The world has been rapidly transforming due to the changes in technology, innovations, and the…

The world has been rapidly transforming due to the changes in technology, innovations, and the reduction of trade barriers into and out of countries which have permitted globalization. Due to globalization human resource management has been forced to take a more international approach, and has demonstrated that a more effective management of human resources internationally is imperative for the success of companies in international business (Shen). Therefore international organizations need to understand the roll that plays the international human resource management (IHRM) department, and the importance of adopting an effective recruiting, selecting, and training strategies that will enable the company to select the right talent for the right places. IHRM plays a very important and challenging roll in the international setting of organizations because “they must develop practices which will maintain congruence with the overall strategic plan of their respective multinational corporations, while balancing the economic, social, political, and legal constraints of the host countries” (Caligiuri).

Companies understand that the only way to develop strong and successful global leaders, which are keys to competitive advantage, is through an IHRM department that has a well develop competitive strategy in place. Multinational Corporations (MNCs) like Unilever and Huawei Technologies Co., a Chinese networking and telecommunications supplier, have understood the importance of a well develop IHRM department and have implemented strategies that are aligned with a global approach that support the business operation worldwide (Gartsdie). Based on Heenan and Perlmutter model there are four competitive strategies as well as different training alternatives for global assignees that MNCs can use to develop a successful IHRM approach. The recruitment and selection (staffing) policies which MNCs implement for their foreign subsidiaries will vary greatly for every company, and should be determine accordingly with the IHRM approach the organization is pursuing (Ball). MNCs can be divided in four types based on their management approach and corporate philosophy.

The first approach a MNC may consider is the ethnocentric approach which is “characterized by low pressures for cost reduction and low pressures for local responsiveness” (Ball). Ethnocentric MNCs are not willing to give up the control over foreign subsidiaries, and prefer to place expatriates employees belonging to the home country of the firm, in all key management positions abroad. IHRMs departments that adopt this approach believe that expatriates are more capable than employees of the host country, and they expect that their expatriate managers transfer headquarters’ culture and philosophy to the host nationals (Caligiuri). This approach is normally used by MNCs with primarily international strategic orientations in the early stages of globalization. The advantage of an ethnocentric approach is that it expands the experience of expatriates and prepares them for high level management positions who execute strategic decisions from headquarters.

Many expatriates adapt, learn the language, and perform effectively within the host country (Ball). However data suggest that there is a high turnover rate among expatriates because many of them do not have the special set of skills, characteristics, and abilities (e.g. tolerance of ambiguity, adjust quickly, empathy, actively manage social contacts) that are required to be successful in such position (Caligiuri). Because of the previous statement it is imperative that MNCs understand that facilitating proper training and development to the expatriate is a very important part of the IHRM department because it has a major impact on the effectiveness of the expatriate manager and “research has shown that cross-cultural training is an effective intervention to prevent expatriate failures” (Deller). However MNCs today face a big problem because studies show that only fifty percent of all expatriates receive adequate training (Deller). Another very important aspect to the IHRM department needs to consider when selecting the right candidate under this approach is to keep in mind the impact in the family of the expatriate.

The family’s willingness and ability to adjust is of crucial importance for the assignee’s employer and it needs to be address during the staffing process as well. Another disadvantage for this approach is that is more costly for the corporation because it has to offer more incentives to the expatriate (Deller). In the selection process it is the responsibility of the IHRM department to evaluate the efficiency and cross-cultural proficiency of the candidates to ensure the success of this approach. The polycentric staffing policy is a second approach that can be implemented by IHRM departments of MNCs. Under this approach the human resource department will look for host country nationals (HNC) to manage subsidiaries in their own country with some coordination form headquarters (Ball).

With this approach IHRM departments do not need to worry about looking for certain skills or characteristics for an international setting because the candidates are employed at the subsidiary level and they do not have language and culture barriers, labor turnover reduces, productivity increase, there are ideal information of industry, legal and political configuration, and the first cost of employing them is less expensive. Also using this approach makes the subsidiary looks less foreign (Caligiuri). However the problem with hiring HCNs is that they are not familiar with the home country of the international company and with its corporate culture, policies, and practices (Ball). The underlying crisis in communication and control between the headquarters and the subsidiary due to language barriers, conflicting national loyalties and differences in personal values may create an inconsistency in the strategic management process that will result in the subsidiary operating as a separate unit. Home country national’s lack of exposure to international assignments and lack of career mobility among HCNs are also some disadvantages of this approach and ultimately will affect the competitive advantage of the MNC (Padala).

