...Assignment Week Eight 1 ASSIGNMENT WEEK EIGHT Assignment Week Eight Gary Best American Military University Assignment Week Eight 2 ASSIGNMENT WEEK 8 Chapter 14 First off the large American multinational corporation would need to rely on a teams of lawyers and interpreters to get to know the laws of the European Union against cybercrimes. Security firm FireEye released the results from a study they conducted and found that one third of the businesses in the UK, France, and Germany are at a loss with the new cyber security legislation.(1) If one third of the businesses that are in the European Union do not understand the upcoming laws your research team is going to be very busy. The establishment of the data protection regulation has created to things to point out that may make trying to follow it a little easier. First it wil1 be designated as a regulation. A regulation is applicable in all European Union states.(2) Secondly, there is now harmonization, only one regulatory authority that manages its state of things in all of the European Union states.(2) Before this change each European Union state had its own directive that you would have to worry about compliance. One thing to consider is if you plan on using a cloud based software for your data. It will need to be secured and protected against hacking. You will need secure the data before it is sent to the cloud using a process called cloud data encryption and tokenization.(3) Tokenization is taking the sensitive...
Words: 556 - Pages: 3
...Week 8 Assignment 2 Dr.Chinwe E. Nweke ECO100089VA016-1128-001 Principles of Economics December 2, 2012 1. Analyze the current economic situation in the U.S. as compared to five (5) years ago. Include interest rates, inflation, and unemployment in your analysis. The news informs everyone on a daily basis that the United States has the largest economy and that it is looking to be in great shape since four years ago. To some Americans it seems otherwise. The unemployment rate in 2007 was 4.6% compared to unemployment rate in 2012 at 7.5%. The U.S inflation rate ended in October 2012 after twelve months was 2.16% which is 0.11% higher than the one in September. The U.S inflation forecast consists of apparel, education and communication, energy, food and beverages, housing, medical care, recreation, and transportation. The U.S Government’s inflation economics policy tries to control inflation. High inflation and negative inflation (deflation) can have damaging effects on the economy. 2. Propose two (2) strategies that the federal government could implement that would encourage people to spend more money in order to create employment opportunities. Two strategies that the federal government could implement that would encourage people to spend more money in order to create employment opportunities is to give free college training to low income and unemployed. This would allow them to get paid for going to school or training. It would also provide an automatic job after...
Words: 796 - Pages: 4
...ITMG381 - Week 8 Fill in your name above, put your answer below each question, and then return this document for grading following the instructions in the syllabus. Please provide detailed answers to support all of the questions. Use examples from the readings, or from your own research, to support answers. The assignment must be 1-page in length with a minimum of 2 outside sources. Chapter 14 A large American multinational corporation wants to establish a telephone and email hotline for employees to report wrongdoing within the company. The company has offices in the European Union and wants to ensure that it avoids violations of E.U. data protection laws. What steps can the company take to increase the likelihood that its hotline reporting system remains in compliance? To start with, all parties should be brushed up on existing laws and regulations and the consequences of non-compliance. Far too often there are incidents in which ignorance is claimed but the ignorance seems to be intentional. In fact it would be a good idea to regularly review such laws for their company and in their state as well as any laws that are applicable with the countries they do business with. Though it is understandable and certainly possible to not be aware of every law pertaining to your business and its practices and this is why there are lawsuits sometimes, due to the fact that someone really didn’t know. In the case of something like Yahoo and the French court dealing with...
Words: 630 - Pages: 3
...Week 8 Assignment 2 Clifton Bland Professor Hughes BUS 325 March 1, 2015 Introduction Human resource management refers to the exercise or function through which an organization will be able to maximize the productivity of its employees through set strategic objectives. Human resource management determines the motivation that employees of an organization have to work at the employing organization. This is because human resource management deals with all aspects that pertain to the workplace environment including salaries and wages. Therefore, it is important for an organization to perform quality human resource management right from the recruitment of an individual to the retirement of the individual. In the case that an organization mistreats its employees, the employees will not perform to their maximum potential thereby reducing the productivity of the organization and by extension, the organizations profit margins (Hurn, 2007). Human Resource Management as a Strategy Organizations use human resource management as a strategy to improve its productivity in terms of volumetric production as well as quality production. This is simply through the motivation of the employees to help improve the corporation’s productivity. In simple terms, happy employees contribute to the success of the company because of their motivation to work. Performance, productivity, quality, and specialization qualities will improve once they are happy. In addition, human resource management is...
