research at least two (2) companies that have experienced downgrades related to stock performance or bond ratings within the last five (5) years.

  • Use the Internet or Strayer Library to research at least two (2) companies that have experienced downgrades related to stock performance or bond ratings within the last five (5) years. Next, analyze the primary ways in which auditors would use the information from downgrades to assess business risk or evaluate the likelihood that the downgrades would impact the auditor’s assessment of the client’s business environment. Ascertain the major ways in which this information would impact the audit risk model equation. Support your position.
  • According to an article in the CPA Journal, the auditor considers reliability of audit evidence collected and the reliability of that evidence to reduce the risk of financial statements containing undetected material errors. Compare and contrast at least two (2) types of evidence, and make a recommendation as to which you believe is the most reliable in reducing risk. Support your position.

analyze in a state (Maryland), federal (United States) , or global social welfare policy that affects an at-risk, marginalized, oppressed, underrepresented, or over looked group population.

Assignment: Position Paper

Sometimes, during heated discussions and debates about social policy, the underlying reasons for the policy go unnoticed. Advocates and policymakers may become so committed to their perspectives and to winning the debates that they lose focus on the larger context surrounding an issue. The purpose of policy is to improve the lives and well-being of individuals and groups in our society. As you assume the role of a social work policymaker, consider the importance of keeping the needs and experiences of vulnerable populations at the forefront of your mind in your advocacy efforts. This can help to assure effective policy practice.

For this Assignment, you will analyze in a state (Maryland), federal (United States) , or global social welfare policy that affects an at-risk, marginalized, oppressed, underrepresented, or over looked group population. Finally, consider the impact of social policy from the perspective of the group you selected.

Not An Essay, but before you answer a question write down the question first.

Assignment (5-7 double-spaced pages, APA format). In addition to a minimum of eight scholarly references, which may include electronic government documents and reputable websites, your paper should include:

1-A description of the current policy approach for addressing the social issue you selected

2- A description of the current policy goals for addressing the social issue you selected

3- A description of the population the current policy approach covers

4-An explanation of the funding levels for the current policy approach and whether they are sufficient to address the issue

5-An explanation of how this policy may affect at-risk, marginalized, underrepresented, overlooked, or oppressed populations. Identify a specific at-risk population.

6-An analysis of whether or not the policy meets the needs of the population groups most affected by the policy.

7-Recommendations for alternative policies that would address the gaps identified in the policy. Please be specific in recommendations.

Hide 

Write at least 500 words analyzing a subject you find in this article related to a threat to confidentiality, integrity, or availability of data.

Write at least 500 words analyzing a subject you find in this article related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.

Write in essay format not in bulleted, numbered or other list format.

“What is the first name of the woman who cleans the school?”

During my second month of college, our professor gave us a pop quiz. I was a conscientious student and had breezed through the questions until I read the last one: “What is the first name of the woman who cleans the school?”

Surely this was some kind of joke. I had seen the cleaning woman several times. She was tall, dark-haired and in her 50s, but how would I know her name? I handed in my paper, leaving the last question blank. Just before class ended, one student asked if the last question would count toward our quiz grade.

“Absolutely,” said the professor. “In your careers, you will meet many people. All are significant. They deserve your attention and care, even if all you do is smile and say “hello”.

I’ve never forgotten that lesson. I also learned her name was Dorothy.

Each paper will be 6-8 double spaced pages and be based on a journal article or issue of the student’s choice. If you use an online source, check that it provides credible information.

Each paper will be 6-8 double spaced pages and be based on a journal article or issue of the student’s choice. If you use an online source, check that it provides credible information.   The discussion papers should summarize and analyze the main points put forward by the author(s). Do you agree or disagree with the author, and what is the basis for your position? Exceptional work would include additional research and thoughtful synthesis of the authors’ ideas with your ideas. You should choose an article that focuses on financial management and/or accounting content. Leveraging Financial Social Media Data for Corporate Fraud Detection WEI DONG, SHAOYI LIAO, AND ZHONGJU ZHANG WEI DONG (weidong1@mail.ustc.edu.cn ) is a Ph.D. candidate in management science and engineering at the School of Management, University of Science and Technology of China. He is in a joint doctoral program with City University of Hong Kong. His research interests include social media, text mining, and business intelli- gence. He has published in European Journal of Operational Research . SHAOYI LIAO (issliao@cityu.edu.hk ) is a professor in the Department of Information Systems, City University of Hong Kong. He obtained his Ph.D. in information systems from the Aix-Marseille University, France. His research is focused on artificial intelligence, business intelligence, and social media analytics. He has published in MIS Quarterly, INFORMS Journal on Computing, Decision Support Systems , and ACM Transactions on Management Information Systems , among others.

ZHONGJU ZHANG (Zhongju.Zhang@asu.edu ; corresponding author) is codirector of the Actionable Analytics Lab and an associate professor of information systems at the W. P. Carey School of Business, Arizona State University. His research focuses on how information technology and data analytics impact consumer behavior and decision making, create business value, and transform business models. His work has appeared in the leading academic journals including Information Systems Research, Journal of Management Information Systems, MIS Quarterly, Production and Operations Management, INFORMS Journal on Computing , and others. He has won numerous research and teaching awards.

ABSTRACT : Corporate fraud can lead to significant financial losses and cause immea- surable damage to investor confidence and the overall economy. Detection of such frauds is a time-consuming and challenging task. Traditionally, researchers have been relying on financial data and/or textual content from financial statements to detect corporate fraud. Guided by systemic functional linguistics (SFL) theory, we propose an analytic framework that taps into unstructured data from financial social media platforms to assess the risk of corporate fraud. We assemble a unique data set including 64 fraudulent firms and a matched sample of 64 nonfraudulent firms, as well as the social media data prior to the firm ’s alleged fraud violation in Accounting and Auditing Enforcement Releases (AAERs). Our framework automatically extracts signals such as sentiment features, emotion features, topic features, lexical features, and social network features, which are then fed into machine learning classifiers for fraud detection. We evaluate and compare the performance of our algorithm against baseline approaches using only financial ratios and language-based features respectively. We further validate the robustness of our algorithm by detect- ing leaked information and rumors, testing the algorithm on a new data set, and Journal of Management Information Systems / 2018, Vol. 35, No. 2, pp. 461 –487. Copyright © Taylor & Francis Group, LLC ISSN 0742 –1222 (print) / ISSN 1557 –928X (online) DOI: https://doi.org/10.1080/07421222.2018.1451954 conducting an applicability check. Our results demonstrate the value of financial social media data and serve as a proof of concept of using such data to complement traditional fraud detection methods.

KEY WORDS AND PHRASES : corporate fraud, financial social media, fraud detection, social media platform, systemic functional linguistics theory, text analytics.

Financial fraud is a serious commercial problem worldwide and has many different types, including corporate fraud, securities and commodities fraud, health-care fraud, financial institution fraud, mortgage fraud, and others [ 24]. Corporate fraud con- tinues to be one of the FBI ’s highest criminal priorities, and is defined as a “deliberate fraud committed by management that injures investors and creditors through misleading financial statements ”[22, p. 28]. Even though the number of corporate fraud cases is relatively lower than that of other kinds of frauds, the financial losses associated with corporate fraud can be devastating once it happens.

For example, the Enron scandal cost shareholders $74 billion while the WorldCom fraud led to 30,000 lost jobs and $180 billion in losses for investors. In addition to the tremendous financial losses, corporate fraud also has the potential to cause immeasurable damage to the overall economy and investor confidence. Therefore, corporate fraud risk assessment and detection before the U.S. Securities and Exchange Commission (SEC) disclosure have received significant attention from both practitioners and academic research.

Existing analytical procedures for corporate fraud investigation highly rely on auditing accountants and regulators, who analyze complex financial records and documents including financial statements. Financial statements, however, can be out of date upon release. They usually discuss a company ’s past operations and perfor- mances for the previous quarter, if not earlier. While useful to identify fraudulent and nonfraudulent activities, data contained in a financial statement are often not appro- priate to detect corporate fraud in a timely manner. According to Liou [ 40], approaches using financial statements often result in an average time lag of around three years from fraud inception to detection of the fraud. Additionally, financial statements may contain misleading and fictitious information; thus, further in-depth research is needed to assess the validity and risks of material misstatement in these documents [ 34 ]. In recent years, financial social media platforms for investment research have burgeoned. In addition to the fundamental research and broad in-depth coverage of various equities, these platforms allow registered users to participate in discussions, offer insights and alternative perspectives, and point out risks or flaws through an interactive forum/commentary mechanism. The user base of the platform is diverse.

Besides investors, industry experts, and financial analysts, the platform also has a large readership including money managers, business leaders, journalists, bloggers, and the public. The opinions and views expressed in the analysis and discussions of 462 DONG, LIAO, AND ZHANG these platforms have been shown to contain value-relevant information and have been used to predict future stock returns and earnings surprises [ 17]. Dyck et al. [ 21] also recognize the power of nontraditional players (such as employees, media out- lets, and public investors) as whistleblowers about a potential violation of federal laws and regulations that has occurred, is ongoing, or is about to occur.

We believe the user-generated content (UGC) on financial social media platforms can be useful in assessing the potential risk of corporate fraud. Anecdotal evidence seems to support this idea. Take NQ Mobile (a Chinese mobile security company) as an example. Muddy Water Research (a market research and short-selling firm) released a harsh assessment citing “a massive fraud ”of NQ Mobile on October 24, 2013. The news led to a 47 percent drop in the NQ stock price overnight. It is, however, worth noting that a Xueqiu (major Chinese social media platform for financial investors) user named “kankan123 ”had released a series of analysis reports questioning NQ Mobile ’s fraud behavior at the beginning of 2013 (detailed informa- tion can be found at http://xueqiu.com/S/NQ/25820468 ), which is more than six months before the report from Muddy Water Research. An analytic framework that takes advantage of such UGC can thus help audit firms, government regulators, securities agencies, and investors to achieve their strategic goals by providing an early and effective fraud detection algorithm to protect public interests. These stakeholders can leverage the framework to better estimate the fraud risk associated with each target firm so as to make informed decisions, such as minimizing exposure to fraudulent firms and determining how to allocate resources to investigate target firms.

In this study, we seek to examine how to extract useful features from UGC on social media platforms and develop a text analytic framework to automatically detect corporate fraud. Our framework is grounded in systemic functional linguistics (SFL) theory [ 29], which provides foundations for our feature sets such as sentiment features, emotion features, topic features, lexical weights features, and social net- work features. We evaluate the performance of our algorithm using data from two platforms: SeekingAlpha and Yahoo Finance. Our extensive analyses demonstrate the efficacy of our algorithm as well as the leading effects of social media content on early corporate fraud detection. Additionally, we validate the practical contributions and implications of our algorithm by conducting an applicability check with four focus groups (each with three domain knowledge experts). The applicability check shows that major stakeholders in the financial industry feel that our approach is a helpful auxiliary tool, providing further evidence of the value of our framework. To the best of our knowledge, this is one of the first studies to use textual data from social media platforms for corporate fraud detection.

Literature Review Financial fraud and fraud detection has been an important topic in both the account- ing and the finance literature. It is relatively understudied in the information systems SOCIAL MEDIA FOR CORPORATE FRAUD DETECTION 463 literature. Here, we review existing literature about different types of financial fraud and the various methods that have been proposed to detect it. We highlight what might be missing and what we can add to further improve the existing methods.

Financial fraud can happen at both the firm and community levels. Community- level fraud usually involves a focal firm as well as external parties (such as customers and/or clients) related to the firm [ 54]. At the firm level, Ngai et al. [49] provided a detailed literature review on detecting financial fraud via data mining methods. Among different types of financial fraud, corporate fraud consists of activities undertaken by an individual (usually top management) to deliberately mislead investors, creditors, and the public so as to gain an unfair advantage. When facing market-driven pressures due to predicament or asset misappropriation because of personal affairs, firm managers tend to “overstate assets, sales and profit, or understate liabilities, expenses or losses ”[69, p. 5519] and disclose unreal growth opportunities in financial statements. With these conceited misrepresentations, Wall Street analysts and public investors will raise their expectations and earnings projections about this company. Likewise, in order to meet the new expectations and projections of the market, the management will have to make another misleading financial statement for the next quarter or fiscal year. This cycle constitutes the business process map of corporate fraud.

In order to improve financial reporting, the American Institute of Certified Public Accountants has established standard accounting principles. To fight corporate fraud, several auditing guidelines have been issued that auditors need to consider in identifying the risk of material misstatement in financial statements. Typically, financial statements for a business include income statements, balance sheets, state- ment of retained earnings, and cash flows. These contents can be broadly classified into structured (e.g., numeric financial variable and ratios, quantitative descriptions of operating conditions) and unstructured data (e.g., management discussion and analysis). Table 1 presents a sample of representative studies that use structured and unstructured data for corporate fraud detection. These studies are conventional fraud detection methods that tap into only traditional data sources such as financial statements and earnings conference calls.

From a methodology perspective, conventional auditing practices rely primarily on statistical analysis of structured financial data [ 15]. Kaminski et al. [ 34], however, argued that financial ratios provide limited ability to detect fraud because manage- ment can create fictitious numbers. Hence some researchers, for example, Brazel et al. [ 10], examined the effectiveness of nonfinancial variables on the risk of corporate fraud. With the development of natural language processing (NLP) tech- niques, researchers have begun to glean the textual contents and signals from financial statements and examine whether they can provide additional sources of information to predict fraud. Table 2 summarizes a list of studies that seek to detect fraud using text mining techniques (either a rule-based dictionary approach or statistical approach) [ 38]. Most of the studies in Table 2 used the management discussion and analysis (MD&A) section of financial reports, which is usually well-written by a firm ’s management team in formal business language. 464 DONG, LIAO, AND ZHANG Additionally, the MD&A section has a fairly rigid content structure, such as discus- sion of financial conditions, results of operations, and forward-looking statements for the company.

Data sources such as financial statements and earnings conference calls are usually well-planned and prepared in advance. Liou [ 40] found that detection methods using financial statements tend to result in a time lag from fraud inception to detection.

More importantly, financial statements and earnings conference calls do not capture opinions and insights from other stakeholders such as public investors and analysts.

Dyck et al. [ 21] and Cecchini et al. [ 16] argued the potential strategic value of using this new source of information —user-generated content from employees, media outlets, and public investors —to predict corporate fraud. Financial social media Table 1. Representative Studies of Corporate Fraud Detection and Data Sources Data type Indicators Literature Data source Structured data Numerical financial variables Cecchini et al. [ 15] Financial statements Financial ratios Summers and Sweeney [64]; Dechow et al. [19]; Abbasi et al. [ 1] Financial statements Nonfinancial variables Brazel et al. [ 10] Financial statements Unstructured data Features from language-based textual content Larcker and Zakolyukina [36] Earnings conference calls Purda and Skillicorn [ 55] MD&A section from financial statements Features from vocal speech Hobson et al. [ 30] Earnings conference calls Social media features Current study Financial social media platform, for example, SeekingAlpha Table 2. Text-based Methods of Corporate Fraud Detection Technique Literature Source of text Dictionary-based method Purda and Skillicorn [ 55] MD&A section from both annual and quarterly reports Larcker and Zakolyukina [ 36] Earnings conference calls Humpherys et al. [ 31] MD&A section of the 10-K report Statistical method Cecchini et al. [ 16]; Glancy and Yadav [ 26]; Moffitt et al. [ 47] MD&A section of the 10-K report Goel and Gangolly [ 27]; Goel et al. [ 28] The entire text of the 10-K report SOCIAL MEDIA FOR CORPORATE FRAUD DETECTION 465 platforms such as SeekingAlpha are natural venues that aggregate such user-gener- ated content online, and thus merit further study to examine their impacts on corporate fraud detection. It should be noted that the process of analyzing unstruc- tured textual data from financial social media platforms is drastically different from that using only the structured data and/or the MD&A section from financial state- ments. Dictionary-based text analysis methods would also not be appropriate here since the contributors of this social media content are not the management team of a firm. It is therefore difficult to construct a context-aware dictionary.

Theoretical Foundation for Social Media-Based Corporate Fraud Detection To capture the salient features from UGC and to understand how users on social media platforms use language to express their opinions about a company ’s operations and performances, we refer to systemic functional linguistics (SFL) theory [ 29 , p. 15]. SFL argues that language is a system of choices/options that writers use to achieve certain goals. The meaning of a text is dependent on those choices within a language system [ 65 ]. The term “systemic ”views language as “a network of systems or interrelated sets of options for making meaning. ”The term “functional ”indicates that the approach is co ncerned with contextualized and practical uses.

SFL theory includes three interrelated fun ctions: ideational, interpersonal, and textual. Ideational function states th at language is about construing ideas [ 29 ]. Interpersonal function refers to language as a medium for interaction, and it is the means for creating and maintaining our interpersonal relations. These two functions are interlinked via the textual function, which determines how informa- tion is organized and presented to create a coherent flow of discourse. In other words, ideational and textual functions focus on the content of messages, while interpersonal function deals with interaction structures.

Ideational Function The ideational function can be represented by topics, opinions, and emotions [ 2]. Textual documents usually exhibit multiple topics [ 8]. Brown et al. [ 11]foundthat these thematic topics are informative in predicting intentional financial statement mis- reporting. We believe that topics discussed in the social media data of a fraudulent firm can differ from those of a legitimate firm and are thus useful in classifying firms. We adopt latent Dirichlet allocation (LDA) [ 8], a widely used topic model, to extract thematic topics from social media data. Opinions are sentiment polarities (e.g., positive, neutral, and negative) about a particular entity [ 52]. According to Buller and Burgoon [13], deceivers (e.g., fraudulent firms) tend to engage in more strategic activity (infor- mation, behavior and image management) designed to project a positive image. We adopt the sentiment words dictionary in the financial domain created by Loughran and 466 DONG, LIAO, AND ZHANG McDonald [ 41] to measure sentimental opinions expressed by users on financial social media platforms. Emotions consist of various affects such as happiness, sadness, horror, and anger [ 2]. Newman et al. [ 48] found that linguistic styles (such as hate, sadness, anger) can predict deception. In this study, we use the emotional categories defined in the Linguistic Inquiry and Word Count dictionary [ 53]tomeasure “assent, ”“ anxiety, ” “anger, ”“ swear, ”and “sadness ”emotions [ 36]. Additionally, according to cognitive theory, cognitive appraisal is a component of emotion [ 37 ]. Cognitive appraisal in the context of corporate fraud refers to how an individual views a firm ’s operations condition. We measure cognitive appraisal by (1) overall description of the fraudulent situation; (2) detailed analysis of the fraudulent behavior; and (3) legal judgments and sanctions.

Three separate word lists are developed to capture each of the above three components. The synonyms of fraud word list contains 120 words that are widely used in the Accounting and Auditing Enforcement Releases (AAERs), such as “phony, ”“ fake, ”“ sham, ”and “deceptive. ”The fraudulent behavior word list contains 136 words such as “mislead, ”“ conceal, ”“ fabricate, ”and “detect. ”The legal judgment word list contains 32 words such as “jurisdiction, ”“ crime, ” “forfeiture, ” and “sanction. ” Ta b l e 3 summarizes the opinion and emotional features as well as their measurements.

Table 3. Measures of Opinions and Emotion Related Features Type Feature Measurement Opinions Ratio of positive sentiment Total number of positive words divided by total number of words* Ratio of negative sentiment Total number of negative words divided by total number of words Emotions Ratio of assent words Total number of assent words divided by total number of words Ratio of anxiety words Total number of anxiety words divided by total number of words Ratio of anger words Total number of anger words divided by total number of words Ratio of swear words Total number of swear words divided by total number of words Ratio of sadness words Total number of sadness words divided by total number of words Ratio of fraud synonyms words Total number of synonyms of fraud divided by total number of words Ratio of fraud analysis words Total number of fraud analysis words divided by total number of words Ratio of legal judgments words Total number of legal judgments words divided by total number of words *Total number of words is the number of words ignoring stop words. SOCIAL MEDIA FOR CORPORATE FRAUD DETECTION 467 Textual Function The major element of the textual function is thematic structure. It shows the progression of what is going on and carries the writer ’s ideology, which to tells people what the writer is really concerned about in his mind [ 29]. Textual function can be conceptualized into three information types: writing styles, genres, and vernaculars [ 2,5]. Writing styles and vernaculars are not applicable in our context since users on social media platforms do not follow a unified writing style and user vernaculars.

Genres in a document represent how writers typically use language to respond to recurring situations [ 32]. Merkl-Davies and Brennan [ 45] found that corporate narratives can be regarded as an identifiable genre for business communication with distinctive linguistic properties. Genres can be distinguished by genre analysis using word frequencies based on corpus linguistics [ 60 ]. We adopt a modified word frequency, term frequency-inverse document frequency (TF-IDF) [ 58], for genre classification. TF-IDF assumes that only terms with a high term frequency in a given document but a low document frequency in the whole collection of documents are important in classifying documents. TF-IDF scheme represents a collection of documents by document-term vectors, of which each element is the weight of a term in a document.

Interpersonal Function Interpersonal function refers to the fact that “language is a medium of exchange between people ”[2,61, p. 75]. It is generally represented by social interaction/ structure that can be built through the reply-to relationships between messages [ 25]. Abbasi and Chen[ 2] found that employees ’social network structure presented in inner-firm e-mails changed after the Enron fraud. Pak and Zhou [ 51] provided new evidence that deception is a strategic activity where the deceiver juggles between the dual goals of promoting deceptive ideas and avoiding detection. They found that social structural characteristics can be used to delineate deception in computer- mediated communication. Numbers of messages, posts, and/or comments have been used to capture social structure in UGC [ 3,4]. In this study, we track the number of Analysis reports (AR), the number of Breaking news (BN), and the number of StockTalk messages (SM) as well as the number of comments to those contents for each firm. In addition, we consider the number of distinctive authors who post AR and SM and the number of posts per author. Finally we track the number of users who follow the news related to a firm. Table 4 summarizes the measures of the features related to interpersonal function.

Based on the above discussions, in Figure 1 , we propose a text analytic framework to predict corporate fraud using financial social media data. Since the dimensionality of the TF-IDF term weights vector is often huge, we employ a dimension reduction technique (principal component analysis) for the TF-IDF 468 DONG, LIAO, AND ZHANG feature selection. Reduced dimension of TF-IDF features lowers the training time of classifiers and avoids potential ove rfitting problems. We use support vector machine (SVM) for document classification. SVM has been shown to be success- ful in working with large feature space and small sample set [ 16 ], and is capable of handling large sparse data [ 33 ]. For comparison purposes, we also implement logistic regression (LR), neural netwo rks (NN), and decision tree (DT) in this study. We use accuracy, recall, F1 score, and the area under the receiver operating characteristic (ROC) curve (AUC), whic h are standard information retrieval metrics [ 43 ], to mathematically evaluate th e quality of trained classifiers. A tenfold cross-validation technique is employed to assess how the model results generalize to independent test data.

Table 4. Measures of Interpersonal Function-Related Features Type Feature and measurement No. of features Social interaction structure Number of Analysis reports (AR), Breaking news (BN), or StockTalk messages (SM) 3 Number of comments to AR, BN, or SM 3 Numbers of distinctive authors for AR, or SM 2 Numbers of AR or SM per author 2 Number of followers 1 Figure 1. An SFL-Based Framework for Corporate Fraud Detection SOCIAL MEDIA FOR CORPORATE FRAUD DETECTION 469 Data Collection Our data came from a few sources. We selected SeekingAlpha ( http://seekingalpha. com ) as the source to collect financial social media data. SeekingAlpha is a crowd- sourced content service platform for investment research, with broad coverage of stocks, asset classes, exchange traded funds (ETFs), and investment strategy. Since its inception in early 2004, SeekingAlpha has grown to be the top destination for stock market opinion and analysis on the Internet with 4 million registered users.

Additionally, in contrast to other equity research platforms, insights on SeekingAlpha are provided by investors and industry experts from the buy-side rather than the sell-side [ 17]. Off-topic discussions are moderated by the 24-hour in- house moderation team at SeekingAlpha: posts on the bulletin boards are categorized by a ticker symbol, and only topic-related posts can be published due to the site ’s “optional post ”feature. For each firm, there are five types of information content: Analysis reports, Breaking news, Earning call transcripts, StockTalk, and Videos.

Analysis reports are created by analysts and platform contributors; Breaking news are created by SeekingAlpha editors, thus can be considered trustworthy [ 62]; Earning call transcripts come from the firm ’s conference call each quarter; StockTalk is organized as discussion forums; Videos are short video clips discussing the focal firm.

We crawled all the contents (including all comments) under the Analysis reports, Breaking news, and StockTalk sections, together with the social network structures for each firm in our sample. Since a fraudulent firm may be disclosed as committing financial fraud in several announcements of the SEC at different times, we consid- ered only the time of the first announcement and extracted only social media data prior to that point. Note that not all fraudulent firms have data on SeekingAlpha prior to their fraud disclosure time. As shown in Figure 2(a ), SeekingAlpha had not been established at the time when the firm ’s fraudulent behavior was disclosed. Figure 2. Timeline of Fraud Period and Establishment of SeekingAlpha 470 DONG, LIAO, AND ZHANG Hence, we did not include firms whose fraudulent behavior is disclosed before the establishment of SeekingAlpha.

In addition to the social media data, we also collected the financial ratios and the textual contents of the MD&A section from the annual financial statements of the firm. These data are used to compare the performance of our algorithm against baseline methods. Based on the literature, financial ratios in the first year of the fraudulent time period (called the first fraud year) for a fraudulent firm are always selected to represent the firm ’s operation performance [ 7,20 ]. The financial ratios of the first fraud year for a firm are selected from a database of global public companies called Compustat. The financial statements of the first fraud year are obtained from the SEC ’s official company file system —the EDGAR database. Sample Selection We used public traded companies in the U.S. stock market to test the performance of the proposed approach. First, all fraudulent publ ic firms were identified and labeled. We used AAERs to screen companies that are involv ed in financial frauds. The SEC has been issuing AAERs since 1982 to investigate a company or other related parties for alleged accounting misconducts. These releases provide varying degrees of details about the nature of the accounting and/or auditing misconduc t in financial statements. Dechow et al. [ 19] developed a comprehensive database contain ing 936 firms (and the misstatement events that affect at least one of the firms ’quarterly or annual financial statements from May 17, 1982, to October 19, 2013) after a thorough analysis of 3,490 AAERs.

