Now here’s the important question: Does this advertising motivate you to follow-up for more information to possibly buy the product? Explain.

Part 1: Out-of-home advertising

Take a picture of the best example of out-of-home advertising you can find in your area and attach it. What makes it effective? Any improvements you would suggest? Think about solid advertising principles you’ve learned this term & incorporate relevant ones in your post.

Now here’s the important question: Does this advertising motivate you to follow-up for more information to possibly buy the product? Explain.

Identify an executive order that a U.S. president has issued in the past 2 years. Discuss why you think this was or was not a good use of presidential power. Did the president first try to get Congress to pass the order as a law? Or was it in response to an emergency or national crisis?

 

  • Identify an executive order that a U.S. president has issued in the past 2 years. Discuss why you think this was or was not a good use of presidential power. Did the president first try to get Congress to pass the order as a law? Or was it in response to an emergency or national crisis?

Do you see value in the peer review process? Between the New England Journal of Medicine, your local newspaper, and a television news report, which do you believe is a more credible source? Why?

Do you see value in the peer review process? Between the New England Journal of Medicine, your local newspaper, and a television news report, which do you believe is a more credible source? Why? Explain your method of evaluation in determining if a source is reliable.

The body of your initial post should be at least 250 words in length. Support your claims with examples from this week’s required material(s) and/or other scholarly resources, and properly cite any references.

 

You are the lead investigator of a small agency, which means your forensic lab is limited. You are called to a report of a decomposed body. Your scene is a decaying body lying in the shrub along a busy freeway. What are your steps in securing the scene and evidence? What steps will you take to correctly process this scene? Include and specifically address the following:

  • How to thoroughly record a crime scene including searching the scene
  • Packaging physical evidence
  • Maintaining proper chain of custody

In your opinion, will this case be easy to solve? Why or why not?

 

You are the lead investigator of a small agency, which means your forensic lab is limited. You are called to a report of a decomposed body. Your scene is a decaying body lying in the shrub along a busy freeway. What are your steps in securing the scene and evidence?

Do you see value in the peer review process? Between the New England Journal of Medicine, your local newspaper, and a television news report, which do you believe is a more credible source? Why? Explain your method of evaluation in determining if a source is reliable.

The body of your initial post should be at least 250 words in length. Support your claims with examples from this week’s required material(s) and/or other scholarly resources, and properly cite any references.

 

You are the lead investigator of a small agency, which means your forensic lab is limited. You are called to a report of a decomposed body. Your scene is a decaying body lying in the shrub along a busy freeway. What are your steps in securing the scene and evidence? What steps will you take to correctly process this scene? Include and specifically address the following:

  • How to thoroughly record a crime scene including searching the scene
  • Packaging physical evidence
  • Maintaining proper chain of custody

In your opinion, will this case be easy to solve? Why or why not

In this assignment, you will explore how the organization and policitial environment of an agency or departments can impact the issue of the Patriot Act.

In this assignment, you will explore how the organization and policitial environment of an agency or departments can impact the issue of the Patriot Act.

Using the Patriot Act issue, write a three to four (3-4) page paper in which you respond to the following questions:

  • Examine the organization of the agency in which the issue resides. Describe the structure and departments within the agency and the manner in which the departments interact with each other.
  • Given the description you provided in Question 1, describe the primary ways the human resource management part of the organizational structure positively or negatively impacts the Patriot Act issue.
  • Given the description you provided in Question 1, describe the primary ways the budgeting part of the organizational structure positively or negatively impacts the Patriot Act issue.
  • Given the description you provided in Question 1, analyze the political environment and explain (2) challenges that political responsiveness may present for management.
  • Include at least four (4) peer-reviewed references (no more than five [5] years old) from material outside the textbook. Note: Appropriate peer-reviewed references include scholarly articles and governmental Websites. Wikipedia, other wikis, and any other Websites ending in anything other than “.gov” do not qualify as academic resources.

Assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA format.
  • The cover page and the reference page are not included in the required assignment page length.