Words: 2092 - Pages: 9
...Week 8 Assignment: Multinational Acquisition PepsiCo & Quaker Oats “Multinational Acquisition: PepsiCo & Quaker Oats” Briefly describe the acquisition you have selected. PepsiCo, Inc. is a multinational corporation with product sales in over 200 countries and territories. One billion times per day, PepsiCo customers consume one of their numerous food and beverage products. The merger agreement between PepsiCo and Quaker Oats dated December 2, 2000 (completed acquisition on August 2, 2001) significantly increased PepsiCo’s market share and revenues. Therefore, consumers of PepsiCo products have increased exponentially, both in the United States and internationally. Prior to acquiring Quaker Oats, PepsiCo was approaching “the global saturation point in terms of cola sales” (Jaffe, 2001). It is no secret that the world is trending toward healthier snacks and drinks. Medical studies linking soda consumption to childhood obesity will begin to eat away at PepsiCo’s profits. Acquiring Quaker Oats (the maker of Gatorade) will allow PepsiCo to expand further into the noncarbonated drink business. The $13.4 billion stock acquisition (Sorkin & Winter, 2000) of Quaker Oats will seem like a bargain once profits from Gatorade and the Quaker snacks start rolling in. PepsiCo has the means and capability to distribute beverages AND snacks, as Frito Lay is their largest subsidiary. “Pepsi plans to use Quaker’s granola bars as the foundation...
Words: 2061 - Pages: 9
...Americas Post Civil War Growing Pains 1865 to 1900 Robert Ryals Contemporary U.S. History Professor Terry Hammons October 23rd 2012 Abstract This paper is going to incorporate the key elements that contributed to the early revolution within American History. We are going to discuss the Presidential and the Congressional Reconstruction which occurred between 1865 to 1867, and how it laid the foundation to the dramatic changes of governmental ordinances and political ethics. Following that, we will discuss the ratification of the 15th amendment, enactment of the “Jim Crow” laws, Civil Rights Act, Wounded Knee, and the Spanish American War. This essay will attempt to illustrate the events that wrought change to the Americas, the key fueling factors in the momentum of change. The Presidential Reconstruction began with Andrew Johnson’s impeachment. Johnson possessed a background that mirrored Abraham Lincoln’s. Johnson was raised in poverty, which fueled his drive for prosperity and aided in his development into a businessman. Johnson was also a very qualified candidate for the presidency and boasted a politically accomplished resume.(Jenkins, 2003) Unfortunately, Johnson’s extreme disdain for the slavery lead to his demise, this was often translated into the belief that his plans for American restoration and reconstruction would be extremely detrimental to southerners, even worse then Abraham Lincoln’s...
Words: 1993 - Pages: 8
...Useful Questions Decisions to invest “A little more than a decade ago, Apple was on the brink of bankruptcy” (Baltzan and Phillips, 2012, pg. 28); if top executives had not supported investments in iPods, Apple would have more than likely went into bankruptcy. By not taking a chance on this investment the company would have collapsed its competitors; however, by supporting this product, Apple was able to have the first mover advantage. Baltzan and Phillips (2012) state that “when a company is the first to market with a competitive advantage, it gains a particular benefit, such as Apple did with its iPod” (pg. 14) and this advantage allowed Apple to survive and thrive in its industry. Open versus Closed systems In earlier technological developments, each company had its own proprietary hardware and software. Through time, Apple moved into “industry standard Intel chips, it adopted PC standards such as USB, and made its disk operating system files compatible with the PC world” (Foremski, 2010). However in recent years, and with the development of the iPod, iPhone and even the iPad, Apple is beginning to be more closed. For example, the iPad and iPhone do not support Adobe Flash or Microsoft Silverlight; which interferes with video streaming from Hulu or Netflix. Apple appears to stay in closed systems because of its lucrative nature. Although their customer base consists of people who prefer open standards and open platforms, Apple’s closed system has not deterred consumers...
