Free Essay

Risk Management Jit 2 Task 1b

In:

Submitted By rangerdad
Words 3242
Pages 13
Risk Management JIT 2 Task 1b
American International Insurance BCP
William Gardner
May 9, 2015

Task B. Create a business contingency plan (BCP) that the company would follow if faced with a major business disruption (e.g., hurricane, tornado, terrorist attack, loss of a data center, the sudden loss of a call center in a foreign country, the collapse of a financial market or other catastrophic event) in which you include the following:
1. Analyze strategic pre-incident changes the company would follow to ensure the well-being of the enterprise.
2. Analyze the ethical use and protection of sensitive data.
3. Analyze the ethical use and protection of customer records.
4. Discuss the communication plan to be used during and following the disruption.
5. Discuss restoring operations after the disruption has occurred (post-incident). Since 1919, A.I.I. has been in the business of insuring businesses and people from losses incurred through disasters. For 95 years (A.I.I.) has stood by its clients as they faced many challenges from the financial collapse of 1929 to the drought of the dust bowl years and even the ravages of World War Two. Assisting our clients in the face of hurricanes, tornados and even terrorist attacks is an everyday occurrence at A.I.I... However, who is planning and preparing for A.I.I.? A BCP is a plan to do exactly that, during the financial collapse of 2008 several flaws in the existing plans were exposed; flaws that not even the terrible events of September 11th 2001 had exposed. These flaws materialized in the necessity of government intervention on behalf of A.I.I. in the face of creditor’s demands and a liquidity crisis brought on by the global financial crisis.

What is a BCP? A BCP is an executive level proactive command and control system which is triggered in the event of a significant event which could adversely affect or disrupt the operation of the firm, eliminate its data management capacity and or data retention systems and falls outside the normal business parameters of expected risks.
What type of events should A.I.I.’s BCP plan address?
Based on the global scale and level of redundancy in systems and operations at A.I.I. a power grid failure or hurricane sized event does not represent a BCP level event thanks to planning and foresight of current and past executives. The effects of another potential global financial crisis can be mitigated to a point via the new financial management systems and procedures put in place after 2010. The greatest threat to A.I.I. is an internet based systems disruption and or attack via cyber terrorism directed at A.I.I. or by proxy at one of our clients or some other unforeseen event involving data security and or retention. 1. What proactive suggestions can be made in advance of an event to mitigate potential damage? a. The formation of an executive level BCP action team to identify key unforeseen risks and department heads to develop and implement a BCP response program for each specific event and each department; it is recommended that the team include contract outside I.T. security vendors and cloud computing firms to facilitate an additional level of data redundancy and security in the event of a data loss, systems shutdown or data breach.
b. The implementation of a quarterly BCP response drill to measure the individual components and member’s response to the “crisis” to identify key areas of concern and remedy response rates and actions as needed.
c. The sourcing of an outside “white-hat hacking firm” to test our systems for the BCP action team with regard to data security and or systems failure. To be conducted without business interruption.
d. The creation of a BCP calls list and hierarchy which in a BCP event takes immediate effect; For example the US Army and DIA utilize the following hierarchy and calls list to notify key personnel in the event of a BCP event.

To be successful a BCP requires; * Full executive and upper management commitment to the BCP process * The resources and funding required completing the BCP and implementing both the planning and practice phases. * Timely and open review and feedback of both the planning and practice phases

Feedback should include; * Both internal and external intelligence and security sources * Financial Analysis of potential impact * Evaluation of vendor performance * Evaluation of BCP action team and division managers performance * Evaluation of technical team performance

To assist the development of the BCP Action team and to provide a foundational reference for an action plan I have included the U.S. Army’s IT contingency planning (ITCP) as published in Army Pamphlet 25-1-2;
(ITCP) should;
(1) Be addressed throughout the system development life cycle
(2) Establish a sole ITCP coordinator with the responsibility for planning and ITCP.
(3) Identify and prioritize MEFs. (Mission essential functions)
(4) Establish baseline category requirements.
(5) Address risk management and mitigation.
(6) Establish system backup procedures.
(7) Create a Federally compliant ITCP. (Not required at A.I.I. but the highest standard available)
(8) Address plan testing, training and reporting
(9) Address how ITCP requirements will be incorporated into daily operations.
(10) Address how the ITCP relates to other disaster and emergency plans.
(11) Evaluate the system to link these critical services to system resources. The evaluation of the system and the critical system resources is then divided into the following five step system from initiation and development to disposal.