We discarded the firms with only quarterly misstatement events because quarterly statements are unaudited [ 10]. This resulted in 804 companies with annual fraudulent events. Among these, 38 of the firms were accused of wrongdoing that is unrelated to financial misstatements, such as auditor issu es, bribes or disclosure-related issues, and others [ 19]. We removed those 38 firms from our sample. For each of the remaining 766 companies, we tried to find the SIC (Standa rd Industry Classification) code from the EDGAR database and the stock symbol from the Compustat database. The SIC code is used to check whether a company is a financial firm, such as banks, insurance companies, and CPA firms, for which the SIC ranges from 6000 to 6999. The stock symbol is the unique identifier we used to extract social me dia data for the company from SeekingAlpha. Companies that cannot be found in these two databases and SeekingAlpha are dropped. Following previous research, we also excluded financial firms whose SICs start with number 6 [ 6]. On one hand, the SEC ’s industry guidelines require specific disclosures for financial companies such as real estate partnerships, property and casualty insurance, and bank holding companies [ 55]. Additionally, accounting rules, asset valuations, and other characteristics for financial companies are different from those for other types of companies [ 23]. Finally, we discarded 22 companies whose financial data was missing during the fraud period in the Compustat database, and 29 firms whose fraudulent behavior was disclosed before the establishment of SeekingAlpha. We also dropped another 56 fraudulent firms that lacked sufficient social media data (less than 500 words SOCIAL MEDIA FOR CORPORATE FRAUD DETECTION 471 excluding stop words) during the period from the establishment of SeekingAlpha to the first disclosure time. Ta b l e 5 details our sample selection process. We matched each fraudulent firm with a control firm (nonfraudulent) for classifi- cation purposes [ 64]. This is an oversampling strategy, which is appropriate for handling rare events [ 3]. Random sampling in this case would result in an extremely high percentage of nonfraudulent firms in the sample, thus making attempts to investigate significant features for predicting corporate fraud not meaningful.

Nonfraudulent firms are selected based on two criteria. First, we tried to find a direct match by using the Compustat database on the basis of the fraud year, firm size, and industry; see Dong et al. [ 20] for detailed descriptions of the matching process. Additionally, each nonfraudulent firm should have enough textual data (at least 500 words excluding stop words) on SeekingAlpha. If many firms meet the selection criteria, one of them will be randomly chosen. The above sampling strategy leads to a 1:1 ratio for fraudulent and nonfraudulent firms. For a robustness check, we also examined the case when the sample is not balanced —that is, the ratio of fraudulent and nonfraudulent firms is not 1:1. Note that social media data for nonfraudulent firms are collected up to August 31, 2015, when this study started.

In summary, our final data set includes 64 fraudulent firms together with a corre- sponding 64 matched nonfraudulent firms.

Data Preprocessing For textual social media and MD&A content, we used the Stanford CoreNLP toolkit [44] to implement sentence segmentation and word tokenization. Punctuation marks, hyperlinks, numerical digits, and special symbols are removed after tokenization.

Furthermore, we removed the stop words developed for the financial industry by Table 5. Sample Selection Process Distinct companies Number Companies with accounting misconducts in Dechow et al. [ 19] data set 936 Less: companies with only quarterly fraudulent events 132 Subtotal (companies with annual fraudulent events) 804 Less: companies with auditor, bribes, disclosure, no dates, and other issues 38 Subtotal (companies with annual corporate fraud) 766 Less: Companies that cannot be found in SEC EDGAR database 111 Less: Companies that cannot be found in Compustat database 38 Less: Companies that cannot be found in SeekingAlpha 343 Less: Financial companies: Banks & Insurance (SIC 6000-6999) 103 Less: Companies ’financial data in fraud years cannot be found in Compustat database 22 Less: Companies that are disclosed before the establishment of SeekingAlpha 29 Less: Companies that do not have enough social media data 56 Total 64 472 DONG, LIAO, AND ZHANG Loughran and McDonald [ 41]. Words that appear only once in the entire corpus were also dropped in this study [ 66] because rare words are usually noninformative and most likely to be just noise [ 68]. The last important step in data preprocessing is stemming. Stemming refers to reducing a word to its base, which helps to discern the importance of specific words within the text. We adopted Wordnet Stemmer [ 46]in this study. Wordnet Stemmer keeps the morphology of a word form, such as nouns, adjectives, adverbs, and verbs. It also better retains the stem of a word; for example, the word “sharper ”(instead of “sharp ”), which could mean a fraud, will be retained by Wordnet Stemmer.

For financial ratios, we adopted a rich set of 84 yearly financial ratios (see Table 2 in the online Appendix). This feature set includes 12 annual financial ratios, 24 industry-collaboration contextual features, 24 industry-competition contextual fea- tures, and 24 organization contextual features. Among the 12 annual financial ratios (R1 to R12), seven of them, AQI, DSIR, DEPI, GMI, LEV, SG, and SGEE, come from Beneish [ 7] who discussed in detail why these ratios are related to financial fraud. The equation of CFED is derived from Dechow [ 18]. The other financial ratios are obtained from Abbasi et al. [ 1]. The industry and organization contextual features are generated based on year-to-year changes of accounting items retrieved from the Compustat database. If there are missing data or zero denominator during the computation, we used the techniques introduced in Beneish [ 7]. Table 6 describes the summary statistics of our data set; the numbers in parenth- eses are the average value.

Analysis and Evaluation We perform comprehensive analysis to systematically evaluate the efficacy of our proposed algorithm. As discussed earlier, four classifiers (SVM, NN, DT, and LR) are used to predict corporate fraud. We iteratively include each of the three cate- gories of input features (financial ratio, MD&A, social media data) to evaluate their effects on fraud detection. To further evaluate robustness, we test the predictive Table 6. Description of the Data Set Dataset (128 firms) No. of Analysis reports No. of Breaking news No. of StockTalk messages No. of sentences No. of words No. of financial ratios Social media data 3,981 (31.10) 2,251 (17.59) 1,672 (13.06) 184,356 (1,440.28) 2,613,362 (20,416.89) — MD&A data —— — 92,712 (724.31) 902,940 (7,054.22) — Financial ratios —— — — — 84 SOCIAL MEDIA FOR CORPORATE FRAUD DETECTION 473 power of our model on a separate holdout sample as well as using data from another financial social media platform Yahoo Finance.

Fraud Detection Using Only Social Media Data The input variables here are the features (discussed in the Theoretical Foundation Section) extracted from social media data. There are 2 sentiment features, 8 emotion features, and 11 social network features. Principal component analysis yields 127 lexical features. Following the topic model by Blei et al. [ 8], we compute the perplexity scores for different number of topics ranging from 20 to 1,000. In the end, the 100 topic feature model (with a minimum perplexity value of 1,239.77) is selected. Statistical descriptions for sentiment, emotion, and social network features are shown in Table 1 of the online Appendix. Table 7 reports the average classification performance of the four classifiers. It can be seen that the SVM model achieves the best testing performance among all classifiers. By contrast, the LR model obtains the worst performance. Using prior- disclosure information from SeekingAlpha, we can predict fraud with 75.50 percent accuracy in the test data set. Since all the social media data are prior to the first fraud disclosure time point, we can develop a fraud detection warning system by closely monitoring and extracting useful features from the social media platform, thus reducing the time lag between financial misstatements and fraud disclosure.

Using the SVM model with the best performance, we investigate each set of social media features independently. Average performances of the model with only social network features, topic features, sentiment and emotion features, and lexical features are shown in Figure 3 . We find that topic features are most predicative of fraud. Comparing social network and lexical features, we note that lexical features are helpful in the training data while social network features do better in the testing data.

Classification abilities of sentiment and emotion features are not as good as the other features in both the training and testing data.

The results of our model using the SVM classifier on imbalanced data with different ratios are presented in Figure 4 . We note that as the ratio of fraudulent to Table 7. Performance of Classification Using Only Social Media Features Average accuracy Average recall Average F1 score Average AUC SVM Training 99.66 99.50 99.66 99.94 Testing 75.50 81.56 76.50 86.32 NN Training 100.00 100.00 100.00 98.26 Testing 63.17 68.05 62.18 53.71 DT Training 98.52 98.30 98.52 96.44 Testing 63.10 66.54 64.93 43.34 LR Training 50.27 87.04 59.96 46.42 Testing 54.50 87.75 60.98 43.70 474 DONG, LIAO, AND ZHANG nonfraudulent firms decreases, the recalls and AUCs decrease slightly while the accuracy of the model increases. F1 scores, however, drop significantly as the data set becomes more imbalanced. The reason is that more nonfraudulent firms in the sample will train the classifier to classify firms as nonfraudulent as much as possible Accuracy Recall F1 AUC 60 65 70 75 80 85 90 95 100 Performance Training Accuracy Recall F1 AUC 50 55 60 65 70 75 Testing Social network Topic Sentiment and emotion Lexical Figure 3.Performance of Classification Using Each Set of Social Media Features Figure 4.Performance of SVM on Imbalanced Data SOCIAL MEDIA FOR CORPORATE FRAUD DETECTION 475 to increase classification accuracy. In other words, the ability for the classifier to detect fraud becomes low, which results in low values of recall and precision. Hence, the F1 score, which is the combination of recall and precision, drops quickly. The overall performances of the model on the imbalanced data set still look good.

Comparison with Baseline Methods In this section, we compare the performance of our model against methods using only structured financial ratios and language-based features from textual MD&A contents.

Baseline Method Using Only Financial Ratios Table 8 documents the average performances of the four classifiers using only financial ratio data. Again, the SVM model achieves the best performance. The average testing accuracy, however, is only 56.17 percent, much lower than the model performance using the social media data. Note that the baseline model performance is lower than that of Abbasi et al. [ 1] using the same financial ratios. This may have to do with treatment of missing values in the data sample.

The performance of the baseline method using financial ratios supports the find- ings by Kaminski et al. [ 34] and Dechow et al. [ 19 ] that a firm ’s financial numbers do not change dramatically between the fraudulent periods and the surrounding truthful years. Thus financial ratios of first fraud year would not be good indicators for discerning fraudulent or nonfraudulent cases. On the contrary, Purda and Skillicorn [ 55] found that word choice may raise red flags from truthful years to fraudulent periods. This explains why classification performances using features from social media data in the previous section are much better than the results using only financial ratios.

Table 8. Performance of Baseline Method Using Only Financial Ratios Average accuracy Average recall Average F1 score Average AUC SVM Training 99.39 98.77 99.37 99.96 Testing 56.17 77.74 63.37 49.29 NN Training 76.58 69.60 74.72 73.09 Testing 48.83 42.39 43.71 41.75 DT Training 97.41 96.75 97.37 95.34 Testing 41.17 42.08 40.09 36.02 LR Training 54.69 60.31 56.88 51.94 Testing 54.67 60.00 54.54 43.58 476 DONG, LIAO, AND ZHANG Baseline Method Using Only Language-Based Features in MD&A We replicate the procedure by Purda and Skillicorn [ 55] to analyze the MD&A section of firms ’financial statements. The most common 1,100 words are used. The fraction of in-bag observations is set to 75 percent. A random forest of 3,000 trees is created based on these in-bag documents and tested on another 25 percent out-bag documents. The top 200 words most predictive of fraud are found and used as language-based input features for classification. Performances of the four classifiers are presented in Table 9 . Here, the LR model achieves the best performance in terms of average accuracy (70.33 percent), recall (71.90 percent), and F1 score (70.10 percent) while SVM has the highest average AUC (69.82 percent). Comparing the numbers in Table 7 , Table 8 , and Table 9 , we demonstrate that our proposed algorithm using social media features outperforms the baseline methods using financial ratios and lan- guage-based features. We also note that the performance of the model using lan- guage-based features from the MD&A sections is better than that of the method using financial ratios.

Incremental Effect of Combined Feature Sets To test the incremental effect of each category of data, we gradually add language- based features and then social media features into financial ratios. The classification performance using three types of feature sets — (1) only financial ratios, (2) a combination of financial ratios and language-based features, and (3) a full combina- tion of financial ratios, language-based features, and social features —are investi- gated. The performances of the four classifiers using these three types of feature sets are recorded in Tables 10 –13. Considering the performances of the SVM classifier in Ta b l e 1 0 , it is clear that the performance of the combined financial ratios and language-based features is better than that using only financial ratios. Moreover, the performance of the fully combined feature set is better than that using the combination of financial ratios Table 9. Performance of Baseline Method Using Only Language-based Features from MD&A Contents Average accuracy Average recall Average F1 score Average AUC SVM Training 97.29 97.01 97.28 99.50 Testing 66.67 66.02 64.25 69.82 NN Training 100.00 100.00 100.00 98.26 Testing 66.33 62.19 64.69 52.09 DT Training 99.14 98.81 99.10 97.57 Testing 52.78 50.83 54.98 54.14 LR Training 100.00 100.00 100.00 98.26 Testing 70.33 71.90 70.10 58.96 SOCIAL MEDIA FOR CORPORATE FRAUD DETECTION 477 and language-based features. Performance is improved when more features are added. The same can be said of the NN model. This result shows that there is indeed incremental value of these three sources of information for fraud detection.

In the DT classifier, the performance combining financial ratios and language- based features is better than that using only financial ratios. But the performance using all the features is slightly worse than that using combined financial ratios and language-based features. In the LR classifier, when adding more features, the final performance decreases. This demonstrates that more features are not necessarily better when classifying fraud. Including all features could lead to overfitted models Table 10. Performance of SVM Classifier Using Combined Features SVM Average accuracy Average recall Average F1 score Average AUC Financial ratios Training 99.39 98.77 99.37 99.96 Testing 56.17 77.74 63.37 49.29 Financial ratios and language-based features Training 98.71 98.60 98.72

Find a publicly available secondary dataset that will allow you to answer at least one of your research question for your proposal. 

  1. Find a publicly available secondary dataset that will allow you to answer at least one of your research question for your proposal.
  2. What is your research question?
  3. Explain your IV, DV, and how you are conceptualizing and operationalizing them.  What variables will you be using? List at least 2 covariates that you feel it is important to include.  Why did you choose these?
  4. What cleaning and recoding of these variables did you do? Be specific.

watch for reverse coding, values that seem out of logical range

  1. Create a table with the following descriptive statistics of your IV, DV, and at least two covariates: range, mean, median, mode, standard deviation

If the mean or median is not useful, include an explanation.

  1. Include a paragraph explaining the table.  What does this information tell me about these variables? Be specific.
  2. Make sure to include the dataset and your Stata do file or SPSS syntax.

Understanding the function and responsibilities of each layer of the OSI model will help you to understand how network communications function.

Understanding the function and responsibilities of each layer of the OSI model will help you to understand how network communications function. To make the most of the OSI model, you must be able to remember the name of the seven layers in their proper order. Let’s have some fun and think about mnemonics from the initial letters of the layer names so they are easier to remember. You may work from the physical layer to the application layer or the reverse.

For example: Physical – Data link – Network – Transport – Session – Presentation – Application          Please —-Do ———–Not ———Throw ——-Sausage–Pizza ———–Away.

Think of an original mnemonic for the OSI model and post with your discussion post. Next, select one of the layers and: (1) discuss a function of the layer and (2) provide an example of a common networking component for the layer.

For example: Layer 2 is the data link layer and allows a device to access the network to send and receive messages. A common network component for this layer is a network interface card (NIC).

There are many functions and components to select from, so please do not replicate selections already chosen by your peers.

reflect on the ERM implementation in JAA Inc, make recommendations and determine if it can be implemented in your current or future organizations.

Chapter 22 explained ERM and JAA Inc. Do you agree with the approach to implement an ERM and why? If you could change anything about the reasons to implement ERM in this case study what would that be and why? Would you implement the same ERM approach in your current organization (or future organization)?

To complete this assignment, you must do the following:

A) Create a new thread by Thursday. As indicated above, reflect on the ERM implementation in JAA Inc, make recommendations and determine if it can be implemented in your current or future organizations.

NOte:

Need 400 words. Referances needed.

Attached filed

The Airline Research Paper is an individual student effort but with roots in the group collaboration.

The Airline Research Paper is an individual student effort but with roots in the group collaboration. Students will choose an airline (passenger or cargo) associated with their group’s region and individually write a critical analysis of the airline’s operation. The paper will cover the listed topics (as a minimum) in a paper of 8 to 12 pages (not including title and reference pages) in current APA format. Note: A paper of this length does not require an abstract or table of contents.

Topics will include:

  1. Introduction and brief history of the chosen airline
  2. Fleet analysis including issues associated with fleet composition
  3. Route structure analysis (hub and spoke, point to point, or linear)For example, does the route structure fit the regional needs?
  4. Cost control analysisFor example, how effective is the airline at controlling their costs, and what techniques (like fuel hedging) do they use?
  5. ProfitabilityHistoric, recent, and your future profit projections
  6. Recommendations for improvement

Use Qatar airlines

have you ever tried KetoPower Boost ?

have you ever tried KetoPower Boost ? its a ketogenic diet which is usually a strict dietary intake that favours the consumptions of good fats. it makes shed down the excess fat by limiting the consumption of carbs so that body does not burn them and get an easy way out.doing something to get rid of excess pounds that one carries is essential. give it a try a pure 100% natural ingredients composition

https://prospercbdnews.com/ketopower-boost/752/

https://prospercbdnews.com/ketopower -boost/752/ the worst feeling is sitting on a chair and you look down to your flabby stomach and think how you can cut it down once and for all? no need to worry this supplement is what you need. KetoPower Boost is the ketosis process which helps you to cutt that extr a pounds from your body it helps in losing weight like a catalyst . it works naturally and the ingredients in this supplement are 100% natural. additionally the supplemnt has no side effects so a person can easy rely on this weight loss supplement and take the maximum advantage from it. just check out the link for further details. thanks! KetoPower Boost Review KetoPower Boo st is a fabulous formula that help to achieve the physique goals. this products allows you to shed down excess pounds and slim down your body. this product have the natural ingredients like garcinia cambogia that boost your metabolism this supplement is al l natural and its back by science 100%. this product is all about melting of fats it also improves the cognitive functionality. a person who is willing to cut down the excess pounds and want to get a slim and trimmed physique and give a try to this product which has no side effect and can work more efficiently than the other products. check out the video for more info and how to buy the product. https://prospercbdnews.com/ketopower -boost/752/

Are you part of your organization’s DR or BCP plan? Are you aware of your organization’s security goals?

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2  below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses.

DISCUSSION POST:

1. The security needs of small businesses are both similar and different at the same time to those of larger corporations. Regardless of the size of an organization, every organization requires to protect its information systems from the same type of vulnerabilities. For example, hacking, data breaches, infection of computer worms, or any other kind of cyber-attacks can be targeted at any organization despite its size. Therefore, when it comes to security, small firms need to invest in ensuring protection of their information as much as large corporations do (Aguilar, 2015). However, the size of the organization also determines how much is at risk for a specific organization as well as how much needs to be done to ensure security. Therefore, while a small firm with data belonging to a million consumers may need to take the same security measures as any big firm with billions of consumers, the big firm invests more to meet their security needs as compared to the smaller firm. Also, the bigger firm is likely to have a more complex system of managing information security while the process at a smaller firm may be more straight forward and streamlined than a smaller firm.

2. In the digital era, information security is a national goal. The Congressional Budget Office (n.d) explained that for national goals, the federal, state and local governments are authorized to make requirements of organizations including those in the private sector to meet specific security standards. The Unfunded Mandates Reforms Act works as a regulatory system to ensure that the unfunded mandates are realistic and reasonable. Therefore, I think that it is fair for the government for the government to require private organizations to comply with regulations that cost money. If an organization is not willing to invest in standard information security measures, it should not ask customers to invest private and confidential information either.

References

Aguilar, L. A. (2015). The Need for Greater Focus on the Cyber security Challenges Facing Small and Midsize Businesses.  Retrieved from https://www.sec.gov/news/statement/cybersecurity-challenges-for-small-midsize-businesses.html

Congressional Budget Office. (n.d). CBO’s Activities under the Unfunded Mandates Reform Act. Retrieved from https://www.cbo.gov/publication/51335

RESPONSE 1:

Great job on your insightful post this week. I read it and I totally enjoyed reading it. I like the way you have made it simple to understand and relate to. I could not agree with you more on the fact that the security needs of small businesses are both similar and different at the same time to those of larger corporations. Just as you have said, regardless of the size of an organization, every organization requires to protect its information systems from the same type of vulnerabilities (your post). I believe that the complexity of security systems is what differs and not the reason for installing such security systems in the first place. This is part of the reason why big firms will have complex security systems as opposed to smaller firms. According to you, however, do you think there is need for smaller firms to invest a lot in security needs like the big firms considering the fact that they both protect their systems against the same forms of attacks and vulnerabilities? Why or why not? Pertaining to your second question, in as much as I agree with your point that what the government is doing is right, I also do not agree with you on the fact that the level of investment in security determines the number of users or consumers. You have mentioned that if an organization is not willing to invest in standard information security measures, it should not ask customers to invest private and confidential information either. I agree with you here, but don’t you think that forcing businesses to invest in expensive security regulations is unfair? Why or why not? Again, great job on your post and looking forward to hearing from you.

RESPONSE 2:

Great post and information this week. This is the last week of class, Yay! I echo your thoughts that the security needs of small businesses versus larger corporations are similar, why wouldn’t they be? You are right that the size of the organization does not matter, security is security, period! I think about my job as far as security and we have some of the same concerns that larger schools have although we are smaller in size, it doesn’t matter, we are all at risk for some of the same issues like breaches, loss of data, data theft, and hacking.

Information security is a national goal and concern. I am getting my degree in Cyber Security and through the courses, I have taken already, I understand why information security should be a concern on the national level. I have reviewed the North Carolina state standards for information security and compliance in regards to my current job and I can say we are somewhat compliant. We have just put into place our disaster recovery plan and business continuity plan so we are ahead of the curve as far as plans go.

Are you part of your organization’s DR or BCP plan? Are you aware of your organization’s security goals?

which type of legislation might be the most effective in bringing about lasting social change for the treatment and prevention of addiction and explain why.

1 PAGE

Required Readings

Doweiko, H. E. (2019). Concepts of chemical dependency (10th ed.). Stamford, CT: Cengage.Chapter 27, “The Substance Use Disorders As a Disease of the Human Spirit” (pp. 376-388)Chapter 35, “Support Groups to Promote and Sustain Recovery” (pp. 493-505)Chapter 38, “The Debate Over Legalization” (pp. 543-555)

PLEASE USE REQUIRED READINGS AND CITATIONS

which type of legislation might be the most effective in bringing about lasting social change for the treatment and prevention of addiction and explain why. Explain how social change legislation might support or undermine the professional code of ethics. Finally, explain the potential implications for a helping professional. Support your response using the resources and the current literature.

Hello, I am looking for someone to write an article on The Case of Chinese Calligraphy.

Hello, I am looking for someone to write an article on The Case of Chinese Calligraphy. It needs to be at least 2000 words. This paper shall present an analysis of the life of Wang Xizhi also known as the Safe of Caoshu. It will highlight his influence and achievements. It will also comment on how and why his works became the foundation of the Copy Book School in Chinese Calligraphy history. The thesis statement shall be: Wang Xizhi’s calligraphy and works served to unite Chinese dynasties into one empire long after his death and finally into one nation.

The development of Chinese calligraphy is mostly attributed to Wang Xizhi. His works are seen as the foundation of what the present world recognize as Chinese calligraphy. It is important to note that although calligraphy developed independently at different places, the areas that first developed the system of writing somehow also influenced their immediate neighborhoods, as was the case with Chinese calligraphy (Kexi and Lee, 2010). Wang Xizhi was born in the 3rd century AD in what is today known as Linyi, a region in the province of Shandong. He lived between 303 and 361 AD. Although he is mostly recognized for his contributions in Chinese calligraphy, Wang Xizhi was an artist who transcended beyond just calligraphy to other forms of Chinese art. He was a complete package as far as art is concerned.

Wang Xizhi was a political administrator during the Jin Dynasty. Not much about his life in the army has been documented since most of his works of art have overshadowed his administrative responsibilities. His works and responsibility can be traced across six dynasties, amongst them Jin, Tang, Song, Northern Wei and Southern Qi and Eastern Jin dynasties. It is not clear how he survived as a general given that Chinese dynasties were at war with one another most of the time. Having lived across the six political eras safely as a high-ranking officer seems a mystery not expounded on by many writers (Zhaojun, 2014).

Anyway, one may assume shrewdness on the person of Wang Xizhi since he seems to have commendable diplomacy skills. When the Orchid Pavilion was being written, it&nbsp.had taken his organization skills public relations competence to convince the 41 guests to buy a poetry idea conceived and implemented by Wang Xizhi.&nbsp.

I will pay for the following article The Concept of Diplomacy.

I will pay for the following article The Concept of Diplomacy. The work is to be 8 pages with three to five sources, with in-text citations and a reference page. The views of the United Nations are one of the main ways that diplomacy is altered and creates a sense of change with the policies available. The viewpoint of the United Nations is to create preventive diplomacy. This approaches to conflict by trying to avoid the conflict before it goes into extreme measures within the nation. It has been noted that peacekeeping among nations is becoming more pressurized than before with crises, conflicts, and changes occurring at all levels. Political figures, societal outbreaks, and economic downfalls are all leading to problems around the globe which the UN is trying to resolve. To conquer this, the statement has been created to prevent conflict before it happens, stabilize conflicts in the beginning stages and to change the level of security at later stages. The suggestion contains three levels of action, including security intervention, mediation, and political diplomacy. By using these methods, there is the ability to meet the challenges of various political problems (Pascoe, 2010).

It is believed that suggesting preventative measures to all nations will allow leaders to stop violence before it starts. Practical steps to ending the conflict and resolutions can easily be formed by using prevention first. The UN has combined this method with offering mediators and facilitators to resolve the conflict at an early stage. The attitudes that are developed by political leaders are to have stronger leadership and a sense of power that comes from the mediation of the UN. Attitudes toward the UN are based on having governmental and international interference. This affiliation makes it easier for the government to work toward a resolution while national involvement with the conflict becomes secondary (Ernst, 1037: 2008).&nbsp.The United Nations has not only&nbsp.suggested and become involved with resolving conflict at earlier stages.

Hi, I am looking for someone to write an article on commission on banking technique and practice Paper must be at least 1500 words.

