented in APA style in the references page.
75-99% of the references are documented in APA style in the references page.
50-74% of the references are documented in APA style in the references page.
49% or less of the references are documented in APA style in the references page.
Paragraph Construction
All paragraphs include introductory sentence, explanations or details, and concluding sentence.
Most paragraphs include introductory sentence, explanations or details, and concluding sentence.
Paragraphs included related information but were typically not constructed well.
Paragraphing structure was not clear and sentences were not typically related within the paragraphs.
Organization
Information is very organized with well-constructed paragraphs and subheadings.
Information is organized with well-constructed paragraphs. No subheadings.
Information is organized, but paragraphs are not well-constructed. No subheadings
The information appears to be disorganized.
Quality of Information
Information clearly relates to the main topic and it includes several supporting details and/or examples.
Information clearly relates to the main topic and it provides 1-2 supporting details and/or examples.
Information vaguely relates to the main topic and limited details and/or examples are given.
Information has little or nothing to do with the main topic with no supporting examples.
Content
All 9 bullets of the instructions are discussed.
7-8 of the bullets from the instructions are discussed.
5-6 of the bullets from the instructions are discussed.
4 or less of the bullets from the instructions are discussed.
Mechanics
No grammatical, spelling or punctuation errors.
2-3 grammatical, spelling or punctuation errors
4-5 grammatical spelling, or punctuation errors.
6+ grammatical, spelling, or punctuation errors.
Total Points
Running head: CONGESTIVE HEART FAILURE 1
CONGESTIVE HEART FAILURE 2
Analysis of the Congestive Heart Failure
Student’s Name
Institution’s Name
Course Title
Submission Date
The population that congestive heart failure is typically found
The congestive heart failure (CHF) results from a heart under-pumping or the blood when the blood vessels are constricted. This condition usually attack .
Research Question· AccuratelyClearly states group’s Resea.docxgholly1
Research Question
· Accurately/Clearly states group’s Research Question as your group formulated
Format
Followed APA format for paper, in-text citation, references.
Purpose of Study
Describe the purpose of the study as the author stated in the article.
§ Do
NOT
change or modify the statement on the article
Variables
Identify study variables from the above stated Purpose of Study
§ Quantitative Study: Dependent & Independent variables
OR
§ Descriptive, Qualitative Study: Variables of Interest
Participants
· Enrollment: How did they recruit eligible participants in the study?
· Eligibility: Describe Inclusion & Exclusion Criteria
· Numbers: Total numbers of participants in the study
.
Research question Option 1 What effect does logistics ma.docxgholly1
Research question:
Option 1: What effect does logistics management have on the military that has been beneficial?
Option 2: How has the military benefitted from logistics?
Need to be combined.
4th Source:
Wissler, J. E. (Oct 2018).
Logistics the lifeblood of Military Power
. The Heritage Foundation.
https://www.heritage.org/military-strength-topical-essays/2019-essays/logistics-the-Links to an external site.
lifeblood-military-powerLinks to an external site.
.
Research questionsIt was not known how criminal offenders percei.docxgholly1
Research questions
It was not known how criminal offenders perceive and mentally represent the world around them
It was not known what role perception plays in an individual’s potential to commit crime
The basis of Cognitive theory
Cognitive is defined as an ability to process information: Cognition has to do with one's ability to learn information quickly, memorize, and understand information they receive. Therefore, cognitive theories of crime fall under the psychological theories of criminal behavior. It's important to know that there are different theories that attempt to explain acts of criminal behavior.
Cognitive-behavioral theory combines the principles of social and developmental psychology and those of experimental-clinical psychology. The theory, applied to crime and delinquency, proposes that social behavior is learned. To understand why and how people commit crimes, psychologists and sociologists often study, analyze, and develop explanations of why these behaviors exist. Cognitive theory is one of many psychological theories of criminal behavior. Cognitive theories of crime explain criminal behavior as a defect in moral thinking, thought processes, and mental development. Cognitive theories focus on how we perceive the world around us, how we think, and the factors that influence our mental development (family upbringing, parental modeling, personality, intelligence). These theories help to explain how we develop morally in our thought process. Cognitive theories also help us to understand how an individual's personality and intelligence level are linked to delinquency.
Theoretical framework : theory of cognitive development
Jean Piaget: Moral and intellectual development. People construct a mental model of the world from childhood. Thus, from birth onward an individual will continue to develop. It is a process which occurs due to biological maturation and interaction with the environment.
Bandura maintains that individuals are not born with an innate ability to act violently. He suggested that, in contrast, violence and aggression are learned through a process of behavior modeling (Bandura, 1977). In other words, children learn violence through the observation of others. Aggressive acts are modeled after three primary sources: (1) family interaction, (2) environmental experiences, and (3) the mass media.
