Managerial uses of cost information

 

This module discusses using costs in decision making as well as accumulating and
assigning costs. Discuss all of the following (2 pages)
• Different managerial uses of cost information
• The meanings and decision making uses of sunk costs, opportunity costs,
avoidable costs and relevant costs
• Experiences you have with these costs, whether it be in your daily personal life
or in your professional life

 

Tools that are commonly used by hackers to gain illegal access to computers and network

There are several tools that are commonly used by hackers to gain illegal access to computers and network to include backdoor, botnet, denial of service attack, phishing and spoofing, robot, zombie worm, Trojan, viruses, and worms. What is a denial of service attack (DoS)? What impact would a denial of service attack have on a major critical infrastructure such as mass transit?

System when conducting a design review

  1. Explain why is it important to consider all phases in the lifecycle of a system when conducting a design review. Provide two examples of possible consequences if all lifecycle phases are not included.

Your response must be at least 250 words in length.

  1. Compare and contrast the prevention through design concept with design safety reviews. Provide examples that illustrate the strengths and weaknesses of each.

Your response must be at least 250 words in length.

  1. Compare and contrast the relationship between a management of change process and prevention through design. Provide at least two examples that illustrate the benefits of the relationship.

Forecasting methods

Locate an internet resource of interest to you on any subject regarding forecasting methods. Hyperlink this resource in your Discussion Forum, and then summarize in some detail what you learned from this resource. Respond to a minimum of two of your fellow students by reviewing the resource they posted and provide any insight you may have regarding the application of this resource in your work operation

 

Communication Theories and Skills

 

 

• Analyze Communication Theories and Skills for Developing Professional Documents and Oral Presentations for Audiences in Diverse Communities and Disciplines
Creating a PowerPoint for a professional presentation is a great skill to learn, as most companies use PowerPoint for all different purposes.
For this assignment you will create a PowerPoint You will find a case study or a research project in the area you studying, use the library website to find your case study. It is recommended that you find a case study in the field you are studying, but any case study is fine for this presentation.
Your presentation will need to include slides on the following areas:
• Introduction to the case
• Methods used to conduct the research
• What was found (findings)
• How it was implemented
Creativity should be evident throughout the Power Point presentation. Treat this presentation as though you were presenting to an employer, all aspects of the Power Point will be assessed.
Feel free to use the notes section in PowerPoint if you would like to make any special presentation notations of how you would present your information.

 

 

Evaluation methodologies

 

submit a draft of your evaluation methodologies section. You will provide a comprehensive description of how your
organization (and potential funders) will know the program is successful. Items to consider include methods for measuring success, who will be performing the
evaluation, and how the methods will be selected. You should also include your plan for gathering data, using test instruments, analyzing data, using evaluation
for program improvements, and any specific evaluation reports that should be produced.
Specifically, the following critical elements must be addressed:
VI. Evaluation Methodologies
Provide a comprehensive description of how your organization (and potential funders) will know the program is successful. Items to consider include
methods for measuring success, who will be performing the evaluation, which two methods of evaluation will be used (you must include one type of
financial evaluation and one other evaluation method), and how the methods will be selected. You should also include your plan for gathering data,
including the identification of the sources from where the data will be acquired (CMS, quality data, leapfrog, turnover rates, etc.); analyzing data; using
evaluation for program improvements; and any specific evaluation reports that should be produced. Recall and incorporate different types of program
evaluation (process evaluation, outcome evaluation, formative evaluation, summative evaluation, cost-benefit evaluation, and cost-effectiveness
evaluation) from the program-evaluation course.

Systems,” “Managing Information Security Risk,”

 

 

 

Conduct a full risk assessment against the same corporate profile selected earlier. Based on the information obtained from previous assignments, provide a synopsis on how to manage identified risks, and describe the tools and strategies that will ensure network security.