Having spent a good portion of my adult life in Army Special Operations I can attest to two things, the first being data security is a life and death issue in the Army and secondly no one places more of a priority on planning for unforeseen events then the Army does. In my opinion A.I.I. can benefit from emulating the high professional standards and the level of accountability the U.S. Army requires in terms of ITCP. Each phase of the ARMY ITCP has accompanying actions and measurable deliverable requirements including budgetary penalties for non-compliant managers and or commanders. In our opinion duplicating the Army’s policy of adding a monetary penalty in budgetary terms for individual unit managers would greatly increase compliance and cooperation as it illustrates the importance of the ITCP program. B2. Analyze he ethical use and protection of sensitive data. As an insurance and financial services firm the customer data and proprietary information which A.I.I. is in procession of is our most critical resource. Any breach of trust or ethical violations which occurs as a result of our use or disclosure of confidential and or proprietary data could be devastating to A.I.I. For this reason we recommend the following steps be taken to mitigate the potential unethical use of confidential data.
How do we protect our client’s data?
1. Active Systems administrator monitoring, A.I.I. should monitor the access to all confidential data by employing a third party vendor who is capable of monitoring the systems administrators accounts and access privileges for unusual and or anomalous activity.
2. Consistently seek out and utilize the best internet security systems. To include the most advanced firewalls and encryption systems to prevent and or limit the potential of illegal external access and the best available personnel to maintain and manage the systems.
3. Employee training and monitoring- By requiring ethics training for all employees who have access to our systems on the use of confidential data and then monitoring compliance with our ethical standards we can add a level of accountability to the data security system which is not currently in place. A.I.I. requires confidential data from our customers in every single one of our transactions, and for 95 years we have built a legacy of trust with our clients that their data is secure with us, by implementing a data ethics training and compliance system we can ensure that our clients can and will trust us for another 95 years. While clients may accept confidential data being stolen by a third party they are not likely to accept one of our employees’ misusing or stealing their confidential information. Actively monitoring the system users adds an additional layer of protection just in case an ethical violation was to occur.
How do we insure data recovery and system backup in a BCP event? Simply put we can’t, data recovery and system backup must become part of the daily routine, adding additional layers of redundancy via cloud based data storage to supplement our existing cross location internal storage and server farms is a data security requirement because in the event of a BCP event it will be too late for backing up at that point. In the BCP event backing up systems could also compromise the systems and data further by facilitating additional security breaches and allow a malicious code to enter the backup system. Each manager tasked must be held to a standard of daily backup, across platforms to ensure data security and continued access upon recovery from the BCP event. There are three levels of system back-up
1. Full- Full backup copies the entire system to another server and or the cloud based system.
2. Incremental- Incremental backup copies only the new files since the last backup to another server and or cloud based storage.
3. Differential- Differential backup copies all files which have changes since the last backup.

Each of these three types of system or file backups require a different amount of time and bandwidth to complete, therefore each type of backup will require a different budgetary allowance from the individual unit manager. Creating an (SOP) or standard operating procedure which is based on the needs and requirements of each specific business unit is recommended. The requirements should be predicated on the sensitivity and reparability of the data. Minimum standards for data backup should be constituted and no budgetary penalty should be incurred by managers who take a more conservative approach to data preservation and recovery. Beyond the timing and methodology of backup file creation, data recovery is dependent on several technical issues related to mirroring, striping, and parity which are beyond the scope of this presentation but should be addressed by the BCP Action Team. These technical issues relate to the quality and error rates of the data once recovery operations are instituted following a BCP event.

In the event of a BCP event the data recovery solutions instituted by the BCP action team will be triggered, and data recovery should occur in seconds predicated on the available bandwidth, RAID level, and redundancy levels selected by the team. Higher redundancy provides for greater data recovery but may take several more seconds per Megabyte. Depending upon the data loss and or system failure rate restoring data to pre-event levels may take seconds, minutes or hours. Provided that unit managers and the I.T. staff are compliant and the SOP for data backup is sufficiently stringent, A.I.I.’s capacity to facilitate a timely recovery will not be an issue once the source and extent of any system damage is assessed and addressed.

