Business Communication

Requirement:

You are a professional business consultant. Write the report called for in the Mountainside Industries case presented below. Please note carefully the task you are being assigned, and also the circumstances. You should not repeat or summarize the information given in the case description since the person you’re writing to obviously knows all about it already — in fact she’s the one who told it to you. Just focus on giving her advice about what to do now.

Note also that this is an external report — that is, you are not part of the firm but are an outside consultant who has been called in to help. Use the “to/from/subject/date” format. Also, you must not say “we should” or “our company should” or anything like that. You are an outsider, not part of the Mountainside Industries Co.

(Come up with multiple solutions like (hiring managers for each division, make budgeting, create transparency at work place, held frequent meetings) Be creative with your advice. 1 page, single space, follow the requirements carefully)

MGT422 Business Ethics Assign-2

No copy paste. matching ratio should not exceed 5%.

I want new text answer, not copied or rephrased.

Requirements:

Follow APA-style referencing. Your answers MUST include at least 2 outside references (other than the textbook)

Use Times New Roman (size 12, double-spaced) font.

Read the given article & answer the below questions:

Beside this research paper use other relevant material to support your answers.

Questions:

1– Why is the ability for employees to ‘blow the whistle’ important for the reputation of organizations? Consider this in relation to the case.

(2.5 points, words 150-200).

2– What aspects of the ministry’s culture made it more/less likely that staff concerns about Harrison

would be taken seriously? (2.5 points, words 150-200).

3– What actions would you take to develop a culture at the ministry that encourages and rewards

employees who speak up about inappropriate behavior. (2.5 points, words 150-200).

4. Based on your understanding of the reputation matrix, how do you describe the type of leadership exemplified in this case by Martin Matthews? Why? (2.5 points, words 150-200)

Presenting the Marketing Plan

500-600 words

Now that Michelle has all of the pieces of her marketing plan in place, the board is ready to see the final plan. She is apprehensive about this because the board needs to approve the plan for it to move forward. It is imperative that the plan addresses all of the marketing issues discussed to this point, and that it also includes a discussion of how MM will measure the success of the plan after it has been implemented.

Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Michelle is happy with how the plan is being put into place. The date and time for the final board meeting has been set when she calls you.

“How will we know if the new product launch is a success?” she asks. “How will we know if what you have suggested really worked? Since I started this company as an entrepreneur years ago, I feel like everything that happens here is my fault or my responsibility. Does that make sense?”
“You’ve been so supportive to me during this whole process,” you say. “Leave it to me. I’ll think about what you’ve said over the long weekend and I’ll be ready to sit down and discuss the details as I prepare the final draft of the plan.”

Based on your original goals and the plan you are putting into place, what will you tell Michelle?

  • What will you measure to determine whether or not your new product plan for MM is a success?
  • What about a contingency plan?
  • Do you need to make recommendations for MM if things do not go the way you hope and expect them to?

Art- single-spacing

Some questions you should answer in your paper are: 1). Was “Tilted Arc” a “work of art” or not? Why? Give reasons and specific examples. 2). Was the public justified in having “Tilted Arc”removed? Why or why not? Give specific reasons and examples. 3). Is a creation by an artist not considered “art” just because the public does not agree with it? Why or why not? 4). Does the definition of art lie at the feet of the creator (artist) or does the public have the right to decide what is art? Why or why not? 5). Does this sculpture fit in to your personal definition of art? 6). Does art have to be beautiful, skillful or convenient in order to be “art?” These are all questions I would like you to address in your writing for assignment #1.

Please be mindful of spelling, grammar and complete sentence and paragraph format. Respond in one and a half pages or longer of writing. No double-spacing or larger than 12 point type please.

The CSI Effect in an Actual Juror Sample

Discussion Board Assignment:

To complete this task, you will read over the following two articles:

Dante E. Mancini, “The “CSI Effect’ in an Actual Juror Sample: Why Crime Show Genre May Matter.”