Lawrence Kohlberg (1927–1987), who applied the concept of moral development to criminological theory. Kohlberg (1984) believed that individuals pass through stages of moral development. Most important to his theory is the notion that there are levels, stages, and social orientation. The three levels are Level I, preconventional; Level II, conventional; and Level III, postconventional. With respect to the different stages, Stages 1 and 2 fall under Level I. Stages 3 and 4 fall under Level II, and Stages 5 and 6 fall under Level III.
The next subdiscipline is the information-processing branch. This area is predicated on the no.
Research Question How has Greek Life ChangedImpacted the life of c.docxgholly1
Research Question: How has Greek Life Changed/Impacted the life of college students?
Lit Review (8
-10 pages
)
The research process uncovers what other writers have written about your topic. Your education paper should include a discussion or review of what is known about the subject and how that knowledge was acquired. Once you provide the general and specific context of the existing knowledge, then you yourself can build on others' research.
I. Introduction: What I am studying and why it is important
II. What is the specific area you are studying ?
III. What is Communication Concept being studied? (Group Community Theory)
a) Definition
b) Detailed history of Greek Life
c) Who are the people involved in making the specific media?
d) Criticisms
e) How was this studied in the past?
f) How I perceive it? ( I believe Greek life is not negative like the media portrays it to be and is actually beneficial to college students?
IV. Other factors that make a difference or could impact your variables
10 Peer Reviewed sources and Bibliography
Due Date: Sunday, April 19th, 6pm
.
research question is how Liziqis video express chiese traditional t.docxgholly1
research question is how Liziqi's video express chiese traditional traditional culture on Youtube
Key words : cultural intermediaties, online influencers, social media, chinese culture exportation, liziqi's video
2000 words Literature Review
This is a part of the dissertation, so you don't need to write introduction
.
Research Question How does social media effect the perception of be.docxgholly1
Research Question: How does social media effect the perception of beauty on developing
minds?
Write a 6-8 page paper (typed, double spaced, with one inch margins and MLA or APA in-text citations and references) using 4-6 sources on your theme as it relates to your selected text.
.
Research Question What is the research questions What type .docxgholly1
Research Question:
What is the research questions?: What type of food vending machines should be installed at the Palm Desert Campus?
Why is it important: It’s important to have food vending machines around campus because it’s a convenient way to get food and something to eat when students are on their way to class or just want a quick snack. Like ramen and sandwich, Instant foods would be great to place in vending machines.
2. Proposal Overview and Research Road Map:
3. Secondary Data Overview: This section is where we can list all of our journal articles.
Molson Coors
Recruitment and Selection Molson Coors
Rubric
Recruitment Sources: (how do they bring people onboard?)
For corporate and/or field roles, MC is more inclined to build first (internal hiring) and then buy (external hiring).
1. Build First (Internal Hiring)
Promotions, Transfer, Internship etc..
In addition to their website careers page for the general public, they also have a dedicated portal for internal candidates.
Locally, they also recruit from CU and CSU. Internship is popular method of recruitment. For their Chicago and Milwaukee HQ in the US, they will recruit from the University of Wisconsin system, Marquette, University of Michigan, Michigan State, DePaul, Northwestern, Regis and Loyola.
2. Buy (External Hiring)
Buying is preferred for senior management roles where a diverse perspective offers a competitive advantage.
They leverage LinkedIn and Indeed heavily, Indeed is where I initially applied from.
For external candidates, it’s preferred if you are familiar with the beer industry BUT it is not mandatory. They usually come from other CPG companies, either competitors (beer, wine, spirits) or food/non-alcohol beverage manufacturers.
Recruitment Process and Valid Selection(Integrate/ Combine Recruitment process and valid selection process (how would you ensure valid selection system?))
Recruitment Process from Molson Coors website attached
(Process Draft)
1. HR/Talent acquisition works with the hiring manager to set expectations for candidate core requirements.
2. Interviews are typically extended to 5 candidates, sometimes an additional 1-2 more if the pool is exceptionally talented.
3. You correspond with HR who fills you in on time/date/location/interviewers’ names and roles. The communication is detailed, informing the candidate of the approximate length of time it will take to complete the interview and giving you tips on the format (Panel style and STAR - situation, task, action, response).
4. Our Brew - How We Work sets the foundation of the interview. The initial interview will usually be conducted with the hiring manager (your line/direct manager), the manager who you may be supporting (if applicable) and the person you’re going to backfill (or someone whose role aligns with the one you’re interviewing for).