Managerial Marketing – Setting Goals- Powerpoint Assignment

Managerial Marketing – Setting Goals- Powerpoint Assignment

10-15 PowerPoint slides (each slide should include 200-250 words each in the notes section) – 3 -5 References APA Format

Based on your discussions with Michelle, you have developed a clear picture of the environmental issues that will affect the initial release of the new product. As you compile your notes, the phone rings.

“Hello?”
“Hi. This is Michelle. I want to touch base with you about your presentation to the board next week. Do you have any questions about the upcoming meeting?”
“Thanks for calling,” you say. “You have good timing. I was just reviewing my notes and working on my PowerPoint presentation. I think I’ve covered the areas we discussed at our last meeting. Do you have something else that you want me to include?”
“Oh, good,” says Michelle. “Yes, I’d like you to share 3 or 4 goals for the marketing project, too. Make sure these goals are specific as possible. You might want to lead with the goals, but I’ll leave that up to you. Naturally you’ll need to do some research to determine the types of goals that are relevant for a new product project like this. Be as specific as you can when outlining realistic expectations.
“Okay,” you say as you jot down more notes. “Anything else?”
“Just be sure to include your thoughts about whether we should develop a product that can be marketed world-wide. You know that is one of their main concerns. You’ll have about 30 minutes for your presentation. ”
“Will do. Thanks for the information. I think about 10–15 slides should be about right for a 30-minute presentation.”

The students should list and explain 3–4 goals that a company in this situation should set for itself. The explanations should be 2–3 sentences each, and they should include citations from the text and other sources. Each goal should be as specific as possible; for example, the goals might include—among other things—the following items:

  • Sales in dollars or units
  • Market share
  • Customer awareness
  • Profit
  • Return on investment
  • Customer satisfaction
  • 3 hours ago

Step 1: Conduct a Policy Gap Analysis As you begin Step 1 of your system security report on cybersecurity for mergers and acquisitions, keep in mind that the networks of companies going through an M&A can be subject to cyberattack. As you work through this step and the others, keep these questions in mind:

Businesses involved in mergers and acquisitions must exercise due diligence in ensuring that the technology environment of the future organization is robust and adequately protects their information assets and intellectual property.. Such an effort requires time and open sharing to understand the physical locations, computing environment, and any gaps to address. Lack of information sharing can lead to a problematic systems integration and hamper the building of a cohesive enterprise security posture for the merged organization.

Often the urgency of companies undergoing a merger and acquisition (M&A) impedes comprehensive due diligence, especially in cybersecurity. This creates greater challenges for the cybersecurity engineering architect, who typically leads the cybersecurity assessment effort and creates the roadmap for the new enterprise security solution for the future organization. However, the business interest and urgency in completing the merger can also represent an opportunity for CISOs to leverage additional resources and executive attention on strategic security matters.

In this project, you will create a report on system security issues during an M&A. The details of your report, which will also include an executive briefing and summary, can be found in the final step of the project.

Step 1: Conduct a Policy Gap Analysis

As you begin Step 1 of your system security report on cybersecurity for mergers and acquisitions, keep in mind that the networks of companies going through an M&A can be subject to cyberattack. As you work through this step and the others, keep these questions in mind:

  • Are      companies going through an M&A prone to more attacks or more focused      attacks?
  • If so,      what is the appropriate course of action?
  • Should      the M&A activities be kept confidential?

Now, look at the existing security policies in regard to the acquisition of the media streaming company. You have to explain to the executives that before any systems are integrated, their security policies will need to be reviewed.

Conduct a policy gap analysis to ensure the target company’s security policies follow relevant industry standards as well as local, state, and national laws and regulations. In other words, you need to make sure the new company will not inherit any statutory or regulatory noncompliance from either of the two original companies.  This step would also identify what, if any, laws and regulations the target company is subject to. If those are different from the laws and regulations the acquiring company is subject to, then this document should answer the following questions:

  • How      would you identify the differences?
  • How      would you learn about the relevant laws and regulations?
  • How      would you ensure compliance with those laws and regulations?