 

 

Prerequisite: Using a vulnerability scanner obtained for the previous assignment, conduct a full scan against all servers in the domain. (This information will be used in Part 3 of the assignment.)
Use the following guidelines to create a four to five-page report.
Part 1: Prepare for Risk Management (“Establish a Framework for Managing Risk”)
1. List the corporate requirements (i.e., standards, laws) associated with the company. Briefly explain the impact of non-compliance.
2. Develop categories and a classification method for company information systems. List at least eight categories for various people, processes, hardware, software, and data applicable to the company. Describe the data/system classification scheme as well as the reasons for selecting it.
Part 2: Identify Risk (“Where is the Risk to My Information Assets”)
1. List a minimum of 20 assets (data, systems, people, processes, etc.) and measure their value to the company (Low, Moderate, High, Critical) in a simple table.
2. In one column, identify assets that can impact company compliance, customer satisfaction, competitive advantage, or business productivity (i.e., Business Impact Analysis).
Part 3: Assess Risk (“How Severe is the Risk to My Information Assets”)
1. Identify, measure (quantitative and qualitative), and mitigate key information technology risks. In addition, describe each of the tasks associated with risk framing, assessment, response and monitoring. Refer to risk models (e.g., “Managing Information Security Risk”).
2. Select the optimal risk assessment methodology based on corporate needs. Compare the advantages/disadvantages of your selected risk assessment methodology to others used in the industry.
3. Provide a diagram of the matrix that was used to assess risk.
4. Define for each asset the potential threats, the likelihood the threat will occur or be successful, and the impact loss the asset will have on the company (Risk Mitigation Economics). Note: This includes disasters, loss of power, employee resignations, system malfunctions, drop-in customers, etc.
5. Using the vulnerability scan, list in a table a minimum of 15 identified threats (open vulnerabilities) to the information systems, the impact of the exploited vulnerability, and remediation steps (countermeasures) to remove or reduce either impact or likelihood from threat.
Part 4: Define Risk Appetite (“How Much Risk is Acceptable to My Organization”)
1. Review the characteristics of a risk appetite within Chapter 6 of the course text.
2. Establish a Risk Appetite Statement for the company.
3. Define the Risk Tolerance of the company.
Part 5: Control Risk

Engaged Advocacy Practice for Leaders

 

 

Review the six stages of advocacy practice as outlined in your Developing Nonprofit and Human Service Leaders textbook.

In your initial post, consider the application of these stages of advocacy practice in the role of the community health worker as a change agent, or in the role of the leader in the organization for which you developed a strategic plan in this course. In addition, discuss how you see the stages of advocacy practice being used in your agency or in an organization from your readings or in your community. Explain why you think advocacy practice is important in policy or change initiatives.

The Abu Ghraib prison torture scandal

 

 

marshal the knowledge you have built to accomplish the core goal of all psychologists—to explain human
behavior. You will select a current or historical event and use theory and research from the field of social cognition and perception to explain, from your
perspective, why the event occurred. You will also suggest, again drawing from social cognitive theory and research, how this event could have turned out
differently had it occurred in a different culture. Although you will not have been exposed to the material in the entire course by the time you begin working
on the project, you should feel free to utilize theory and research covered in any portion of the course readings, or elsewhere within the field of social
cognition, in achieving the project objectives. The project will be completed in three steps: a topic proposal, a detailed outline and tentative annotated
bibliography, and a final paper.
The project is divided into two milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules Three and Five. The final research paper will be submitted in Module Seven.
This assessment will assess your mastery with respect to the following course outcomes:
 PSY-326-01 Evaluate contemporary research in social cognition and perception for its contributions to and importance for analyzing human behavior
 PSY-326-02 Analyze the impact of cognitive theory and methodology on socialpsychology
 PSY-326-03 Assess the impact of the social environment (with a focus on both functionality and shortcomings) on basic cognitive processes,
perceptual processes, and behavior
 PSY-326-04 Apply the automatic versus controlled model of social cognition to the analysis and evaluation of human behavior
 PSY-326-05 Assess the role of culture as one component of the social environment for its impact on basic cognitive and perceptual processes
Prompt
Your paper will address two major questions:
1. How does the literature in social cognition and perception help explain a real-world event?
2. Based on the literature, how could this event have happened differently had it occurred in a different culture?
The introductory part of your paper should provide background information on your chosen event, including where and when it occurred, how people were
affected by it, and its impact. For example, the event might have significantly impacted individuals, or perhaps it had an environmental or political impact.
Include any other relevant information that will provide the reader with a full picture of the nature of the event.