Key Points for Data Recovery and Backup
1. Redundancy
2. Backup SOP
3. Manager Compliance with Backup SOP
4. Bandwidth and RAID level
5. I.T. Staff Compliance and training
6. Budget for offsite mirror servers and cloud based storage solutions.

B4. Communications Plan
Today down-time is clearly not an option and smart communications are an essential aspect of achieving workable IA solutions. Smart communications work to resolve a range of issues, including: [ (Hiles, 2007) ] * Reducing RTO * Reducing RPO * Reducing costs * Providing resilience * Business protection * Demonstrable risk management and compliance * Providing additional resources and/or skills.

In the event which triggers the necessity of the BCP to be implemented the first barrier to implementing the plan will be facilitating communication to the BCP Action Team Members and from the members to other key personnel and vendors. Creating an emergency communications plan will facilitate A.I.I.’s rapid recovery in the event of a BCP Event. An Emergency Communication Plan must be able to; 1. Be activated quickly. 2. Provide information to senior management on the situation. 3. Prepare and issue press releases if authorized regarding data breach. (not recommended) 4. Organize and contain amount and content of broadcast media coverage.(Spin, damage control to prevent adverse market reaction if required) 5. Constantly provide secure data to BCP Action Team regarding scope and scale of ongoing breach and follow established procedural instructions to inform employees and other stakeholders with regard to the network potentially being compromised. 6. Continually adapt to resource limitations. Based on the likely manner of a BCP triggering event, (cyber) establishing a communications chain is highly recommended and as these communications will likely need to occur via cellular or analog telephone systems, once a data breach is detected the vendor and or system administrator who discovers the breach should initiate the call chart. Example Below As the type of event is directly correlated to secure customer data, maintaining strict operational control and security over the information communicated is critical. The call chart is designed to facilitate communication to BCP Action Team Leader who is directly tasked with communications with Senior Management. Senior Management will then determine the scope of public communications required based on the events size and scope. Most large firms, particularly publicly traded ones are not likely to disclose more information than is required based on the event to control market reaction and limit volatility in share prices. The creation of the Network Enterprise Center, NEC (in the implementation phase of this paper) is intended to facilitate the implementation of not only an emergency communications plan, but a recovery plan. Having the NEC and its BCP action team members design an A.I.I. specific incident communications strategy along with the legal and public relations departments will ensure that the BCP Action Teams communications are clear and concise during an event. Clear communication being the operative word, the cascading call list prevents multiple versions of events from dissemination in both directions. As a global firm with 24 hour operations A.I.I.’s NEC should be manned 24 hours a day with members of the BCP Action Team, additionally the new internal security vendor will have a staff member on site per their contract. The 24 hour availability will increase reaction times and ensure that the emergency communications plan is implemented and information regarding any event is not inadvertently released to the public. Along with the data loss or intention breaching of the systems the Emergency Communication Plan should include an operating procedure to address the potential of CYBER kidnapping and or blackmail particularly a public communications piece.

B5. Restoring Operations
The most common recovery strategy is data backup. So why do we back up our data: [ (Hiles, 2007) ] * To restore our data in the event of a disaster * To retrieve a file in case of deletion or corruption * To store historical data to ensure compliance with industry regulators. * How do we insure data recovery and system backup in a BCP event?
(All of this was previously on this paper but no heading was on it) Simply put we can’t wait for the event to occur, data recovery and system backup must become part of the daily routine, adding additional layers of redundancy via cloud based data storage to supplement our existing cross location internal storage and server farms is a data security requirement because in the event of a BCP event it will be too late for backing up at that point. In the BCP event backing up systems could also compromise the systems and data further by facilitating additional security breaches and allow a malicious code to enter the backup system. Each manager tasked must be held to a standard of daily backup, across platforms to ensure data security and continued access upon recovery from the BCP event. * There are three levels of system back-up * 1. Full- Full backup copies the entire system to another server and or the cloud based system. * 2. Incremental- Incremental backup copies only the new files since the last backup to another server and or cloud based storage. * 3. Differential- Differential backup copies all files which have changes since the last backup. Each of these three types of system or file backups require a different amount of time and bandwidth to complete, therefore each type of backup will require a different budgetary allowance from the individual unit manager. Creating an (SOP) or standard operating procedure which is based on the needs and requirements of each specific business unit is recommended. The requirements should be predicated on the sensitivity and reparability of the data. Minimum standards for data backup should be constituted and no budgetary penalty should be incurred by managers who take a more conservative approach to data preservation and recovery. Beyond the timing and methodology of backup file creation, data recovery is dependent on several technical issues related to mirroring, striping, and parity which are beyond the scope of this presentation but should be addressed by the BCP Action Team. These technical issues relate to the quality and error rates of the data once recovery operations are instituted following a BCP event.