The streaming company that is being acquired has a current customer base of 150,000 users, who on average pay $14.99 in monthly fees. Based on the overall income, use PCI Standards DSS 12 requirements, and the PCI DSS Quick Reference Guide to identify a secure strategy, and operating system protections to protect the credit card data.

Select at least two appropriate requirements from the PCI Standards DSS 12 set of requirements and explain how the controls should be implemented, how they will change the current network, and any costs associated with implementing the change.

In the next step, you will review the streaming protocols that the companies are using.

Step 2: Review Protocols for Streaming Services

After reviewing the policies from the company and the policy gap analysis, the M&A leader asks you about the protocols used by the streaming company. He wants to know if the protocols used would affect the current state of cybersecurity within the current company environment. For this section, review the protocols, explain how they work along with any known vulnerabilities, and how to secure the company from cyberattacks. Start with researching the commonly known streaming protocols and the vulnerabilities of those protocols. Some examples are the Real-Time Streaming Protocol (RTSP), Real-Time Transport Protocol (RTP) and the Real-Time Transport Control Protocol (RTCP).

Additionally, the leadership wants to know if any vulnerabilities identified would or could lead to a no-go on the M&A.

In other words:

  1. You      need to identify what streaming the companies are doing and the specific      technology they are leveraging.
  2. What      are the technical vulnerabilities associated with the protocols involved?
  3. Have      those been mitigated? And to what extent (i.e., has the risk been reduced      to zero, reduced somewhat, shifted to a third party, etc.)?
  4. What      residual risk to the target company’s assets and IP remain?
  5. Would      those risks extend to the current (takeover) company after the merger?
    a. Would that be bad enough to cancel the M&A?
  6. If the      response to #5 is yes, then, what should the target company do to further      mitigate the risk? How should the takeover company mitigate the risk?
  7. What      are the costs associated to the target company (implementing the      appropriate mitigation)? If the takeover firm has to take additional      measures, identify those costs as well.

After assessing and reviewing the streaming protocols, move to the next step, where you will assess the infrastructure of the merged network.

Step 3: Assess the Merged Network Infrastructure

You’ve just reviewed the streaming services of the companies, and now you will assess the infrastructure of the new network. The networks of the two companies could be configured differently, or they could use the same hardware and software, or completely different hardware and software.

The purpose of this section is to understand what tools the company is using, the benefits and shortcomings of those tools, and the gaps within the network. Explain what tactics, techniques, and procedures you would use to understand the network. You should identify firewalls, DMZ(s), other network systems, and the status of those devices.

When your assessment of the infrastructure is complete, move to the next step, where you will assess any existing policies for wireless and bring your own device (BYOD) within the companies.

Step 4: Review the Wireless and BYOD Policies

Within Project 2, you learned about and discussed wireless networks. An M&A provides an opportunity for both companies to review their wireless networks. Within your report, explain the media company’s current stance on wireless devices and BYOD. However, the company that is being acquired does not have a BYOD policy. Explain to the managers of the acquisition what needs to be done for the new company to meet the goals of the BYOD policy.

When the review of the wireless and BYOD policies is complete, move to the next step: developing a data protection plan.

Step 5: Develop a Data Protection Plan

You’ve completed the review of the wireless and BYOD policies. In this step, you will develop the recommendations portion of your report in which you will suggest additional mechanisms for data protection at different levels of the acquired company’s architecture.

Include the benefits, implementation activities required for protection and defense measures such as full disk encryption, BitLocker, and platform identity keys. You also want to convey to your leadership the importance of system integrity and an overall trusted computing base, environment, and support. Describe what this would entail and include Trusted Platform Module (TPM) components and drivers. How are these mechanisms employed in an authentication and authorization system? Include this in the report and whether the merging company has this.

In the next step, you will assess any risks with the supply chain of the acquired company.

Step 6: Review Supply Chain Risk

The data protection plan is ready. In this step, you will take a look at risks to the supply chain. Acquiring a new company also means inheriting the risks associated with its supply chain and those firm’s systems and technologies. Include supply chain risks and list the security measures in place to mitigate those risks. Use the NIST Special Publication 800-161 Supply Chain Risk Management Practices for Federal Information Systems and Organizations to explain the areas that need to be addressed.