Hi, I am looking for someone to write an article on commission on banking technique and practice Paper must be at least 1500 words. Please, no plagiarized work! The three contractual agreements are independent of one another. Thus the undertaking of a bank to honor the conditions under the credit such as acceptance, negotiation of bills or fulfillment any obligation cannot be entangled with the applicant of the L.C who can only deal with issuing bank or beneficiary separately.1

Unlike in UCP 400, Article 6 of UCP 500 does not mention if the L/C is revocable or irrevocable. This is in order to be consistent with commercial codes in other jurisdictions.3 Now under UCP 600, all credits are irrevocable unless otherwise stated.

This deals with the method of examination of documents. The article envisages that banks must examine the documents accompanying the L/C with reasonable care and ensure that the documents are on their face in compliance with the terms and conditions of the L/C. The compliance must be consistent with international standard banking practices. The bank’s responsibility for examining the documents is limited to the ones stipulated in the credit. As such, documents not mentioned can either be returned to the beneficiary or passed on without any comments. UCP 500 gives seven days for the banks to examine and decide whether to accept or refuse the documents. However, in the U.S. only three-days are allowed in most of the states. Further, an L/C with no documentary condition is not acceptable as per the article. The bank should disregard such conditions with no relation to documents.5 In fact, article 15 of UCP 400 has been substantially changed as Article 13 of UCP 500. This article has not taken care to prevent defensive L.C practices what are called spurious discrepancies under which banks reject payments.

Whenever documents are received, it is the duty of the bank to inform the presenter whether all the documents are on their face, in compliance with the&nbsp.terms and conditions of the L/C.&nbsp.&nbsp.

Hide 

I will pay for the following article Northeastern Woodlands: Precontact Life Ways, Changes during Contact, and Colonialism.

I will pay for the following article Northeastern Woodlands: Precontact Life Ways, Changes during Contact, and Colonialism. The work is to be 9 pages with three to five sources, with in-text citations and a reference page. As for me when the words Northeastern woodlands come into mind the book The Skulking Way Of War by Patrick M. Malone comes into mind, and I always have this perception of Indians living in dark forest archaic times moving across the numerous lakes with their birch-bark canoes. I also envision them giving rise to now-famous words used today like Tomahawk, squaw, sachem, as well as a wigwam. The Northeastern woodlands Indians had three key language units, namely the Algonquian, the Iroquoian, and the Siouan. The Algonkian concentrated in the Western Great Lakes towards the New England coast, and downstream towards the North Carolina coast. The Iroquoian lived around Eastern Great lakes towards the Appalachian Mountains. However, the Winnebago were the only northwestern woodlands Siouan speakers, and they mostly dwelled around the Great Lakes region (Oswalt, 2009). Thus, the aim of this self-reflection paper is to describe the North-eastern Woodlands native Indians’ pre-contact life ways, changes they underwent during contact and their lifestyle during colonialism.

What surprised me about the Northeastern woodlands indigenous people is that before contact with Europeans they were not a single unit, and instead they had numerous sub-cultural regions, whereby each region observed a rather specialized environmental adjustment. To begin with, the Algonquian sub-group occupied the area around Lake Superior and then northwards to Lake Huron, towards Ottawa Valley, while others occupied the area eastwards of New England and Atlantic Provinces towards the coast. The second subcultural group was the Iroquoian-speaking tribes and they occupied eastern Great Lakes regions, the area around mid-St. Lawrence Valley, Lake Ontario, Lake Erie, and upstate New York. They mostly engaged in hunting, fishing, corn production and wild vegetable harvesting. The third sub-cultural region extended along the Atlantic coast, and the inhabitants were Micmac, Malecite, Abnaki subcultural groups.

Write 10 pages thesis on the topic designing an interview schedule and evaluate it.

Write 10 pages thesis on the topic designing an interview schedule and evaluate it. The interview questionnaire(Mays, 2007) above is very important because the data that will be gathered from the above questions will be used for generating the data needed for computation and interpretation of the data. Then, the findings will then be the product of the interpreted data. Lastly, the conclusion will be drawn up. The data gathered from the questionnaire above will generate a piece of very realistic or even accurate information. A wrong information base will often result in a wrong conclusion.

Furthermore, there are many advantages of using interview questionnaires(Pope, 2007). The interview questions are not very costly. Also, the interview questions are very effective because they specify in advance the necessary questions that will be used in the face-to-face interviews. In fact, this is very true for studies that will use huge sample sizes and cover respondents from a wider land area. Clearly, written interview questionnaires increase the lowering of cost as the number of research questions increases.

Also, questionnaires are definitely very important as the basis for the interpretation, conclusion and recommendation processes(Meyer, 2000). For, the encoding of data and computation for nearly all surveys can be easily done with the advent of computer software like SPSS and others.

&nbsp.&nbsp. Furthermore, pre-typed interview questionnaires decrease bias. For, there is a uniform question presentation that does not threaten the respondents. &nbsp.Also, the researcher’s own opinions will not influence the respondent to answer questions in a certain manner.&nbsp.Clearly the pre-done questions do not give verbal or visual clues to influence the respondent as compared to impromptu oral questions given(Savage,2000). Further, the questionnaires are less invasive to the right of privacy of the respondents as compared to the telephone or face-to-face surveys.

Hi, need to submit a 1750 words paper on the topic English as the Official Language of the United States.

Hi, need to submit a 1750 words paper on the topic English as the Official Language of the United States. Currently, there are 27 states using English as their official language and this includes Virginia.

This article provides an easy to understand explanation of the bill. The article also gives an overview of the scope of the said bill. When it comes to reliability, the article can be considered reliable because it gives facts about the development of the said bill. Moreover, the article comes from a reputable publishing company in the United States.

Lewin, T. (2005) Virginia: ACLU: That is Racist. Retrieved 05 May 2006, fromTheDailyFarce.com.Website:http://www.thedailyfarce.com/politics.cfm?story=2005%5C04%5Cpolitics_englishofficiallanguageaclucries

The Republican representatives have been accused of being racist, because the bill will make English as the official language of West Virginia. It discriminates various ethnicities and cultures residing in the United States. On the other hand, the Republican representative denied the accusation, he said that making the English language as the official language in West Virginia is nothing new and is not strange to the people. Just like the other article on the English language, it stated that there are already 27 states using English as their official language and this includes Virginia. The author of this article has based the facts from the interviews of the representatives in West Virginia. Using these interviews as the primary source makes this article credible.

The author provides an overview of how the American language has evolved from three hundred years ago. The author also presents the new and complicated developments of the English language through social and economic conditions, of the country. The author emphasized that the English language in the United States has shared a great influence in the development of the civilization of the modern world. The study examined the impressionistic or&nbsp.polemic interest in speech, and often animated, amusing, and sometimes the vehicles for a certain amount of valuable information.

I will pay for the following article Business Planning in Relation to Selling Cognacs and Cigars.

I will pay for the following article Business Planning in Relation to Selling Cognacs and Cigars. The work is to be 8 pages with three to five sources, with in-text citations and a reference page. In basic terms, as the organization moves the business sector ideas, structure, and settings, the item’s life cycle is shorter in connection to an increment in business unpredictability. When all is said in done, the dealing with the business dangers and instabilities in business arranging and planning depends on the exploratory administration display in the endeavor accomplishment as per Grunig (2011).

From a different point of view, the marketing environment as well as the market structure of the cigar and the cognacs products. Thus, the competitive advantage of buying, selling and market competition is also analyzed. On a broad aspect, the entrepreneurs and the industries offering the products and services are examined individually in relation to their market commanding power and capacities (Kurtz & Boone, 2009). Lastly, the financial projections of the primary business costs, market promotion or marketing patterns, and the product management maps are analyzed.

The cognacs and cigar products are the flavored tobacco goods and cigars that the consumers have a wide range of options to choose from various alternatives. For example, the flavored to tobacco papers, sodas, Vanilla and Swisher Cigarillos, and the strawberry and the tobacco flavored Swisher Sweets are the products sold by the House of Oxford industry distributors (Gage, 2007). The flavored cognacs and cigar products target young consumers who might intend to experience different tests from cigar products (Pride & Ferrell, 2011). In addition, the flavored cigar products target potential cigarette smokers as well as cigarette smokers who seek different tastes, aromas and&nbsp.exploration of the new tobacco products. The products are distributed, promoted and sold to their consumers/customers because they have a wide range chose or options to choose from the tobacco products (Kurtz & Boone, 2009). In addition, the products sold have different tests, aroma, and flavors that can be incorporated into other products rather than cigar and cognacs products.

Write 8 pages thesis on the topic the energy policy of united states of america.

Write 8 pages thesis on the topic the energy policy of united states of america. The United States is regarded as the third-largest producer of petroleum. Furthermore, in U.S. waters more than 3,950 natural and oil gas platforms and more than 500,100 producing wells are operating. Local, federal and state entities determine the energy policy of the United States of America. Additionally, these entities address the subject of energy consumption, circulation, and production like gas mileage criterions and building codes. The energy policy of the country includes international treaties, legislation, taxation, guidelines for the conservation of energy ad subsidies to investment. The prime purpose of the report is to implement SWOT analysis tool to examine and analyze the impact of the examination of alternative gas or oil energy sources on the energy policy of the United States. The paper also critically scrutinized the causes that affecting the contracts and treaties for the oil and gas industry sector.

In the United States, there has been a considerable rate of an upsurge in the production of unconventional gas and oil such as tight oil and shale gas. This emergence of the production led to the reduction of oil imports and lessening of prices of natural gas. Moreover, this rapid growth has raised many questions regarding its consequences on the energy sector, industrial competitiveness, macro-economy, and energy policy of the United States. The energy sources of unconventional oil and gas have foremost planned suggestions towards the future of the natural gas supply in the world. In the era of globalization and advancement of technology, the demand for energy has been raised. The chief contributor towards the lasting solution of the need for energy has been the presence of unconventional oil and gas. The potential of exploration of unconventional oil and gas has provided the opportunity to solidify their status towards the rising demand for energy. The following table is the impact of Capital investments and total operation of the natural gas and oil industry on the economy of the United States

In the year 2005, the Energy Policy Act was approved by&nbsp.Congress for the use of alternative fuels and offers tax incentives for preservation. In 2007, the Competes Act of America and Energy Security and Independence Act were passed to encourage the development of bio-fuel and increase the requirements of fuel economy.

I need help creating a thesis and an outline on The Idea-Expression Dichotomy.

I need help creating a thesis and an outline on The Idea-Expression Dichotomy. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. &nbsp.Going by the fact that Trotsky simply produced the idea for the tune which was later worked upon by both of them, but not recorded or fixed the expression for the same. it comes to the forefront that his idea for the tune per se is not copyrightable, as per the cardinal rule of fixating expressions in a permanent form. This is the first instance where Trotsky might fall weak in his defense, as his idea for the tune, however original it might be, does not attract copyright protection for the abovementioned reasons. Therefore, Trotsky might not avail of such copyright in his idea for the tune, and thereby transfer the rights vested in the music to be exploited for an advert of cheap clothing. While there are doubts regarding Trotsky’s authorship for copyright purposes for the idea of the tune, his contribution to producing the final outcome cannot completely be ignored. Trotsky had collaborated with McVanney in modifying certain aspects of the song to be used later on in the performance of the same, and this opens up further discussion on joint authorship and co-ownership.

The author of a work is defined in the Copyright, Designs and Patents Act 1988 as the person who creates the work. There are particular provisions dealing with a situation when there are several authors involved in the creation of a work. This is more so in case of literary, dramatic, musical and artistic works. A work is a work of joint authorship if it is ‘a work produced by&nbsp.the collaboration of two or more authors in which contribution of each author is not distinct from that of the other author or authors.’ Moreover, there are three conditions to be fulfilled in determining whether a work is a work of joint authorship.

What Sources of Renewable Energy have been Implemented within the UK.

Provide a 6 pages analysis while answering the following question: What Sources of Renewable Energy have been Implemented within the UK. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. Renewable energy technologies are viewed as essential contributors to sustainable energy development alternatives as they generally add to the safety of global energy, through the process of alleviating dependence on fossil fuel resources, thus reducing unhealthy influences of harmful greenhouse gases.&nbsp.In the connection, it cannot be helped mentioning that the South West parts of England have been at the forefront of creating and sustaining renewable energy sources during the last few decades or so. “The region is beginning to capture some of that potential. It was a pioneer in wind energy with the first-ever commercial wind farm being established in Cornwall in 1991. In addition to a number of wind farms and several small hydro sites the South West has a growing number of renewable energy plants based on biomass, waste, ground source heat and solar energy.” (Regional Renewable Energy Strategy for the South West of England 2003-2010, 2003).

Besides wind energy, other unconventional and innovative renewable energy sources are also being explored. The fundamental action that is being undertaken is to institute a regional office for renewable energy, and in accordance with this requirement, a Regional Centre for renewable energy needs, with incipient funds coming from the South West RDA, has established Regen SW to take up this onerous task. This would definitely serve as a catalyst agent and help in the implementation of the plans and programs with regard to the distribution of alternative renewable energy resources in this region. Besides, the main purpose of these large projects is to help the local population and industry become self-sustaining in their energy needs, especially in the not-to-distant future, wherein energy needs and demand fulfillment would be major constraints that need to be carefully assessed and regulated.

&nbsp.

Hi, need to submit a 2000 words paper on the topic Abortion: Rights vs Socially Constructed Morality.

Hi, need to submit a 2000 words paper on the topic Abortion: Rights vs Socially Constructed Morality. In the now often cited the decision in Rowe v Wade, the United States Supreme Court, on January 1973, by a vote of seven to two overturned a texas interpretation of abortion law making abortion legal in the United States. The alias “Jane Roe” was used for Norma McCorvey, on whose behalf the suit was originally filed, alleging that the abortion law in Texas violated her constitutional rights and the rights of other women. The defendant was the district attorney of Dallas County, Texas, Henry B. Wade.

The decision held that a woman, with her doctor, could choose abortion in earlier months of pregnancy without restriction, and with restrictions in later months, based on the right to privacy. Based on the decision, all state laws limiting women’s access to abortions during the first trimester of pregnancy were invalidated, and state laws limiting such access during the second trimester were upheld only when the restrictions were for the purpose of protecting the health of the pregnant woman. Essentially and from that time forward, abortion in the United States, illegal in most states and limited in others, became a woman’s legal right to choose.

The basis of the decision simplified through complex legal Constitutional argument rested on the Ninth Amendment, part of the Bill of Rights. Not addressing the subject of abortion specifically, the Court in citing the Amendment in its decision rested on the portion of it that included the Bill of Rights and a person’s right to privacy, with the Court deciding “the enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people…” (U.S. Supreme Court. ROE v. WADE, 410 U.S. 113 (1973). 410 U.S. 113).

Much has been written from a Constitutional viewpoint both supporting and challenging the Court’s decision, which for the purposes of this paper can not be analyzed from the complex perspective of Constitutional Law.

Write 10 pages thesis on the topic the modern civil process

Write 10 pages thesis on the topic the modern civil process. A may only evict Mr. B by virtue of a court order.4 In order to satisfy the statutory requirement for evicting a tenant subject to assured tenancy, the landlord must prove that there are grounds for possession and they will typically include nuisance or arrears of rent.5 An assured tenancy arises when the tenant occupies a dwelling as his or her only residence.6 This is the primary criteria and it becomes virtually irrelevant whether or not the landlord also shares some part of the dwelling provided the tenant occupies the dwelling as his only residence and pays a fair rent.

Mr. B has been living with Mr. A as a tenant for four years on a monthly rent of 400 pounds. As a result, he has established a monthly tenancy with no fixed term and with the notice by Mr. A can invoke his statutory assured tenancy right. Unless Mr. A can substantiate reasonable grounds for requiring vacant possession, he will not be able to obtain an eviction order from the courts. In the meantime, as a tenant entitled to an assured tenancy under the Housing Act 1988, Mr. B may remain in occupancy until such time as an order for eviction is made.

The property investor’s plans to purchase a four-story property with 6 bedrooms, one bath, and one kitchen as well as three WC facilities for the purpose of operating a shorthold tenancy bedsit, is governed by the Housing Act 2004. By virtue of Section 254 of the Housing Act 2004, the property is a house in multiple occupancies (HMO) because it is a house which will be let to at least three tenants who will share a kitchen and a bathroom.8 As a result certain health and safety concerns necessarily arise and require strict compliance and monitoring.

The Act creates a new Housing Health and Safety Rating System and the 2004 Act identifies at least 30 health hazards applicable to what may be deemed “poor housing conditions” by the local authorities. The list of health hazards that can qualify as poor housing conditions range from excessively cold dwellings to weak structures.

Create a 8 pages page paper that discusses mechanical engineering analysis and techniques for a diesel engine mechanical systems.

Create a 8 pages page paper that discusses mechanical engineering analysis and techniques for a diesel engine mechanical systems. Conceptually, diesel engines achieve their performance and efficient fuel consumption by adiabatically high-pressure compression of air (typically of the ratios between 14:1 and 25:1) in the cylinders before injecting small amounts of fuel into the compressed air. For example, the high temperatures generated during the compression of air enhance the evaporation of the pulverized fuel which then mixes with the existing hot air to auto burn ignite and burn thereby releasing energy in form of heat.

On the other hand, the energy released from the burning fuel then raises the pressure on the surface of the pistons, making it return to the bottom dead center(PMI) thereby resulting in a power cycle as shown in figure 2 below:

Diesel engines have a wide range of applications some of which include driving industrial mechanical systems, locomotives, marine vessels, construction equipment, generators and automobiles among others. Generally, diesel engines are widely considered to be much more efficient and are in most cases preferred to their gasoline counterparts due to a number of their potential advantages some of which include:

High engine temperatures are one of the major concerns in many diesel car engines. This particularly attributed to the fact that diesel engines typically have a considerably higher temperature of combustion as well as greater expansion ratios. Although this ensures that the engines have greater fuel combustion efficacy, high engine temperatures also result in a number of challenges related to engine cooling systems. For example, without an efficient cooling system and temperature control mechanism, the temperatures in diesel engines may rise to dangerous levels resulting in increased tear and wear of the engine parts. In addition, the extremely high local peak temperatures may also contribute to the formation of nitric oxide (through the binding of NO and NO2), which is one of the major harmful pollutants.

Hi, need to submit a 2250 words paper on the topic A Students Experience in University Accommodation.

Hi, need to submit a 2250 words paper on the topic A Students Experience in University Accommodation. Through the paper, the researcher seeks to prove that there is much difficulty and adjustment when living in a university dormitory as they pursue their studies.

Quantitative research is an analysis of a problem identified, grounded on theory subject for a test, wherein numeric information is measured and employing statistical techniques for analysis. The objective of quantitative methods in research is to be able to identify whether the theory of predictive generalizations is true. In comparison, a study that is based on a process of qualitative research is an analysis which has the objective of grasping a holistic comprehension of a human or social problem produced by a multiplicity of perspectives. A research using qualitative research is conducted in a setting, naturally involving the process of forming a holistic and complex picture of the subject’s interests (Mason, 1996).

The decision on selecting which approach in research is adequate in conducting a particular study that should be grounded on the problem, skills, and training, availability of resources, trainings, and audience of the researchers (Mason, 1996). Even though there are researches that integrate both quantitative and qualitative approaches in their purest forms, there are underlying essential disparities in the assumptions and in the analysis employed.

The assumptions underlying the method of qualitative research include the reality of being objective, meaning reality is there to be objectively studied. The researcher is in distant and fundamentally independent with the subject of the research, the research is considered value-free, wherein values of the research do not interfere nor become part of the research (Crasswell, 1994). Basically, research using the quantitative method is based on forms of deductive logic, which allows the researcher to explain, predict and have an understanding of various assumptions.

Need an research paper on prison system in the uk. Needs to be 8 pages.

Need an research paper on prison system in the uk. Needs to be 8 pages. Please no plagiarism. Many women prisoners are killing themselves because they are unable to cope with harsh prison conditions and the Inquest Report on Giles’ death found that “Punishing women with severe mental problems by incarcerating them in such alienating conditions were cruel, inhuman and degrading treatment.” (Morris, 2007). These women were subject to rigid punitive measures, without concern for their drug and mental health-related problems. for example, one woman was formally punished after she was cut down while trying to hang herself. (www.news.bbc.co.uk).

The number of women offenders in the UK has increased, in 2003, the number of women prisoners in UK prisons was pegged at 4500, registering an increase from approximately 1500 in 1993 and women now make up 6% of the population. (www.guardian.co.uk). However, there are fewer prisons for women, as a result, women may be imprisoned far away from their families, which may hinder the efforts to reduce their rates of reoffending since family contact is a key element in bringing about reduced reoffending. Women are sent to prison on very short term prison sentences, which renders them homeless and unemployed but does not effectively address their reasons for offending, with the net result that more than half of the women offenders tend to offend again. In addition, 18,000 children of these prison women are separated from their mothers and 95% of them are moved away from their family homes, as a result of which there is more disruption caused in the lives of both the children and the women and this further hampers the prevention of re-offending in these women.(www.womeninlondon.org.uk).

A report published by the Fawcett Society shows that prisons may not be appropriate for women because they may do better in women only, community-based centers. This report recommends that community sentences should be used more in the case of women, rather than sending them to prison with men criminals, because this serves to better meet their needs.

hat Customers Needs to Be Improved so as to Attract Travelers while Searching for Accommodation.

Hi, need to submit a 2000 words paper on the topic chat Customers Needs to Be Improved so as to Attract Travelers while Searching for Accommodation.Each and every business venture in the world aims at making profits. These profits accrue from what customers spend or buy from such ventures. Thus, it is the obligation of the management of the venture to know exactly what to offer to the market in this world full of competition in order to gain an edge over the other competitors.

According to Jim, R (2003), some travelers look for the little things which some hoteliers think they are not necessary. To him, things like swimming pools, hot baths among others are maiden requirements by customers. According to research he did in 2002, the findings show that 96% of those who took part indicated that, they will not take accommodation in a place without a swimming pool even if all the other facilities were well functioning. In the research, they indicated that they were not willing to go to a place where they will just stay indoors and that is all. they would like to have some breeze as they swim.

Maryanne, R (2006) adds some voice to this by arguing that, travelers are people on transit and would like to spend each and every single minute of their time in enjoyment thus, some things which are often taken for granted count a lot to them and it should be the obligation of the management to carry out regular surveys which rely on the existing customers since to maintain customers is the first and foremost aspect in marketing.

She supports her assertions by arguing that, this is the same reason as to why in any hotel one visits, there is always a questionnaire dealing with the most touching aspects of the hotel and further requesting whether the respective customers would like an improvement on any of the services being offered by its staff. things ranging from foods, drinks, staff conduct as well as the beddings.&nbsp.

Compose a 2250 words assignment on jean watsons theory of human caring.

Compose a 2250 words assignment on jean watsons theory of human caring. Needs to be plagiarism free! The two people must intend that a therapeutic interaction would take place. This interaction opens up possibilities for healing and human connection at a deeper level. (Watson, J & Foster, R. L, 2003)

This theory’s goal is to protect, enhance and preserve humanity by helping a person meaning in illness, suffering pain and existence. Watson’s description of caring is that it is a value and an attitude that has to become a will, an intention or a commitment that manifests itself in concrete acts. (McCance, McKenna, Boore 1999) It is a human science of persons and human health-illness experiences that are mediated by professional, personal, scientific, aesthetic and ethical human care transactions.

‘Caritas’ comes from the Latin word meaning to cherish, to appreciate, to give special attention, if not loving, attention to, it connotes something that is very fine, that indeed is precious. (Watson, J. 2003). The ten ‘Caritas’ causative factors are as follows:

5. Promotion and acceptance of the expression of positive and negative feelings. ‘Being present to and supportive of the expression of positive and negative feelings as a connection with the deeper spirit of self and the one-being-cared-for’

7. Promotion of transpersonal teaching-learning. ‘Engaging in genuine teaching-learning experience that attends to the unity of being and meaning attempting to stay within other’s frame of reference’

8. Provision for a supportive, protective, and/or corrective mental, physical, societal, and spiritual environment. ‘Creating a healing environment at all levels, physical as well as the non-physical, subtle environment of energy and consciousness, whereby wholeness, beauty, comfort, dignity, and peace are potentiated’

Transpersonal caring relationships are the foundation of the theory. &nbsp.Transpersonal conveys a concern for the inner life world which goes beyond the ego-self and beyond the given moment, reaching the deeper connections to spirit.

Write 9 pages with APA style on Traits of Successful Entrepreneurship.

Write 9 pages with APA style on Traits of Successful Entrepreneurship. The European Commission (2006) believes that high-quality entrepreneurship can be achieved by increasing the level of entrepreneurship education. They believe that this can be achieved by promoting and implementing it in their curriculum and programs. Moreover, intelligence is not solely based on exams and aptitude tests. This is reflected in a study by Nunez (1994) on Brazilian street children. The children demonstrated efficient mathematical skills when it came to computing change, discount and purchases of their products, but when they are placed in a classroom setting, the children were unable to solve mathematical problems. This kind of intelligence is what they call practical intelligence, which cannot be simply measured by academic tests (Sternberg 2004).

These two types of knowledge which allow entrepreneurs to be analytical, creative and practical are vital, and without which, successful entrepreneurship is not possible. It provides an entrepreneur with the necessary skills to create solutions and strategies during tight situations. Having proper education and adequate knowledge will allow an entrepreneur to efficiently allocate available resources like technology and globalization to improve. Proper use of knowledge and resources can serve as an advantage over competitors.

It has been said that creativity is what differentiates entrepreneurs from managers (Bird 1988). Their ability to be innovative in finding solutions to roadblocks and problems is the factor that keeps them afloat in a competitive and dynamic environment. Without these traits, they can be easily taken-over by other companies. Creativity is compelled by the dynamism of the environment. Studies show that entrepreneurs demonstrate a higher level of creativity in a dynamic setting in contrast to stable environments (Baron and Tang 2009). In fact, many companies, such as 3M, maintains a working environment where the creativity of their employees can be fostered and developed (Koand Butler 2007).&nbsp.

Write 8 pages thesis on the topic how america’s great university system is being destroyed.

Write 8 pages thesis on the topic how america’s great university system is being destroyed. It is impossible for a country like America to develop properly without giving more emphasis to the educational needs of the upcoming generation.