According to the article of Jie Shein, “HCNs are included in management development schemes only at the subsidiary level and HCN managers are rarely promoted to senior management positions” (663). When staffing under this approach IHRM departments can choose from hiring HCNs in the home country or HCNs in the host country. Many MNCs have experienced difficulties in hiring high caliber of HCNs managers because of the lack of long-term IHRM planning and training and ineffective international management development (Shen). When the polycentric staffing approach is not adequate the regiocentric staffing approach might be a better option. The regiocentric staffing approach can be used for companies with a regional strategic approach. In this approach employees are selected for key positions within the region the subsidiary is operating, employing a variety of HCNs and third country nationals, TCNs (Ball).

From this perspective the communication and integration systems must be highly sophisticated for headquarters to maintain control over the regions however the host national are given the opportunity to manage their own subsidiaries. The likelihood of HNCs career advancement is greater within the region, but still limited in headquarters (Caligiuri). The training and development for this approach are the same as with the polycentric staffing approach. One of the biggest advantages of this approach is that it serves as a bridge for MNCs to gradually move to a geocentric staffing approach. The geocentric staffing approach is used in companies with a transnational strategic orientation. This staffing approach seeks the best people for key jobs throughout the organization, regardless of nationality, selecting the best person for the job, irrespective of nationality is most consistent with the underlying philosophy of a global corporation (Padala).

This approach is ideal because the human resource strategy will be the same across all subsidiaries, using the best practices from wherever they might be found across the MNC worldwide networking of operations (Ball). However one of the drawbacks of this approach is that it can be expensive to implement because of increased training, compensations packages, and relocations costs, and it could require longer lead time (Padala). IHRM staffing approaches are very important but training and development also play a very important role in the international setting. International training and development is one of IHRM’s most crucial activities. While it is true that MNCs recognize the significance of international training and development for their employees there is knowledge that this corporation’s training strategies are weak and not effective.

Current researches show that today the majority of companies have ineffective training and management policies that have resulted in frequently employee failure (Shen). In order to succeed in the global arena MNCs need to implement an effective international training and development program for expatriates, HCNs, and TCNs. Globalization has definitely created a very competitive business market in which international human resource management plays a crucial role for the success on multinational corporations. It is imperative that corporation carefully analyze every staffing approach available and implement the one that will help them select the right candidates for the right position, and provide the candidates with the appropriate training and development in order to create a competitive advantage.

Works Cited

Ball, A. Don, et al. International Business: The Challenge of Global Competition. 13th. New York: McGraw-Hill. Print. Caligiuri, Paula M., Linda K. Stroh. Multinational corporation strategies and international human resources practices: bringing IHRM to the bottom line. The International
Journal of Human Resource Management 6:3 September 1995. P.494-498. Deller, Juergen. International Human Resource Management And the Formation of Cross-Cultural Competence. Institute of Business Psychology, University of Lueneburg, Germany. International Management Review. Vol.2 No. 3. 2006. Gartside, David, Griccioli, Stefano, and Rustin Richburg. Different stokes: How to manage a global workforce. Issue No.2. 2011. Outlook. Accenture. . Padala, Shanmukha Rao Dr.; Dr. N.V.S. Suryanarayana. Approaches to International Human Resource Management. September 11, 2012. Articlebase.com. .

Shen, Jie. International training and management development: theory and reality. Journal of Management Development. Vol 24 No. 7, 2005. November 2, 2012.

write a 1500 2000 words construction report including the parts that need to be calculated able to read architectural drawings familiar with the construction field

Annual Loose Factor(ALF)

1.You have been given a set of house plans and must prove compliance with Building Code clause H1: Energy Efficiency using Verification Methods (VM). VM requires use of calculation methods using recognized analytical methods and models.

2.reference the marketing standards

3.Able to read architectural drawings, familiar with the construction field

Assessment Description You are to collate a business portfolio for your chosen hospitality or…

Assessment Description

You are to collate a business portfolio for your chosen hospitality or tourism business. You are not able to use the business from assessment 2. Your portfolio should include coverage of all elements of the business and must include a future Integrated Marketing Campaign and a new or innovative idea for your business. A portfolio must include written commentary, visuals, graphics and figures and copies of current materials for each area of the business. It needs to be orderly and include a table of contents. A portfolio should also be creative and visually pleasing.

In preparing your business portfolio, you must answer the following points:

• Include an introductory summary of the chosen sector, chosen business and a description of its operation.

• Current business operation: Offer at least a one-page written commentary for all the elements of the business including product, location and distribution, pricing models, customer segments, branding and positioning and current promotion and marketing materials. Include at least one page of visuals and materials for each of the areas. These visuals can include figures, tables, photos, marketing materials, maps and more.