Words: 746 - Pages: 3
...Business Ethics Across the World [YOUR NAME HERE] Organizational Ethics and Social Responsibility - XMGT/216 May 19, 2013 Jo Ann Johnson Have you ever considered how globalization has not only brought countries closer together, but also how it has created a unified ethical perspective for countries doing business together? Management teams are finding out that there is a world of ethical challenges waiting to be discovered through the increased development of globalization. If ethics are a problem within a country, imagine the challenges that arise when the language is foreign, cultures are diverse, and the number of people involved grows to a global scale. In this paper we are going to discuss two articles which cover the ethical perspectives of India and China, how these articles contribute to understanding global ethics, and how India’s and China’s business ethics compare to that of the United States. Santa Clara University published an article written by Stephen Rothlin called “Business Ethics in the Chinese Context” that discussed some of the progress China made in 2006 and 2007 in business ethics. Stephen Rothlin is the general secretary of the Center for International Business Ethics in Beijing. In January 2008, Rothlin updated the Markkula Center for Applied Ethics Business and Organizational Ethics Partnership with the progress he had seen since his last visit in 2006. Rothlin discussed six categories including; consumer rights, anti-corruption activity, environmental...
Words: 1629 - Pages: 7
...1. Give the syntax of do..while statement. do { text += "The number is " + i; i++; } while (i < 10); 2. Explain how an image could be accessed by name and by array number. You can access an image by name by simply putting the name between quotes. To access an image by number you must first give each image a number in the image array. The images should be numbered in the order that they appear in the source code. var document.images=new Array (3) document.images[0]="ImageOne.png" document.images[1]="ImageTwo.png" 3. Write a function that uses substring method of String object to get the 'Scr' part of the string 'JavaScript'. Also use the length property and write the length of the string 'JavaScript' and use the charAt method to get the 'S' from 'JavaScript' and write that. var str="JavaScript"; document.write(str.substring(4,7)+" "); 4. Explain how a Date object's instance is created and used. Also describe any three methods of the Date object. Data objects are used by the destination application either the client or the server. A data object in the destination application is one end of a connection between the source application and the destination application. A data object in the destination application is used to access and interact with the data in the data source. There are two common situations where a data object is needed. The first situation is when data is dropped in your application using drag and drop. The second situation...
Words: 600 - Pages: 3
...Mobile Device Security and Other Threats Melissa M Dr. Constance Blanson Theories of Security Management November 30, 2014 Analyze the emerging security threats presented within the “Security Threat Report 2014” Security threats have not only grown and matured quickly, but the people behind these threats have become more creative in camouflaging their work. These criminals have become more adept at eluding their identification and are now relying on cryptography. Malware authors, as with users, are now focusing on mobile devices and web services. Numerous threats were listed in the Security Threat Report 2014 such as botnets, android malware, attacks on Linux platforms and Mac OS X, web-based malware, targeted threats to your financial accounts, unpatched windows systems and re-invented spam. These items are detrimental to companies and users. The more complex these threats get, the harder it is to protect against them. I will analyze botnets and android malware in this section. A botnet is a network of private computers infected with malicious software and controlled as a group without the owner’s knowledge. Criminals distribute malicious software that can turn your computer into a “bot”. When this occurs, your computer can perform automated tasked over the Internet without your knowledge. This type of malware is typically used to infect large numbers of computers. They are used to send out spam email messages, spread viruses, attack computers and servers...
Words: 1366 - Pages: 6
...Internal Controls Ashly Rea XACC/280 September 22, 2012 Adrienne Cooper Internal Controls If you cannot trust your employees to protect your revenue, whom can you trust? In most cases the answer is not whether you can trust your employees but how effectively you are monitoring them. Internal control means doing just that, setting up methods and measures within an organization to establish control. Companies such as Tyco and Enron are examples of company destruction from a lack of internal control. With a strong internal control in place companies are able to protect their assets. This includes employees engaging in theft or robbery and takes care of any unauthorized use of any of the assets. Companies are also able to have reliable accounting financial records. Internal control helps to ensure accuracy in the work. In order for internal control to be functional there are specific control principles in place. Depending on the size and functions of the business, these principles can alter slightly. The majority of companies follow four internal control principles. These four principles are establishing responsibility, segregation of duties, using physical, mechanical, and electronic controls, and independent internal verification, It is impossible for one person to make sure all areas of the business are perfect. In order to be the most efficient, companies need to assign the responsibility to certain employees. It makes it easier and more...
Words: 1046 - Pages: 5
...Running Header: Hardware Replacement Project Hardware Replacement Project Hardware Replacement Project The information technologies department is improving itself by creating the newest solution for customer relationship management (CRM). The hardware replacement project (HRP) for this extension includes five major variables. These variables are: time, costs, scope, quality, and risk. The issues that affect project risks need to be explained, and I can deliver ways to complete this project with the least amount of necessary risk. In my writing, I will show the best way to ready for and supervise the HRP. Project Management These are project management activities: task assignment, progress reports, risk assessment, work organization, action directions, planning work, examining the consequences, anticipating the necessary resources to finish the work, supervising project implementation, and gaining access to material and human resources. The hardware replacement project (HRP) is mostly affected by five variables. These variables are the following: quality, costs, time, scope, and risk (Lauden and Lauden, 2009). Quality Quality is deciding the results after the project has been finished, more importantly how happy the company is with it. If the final results assist in improving performance and decision-making, it is clear that the information systems project is quality made. When the system is installed...