According to Noam Chomsky, a famous cognitive scientist, there are multiple definitions of education, the traditional and the current. The traditional follow the ways of the enlightenment period, which states that a teacher should create an environment that builds a foundation for creativity and inquisitiveness (Chomsky, 2014).&nbsp.American educational system seems to be following the traditional educational methods. Even then, it failed to develop curiosity and creativity in the minds of the students. The Oxford English Dictionary defines the word, curiosity as a strong desire to know or learn something. Although there is a definitive definition of the word in dictionaries, it means something different to everyone. Typically, intellectual curiosity is a major driving force for people to seek knowledge of and understand what is not yet known scientifically, and also in other disciplines of subject areas.

Thus, the traditional definition of education should be re-examined to provide a more meaningful explanation for the current educational setting.

The traditional educational model is imposed by the government. This is the basic education received in public schools that stifles student’s creativity in contrast to the ways of the enlightenment model used in higher education today which allows students to pursue their own educational freedom and allows them to take classes that correspond to everyday life or even more so there desired career.&nbsp.The new educational environment should encourage individuals to constantly seek deeper understanding and to contribute the knowledge learned to human intelligence. In this paper, the ideals of great philosophers such as Socrates, Aristotle, and many others are reviewed.

According to Aristotle, “Education is a function of the&nbsp.State and is conducted, primarily at least, for the ends of the State.

Hide 

Complete 8 pages APA formatted article: Physical Therapy Accreditation.

Complete 8 pages APA formatted article: Physical Therapy Accreditation. Still, there is no hard evidence to prove that the practice of physical therapy has any scientific basis although it is admitted that the discipline sometimes collaborates with rehabilitation science. Before one can engage in the professional practice of physical therapy, he or she has to pass the National Physical Therapy Examination (NPTE) as required by federal law (Salisian, 2010). NPTE is developed and administered by the Federation of State Boards of Physical Therapy. A degree in physical therapy or equivalent education is a requisite before taking the NPTE. On top of those, there is the accreditation process for schools, training institutions or program executors where prospective physical therapists train or study. The said accreditation process is supervised by the Commission on Accreditation of Physical Therapy Education (or CAPTE) which, in turn, is appointed by the American Physical Therapy Association or APTA.

CAPTE claims to be the only agency duly accredited by the Department of Education of the United States of America. (CAPTE. APTA). APTA, on the other hand, is a national professional organization of physical therapists. (About APTA. APTA American Physical Therapy Association.). Curiously enough, this critique is using the suggested modes of the discipline of the Institute of Medicine (IOM) in analyzing the accreditation reports of the CAPTE. The IOM is a non-profit non-governmental group that aims to provide advice and information to the public in an unbiased though authoritative fashion.&nbsp. Every state has its own regulations overseeing the physical therapy profession.

Accreditation means approval. If a training institution, a school, or a program executor desires to be accredited by an office or agency or by any third party, it is to be understood that the accrediting office, agency or third party has standards or processes to observe and follow in deciding on the application for accreditation.

Your assignment is to prepare and submit a paper on reservation and non reservation based ad hoc networks.

Your assignment is to prepare and submit a paper on reservation and non reservation based ad hoc networks. Mobile nodes inside an ad-hoc network move from one site to another. In wireless the mobile nodes send onward packets for each other, allowing communication among nodes outside wireless transmission range hop by hop. Due to active communications less characteristic and be lacking in the centralized monitoring points, the ad hoc networks are susceptible to attacks. The attack on the ad- hoc network direction-finding protocols can upset the network presentation and reliability. Wireless networks use radio waves to broadcast the signals and survive in essentially two dissimilar flavors, communications and ad-hoc. In communications mode, all traffic is transmitted among. Two switching paradigms: reservation-based (RB) and non-reservation-based (NRB) switching. The concepts of reservation and non-reservation are analogous to those of circuit switching and packet switching in wired networks, respectively.

Plenty of the reservation-based QoS routing protocols have been planned before. However, the capable Bandwidth calculation complexity and the bandwidth condition complexity have not been addressed grimly. There is an algorithm to decide the Route that is the majority likely to please the QoS obligation and an algorithm to reserve the good time slit and thus keeps additional free time slots for other requests. Simulation results show that our protocol can achieve high route establishment probability and low packet loss rate. The design of well-organized direction-finding protocols is a decisive issue for all types of networks. Compared with the traditional wired network, the mobile ad hoc network (MANET) has no fixed topology. Therefore, the source-initiated on-demand routing protocol, which establishes the route.

Use the best-effort approach to transmit a message and can not guarantee the quality of the transmission. As the bandwidth of the wireless channel increased, multimedia services can be provided in the wireless network.&nbsp.

What are the goals of your email marketing campaign?

What are the goals of your email marketing campaign? What are you trying to achieve? Goals might include improving brand awareness, increasing traffic of a website or retail location, increasing sales, gaining knowledge of customer preferences or profile information, building relationships, etc.

What digital media channels will be used within the campaign? Email marketing campaigns encourage the reader to take action (such as clicking on a link, calling a number, buying a product) but the email is also an opportunity to ask the reader to engage in other medias. These might include Liking a Facebook page, following a company on Twitter, asking readers to join in the conversation on a relevant blog, checking in on Four Square, forwarding the email to their friends, becoming an affiliate, etc.

You will design a flow chart map out a clear direction for your campaign. The flow chart will include each email that will comprise the campaign, a brief description of the content and purpose of each email, and when each email will be sent (choose a 5, 7 or 10 day campaign with a minimum of 5 emails to be sent). The flow chart may be drawn using any program or hand-drawn.

Answer the following:

  • What are the goals of the email marketing campaign?
  • Analyze how these goals can be achieved through an email marketing campaign.
  • How do the campaign goals account for the target market demographics (identified in Course Project Part 1)?
  • What digital media channels will be used within the campaign?
  • Discuss why each digital media channel will be used.
  • Briefly discuss the contents of the flow chart and why each email is being used.

The paper must be at least 2-3 pages in length (excluding title and reference page) and in APA (6th edition) format. Include the flow chart in the Appendix section of the paper.

**TOPIC OF COURSE PROJECT: The name of the company is Design Center Ltd **

Use Dranove and Marchiano to develop a competitive strategy for Intel using the value-based strategy approach.

Use Dranove and Marchiano to develop a competitive strategy for Intel using the value-based strategy approach. Some of the things you can consider in your discussion include:

•Intel’s value creation activities and value creation potential for the future

•Possible tactics for value creation

•The role and impact of pricing

•Effects of disruptive technologies

•The role of Intel’s leadership in sustaining competitive advantage

•Innovation activities at Intel

Instructions: The format of this assignment is an individual paper, not exceeding 1,000 words

Analyze how Big Data and data collection from external sources can present opportunities for business intelligence.

Analyze how Big Data and data collection from external sources can present opportunities for business intelligence.

Instructions

You work for a tourism board at a top destination within the United States that among other tasks, sends information out to potential visitors, provides advertising for the destination, sells tickets to local events and parks, and helps drive economic growth by attracting visitors. The marketing team for your organization has decided to try and leverage mobile devices and tablets to improve information searches and retrieval for the visitors easier, as well as try and collect more information on patterns of consumer behavior. The marketing team has asked for your assistance as you are well versed in these areas.

One of the artifacts your organization produces is a printed visitor’s guide that contains a directory of local businesses, parks, events, attractions, restaurants, and much more. There is a fold-out map to help with local navigation, various coupons for local vendors, and some subscription forms for different local publications that are available for mailing, some at no charge, and others for a small fee.

It is decided that a mobile application available for smartphones and tablets may be a great alternative or possibly even a replacement for the older, traditional approach of producing these costly physical pamphlet books and materials. However, the head of the Publications Department is not convinced of the value of leveraging mobile technologies for information sharing and data gathering.

The questions they are presenting you with include:

  • Why are mobile technologies useful to organizations in gathering data and information?
  • How might this application look? What would be included?
  • Are there any other ways that the organization can leverage mobile technologies to attract visitors, Increase ticket sales and improve the economy of the region?

The task:

Record a presentation using the screen sharing Webware/software of your choice (an Internet search will reveal many free options). Your presentation can be recorded with your own voiceover and visuals, just as you would if you were giving the presentation live.

Your memo to the head of publications and the management team should explain how and why a mobile version of the printed visitor guide can provide an opportunity for data collection rather than just presenting the reader with information. Your report should express how the existing pieces of the visitor guide could be converted, as well as any other possible opportunities for integration and collection of data such as social media.

Grading Rubric

F F C B A
No Pass No Pass Competence Proficiency Mastery
Not Submitted No outline of the benefits of a data warehouse over using separate databases in isolation. Limited outline of the benefits of a data warehouse over using separate databases in isolation. Gives developed outline of the benefits of a data warehouse over using separate databases in isolation. Clearly outlines the benefits of a data warehouse over using separate databases in isolation.
Not Submitted No examples of how the separate sources of data available can be brought together to create insight given. Gives limited examples of how the separate sources of data available can be brought together to create insight. Gives developed examples of how the separate sources of data available can be brought together to create insight. Gives clear, specific examples of how the separate sources of data available can be brought together to create insight.
Not Submitted No discussion of the benefits of an executive dashboard shared. Limited discussion of the benefits of an executive dashboard shared. Developed discussion of the benefits of an executive dashboard shared. Robust discussion of the benefits of an executive dashboard shared.
Not Submitted No key items from the presentation stated or professionally formatted in a summary report. Few key items from the presentation stated in a summary report. Most key items from the presentation stated and professionally formatted in a summary report. Key items from the presentation clearly stated and professionally formatted in a summary report.

 John is a 54-year-old man with diabetes. He has worked for Telco for 20 years. Lately, he has difficulty concentrating and makes numerous mistakes.

must use   the reference below

Bennett-Alexander, D., and Hartman, L. (2019). Employment Law for Business, (9th ed.). NY: McGraw-Hill. ISBN 978-1-259-72233-2.

reply to the students response in 150 words minimum and provide 1 reference

question

John is a 54-year-old man with diabetes. He has worked for Telco for 20 years. Lately, he has difficulty concentrating and makes numerous mistakes. He has missed several days of work due to his diabetes. Supervisor Mark wants to fire John this week. .

Student response

In analyzing this situation the federal statutes and/or theories of law that are applicable is the Americans with Disabilities Act of 1990 (ADA). “The ADA prohibits employers from making adverse employment decisions on the basis of a disability of an individual as long as an individual with a disability is otherwise qualified for a position with or without reasonable accommodation.”  It is important that an employer really understands the meaning of each term in this statue to ensure that the employer is really making an effort to accommodate if needed. This statute defines disability as “a physical or mental impairment that substantially limits one or more of the major life activities of an individual; a record of such impairment, or being regarded as having such an impairment.” to break it down even further “impairment is any physiological disorder or condition… or any mental or psychological disorder which substantially limits one of life’s major activities i.e. such as caring for one’s self, performing manual tasks, walking, seeing, speaking, breathing, learning and working.” Aside from the terms defined it is also very important to highlight what it means for an employer to reasonably accommodate and what is means for a company to endure undue hardship. Reasonable accommodation is defined as “an accommodation to the individual’s disability that does not place undue hardship on an employer; Undue hardship may be determined by looking to the size of the employer, the cost to the employer, the type of employer and the impact of the accommodation on the employer’s operation. According to Bennett-Alexander, D. & Hartman, L.P. (2019). “An applicant or employee is otherwise qualified for the position if, with or without reasonable accommodation, the worker can perform the essential functions of the position. Reasonable accommodation in this context generally means the removal of the unnecessary restrictions of barriers. reasonable accommodation is further defined as a modification that does not place undue burden or hardship on the employer. (Page 653).

In this hypothetical the legal issues that exist is that John’s supervisor wants to fire him due to his difficulty concentrating, his numerous mistakes and missing several days due to his diabetes. John’s disability is protected by ADA and without making a reasonable accommodation, the employer does not have a legal right to fire him due to John’s situation. The tenure that John brings to the company speaks highly to the commitment he has had to the organization, his abilities to perform the job with or without a reasonable accommodation and with that being said there are several claims that could come up in this situation. From reading this issue it sounds like Mark is fully aware of John’s diabetes from his absences of work. John is required to make a request for a reasonable accommodation and make the employer fully aware of his health issues and what is hindering him from performing the job, then the employers duty is to find any and every possible effort to accommodate Johns situation. ADA cannot protect an employee unless the employer is fully notified and aware of the limitations. Therefore in this situation John needs to first and foremost make sure that Mark is fully aware. In regards to a suffice request the text outlines “According to the EEOCS Guidance, in requesting reasonable accommodation and employee “may use ‘plain English’ and need not mention ADA or use the phrase reasonable accommodation. The courts also have concluded that an employee who merely tells his supervisor that ‘his pain prevented him from working and that he requested leave under FMLA is protected by the ADA.” (Page 662). In this situation Mark needs to be really careful about what decisions he is making in response to Johns performance and/or attendance. If John did his due diligence in notifying his employer of his need of absence and reason for his performance, Mark needs to find every way possible to accommodate. Whether that’s allowing John to take a leave of absence to give him time to care for his issues or really figuring out what barriers can be taken away that is hindering Johns performance. The only way Mark can legally fire John is by after making every ditch effort of accommodating and still not coming up with anything (or if it is causing undue hardship) then Mark would have the legal ability to fire John. With that being said the EEOC will need proof of every effort made as well as the severity of the undue hardship being caused.

One case that I thought was somewhat similar to John’s is Gogos V. AMS Mechanical Systems 737 F.3d 1170 (7th Cir. 2013) “In this case, the plaintiff, an individual with high blood pressure, was terminated from his position. The Seventh Circuit reversed and remanded the district court’s order granting summary judgment, and discussed the EEOC’s regulatory language, episodic conditions, mitigating measures, and short term conditions.” (Page 708). In this case Gogos (Employee) has been taking medications to reduce his elevated blood pressure for more that 8 years. He began working for AMS and the second month his blood pressure spiked very high and experienced vision loss. After Gogos discovered his eye was red he requested to leave to seek medical treatment, as he was leaving his general foreman immediately fired him. Gogos then alleged sufficient facts to his claim under ADA and was found that his condition was covered under ADA. “He attributes both problems to his long lasting blood pressure condition and the ADA’s implementing regulation lists hypertension as an example of an impairment that may be episodic.” Gogo’s immediate termination has deemed his the ability to file a discrimination claim under ADA. Gogo has shown that he is fully qualified to perform the job based off of his 45 year experience and due to the fact that he needed medical attention and left work he was fired. This case is very relatable or on point to the situation with John. Hypothetically speaking all parties are aware of Johns situation, John could be needed medical attention which explains his absence and well as he could be having and episode caused by his diabetes which may be causing these mistakes. None the less both supervisors are reacting not making an accommodation and resorting to termination and in these cases these employees are subject to a lawsuit.

In regards to this case an action item that I would recommend is training. I have found through my time in recruiting that most of the reasons for the actions of managers is the lack of education. From experience I have found that they are very receptive to learning and really doing the right thing, after all it is for the good of the organization and their success. Training could play a very vital part in doing the right things to ensuring an organization is following the statues that are set to protect employees. In this case the type of training that I recommend is a very informative and interactive training. This is part of a leadership curriculum really dissecting the meanings behind the terms defined above, the consequences of violating these laws and the overall impact they could make by making every effort to accommodate. I feel that interactive training is most effective because it is not just a module you’re required to take and knowing that those aren’t taken very seriously can cause a lot of harm to an organization. In this training going over real life cases and scenarios and the outcome of these cases could also really make a huge affect on a person’s decision. To conclude this a Q&A can really bring light to certain situations.

Define the four pillars of social media (connectivity, conversations, content creation and collaboration) and analyze how each pillar can be used to aid Social Media management.

According to Ang (2011), how is Social Media management different than traditional Customer Relationship Management (CRM)? Define the four pillars of social media (connectivity, conversations, content creation and collaboration) and analyze how each pillar can be used to aid Social Media management. Identify the benefits Social Media management. Provide examples to illustrate each point.

The paper must be 1-2 pages in length (excluding title and reference page) and in APA (6th edition) format. The paper must include the Ang (2011) article in correct APA format.

Identify the common purpose of attacks on point-of-sale (POS) systems. 

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.

Read the article titled, “If you shopped at these 16 stores in the last year, your data might have been stolen” located at https://www.businessinsider.com/data-breaches-2018-4 Choose 2 stores from the list and research the specific attack or breach.

Write a paper in which you:

  1. Summarize the attacks, providing details on the effects of the breach.
  2. Identify the common purpose of attacks on point-of-sale (POS) systems.
  3. Assess why and how these POS systems have become a prime target for hacking groups.
  4. Examine the forensics challenges that exist for investigations on POS systems.
  5. Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.

Relate the seven key elements of designing a forecasting system.

Competencies

Relate the seven key elements of designing a forecasting system.

Instructions

Your boss has asked you to speak at the quarterly board meeting based upon your success with operational forecasting.

Your job is to develop a PowerPoint presentation and oral narration that showcases forecasting skills and professional practice. The requirement is six slides that contain supportive notes per slides that integrate discussion points and strengthen the content on each slide. The expectation is two slides for strategic forecasting and production, two slides for the limitation of forecasting on labor models, and two slides on the features of job planning and the impact of forecasting. Lastly, you need to develop a one-page summary to submit to board members that reviews the impact operational forecasting can have on organizations and include two supportive references.

grading Rubric

F F C B A
No Pass No Pass Competence Proficiency Mastery
Not Submitted There is an absence of slides and/or narration. There are some slides/narration, but a gap exists from the requirement. There are minimal issues with the required amount of slides per category and narration. All required categorical slides are complete as well as a corresponding narration.
Not Submitted There is no acknowledgement of leadership skills. Some demonstration of leadership skills. Integration of leadership skills is presented well. Leadership skills are thoroughly presented.
Not Submitted There is no integration of professional practice. Some explanation of professional practice application. Clarity towards integration of professional application examples is strong. Clarity of professional practice examples is flawless.
Not Submitted The summary contains a very vague overview. The summary touches upon the impact of operational forecasting. The summary examines operational forecasting with detail. The summary fully examines operational forecasting and includes a business recommendation.

Did your peer’s assessment of the different theories offer new insights to you?

Week 7: “The Hard Side of Change Management”Did your peer’s assessment of the different theories offer new insights to you?or. Select at least two different posts, and address the following items in your responses:

i. Did your peer’s assessment of the different theories offer new insights to you?

ii. What questions remain in your mind after reading their analyses of these change model? Invite further conversation about these theories.

HBR’s 10 Must Reads on Change Management: The Hard Side of Change Management

The Hard Side of Change Management

by Harold L. Sirkin, Perry Keenan, and Alan Jackson

WHEN FRENCH NOVELIST JEAN-BAPTISTE Alphonse Karr wrote “Plus ça change, plus c’est la même chose,” he could have been penning an epigram about change management. For over three decades, academics, managers, and consultants, realizing that transforming organizations is difficult, have dissected the subject. They’ve sung the praises of leaders who communicate vision and walk the talk in order to make change efforts succeed. They’ve sanctified the importance of changing organizational culture and employees’ attitudes. They’ve teased out the tensions between top-down transformation efforts and participatory approaches to change. And they’ve exhorted companies to launch campaigns that appeal to people’s hearts and minds. Still, studies show that in most organizations, two out of three transformation initiatives fail. The more things change, the more they stay the same.

Managing change is tough, but part of the problem is that there is little agreement on what factors most influence transformation initiatives. Ask five executives to name the one factor critical for the success of these programs, and you’ll probably get five different answers. That’s because each manager looks at an initiative from his or her viewpoint and, based on personal experience, focuses on different success factors. The experts, too, offer different perspectives. A recent search on Amazon.com for books on “change and management” turned up 6,153 titles, each with a distinct take on the topic. Those ideas have a lot to offer, but taken together, they force companies to tackle many priorities simultaneously, which spreads resources and skills thin. Moreover, executives use different approaches in different parts of the organization, which compounds the turmoil that usually accompanies change.

In recent years, many change management gurus have focused on soft issues, such as culture, leadership, and motivation. Such elements are important for success, but managing these aspects alone isn’t sufficient to implement transformation projects. Soft factors don’t directly influence the outcomes of many change programs. For instance, visionary leadership is often vital for transformation projects, but not always. The same can be said about communication with employees. Moreover, it isn’t easy to change attitudes or relationships; they’re deeply ingrained in organizations and people. And although changes in, say, culture or motivation levels can be indirectly gauged through surveys and interviews, it’s tough to get reliable data on soft factors.

What’s missing, we believe, is a focus on the not-so-fashionable aspects of change management: the hard factors. These factors bear three distinct characteristics. First, companies are able to measure them in direct or indirect ways. Second, companies can easily communicate their importance, both within and outside organizations. Third, and perhaps most important, businesses are capable of influencing those elements quickly. Some of the hard factors that affect a transformation initiative are the time necessary to complete it, the number of people required to execute it, and the financial results that intended actions are expected to achieve. Our research shows that change projects fail to get off the ground when companies neglect the hard factors. That doesn’t mean that executives can ignore the soft elements; that would be a grave mistake. However, if companies don’t pay attention to the hard issues first, transformation programs will break down before the soft elements come into play.

Idea in Brief

Two out of every three transformation programs fail. Why? Companies overemphasize the soft side of change: leadership style, corporate culture, employee motivation. Though these elements are critical for success, change projects can’t get off the ground unless companies address harder elements first.

The essential hard elements? Think of them as DICE:

• Duration: time between milestone reviews—the shorter, the better

• Integrity: project teams’ skill

• Commitment: senior executives’ and line managers’ dedication to the program

• Effort: the extra work employees must do to adopt new processes—the less, the better

By assessing each DICE element before you launch a major change initiative, you can identify potential problem areas and make the necessary adjustments (such as reconfiguring a project team’s composition or reallocating resources) to ensure the program’s success. You can also use DICE after launching a project—to make midcourse corrections if the initiative veers off track.

DICE helps companies lay the foundation for successful change. Using the DICE assessment technique, one global beverage company executed a multiproject organization-wide change program that generated hundreds of millions of dollars, breathed new life into its once-stagnant brands, and cracked open new markets.

That’s a lesson we learned when we identified the common denominators of change. In 1992, we started with the contrarian hypothesis that organizations handle transformations in remarkably similar ways. We researched projects in a number of industries and countries to identify those common elements. Our initial 225-company study revealed a consistent correlation between the outcomes (success or failure) of change programs and four hard factors: project duration, particularly the time between project reviews; performance integrity, or the capabilities of project teams; the commitment of both senior executives and the staff whom the change will affect the most; and the additional effort that employees must make to cope with the change. We called these variables the DICE factors because we could load them in favor of projects’ success.

Idea in Practice

Conducting a DICE Assessment

Your project has the greatest chance of success if the following hard elements are in place:

Duration

A long project reviewed frequently stands a far better chance of succeeding than a short project reviewed infrequently. Problems can be identified at the first sign of trouble, allowing for prompt corrective actions. Review complex projects every two weeks; more straightforward initiatives, every six to eight weeks.

Integrity

A change program’s success hinges on a high-integrity, high-quality project team. To identify team candidates with the right portfolio of skills, solicit names from key colleagues, including top performers in functions other than your own. Recruit people who have problem-solving skills, are results oriented, and are methodical but tolerate ambiguity. Look also for organizational savvy, willingness to accept responsibility for decisions, and a disdain for the limelight.

Commitment

If employees don’t see company leaders supporting a change initiative, they won’t change. Visibly endorse the initiative—no amount of public support is too much. When you feel you’re “talking up” a change effort at least three times more than you need to, you’ve hit it right.

Also continually communicate why the change is needed and what it means for employees. Ensure that all messages about the change are consistent and clear. Reach out to managers and employees through one-on-one conversations to win them over.

Effort

If adopting a change burdens employees with too much additional effort, they’ll resist. Calculate how much work employees will have to do beyond their existing responsibilities to implement the change. Ensure that no one’s workload increases more than 10%. If necessary, remove nonessential regular work from employees with key roles in the transformation project. Use temporary workers or outsource some processes to accommodate additional workload.

Using the DICE Framework

Conducting a DICE assessment fosters successful change by sparking valuable senior leadership debate about project strategy It also improves change effectiveness by enabling companies to manage large portfolios of projects.

Example: A manufacturing company planned 40 projects as part of a profitability-improvement program. After conducting a DICE assessment for each project, leaders and project owners identified the five most important projects and asked, “How can we ensure these projects’ success?” They moved people around on teams, reconfigured some projects, and identified initiatives senior managers should pay more attention to—setting up their most crucial projects for resounding success.

We completed our study in 1994, and in the 11 years since then, the Boston Consulting Group has used those four factors to predict the outcomes, and guide the execution, of more than 1,000 change management initiatives worldwide. Not only has the correlation held, but no other factors (or combination of factors) have predicted outcomes as well.

The Four Key FactorsIf you think about it, the different ways in which organizations combine the four factors create a continuum—from projects that are set up to succeed to those that are set up to fail. At one extreme, a short project led by a skilled, motivated, and cohesive team, championed by top management and implemented in a department that is receptive to the change and has to put in very little additional effort, is bound to succeed. At the other extreme, a long, drawn-out project executed by an inexpert, unenthusiastic, and disjointed team, without any top-level sponsors and targeted at a function that dislikes the change and has to do a lot of extra work, will fail. Businesses can easily identify change programs at either end of the spectrum, but most initiatives occupy the middle ground where the likelihood of success or failure is difficult to assess. Executives must study the four DICE factors carefully to figure out if their change programs will fly—or die.

The Four Factors

THESE FACTORS determine the outcome of any transformation initiative.

D. The duration of time until the change program is completed if it has a short life span; if not short, the amount of time between reviews of milestones.

I. The project team’s performance integrity; that is, its ability to complete the initiative on time. That depends on members’ skills and traits relative to the project’s requirements.

C. The commitment to change that top management (C1) and employees affected by the change (C2) display.

E. The effort over and above the usual work that the change initiative demands of employees.

DurationCompanies make the mistake of worrying mostly about the time it will take to implement change programs. They assume that the longer an initiative carries on, the more likely it is to fail—the early impetus will peter out, windows of opportunity will close, objectives will be forgotten, key supporters will leave or lose their enthusiasm, and problems will accumulate. However, contrary to popular perception, our studies show that a long project that is reviewed frequently is more likely to succeed than a short project that isn’t reviewed frequently. Thus, the time between reviews is more critical for success than a project’s life span.