5. There are 4-5 sections centered on the bullet points below (Take Smart Risks, Win the Right Way, etc.), 1-2 qu.
Research public health issues on the Climate Change or Topic.docxgholly1
Research public health issues on the "Climate Change" or "Topics and Issues" pages of the American Public Health Association (APHA) website. Investigate a public health issue related to an environmental issue within the U.S. health care delivery system and examine its effect on a specific population. Write a 500 word policy brief that summarizes the issue, explains the effect on the population, and proposes a solution to the issue.
Follow this outline when writing the policy brief:
Describe the policy health issue. Include the following information: (a) what population is affected, (b) at what level does it occur (local, state, or national), and (c) evidence about the issues supported by resources.
Create a problem statement.
Provide suggestions for addressing the health issue caused by the current policy. Describe what steps are required to initiate policy change. Include necessary stakeholders (government officials, administrator) and budget or funding considerations, if applicable.
Discuss the impact on the health care delivery system.
Include three peer-reviewed sources and two other sources to support the policy brief.
.
Research Quantitative vs QualitativeBackground Quantitative da.docxgholly1
Research: Quantitative vs Qualitative
Background: Quantitative data can be measured and documented with numbers. Additionally, quantitative data can be represented as quantities. On the other hand, qualitative data is not measured with numbers, but it is represented by qualities. For example, I use quantitative methods to conduct my PhD research because I like working with counts and measures.Assignment: Write a research paper the contains the following:
Discuss Quantitative Methodology
Discuss Qualitative Methodology
Compare and contrast qualitative data vs quantitative data
Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.
.
Research Quantitative vs QualitativeBackground Quantitativ.docxgholly1
Research: Quantitative vs Qualitative
Background: Quantitative data can be measured and documented with numbers. Additionally, quantitative data can be represented as quantities. On the other hand, qualitative data is not measured with numbers, but it is represented by qualities. For example, I use quantitative methods to conduct my PhD research because I like working with counts and measures.
Assignment: Write a research paper the contains the following:
Discuss Quantitative Methodology
Discuss Qualitative Methodology
Compare and contrast qualitative data vs quantitative data
Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.
.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Research Problem AssignmentInstructions For completing th.docx
1. Research Problem Assignment
Instructions: For completing this assignment, follow the
guidelines regarding Research Problems discussed in the Unit 3
Lecture. The Research Problem should be approximately 250
words, about a page double-spaced. You must cite a minimum
of two references in proper APA formatting.
Questions you should ask yourself when composing the
Research Problem:
Who is the study population? How can you further refine
the study population?
What exactly do you want to understand about the
topic/problem?
Is the Research Problem too broad?
How relevant is the research to your study
area/discipline/major/interests?
What motivates you to do the research on the chosen
topic/problem?
Why should others be interested in your chosen
topic/problem?
What are the stakes involved in not addressing the issue from
your perspective?
What are the concepts and issues to be studied?
Do you have enough time to complete the research?
Is an answer to the Research Problem obvious?
2. IT STRATEGY:
ISSUES AND PRACTICES
This page intentionally left blank
IT STRATEGY:
ISSUES AND PRACTICES
T h i r d E d i t i o n
James D. McKeen
Queen’s University
Heather A. Smith
Queen’s University
Boston Columbus Indianapolis New York San Francisco Upper
Saddle River
Amsterdam Cape Town Dubai London Madrid Milan Munich
Paris Montréal Toronto
Delhi Mexico City São Paulo Sydney Hong Kong Seoul
Singapore Taipei Tokyo
Editor in Chief: Stephanie Wall
Acquisitions Editor: Nicole Sam
Program Manager Team Lead: Ashley Santora
Program Manager: Denise Vaughn
Editorial Assistant: Kaylee Rotella
4. 1. Information technology—Management. I. Smith, Heather A.