Words: 1068 - Pages: 5
...Hardware Implementation Replacing hardware at any organization, regardless of the size of said organization, can be an overwhelming task if one goes into it unprepared. When replacing the hardware, one must have a complete and thorough understanding of the issue. The issue may need to be fully investigated so more members of the organization have a better understanding of the problem. Coming up with and evaluating alternatives then possibly selecting the best option would come next. The final stage of implementing a hardware replacement would involve replacing a system, testing it, introducing the new system to the organization, and refining the overall process over time. One also needs to look at the five major variables of project management - scope, time, cost, quality, and risk involved in the process. The five major variables of project management need to be evaluated and applied to this particular situation. First of those variables we will look at is the scope of the project. Scope is what work is or is not included in a project. An example of this is given in the textbook. The scope of a project for a new order processing system might include new modules for inputting orders and transmitting them to production and accounting but not any changes to related accounts receivable, manufacturing, distribution, or inventory control systems. In a hardware replacement project, this could include what systems are being changed out with new hardware but retaining existing software...
Words: 1654 - Pages: 7
...FINC5000 Homework Assignment for Week 8: Click Link Below To Buy: http://hwcampus.com/shop/finc5000-homework-assignment-for-week-8/ For Week 8, please turn in the answers to the following questions: 1. The FINC 5000 Associates Corporation (FAC) has begun selling a new product and they want you to help them with next year’s pro forma financial statements. Using the worksheet below, complete the company’s forecast. Assumptions: To begin with, FAC is sure sales will grow 20% next year. Assume that is true. Then assume that COGS, Current Assets, and Current Liabilities all vary directly with Sales (that means if sales grows a certain percentage, then the account in question will grow by that same percentage). Assume that fixed expenses will remain unchanged and that $1500 worth of new Fixed Assets will be obtained next year. Lastly, the current dividend policy will be continued next year. FINC 5000 Associates Corporation Financial Forecast Estimated This year for next year Sales $10,000 ________ COGS 4,000 ________ Gross Profit 6,000 ________ Fixed Expenses 3,000 ________ Before Tax Profit 3,000 ________ Tax @ 33.3333% 1,000 ________ Net Profit $2,000 ________ Dividends $0 ________ Current Assets $25,000 ________ Net Fixed Assets 15,000 ________ Total Assets $40,000 ________ Current Liabilities $17,000 ________ Long term debt 3,000 ________ Common Stock 7,000 ________ Retained Earnings 13,000 ________ Total Liabs & Eq $40,000 ________ (AFN) = ________ ...
Words: 417 - Pages: 2
...FINC5000 Homework Assignment for Week 8: Click Link Below To Buy: http://hwcampus.com/shop/finc5000-homework-assignment-for-week-8/ For Week 8, please turn in the answers to the following questions: 1. The FINC 5000 Associates Corporation (FAC) has begun selling a new product and they want you to help them with next year’s pro forma financial statements. Using the worksheet below, complete the company’s forecast. Assumptions: To begin with, FAC is sure sales will grow 20% next year. Assume that is true. Then assume that COGS, Current Assets, and Current Liabilities all vary directly with Sales (that means if sales grows a certain percentage, then the account in question will grow by that same percentage). Assume that fixed expenses will remain unchanged and that $1500 worth of new Fixed Assets will be obtained next year. Lastly, the current dividend policy will be continued next year. FINC 5000 Associates Corporation Financial Forecast Estimated This year for next year Sales $10,000 ________ COGS 4,000 ________ Gross Profit 6,000 ________ Fixed Expenses 3,000 ________ Before Tax Profit 3,000 ________ Tax @ 33.3333% 1,000 ________ Net Profit $2,000 ________ Dividends $0 ________ Current Assets $25,000 ________ Net Fixed Assets 15,000 ________ Total Assets $40,000 ________ Current Liabilities $17,000 ________ Long term debt 3,000 ________ Common Stock 7,000 ________ Retained Earnings 13,000 ________ Total Liabs & Eq $40,000 ________ (AFN) = ________ ...
Words: 417 - Pages: 2