Companies should formally review transformation projects at least bimonthly since, in our experience, the probability that change initiatives will run into trouble rises exponentially when the time between reviews exceeds eight weeks. Whether reviews should be scheduled even more frequently depends on how long executives feel the project can carry on without going off track. Complex projects should be reviewed fortnightly; more familiar or straightforward initiatives can be assessed every six to eight weeks.

Scheduling milestones and assessing their impact are the best way by which executives can review the execution of projects, identify gaps, and spot new risks. The most effective milestones are those that describe major actions or achievements rather than day-to-day activities. They must enable senior executives and project sponsors to confirm that the project has made progress since the last review took place. Good milestones encompass a number of tasks that teams must complete. For example, describing a particular milestone as “Consultations with Stakeholders Completed” is more effective than “Consult Stakeholders” because it represents an achievement and shows that the project has made headway. Moreover, it suggests that several activities were completed—identifying stakeholders, assessing their needs, and talking to them about the project. When a milestone looks as though it won’t be reached on time, the project team must try to understand why, take corrective actions, and learn from the experience to prevent problems from recurring.

Review of such a milestone—what we refer to as a “learning milestone”—isn’t an impromptu assessment of the Monday-morning kind. It should be a formal occasion during which senior-management sponsors and the project team evaluate the latter’s performance on all the dimensions that have a bearing on success and failure. The team must provide a concise report of its progress, and members and sponsors must check if the team is on track to complete, or has finished all the tasks to deliver, the milestone. They should also determine whether achieving the milestone has had the desired effect on the company; discuss the problems the team faced in reaching the milestone; and determine how that accomplishment will affect the next phase of the project. Sponsors and team members must have the power to address weaknesses. When necessary, they should alter processes, agree to push for more or different resources, or suggest a new direction. At these meetings, senior executives must pay special attention to the dynamics within teams, changes in the organization’s perceptions about the initiative, and communications from the top.

IntegrityBy performance integrity, we mean the extent to which companies can rely on teams of managers, supervisors, and staff to execute change projects successfully. In a perfect world, every team would be flawless, but no business has enough great people to ensure that. Besides, senior executives are often reluctant to allow star performers to join change efforts because regular work can suffer. But since the success of change programs depends on the quality of teams, companies must free up the best staff while making sure that day-to-day operations don’t falter. In companies that have succeeded in implementing change programs, we find that employees go the extra mile to ensure their day-to-day work gets done.

Since project teams handle a wide range of activities, resources, pressures, external stimuli, and unforeseen obstacles, they must be cohesive and well led. It’s not enough for senior executives to ask people at the watercooler if a project team is doing well; they must clarify members’ roles, commitments, and accountability. They must choose the team leader and, most important, work out the team’s composition.

Smart executive sponsors, we find, are very inclusive when picking teams. They identify talent by soliciting names from key colleagues, including human resource managers; by circulating criteria they have drawn up; and by looking for top performers in all functions. While they accept volunteers, they take care not to choose only supporters of the change initiative. Senior executives personally interview people so that they can construct the right portfolio of skills, knowledge, and social networks. They also decide if potential team members should commit all their time to the project; if not, they must ask them to allocate specific days or times of the day to the initiative. Top management makes public the parameters on which it will judge the team’s performance and how that evaluation fits into the company’s regular appraisal process. Once the project gets under way, sponsors must measure the cohesion of teams by administering confidential surveys to solicit members’ opinions.

Executives often make the mistake of assuming that because someone is a good, well-liked manager, he or she will also make a decent team leader. That sounds reasonable, but effective managers of the status quo aren’t necessarily good at changing organizations. Usually, good team leaders have problem-solving skills, are results oriented, are methodical in their approach but tolerate ambiguity, are organizationally savvy, are willing to accept responsibility for decisions, and while being highly motivated, don’t crave the limelight. A CEO who successfully led two major transformation projects in the past ten years used these six criteria to quiz senior executives about the caliber of nominees for project teams. The top management team rejected one in three candidates, on average, before finalizing the teams.

CommitmentCompanies must boost the commitment of two different groups of people if they want change projects to take root: They must get visible backing from the most influential executives (what we call C1), who are not necessarily those with the top titles. And they must take into account the enthusiasm—or often, lack thereof—of the people who must deal with the new systems, processes, or ways of working (C2).

Top-level commitment is vital to engendering commitment from those at the coal face. If employees don’t see that the company’s leadership is backing a project, they’re unlikely to change. No amount of top-level support is too much. In 1999, when we were working with the CEO of a consumer products company, he told us that he was doing much more than necessary to display his support for a nettlesome project. When we talked to line managers, they said that the CEO had extended very little backing for the project. They felt that if he wanted the project to succeed, he would have to support it more visibly! A rule of thumb: When you feel that you are talking up a change initiative at least three times more than you need to, your managers will feel that you are backing the transformation.

Sometimes, senior executives are reluctant to back initiatives. That’s understandable; they’re often bringing about changes that may negatively affect employees’ jobs and lives. However, if senior executives do not communicate the need for change, and what it means for employees, they endanger their projects’ success. In one financial services firm, top management’s commitment to a program that would improve cycle times, reduce errors, and slash costs was low because it entailed layoffs. Senior executives found it gut-wrenching to talk about layoffs in an organization that had prided itself on being a place where good people could find lifetime employment. However, the CEO realized that he needed to tackle the thorny issues around the layoffs to get the project implemented on schedule. He tapped a senior company veteran to organize a series of speeches and meetings in order to provide consistent explanations for the layoffs, the timing, the consequences for job security, and so on. He also appointed a well-respected general manager to lead the change program. Those actions reassured employees that the organization would tackle the layoffs in a professional and humane fashion.

Companies often underestimate the role that managers and staff play in transformation efforts. By communicating with them too late or inconsistently, senior executives end up alienating the people who are most affected by the changes. It’s surprising how often something senior executives believe is a good thing is seen by staff as a bad thing, or a message that senior executives think is perfectly clear is misunderstood. That usually happens when senior executives articulate subtly different versions of critical messages. For instance, in one company that applied the DICE framework, scores for a project showed a low degree of staff commitment. It turned out that these employees had become confused, even distrustful, because one senior manager had said, “Layoffs will not occur,” while another had said, “They are not expected to occur.”

Organizations also underestimate their ability to build staff support. A simple effort to reach out to employees can turn them into champions of new ideas. For example, in the 1990s, a major American energy producer was unable to get the support of mid-level managers, supervisors, and workers for a productivity improvement program. After trying several times, the company’s senior executives decided to hold a series of one-on-one conversations with mid-level managers in a last-ditch effort to win them over. The conversations focused on the program’s objectives, its impact on employees, and why the organization might not be able to survive without the changes. Partly because of the straight talk, the initiative gained some momentum. This allowed a project team to demonstrate a series of quick wins, which gave the initiative a new lease on life.

EffortWhen companies launch transformation efforts, they frequently don’t realize, or know how to deal with the fact, that employees are already busy with their day-to-day responsibilities. According to staffing tables, people in many businesses work 80-plus-hour weeks. If, on top of existing responsibilities, line managers and staff have to deal with changes to their work or to the systems they use, they will resist.

Project teams must calculate how much work employees will have to do beyond their existing responsibilities to change over to new processes. Ideally, no one’s workload should increase more than 10%. Go beyond that, and the initiative will probably run into trouble. Resources will become overstretched and compromise either the change program or normal operations. Employee morale will fall, and conflict may arise between teams and line staff. To minimize the dangers, project managers should use a simple metric like the percentage increase in effort the employees who must cope with the new ways feel they must contribute. They should also check if the additional effort they have demanded comes on top of heavy workloads and if employees are likely to resist the project because it will demand more of their scarce time.

Companies must decide whether to take away some of the regular work of employees who will play key roles in the transformation project. Companies can start by ridding these employees of discretionary or nonessential responsibilities. In addition, firms should review all the other projects in the operating plan and assess which ones are critical for the change effort. At one company, the project steering committee delayed or restructured 120 out of 250 subprojects so that some line managers could focus on top-priority projects. Another way to relieve pressure is for the company to bring in temporary workers, like retired managers, to carry out routine activities or to outsource current processes until the changeover is complete. Handing off routine work or delaying projects is costly and time-consuming, so companies need to think through such issues before kicking off transformation efforts.

Calculating DICE Scores

COMPANIES CAN DETERMINE if their change programs will succeed by asking executives to calculate scores for each of the four factors of the DICE framework—duration, integrity, commitment, and effort. They must grade each factor on a scale from 1 to 4 (using fractions, if necessary); the lower the score, the better. Thus, a score of 1 suggests that the factor is highly likely to contribute to the program’s success, and a score of 4 means that it is highly unlikely to contribute to success. We find that the following questions and scoring guidelines allow executives to rate transformation initiatives effectively:

Duration [D]

Ask: Do formal project reviews occur regularly? If the project will take more than two months to complete, what is the average time between reviews?

Score: If the time between project reviews is less than two months, you should give the project 1 point. If the time is between two and four months, you should award the project 2 points; between four and eight months, 3 points; and if reviews are more than eight months apart, give the project 4 points.

Integrity of Performance [I]

Ask: Is the team leader capable? How strong are team members’ skills and motivations? Do they have sufficient time to spend on the change initiative?

Score: If the project team is led by a highly capable leader who is respected by peers, if the members have the skills and motivation to complete the project in the stipulated time frame, and if the company has assigned at least 50% of the team members’ time to the project, you can give the project 1 point. If the team is lacking on all those dimensions, you should award the project 4 points. If the team’s capabilities are somewhere in between, assign the project 2 or 3 points.

Senior Management Commitment [C1]

Ask: Do senior executives regularly communicate the reason for the change and the importance of its success? Is the message convincing? Is the message consistent, both across the top management team and over time? Has top management devoted enough resources to the change program?

Score: If senior management has, through actions and words, clearly communicated the need for change, you must give the project 1 point. If senior executives appear to be neutral, it gets 2 or 3 points. If managers perceive senior executives to be reluctant to support the change, award the project 4 points.

Local-Level Commitment [C2]

Ask: Do the employees most affected by the change understand the reason for it and believe it’s worthwhile? Are they enthusiastic and supportive or worried and obstructive?

Score: If employees are eager to take on the change initiative, you can give the project 1 point, and if they are just willing, 2 points. If they’re reluctant or strongly reluctant, you should award the project 3 or 4 points.

Week 7: "The Hard Side of Change Management" Change is a challenge. This isn’t news. We focus on all the elements that may stand in our way such as human resistance, poor leadership, or lack of motiva 1

Effort [E]

Ask: What is the percentage of increased effort that employees must make to implement the change effort? Does the incremental effort come on top of a heavy workload? Have people strongly resisted the increased demands on them?

Score: If the project requires less than 10% extra work by employees, you can give it 1 point. If it’s 10% to 20% extra, it should get 2 points. If it’s 20% to 40%, it must be 3 points. And if it’s more than 40% additional work, you should give the project 4 points.

Week 7: "The Hard Side of Change Management" Change is a challenge. This isn’t news. We focus on all the elements that may stand in our way such as human resistance, poor leadership, or lack of motiva 2

Executives can combine the four elements into a project score. When we conducted a regression analysis of our database of change efforts, we found that the combination that correlates most closely with actual outcomes doubles the weight given to team performance (I) and senior management commitment (C1). That translates into the following formula:

DICE Score = D + (2 x I) + (2 x C1) + C2 + E

In the 1-to-4 scoring system, the formula generates overall scores that range from 7 to 28. Companies can compare a project’s score with those of past projects and their outcomes to assess if the project is slated for success or failure. Our data show a clear distribution of scores:

Scores between 7 and 14: The project is very likely to succeed. We call this the Win Zone.

Scores higher than 14 but lower than 17: Risks to the project’s success are rising, particularly as the score approaches 17. This is the Worry Zone.

Scores over 17: The project is extremely risky. If a project scores over 17 and under 19 points, the risks to success are very high. Beyond 19, the project is unlikely to succeed. That’s why we call this the Woe Zone.

We have changed the boundaries of the zones over time. For instance, the Worry Zone was between 14 and 21 points at first, and the Woe Zone from 21 to 28 points. But we found that companies prefer to be alerted to trouble as soon as outcomes become unpredictable (17 to 20 points). We therefore compressed the Worry Zone and expanded the Woe Zone.

Creating the FrameworkAs we came to understand the four factors better, we created a framework that would help executives evaluate their transformation initiatives and shine a spotlight on interventions that would improve their chances of success. We developed a scoring system based on the variables that affect each factor. Executives can assign scores to the DICE factors and combine them to arrive at a project score. (See the sidebar “Calculating DICE Scores.”)

Although the assessments are subjective, the system gives companies an objective framework for making those decisions. Moreover, the scoring mechanism ensures that executives are evaluating projects and making trade-offs more consistently across projects.

A company can compare its DICE score on the day it kicks off a project with the scores of previous projects, as well as their outcomes, to check if the initiative has been set up for success. When we calculated the scores of the 225 change projects in our database and compared them with the outcomes, the analysis was compelling. Projects clearly fell into three categories, or zones: Win, which means that any project with a score in that range is statistically likely to succeed; worry, which suggests that the project’s outcome is hard to predict; and woe, which implies that the project is totally unpredictable or fated for mediocrity or failure. (See the figure “DICE scores predict project outcomes.”)

Companies can track how change projects are faring by calculating scores over time or before and after they have made changes to a project’s structure. The four factors offer a litmus test that executives can use to assess the probability of success for a given project or set of projects. Consider the case of a large Australian bank that in 1994 wanted to restructure its back-office operations. Senior executives agreed on the rationale for the change but differed on whether the bank could achieve its objectives, since the transformation required major changes in processes and organizational structures. Bringing the team and the senior executives together long enough to sort out their differences proved impossible; people were just too busy. That’s when the project team decided to analyze the initiative using the DICE framework.

DICE scores predict project outcomes

When we plotted the DICE scores of 225 change management initiatives on the horizontal axis, and the outcomes of those projects on the vertical axis, we found three sets of correlations. Projects with DICE scores between 7 and 14 were usually successful; those with scores over 14 and under 17 were unpredictable; and projects with scores over 17 were usually unsuccessful. We named the three zones Win, Worry, and Woe, respectively. (Each number plotted on the graph represents the number of projects, out of the 225 projects, having a particular DICE score.)

Week 7: "The Hard Side of Change Management" Change is a challenge. This isn’t news. We focus on all the elements that may stand in our way such as human resistance, poor leadership, or lack of motiva 3

Doing so condensed what could have been a free-flowing two-day debate into a sharp two-hour discussion. The focus on just four elements generated a clear picture of the project’s strengths and weaknesses. For instance, managers learned that the restructuring would take eight months to implement but that it had poorly defined milestones and reviews. Although the project team was capable and senior management showed reasonable commitment to the effort, there was room for improvement in both areas. The back-office workforce was hostile to the proposed changes since more than 20% of these people would lose their jobs. Managers and employees agreed that the back-office staff would need to muster 10% to 20% more effort on top of its existing commitments during the implementation. On the DICE scale, the project was deep in the Woe Zone.

However, the assessment also led managers to take steps to increase the possibility of success before they started the project. The bank decided to split the project time line into two—one short-term and one long-term. Doing so allowed the bank to schedule review points more frequently and to maximize team members’ ability to learn from experience before the transformation grew in complexity. To improve staff commitment, the bank decided to devote more time to explaining why the change was necessary and how the institution would support the staff during the implementation. The bank also took a closer look at the people who would be involved in the project and changed some of the team leaders when it realized that they lacked the necessary skills. Finally, senior managers made a concerted effort to show their backing for the initiative by holding a traveling road show to explain the project to people at all levels of the organization. Taken together, the bank’s actions and plans shifted the project into the Win Zone. Fourteen months later, the bank completed the project—on time and below budget.

Applying the DICE FrameworkThe simplicity of the DICE framework often proves to be its biggest problem; executives seem to desire more complex answers. By overlooking the obvious, however, they often end up making compromises that don’t work. Smart companies try to ensure that they don’t fall into that trap by using the DICE framework in one of three ways.

Track ProjectsSome companies train managers in how to use the DICE framework before they start transformation programs. Executives use spreadsheet-based versions of the tool to calculate the DICE scores of the various components of the program and to compare them with past scores. Over time, every score must be balanced against the trajectory of scores and, as we shall see next, the portfolio of scores.

Senior executives often use DICE assessments as early warning indicators that transformation initiatives are in trouble. That’s how Amgen, the $10.6 billion biotechnology company, used the DICE framework. In 2001, the company realigned its operations around some key processes, broadened its offerings, relaunched some mature products, allied with some firms and acquired others, and launched several innovations. To avoid implementation problems, Amgen’s top management team used the DICE framework to gauge how effectively it had allocated people, senior management time, and other resources. As soon as projects reported troubling scores, designated executives paid attention to them. They reviewed the projects more often, reconfigured the teams, and allocated more resources to them. In one area of the change project, Amgen used DICE to track 300 initiatives and reconfigured 200 of them.

Both big and small organizations can put the tool to good use. Take the case of a hospital that kicked off six change projects in the late 1990s. Each initiative involved a lot of investment, had significant clinical implications, or both. The hospital’s general manager felt that some projects were going well but was concerned about others. He wasn’t able to attribute his concerns to anything other than a bad feeling. However, when the general manager used the DICE framework, he was able to confirm his suspicions. After a 45-minute discussion with project managers and other key people, he established that three projects were in the Win Zone but two were in the Woe Zone and one was in the Worry Zone.

The strongest projects, the general manager found, consumed more than their fair share of resources. Senior hospital staff sensed that those projects would succeed and spent more time promoting them, attending meetings about them, and making sure they had sufficient resources. By contrast, no one enjoyed attending meetings on projects that were performing poorly. So the general manager stopped attending meetings for the projects that were on track; he attended only sessions that related to the three underperforming ones. He pulled some managers from the projects that were progressing smoothly and moved them to the riskier efforts. He added more milestones to the struggling enterprises, delayed their completion, and pushed hard for improvement. Those steps helped ensure that all six projects met their objectives.

Manage portfolios of projectsWhen companies launch large transformation programs, they kick off many projects to attain their objectives. But if executives don’t manage the portfolio properly, those tasks end up competing for attention and resources. For instance, senior executives may choose the best employees for projects they have sponsored or lavish attention on pet projects rather than on those that need attention. By deploying our framework before they start transformation initiatives, companies can identify problem projects in portfolios, focus execution expertise and senior management attention where it is most needed, and defuse political issues.

Take, for example, the case of an Australasian manufacturing company that had planned a set of 40 projects as part of a program to improve profitability. Since some had greater financial implications than others, the company’s general manager called for a meeting with all the project owners and senior managers. The group went through each project, debating its DICE score and identifying the problem areas. After listing all the scores and issues, the general manager walked to a whiteboard and circled the five most important projects. “I’m prepared to accept that some projects will start off in the Worry Zone, though I won’t accept anything outside the middle of this zone for more than a few weeks. For the top five, we’re not going to start until these are well within the Win Zone. What do we have to do to achieve that?” he asked.

The group began thinking and acting right away. It moved people around on teams, reconfigured some projects, and identified those that senior managers should pay more attention to—all of which helped raise DICE scores before implementation began. The most important projects were set up for resounding success while most of the remaining ones managed to get into the Win Zone. The group left some projects in the Worry Zone, but it agreed to track them closely to ensure that their scores improved. In our experience, that’s the right thing to do. When companies are trying to overhaul themselves, they shouldn’t have all their projects in the Win Zone; if they do, they are not ambitious enough. Transformations should entail fundamental changes that stretch an organization.

Force conversationWhen different executives calculate DICE scores for the same project, the results can vary widely. The difference in scores is particularly important in terms of the dialogue it triggers. It provokes participants and engages them in debate over questions like “Why do we see the project in these different ways?” and “What can we agree to do to ensure that the project will succeed?” That’s critical, because even people within the same organization lack a common framework for discussing problems with change initiatives. Prejudices, differences in perspectives, and a reluctance or inability to speak up can block effective debates. By using the DICE framework, companies can create a common language and force the right discussions.

Sometimes, companies hold workshops to review floundering projects. At those two- to four-hour sessions, groups of eight to 15 senior and middle managers, along with the project team and the project sponsors, hold a candid dialogue. The debate usually moves beyond the project’s scores to the underlying causes of problems and possible remedies. The workshops bring diverse opinions to light, which often can be combined into innovative solutions. Consider, for example, the manner in which DICE workshops helped a telecommunications service provider that had planned a major transformation effort. Consisting of five strategic initiatives and 50 subprojects that needed to be up and running quickly, the program confronted some serious obstacles. The projects’ goals, time lines, and revenue objectives were unclear. There were delays in approving business cases, a dearth of rigor and focus in planning and identifying milestones, and a shortage of resources. There were leadership issues, too. For example, executive-level shortcomings had resulted in poor coordination of projects and a misjudgment of risks.

To put the transformation program on track, the telecom company incorporated DICE into project managers’ tool kits. The Project Management Office arranged a series of workshops to analyze issues and decide future steps. One workshop, for example, was devoted to three new product development projects, two of which had landed in the Woe Zone and one in the Worry Zone. Participants traced the problems to tension between managers and technology experts, underfunding, lack of manpower, and poor definition of the projects’ scopes. They eventually agreed on three remedial actions: holding a conflict-resolution meeting between the directors in charge of technology and those responsible for the core business; making sure senior leadership paid immediate attention to the resource issues; and bringing together the project team and the line-of-business head to formalize project objectives. With the project sponsor committed to those actions, the three projects had improved their DICE scores and thus their chances of success at the time this article went to press.

Conversations about DICE scores are particularly useful for large-scale transformations that cut across business units, functions, and locations. In such change efforts, it is critical to find the right balance between centralized oversight, which ensures that everyone in the organization takes the effort seriously and understands the goals, and the autonomy that various initiatives need. Teams must have the flexibility and incentive to produce customized solutions for their markets, functions, and competitive environments. The balance is difficult to achieve without an explicit consideration of the DICE variables.

Take the case of a leading global beverage company that needed to increase operational efficiency and focus on the most promising brands and markets. The company also sought to make key processes such as consumer demand development and customer fulfillment more innovative. The CEO’s goals were ambitious and required investing significant resources across the company. Top management faced enormous challenges in structuring the effort and in spawning projects that focused on the right issues. Executives knew that this was a multiyear effort, yet without tight schedules and oversight of individual projects, there was a risk that projects would take far too long to be completed and the results would taper off.

To mitigate the risks, senior managers decided to analyze each project at several levels of the organization. Using the DICE framework, they reviewed each effort every month until they felt confident that it was on track. After that, reviews occurred when projects met major milestones. No more than two months elapsed between reviews, even in the later stages of the program. The time between reviews at the project-team level was even shorter: Team leaders reviewed progress biweekly throughout the transformation. Some of the best people joined the effort full time. The human resources department took an active role in recruiting team members, thereby creating a virtuous cycle in which the best people began to seek involvement in various initiatives. During the course of the transformation, the company promoted several team members to line- and functional leadership positions because of their performance.

The company’s change program resulted in hundreds of millions of dollars of value creation. Its once-stagnant brands began to grow, it cracked open new markets such as China, and sales and promotion activities were aligned with the fastest-growing channels. There were many moments during the process when inertia in the organization threatened to derail the change efforts. However, senior management’s belief in focusing on the four key variables helped move the company to a higher trajectory of performance.

_____________________

By providing a common language for change, the DICE framework allows companies to tap into the insight and experience of their employees. A great deal has been said about middle managers who want to block change. We find that most middle managers are prepared to support change efforts even if doing so involves additional work and uncertainty and puts their jobs at risk. However, they resist change because they don’t have sufficient input in shaping those initiatives. Too often, they lack the tools, the language, and the forums in which to express legitimate concerns about the design and implementation of change projects. That’s where a standard, quantitative, and simple framework comes in. By enabling frank conversations at all levels within organizations, the DICE framework helps people do the right thing by change.

The Heart of Change: Step 6. Create Short-Term WinsStep 6

Create Short-Term Wins

In successful change efforts, empowered people create short-term wins—victories that nourish faith in the change effort, emotionally reward the hard workers, keep the critics at bay, and build momentum. Without sufficient wins that are visible, timely, unambiguous, and meaningful to others, change efforts inevitably run into serious problems.

The Nature and Function of Short-Term Wins

George has a laser-like focus on a potentially lucrative e-business concept. He leads a team that has dozens of people empowered to pursue various projects, and most of those people are doing so with enthusiasm. From his vantage point, the whole process is incredibly exciting, sometimes scary, and never boring. Twelve months into the effort, he is convinced all is on track, that they have made extraordinary progress under the circumstances. Others who are less enthusiastic begin to raise more and more questions about the initiative. “Yes, this is important, but why are you doing such and such?” “Yes, this is interesting, but isn’t it interfering too much with our current business?” “Yes, but didn’t we try that two years ago and fail?”

Dealing with these questions is distracting, takes time and energy, and ultimately becomes maddening. Every time he thinks he has presented an argument that puts an issue to rest, someone revives it, often with more energy, not less. “Yes, but now I’m really worried about. . . .” He articulates the vision again and again but finds that some people only want to have what seem like metaphysical conversations. He sees these people increasingly as cave dwellers, as creatures who will sooner or later kill the organization, leaving it in the dust. He isolates his staff, putting others in the role of attackers, a role that they increasingly accept. Eventually, key supporters withdraw, and the whole effort is overrun with what seem like infidels. An important and promising set of ideas dies an undistinguished death.

Cary has the same one-year budget and a different, equally powerful, e-business idea. Twelve months into the effort, her group is seemingly behind George’s team. They have fewer projects exploring fewer ideas. They are not as able to fill a report or a meeting with interesting words. But Cary’s people have an up-and-running Web site, a site that is fully developed for one small and carefully targeted customer segment. This small subprototype begins receiving daily customer feedback that looks promising by any standard. Excitement within her group and support from others grow. As George sinks into the mud, Cary begins to soar. George can’t believe her good luck and wonders if her short-term outlook is one more sign that his company is in trouble.

George is a smart and dedicated man. But he doesn’t get it.

In successful change efforts, an empowered group of people are very selective in how they spend their time. They focus first on tasks where they can quickly achieve unambiguous, visible, and meaningful achievements. These short-term wins are essential, serving four important purposes:

1. Wins provide feedback to change leaders about the validity of their visions and strategies.

2. Wins give those working hard to achieve a vision a pat on the back, an emotional uplift.

3. Wins build faith in the effort, attracting those who are not yet actively helping.

4. Wins take power away from cynics.

Without these achievements, large-scale change rarely happens, and the infidels do seem to take over, regardless of how brilliant the vision and how needed the changes. But with these accomplishments, you find the opposite: a growing sense of optimism, of energy, and of belief in change.