Janne A. Holmgren and Judith Fordham, “The CSI Effect and the Canadian and the Australian Jury.”

To access the articles, please take the following steps:

  • click Content
  • select Class Resources
  • select eReserves
  • select the icon for eReserves in the middle of your page.
  • in the list of items that appears, locate the articles and download them.

.

After you find these two articles, please read them over and complete the following for each one:

  • list the source in APA format
  • list key terms in the article
  • describe the focus of the study
  • describe the methodology the author(s) used
  • summarize the study’s findings
  • write your reflections on the article itself. Comment on whether you found the study difficult to interpret, whether you understood the methodology, or other items that might be of interest to your fellow classmates.

This task will help you become more familiar with finding research studies on your topic, reading them over, gleaning the main points of them, and summarizing their findings. These skills will be helpful as you continue to research for WA#3.

Thanks

Evaluating and Integrating Sources. Complete the Assignment Below.

Take a look at this week’s New York Times Best Seller list (https://www.nytimes.com/books/best-sellers/hardcov…) of hardcover non-fiction. Identify which of these works are primary sources and which are secondary sources. Do a little “digging” and decide which works you would NOT want to use as a source for a college research paper. Explain why.

.

.

Put together the following information into a paragraph. Feel free to arrange the elements however you see them making the most sense and to check the sources to elaborate on or better understand the fact. Use the information from this lesson to embed each citation into your own writing remembering to introduce, clearly cite, and explain each fact. Pay attention to where quotations are used below and either paraphrase or maintain the quotation marks.

Topic: Vitamin D is a particularly important nutrient for children.

Fact 1: “Recent case reports highlight the resurgence of rickets in certain groups of breastfed infants. Infants residing in the North, irrespective of skin color, and dark-skinned African American infants residing anywhere in the United States are most vulnerable to nutritional rickets if they are exclusively breastfed past age 6 months without vitamin D supplementation.”

Rajakumar,Kumaravel , MD, and Stephen B. Thomas, PhD. “Reemerging Nutritional Rickets.” Archives of Pediatric and Adolescent Medicine 158.4 (2005): 335-341 https://jamanetwork.com/journals/jamapediatrics/fu…

Fact 2: In 2008, the American Academy of Pediatrics doubled the daily recommended intake of Vitamin D to 400 iu because of ongoing cases of rickets caused by Vitamin D deficiency and because “new evidence supports a potential role for vitamin D in maintaining innate immunity and preventing diseases such as diabetes and cancer.”

Wagner, Carol L. , Frank R. Greer, et. al. “Prevention of Rickets and Vitamin D Deficiency in Infants, Children, and Adolescents.” Pediatrics 122.5 (2008): 1142-1152. http://pediatrics.aappublications.org/content/122/…

Fact 3: . Millions of U.S. children have sub-optimal vitamin D levels.

Mansbach, Jonathan M., MDa, Adit A. Ginde, MD, MPHb, Carlos A. Camargo, Jr, MD, DrPHc. “Serum 25-HydroxyvitaminDLevels Among US Children Aged 1 to 11 Years: Do Children Need More VitaminD?” Pediatrics 124.5 (2009): 1404-1410. http://pediatrics.aappublications.org/content/124/…

Fact 4: Only 5% to 37% of infants meet the 2008 recommendation, with breastfed infants at the lower end of the range.

Perrine, Cria G., et. al. “Adherence to Vitamin D Recommendations Among US Infants.” Pediatrics 125.4 (2010): 627-632. http://pediatrics.aappublications.org/content/125/…

Need Help in Preparing the Project Details

Need Help in Preparing the Project Details,Please find attached details.