* In the event of a BCP event the data recovery solutions instituted by the BCP action team will be triggered, and data recovery should occur in seconds predicated on the available bandwidth, RAID level, and redundancy levels selected by the team. Higher redundancy provides for greater data recovery but may take several more seconds per Megabyte. Depending upon the data loss and or system failure rate restoring data to pre-event levels may take seconds, minutes or hours. * Provided that unit managers and the I.T. staff are compliant and the SOP for data backup is sufficiently stringent, A.I.I.’s capacity to facilitate a timely recovery will not be an issue once the source and extent of any system damage is assessed and addressed.
Key Points for Data Recovery and Backup * 1. Redundancy * 2. Backup SOP * 3. Manager Compliance with Backup SOP * 4. Bandwidth and RAID level * 5. I.T. Staff Compliance and training * 6. Budget for offsite mirror servers and cloud based storage solutions.
Conclusion
As a financial services firm which operates globally and 24hours a day, A.I.I. must have a business contingency plan. In this paper we have identified the only event which could interrupt the entire global entity a cyber event, and presented a plan to address the event via the creation of a BCP action team. We have also addressed the ethical issues which we face due to the customer data which we have on file and require as part of our day to day operations and how best to implement a plan to further secure that data and minimize the potential for ethical violations of our data policy via a training, compliance and monitoring system.

Works Cited
Behnia, A., Abd-Rashid, R., & Chaudrhy, J. (2012). Smart Computing Review. A Survey of Information Security Risk Analysis Methods , 1-16.

Hiles. (2007). Strategies for IT and Communications. In The Definitive Handbook of Business Continuity Management, Second Edition. NY: John Wiley & Sons .

Rot, A. (2008). IT Risk Assessment: Quantitative and Qualitative Approach . World Congress on Engineering and Computer Science .

Similar Documents

Premium Essay

Lss Lean

...LSS lean Six Sigma Abstract Purpose – Although research has been undertaken on the implementation of lean within various industries, the many tools and techniques that form the “tool box”, and its integration with Six Sigma (mainly through case studies and action research), there has been little written on the journey towards the integration of the two approaches. This paper aims to examine the integration of lean principles with Six Sigma methodology as a coherent approach to continuous improvement, and provides a conceptual model for their successful integration. Design/methodology/approach – Desk research and a literature review of each separate approach is provided, followed by a view of the literature of the integrated approach. Findings – No standard framework for lean Six Sigma or its implementation exists. A systematic approach needs to be adopted, which optimises systems as a whole, focusing the right strategies in the correct places. Originality/value – This paper contributes to knowledge by providing an insight into the evolution of the lean Six Sigma paradigm. It is suggested that a clear integration of the two approaches must be achieved, with sufficient scientific underpinning. Keywords Lean production, Six sigma Paper type Literature review 1. Introduction The Toyota Production System (TPS) provided the basis for what is now known as lean thinking, as popularised by Womack and Jones (1996). The development of this approach to manufacturing began shortly after...