Focus Is Essential

Because of the very nature of large-scale change, much must be done to achieve the vision. In sizable organizations, a change effort might ultimately require hundreds of projects. When people feel urgency and are empowered to act, they can easily charge ahead on all fronts. With scattered attention, you might find the first unambiguous wins in two years. Two years is too late.

The List on the Bulletin Boards

From Ross Kao

We have learned that when an organization has a great many things to do to correct its course, those leading the change are tempted to put 150 balls in the air all at one time. There is so much to do, you certainly can find 150 balls to put into play. Everyone can come up with a long list of things. But with so much going on at once, you run the danger of getting nothing finished very fast. This creates problems. It leads to frustration. People wonder where you’re leading them—and whether or not you’re taking the right approach.

To avoid that, we created something called “the Big Four.” We knew what our priorities were. We could have listed the top twenty, but we didn’t. Instead, we went public with just four goals. In essence, we said to the entire organization, “These are the top four things that we’re working on. And until we get one substantially completed, we’re not adding number five.”

We literally published: “Here are the top four.” At every work site we located large bulletin boards that everyone frequented and posted these top four items. In a factory, the board was in the canteen. It quickly became a device for saying, “Look! We’re going to go do something. We’re going to get it done. And guess what? Everybody look! It’s done. And look, we just added another one to the list. And oh, by the way, this one is going to be done in another two weeks.” The next thing you know, people are saying, “You know what? Things are happening. Things are getting done.”

I remember I was out in the factory and I happened to be standing beside the Big Four list. This guy from the line came by and looked at the list with me. After about half a minute he turns to me and he says, “We’re really knocking ‘em down.” People knew it. They felt the energy.

Now, granted, there were some people running around the organization saying, “You mean what I’ve been doing isn’t important?” “No,” we’d say, “that isn’t what we mean. We’re just telling you that that’s not what we’re working on right now. You need to know that what we’re going to do is get something done with lightning speed. We’re going to get it completed, and we’re going to make sure we’ve got enough energy and collective participation to get this thing implemented before we move on to the next item.”

For an organization that had been treading water, creating and communicating our quick wins really helped us begin to gather momentum.

Four instead of 150 means focus. Focus means more is achieved quickly. Quick achievements provide so much: a feeling of accomplishment, a sense of optimism. With this, behavior changes. Those who have worked so hard to create the wins are reenergized. Those who have been pessimistically or skeptically sitting on the sidelines begin to help. Cynics make less disruptive noise. So momentum grows.

Bulletin boards are misused all the time. Put them off to the side where people do not congregate. Clutter the boards with fifty pieces of paper. Put up propaganda (“We’re all committed to the vision!”). Make vague statements (“We’re making progress”). Not in this story.

The Power of Visible, Unambiguous, and Meaningful Wins

Not all wins are equal. In general, the more visible victories are, the more they help the change process. What you don’t know about is not a win—hence, the potential usefulness of a cafeteria bulletin board. The more unambiguous the wins are, the more they help the change process. With less ambiguity, fewer people will argue about whether a success is a success—so power is taken from the cynics. The more the wins speak to employee issues, concerns, and values, the more they help the process. Valued achievements connect to people at a deeper level—and a deeper level can change behavior that is generally very difficult to change.

Creating the New Navy

From Rear Admiral John Totushek

The U.S. Navy has relied upon its Naval Reserve since 1915. The reserve force has consisted of civilians, many of whom are former military members. They train on weekends and work with the active force two weeks each year. They are there to serve in times of war or national emergency.

Historically, the two forces have been managed separately. Now, due to a number of events that began with the collapse of the Soviet Union, our views on our organizations are changing. The active Navy can no longer afford as many full-time regular personnel, which means that they need to rely more and more upon our reserve force. We cannot afford unnecessary duplication of resources. As a result, we have developed a new vision for the Navy and the Naval Reserve—and are creating a new structure in which we are pulling the management of two large organizations closer together. It is both a management challenge and a cultural challenge.

For many years, certainly up until Operation Desert Storm in 1991, reservists were silently acknowledged by some in the active Navy as “just reservists.” They were to be called upon to replenish the active force when it needed more manpower. The active duty forces saw themselves as the ones doing the “real work” of keeping ships and aircraft ready for combat and carrying out operational missions. The reservists were considered “only” a force in waiting. In many commands, active forces would provide work for reservists, but would keep a close, even wary, eye on their “part-time” brethren. In some commands, attitudes developed about not trusting reserve force members with real authority or real responsibility. Yet, with the past decade’s shrinking active force, more responsibility inevitably and necessarily shifted to the reserves, and to the surprise of some of the old guard, the reserves succeeded beyond all expectations. Roles were changing, yet even as we entered the post–Cold War world, old attitudes persisted in the active Navy. These attitudes made it more difficult to pull the two organizations into one Navy.

As we have been trying to change those perceptions, we have been working hard to create successes that would show both the active and reserve forces how interdependence with one another can benefit both—and meld us into one force. We began by discussing goals that were attainable and desirable.

I remember a commander during one of those sessions suggesting that we develop a new curriculum for Officer Candidate School that would focus on educating the active force about the reserve force, and vice versa. The curriculum would focus on our being One Navy. We thought it would be fairly easy to change the curriculum and get our message into the hands of our new officers. If we achieved this, we would achieve something with a long-term, far-reaching impact. We all agreed that getting such a curriculum in place would be a great “win” and would certainly help reinforce our vision in each succeeding generation of sailors. Then someone said, “Yes, but if I am already on active duty, or I am a reservist, how meaningful is this new curriculum to me? And is it really that visible a change? How will it help us win over the hundreds of thousands of active and reserve officers and enlisted sailors we already have out there? I realize it should be done, but I’m not sure that it characterizes a good short-term win.”

That comment started us thinking, and from there, we more clearly defined characteristics of our short-term wins. In order to gain support out in the field, we needed successes that on the one hand were visible and on the other meaningful. This would make the wins really hit home. So we literally looked at everything we might do. Then we pinpointed which activities met our criteria and tried to create a timeline that would produce a continuous stream of successes.

For example: If we were to be one force, we needed to do a much better job of matching the skills among reserve personnel with the continually growing needs of the active Navy. Until recently, this was a long, tedious, manpower-intensive process. It didn’t always produce the desired results within the required time frames. Finding a readily available reservist with public affairs skills and Korean language proficiency, or an information technology specialist with expertise in information security, often meant relying on word of mouth. You can imagine what a difficult task that is in two very large and distinct organizations.

We decided we could record our Naval Reservists’ civilian and military skills into a useful, interactive, flexible, Web-based database. Authorized Navy personnel could quickly search for certain types of skills. There would be some individual privacy requirements, but we thought we could address these issues. Here was a project that would be meaningful to many people. It would be visible to many people. And it would be inexpensive and easily implemented because we could adapt architecture that was developed, funded, and already in use by another Defense Department agency.

Reservists, using password protection, can now directly post and update their education and civilian skills, including language and equipment proficiencies, and personal contact information. Authorized active Navy personnel can tap into the Web site and describe their request. They view online reports describing the skills, experience, and qualifications of persons who fit the profile, but not names and contact information. Active Navy personnel can then e-mail our Naval Reserve Command in New Orleans, which will act as intermediary for matching up the requirement with the available reservist. The system isn’t perfect, but it is visible to many people and is seen as useful to many.

Our successes are helping people in both forces believe in what we are trying to accomplish. In a little over thirty days, I received messages from the active Navy admirals in charge of the Pacific Fleet, Mediterranean and North Atlantic areas, and the Naval Air Forces in the Mediterranean. Their messages were uniformly positive. Bit by bit, we are showing our officers and enlisted sailors that we are serious about having One Navy. We’re showing them that the vision of a One Navy Force is working and that it is not just talk.

If you have been a part of enough successful change efforts, you will understand the power of visible, meaningful, and unambiguous wins. If you have not, you can miss the mark. Too often we create wins that we see, but which others do not, at least not to the same degree. Visiting an office in Japan, we see a breakthrough in a cancer drug using a new method of drug development. We find the victory and are able to ask questions and poke around. We conclude it is a big win and we leave pumped. Our colleagues in New Jersey read about the experiment and are excited, but not nearly as much without actually seeing the animals, talking to the researchers, and feeling the energy in the office. Too often we create wins that are meaningful to us, but much less so to others. We have enormously strong feelings about cancer, and though the key research personnel in New Jersey share these feelings to a degree, their hearts are invested much more in the problem of antiseizure agents. So while we are deeply moved by the Japanese wins, many of our colleagues in New Jersey are not. “Oh yes,” they say in a very rational manner, “this is important.” But they don’t rush to understand the development process that created the breakthrough. They don’t change their behavior. And that’s a problem.

In “New Navy,” a group very deliberately tried to avoid this problem by (1) clarifying the criteria for a good short-term win and (2) selecting projects based on that criteria. The educational program could have been helpful, but not as much as a resource-finding system that was highly visible and that was generally more valued than education. The results of a curriculum change could have been evaluated, but the Web site provided much more measurable outcomes.

Choosing What to Target First

The order of projects can also make an important difference in large-scale change efforts. You can choose what to target first based on a logic that seems eminently rational but which does not supply enough wins fast enough to build necessary momentum. Suppose the vision is globalization. One choice that seems rational is to work on the manufacturing piece before the marketing. Make it before you sell it. Focus first on building a plant in Frankfurt. But building the Frankfurt factory might easily take two years, a hundred million dollars, and then another year to assess whether the firm can handle its first German manufacturing facility. During this time, unambiguous, visible, meaningful wins would be hard to find. A less obvious but better choice is, in a sense, to sell a product, then make it. Put together a marketing plan for Germany. Implement the plan at minimum cost with a product from Chicago. Achieve a first clear success in less than a year.

In choosing well what to target first, you must satisfy the most basic criteria: achieving visible, meaningful, and unambiguous progress quickly. Beyond that, relatively easy options are obviously attractive—it is cheap and fast to open a Frankfurt office versus expensive and slow to build a plant. The easiest of the easy are often called “low-hanging fruit.” Less obvious to many people, but also important, are possibilities that focus on a powerful person or group whose help you need.

The Senator Owned a Trucking Company

From Ron Bingham

One of our state senators owns a trucking company. He’s an important person whose support could make a difference to our change effort. I thought, to help us start building momentum, what can we do for trucking companies?

I went to talk to him and it turns out that he is really mad that the state makes him fill out fifteen forms a year, some of them very long. “Do you know how much time and effort this takes?” He has his secretary dig around and find the forms. “Look at this!” he says. He doesn’t quite wave things in my face, but that’s the idea.

I look at the forms and my first impression is that this is bureaucracy at its worst. “The same information is asked here and here and here.” He says it politely, but I think he would like to strangle someone. “When I fill out some of these, I have to get three or four people involved.” I can easily imagine that. “We want to run a company that has jobs and customers. We don’t want to fill out unnecessary forms.”

I went and met with our change team in the transportation department. They had been struggling a bit to get cooperation with a lot of senior people in the department. You see, in government—at least in old government—there was often a “I’ll wait you out” kind of approach. Basically, if you stall long enough, the governor will change and the program that has been irritating you will go away. Well, the transportation group had been running into this, so they were ready for suggestions. I met with them and told them what the senator had told me. I said, “You guys need to put fixing these forms on the top of your agenda.” They didn’t agree right away. They basically said, “Jeez, Ron, we’ve got all these great and big things we need to get completed here and you’re trying to sell us on changing a few forms. That hardly seems like the grand change vision we had pictured.” I understood where they were coming from. They had all this energy. They wanted to change the world. But they weren’t getting anywhere because key constituents like the senator weren’t helping them. I explained how getting this win for the senator, while taking time up front, would actually give them more credibility and support to do the things that were really important to them. So somewhat grudgingly they started down the path of re-designing the licensing process. It took maybe a month to get done. And they did an amazing job.

For all those who say “What can you do with government, it’s just inherently a mess,” they should listen to this. A vision of less bureaucracy, more efficiency, and better service to the public is not unrealistic. The transportation team reduced the paperwork from fifteen forms to one. And they didn’t lose any key information, didn’t undermine any needed government function. That’s the sort of change that is possible, the sort of change that so many people inside and outside the government didn’t think was possible. That’s the sort of change that if you thought it wasn’t feasible, you wouldn’t waste time and resources trying to help someone who did.

When we were done, I took this back to the senator and showed it to him. “Damn, you guys are really doing something,” he says. Before that he had heard briefings on our work, but it was all talk. Now he could see it. It wasn’t just talk about another change project. And he could feel it because it affected something that was important to him. After that, the senator was one of our biggest supporters.

We have had several of these short-term successes, and now people believe in us and our work. The resistance has gone down, and the successes have helped make it real for the team. They don’t have to wait three years to feel like they are making a difference.

In selecting where to focus first, a key criterion applied in “The Senator” was to assist a powerful person as soon as possible. The assistance can alter the person’s feelings about the change effort, which can increase his or her support of that effort. This behavior change can produce more subsequent wins than if a less powerful person were helped.

The application of this principle can lead to a very different starting point than a more linear, “logical” model. The application of this principle can seem less “efficient” than some other possibilities. But who needs a fuel-efficient car if the driver becomes bored, stops, and never arrives at the finish line?

And If We Can’t Produce . . .

In some cases, all sorts of factors can block us from producing powerful enough wins at a pace that is needed. How we deal with this reality can be very important. When the wins are not there, the temptation, the oh-so-great temptation, is to stretch the truth, to exaggerate a bit. Not to lie, of course—we’d never lie. We just put the best possible light on events. Right?

Hoopla

From Dave Pariseau

We have been working to introduce a new IT system and new ways of working across our major operating divisions. This has been one of the largest changes our company has undertaken and it’s been painful at times. Twenty-four months into the effort, it was not obvious to most people whether this was working. They felt pain but little gain. It was not at all clear to top management what the financial paybacks were. Those leading the change were under a lot of pressure to produce some tangible successes, some wins to show people who were suffering that we were on the right track.

The core project team started sending a weekly e-mail to everyone in the company called “Message of the Week.” It was a status update. I can remember one that said “90 percent of our pre-go-live objectives have been met. Nearly all of our people have been trained and they are prepared and ready to do their jobs.” Well, there were a lot of employees who just didn’t agree with that message. The people who would be using the new system, who might have been trained on how to use the new software, were nearly all saying they had no real idea about how their jobs would change when the machine was switched on. Many of the project teams who were based on each site, and who were much closer to the way the business worked than the core project team, totally disagreed that 90 percent of the work was done.

Every communication we received was pretty much the same. As time went on, if anything, it got worse. Message of the Week seemed to have turned into project propaganda. One message said that a division had been making great strides with the new system and work processes, that they had improved their efficiency by something like an incredible 500 percent. It would make you think we had won World War III! But I remember some of the people from my division who were in regular contact with those in the “500 percent improvement division.” Our people said they only heard complaining.

It was like this everywhere. People were finding it really hard to adjust to the new software. They would read these communications and be thinking, “This is a nightmare. We haven’t won World War III; we’re going down! What are they talking about?”

It got so bad that even when Message of the Week told of real successes, things that we really had achieved as a result of all of the effort, the credibility of the communication had become so low that people ignored the message. I’m trying to remember a “good” piece of news that I actually believed in, and I can’t! This is despite the fact that I have been committed for the past three years to seeing the change effort be successful.

Part of this may be our culture. We seem to be more comfortable communicating “sunshine and roses.” You know: “Be honest, but positive whenever you send a message like this out.” But more than that, when the good results just didn’t happen, we started to feel a bit desperate in the face of some criticism. So we overplayed the positives to such an extent that they became unbelievable, regardless of whether they were real or imagined. So the skepticism grew, and this was really bad.

I suspect that any form of hoopla is a mistake.

An Exercise That Might Help

Make a list of projects or tasks that could be tackled by empowered people within the organization in which you have influence—projects or tasks that could be short-term wins.

1. For each item on the list, assess the following:

• When could you realistically get this done? How many months?

• How much effort and expense will it take? Grade it on a 1 to 10 scale, from almost no effort to huge time and expense.

• How unambiguous will the win be? Try another 1 to 10 scale.

• How visible will it be? (1 to 10)

• Will this be viewed as a meaningful win? (1 to 10)

• Who will see it as meaningful? How powerful are these people?

2. Given these assessments, which of the items on your list should receive priority?

• Pick the top five.

• What’s number one?

From this account, we don’t know exactly why they had no short-term wins. Perhaps they didn’t pay sufficient attention to the issue. Perhaps the early steps in the change process were not done well, making the wins task much more difficult. Whatever the case, they found themselves in a box and then did what is so tempting—stretching the truth. Possibly they were stretching the truth in their own minds, and not in any sense lying. Possibly they did not understand clearly that wins must be unambiguous. The result was disastrous. When their credibility collapsed, even a legitimate win was viewed with suspicion.

The best solution to the “Hoopla” problem is to never get into a position where it seems necessary to stretch the truth. The better you understand the issues in this chapter, in the entire book, the better the odds that you won’t. The second-best solution is never to try to exaggerate your way out of the box. Honesty always trumps propaganda. And honesty starts with being truthful with ourselves.

Being honest with yourself isn’t a bad strategy for all the steps in large-scale change.

Step 6

Create Short-Term Wins

Produce sufficient short-term wins, sufficiently fast, to energize the change helpers, enlighten the pessimists, defuse the cynics, and build momentum for the effort.

What Works

• Early wins that come fast

• Wins that are as visible as possible to as many people as possible

• Wins that penetrate emotional defenses by being unambiguous

• Wins that are meaningful to others—the more deeply meaningful the better

• Early wins that speak to powerful players whose support you need and do not yet have

• Wins that can be achieved cheaply and easily, even if they seem small compared with the grand vision

What Does Not Work

• Launching fifty projects all at once

• Providing the first win too slowly

• Stretching the truth

Stories to Remember

• The List on the Bulletin Boards

• Creating the New Navy

• The Senator Owned a Trucking Company

• Hoopla

Step 7

Don’t Let Up

After the first set of short-term wins, a change effort will have direction and momentum. In successful situations, people build on this momentum to make a vision a reality by keeping urgency up and a feeling of false pride down; by eliminating unnecessary, exhausting, and demoralizing work; and by not declaring victory prematurely.

Keeping Urgency Up

The most common problem at this stage in change efforts is sagging urgency. Success becomes an albatross. “We’ve won,” people say, and you have problems reminiscent of those in step 1.

PE Ratios

From Leonard Schaeffer

When we began, nearly everyone in the company was motivated to change because of the threat of being closed down. Then, as we started to turn ourselves around, there was a lot of excitement throughout the organization. People were motivated by our recent success and challenged by the new challenges. As we made more and more changes, we kept the momentum from slowing by comparing ourselves to similar healthcare companies. We explored our strengths and weaknesses along a number of dimensions in each of our business divisions. On top of that, I was out there talking face to face with all the people in our organization once a month. I would try to explain why we were making the changes and talk about the metrics that we were trying to achieve and the competitors we faced. There was Q&A. As we grew larger, we used teleconferencing once a month to get the same messages out.

When we started to lead the field, comparing ourselves to our competitors became a piece of cake. If anything, we kept reconfirming the fact that we were miles ahead of everyone. In light of this success, we were faced with the tendency to fall into complacency. After all, things were good; we were at the top of the mountain. What was the reason to keep on renewing ourselves, to keep on building the stronger organization that would inevitably be needed in the future? People began to say, “But we are number one.” Even worse for me, “Why won’t the boss just let up?”

This was no good. But what could I do?

Now we’ve started using the idea of looking at ourselves “from the investor’s point of view.” What that means is that we’ve started to compare where we are in relation to other investment opportunities within the broad healthcare field. The real message now is: We’re in competition not just with firms like us but also for investor’s dollars. This is no longer about just us and how well we run our business. This is no longer just about our success in relation to the competition out there creating the exact same products and services as we do. This is about recognizing the fact that other people are out there in the healthcare industry doing some pretty amazing things. Those people are getting a lot of attention and a lot of money from investors. So we may be the best at what we do, but if another company can create a price to earnings [PE] ratio of 50 and our PE is 12, boy, we’ve got trouble.

The reaction to this new focus has been very interesting. With some effort at helping people understand this idea, a lot of them got a renewed sense of urgency pretty quickly. They started to see the loss of potential investors as a threat and they started thinking about ways we can improve our own position. They began recognizing that there are a lot of newer companies who are beginning to offer some of the same services we do.

There are some people, however, who still say, “Company X is in the business of doing Net-based software, so it’s not a good comparison. People are investing in those companies for different reasons. They’re attracted to the technology, or to the newness of the company. We can’t compare ourselves to them.” Maybe it’s just human to want to think this way: They aren’t relevant, so we’re fine. I’ve been learning that you can never overcommunicate in helping people deal with these sorts of things. You have to be there talking with them as much as possible.

To keep you moving, in many situations it’s going to be essential to have an external problem. If you are just going to beat up on people and say we have to do better, it doesn’t work. People don’t really believe you and it’s not at all productive. Making more money doesn’t do it either. There has to be something real that they can see outside that leads them to say “We haven’t made ourselves into the organization we should be. We need to do more. We need to try harder. I’m willing to try harder.”

It’s easy for those driving change to allow urgency in the organization to drop when short-term performance rises. It’s easy then to become frustrated and to “beat up” on your people. It’s easy to declare victory too soon and become complacent yourself. This happens all the time. These traps are inherent in the very nature of large-scale change.

In “PE Ratios,” Schaeffer tried to deal with the urgency problem by shifting people’s frame of reference, how they looked at the situation. He used a new external comparison. How well such an approach works depends mostly on whether it changes how people feel about what they see. When they are tired, an intellectualized discussion of statistics can be twisted to fit complacent thinking. “Well yes, but what about . . . ?” Their reaction can be very different if they see a boss, in face-to-face communication, show his sincere belief in the new frame and show urgency based on that belief. Their reaction can be different if anyone else with credibility does the same—mutual fund managers, customers, and so on.

Almost all the step 1 methods can, with appropriate modifications, be used here. Imagine a firm having produced wave after wave of change, having its bottom line explode upward, having most employees and managers saying “You can’t do better than this,” and yet having many areas where the transformation has not even started—areas like purchasing. Then this guy has a college student do a little study about how many different kinds of gloves the firm buys. . . .

It’s easy for those driving change to allow urgency in the organization to drop when short-term performance rises. It’s easy then to become frustrated and to “beat up” on your people. It’s easy to declare victory too soon and become complacent yourself. This happens all the time. These traps are inherent in the very nature of large-scale change.

In “PE Ratios,” Schaeffer tried to deal with the urgency problem by shifting people’s frame of reference, how they looked at the situation. He used a new external comparison. How well such an approach works depends mostly on whether it changes how people feel about what they see. When they are tired, an intellectualized discussion of statistics can be twisted to fit complacent thinking. “Well yes, but what about . . . ?” Their reaction can be very different if they see a boss, in face-to-face communication, show his sincere belief in the new frame and show urgency based on that belief. Their reaction can be different if anyone else with credibility does the same—mutual fund managers, customers, and so on.

Almost all the step 1 methods can, with appropriate modifications, be used here. Imagine a firm having produced wave after wave of change, having its bottom line explode upward, having most employees and managers saying “You can’t do better than this,” and yet having many areas where the transformation has not even started—areas like purchasing. Then this guy has a college student do a little study about how many different kinds of gloves the firm buys. . . .

This is where our “Action Labs” come into play. Action Labs are cross-company project teams that are given an unusual amount of leeway and power. Members of an Action Lab work full-time for a few months. So it’s very intense. They have the right to talk to anybody they want, do anything they want, and operate with very few boundaries. They typically bond and listen more carefully to each other. So the person from one part of the organization starts to understand another part for the first time. They also become very candid with one another. As a group, they become more daring than any individual. With our encouragement, they start pursuing problems, start looking for solutions, in a way that just wouldn’t normally happen on the job. We give them permission to be very creative and bold. Not all do so, but in some cases it’s marvelous.

Our last lab was set up to focus squarely on the investment planning problem. Eight people were taken off their jobs and put on this full time for six weeks. They talked to the CEO and the executive group, the heads of some of our business divisions, those people who reported to them, the people who planned the budgets and did all the analysis, even the employees who type up the numbers and who have to keep adjusting the figures.

One thing the investment planning team did was to make a video that made fun of how people behaved when they put a budget together. It was a lighthearted way of getting a very serious message across. The video was a skit with characters like the Merchant of Fear, the Glory Hunter, and the People Protector. All were over-the-top spoofs of the types of behaviors that existed. Like all good spoofs, they hit the issues dead-on.

The Merchant of Fear would increase his own budget by drawing out and working off of people’s fears. He would say things like “We had better keep a bit of reserve in my budget—just in case.” If you ever tried to tackle a Merchant of Fear, he would have at least ten good reasons why he needed that amount of money to avoid having the company’s network explode and kill one billion people, maybe more. “We need to budget for these five things. Actually, now I think about it, we’d also better add these two extra things too because what would happen if it were a building that went up? In fact, while we’re at it, we might as well add these other thirty eventualities just in case we blow up an entire town.” And it wouldn’t matter that two of the budgeted items would have been enough. He would always have an answer as to why he needed more.

The Glory Hunter chased the high-profile management initiatives that could bring him fame and fortune. He focused on whatever was sexy at the time. He’d go after an important consulting project that had just been started or a key task force led by the CEO. He’d love a major engineering project where he could introduce new technology that would guarantee him a place in the company’s historical archives or his picture on the wall. He would not share credit or do what was necessarily in the best interests of the company. He would just demand budgets for what made him look good.

The People Protector didn’t want glory and wouldn’t necessarily pander to fears. His sole objective was to make sure that there were  enough projects for his staff. If these could match their skill sets and happen near their home base, then all the better. Regardless of what work was actually needed, the People Protector would just calculate how many projects would be required for his 200 people over eight months and then set his budget accordingly.

The Action Lab team showed the video of these characters to the top twenty or thirty executives, the very people who were being spoofed in the film. You can imagine the reaction! There was total shock. Immediately everyone was trying to guess who the characters had been based on in real life. Somebody even asked, “Is that meant to be me?” Something like this would never have been done in the past, never been remotely considered. Yet with the labs and the support from the CEO, it happened.

