Human Resources Evaluation Assignment

Performance Management Homework

The purpose of this assignment is to develop a performance management process for an existing job, have a manager give you feedback on the process, then use the process and evaluate its effectiveness for yourself. The assignment will involve establishing methods for planning performance, providing feedback during the execution of performance, assessing performance, reviewing performance, and renewing and recontracting performance.

Part I – Create a performance management instrument/process.

Using your job description, and any additional materials you have at hand (e.g. past performance reviews, strategic planning documents, training materials, etc.), create a performance management process. The performance management process should include the following components:

1) Identify the purpose of rating – tell me how the rating system you are proposing will be used. Ratings that are done for developmental purposes are less likely to have an overall summary “number” as a final result, and are more likely to focus on how to help the employee improve after the rating has been given (thus, they may include developmental plans, educational goals, etc.) Ratings that are done for personnel decisions vary depending on the type of personnel decision made. For example, a raise-related rating may be a single number that expresses an overall performance level, whereas a layoff rating may involve ranking employees.

  • development
  • personnel decisions
    • raises
    • promotions
    • layoffs
    • etc.
  • employee
  • manager
  • subordinates
  • clients
  • be sure expectations are job related
  • align expectations with corporate goals
  • set expectations at “satisfactory” level
  • expectations should include both “hard numbers” and behaviors
  • make sure that expectations are consistent across all people who perform the job
  • involve people with information about performance in setting expectations
  • establish the circumstances under which the expectations are required to be met
  • distribute finalized expectations (including purpose of appraisal) to employees
  • determine who collects information, and from whom they collect it
    • who has the ability to rate performance information in comparison to standards?
    • who has information about performance?
      • self
      • supervisor
      • peers
      • clients
  • determine the rating scale that will be used in documenting performance. Consider using the following four-point scale, as follows:
  • create any forms that will be needed for data collection and the final performance appraisal report
  • determine how employee will get feedback on performance
    • feedback must be given as close in time as possible to actual performance
    • feedback must contain constructive suggestions for improvement
  • determine other means of collecting information
    • technical approaches (computer monitoring, etc.)
    • routine reports
  • create a communication process
    • training in giving feedback
    • training in using/accepting feedback
  • determine how performance information will be documented, collected, and stored
  • Determine who will create an overall rating of performance
    • eliminate bias
    • authority
    • credibility
  • Determine how rating will be used
  • Establish process for combining performance information to create overall rating
    • averaging (best for evaluation)
    • emerging themes (best for development)
  • Create documentation & storage process for final ratings
  • Create links between rating and outcomes/rewards (note that ratings are rarely the ONLY criteria for personnel decisions – other factors should be identified and communicated.)
  • Determine when performance rating will be given
  • Determine how performance rating will be given (paper, in person, both)
  • Determine process for incorporating employee feedback into communication process (add listening to process.)
  • Identify what employees should do when they disagree with rating

2) Identify the people who have first-hand information about performance – who will participate in the performance management process. These are people you might talk with when determining performance expectations in step 3 below. Remember that you may need to consult with multiple people to get a complete picture of an employee’s overall performance.

3) Establish performance expectations.

4) Create process for collecting and giving feedback on performance information

1 = Does Not Meet Expectations

2 = Meets Expectations

3 = Exceeds Expectations

4 = Far Exceeds Expectations

5) Establish results of performance appraisal process

6) Feedback (Part II)

7) Establish an appeals process

Part II – Evaluate your performance management process

The purpose of this part of the assignment is to give you feedback on your work – in particular to find out how well your “theoretical” process might work in the “real world.” There are two ways of doing this, do both.

First, use the process you have developed to evaluate someone’s performance. Using the forms and communication processes you have developed, either get feedback on your own work, or give someone else feedback on their work. It is likely that you will have to involve a supervisor (either your own or someone else’s) in this process. To do that, explain clearly that you have created a new process for a class, and that your professor has asked you to get feedback on how well it works. Be sure that everyone concerned knows that any information given will be for the class project only, and offer to sign a statement to that effect if necessary.