After your supply chain review is complete, move to the next step, where you will create a vulnerability management program.

Step 7: Build a Vulnerability Management Program

After your supply chain review, you conduct an interview with the company’s current cybersecurity team about vulnerability management. The team members explain to you that they never scanned or had the time to build a vulnerability management program. So, you need to build one. Use NIST Special Publication 800-40 Guide to Enterprise Patch Management Technologies to develop a program to meet the missing need.

Explain to the managers how to implement this change, why it is needed, and any costs involved.

The next step is a key one that should not be overlooked — the need to educate users from both companies of the changes being made.

Step 8: Educate Users

You’ve completed your vulnerability management program, but it’s important to educate all the users of the network about the changes. During the process of acquiring a company, policies, processes, and other aspects are often updated. The last step in the process is to inform the users for the new and old company of the changes. Within your report, explain to the acquisition managers the requirements for training the workforce.

When you’ve completed this step, move to the final section of this project, in which you will prepare and submit your final report.

Step 9: Prepare and Submit Your Report, Executive Briefing, and Executive Summary

You’re ready now for the final step, in which you will compile and deliver the Cybersecurity for a Successful Acquisition report for the company leaders to enable them to understand the required cybersecurity strategy.

Again, keep in mind that companies undergoing an acquisition or merger are more prone to cyberattacks. The purpose of this paper is to analyze the security posture of both companies and to develop a plan to reduce the possibility of an attack.

The assignments for this project are as follows:

  1. Executive      briefing: This is a three- to five-slide visual presentation for business      executives and board members.
  2. Executive      summary: This is a one-page summary at the beginning of your report.
  3. Cybersecurity      System Security Report for Successful Acquisition: Your report should be a      minimum 12-page double-spaced Word document with citations in APA format.      The page count does not include figures, diagrams, tables or citations.

Submit all three components to the assignment folder.

Deliverables: Cybersecurity for a Successful Acquisition, Slides to Support Executive Briefing

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.

  • 1.1:      Organize document or presentation in a manner that promotes understanding      and meets the requirements of the assignment.
  • 1.2:      Develop coherent paragraphs or points to be internally unified and      function as part of the whole document or presentation.
  • 1.3:      Provide sufficient, correctly cited support that substantiates the      writer’s ideas.
  • 1.4:      Tailor communications to the audience.
  • 1.5:      Use sentence structure appropriate to the task, message and audience.
  • 1.6:      Follow conventions of Standard Written English.
  • 1.7:      Create neat and professional looking documents appropriate for the      project.
  • 1.8:      Create clear oral messages.
  • 2.1:      Identify and clearly explain the issue, question, or problem under      critical consideration.
  • 2.2:      Locate and access sufficient information to investigate the issue or      problem.
  • 2.3:      Evaluate the information in a logical and organized manner to determine      its value and relevance to the problem.
  • 2.4:      Consider and analyze information in context to the issue or problem.
  • 2.5:      Develop well-reasoned ideas, conclusions or decisions, checking them against      relevant criteria and benchmarks.
  • 5.9:      Manages and administers integrated methods, enabling the organization to      identify, capture, catalog, classify, retrieve, and share intellectual      capital and information content.
  • 7.3:      Knowledge of methods and tools used for risk management and mitigation of      risk.
  • 8.7:      Provide theoretical basis and practical assistance for all aspects of      digital investigation and the use of computer evidence in forensics and      law enforcement.

.Supply Chain Management in The Wall Street Journal Logistics Report

Supply Chain Management in The Wall Street Journal Logistics Report

Please READ the doc file first and write the min one-page assignment.

Find an article and write a synopsis of the article on a current topic using the emailed version of The Wall Street Journal Logistics Report. With this source you will need to click on the hyperlink within the article to view the original article for actual writer, title, and date.

To successfully complete this requirement, the student will include the following elements:

1. Include the article as included in the emailed version of The WSJ Logistics Report. The emailed version of The WSJ Logistics Report is the only acceptable source.