I think top management burned the film. But it worked. They still occasionally refer back to the characters. “Watch out, this is beginning to look like Merchant-of-Fear talk.” It helped stop the old investment planning game in its tracks by exposing the types of behavior that went against the new, more shareholder-oriented vision.

We have found that not everyone works well in an Action Lab environment. You need people who are willing. You can’t coerce people into doing something like this. They also have to have the technical knowledge or base of experience to work on the problem. They need to be willing to challenge the status quo for good reasons, to ask “why,” and to question the rules instead of just accepting that something is set in stone because it’s always been done that way. And they need to be able to leave their desk with the agreement that they won’t be back until the lab is over. This last point is a real challenge. The types of people we need in Action Labs are typically not those who are easy to free up.

We have done ten of these labs. Not all have been great. The ones that have not worked so well did not have a clear focus or objective at the start. We’ve found if the groups do not work well because of the people dynamics, you have to make a decision there and then if it’s salvageable or not and go with it. But most labs have been very useful, and their actions have made a difference.

One of our biggest regrets with the last lab is that we didn’t find a way to make a copy of that video before it was burned!

Somewhere in the waves of change, you will have to attack the sturdy silos and difficult politics or you won’t create a twenty-first-century organization. In the early stages of a transformation, the silos and politics can be too tough to handle. But eventually, you must choose to deal with this heavy lifting or you will never fulfill the vision.

In “The Merchant,” the company made progress not because of task forces per se. They made progress because they set up conditions that gave a group sufficient power to blast through the barriers and complete another needed wave of change. Oddly, the group was a task force—oddly, because we don’t think of task forces as powerful. But look at how they did it. First, the Action Labs groups were given great leeway. These sorts of cross-organization task forces often fail because they are put on short leashes. Second, the members were given sufficient time. Typically, people  on these types of task forces are supposed to do the work in addition to their regular jobs. Third, they were given the opportunity to gather a broad range of data. There was no “Well, yes, but the chairman is out those three weeks.” Fourth, they were not handed a conservative charter. There was no “Don’t stir the waters too much; be practical; make sure any ideas can be implemented,” the latter often a code phrase meaning “Make sure the ideas are so trivial that no one will try to block them.” Because there were none of these constraints, it helped give people, after easier waves of change were completed, the power to attack the particularly difficult challenges.

Also key in the success of the “Merchant” task force was its creativity. Write a play showing the problems. Hire actors and film it. Make it funny—to diffuse some of the defensiveness and to reduce the frontal attack on a norm of underlings not criticizing the bosses, perhaps even a norm of no heavy conflict allowed in public. If the fun came across as angry and ridiculing, the risk would have been much higher. But it didn’t. If the problems spoofed were not the spot-on real problems, a defensive person could trash the film. But apparently the task force did a good job of putting its finger right on the issues. If no one on the executive committee was frustrated by the destructive behavior, the top management could still have found a way to rationalize the “stupid” film and ignore it. But that was not the case here, and probably never is. The film gave those who were frustrated, a group that is often larger than is apparent, a legitimate tool, and a feeling of optimism, to try to eliminate unhealthy behavior. In combination with other actions—and other actions would have been necessary—the wall started to fall, and the change process had a chance of making it all the way to the end.

Images can be powerful. Even if viewed only once, they can stick in the mind for a long time. A month later, someone could refer to “The Merchant of Fear” video and the idea (and feeling) would still be there because a strong image was instilled. That seems to be the way the mind works.

Not Killing Ourselves

Deep into a transformation, even if urgency remains high, even if people want to take on the big problems, and even if they succeed in generating waves of change, they can still fail because of exhaustion. They find they have to keep the organization running, which means doing all the old work. On top of that they have to handle additional work to create the future. So people are overwhelmed and eventually start to resent it. For many individuals, the situation can feel as if there is no solution—which isn’t true.

In successful transformations the answer is, at one level, very simple: When you have too much work, jettison some.

Reducing Twenty-Five Pages to Two

From Ken Moran and Rick Browning

After the teams had been functioning for a while, and the change process seemed to be working, we began getting a ton of feedback about how we were creating too much pressure on people in terms of workload. They were taking their day-to-day work home on the weekends. “Ken, my wife is complaining.” “Ken, this is no good, we can’t keep this up.” “Ken, if I call the local paper, send them to your office, then walk in and die, this will not help your career.”

An e-mail went out to people saying that this was not incremental work. This was not “Do your job and add all this new activity.” If you were on a working team, that was part of your job. If there was other work to be done, we needed to reallocate it further down the hierarchy or not do it at all. This was, and still is, the only solution to the problem.

When we look at all of our day-to-day activities and ask “Does this really add value? Do I absolutely need to do this?”, we often find many ways to save time. We did this with our monthly report. Every month, each department produced this huge report that got e-mailed to fifty to sixty people. It was at least twenty-five pages long. It highlighted everything, ranging from new product development goals to status updates on the various initiatives. Who knows how much work went into creating and reading the reports. But some of us stopped reading them. If we wanted to know whether or not we were leading the market in sales, we’d have an assistant run a report. If we wanted to know how the marketing launch of our new product line was going, we’d call the VP of marketing. This was the information we needed to know. Unfortunately, it was either buried in detail in that twenty-five-page report or not included at all.

Going forward, we’ve decided to change the monthly report. It will only be two pages long and it will highlight financial metrics that the department heads have agreed on (like sales, growth rate, budget). If a department has reached a major milestone, then it will be covered. However, individual project details by department have been eliminated. Think about it. Creating and then having fifty people read twenty-five often complicated pages versus creating and reading two pages.

If we can identify, recognize, and agree on what people can stop doing, then we won’t feel so overwhelmed. We have to focus on the important work or we’ll never create and adopt the new strategies. So what we need to do now, and what we are trying to put a framework around for the next three or four years, is to continue to identify things like the monthly report and replace them with activities that will move us forward.

For some, making the adjustment will be difficult. We all need to be doing more to help these people.

In “Twenty-Five Pages to Two,” one simple change makes a difference. One simple change eliminates what could add up in a year to a thousand hours of wasted managerial effort. The change visibly shows what the boss wants others to do. It is an action that makes his words on the subject more understandable and credible. And it is an action that has consequences that people feel.

The best way to handle the overwork problem is with conscious effort as early in the process as possible. You anticipate the issue rather than suddenly finding it explode in your face. Then you purge your calendar of everything that is a leftover from history and that has no current pressing relevance. You stop the unnecessary Tuesday morning meeting that has been a fixture for five decades. You eliminate the six different kinds of reports that land on your desk, that take time to understand, and that are no longer needed. You use teleconferencing to cut out travel. You no longer attend meetings where your presence is not essential. You kill pet projects that add little to the change effort and yet suck up time and money. You delegate more. You find what can and should be done by others and let them do it. You delegate not only down, but up and sideways. If peers can better do the work, you let them. If bosses can better do the work, you let them. Considerations of prestige—look at all the

important work I do—are put aside. Instead, you relentlessly push work off your desk that others can do, should do, and will do. You fight the egotistical tendency most of us have to think we must do something because others cannot.

People are not machines. We need more than maintenance. We need the rejuvenation that comes from sleep, relaxation, and fun off the job. Everyone engaged in a big effort to change a company, a department, or a work group should probably have a banner above the mirror in his or her bathroom at home, a banner to be seen every morning and night that says “Dying will not help.”

Our Favorite Step 7 Story

This is creative.

The Street

From Jack Jacobs

We had made substantial steps forward in terms of improving customer service, a key element of our new vision. We improved our percentage of on-time and complete shipments from 50 percent to 99 percent, even though 50 percent is pretty much standard in our industry. Our success not only helped our customers; it also helped demonstrate that we were on track. Unfortunately, although improving our delivery percentages so dramatically was a huge win for us, it also suddenly left us open to renewed complacency. The question was, What do we do next?

As it turned out, the changes we made to improve delivery time actually provided us an opportunity to further our vision and values and keep the change rolling. We had removed all our on-site inventory and shifted responsibility for it to our suppliers. The result was we had thousands of square feet in the manufacturing facility that had no use. You walked into our facility and it looked more like an empty warehouse than an assembly line. That’s how much space we opened up. We immediately started looking for new materials to store there. Given all the manufacturing we did throughout the southeast, we figured that shouldn’t be difficult. We began looking around for other raw materials to put in our new space, things like lumber, steel sheets, plastic rollers, steel pins, and so forth.

Then one of our designers approached me with a brainstorm. “Why don’t we use the space to expand the offices?” At the time, we had in the facility a few offices for plant management. But by and large, we housed managers at headquarters, which was about a five-minute drive away. This was not surprising given the plant was one of those boxy, windowless buildings that provided shelter from the elements but little else. We started to think about options for turning the space into offices for all our plant administrative staff and managers.

Given my preoccupation with making sure the change continued, I went back to our vision to see if redesigning the factory fit into the larger change program. What I found was the concept of community. We were committed to building community, believing that we would gain strength and competitive advantage by uniting the thousands of people that work for us. What I realized was that redesigning the manufacturing facility might provide an opportunity to address the whole notion of community. So I threw the question out to our design team. “How can we reconfigure the plant in a way that strengthens community and visibly continues our change program?” What they came up with was truly brilliant.

We decided that community could be strengthened if we found a way to increase the interaction between office workers and line workers. We wondered if we could somehow do this  with the available space in the plant. As we thought about this, we got more and more ambitious. What started as a simple idea quickly morphed into a more complicated, awesome idea. We decided to shift the manufacturing line to the center of the factory and then wrap a broad corridor around it. The ceiling of the corridor would be covered with glass so that even on the most cloudy winter days there is light flooding in. On the other side of the corridor we would wrap our administrative offices. So basically the factory would be in the middle, the offices on the outside, and in between we’d have this broad corridor.

Next we decided to put all the common-use rooms like washrooms, coffee rooms, etc., off of the main corridor so that they would be shared by both office workers and factory workers. For factory workers to use the shared washrooms, they would have to come out of the factory and walk along the corridor. The same is true for the office people. As a result both groups not only share the same facilities but also share the corridor. So there would be constant intermingling. Everyone in the facility would need to use this corridor to get to his or her respective areas.

In fact, the corridor became so well traveled that it was dubbed The Street. The Street is superbly conducive to the mingling of the factory and the office employees. In the coffee room, the restroom, the meeting room, it brings us together. It provides a chance for us to let our hair down. If that doesn’t build community, I don’t know what does.

So we’ve managed to not only make more efficient use of the space provided from our first change, we’ve been able to use that space to build community and ultimately reinforce and continue our change efforts, and to do so in a very visible way. Nobody could miss this. To some degree we were lucky. But the key was a team of people that saw that this is what we should focus on. And we did.

Think of all the ways the people in “The Street” could have pursued the collaboration theme. The most obvious would have been a new program. There might have been speeches, workshops, perhaps a change on the performance appraisal form. All this could have helped, but it would have encountered a workforce tired of change and an employee base whose sense of urgency had sunk. Under those conditions, people often throw up their hands, convince themselves that enough of the vision is complete, declare victory, and resist new programs, no matter how well designed.

The change effort in “The Street” succeeds not because it directly creates collaboration or new collaboration norms. It works because everyone sees the company building a space, at some cost, that makes it much easier for employees of all sorts to interact, work together, and be together. This gives huge credence to vague, lofty, visionary ideas like “We should collaborate more.” The Street works because the blue collar and office employees see each other often enough for mutual negative stereotyping to decrease. “My goodness, he’s human too, wears clothes, speaks English, doesn’t eat children for lunch.” A decrease in negative stereotyping increases the chances of collaboration. So the achievement of the vision moves along. Another wave of change passes. The company moves nearer to the end of the process. And the firm has an innovative, twenty-first-century, the-PR-guys-are-going-to-love-it work space.

Step 7

Don’t Let Up

Continue with wave after wave of change, not stopping until the vision is a reality, despite seemingly intractable problems.

What Helps

• Aggressively ridding yourself of work that wears you down—tasks that were relevant in the past but not now, tasks that can be delegated

• Looking constantly for ways to keep urgency up

• Using new situations opportunistically (as in “The Street”) to launch the next wave of change

• As always—show’em, show’em, show’em

What Does Not Help

• Developing a rigid four-year plan (be more opportunistic)

• Convincing yourself that you’re done when you aren’t

• Convincing yourself that you can get the job done without confronting some of the more embedded bureaucratic and political behaviors

• Working so hard you physically and emotionally collapse (or sacrifice your off-the-job life)

Stories to Remember

• PE Ratios

• The Merchant of Fear

• Reducing Twenty-Five Pages to Two

• The Street

Video: Welcome to Week 7https://www.youtube.com/watch?v=_FzgNraZLGU&feature=youtu.be

What is the structure of the education system? 

  1. Select a major city in the U.S. and examine its sister city from the list provided below. https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/List_of_twin_towns_and_sister_cities_in_the_United_States.html  If this link does not work, you will be able to find a list of cities under Resources and you will have to conduct research to locate the sister city.
  2. Share some geographic information on the U.S. city that you selected and its sister city (some of them have more than one city but, you are only required to investigate one).
  • Where is the city located?
  • What is the population size and demographics?
  • What language(s) is/are spoken?
  • What is the structure of the education system?
  1. Compare and contrast the educational practices and policies of the two cities. Analyze your findings on the education system using one of the major sociological perspectives.

This assignment should follow the standard 5 paragraph essay format. An introduction with a thesis, 2-3 body paragraphs, and a conclusion paragraph.  You should include your view on how one of the major sociological perspectives relates to the policies and practices of education of each city. This should be more than just stating the perspective and its definition.

If you could implement one policy in all public schools, what would it be? Why?

What it the issue at hand, what is the author’s point of view, how is the author substantiating his opinion on the matter?

Gordon Rule Written assignments

Assignment # Due Date:
1 09/24/19
2 10/22/19
3 11/19/19

Written Assignments (10% of Final Class Grade)

To elaborate the written assignments you need to choose from de media any article related to the topics covered in class such as demand, supply, interest rate, taxes, subsides, inflation, unemployment.

Your article can be from any media source (newspaper, magazine, website, etc.)

All Written Assignments works will be graded on Gordon Rule requirements, format, content, sources, clarity, connectivity, and quality of analysis. Since this course must meet the Gordon rule requirements, you must submit all three scheduled current events or you may not pass the class.

Miami Dade General Education Outcomes: The class and writing assignments are designed to reflect and practice

Critical Thinking (Students should be able to solve problems using critical and creative scientific reasoning.)

Numbers / Data Analysis (Students should be able to process, understand and accurately analyze numerical data)

Computer / Technology Usage (You will learn how to use word processing, spreadsheet, database, and presentation programs.

AN ARTICLE REVIEW: WHAT ONE IS AND HOW ONE IS WRITEN

An article review is a written evaluation of a particular work. It takes the form of an essay. It is done after careful reading, note-taking and analysis of what the author is trying to say. Your review’s length may vary according to the article’s size.

The review consist of four main parts that are placed in continuous narrative.

A. Description of the work

A one or two paragraph description of the work’s physical structure and any information about the author you may have discovered. For example magazine title, number of pages, publisher, copyright, date, edition, whether it is part of a series.

B. Statements of author’s goals:

The author will say that he or she is trying to accomplish somewhere at the outset either in the article’s preface or in its introduction. In your own words, or paraphrasing his or her own, state the person’s objectives for having writing the article (one or two paragraphs)

C. Your verdict:

Did the author achieve the goals set forth? Or. Were some achieved but not all? Were the conclusions valid, or can you show when he or she hedged the point? If the answer is “yes” show why and use examples from the text to bolster your praise. If the answer is “no” do the same thing to back your claim. Remember, you cannot praise or condemn without proof.

D. Your Opinion of the whole Work:

Did you like the article? Why or why not? Use examples to bolster your statements.

Proofread your work before turning it in and watch your spelling.

In addition, student cannot pass, i.e., earn a letter grade of C or better, ECO 2013 without satisfactorily completing three written assignments. All writing assignments will be graded according to the following college-wide criteria:

Miami Dade College

Gordon Rule Writing Rubric

Articles Review Additional Explanation (10% of Final Class Grade)

The Articles Review are the written Gordon Rule component of the class.

For each article you must submit a 1-2 page summary/analysis of the article, the correct font is the following:

  1. The Article Summary must be Typed double space. (APA Format)
  2. One inch margins all around the page.
  3. Font 12, Times New Roman or Arial ONLY.
  4. Every article must have a Cover Page and a References page as requested in APA
  5. Write it ALL in your OWN words, DO NOT COPY / PASTE anything, your grade will be severely penalized if you do so.

The Article Review is basically you explaining what the article author is trying to convey. It is an explanative summary analysis of the article. Use the following to guide you through writing the summary. Even though the article writing is not formal, this is a business class and we must write the article accordingly, refrain yourself from making the article summary too personal.

  1. Introduce your article summary.
  2. What is the article’s main idea. Explain / Summarize in your own words what is the article writing about.
  3. What it the issue at hand, what is the author’s point of view, how is the author substantiating his opinion on the matter?
  4. Want to get an “A” then use other sources if desired to talk about the same topic and expand the author’s article.
  5. End it by providing your opinion on the matter. Do you believe the article is right/wrong and why, is there any right/wrong on this matter? Notice any claims you make must be substantiated by hard information, data that supports your claim.

They MUST include a references page and a cover page. Project MUST be APA style. The article is due on the due date as listed on page 1, NOT later. The use of Wikipedia, any other internet blog, question-answer website as a source in not acceptable. Make sure you use acceptable (recognized) sources. Your project will be checked for academic irregularities, you will receive a Zero if the project is found to be someone else’s partial or entire work. All LATE WORK will receive a SEVERE grade penalty, or may not be accepted.

I need help with a written assignment, any article related to the topics such as: supply, demand, interest rate, taxes, subsides, inflation, unemployment . this article must be 1-2 pages summary/analysis, APA format.

1) Introduce your article summary.

2) What is the article’s main idea. Explain / Summarize in your own words what is the article writing about.

3) What it the issue at hand, what is the author’s point of view, how is the author substantiating his opinion on the matter?

4) Want to get an “A” then use other sources if desired to talk about the same topic and expand the author’s article.

5) End it by providing your opinion on the matter. Do you believe the article is right/wrong and why, is there any right/wrong on this matter? Notice any claims you make must be substantiated by hard information, data that supports your claim.

due tomorrow 10/22/2019 11:59pm

Distinguish the strategic actions that differentiate between successful domestic and international sourcing plans.

Competencies

Distinguish the strategic actions that differentiate between successful domestic and international sourcing plans.

Instructions

You have been in the Emerging Leaders onboarding learning and development program for one quarter and have experienced a few successes. During this onboarding-program you have participated in assessments and completed a leadership development outline to help you to identify and understand your organizational leadership style. Now let us move forward in the onboarding program where you are asked to develop a strategic plan outline to help you to distinguish the strategic actions that differentiate between successful domestic and international sourcing plans as an emerging operations leader.

For this strategic plan outline, you are being asked to address and answer the following questions:

  • Create a table outline and clearly distinguish the strategic actions that differentiate between successful domestic and international sourcing plans:
    • What does a successful domestic sourcing plan entail? Explain how you as an Emerging Leader will implement a successful domestic sourcing plan.
    • What does a successful international sourcing plan entail? Explain how you as an Emerging Leader will implement a successful international sourcing plan.

Clearly distinguish and differentiate in the table outline between successful domestic and international sourcing plans.

Write a 1,050-word report based on the Bell Computer Company Forecasts data set and Case Study Scenarios. 

Write a 1,050-word report based on the Bell Computer Company Forecasts data set and Case Study Scenarios.

Include answers to the following:

Case 1: Bell Computer Company

· Compute the expected value for the profit associated with the two expansion alternatives. Which decision is preferred for the objective of maximizing the expected profit?

· Compute the variation for the profit associated with the two expansion alternatives. Which decision is preferred for the objective of minimizing the risk or uncertainty?

Case 2: Kyle Bits and Bytes

· What should be the re-order point? How many HP laser printers should he have in stock when he re-orders from the manufacturer?

Format your assignment consistent with APA format.

niversity of Phoenix Material

Case Study – Bell Computer Company

The Bell Computer Company is considering a plant expansion enabling the company to begin production of a new computer product. You have obtained your MBA from the University of Phoenix and, as a vice-president, you must determine whether to make the expansion a medium- or large- scale project. The demand for the new product involves an uncertainty, which for planning purposes may be low demand, medium demand, or high demand. The probability estimates for the demands are 0.20, 0.50, and 0.30, respectively.

Case Study – Kyle Bits and Bytes

Kyle Bits and Bytes, a retailer of computing products sells a variety of computer-related products. One of Kyle’s most popular products is an HP laser printer. The average weekly demand is 200 units. Lead time (lead time is defined as the amount of time between when the order is placed and when it is delivered) for a new order from the manufacturer to arrive is one week.

If the demand for printers were constant, the retailer would re-order when there were exactly 200 printers in inventory. However, Kyle learned demand is a random variable in his Operations Management class. An analysis of previous weeks reveals the weekly demand standard deviation is 30. Kyle knows if a customer wants to buy an HP laser printer but he has none available, he will lose that sale, plus possibly additional sales. He wants the probability of running short (stock-out) in any week to be no more than 6%.

Copyright © 2017 by University of Phoenix. All rights reserved.

Steps 6 & 7: Create Short-Term Wins and Don’t Let Up

Steps 6 & 7: Create Short-Term Wins and Don’t Let Up

Mt. Everest isn’t scaled in a day. It takes months and months of training adn planning. Once the climb does start, the climbers certainly don’t climb the entire thing in one day. They climb a bit each day and rest at camps along the way to regain strength for the next push. The same concept holds true in change efforts. We can’t accomplish the entire goal in one day. To keep up momentum and help make the challenge more palatable we must set up a series of short term goals, much like stepping stones, that will help us achieve our long term change goal.

Specific questions or items to address:

Read Step 6 “Create Short-Term Wins” and Step 7 “Don’t Let Up” from Kotter and Cohen’s The Heart of Change. First, review the feedback from your instructor on Part 6. Use any new information you gained from the discussion and feedback from your instructor to revise and improve Part 6 of your project. Next, compile Part 7 of your project, explaining the short term wins you can facilitate for your team. Use the exercise on in your reading to compile the first portion of Part 7, answering the questions provided in the exercise. You may find the area at the end of Step 6 under the “Create Short-Term Wins” header helpful in reviewing the key points of what to do and not do when setting short term goals. Be sure your paper touches on the key elements of each as they pertain to your organization.

Next explain what you will do to help ensure your change efforts don’t fade when you have accomplished your goals. How will you help prevent burn out? How will you help maintain the change once it’s implemented? You may find the area at the end of Step 7 under the “Don’t Let Up” header helpful in reviewing the key points of what to do and not do when not letting up on the change effort. Be sure your paper touches on the key elements of each as they pertain to your organization.

Be sure to include at least three scholarly references to support your assertions written in your own words. Do not copy word for word from the course text or any other sources. Your submission this week is Part 7 of the final project.

The requirements below must be met for your paper to be accepted and graded:

· Write between 1,000 – 1,250 words (approximately 4 – 6 pages) using Microsoft Word in APA style.

· Use font size 12 and 1” margins.

· Include cover page and reference page.

· At least 80% of your paper must be original content/writing.

· No more than 20% of your content/information may come from references.

· Use an appropriate number of references to support your position, and defend your arguments. The following are examples of primary and secondary sources that may be used, and non-credible and opinion based sources that may not be used.

·

1. Primary sources such as, government websites (United States Department of Labor Bureau of Labor Statistics, United States Census Bureau, The World Bank, etc.), peer reviewed and scholarly journals in EBSCOhost (Grantham University Online Library) and Google Scholar.

2. Secondary and credible sources such as, CNN Money, The Wall Street Journal, trade journals, and publications in EBSCOhost (Grantham University Online Library).

3. Non-credible and opinion based sources such as, Wikis, Yahoo Answers, eHow, blogs, etc. should not be used.

· Cite all reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) in the paper and list on a reference page in APA style.

Here are some resources to help you format your written assignments using the APA style guide.

Click on the link below for a downloadable template (MS Word document) to help you with your paper.

APA_Template_downloadable.docx

Examples of how to cite sources (opens in another browser window)

How to use formatting features in Word to make your paper APA-compliant (video)

Grading Criteria Assignments

Maximum Points

Meets   or exceeds established assignment criteria

40

Demonstrates   an understanding of lesson concepts

20

Clearly   presents well-reasoned ideas and concepts

30

Uses   proper mechanics, punctuation, sentence structure, and spelling

10

Total

100

What is most important is that you use YOUR OWN WORDS to summarize the news article.

Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/https://www.onlinesecurity.com/news–publications-pagehttp://www.esecurityplanet.com/viewshttp://netsecurity.about.com/

What role do you believe government regulation should play to ensure ethical conduct by businesses?

Respond to…

What role do you believe government regulation should play to ensure ethical conduct by businesses? How do different political viewpoints potentially shape the answer to this question?

The government’s role in regulating ethical conduct by businesses should be an educational and oversight role.  The government should set forth rules and regulations for all businesses to follow ethical behavior practices. Give businesses the tools and possibly literature, as a whole, so all businesses know how to train their employees and what is expected of them.  It is up to businesses to hire people with great character who will not only follow the rules but carry themselves in a manner that is in line with the companies goals and motto. Only when an employee of the business acts outside of the rules and regulations set forth by the government should the government get involved.  They might get involved to find out if the act was an isolated event or an ongoing problem that needs to be addressed. If found to be an ongoing problem, then the government should apply the necessary penalties to fit the act. In most cases, the unethical acts are isolated events that require only the business to get involved and remedy the situation.  “On the flip side, business leaders must also apply appropriate sanctions for bad or illegal behavior”(Seaquist, 2012).

“The ethical accountability of business is one of the areas in which the government has tried to legislate ethical conduct.” (Seaquist, 2012).  People with differing political views will have a different answer to this question because of their ideologies. People who are on the conservative side might see things differently from those on the liberal side of the aisle. Liberals might not have the same issues or problems related to those of a different political party.  One party might be in favor of harsher penalties for certain acts than others. Politics should not be deciding factors when it comes to ethical issues or regulations. Regulating ethical behaviors should be black and white, with all businesses on the same page, so everyone knows how to respond to certain situations.