• Recommended future campaign: Offer an Integrated Marketing Campaign this should include traditional media, print, digital plans and examples, website, social content, blogs and /or email marketing. This section of the portfolio will present your marketing communication and advertising approach to your business for the future.

• Recommended new or innovative idea: This may be a product launch, upgrade, line extension, new advertising avenue, process improvement or new customer channel. This part of your portfolio will present your ideas and your approach to implementing them in the future.

You are required to use at least 8 sources of information that are referenced in accordance with Kaplan Harvard Referencing Guide. These may include corporate websites, government publications, industry reports, census data, and journal articles.

Your search for marys teacher told the students to write 7 2/3 as an equivalent (improper) fraction Mary said the…

Your search for marys teacher told the students to write 7 2/3 as an equivalent (improper) fraction Mary said the answer was 29/4 marys friend said the answer was 71/4 who was correct explain your answer using pic

Economics for Business Essay Assignment – This group assignment will be assessed on the basis of the

Economics for Business Essay Assignment –

This group assignment will be assessed on the basis of the following criteria:

The current research on the topic

Analysis of the topic and the application

Student's showing their understanding and current debate by different governments, economists and the industry.

Choose any ONE topic out of the following list:

1. Industry reforms in Tourism, Meat and Livestock, Agriculture and hospitality in Australia. Choose any one industry out of these and discuss the reforms in that industry.

2. GDP and Economic growth in Australia last 5 years.

3. Unemployment during last 5 years and its effect on Australian economy and government policy towards reducing unemployment.

4. Fiscal Policy of Current Australian Government.

5. NBN policy of Australian government and its issues.

Following is the structure of the essay:

Introduction – 300 words

Body – 2000 words discussing and analyzing the research and the application

Conclusion – 200 words.

1. Explain GDP (200 words)

2. Components of GDP & where Australia has largest areas (400 words)

3. Is it increasing or decreasing? (300 words)

4. What is economic growth? (300 words)

5. What is Australian economy growth? (500 words)

6. What are the government industry GDP/economic forecast or prediction for Australia? Why? (500 words)

7. Conclusion – (300 words)

8. Current Research 2017 onwards.

i need the method and results section written

ASSIGNMENT:

Complete the following assignment. Please remember to use APA formatting.

  1. Using the topic of your research project, fully and clearly develop your Methods and Results sections. You will need to explain how the secondary data was collected (ICPSR and other sites will provide you with a description, but you must put what they said in your own words; copying and pasting is plagiarism). Make sure to explain how they assessed the variables (i.e., the survey items used for your variables). You will also need to analyze the relevant data in that particular dataset. Make sure to explain any setup you did for the dataset (this includes Cronbach alphas for any operational definitions that used more than one survey item). Be sure to identify the statistical analysis you used, as well as provide information about descriptive statistics. Eventually, you will want a table or figure that provides this information; it may be a good idea to make one now so you get feedback on it before submitting your final paper.

Attached will be my introduction, conceptual model, and references

The title of my study is The effects of African Americans attending an HBCU.

I have one raw data set of African Americans attending an HBCU but will it to be run through SPSS and compared to the findings of this Articles

So paper will be a rough comparison of the expected results of the two.

intro to jazz music

The song: Kid Charlemagne by Steely Dan (Live) (4:50)

You can hear it on youtube at:

Format: One page typewritten, double-spaced. Please use a 12pt font.

Please place your name – LA#4 – today’s date (on the upper left hand corner of the paper). Do not include the name of the song anywhere in the header or above the body of the paper.

Example: John or Mary Student – LA#4 – 04/23/20 – all on one line please!

Listening assignments are opinion papers. You will point out several objective points in the music, i.e. tonal color, dynamics, texture, etc., describe them, and then give your detailed (subjective) opinions of them.

Kid Charlemagne consists of male and female vocals, electric guitars, bass guitar, keyboards (pianos) and drums.

Specific questions to answer and topics to cover for Kid Charlemagne:

  1. Which instruments do you hear during the song’s intro (before the vocal enters)?
  2. Is the overall texture thin or thick during the intro? Why?
  3. Which instruments keep the basic tempo or beat of the song?
  4. Would you say the tempo or pulse is slow, medium or fast?
  5. What is the mood of the song? Why? Do you like the mood? Why or why not?
  6. Do the dynamics change in the song? Why or why not? If so, where in the song?
  7. Which instruments and/or voices create the song’s tonal color? Is is a good blend? Why?
  8. The overall texture changes from beginning to end? Where and why?
  9. Do you like the lead singer’s voice? Why or why not?
  10. Do the male and female vocalists sing at the same time?
  11. Which instruments make the song sound like jazz Which instruments make the song sound like rock or funk?
  12. How does the song end? Which instruments or voices you hear? Does this work in your opinion?
  13. Would you listen to this song again after completing this assignment? Why?

