Reply to discussions

Discussion
1: Cathy

Operational differences
between inpatient and outpatient health centers and hospitals are that
inpatient services require an overnight stay in a hospital, ambulatory surgery
centers, respite care, hospice care, and nursing facilities. Hospitals are
governed by a chief executive officer (CEO) a board of trustees or board of
directors, and a chief of medical staff (Pozgar, 2014.) The CEO is responsible
for the day to day operations of the hospital, and the board of trustees. The
board of trustees are legally responsible for hospital operations. The
operational staff within a hospital manages the nonmedical staff, both the
operational staff and medical staff collaborate so the institute runs smoothly.
In addition to this, the medical staff has committees (Pozgar, 2014.) A credential
committee reviews and grants that allow privileges to physicians. A by-law
committee reviews changes and a planning committee supervises activities and
correlate to the mission and vision. In turn, patient records are overseen by
the medical records committee. A utilization committee safeguards inpatient
stays that are clinically appropriate. An infection control committee reduces
infections in hospitals and a quality control improvement committee which is
responsible for quality improvement programs (Pozgar, 2014.)

Word count 191

Niles, N. J. (2018).
Chapter 6: Inpatient and Outpatient Services. In Basics of the U.S. health
care system
(3rd ed., pp. 147-155). Burlington, MA: Jones & Bartlett
Learning.

Discussion
2: Crystal

Inpatient services are services
that involve an overnight stay of a patient whereas outpatient services do not
(Niles, 2015). Inpatient care tends to be directed towards more serious
conditions and trauma that require one or more days of an overnight stay at a
medical facility (Wu, 2016). Patients must stay at the medical facility where
their procedure was done (which is normally a hospital) for at least one night.
During this time, they remain under the supervision of a nurse or doctor.
Outpatient services on the other hand, do not require a prolonged stay at a
facility. This can include routine services such as checkups or visits to
clinics (Wu, 2016). Outpatient services can also include more involved
procedures such as surgical procedures, as long as they allow you to leave the
hospital or facility on the same day as the procedure. Patients are free to
leave the doctor’s office; outpatient clinic or hospital once the procedure is
over. Sometimes, they need to wait while anesthesia wears off or to make sure
there aren’t any complications. As long as there are not any serious
complications though, patients don’t have to spend the night being supervised
(PBMC Health, 2017). Inpatient care is considered very expensive so over the
years hospitals have begun offering more outpatient services that do not
require an overnight stay and are less financially taxing on the healthcare
system.

References:

Niles, N. J. (2015). Basics
of the U.S. health care system
. Burlington, MA: Jones & Bartlett
Learning.

The Difference Between
Inpatient and Outpatient Care. (2017, March 14). Retrieved March 30, 2018, from
http://www.pbmchealth.org/blog/difference-between-…

Wu, J. (2016, November 28).
Inpatient vs. Outpatient Care and Coverage. Retrieved March 30, 2018, from https://www.valuepenguin.com/inpatient-vs-outpatie…

Discussion 3: Craig

1. Name of
Company: Home Depot

2. Source of
Information: https://www.sec.gov/cgi-bin/viewer?action=view&cik=354950&accession_number=0000354950-17-000005&xbrl_type=v#

3. I will be
closing on the sale of a house in south Florida next week. Prior to
getting to closing I have been spending a lot of time at Home Depot (and
Lowe’s) getting supplies to work on the house. I thought it would be
worthwhile to research a company that I have been giving a lot of money to
lately. In addition, The Home Depot has also been traded on the Dow since
1999. Researching a stock that factors prominently on the Dow Jones makes
sense.

4. Asset Turnover Ratio = Net Sales / Average
Total Assets

=$100,904 / [($44,529 + $42,966) / 2)] (in
$Millions)

=$100,904 / $43,748

=2.31

5. Home Depot’s
Asset Turnover Ratio of 2.31 is very healthy. This ratio indicates that
Home Depot is producing $2.31 for every $1.00 of assets invested. It
should be noted that the information to determine the ratio must be obtained
from both the balance sheet and income statement: the Net Sales are
obtained from the income statement and the Average Total Assets are obtained
from the Balance Sheet.

Discussion
4: Alex

The company I
chose to research is Starbucks. I chose to research this company because I
frequently visit this store as I am shopping at Target. Here is the web address
to the information: https://www.sec.gov/cgi-bin/viewer?action=view&cik…#

To
calculate the asset ratio turnover you need to divide the net sales by the
total average assets.