II. Title.
HD30.2.M3987 2015
004.068—dc23
2014017950
ISBN–10: 0-13-354424-9
ISBN–13: 978-0-13-354424-4
10 9 8 7 6 5 4 3 2 1
CONTENTS
Preface xiii
About the Authors xxi
Acknowledgments xxii
Section I Delivering Value with IT 1
Chapter 1 DEVELOPING AND DELIVERING ON THE IT
VALUE
PROPOSITION 2
Peeling the Onion: Understanding IT Value 3
What Is IT Value? 3
Where Is IT Value? 4
Who Delivers IT Value? 5
When Is IT Value Realized? 5
The Three Components of the IT Value Proposition 6
Identification of Potential Value 7
Effective Conversion 8
5. Realizing Value 9
Five Principles for Delivering Value 10
Principle 1. Have a Clearly Defined Portfolio Value
Management
Process 11
Principle 2. Aim for Chunks of Value 11
Principle 3. Adopt a Holistic Orientation to Technology Value
11
Principle 4. Aim for Joint Ownership of Technology Initiatives
12
Principle 5. Experiment More Often 12
Conclusion 12 References 13
Chapter 2 DEVELOPING IT STRATEGY FOR BUSINESS
VALUE 15
Business and IT Strategies: Past, Present, and Future 16
Four Critical Success Factors 18
The Many Dimensions of IT Strategy 20
Toward an IT Strategy-Development Process 22
Challenges for CIOs 23
Conclusion 25 25
Chapter 3 LINKING IT TO BUSINESS METRICS 27
Business Measurement: An Overview 28
Key Business Metrics for IT 30
v
vi Contents
6. Designing Business Metrics for IT 31
Advice to Managers 35
Conclusion 36 36
Chapter 4 BUILDING A STRONG RELATIONSHIP
WITH THE BUSINESS 38
The Nature of the Business–IT Relationship 39
The Foundation of a Strong Business–IT
Relationship 41
Building Block #1: Competence 42
Building Block #2: Credibility 43
Building Block #3: Interpersonal Interaction 44
Building Block #4: Trust 46
Conclusion 48 48
Appendix A The Five IT Value Profiles 50
Appendix B Guidelines for Building a Strong Business–IT
Relationship 51
Chapter 5 COMMUNICATING WITH BUSINESS MANAGERS
52
Communication in the Business–IT Relationship 53
What Is “Good” Communication? 54
Obstacles to Effective Communication 56
“T-Level” Communication Skills for IT Staff 58
Improving Business–IT Communication 60
Conclusion 61 61
Appendix A IT Communication Competencies 63
Chapter 6 BUILDING BETTER IT LEADERS FROM
THE BOTTOM UP 64
The Changing Role of the IT Leader 65
7. What Makes a Good IT Leader? 67
How to Build Better IT Leaders 70
Investing in Leadership Development: Articulating the Value
Proposition 73
Conclusion 74 75
MINI CASES
Delivering Business Value with IT at Hefty Hardware 76
Investing in TUFS 80
IT Planning at ModMeters 82
Contents vii
Section II IT Governance 87
Chapter 7 CREATING IT SHARED SERVICES 88
IT Shared Services: An Overview 89
IT Shared Services: Pros and Cons 92
IT Shared Services: Key Organizational Success Factors 93
Identifying Candidate Services 94
An Integrated Model of IT Shared Services 95
Recommmendations for Creating Effective IT
Shared Services 96
Conclusion 99 99
Chapter 8 A MANAGEMENT FRAMEWORK FOR
IT SOURCING 100
A Maturity Model for IT Functions 101
IT Sourcing Options: Theory Versus Practice 105
The “Real” Decision Criteria 109
Decision Criterion #1: Flexibility 109
8. Decision Criterion #2: Control 109
Decision Criterion #3: Knowledge Enhancement 110
Decision Criterion #4: Business Exigency 110
A Decision Framework for Sourcing IT Functions 111
Identify Your Core IT Functions 111
Create a “Function Sourcing” Profile 111
Evolve Full-Time IT Personnel 113
Encourage Exploration of the Whole Range
of Sourcing Options 114
Combine Sourcing Options Strategically 114
A Management Framework for Successful
Sourcing 115
Develop a Sourcing Strategy 115
Develop a Risk Mitigation Strategy 115
Develop a Governance Strategy 116
Understand the Cost Structures 116
Conclusion 117 117
Chapter 9 THE IT BUDGETING PROCESS 118
Key Concepts in IT Budgeting 119
The Importance of Budgets 121
The IT Planning and Budget Process 123
viii Contents
Corporate Processes 123
IT Processes 125
Assess Actual IT Spending 126
IT Budgeting Practices That Deliver Value 127
9. Conclusion 128 129
Chapter 10 MANAGING IT- BASED RISK 130
A Holistic View of IT-Based Risk 131
Holistic Risk Management: A Portrait 134
Developing a Risk Management Framework 135
Improving Risk Management Capabilities 138
Conclusion 139 140
Appendix A A Selection of Risk Classification
Schemes 141
Chapter 11 INFORMATION MANAGEMENT: THE NEXUS
OF BUSINESS AND IT 142
Information Management: How Does IT Fit? 143
A Framework For IM 145
Stage One: Develop an IM Policy 145
Stage Two: Articulate the Operational
Components 145
Stage Three: Establish Information Stewardship 146
Stage Four: Build Information Standards 147
Issues In IM 148
Culture and Behavior 148