Words: 6543 - Pages: 27

Premium Essay

Strategy and the Master Budget

...10-1 Emerson Electric Company © Joseph San Miguel, reprinted with permission. 10-2 LetsGo Travel Trailers (Source: “LetsGo Travel Trailers: A Case for Incorporating the New Model of the Organization into the Teaching of Budgeting,” by Sally Wright, Cases from Management Accounting Practice, Vol. 14, Montvale, NJ: Institute of Management Accountants, 1998). Note that part 2 of this case requires the use of Excel. 10-3 Building Processes for a Solid Foundation: The Case of Community Health Initiatives (Source: Sandra Richtermeyer, Strategic Finance, August 2007, pp. 52-57. Note: this case was the case used as the 2008 IMA Student Case Competition. The Student Case Competition is sponsored annually by the IMA to provide an opportunity for students to interpret, analyze, evaluate, synthesize, and communicate a solution to a management accounting problem.) 10-4 Academic Advising at Bay State (Source: Janice E. Bell and Shahid L. Ansari, Strategic Finance, September 2008, pp. 44-51. Note: this case was the case used as the 2009 IMA Student Case Competition. The Student Case Competition is sponsored annually by the IMA to provide an opportunity for students to interpret, analyze, evaluate, synthesize, and communicate a solution to a management accounting problem.) Readings 10-1: “How to Set Up a Budgeting and Planning System” by Robert N. West and Amy M. Snyder, Management Accounting (January 1997), pp. 18-20, 22, 24. This article demonstrates the setting up...

Words: 28910 - Pages: 116

Free Essay

Core Concepts of Ais

...CORE CONCEPTS OF Accounting Information Systems Twelfth Edition Mark G. Simkin, Ph.D. Professor Department of Accounting and Information Systems University of Nevada Jacob M. Rose, Ph.D. Professor Department of Accounting and Finance University of New Hampshire Carolyn Strand Norman, Ph.D., CPA Professor Department of Accounting Virginia Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the...

Words: 241803 - Pages: 968

Premium Essay

Opeartions Management

...1-17 Operations Management Roberta Russell & Bernard W. Taylor, III Organization of This Text: Part I – Operations Management Intro. to Operations and Supply Chain Management: Quality Management: Statistical Quality Control: Product Design: Service Design: Processes and Technology: Facilities: Human Resources: Project Management: Chapter 1 (Slide 5) Chapter 2 (Slide 67) Chapter 3 (Slide 120) Chapter 4 (Slide 186) Chapter 5 (Slide 231) Chapter 6 (Slide 276) Chapter 7 (Slide 321) Chapter 8 (Slide 402) Chapter 9 (Slide 450) 1 -2 Organization of This Text: Part II – Supply Chain Management Supply Chain Strategy and Design: Global Supply Chain Procurement and Distribution: Forecasting: Inventory Management: Sales and Operations Planning: Resource Planning: Lean Systems: Scheduling: Chapter 10 (Slide 507) Chapter 11 (Slide 534) Chapter 12 (Slide 575) Chapter 13 (Slide 641) Chapter 14 (Slide 703) Chapter 15 (Slide 767) Chapter 16 (Slide 827) Chapter 17 (Slide 878) 1 -3 Learning Objectives of this Course Gain an appreciation of strategic importance of operations and supply chain management in a global business environment Understand how operations relates to other business functions Develop a working knowledge of concepts and methods related to designing and managing operations and supply chains Develop a skill set for quality and process improvement 1 -4 Chapter 1 Introduction to Operations and Supply Chain Management Operations Management Roberta Russell...

Words: 23545 - Pages: 95

Premium Essay

Test

...Process Management: Principles and Practice for Strategic Impact Second Edition Nigel Slack Stuart Chambers Robert Johnston Alan Betts ISBN: 978-0-273-71852-9  Pearson Education Limited 2009 Contents Part 1: Teaching Guide ........................................................................................................................................ 7 Chapter 1: Operations and processes.................................................................................................................... 8 Chapter 2: Operations strategy ........................................................................................................................... 12 Chapter 3: Supply network design...................................................................................................................... 19 Chapter 4: Process design 1 – positioning.......................................................................................................... 22 Chapter 5: Process design 2 – analysis ............................................................................................................... 26 Chapter 6: Product and service design processes ............................................................................................... 31 Chapter 7: Supply chain management ................................................................................................................ 34 Chapter 8: Capacity management.............

Words: 179416 - Pages: 718

Free Essay

Management

...Op"erations Research This page intentionally left blank Copyright © 2007, 2005 New Age International (P) Ltd., Publishers Published by New Age International (P) Ltd., Publishers All rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (13) : 978-81-224-2944-2 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com PREFACE I started my teaching career in the year 1964. I was teaching Production Engineering subjects till 1972. In the year 1972 I have registered my name for the Industrial Engineering examination at National Institution of Industrial Engineering, Bombay. Since then, I have shifted my field for interest to Industrial Engineering subjects and started teaching related subjects. One such subject is OPERATIONS RESEARCH. After teaching these subjects till my retirement in the year 2002, it is my responsibility to help the students with a book on Operations research. The first volume of the book is LINEAR PORGRAMMING MODELS. This was published in the year 2003. Now I am giving this book OPERATIONS RESEARCH, with other chapters to students, with a hope that it will help them to understand...