In
October 2017, net sales were (in millions) $22,386.80

To
find the total average assets by dividing the current years assets by the
previous years assets

In
2017 the total assets equalled $14,365.60 while in 2016 the total assets
equalled $14,312.50

14,365.60+14,312.50=
$28,678.10

28,678.10/2=
$14,339.05

$22,386.80/$14,339.05=
1.56

This
tells us that Starbucks is producing approximately $1.56 of sales revenue for
each dollar of assets invested.

Note: Please read the discussion carefully and try to answer them about what they wrote, don’t explain to them how the formula done or repeat what they said, just comment about how good points and how great job they explain it, thank you.

Write a discussion and response one of others’ reply.

Post A

I’d like to go in another direction in this discussion than service stinkiness. Some firms are providing very innovative service.

Read the story below about a Bonobos ninja. It is adapted from a WorkLife podcast by Adam Grant entitled “How to love criticism.”

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Like everyone else on earth, I hate calling customer service. It’s hard to get a human on the line, and if you do, they’re usually stuck reading from a script. If you want to get anywhere, you have to ask for the manager over and over and over. But that’s not how things work at Bonobos (a menswear company – https://bonobos.com/about). They make great fitting men’s clothes, and if you call them with a problem, you get a real person empowered to actually help. Bonobos calls them Ninjas.

Kelsey Nash is one of them. His actual title is Creative Customer Engagement Lead. He’s on the management team of the Ninjas.

Kelsey Nash and all the other Ninjas at Bonobos have something pretty rare in the world of customer service. Freedom.

This is one of his stories.

Every Ninja is empowered to take care of a customer in the moment, in whatever way that they think is necessary. There’s no real sending it up the ladder and down the ladder to find a resolution, like, “We’ll call you back within 24 to 48 hours.” So every day, we ask Ninjas, “What would you want if you were the customer? How would you feel?”

There was a guy named Derek, and he wrote in to the company and he said, “I had a fire at my house and one of my favorite flannel shirts was damaged. Do you know of some way to recuperate this or repair it, I see you don’t really have any on the website anymore.”

Kelsey wrote back right away. “We’re happy to replace your shirt, I’m so sorry about that, is everybody alright?”

Derek wrote back and said, “Actually, everybody’s fine, except our 15-year-old dog was trapped in the house and we lost our dog and that’s been the only thing.”

Kelsey heard that and went into Ninja mode. He got online and found Derek’s dog on his Instagram account. So he got a picture of the dog, he commissioned this portrait and then he got a couple flannel shirts and sent it to the guy.

Derek’s response, “I’m not an emotional guy, but with all that had happened, it was still very fresh. I definitely cried when I saw the painting.”

Kelsey said, “At Bonobos, what we pride ourselves on, above everything, is that we’re human. Like, we deal with every contact on a one-to-one basis: as a human answering a phone call, talking to another human, like, “Yeah, let’s work this out.””

This action clearly meant something to Derek, who recently started a new job. He said, “The only picture I’ve put up on the wall so far is that painting and it’s right above my desk on the wall above the window. When I walk in the door every morning, that’s the first thing I see.”

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Discuss an innovative service provision that you have experienced? How did it make you feel toward the brand?

Post B

Review the replies your peers made in Post A. Select a peer’s response to the innovative service discussion.

Discuss what resources you think that company must have to provide innovative service. Discuss three ways in which a competitor could respond to this company providing innovative service.

Learning Culture from Literature

Write an essay of 700-900 word focusing on the assigned Poem from Li Bai.

This should be a close reading essay, and should use as evidence primarily passages from the Poem. The essay should be in MLA essay format and use MLA citations. A works cited entry and in-text citations for each text discussed are required.
The essay should be focused on making a debatable claim about the work(s) in question; informational essays or essays consisting of summary are not appropriate. The claim should be supported with discussion of specific passages from the text(s) on which the essay is focused.
The assignment should be formatted in correct MLA manuscript style.

– Make sure you have a Thesis statement and a consistent focus throughout.

Learning Culture from Literature: Read Changgan Memories by Li Bai, and analyze it for a picture of the culture in which Li Bai was writing. What is one piece of information about that culture that we can infer from the poem, and what does Li Bai seem to be saying about that information? Support your argument by discussing only passages from the poem you chose.