The second part of the evaluation process will be to get comments from the people who might use your process – both reviewers (managers) and reviewees (employees.) Talk to at least two people who might use the performance management form, and two people who might be reviewed using that form. Find out from them what they think of the process in terms of:

  • fairness
  • accuracy
  • usability (time needed to complete, complexity of process, etc.)

Using the information above, assess the effectiveness of your proposed performance management process, and recommend any changes you would like to make to the process to make it more effective in the future. I will provide more instructions.


Performance Management Homework

week 4 Employment Law

Signature Assignment: Employee Conduct, Termination, & Progressive Discipline

About Your Signature Assignment

This signature assignment is designed to align with specific program student learning outcomes in your program. Program Student Learning Outcomes are broad statements that describe what students should know and be able to do upon completion of their degree. The signature assignments may be graded with an automated rubric that allows the University to collect data that can be aggregated across a location or college/school and used for program improvements.

Resource: Avery Foster v. Federal Express Corp., 2006 U.S. Dist. LEXIS 53779 (E. Dist. Ct. MI)

The issue in the case is whether the company’s employment handbook created an implied contract. Avery Foster was terminated for falsifying an employee timecard. He argued that he was told in his initial interview that he would be guaranteed employment at Federal Express as long as he was a good worker and was protected from “just cause” termination. The court found there was good cause to terminate Avery Foster and that the handbook did not create an implied contract of guaranteed employment.

Progressive discipline is an employee disciplinary process that provides a graduated and measured range of responses to employee performance or conduct issues. Critical thinking consideration: Short of termination, could progressive discipline have been effective in this matter?

Given the circumstances and issues that arose in the Avery Foster case, create the following:

  • Design a Progressive Discipline Policy that would be appropriate for most organizations to follow, with consideration to the following measures:
    • Identify the discipline issues to be addressed: attendance, performance, conduct, or a single broad category of non-performance.
    • Determine whether or not the provisions of the policy should permit the company to modify and/or apply the policy in any manner it deems appropriate under the circumstances, including acceleration of steps, exclusion of steps, or repetition of steps.
    • Assess when a supervisor may act independently or needs to seek upper management approval.
    • Explain instructions on when to involve Human Resources.
    • Clarify the role of Human Resources to advise or approve disciplinary action.
    • Determine when a witness should be present.
    • Outline the different sequences and progressive levels of discipline that an employee can receive.
    • Develop rules regarding merit increases in relation to disciplinary action.

Write the policy in the third-person in no more than 1,400 words.

Use headings that appropriately signal the steps and keep your policy organized.

Use a minimum of three different research resources, and identify all sources in your Reference page.

Corporate Profile Part 2: Security Controls and Risk Mitigation Recommendations

Corporate Profile Part 2: Security Controls & Risk Mitigation Recommendations

In part 1 of this project, you were asked to provide the following information.

  • Company’s needs or requirements for cybersecurity. What information and/or business operations need to be protected? What are the likely sources of threats or attacks for each type of information or business operation? (e.g. Protect customer information from disclosure or theft during online purchase transactions.)
  • “Buying Forecast” section in which you discuss the company’s likely future purchases for cybersecurity products and services. In this section, you should identify and discuss three or more categories of cybersecurity products or services which this company is likely to purchase.

For this assignment, you will use your analysis from Part 1 to develop a set of recommended security controls and risk mitigation strategies which, if adopted, would help your selected company reduce and control the cyber risk that you previously identified. You will present your recommendations in table form.

Risk ID

Risk

800-53 Control Family

800-53 Security Controls:

Risk Mitigation Strategy

Required Products or Services

001

Theft of customer information from online transactions

SC System and Communications Protection

SC-8 Transmission Confidentiality and Integrity
SC-12 Cryptographic Key Establishment and Management

Encrypt all communications between customers and the company’s online ordering system.

Server Certificates to be used to encrypt communications between Online purchasing system and customers’ browsers.

You will need to do additional research to identify security controls, products, and services which could be included in the company’s risk response (actions it will take to manage cybersecurity related risk).