Please note: Listening Assignments are not research papers. Please do not include any of the following:

-biographies of the musicians

-how successful the musicians are or how many records they sold

-a history of the song and/or the musicians

-any comparisons to any other song even if it is by the same artist

Final points: Please listen to the song several times and take notes during each performance. For example, listen once for texture, then again for dynamics, etc.

Interpreting Financial Results

Resource:  Financial Statements for the company (3M)

 

Review the assigned company’s financial statements from the past three years.

 

Calculate the financial ratios for the assigned company’s financial statements, and then interpret those results against company historical data as well as industry benchmarks: 

 

  • Compare the financial ratios with each of the preceding three (3) years (e.g. 2014 with 2013; 2013 with 2012; and 2012 with 2011).
  • Compare the calculated financial ratios against the industry benchmarks for the industry of your assigned company.

 

Write a 500 to 750 word summary of your analysis.

 

Show financial calculations where appropriate.

write a 10 page report on mobile application threat modeling

INTRO

Threat modeling begins with a clear understanding of the system in question. There are several areas to consider when trying to understand threats to an application. The areas of concern include the mobile application structure, the data, identifying threat agents and methods of attack, and controls to prevent attacks. The threat model should be created with an outline or checklist of items that need to be documented, reviewed, and discussed when developing a mobile application.

In this project, you will create a threat model. There are seven steps that will lead you through this project, beginning with the scenario as it might occur in the workplace, and continuing with Step 1: “Describe Your Mobile Application Architecture.” Most steps in this project should take no more than two hours to complete, and the project as a whole should take no more than two weeks to complete.

The following are the deliverables for this project:

Deliverables

  • Threat Model Report: An eight- to 10-page double-spaced Word document with citations in APA format. The report should include your findings and any recommendations for mitigating the threats found. The page count does not include figures, diagrams, tables, or citations.
  • Lab Report: A Word document sharing your lab experience along with screenshots.

Competencies

Your work will be evaluated using the competencies listed below.

  • 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
  • 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.
  • 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
  • 1.4: Tailor communications to the audience.
  • 2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
  • 2.2: Locate and access sufficient information to investigate the issue or problem.
  • 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
  • 6.3: Specify security solutions based on knowledge of principles, procedures, and tools of data management, such as modeling techniques, data backup, data recovery, data directories, data warehousing, data mining, data disposal, and data standardization processes.

Step 1: Describe Your Mobile Application Architecture

In your role as a cyber threat analyst, senior management has entrusted you to identify how a particular mobile application of your choosing conforms to mobile architecture standards. You are asked to:

  1. Describe device-specific features used by the application, wireless transmission protocols, data transmission media, interaction with hardware components, and other applications.
  2. Identify the needs and requirements for application security, computing security, and device management and security.
  3. Describe the operational environment and use cases.
  4. Identify the operating system security and enclave/computing environment security concerns, if there are any.

This can be fictional or modeled after a real-world application. This will be part of your final report. Click the following links and review the topics and their resources. These resources will guide you in completing this task:

Begin by first reviewing the OWASP Mobile Security Project Testing Guide.

Architecture Considerations

Although mobile applications vary in function, they can be described in general as follows:

  • wireless interfaces
  • transmission type
  • hardware interaction
  • interaction with on device applications/services
  • interaction with off device applications/services
  • encryption protocols
  • platforms

In Section 1 of your research report, you will focus your discussion on the security threats, vulnerabilities, and mitigations of the above considerations.

The following resources will continue to educate your management about mobile devices and mobile application security: mobile platform security, mobile protocols and security, mobile security vulnerabilities, and related technologies and their security. Related technologies can include the hardware and software needed to interoperate with mobile devices and mobile applications.

Include an overview of these topics in your report.

Use Mobile Application and Architecture Considerations to review the architectural considerations for mobile applications and architecture. Then, include those that are relevant to your mobile application in your report to senior management. Address the following questions:

  1. What is the design of the architecture (network infrastructure, web services, trust boundaries, third-party APIs, etc.)?
  2. What are the common hardware components?
  3. What are the authentication specifics?
  4. What should or shouldn’t the app do?

You will include this information in your report.

When you have completed the work for Section 1, describing the architecture for your app, move on to the next step, where you will define the requirements for the app.