Words: 242596 - Pages: 971

Free Essay

Industrial Engineering

...This McGraw-Hill Create text may include materials submitted to McGraw-Hill for publication by the instructor of this course. The instructor is solely responsible for the editorial content of such materials. Instructors retain copyright of these additional materials. ISBN-10: 1121789048 ISBN-13: 9781121789043 McGraw-Hill Create™ Review Copy for Instructor Espinoza. Not for distribution. Contents 1. Preface 1 2. Methods, Standards, and Work Design: Introduction 7 Problem-Solving Tools 27 3. Tex 29 4. Operation Analysis 79 5. Manual Work Design 133 6. Workplace, Equipment, and Tool Design 185 7. Work Environment Design 239 8. Design of Cognitive Work 281 9. Workplace and Systems Safety 327 10. Proposed Method Implementation 379 11. Time Study 413 12. Performance Rating and Allowances 447 13. Standard Data and Formulas 485 14. Predetermined Time Systems 507 15. Work Sampling 553 16. Indirect and Expense Labor Standards 585 17. Standards Follow-Up and Uses 611 18. Wage Payment 631 19. Training and Other Management Practices 655 20. Appendix 1: Glossary 685 21. Appendix 2: Helpful Formulas 704 22. Appendix 3: Special Tables 706 23. Index 719 iii McGraw-Hill Create™ Review Copy for Instructor Espinoza. Not for distribution. Credits 1. Preface:...

Words: 294686 - Pages: 1179

Premium Essay

Essential of Strategic Management

...Advantage (Chapter 1) ● Working Conditions at Wal-Mart (Chapter 2) ● Wal-Mart’s Bargaining Power over Suppliers (Chapter 3) ● Human Resource Strategy and Productivity at Wal-Mart (Chapter 4) ● How Wal-Mart Became a Cost Leader (Chapter 5) ● Wal-Mart’s Global Expansion (Chapter 6) ● WalMart Internally Ventures a New Kind of Retail Store (Chapter 8) ● Sam Walton’s Approach to Implementing Wal-Mart’s Strategy (Chapter 9) Strategy in Action Features A Strategic Shift at Microsoft (Chapter 1) ● The Agency Problem at Tyco (Chapter 2) ● Circumventing Entry Barriers into the Soft Drink Industry (Chapter 3) ● Learning Effects in Cardiac Surgery (Chapter 4) ● How to Make Money in the Vacuum Tube Business (Chapter 5) ● The Evolution of Strategy at Procter & Gamble (Chapter 6) ● Diversification at 3M: Leveraging Technology (Chapter 7) ● News Corp’s Successful Acquisition Strategy (Chapter 8) ● How to Flatten and Decentralize Structure (Chapter 9) Practicing Strategic Management Application-based activities intended to get your students thinking beyond the book. Small-Group Exercises Short experiential exercises that ask students to coordinate and collaborate on group work focused on an aspect of strategic management. Exploring the Web Internet exercises that require students to explore company websites and answer chapter-related questions. Designing a Planning System (Chapter 1) Evaluating Stakeholder Claims (Chapter 2) Competing with Microsoft (Chapter 3) Analyzing Competitive...