Information Risk Management 149
Information Value 150
Privacy 150
Knowledge Management 151
The Knowing–Doing Gap 151
Getting Started in IM 151
Conclusion 153 154
Appendix A Elements of IM Operations 155
10. MINI CASES
Building Shared Services at RR Communications 156
Enterprise Architecture at Nationstate Insurance 160
IT Investment at North American Financial 165
Contents ix
Section III IT-Enabled Innovation 169
Chapter 12 INNOVATION WITH IT 170
The Need for Innovation: An Historical
Perspective 171
The Need for Innovation Now 171
Understanding Innovation 172
The Value of Innovation 174
Innovation Essentials: Motivation, Support,
and Direction 175
Challenges for IT leaders 177
Facilitating Innovation 179
Conclusion 180 181
Chapter 13 BIG DATA AND SOCIAL COMPUTING 182
The Social Media/Big Data Opportunity 183
Delivering Business Value with Big Data 185
Innovating with Big Data 189
Pulling in Two Different Directions: The Challenge
for IT Managers 190
First Steps for IT Leaders 192
11. Conclusion 193 194
Chapter 14 IMPROVING THE CUSTOMER EXPERIENCE:
AN IT PERSPECTIVE 195
Customer Experience and Business value 196
Many Dimensions of Customer Experience 197
The Role of Technology in Customer Experience 199
Customer Experience Essentials for IT 200
First Steps to Improving Customer Experience 203
Conclusion 204 204
Chapter 15 BUILDING BUSINESS INTELLIGENCE 206
Understanding Business Intelligence 207
The Need for Business Intelligence 208
The Challenge of Business Intelligence 209
The Role of IT in Business Intelligence 211
Improving Business Intelligence 213
Conclusion 216 216
x Contents
Chapter 16 ENABLING COLLABORATION WITH IT 218
Why Collaborate? 219
Characteristics of Collaboration 222
Components of Successful Collaboration 225
The Role of IT in Collaboration 227
First Steps for Facilitating Effective Collaboration 229
Conclusion 231 232
MINI CASES
Innovation at International Foods 234
12. Consumerization of Technology at IFG 239
CRM at Minitrex 243
Customer Service at Datatronics 246
Section IV IT Portfolio Development and Management 251
Chapter 17 APPLICATION PORTFOLIO MANAGEMENT 252
The Applications Quagmire 253
The Benefits of a Portfolio Perspective 254
Making APM Happen 256
Capability 1: Strategy and Governance 258
Capability 2: Inventory Management 262
Capability 3: Reporting and Rationalization 263
Key Lessons Learned 264
Conclusion 265 265
Appendix A Application Information 266
Chapter 18 MANAGING IT DEMAND 270
Understanding IT Demand 271
The Economics of Demand Management 273
Three Tools for Demand management 273
Key Organizational Enablers for Effective Demand
Management 274
Strategic Initiative Management 275
Application Portfolio Management 276
Enterprise Architecture 276
Business–IT Partnership 277
Governance and Transparency 279
Conclusion 281 281
13. Contents xi
Chapter 19 CREATING AND EVOLVING A TECHNOLOGY
ROADMAP 283
What is a Technology Roadmap? 284
The Benefits of a Technology Roadmap 285
External Benefits (Effectiveness) 285
Internal Benefits (Efficiency) 286
Elements of the Technology Roadmap 286
Activity #1: Guiding Principles 287
Activity #2: Assess Current Technology 288
Activity #3: Analyze Gaps 289
Activity #4: Evaluate Technology
Landscape 290
Activity #5: Describe Future Technology 291
Activity #6: Outline Migration Strategy 292
Activity #7: Establish Governance 292
Practical Steps for Developing a Technology
Roadmap 294
Conclusion 295 295
Appendix A Principles to Guide a Migration
Strategy 296
Chapter 20 ENHANCING DEVELOPMENT
PRODUCTIVITY 297
The Problem with System Development 298
Trends in System Development 299
Obstacles to Improving System Development
14. Productivity 302
Improving System Development Productivity: What we
know that Works 304
Next Steps to Improving System Development
Productivity 306
Conclusion 308 308
Chapter 21 INFORMATION DELIVERY: IT’S EVOLVING
ROLE 310
Information and IT: Why Now? 311
Delivering Value Through Information 312
Effective Information Delivery 316
New Information Skills 316
New Information Roles 317
New Information Practices 317
xii Contents
New Information Strategies 318
The Future of Information Delivery 319
Conclusion 321 322
MINI CASES
Project Management at MM 324
Working Smarter at Continental Furniture International 328
Managing Technology at Genex Fuels 333
Index 336
15. PREFACE
Today, with information technology (IT) driving constant
business transformation,
overwhelming organizations with information, enabling 24/7
global operations, and
undermining traditional business models, the challenge for
business leaders is not
simply to manage IT, it is to use IT to deliver business value.