Research

  • Review the Risk section of the company’s SEC Form 10-K. Develop a list of 5 or more specific cyberspace or cybersecurity related risks which the company included in its report to investors. Your list should include the source(s) of the risks and the potential impacts as identified by the company.
  • For each risk, identify the risk management or mitigation strategies which the company has implemented or plans to implement. (Use the example format provided above.)
  • Next, consult the control families listed in the NIST Special Publication 800-53 rev 4 (or higher) http://dx.doi.org/10.6028/NIST.SP.800-53r4 to identify general categories of controls which could be used or added to the company’s risk management strategy for each risk in your list. Identify specific controls as appropriate (be concise – you will usually only use one or two specific controls from the control family per risk mitigation).
  • For each control family, develop a description of how the company should implement these controls (“implementation approach”) as part of its risk management strategy. What commercial products or services will be needed to implement your recommended strategy?

Write

  • Download and open the Table 1 file attached to the assignment entry in LEO.
  • Write an introductory paragraph for your Security Controls and Risk Mitigation Recommendations (summarize information about your company using narrative from your submission for part 1). Remember to include citations to the original sources of information used in your introduction.
  • Using the information from your research and analysis, complete Table 1.
  • For an “A” on this assignment, you must provide recommended security controls and mitigations for 10 or more unique risks.
  • Copy the security control family names and control names EXACTLY as provided in NIST SP 800-53. This usage does not require citations.
  • Paraphrase the information used in your risk mitigation recommendations. Do NOT paste in copied narrative. Citations are not normally required for Table 1 since this table should predominantly consist of your own work.

Additional Information

  • Table 1 should be professional in appearance with consistent use of fonts, font sizes, margins, etc.
  • Your submission should use standard terms and definitions for cybersecurity. See Course Resources for recommended glossaries and other sources of standard terminology.
  • USE THE TEMPLATE FILE. This file contains the required cover page, an “introduction section,” template for Table 1, and the references page. Make sure that you complete each of these sections of this assignment. Do not delete the section breaks!
  • For the introduction, you are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).
  • You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
  • Consult the grading rubric for specific content and formatting requirements for this assignment.


Table 1. Recommended Security Controls and Risk Mitigations

Risk ID

Risk

800-53 Control Family

800-53 Security Controls:

Risk Mitigation Strategy

Required Products or Services

001

Theft of customer information from online transactions

SC System and Communications Protection

SC-8 Transmission Confidentiality and Integrity
SC-12 Cryptographic Key Establishment and Management

Encrypt all communications between customers and the company’s online ordering system.

Server Certificates to be used to encrypt communications between Online purchasing system and customers’ browsers.

In part 1 of this project, you were asked to provide the following information.

  • Company’s needs or requirements for cybersecurity. What information and/or business operations need to be protected? What are the likely sources of threats or attacks for each type of information or business operation? (e.g. Protect customer information from disclosure or theft during online purchase transactions.)
  • “Buying Forecast” section in which you discuss the company’s likely future purchases for cybersecurity products and services. In this section, you should identify and discuss three or more categories of cybersecurity products or services which this company is likely to purchase.

For this assignment, you will use your analysis from Part 1 to develop a set of recommended security controls and risk mitigation strategies which, if adopted, would help your selected company reduce and control the cyber risk that you previously identified. You will present your recommendations in table form.

Risk ID

Risk

800-53 Control Family

800-53 Security Controls:

Risk Mitigation Strategy

Required Products or Services

001

Theft of customer information from online transactions

SC System and Communications Protection

SC-8 Transmission Confidentiality and Integrity
SC-12 Cryptographic Key Establishment and Management

Encrypt all communications between customers and the company’s online ordering system.

Server Certificates to be used to encrypt communications between Online purchasing system and customers’ browsers.

You will need to do additional research to identify security controls, products, and services which could be included in the company’s risk response (actions it will take to manage cybersecurity related risk).