Step 2: Define the Requirements for Your Mobile Application

In the previous step, you described your app’s architecture. In Step 2, you will define what purpose the mobile app serves from a business perspective and what data the app will store, transmit, and receive. Include a data flow diagram to showing exactly how data are handled and managed by the application. You can use fictional information or model it after a real-world application. Here are some questions to consider as you define your requirements:

  1. What is the business function of the app?
  2. What data does the application store/process? (provide data flow diagram)
    1. This diagram should outline network, device file system, and application data flows
    2. How are data transmitted between third-party APIs and app(s)?
    3. Will there be remote access and connectivity? Read this resource about mobile VPN security, and include any of these security issues in your report.
    4. Are there different data-handling requirements between different mobile platforms? (iOS/Android/Windows/J2ME)
    5. Does the app use cloud storage APIs (e.g., Dropbox, Google Drive, iCloud, Lookout) for device data backups?
    6. Does personal data intermingle with corporate data?
    7. Is there specific business logic built into the app to process data?
  3. What does the data give you (or an attacker) access to? Think about data at rest and data in motion as they relate to your app.
    1. Do stored credentials provide authentication?
    2. Do stored keys allow attackers to break crypto functions (data integrity)?
  4. Are third-party data being stored and/or transmitted?
    1. What are the privacy requirements of user data? Consider, for example, a unique device identifier (UDID) or geolocation being transmitted to a third party.
    2. Are there user privacy-specific regulatory requirements to meet?
  5. How do other data on the device affect the app? Consider, for example, authentication credentials shared between apps.
  6. Compare between jailbroken (i.e., a device with hacked or bypassed digital rights software) and nonjailbroken devices.
    1. How do the differences affect app data? This can also relate to threat agent identification.

In this step, you defined the app’s requirements. Move to the next step, where you will identify any threats to the app’s operation.

Step 3: Identify Threats and Threat Agents

Now that you have identified the mobile app’s requirements, you will define its threats.

In Section 3 of the report, you will:

  1. Identify possible threats to the mobile application
    1. Identify the threat agents
  2. Outline the process for defining what threats apply to your mobile application

Review this threat agent identification example resource.

Review this list of threat agents.

After you have identified threats and threat agents, move to the next step, where you will consider the ways an attacker might reach your app’s data.


Step 4: Identify Methods of Attack

In the previous step, you identified threat agents. In this step and in Section 4 of the report, you will identify different methods an attacker can use to reach the data. These data can be sensitive information to the device or something sensitive to the app itself.

Read these resources on cyberattacks.

Provide senior management an understanding of the possible methods of attack of your app.

When you have identified the attack methods, move to the next step, where you will analyze threats to your app.

Step 6: Consider Controls

You have identified the methods of attack, and now you will discuss the controls to prevent attacks. Consider the following questions:

Note: Not all of the following may apply. You will address only the areas that apply to the application you have chosen.

  • What are the controls to prevent an attack? Conduct independent research and then define these controls by platform (e.g., Apple iOS, Android, Windows Mobile).
  • What are the controls to detect an attack? Define these controls by platform.
  • What are the controls to mitigate/minimize impact of an attack? Define these controls by platform.
  • What are the privacy controls (i.e., controls to protect users’ private information)? An example of this would be a security prompt for users to access an address book or geolocation.
  • Create a mapping of controls to each specific method of attack (defined in the previous step)
    • Create a level of assurance framework based on controls implemented. This would be subjective to a certain point, but it would be useful in guiding organizations that want to achieve a certain level of risk management based on the threats and vulnerabilities.

In the next step, you will complete work on the threat model.

Step 7: Complete Your Threat Model

You have just discussed the controls to prevent attacks. You have completed all the components of your report. Now, compile your findings and produce your Threat Model Report.

The following are the deliverables for this project:

Deliverables

  • Threat Model Report: An eight- to 10-page double-spaced Word document with citations in APA format. The report should include your findings and any recommendations for mitigating the threats found. The page count does not include figures, diagrams, tables, or citations.
  • Lab Report: A Word document sharing your lab experience along with screenshots.

Submit your Threat Model Report to the Assignments folder.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

  • 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
  • 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.
  • 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
  • 1.4: Tailor communications to the audience.
  • 2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
  • 2.2: Locate and access sufficient information to investigate the issue or problem.
  • 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
  • 6.3: Specify security solutions based on knowledge of principles, procedures, and tools of data management, such as modeling techniques, data backup, data recovery, data directories, data warehousing, data mining, data disposal, and data standardization processes.

history north american project grid

complete the grid proided