Whereas until fairly recently,
decisions about IT could be safely delegated to technology
specialists after a business
strategy had been developed, IT is now so closely integrated
with business that, as one
CIO explained to us, “We can no longer deliver business
solutions in our company
without using technology so IT and business strategy must
constantly interact with
each other.”
What’s New in This Third Edition?
IT shared services; big data and social computing; business
intelligence; manag-
ing IT demand; improving the customer experience; and
enhancing development
productivity.
resourcing options; and innovating with IT.
Working Smarter at Continental Furniture and Enterprise
Architecture at Nationstate
Insurance.
from the second edition being moved to the Web site.
16. All too often, in our efforts to prepare future executives to deal
effectively with
the issues of IT strategy and management, we lead them into a
foreign country where
they encounter a different language, different culture, and
different customs. Acronyms
(e.g., SOA, FTP/IP, SDLC, ITIL, ERP), buzzwords (e.g.,
asymmetric encryption, proxy
servers, agile, enterprise service bus), and the widely adopted
practice of abstraction
(e.g., Is a software monitor a person, place, or thing?) present
formidable “barriers to
entry” to the technologically uninitiated, but more important,
they obscure the impor-
tance of teaching students how to make business decisions about
a key organizational
resource. By taking a critical issues perspective, IT Strategy:
Issues and Practices treats IT
as a tool to be leveraged to save and/or make money or
transform an organization—not
as a study by itself.
As in the first two editions of this book, this third edition
combines the experi-
ences and insights of many senior IT managers from leading-
edge organizations with
thorough academic research to bring important issues in IT
management to life and
demonstrate how IT strategy is put into action in contemporary
businesses. This new
edition has been designed around an enhanced set of critical
real-world issues in IT
management today, such as innovating with IT, working with
big data and social media,
17. xiii
xiv Preface
enhancing customer experience, and designing for business
intelligence and introduces
students to the challenges of making IT decisions that will have
significant impacts on
how businesses function and deliver value to stakeholders.
IT Strategy: Issues and Practices focuses on how IT is changing
and will continue to
change organizations as we now know them. However, rather
than learning concepts
“free of context,” students are introduced to the complex
decisions facing real organi-
zations by means of a number of mini cases. These provide an
opportunity to apply
the models/theories/frameworks presented and help students
integrate and assimilate
this material. By the end of the book, students will have the
confidence and ability to
tackle the tough issues regarding IT management and strategy
and a clear understand-
ing of their importance in delivering business value.
Key Features of This Book
management issues as opposed to technology issues
-
sions, enabling problem-based learning
A DIFFERENT APPROACH TO TEACHING IT STRATEGY
The real world of IT is one of issues—critical issues—such as
18. the following:
media, in our business?
However, the majority of management information systems
(MIS) textbooks are orga-
nized by system category (e.g., supply chain, customer
relationship management, enterprise
resource planning), by system component (e.g., hardware,
software, networks), by system
function (e.g., marketing, financial, human resources), by
system type (e.g., transactional,
decisional, strategic), or by a combination of these.
Unfortunately, such an organization
does not promote an understanding of IT management in
practice.
IT Strategy: Issues and Practices tackles the real-world
challenges of IT manage-
ment. First, it explores a set of the most important issues facing
IT managers today, and
second, it provides a series of mini cases that present these
critical IT issues within the
context of real organizations. By focusing the text as well as the
mini cases on today’s
critical issues, the book naturally reinforces problem-based
learning.
Preface xv
IT Strategy: Issues and Practices includes thirteen mini cases—
each based on a real
company presented anonymously.1 Mini cases are not simply
abbreviated versions of
19. standard, full-length business cases. They differ in two
significant ways:
1. A horizontal perspective. Unlike standard cases that develop
a single issue within
an organizational setting (i.e., a “vertical” slice of
organizational life), mini cases
take a “horizontal” slice through a number of coexistent issues.
Rather than looking
for a solution to a specific problem, as in a standard case,
students analyzing a mini
case must first identify and prioritize the issues embedded
within the case. This mim-
ics real life in organizations where the challenge lies in
“knowing where to start” as
opposed to “solving a predefined problem.”
2. Highly relevant information. Mini cases are densely written.
Unlike standard
cases, which intermix irrelevant information, in a mini case,
each sentence exists for
a reason and reflects relevant information. As a result, students
must analyze each
case very carefully so as not to miss critical aspects of the
situation.
Teaching with mini cases is, thus, very different than teaching
with standard cases.
With mini cases, students must determine what is really going
on within the organiza-
tion. What first appears as a straightforward “technology”
problem may in fact be a
political problem or one of five other “technology” problems.