Research

  • Review the Risk section of the company’s SEC Form 10-K. Develop a list of 5 or more specific cyberspace or cybersecurity related risks which the company included in its report to investors. Your list should include the source(s) of the risks and the potential impacts as identified by the company.
  • For each risk, identify the risk management or mitigation strategies which the company has implemented or plans to implement. (Use the example format provided above.)
  • Next, consult the control families listed in the NIST Special Publication 800-53 rev 4 (or higher) http://dx.doi.org/10.6028/NIST.SP.800-53r4 to identify general categories of controls which could be used or added to the company’s risk management strategy for each risk in your list. Identify specific controls as appropriate (be concise – you will usually only use one or two specific controls from the control family per risk mitigation).
  • For each control family, develop a description of how the company should implement these controls (“implementation approach”) as part of its risk management strategy. What commercial products or services will be needed to implement your recommended strategy?

Write

  • Download and open the Table 1 file attached to the assignment entry in LEO.
  • Write an introductory paragraph for your Security Controls and Risk Mitigation Recommendations (summarize information about your company using narrative from your submission for part 1). Remember to include citations to the original sources of information used in your introduction.
  • Using the information from your research and analysis, complete Table 1.
  • For an “A” on this assignment, you must provide recommended security controls and mitigations for 10 or more unique risks.
  • Copy the security control family names and control names EXACTLY as provided in NIST SP 800-53. This usage does not require citations.
  • Paraphrase the information used in your risk mitigation recommendations. Do NOT paste in copied narrative. Citations are not normally required for Table 1 since this table should predominantly consist of your own work.

Additional Information

  • Table 1 should be professional in appearance with consistent use of fonts, font sizes, margins, etc.
  • Your submission should use standard terms and definitions for cybersecurity. See Course Resources for recommended glossaries and other sources of standard terminology.
  • USE THE TEMPLATE FILE. This file contains the required cover page, an “introduction section,” template for Table 1, and the references page. Make sure that you complete each of these sections of this assignment. Do not delete the section breaks!
  • For the introduction, you are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).
  • You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
  • Consult the grading rubric for specific content and formatting requirements for this assignment.


Table 1. Recommended Security Controls and Risk Mitigations

Risk ID

Risk

800-53 Control Family

800-53 Security Controls:

Risk Mitigation Strategy

Required Products or Services

001

Theft of customer information from online transactions

SC System and Communications Protection

SC-8 Transmission Confidentiality and Integrity
SC-12 Cryptographic Key Establishment and Management

Encrypt all communications between customers and the company’s online ordering system.

Server Certificates to be used to encrypt communications between Online purchasing system and customers’ browsers.

customer-Product Profitability Analysis

Introduction

The
following table, based on Figure 4.2 Customer-Product Profitability
Analysis in your textbook, shows an example of a Customer-Product
Profitability Analysis filled in for a small sewing alterations company
that specializes in formal wear.

There are six different types of
customers for this company. This small business should focus on the
“high profit” customers, but sometimes may want to keep in touch with
the “mixed-bag” customers since word-of-mouth is the best advertisement
for this small company with little repeat business. Within a few years,
teens can become brides who are looking for wedding gown fittings.

Customer

SERVICE C1
High-Profit
C2
Mixed-Bag
C3
Losing Customer
S1
Wedding gown design
Big Spenders (designer gown) Heirlooms Bargain Basement Buyers Highly Profitable Product
S2
High school formal wear
Potentials Profitable Product
S3
Clothing Repairs
Fashion Plates Losing Product
S4
Women’s suit design
Executives Mixed Bag Product

Alternate Version

Instructions

  • Re-create the table above and use it to segment the customer base at your company.
  • Make any assumptions or simplifications you need to create the table.
  • You should make up a name for each segment.
  • After you have segmented the customers in your company, put together a value proposition for each of these customers.
  • Then explain what can be done to change each value proposition in order to build customer loyalty.
  • Due by the end of Day 7.