2. Write a brief synopsis of the corresponding The WSJ full article accessible through the hyperlink.

3. Explain how this event is supply chain related. Use specific supply chain terms. Also, support with outside sources for full points.

4. Give your thoughts about how it could be handled, resolved, possible implications, and/or possible solutions. Also, support with outside sources for full points.

5. List additional references properly cited within the paper.

When you use an outside source, it is to be cited and referenced using APA (Sixth edition) format.

Item will be graded only if it meets all of the following four requirements.

1. The actual paragraph regarding the article as found in the WSJ Logistics Report is included within the document.

2. Item is an event. For example, a general opinion piece is not acceptable.

3. Item is less than 28 days old at the time the assignment is due. Current event is due February 23, 2018. Source WSJ Logistics Report must be dated January 26, 2018 or after.

4. Item is properly cited within the article and referenced at the end. It is to include authors, month/day/year published, title, source publication. If from Internet, include the source address. All elements must be included.

I will upload two pdf files that explains further explains and clarifies each element of the current event.

GB550 Financial Management Final Project Rubric

GB550 Financial Management Final Project Rubric

Here is a Rubric for your final Paper. It should be at least 1500 words (5-7 pages), not counting titles, abstract, references, table of contents, charts, balance sheets and extensive quotes.

Select a publicly held company and analyze its capital-structure, applying the theories and principles found in Chapter 15 of the text.

You must cover topics 1-5. You must include an abstract, table of contents, references.

Organize your work under following headings. Include interior titles (and include sub-headings under #5 a-f)

1. Title Page

2. Abstract. – Complete yet concise, at least 200 words, the abstract should be at least 200 words for a detailed description. If you go well over 200 words, as long as it is good content and adds to the material, I have no issues and it will most likely improve the grade by showing extra effort. Research papers, theses and dissertations include an abstract—a short, concise summary of your research. The abstract should include the keywords of your research. An abstract generally emphasizes, objective, the methodology, the main findings and conclusions of the research study. Articulate the research problem, and objective of the research. Include Keywords. Indicate the methodology.

3. Table of Contents.a one page detail of the topics and subtopics. The more detailed the number of topic subheadings listed the more thought you have provided to this paper. A very brief outline will receive a deduction.

4. Business and Financial Risks: Business and financial risks related to capital-structure such as operating risks, leverage and debt risks. A company’s business risk is the risk of the firm’s assets when no debt is used. Business risk is the risk inherent in the company’s operations. Some of those factors are as follows: Sales risk – Sales risk is affected by demand for the company’s product as well as the price per unit of the product. Input-cost risk – Input-cost risk is the volatility of the inputs into a company’s product as well as the company’s ability to change pricing if input costs change.

5. Modigliani and Miller’s [MM] capital-structure theory.

6. Criticisms of the MM model and assumptions.

7. A preview of capital structure issues. Capital-structure evidence: Capital-structure evidence and implications and problems with other Capital Structure Theories.

8. Estimating Optimal Capital Structure:

Estimating your firm’s optimal capital-structure. A firm’s optimal capital structure is that mix of debt and equity that maximizes the stock price.

a. Discuss the following and relate it to the optimal structure:

b. Business risk. Business risk is the riskiness inherent in the firm’s operations if it uses no debt.

c. Tax position.

d. Need for financial flexibility.

e. Managerial conservativeness.

f. Growth opportunities.

9. Reference list: A minimum of four references are required, excluding the textbook. Sources should be from academic, scholarly reviewed journals. You can not use your textbook or any other non-scholarly material as a graded reference.

What is a scholarly publication or reference? It is generally a white paper, original research but most typically a Journal article. No, not the Wall Street Journal, that is a business publication.

An academic journal example includes: The Journal of Financial Planning, Journal of Portfolio Management, Journal of the American Medical Association, Journal of Accountancy, etc. You can find these scholarly and academic resources in the Kaplan Library. You may also find scholarly white papers through institutes such as Brookings Institute and Economic Policy Institute, among many.

Make sure you add a few sentences as to why each reference is specifically important to your paper. Describe your reference as in an annotated bibliography and discuss why it is important to your pape