Detective work is, there-
fore, required. The problem identification and prioritization
skills needed are essential
20. skills for future managers to learn for the simple reason that it
is not possible for organi-
zations to tackle all of their problems concurrently. Mini cases
help teach these skills to
students and can balance the problem-solving skills learned in
other classes. Best of all,
detective work is fun and promotes lively classroom discussion.
To assist instructors, extensive teaching notes are available for
all mini cases. Developed
by the authors and based on “tried and true” in-class experience,
these notes include case
summaries, identify the key issues within each case, present
ancillary information about the
company/industry represented in the case, and offer guidelines
for organizing the class-
room discussion. Because of the structure of these mini cases
and their embedded issues, it
is common for teaching notes to exceed the length of the actual
mini case!
This book is most appropriate for MIS courses where the goal is
to understand how
IT delivers organizational value. These courses are frequently
labeled “IT Strategy” or
“IT Management” and are offered within undergraduate as well
as MBA programs. For
undergraduate juniors and seniors in business and commerce
programs, this is usually
the “capstone” MIS course. For MBA students, this course may
be the compulsory core
course in MIS, or it may be an elective course.
Each chapter and mini case in this book has been thoroughly
tested in a variety
of undergraduate, graduate, and executive programs at Queen’s
21. School of Business.2
1 We are unable to identify these leading-edge companies by
agreements established as part of our overall
research program (described later).
2 Queen’s School of Business is one of the world’s premier
business schools, with a faculty team renowned
for its business experience and academic credentials. The
School has earned international recognition for
its innovative approaches to team-based and experiential
learning. In addition to its highly acclaimed MBA
programs, Queen’s School of Business is also home to Canada’s
most prestigious undergraduate business
program and several outstanding graduate programs. As well,
the School is one of the world’s largest and
most respected providers of executive education.
xvi Preface
These materials have proven highly successful within all
programs because we adapt
how the material is presented according to the level of the
students. Whereas under-
graduate students “learn” about critical business issues from the
book and mini cases
for the first time, graduate students are able to “relate” to these
same critical issues
based on their previous business experience. As a result,
graduate students are able to
introduce personal experiences into the discussion of these
critical IT issues.
ORGANIZATION OF THIS BOOK
One of the advantages of an issues-focused structure is that
22. chapters can be approached
in any order because they do not build on one another. Chapter
order is immaterial; that
is, one does not need to read the first three chapters to
understand the fourth. This pro-
vides an instructor with maximum flexibility to organize a
course as he or she sees fit.
Thus, within different courses/programs, the order of topics can
be changed to focus on
different IT concepts.
Furthermore, because each mini case includes multiple issues,
they, too, can be
used to serve different purposes. For example, the mini case
“Building Shared Services
at RR Communications” can be used to focus on issues of
governance, organizational
structure, and/or change management just as easily as shared
services. The result is a
rich set of instructional materials that lends itself well to a
variety of pedagogical appli-
cations, particularly problem-based learning, and that clearly
illustrates the reality of IT
strategy in action.
The book is organized into four sections, each emphasizing a
key component of
developing and delivering effective IT strategy:
Section I: Delivering Value with IT is designed to examine the
complex ways that
IT and business value are related. Over the past twenty years,
researchers and prac-
titioners have come to understand that “business value” can
mean many different
things when applied to IT. Chapter 1 (Developing and
23. Delivering on the IT Value
Proposition) explores these concepts in depth. Unlike the
simplistic value propo-
sitions often used when implementing IT in organizations, this
chapter presents
“value” as a multilayered business construct that must be
effectively managed at
several levels if technology is to achieve the benefits expected.
Chapter 2 (Developing
IT Strategy for Business Value) examines the dynamic
interrelationship between
business and IT strategy and looks at the processes and critical
success factors
used by organizations to ensure that both are well aligned.
Chapter 3 (Linking IT
to Business Metrics) discusses new ways of measuring IT’s
effectiveness that pro-
mote closer business–IT alignment and help drive greater
business value. Chapter
4 (Building a Strong Relationship with the Business) examines
the nature of the
business–IT relationship and the characteristics of an effective
relationship that
delivers real value to the enterprise. Chapter 5 (Communicating
with Business
Managers) explores the business and interpersonal competencies
that IT staff will
need in order to do their jobs effectively over the next five to
seven years and what
companies should be doing to develop them. Finally, Chapter 6
(Building Better IT
Leaders from the Bottom Up) tackles the increasing need for
improved leadership
skills in all IT staff and examines the expectations of the
business for strategic and
innovative guidance from IT.