Remember

There are two components to this assignment:

  • A table showing customer segments at your company.
  • A
    written explanation of the value proposition for each segment and then
    what can be done to change the value proposition in order to build
    customer loyalty.
  • Your written explanation should not be more than two pages single spaced (four pages double-spaced).


inside at word

  • The following is an illustration of the glycolysis pathway:
  • Of the steps illustrated how many are unidirectional? Identify the substrate and product of each of these steps. (4 pts)
  • Identify the three enzymes that are likely to be regulated? (3 pts)
  • Glycogen synthase is an enzyme that catalyzes the synthesis of glycogen from glucose. Glucose 6 phosphate activates glycogen synthase by allosteric regulation. In your own words describe how this allosteric modulation is likely to occur? (4pts)
  • Glycogen phosphorylase, an enzyme that catalyzes the breakdown of glycogen to form glucose, is active when a phosphate group is added. This is an example of enzyme regulation by ____________________________. (2pts)
  • An example of a coenzyme that regulates succinate dehydrogenase is ______________________ (2pts)

information managment ,the data and infrastructure

the company must be AMAZON.

Harnessing Information Management, the Data, and Infrastructure

Due Week 4 and worth 120 points

In Assignment 1, you investigated data analytics and the utilization of data analytics in business. In this assignment, use the company or industry that you selected in Assignment 1. Use the Internet or Library to explore the relationship between information management and data storage techniques.

Write a four to six (4-6) page paper in which you:

  1. Ascertain the importance of information management for the company or industry that you have chosen.
  2. Analyze the fundamental impact of IT architecture or enterprise architecture on information management for your chosen company or industry. Determine if IT architecture impacts the effectiveness or efficiency of information management and vice versa.
  3. Suggest at least two (2) data storage methods regarding database, data warehouse, and / or date mart for your chosen company or industry. Provide a rationale for your response.
  4. Determine the optimal data storage method between the methods that you suggested in Question 3. Provide a rationale for your response.
  5. Use at least three (3) quality references. Note: Wikipedia and other Websites do not qualify as academic resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Essay on Spike Lee’s film “Do the Right Thing”

you will write an analysis of how the neighborhood Bedford-Stuyvesant is shown in Spike Lee’s Do the Right Thing. You should use specific examples from the film to discuss the view we get of the neighborhood as shown in the film. Form a thesis based on visuals, reactions/descriptions of the characters, and your own analysis of the storyline to show the reader what you’re thinking.

You should also use some published analyses of the film (there are plenty of them) from either books or major newspapers/magazines that appear in print (online versions of these are fine) to add context to your own analysis.

Objectives:

Refine summary writing skills
q Refine skills in analysis and description
q Practice writing essays
q Practice using specific details and examples to develop a pointq Practice with MLA citation format

Format:

Your review should be about 4-5 pages in length with a Works Cited page at the end. The goal here is not simply whether or not you liked the film, but to engage in a deeper discussion of how it shows the urban experience in a single neighborhood, focusing a few key themes or contexts and what the film says about them.

For contrast, you should reference at least three (3) articles or book chapters that focus on Do The Right Thing. Only one of these can be a review: the other 2 must be academic essays or book chapters that focus on the film’s significance. You should use the information in these essays to shape your own opinions about the film. You should then use these to form your own argument (thesis) about the film. Note that you can use the chapter from Murray Forman’s The Hood Comes First (PDF on the course website) as one of the 3 articles.

Discussion 6

1) Discussion your thoughts on TWO of the following quotes:

“You don’t have to maintain your sanity if you think that any day you might get killed”

“the knowledge that slavery had torn apart Black families for centuries”

“children who misbehave at school no longer fear their mothers will be called”

“parents no longer eat dinner with their children every night”

2) Consider the activities of Richard Aoki. In your opinion – was he an asset or enemy to society? Discuss your reasoning in detail.

3) Consider African American films and television sit-coms. Identify the films or shows that you believe currently have the most positive impact and the ones that had the most detrimental impact on the perception of African American culture. Focus your discussion on the influence on school-aged children

5) Consider the Black Panther Party. If you were a college student during that time, would you have joined and/or supported the Panthers? Why or why not?

6) Consider the civil unrest of 1967 and the civil unrest of 2017. How much has changed in terms of institutional racism and race relations in 50 years? Have things improved or become worse?