Words: 223966 - Pages: 896

Premium Essay

Essentials-of-Strategic-Management-by-Hill-Jones

...Advantage (Chapter 1) ● Working Conditions at Wal-Mart (Chapter 2) ● Wal-Mart’s Bargaining Power over Suppliers (Chapter 3) ● Human Resource Strategy and Productivity at Wal-Mart (Chapter 4) ● How Wal-Mart Became a Cost Leader (Chapter 5) ● Wal-Mart’s Global Expansion (Chapter 6) ● WalMart Internally Ventures a New Kind of Retail Store (Chapter 8) ● Sam Walton’s Approach to Implementing Wal-Mart’s Strategy (Chapter 9) Strategy in Action Features A Strategic Shift at Microsoft (Chapter 1) ● The Agency Problem at Tyco (Chapter 2) ● Circumventing Entry Barriers into the Soft Drink Industry (Chapter 3) ● Learning Effects in Cardiac Surgery (Chapter 4) ● How to Make Money in the Vacuum Tube Business (Chapter 5) ● The Evolution of Strategy at Procter & Gamble (Chapter 6) ● Diversification at 3M: Leveraging Technology (Chapter 7) ● News Corp’s Successful Acquisition Strategy (Chapter 8) ● How to Flatten and Decentralize Structure (Chapter 9) Practicing Strategic Management Application-based activities intended to get your students thinking beyond the book. Small-Group Exercises Short experiential exercises that ask students to coordinate and collaborate on group work focused on an aspect of strategic management. Exploring the Web Internet exercises that require students to explore company websites and answer chapter-related questions. Designing a Planning System (Chapter 1) Evaluating Stakeholder Claims (Chapter 2) Competing with Microsoft (Chapter 3) Analyzing Competitive...

Words: 223966 - Pages: 896

Premium Essay

Management Information Systems

...Course Technology’s Management Information Systems Instructor and Student Resources Introduction to IS/MIS Principles of Information Systems, Eighth Edition • Stair, Reynolds Fundamentals of Information Systems, Fourth Edition • Stair, Reynolds Management Information Systems, Sixth Edition • Oz Information Technology in Theory • Aksoy, DeNardis Office Applications in Business Problem-Solving Cases in Microsoft Access & Excel, Sixth Annual Edition • Brady, Monk Succeeding in Business Applications with Microsoft Office 2007 • Bast, Gross, Akaiwa, Flynn, et.al Succeeding in Business with Microsoft Office Excel 2007 • Gross, Akaiwa, Nordquist Succeeding in Business with Microsoft Office Access 2007 • Bast, Cygman, Flynn, Tidwell Databases Database Systems, Eighth Edition • Rob, Coronel Concepts of Database Management, Sixth Edition • Pratt, Adamski Data Modeling and Database Design • Umanath, Scamell A Guide to SQL, Seventh Edition • Pratt A Guide to MySQL • Pratt, Last Guide to Oracle 10g • Morrison, Morrison, Conrad Oracle 10g Titles Oracle9i Titles Enterprise Resource Planning Concepts in Enterprise Resource Planning, Third Edition • Monk, Wagner Data Communications Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition • White Systems Analysis and Design Systems Analysis and Design in a Changing World, Fifth Edition • Satzinger, Jackson, Burd Object-Oriented Analysis and Design with the Unified Process • Satzinger, Jackson, Burd Systems Analysis and...

Words: 223685 - Pages: 895

Free Essay

Besanko

...Chapter 1 The Evolution of the Modern Firm Chapter Contents 1) Introduction 2) The World in 1840 • Doing Business in 1840 • Conditions of Business in 1840: Life Without a Modern Infrastructure Example 1.1: The Emergence of Chicago 3) The World in 1910 • Doing Business in 1910 Example 1.2: Responding to the Business Environment: The Case of American Whaling • Business Conditions in 1910: A "Modern" Infrastructure Example 1.3: Evolution of the Steel Industry 4) The World Today • Doing Business Today • The Infrastructure Today Example 1.4: Economic Gyrations and Traffic Gridlock in Thailand 5) Three Different Worlds: Consistent Principles, Changing Conditions, and Adaptive Strategies Example 1.5: Infrastructure and Emerging Markets: The Russian Privatization Program Example 1.6: Building National Infrastructure: The Transcontinental Railroad 6) Chapter Summary 7) Questions Chapter Summary This chapter analyses the business environment in three different time periods: 1840, 1910 and the present. It looks at the business infrastructure, market conditions, the size and scope of a firm’s activities and a firm’s response to changes. This historical perspective shows that all successful businesses have used similar principles to adapt to widely varying business conditions in order to succeed. Businesses in the period before 1840 were small and operated in localized markets...