24. Preface xvii
In the mini cases associated with this section, the concepts of
delivering
value with IT are explored in a number of different ways. We
see business and
IT executives at Hefty Hardware grappling with conflicting
priorities and per-
spectives and how best to work together to achieve the
company’s strategy. In
“Investing in TUFS,” CIO Martin Drysdale watches as all of the
work his IT depart-
ment has put into a major new system fails to deliver value. And
the “IT Planning
at ModMeters” mini case follows CIO Brian Smith’s efforts to
create a strategic
IT plan that will align with business strategy, keep IT running,
and not increase
IT’s budget.
Section II: IT Governance explores key concepts in how the IT
organization is
structured and managed to effectively deliver IT products and
services to the orga-
nization. Chapter 7 (IT Shared Services) discusses how IT
shared services should be
selected, organized, managed, and governed to achieve
improved organizational
performance. Chapter 8 (A Management Framework for IT
Sourcing) examines
how organizations are choosing to source and deliver different
types of IT functions
and presents a framework to guide sourcing decisions. Chapter 9
(The IT Budgeting
25. Process) describes the “evil twin” of IT strategy, discussing
how budgeting mecha-
nisms can significantly undermine effective business strategies
and suggesting
practices for addressing this problem while maintaining
traditional fiscal account-
ability. Chapter 10 (Managing IT-based Risk) describes how
many IT organizations
have been given the responsibility of not only managing risk in
their own activities
(i.e., project development, operations, and delivering business
strategy) but also
of managing IT-based risk in all company activities (e.g.,
mobile computing, file
sharing, and online access to information and software) and the
need for a holistic
framework to understand and deal with risk effectively. Chapter
11 (Information
Management: The Nexus of Business and IT) describes how new
organizational
needs for more useful and integrated information are driving the
development of
business-oriented functions within IT that focus specifically on
information and
knowledge, as opposed to applications and data.
The mini cases in this section examine the difficulties of
managing com-
plex IT issues when they intersect substantially with important
business issues.
In “Building Shared Services at RR Communications,” we see
an IT organiza-
tion in transition from a traditional divisional structure and
governance model
to a more centralized enterprise model, and the long-term
challenges experi-
26. enced by CIO Vince Patton in changing both business and IT
practices, includ-
ing information management and delivery, to support this new
approach. In
“Enterprise Architecture at Nationstate Insurance,” CIO Jane
Denton endeavors
to make IT more flexible and agile, while incorporating new and
emerging tech-
nologies into its strategy. In “IT Investment at North American
Financial,” we
show the opportunities and challenges involved in prioritizing
and resourcing
enterprisewide IT projects and monitoring that anticipated
benefits are being
achieved.
Section III: IT-Enabled Innovation discusses some of the ways
technology is
being used to transform organizations. Chapter 12 (Innovation
with IT) examines
the nature and importance of innovation with IT and describes a
typical inno-
vation life cycle. Chapter 13 (Big Data and Social Computing)
discusses how IT
leaders are incorporating big data and social media concepts and
technologies
xviii Preface
to successfully deliver business value in new ways. Chapter 14
(Improving the
Customer Experience: An IT Perspective) explores the IT
function’s role in creating
and improving an organization’s customer experiences and the
role of technology
27. in helping companies to understand and learn from their
customers’ experiences.
Chapter 15 (Building Business Intelligence) looks at the nature
of business intelli-
gence and its relationship to data, information, and knowledge
and how IT can be
used to build a more intelligent organization. Chapter 16
(Enabling Collaboration
with IT) identifies the principal forms of collaboration used in
organizations, the
primary business drivers involved in them, how their business
value is measured,
and the roles of IT and the business in enabling collaboration.
The mini cases in this section focus on the key challenges
companies face in
innovating with IT. “Innovation at International Foods”
contrasts the need for pro-
cess and control in corporate IT with the strong push to
innovate with technology
and the difficulties that ensue from the clash of style and
culture. “Consumerization
of Technology at IFG” looks at issues such as “bring your own
device” (BYOD) to
the workplace. In “CRM at Minitrex,” we see some of the
internal technological and
political conflicts that result from a strategic decision to
become more customercen-
tric. Finally, “Customer Service at Datatronics” explores the
importance of present-
ing unified, customer-facing IT to customers.
Section IV: IT Portfolio Development and Management looks at
how the IT
function must transform itself to be able to deliver business
value effectively in
the future. Chapter 17 (Application Portfolio Management)
28. describes the ongoing
management process of categorizing, assessing, and
rationalizing the IT application
portfolio. Chapter 18 (Managing IT Demand) looks at the often
neglected issue of
demand management (as opposed to supply management),
explores the root causes
of the demand for IT services, and identifies a number of tools
and enablers to
facilitate more effective demand management. Chapter 19
(Creating and Evolving
a Technology Roadmap) examines the challenges IT managers
face in implement-
ing new infrastructure, technology standards, and types of
technology in their real-
world business and technical …