l utilize your knowledge of social cognitive theory and research to explain why the event occurred. Select two theories from the course that
could explain how and why the event happened. In your discussion of each theory and how it applies to understanding the event, incorporate information
from at least two representative, peer-reviewed articles that capture the essence of the theory and can be used to illustrate what the theory predicts would
happen in this situation.
Although you will address the applicability of the theories to the event in some detail, you should also analyze the role of other basic cognitive, perceptual,
and social psychological forces at work in bringing about the occurrence or unfolding of the event. Part of this analysis should include how the dual process
model can be utilized to analyze the course of events. How did automatic and controlled processes contribute to the event? What is the difference between
these two modes of processing? Utilize scholarly research to support all of your claims.
What specific heuristics, biases, or errors might have occurred in the course of the event? How are the biases or heuristics that you have identified functional
or problematic within this context? How might they have been reduced? Utilize information in the scholarly literature or your textbook for this discussion.
Finally, could this event have turned out differently if it unfolded in a different culture? Or do you think the outcome would have been much the same? Make
use of information in the scholarly literature or your textbook in discussing thisissue.
You will need to take care in selecting an event that will lend itself to detailed analysis from a social cognitive perspective. One example of such an event
would be the terrorist attacks that took place on September 11, 2001, and the aftermath. Many things occurred that could be viewed through the lens of
social cognition. The individuals who carried out the attack may have had certain motivations that social cognitive perspectives could explain. The public
developed certain views of the hijackers and, in some cases, had altered views of the groups to which the hijackers belonged. The rate of flying on
commercial airliners plummeted for a time. Subsequent U.S. military invasions of Afghanistan and later Iraq were portrayed as responses to this attack.
Yellow ribbons and “Support Our Troops” bumper stickers became widespread symbols. Hostility toward those critical of U.S. government policies increased.
Here are some other topics that you might choose as the focus of your paper:
 The civil rights movement
 The My Lai massacre during the Vietnam War
 The Nazi Holocaust
 The struggle to abolish slavery in the United States
 The Russian Revolution
 The stock market crash of 1929
 Human-induced global climate change
 The AIDS epidemic
 The nuclear disaster in Fukushima, Japan
 The Abu Ghraib prison torture scandal

Brand Resonance Pyramid

 

Provide a brand audit, using the CBBE model, and identify 2 growth strategies for one of the brands listed below, to demonstrate your understanding of the components of that brand and branding theory.

Using the Brand Resonance Pyramid (CBBE Model) as the central premise of the work, you will critique the key elements of the brand, the building blocks that have been used and how successful they have been. Your report should include:
• an applied and evidenced brand resonance pyramid (CBBE model)
• identification & discussion of the building blocks of the brand
• evidence and application of contemporary branding theories and concepts
• Reference to at least 3 journal articles relevant to the brand and branding
NOTE: It is recommended that you use a maximum of 2000 words for this part of your assignment.
Part b) – relating to weeks 4 – 9, (40% of the marks)
Using Ansoff’s matrix, identify and justify 2 growth strategies for the brand. It is recommended that you use a maximum of 1500 words for this part of your assignment, i.e. 750 words for each strategy.

BRANDS
Choose ONE of the following for your report: IKEA, Innocent, Gymshark, Disney, Tiffany & Co
SOME GUIDELINES
Focus of the Report
The focus is on the brand (not on the organisation or the marketing activities). Remember to use the different conceptual models/frameworks as presented in the reference books and to apply them to the brand you’ve chosen.
Format of the report
Although it is best not to be too prescriptive in giving a ‘pro forma’ that hinders your creativity, it is crucial that you include some headings rather than an essay type continuous piece of writing. The following are some you might like to consider although you could also combine some of these, and use wording that feels most natural for yourself.
• Introduction – simply and briefly about the brand selected, the concept of branding and introduce the CBBE model. It is suggested that you use a maximum of 150 words for this section.
Part a)
• The brand identity and salience, answering the question Who are you (the brand)?
• The brand meaning, considering performance and imagery, points of parity and difference,