Reference

Seaquist, G. (2012). Business law for managers [Electronic version]. Retrieved from https://content.ashford.edu/

Respond to…

As I stated in discussion one, this is such a controversial and difficult topic to address. Government regulation in business, in my opinion, is a necessity. While I understand the argument that the marketplace is self-regulating, and that the government regulations impose a burden of high costs on businesses, small businesses in particular, in the end I would still say that government regulation is necessary.

To say the marketplace is self-regulating and does not need any government regulation after what we as a country have seen businesses do historically would be irresponsible. We have seen the need for government intervention in business through the 2008 credit crisis, the bailouts that followed, and the continuous news stories of businesses who have been fined for not being compliant with the regulations of the government. The government rules and regulations create someone for these businesses to answer to for their actions and hold them accountable. To me, that is necessary.

“The US Financial Crisis Inquiry Commission (FCIC) reported its findings in January 2011 that ‘the crisis was avoidable and was caused by: widespread failures in financial regulation, including the Federal Reserve’s failure to stem the tide of toxic mortgages; dramatic breakdowns in corporate governance including too many financial firms acting recklessly and taking on too much risk; an explosive mix of excessive borrowing and risk by households; and Wall Street that put the financial system on a collision course with crisis; key policy makers ill prepared for the crisis, lacking a full understanding of the financial system they oversaw; and systemic breaches in accountability and ethics at all levels’ (FCIC, 2011)” (Woodside, 2012, p.128). This statement sums up my opinion about this topic and the need for regulation, because when left unregulated we have seen the mess that can be made. The rules and regulations imposed by government may be a burden, however they are a burden with a purpose that is worth it.

I do believe that the rules and regulations should be different for small businesses vs large corporations. It is large corporations that pose the greater risk to society as far as business goes, and they are who I believe need to be regulated more so because of their large-scale impact on society. There should be some regulations on small businesses, but not at the same level as the large corporations, which is the case in government regulations today. “A combination of political pressures and equity concerns has resulted in numerous legislative provisions that exempt small firms from regulatory requirements or reduce their burden of compliance” (Weidenbaum, 1998, p.60). This alleviates the issue that some raise in the argument that the regulations imposed by government inflict too high of a burden on small businesses, because the small businesses are exempt from many of the regulations and rules that large corporations are held to.

Regulations should play the role of setting guidelines and industry standards and holding companies to those industry standards with punishments such as fines. The government should be holding companies accountable for their actions and putting out the fires before they get too big.

I think that political views may have an affect on the answer to this question, although for me it does not. I think a republican would generally be likely to answer this question that they would want little to no government intervention in business, and that there is no need for government in business. I think a democrat would be more likely to answer that they would want more government regulation in business. I think that government regulation is necessary, although only to a certain extent. I don’t think this because of a political reason, but because I believe that greed can be a dangerous thing in the business world, and if left unregulated people and companies are capable of unethical business behaviors.

References

Weidenbaum, M. (1998). Government Regulation and Medium-Sized Business. Society, 35(3), 60–63. Retrieved from http://search.ebscohost.com.proxy-library.ashford.edu/login.aspx?direct=true&db=s3h&AN=273938&site=eds-live&scope=site

Woodside, A. G., Man-Ling Chang, & Cheng-Feng Cheng. (2012). Government Regulations of Business, Corruption, Reforms, and the Economic Growth of Nations, 11(2), 127–142. Retrieved from http://search.ebscohost.com.proxy-library.ashford.edu/login.aspx?direct=true&db=eoh&AN=EP88422183&site=eds-live&scope=site

Differentiate behavioral traits and highly effective habits of successful operations managers.

Competencies

  1. Differentiate behavioral traits and highly effective habits of successful operations managers.
  2. Distinguish the strategic actions that differentiate between successful domestic and international sourcing plans.
  3. Distinguish operational practices that will create an exceptional customer experience.
  4. Differentiate the key assessment metrics in achieving an operational project plan.
  5. Prioritize three quality measures used in operational design.
  6. Relate the seven key elements of designing a forecasting system.

Instructions

You have been promoted to the role of senior operations manager and have been named by the VP of Operations to the organizational one-year elite onboarding program for high-potentials called Emerging Leaders.

As an Emerging Leader, you are expected, in fiscal Q1 and Q2, to develop an operations manager toolkit/project guide for the new junior operations managers you will source to this role in the next quarter. The toolkit will be used by your newly hired junior operations managers during the six-month onboarding process within your organization.

Developing an onboarding program for new junior operations managers is important because onboarding, according to the Society of Human Resources Management (2016), “is the process by which new hires get adjusted to the social and performance aspects of their jobs quickly and smoothly, and learn the attitudes, knowledge, skills, and behaviors required to function effectively within an organization (p. 1).”

In addition, sourcing, vetting, background checking, interviewing, and training a newly hired junior operations manager will cost your organization approximately $6,300.00 (per candidate).

Consequently, to assist your new junior operations managers in learning, growing, and developing into your organizational culture, you will need to provide them with the tools to succeed.

What to Submit

You are to develop an operations manager toolkit/project guide that must be inclusive of the following components: a cover page, table of contents, and a reference page supported by research from at least six scholarly sources. This toolkit, although a written assignment, is very different from you writing a traditional 10-page APA style paper, and is representative of an authentic reference tool you would use in the workplace to onboard a new junior operations manager. Both the reference page and in-text citations must be in APA format.

Your newly-hired junior operations manager will require support and your assistance to be successful; therefore, you will need to develop an operations manager toolkit/project guide which will include the following components:

  • An opening statement on the importance of operations manager leadership development
  • A comparison statement on understanding the five organizational leadership styles
  • A description of a successful domestic and international sourcing plan and analysis statement
  • A description outline of an exceptional customer experience program plan and analysis statement
  • A description of at least four internal data collection measurement tools and analysis statement
  • A description of at least three quality measures used in operational design and analysis statement
  • A description of the seven key design elements of a forecasting system and analysis statement
  • An evaluation of the components of your operations manager toolkit/project guide

Resources

Society of Human Resource Management (2016). Onboarding New Employees. Retrieved from https://www.shrm.org/about/foundation/products/Pages/OnboardingEPG.aspx

Describe in detail the positioning strategy for each of these physician groups.

Scenario

Steven Jones recently returned from a week-long hiking trip out West. During the last leg of the journey, Steven’s hiking boot became lodged in an old branch, and he fell. The mishap caused a tear in the meniscus of his right knee. The emergency room physician told him he would need to see an orthopedic physician to get the meniscus repaired.

Steven has high-deductible insurance. When he got home, he searched the Internet to find orthopedic physicians in his community. The first one he found was a 35-physician group with a banner reading, “Your bones knit best with us.” Searching the site, Steven found information on the partners, their research, and some educational materials—but little else.

The second group he found was called Macomb Orthopedic Group; it was made up of 10 physicians. The Web site contained a profile about each physician as well as price estimates for various procedures. The Web page instructed him how to register and complete the paperwork by downloading it from the site. It also explained how to submit his insurance information so they could supply a written estimate of costs for the procedure.

Write a paper to address the following: (3-4 pages)

  • Describe in detail the positioning strategy for each of these physician groups.
  • Based on what you see here, what are the strengths and weaknesses of each of these groups? Explain your reasoning.
  • The second group also discusses a concept called “package pricing.” Explain how this works, and include its advantages and disadvantages.
  • What recommendations would you make for these groups as far as their Web presence?

NOTE: You need to support your work with at least 4 academic or professional peer-reviewed sources that were published within the past 5 years.

Critical success factors for the IT manager

Building a business case for an information technology (IT) strategy is essential to demonstrate that there is an alignment between the IT that is implemented in the organization and the overall goals and objectives of the organization. Being able to build a business case means that the investment in resources can be justified.

Write an information systems business case of 4–5 pages for the case study organization that includes:Based on the information contained in the Business Systems Plan and the Strategic Information Systems Assessment, write an IT strategy statement that details the following:

  • Critical success factors for the IT manager
  • A general strategy for how the IT department will determine congruence between the goals of the IT department and the goals and objectives of the case study organization
  • A general strategy for how the IT department will support the goals and objectives of the case study organization

Identifies Each of the Costs to the Appropriate Division, Activity and Cost Driver

Economics: Master: Essay: English (U.S.): 2 pages/550 words:APA 2 sources due in 24 hours

BUS630.W3A1.11.2014

Description:

Total Possible Score: 6.00

Identifies Each of the Costs to the Appropriate Division, Activity and Cost Driver

Total: 2.00

Distinguished – Correctly identifies each of the costs to the appropriate division, activity and cost driver.

Proficient – Identifies each of the costs to the appropriate division, activity and cost driver, but contains few errors.

Basic – Identifies each of the costs to the appropriate division, activity and cost driver, but contains several errors.

Below Expectations – Attempts to identify each of the costs to the appropriate division, activity and cost driver, but contains many errors.

Non-Performance – Does not identify each of the costs to the appropriate division, activity and cost driver.

Explains How Items are Traced to Activity Groupings, How Costs Should Be Related to Products Using Primary Cost Drivers, and the Difference Between Preliminary and Primary Cost Drivers

Total: 3.00

Distinguished – Accurately and thoroughly explains how items are traced to activity groupings, how costs should be related to products using primary cost drivers, and the difference between preliminary and primary cost drivers. Effectively uses scholarly sources to support the explanations.

Proficient – Explains how items are traced to activity groupings, how costs should be related to products using primary cost drivers, and the difference between preliminary and primary cost drivers. Uses scholarly sources to support the explanations, but minor details are missing or inaccurate.

Basic – Explains how items are traced to activity groupings, how costs should be related to products using primary cost drivers, and the difference between preliminary and primary cost drivers. Minimally uses scholarly sources to support the explanation and relevant details are missing and/or inaccurate.

Below Expectations – Attempts to explain how items are traced to activity groupings, how costs should be related to products using primary cost drivers, and the difference between preliminary and primary cost drivers; however, does not use scholarly sources to support the explanation and significant details are missing and inaccurate.

Non-Performance – The explanations are either nonexistent or lack the components described in the assignment instructions.

Critical Thinking: Explanation of Issues

Total: 0.50

Distinguished – Clearly and comprehensively explains the issue to be considered, delivering all relevant information necessary for a full understanding.

Proficient – Clearly explains the issue to be considered, delivering enough relevant information for an adequate understanding.

Basic – Briefly explains the issue to be considered, delivering minimal information for a basic understanding.

Below Expectations – Briefly explains the issue to be considered, but may not deliver additional information necessary for a basic understanding.

Non-Performance – The assignment is either nonexistent or lacks the components described in the instructions.

Written Communication: Control of Syntax and Mechanics

Total: 0.50

Distinguished – Displays meticulous comprehension and organization of syntax and mechanics, such as spelling and grammar. Written work contains no errors and is very easy to understand.

Proficient – Displays comprehension and organization of syntax and mechanics, such as spelling and grammar. Written work contains only a few minor errors and is mostly easy to understand.

Basic – Displays basic comprehension of syntax and mechanics, such as spelling and grammar. Written work contains a few errors which may slightly distract the reader.

Below Expectations – Fails to display basic comprehension of syntax or mechanics, such as spelling and grammar. Written work contains major errors which distract the reader.

Non-Performance – The assignment is either nonexistent or lacks the components described in the instructions.

Determine whether certain contract remedies exist in the following scenario

Case Analysis

Determine whether certain contract remedies exist in the following scenario:

Forrest Gump is a famous table tennis player. He enters into a contract with Alabama Sports Marketing to advertise the latest ping pong game and to serve as the computer-generated imagery (CGI) model for the development of the video game. Gump is perfect for this job as there are not many world famous ping pong players who have a following similar to his. The game is set to start development on March 1 and will be completed on July 31, so the game can be released at Thanksgiving—a major video game release period. Both parties have agreed and stipulated to the fact that the game must be completed on time to maximize the profits.

Gump will make 20% of the net proceeds from the sales of the game. In addition, the contract has a liquidated damages clause that indicates that if Gump does not participate in the marketing, does not serve as the CGI model, or breaches the contract in any way, he will owe Alabama Sports Marketing $2 million.

Based on this fact pattern and the information presented in this unit, answer the following questions in a minimum of 250 words each.

  1. One day, Gump gets into an argument with the developer. Gump refuses to perform any work until the problem is solved. In this situation, can Alabama Sports Marketing seek specific performance of the contract? If yes, why? If no, why not?
  2. How would the court determine whether the liquidated damages clause is valid? Is this clause valid? Explain your answers.

Cite any direct quotes or paraphrased material from outside sources. Use APA format.

How does this provide an example of a class topic? How does this article support or disprove information learned in class?

Students will review 5 news articles (dated this semester) related to international business – cannot use the news article presented in class. The following are good sources: Wall Street JournalFinancial TimesThe EconomistForbes, Bloomberg, Business WeekFortune, etc. International newspapers and/or Internet news sources may be used. E-News articles that are less than 3 pages in length may not appropriate for this assignment – they probably do not contain enough information for you to complete analyze the article Note: Local sources (i.e.  The Denver PostThe Boulder Daily Camera,) are NOT acceptable sources. (NOTE: A paragraph is more than 2-3 sentences. An excellent write-up will take approximately 1½ – 2 hours per article and will be about 2 pages double-spaced in length). Students should address the following 4 items for each article:

a. A copy of each article (identifying the source and date). 5%

b. A summary of each article in your own words (Minimum of 2 paragraphs). 35%

c.  Implications of each article (Minimum of 3 paragraphs). Some questions that you might consider in your discussion about implications include: How does this action affect businesses? How does this action affect consumers/customers? How might employees be affected? How does this affect the economy or public policy of the country? How might competition in the industry be affected? How might international trade be affected? What are the effects on the Balance of Payments? How might information in this article affect manager’s decisions about the company, etc.? What are the costs/benefits of this action? (Be specific & provide support for your conclusions). In other words, tell me what you have learned this semester! See the “Implications” section at the end of chapters to help you. 25%

d. Application of course concepts to the article topic (minimum 2 paragraphs). First identify the specific course concept the article relates to (you can identify the chapter, too). Then discuss the application. Some topics you might address are:

How does this provide an example of a class topic? How does this article support or disprove information learned in class? How does the information in the article add to class information on a topic? How does the article topic support or disagree with class/text information. Be specific. This is more than identifying class topics that were discussed. Relating article topics to globalization is inadequate. 25% At least 10 pages in total (at least 2 pages for each journal articles)

develop a variety of interview questions based on the KSAs and required experience for CapraTek’s regional sales representative positions.

n a 13-slide presentation deck, develop a variety of interview questions based on the KSAs and required experience for CapraTek’s regional sales representative positions.

Note: Complete the assessments in this course in the order in which they are presented, beginning with Assessment 1.

Organizations may have differing plans for hiring outside applicants, but they often follow a common pattern when screening those candidates.

In a 13-slide presentation deck, develop a variety of interview questions based on the KSAs and required experience for CapraTek’s regional sales representative positions.

Note: Complete the assessments in this course in the order in which they are presented, beginning with Assessment 1.

Organizations may have differing plans for hiring outside applicants, but they often follow a common pattern when screening those candidates.

By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:

  • Competency 1: Describe how hiring practices support an organization’s strategy.
    • Identify which question types relate to the KSAs or required experiences for CapraTek’s position.
  • Competency 2: Assess approaches for recruiting, selecting, and retaining talent.
    • Explain why the questions are appropriate for CapraTek’s position.
  • Competency 4: Analyze the impact of legal and regulatory issues on staffing management.
    • Explain why interview questions do not request illegal information.
  • Competency 5: Communicate in a manner that is scholarly and professional.
    • Design slides that are uncrowded, visually appealing, and easy to read.
    • Communicate in a manner that is appropriate for the intended audience.

Context

The most common applicant screening process looks something like this:

  • Review of resumes/applications for basic qualifications.
  • A phone interview (generally with HR).
  • A screening interview with HR that may involve some initial testing, reference checking, or background screening.
  • A department interview with more in-depth testing and background checking.
  • Additional interviews with other stakeholders.
  • A decision process.
  • Offer made to selected candidate.

Questions to consider

To deepen your understanding, you are encouraged to consider the questions below and discuss them with a fellow learner, a work associate, an interested friend, or a member of your professional community.

  • Based on your own employment experiences, what seems to be the best way to screen applicants so that only qualified applicants are actually invited to be interviewed in person?
  • Are background checks and reference checks good business practices? Are they legal?
  • Consider an ineffective employment interview that you, a family member, or a coworker experienced. What could the interviewer have done differently to make the interview effective?

Required Resources

The following resources are required to complete the assessment.

Library Resources

The following e-books and articles from the Capella University Library are linked directly in this course:

  • Arthur, D. (2012). Recruiting, interviewing, selecting, and orienting new employees (5th ed.). New York, NY: AMACOM.
    • Chapters 5–14.
  • Baur, J. E., Buckley, M. R., Bagdasarov, Z., & Dharmasiri, A. S. (2014). A historical approach to realistic job previews: An exploration into their origins, evolution, and recommendations for the futureJournal of Management History20(2), 200–223. doi:http://dx.doi.org/10.1108/JMH-06-2012-0046

SHOW LESS

Suggested Resources

The following optional resources are provided to support you in completing the assessment or to provide a helpful context. For additional resources, refer to the Research Resources and Supplemental Resources in the left navigation menu of your courseroom.

Capella Resources

Click the links provided to view the following resources:

  • General Interviewing Guidelines.
  • Testing: Some Basic Concepts.

Multimedia

Click the links provided below to view the following multimedia pieces:

  • Correlation: Measuring the Relationship Between Two Sets of Numbers |  Transcript.

Library Resources

The following articles from the Capella University Library are linked directly in this course:

  • Ceniceros, R. (2011). Job candidate testing program cuts Harley-Davidson’s injuries: Physical ability to perform job tasks checked before workers hiredBusiness Insurance45(32), 4.
  • Huffcutt, A. I., Van Iddekinge, C. H., & Roth, P. L. (2011). Understanding applicant behavior in employment interviews: A theoretical model of interviewee performanceHuman Resource Management Review21(4), 353–367.
  • Pittman, M. (2008). Picking the right people for your teamEmergency Nurse16(6), 16–18.
  • Risavy, S. D., & Hausdorf, P. A. (2011). Personality testing in personnel selection: Adverse impact and differential hiring ratesInternational Journal of Selection & Assessment19(1), 18–30.

Course Library Guide

A Capella University library guide has been created specifically for your use in this course. You are encouraged to refer to the resources in the BUS-FP4045 – Recruiting, Retention, and Development Library Guide to help direct your research.

Internet Resources

The resources listed below are relevant to the topics and assessments in this course but are not required. Please note that URLs change frequently. Permissions for the following links have either been granted or deemed appropriate for educational use at the time of course publication.

  • Heathfield, S. (2015). Human Resources Information System (HRIS). Retrieved from http://humanresources.about.com/od/glossaryh/a/hris.htm
  • Hyman, J. (2013). Federal court slams the door on EEOC’s criminal background check lawsuit. Retrieved from http://www.workforce.com/2013/08/13/federal-court-slams-the-door-on-eeocs-criminal-background-check-lawsuit/
  • Leung, R. (2004). Did hospitals “see no evil”?: Policy may have given one nurse a license to kill. Retrieved from http://www.cbsnews.com/news/did-hospitals-see-no-evil-02-04-2004/
  • Merron, J. Taking your wonderlics. Retrieved from http://espn.go.com/espn/page2/story?page=merron/020228
  • Monster. (n.d.). Sample job descriptions. Retrieved from http://hiring.monster.com/hr/hr-best-practices/recruiting-hiring-advice/job-descriptions/sample-job-descriptions.aspx
  • Morrow, S. (2013). Hiring practices and social media. Retrieved from http://www.legalzoom.com/articles/hiring-practices-and-social-media

VitalSource e-Books

The resources listed below are relevant to the topics and assessments in this course and are not required.

  • Heneman, H. G., III, Judge, T. A., & Kammeyer-Mueller, J. (2019). Staffing organizations (9th ed.). New York, NY: McGraw-Hill Education.
    • Chapters 7–9.
    • Available in the courseroom via the VitalSource Bookshelf link.

Assessment Instructions

Note: Complete the assessments in this course in the order in which they are presented, beginning with Assessment 1.

Preparation

To prepare for this assessment, complete the following:

  • Familiarize yourself with Chapters 5–14 of Arthur’s Recruiting, Interviewing, Selecting, and Orienting New Employees e-book, linked in the Resources.
  • Read Baur, Buckley, Bagdasarov, and Dharmasiri’s 2014 article, “A Historical Approach to Realistic Job Previews: An Exploration Into Their Origins, Evolution, and Recommendations for the Future,” in Journal of Management History, volume 20, issue 2, pages 200–223. This article is linked in the Resources.
  • Read the scenario below.

Scenario

In Assessment 4, you developed a job analysis for CapraTek’s regional sales representative positions. Based on that job analysis, you will interview candidates. Before you can do so, you must develop interview questions based on the required knowledge, skills, and abilities (KSAs) and required experience for the CapraTek position.

Requirements

As a member of CapraTek’s human resources team, you believe the best way to develop the interview plan and select the best candidate is to include a variety of question types. Create a PowerPoint presentation deck containing the following elements, one question per slide. Ensure that your slides are uncrowded, visually appealing, and easy to read.

  • 4 structured interview questions.
  • 3 semi-structured interview questions.
  • 2 behavioral interview questions.
  • 2 situational interview questions.

In addition, include the following:

  • Explain why the questions are appropriate for CapraTek’s position and do not request illegal information. Place your explanation in the slides’ notes area.
  • Describe which question type(s) relates to the KSAs or required experience for CapraTek’s position.
  • Include a title slide and (if needed) a resources slide.

I have to write 1500 words on ‘wearable technology’ with Harvard referencing.

I have to write 1500 words on ‘wearable technology’ with Harvard referencing.  How these factors affect wearable technology and fashion trend.

Format to be followed-

1 Macro analysis and their impact ( 700-900 words )

1.1 Political

1.2 economical

1.3 technological

1.4 Environmental ( a little about sustainability)

1.5 legal

1.6 Social

2 Micro analysis ( upto 300-400 words )

3 Consumer segments; attitudes and behaviours

4   Potential future trend, technology or innovation direction

What are your research interests in the area of information technology? How did you become interested in this area of research?

WRITTEN INTERVIEW QUESTIONS

Doctoral candidates should provide an authentic personal statement to each of the five following questions/prompts reflecting on their own personal interest. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to response to each prompt/question individually for clarity of the reviewer. Writing sample should be submitted in Microsoft Word format and include candidate’s name.

PhD IT

  1. Tell us about yourself and your personal journey that has lead you to University of the Cumberlands.
  2. What are your research interests in the area of information technology? How did you become interested in this area of research?
  3. What is your current job/career and how will this program impact your career growth?
  4. What unique qualities do you think you have that will help you in being successful in this program?
  5. How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?

provide an example of the process you would implement for users to authenticate to the company’s intranet.

The three primary factors of authentication are something you know, something you have, and something you are. Multifactor authentication uses more than one authentication factor and is stronger than using a single authentication factor. You are the security professional assigned to design the authentication process for your company. The goal is to secure very sensitive customer data. Thinking about what you know about factors of authentication, provide an example of the process you would implement for users to authenticate to the company’s intranet. How might employee access differ from customer access? Be sure to fully explain your reasoning.

Describe how virtual machines can be used in a forensics investigation.

“Virtual Machine Forensics” 

  • Go to the Forensic Focus website to read the article titled “Virtual Forensics: A Discussion of Virtual Machines Related to Forensics Analysis,” dated 2008, located at http://www.forensicfocus.com/downloads/virtual-machines-forensics-analysis.pdf.
  • Determine what you perceive to be the greatest challenge when dealing with virtual machines from a system forensics perspective. Provide a rationale for your response.
  • Describe how virtual machines can be used in a forensics investigation. Using the Internet, provide a link to a set of tools that is considered a forensic imager that could be launched using virtualization.

What can you do now to integrate the experiences and insights you had in this course with your personal and professional development goals?

For this Individual Reflection, select concepts or topics that resonated with you during this course and commit to learning more about them. To bring this commitment to life, identify concrete action items that will support your goal to deepen your personal learning experience in the coming year. Then, consider the following:

  • What can you do now to integrate the experiences and insights you had in this course with your personal and professional development goals?
  • What are the most important things you are taking from this course that will shape your future and enable you to make a positive difference?

Submit all of the following components as one document:

  • Executive Summary: Write an executive summary of the course (2–3 paragraphs) that addresses the following questions:
    • Which content and assignments in this course improved your understanding of marketing for competiveness within your organization (or one with which you are familiar)?
    • What impact has your improved understanding had or do you anticipate it will have on the value you will bring to your role within an organization?
    • How have the content and assignments changed the way you think of the role of marketing within the organization?
    • How can the knowledge you gained in this course enable you to make a positive difference?
    • In what ways do you think the knowledge and skills covered in this course can influence positive social change within an organization, community, or more broadly?
    • How have the content and assignments shaped your goals now, and how do you anticipate they will shape your goals in the future?
  • Personal Brand: In this course, we have considered the four key components of marketing.  Now, it is time for you to apply one of the concepts—promotion—to yourself. In this week’s resources, you read about how important it is to have a personal brand, especially considering your online presence. Within the promotion component, you examined branding, and now it is time to establish a personal branding goal.
    • Describe what you want your personal brand to be. In the next step, you develop an action plan for creating or enhancing your personal brand. Provide at least one clear example of an experience in this course that has helped, or may help, you move toward embodying the personal brand desired.
    • How do your values and ethics integrate with your personal brand?
  • Action Plan: Write a detailed action plan for one new goal for professional and personal development. (You will continue to build on the list of goals you started in your previous course). Include the following in your action plan:
    • Your specific goal for professional and personal development with an explanation as to why you selected the goal. Be sure to provide concrete and specific examples of why the goal is important, the extent to which this goal enables you to be an agent for positive social change, the personal or professional value you expect from achieving each goal, and how the goal relates to the resources you reviewed in the course.
    • At least two objectives for the goal you have identified. Provide a rationale that explains how your objectives support the goal. Then, develop your action plan/goal to relate to your personal brand.
    • In what ways or to what extent do you think your personal brand will allow others to see you as an agent for positive change within your organization, your community, or more broadly?

2 1/2 pages in APA format

Reference sheet attached for topics covered in course