7) Discuss what you believe Bill Cosby will be remembered for 50 years from now.

Complete American West History Assignment CH 2 NO PLAGIARISM

Step 1: Select 9 – 11 items, items being significant people, movements and/or events,from the pictured readings from chapter 2 https://books.google.com/books?id=xuLSxbn7DSUC&pri… (PAGE 39-70)


Step 2: Type
your 9-11 items on a word documenr addressing the following for each item:

  • Category
  • Date/s
  • Name of Item
  • Thorough Description
  • Significance of the Item – Why does it matter?
  • Image – Optional – This would add to the aesthetics score in the rubric.
  • Cite any outside information used. A simple link to your source will suffice. This can go either in the Justifications document (see Step 3 below) or in the Timeline Entry itself.

Step 3: Answer the following question for each items listed, using complete sentences :

  • For each item, why did you choose this item over others? What makes this item worthy of placement on your history Timeline?

Simple, short sentences are fine. This needs to be saved as .doc, .docx, or a .pdf file.

Chivalry Project in English

For this project, you will be transported to the mythical land of Camelot! All of the stories you can find in google.

Well, not really. However, you will be writing a creative
piece that will demonstrate your understanding of chivalry. In this Unit
Project, you will imagine what it would be like to be a knight in King
Arthur’s court in Camelot.

You will be the protagonist of your story, so this should be written in a first person
point of view. You have read all about chivalry in this unit, have
studied examples of knights, and you will be taking this knowledge with
you to Camelot. You will also be fully accepted by King Arthur as a
knight and outfitted with shining armor accordingly.

You will be spending a week as a knight. During this week, three
events will occur, similar to the ones we read about in the selections
from this unit. Choose three from among the following options:

  • Negotiate a peace agreement with a rogue knight (as in Le Mort d’Arthur)
  • Lead an army into an epic battle (as in Le Mort d’Arthur)
  • Receive an order to complete a task from King Arthur (as in Le Mort d’Arthur)
  • Face temptation (as in Sir Gawain and the Green Knight)
  • Receive a challenge for a duel (as in Sir Gawain and the Green Knight)
  • Fall in courtly love and pursue a romance (as in a Knight’s Tale)
  • Recruit a squire (as in Don Quixote)

Project Details

Your project will tell in detail what happened during your chosen three events.

For each event you face, you must acknowledge the chivalrous thing to do:

  • What is the chivalrous thing to do in this situation?
  • Why do you think this the chivalrous thing to do?
  • In the stories you have studied, how did the knights react to this specific situation?

You will need to provide support for this. Your support may be a recollection of the text when a character faced this situation; if so, provide a quote from the story. Or, you may choose to support it with research instead. You can use a link provided in the course or find one of your own. (Make sure to include a Works Cited page.)

Once you have acknowledged the chivalrous thing to do, you may choose
to either do the chivalrous thing or not. You must behave chivalrously at least once, and you must break the code of chivalry at least once.
Justify your decisions! You must have a reason why you choose to do the
right thing or the wrong thing in each scenario. Remember – Sir
Bedivere had a hard time throwing Excalibur away as he was told to!
However, Sir Bedivere also had a specific reason for disobeying his
king’s orders.

Be detailed. Write these scenarios loosely based on the stories we read, but take liberties to create your own adventure.
I should be able to see your understanding of the texts and of the code
of chivalry, but this should be a fun piece that showcases your
creativity and imagination

Tie your story or essay together to create a cohesive piece.
Since this is a unique and somewhat absurd situation, spend your first
paragraph introducing your reader to the scenario. This may mean
discussing what you learned in the course, describing the time-travel
experience, or detailing your first meeting with King Arthur. Your
conclusion should wrap up your paper with a discussion of your
experience and perhaps your return home.

You may choose to write this narratively (like a novel), as a diary entry, a letter, or just a report to your teacher about your experience. Embrace the project! Write as though you are truly living this!

This essay should be between three and seven pages (750-1750 words) in length.