You work for an automobile industry. Your organization has initiated a project to upgrade the cars. The sponsor has appointed you as the Project Manager. For this project, one of the requirements is special electronic auto parts. Your organization has the capability to produce these auto parts. However, during the planning phase, some stakeholders suggest that the production of the auto parts can be outsourced. You feel that there is a risk associated with this; you decide to use the decision tree tool to figure out whether it is better to outsource this or do it yourself. After brainstorming with the team, you identify the following values and the risks associated.

Current and Emerging Technology

Subject: Current and Emerging Technology

Question: You’re working for a local coffee shop that offers free wireless access to customers. Your supervisor has asked you to create a flyer for patrons that warns them of the potential dangers of surfing the Internet in public places. Conduct research on the Internet about using public hotspots to access the Internet. Prepare a list of specific steps that customers can take to protect their data when surfing on publicly accessible networks.

Instructions:

Need Minimum 300 words

3 APA references

No Plagiarism please

Response 1: Need minimum 150 words

The Internet has become the public talk in our current world of technology. Everywhere in the world have internet which in one way or another is free to access. The definition of this internet is so simple. This is a worldwide computer network that is providing a diversity of information as well as communication facilities, consisting of the interconnected networks making use if the standardized communication procedures. According to Ginzinger (2002), there are very many places that people can access free WIFI and one being the local coffee shops and big restaurants. However, there are some challenges that are associated with using the public internet. In this discussion, I will talk about these challenges and finally give my advice to the user of the public internet in open places like a coffee shop.

First of all, the hacker takes advantages of the free WI-FI because that is when they exercise those hacking abilities. It is true that when someone is using free WI-FI, Then he or she will be able to send and receive emails. This aptitude to send and collect emails created a means for the cybercriminals to hand out spam as well as malware. Malware hiding in email attachments could wreak havoc to individual’s PC or possibly even create a backdoor for the attacker to penetrate the system. Through the emails, cybercriminals saw this as another chance to play on the human sentiment and entice victims into enlightening responsive information through just phishing the scams, (Herrmann 2011).

Secondly, public WI-FI can be slow sometimes. This is because it is being used by many peoples and some are doing important things with it like the purchase of items online. It will come a time when the buyer who is using public WI-FI pay twice especially when the network is slow. This is because he or she will click pay and the network will be slow and will not g through. The user will do this several time and he or she will finally pay more times.

Thirdly, Even if a lot of measures are put into practice to keep public Wi-Fi protected, hackers can generate fake hotspot with the assistance of Wi-Fi pineapple, a moveable router device. Unwary users will turn out to be simple targets to the cybercrime. Business espionage and stealing of the data can result in enormous losses, (Freeman, 2010).

Finally, I can advise that it is secure to log out all important details like the bank’s website on public Wi-Fi. The question is more complex than it seems. In hypothesis, it is actually safe since the encryption ensures the person who is using the public network actually connected to your bank’s website and no one can snoop. Hacker will be using the same mark address to hack and the user will finally end us getting scammed through public WI-FI.

References:

Ginzinger, D. G. (2002). Gene quantification using the real-time quantitative PCR: an emerging technology hits the mainstream. Experimental haematology, 30(6), 503-512.

Herrmann, J. M., Guillard, C., & Pichat, P. (2011). Heterogeneous photocatalysis: an emerging technology. Catalysis Today, 17(1-2), 7-20.

Freeman, C. (2010). (p. 34). Great Britain: Pinter Publishers. Journal of finance and technology

Instructions:

Need minimum 150 words

Response 2: Need minimum 150 words

The Internet has turned into people in general talk in our present universe of innovation. Wherever on the planet have web which somehow is allowed to get to. The meaning of this web is so straightforward. This is an overall PC arrange that is giving an assorted variety of data and in addition correspondence offices, comprising of the interconnected systems making use if the institutionalized correspondence methodology. There are a lot of spots that individuals can get to free WIFI and one being the neighborhood coffeehouses and enormous eateries. In any case, there are a few difficulties that are related with utilizing general society web. In this dialog, I will discuss these difficulties lastly give my recommendation to the client of people in general web in open spots like a coffeehouse. Above all else, the programmer takes points of interest of the free WI-FI in light of the fact that that is the point at which they practice those hacking capacities. The facts demonstrate that when somebody is utilizing free WI-FI, Then he or she will have the capacity to send and get messages. This inclination to send and gather messages made a methods for the cybercriminals to give out spam and additionally malware. Malware stowing away in email connections could wreak devastation to person’s PC or perhaps even make an indirect access for the aggressor to infiltrate the framework. Through the messages, cybercriminals considered this to be another opportunity to play on the human notion and tempt exploited people into edifying responsive data through simply phishing the tricks.Furthermore, open WI-FI can be moderate now and again. This is on account of it is being utilized by numerous people groups and some are doing essential things with it like the buy of things on the web. It will come a period when the purchaser who is utilizing open WI-FI pay twice particularly when the system is moderate. This is on the grounds that he or she will click pay and the system will be moderate and won’t g through. The client will do this few time and he or she will at long last pay more occasions. Thirdly, Even if a great deal of measures are tried to keep open Wi-Fi secured, programmers can produce counterfeit hotspot with the help of Wi-Fi pineapple, a moveable switch gadget. Unwary clients will end up being straightforward focuses to the cybercrime. Business undercover work and taking of the information can result in colossal misfortunes. At long last, I can exhort that it is secure to log out exceptionally essential points of interest like the bank’s site on open Wi-Fi. The inquiry is surprisingly perplexing. In speculation, it is really sheltered since the encryption guarantees the individual who is utilizing general society arrange really associated with your bank’s site and nobody can snoop. Programmer will utilize a similar check deliver to hack and the client will at long last end us getting defrauded through open WI-FI.

References:

https://www.theatlantic.com/technology/archive/201…

Herrmann, J. M., Guillard, C., & Pichat, P. (2011). Heterogeneous photocatalysis: an emerging technology. Catalysis Today, 17(1-2), 7-20.

Instructions:

Need minimum 150 words

1 page forum discussion

For this assignment, you can select one company from the links below.

Select an organization and identify and evaluate the components of its Strategic Plan (i.e., Vision, Mission, Values, Core Competencies, Goals, Objectives, Action/Implementation Plan, Metrics, etc.) by answering the following questions:

  • Write a brief statement introducing the organization (yours, one you researched, or from the link below).
  • In the Strategic Plan…what is the overall purpose and the desired results of the organization, and how will the organization achieve the desired results?
  • In the Mission Statement… what is the statement on why the organization exists? How clear / understandable is that statement to you and the employees? Explain.
  • In the Vision Statement… describe where the organization is headed, what it intends to be, or how it wishes to be perceived in the future. How clear, concise, and memorable is this statement to you and the employees?
  • In the Strategic Plan’s Content…How has the plan has considered the strategic environment? Explain using examples.
  • How do the goals and objectives support the vision, mission, values, core competencies, of the organization? Explain using examples.
  • How difficult is the plan to understand? Explain using examples.
  • What are your other observations and reactions to the plan? What do you like? What could be improved? Be specific in your responses and provide examples to illustrate your points.

Organizations with links to strategic plans:

nursing theory perspective

This activity is designed to expose you to a variety of nursing theory perspectives.

Select a nursing theory you have researched in past weeks.

Analyze the theory. Your analysis should include:

  • Description of the theory’s background and influencing factors, including worldview
  • Explanation of the underlying assumptions
  • Evaluation of major strengths and weaknesses
  • Application strategies for clinical practice
  • Citation of case example from personal or professional life that describe the application in practice

Cite at least three scholarly articles.

Format your assignment as one of the following:

  • 18- to 20-slide presentation
  • 3- to 4-minute podcast
  • 15- to 20-minute video presentation
  • 875-word paper
  • another format approved by your instructor

Click the Assignment Files tab to submit your assignment.