Words: 81132 - Pages: 325

Free Essay

Finance

... LLC. Exclusive rights by Cambridge Business Publishers, LLC for manufacture and export. ALL RIGHTS RESERVED. No part of this publication may be reproduced, distributed, or stored in a database or retrieval system in any form or by any means, without prior written consent of Cambridge Business Publishers, LLC, including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning. Student Edition ISBN 978-1-61853-102-5 Bookstores & Faculty: to order this book, call 800-619-6473 or email customerservice@cambridgepub.com. Students: to order this book, please visit the book’s website and order directly online. Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1 About the Authors Peter D. Easton  is an expert in accounting and valuation and holds the Notre Dame Alumni Chair in Accountancy in the Mendoza College of Business. P ­ rofessor Easton’s expertise is widely recognized by the academic research community and by the legal community. Professor Easton frequently serves as a consultant on accounting and valuation issues in federal and state courts....

Words: 33010 - Pages: 133

Premium Essay

Environmental Analysis

...VIEW Strategic Human Resource Management Taken from: Strategic Human Resource Management, Second Edition by Charles R. Greer Copyright © 2001, 1995 by Prentice-Hall, Inc. A Pearson Education Company Upper Saddle River, New Jersey 07458 Compilation Copyright © 2003 by Pearson Custom Publishing All rights reserved. This copyright covers material written expressly for this volume by the editor/s as well as the compilation itself. It does not cover the individual selections herein that first appeared elsewhere. ii Permission to reprint these has been obtained by Pearson Custom Publishing for this edition only. Further reproduction by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system, must be arranged with the individual copyright holders noted. This special edition published in cooperation with Pearson Custom Publishing. Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 Please visit our web site at www.pearsoncustom.com ISBN 0–536–72690–6 BA 996748 PEARSON CUSTOM PUBLISHING 75 Arlington Street, Suite 300 Boston, MA 02116 A Pearson Education Company iii iv Table of Contents SECTION ONE ................................................................. 1 An Investment Perspective and Human Resources .... 2 HUMAN RESOURCE INVESTMENT CONSIDERATIONS ...6 INVESTMENTS IN TRAINING AND DEVELOPMENT ..... 14 INVESTMENT PRACTICES FOR IMPROVED RETENTION ..................

Words: 132738 - Pages: 531

Premium Essay

Management Cases

... Activity-Based Costing and Customer Profitability Analysis Cases |5-1 |Blue Ridge Manufacturing (Activity-Based Costing for Marketing Channels) | |5-2 |Columbo Soft-Serve Frozen Yogurt: Using Activity Based Costing To Assess Channel/Customer Profitability | |5-3 |Wilson Electronics (A) | |5-4 |Wilson Electronics (B) | |5-5 |The Buckeye National Bank (ABC Costing in the Service Sector) | |5-6 |Precision Paint | |5-7 |Forest Hill Paper Company | | | | Readings 5-1: “Activity-Based Costing and Predatory Pricing: The Case of the Petroleum Retail Industry” by Thomas L Burton and John B MacArthur, Management Accounting Quarterly, (Spring 2003). The assignment of indirect costs in a volume-based costing system can lead to product-cost subsidization—overcost high-volume products and undercost low-volume products....

Words: 33150 - Pages: 133

Premium Essay

Suzuki Alto a 10

...ANNUAL REPORT 2010 -11 TECHNO_LOGICAL TECHNO_LOGICAL In many ways, satisfying the Indian customer is probably much more challenging than satisfying a customer in another market. The country has an obsession for fuel efficiency, when it comes to choosing automobiles (and rightly so, since about three-fourths of India’s crude oil requirement is imported). Extracting more mechanical energy for the car from every drop of fuel is a designer’s challenge. But it is vital for the consumer, the economy and the planet. At the same time, a fast growing, young and upwardly mobile, speed conscious India demands pick-up and instant response at the accelerator pedal. There is normally a trade-off between performance and fuel efficiency. A third requirement is space efficiency, as customers want the car to be compact to cope with congestion on roads and parking lots. Yet another requirement is of minimizing emissions. The Company’s next generation, K-series engines employ a plethora of state-of-theart technologies to deliver on all these fronts. Technologies deployed could be as sophisticated as fine atomization to achieve fuel droplet diameter in microns for optimised combustion. Or, they could be as practical as using engineering polymers instead of metal in certain engine parts for weight reduction. Quite like packing more performance in a handheld smartphone as opposed to a traditional laptop. India’s road and dust conditions, the rains and driving safety considerations similarly...

Words: 50525 - Pages: 203