– “Changgan Memories” By Li Ba

– Translation from Chinese to English

My hair first cover forehead
Break flower gate before play
You ride bamboo horse come
Round walkway play green plums
Together live Changgan county
Two little without suspicion suspicion
Fourteen become your wife
Shy face still not open.
Lower head face dark wall
Thousand call not one turn
Fifteen start open brow
Wish together dust and ash
Always maintain massive pillar faith
Why climb look husband platform
Sixteen you far go
Qutang Yanyudui
Fifth month not risk run aground
Ape sound sky on sorrow
Gate before back and forth mark
One by one grow green moss
Moss deep not able sweep
Fall leaf autumn wind early
Eighth month butterfly yellow
Pair fly west garden grass
Feel this hurt my heart
Because sorrow red face old
When descend Sanba
Before do letter send home
Mutual come to meet not say far
Up to Changfengsha.

– English version

When first my hair began to cover my forehead,
I picked and played with flowers before the gate.
You came riding on a bamboo horse,
And circled the walkway, playing with green plums.
We lived together, here in Changgan county,
Two children, without the least suspicion.
When I was fourteen, I became your wife,
So shy that still my face remained unopened.
I bowed my head towards the shadowed wall,
And called one thousand times, I turned not once.
At 15 I began to lift my brows,
And wished to be with you as dust with ashes.
You always kept your massive pillar faith,
I had no need to climb the lookout hill.
When I was sixteen, you went far away,
To Yanyudui, within the Qutang gorge.
You should not risk the dangerous floods of May,
Now from the sky, the monkeys cry in mourning.
Before the gate, my pacing’s left a mark,
Little by little, the green moss has grown.
The moss is now too deep to sweep away,
And leaves fall in the autumn’s early winds.
This August, all the butterflies are yellow,
A pair fly over the western garden’s grass.
I feel that they are damaging my heart,
Through worrying, my rosy face grows old.
When you come down the river from Sanba,
Beforehand, send a letter to your home.
We’ll go to meet each other, however far,
I’ll come up to Changfengsha.

ethical behaviors

This assignment involves relating ethical behaviors in high-profile events, as well as examining regulatory and
sustainability market approaches to business’s environmental responsibilities. Read each of the following questions
before answering each one within a Word document.
1. Based on the response to Hurricane Katrina, what is the relationship between inefficiency and ethical behavior for
leaders? How could the response to the Hurricane Katrina disaster have been more effective, and thus more
ethical? Your response must be at least 200 words.
2. In considering the BP Oil Spill, what circumstances would ethically justify a government or private company in
restricting information made available to the public during a disaster? At what point might other companies have
an ethical right to intervene regarding environmental disasters? Your response must be at least 200 words.
In the Word document, list your answers one after the other. Use Times New Roman, 12-point font, and double-spacing.
There is no need to include a title page nor a references page. You are not required to perform research for this
assignment; however, if you choose to perform research to answer these questions, use APA style to format your
in- text and reference citations.
Information about accessing the Grading Rubric for this assignment is provided below.

Defining, Delineating, and Dissecting Terrorism

SEE ATTACHED CHAPTER

Reaction Paper must be in full APA style and format and be no less than 800 words (excluding the separate cover, abstract, and reference pages). The paper must include a cover/title page, a separate abstract page with keywords, in-text citations, properly placed page numbers, running heads, and a separate reference page identifying all sources. The abstract paragraph must be no less than 75 words. Your Reaction Paper must address at least one full chapter assigned for the module in the course outline.

No more than 25% of each written assignment in this course may be attributed to referenced sources. Your papers must be 75% original thought. Again, your cited work and quotations must not exceed 25%. Failure to properly use in-text citations or required quotation formatting will be considered evidence of potential Academic Honor Code violations. The submission of writings from prior courses, classes, schools, colleges, or universities to fulfill assignment requirements in this class will be referred as a potential Academic Code Violation.

It is strongly suggested you follow the following logical flow in presenting your reaction paper: critical overview of the entire reading, significant facts or information disclosed, and conclusions based upon inductive or deductive reasoning. A Reaction Paper is designed to develop and sharpen your critical thinking, cognitive skills, and problem-solving abilities, as well as your writing skills. Your objective in writing this assignment is to clearly articulate your assessment of the information presented by the author(s) and to formulate and clarify your position on or reaction to the writings. Avoid “I will” and “My” paper will” type constructions in your writings. In other words, the use of “I” and “My” in your papers must be avoided.

Position paper: power, politics and culture

ASSIGNMENT 3

POSITION PAPER: POWER, POLITICS,

AND CULTURE

Due Week 8, worth 250 points

Power and politics greatly influence an organization’s culture. In business, the culture can make or break an organization’s productivity. In this assignment, you’ll analyze the ways power and politics have influenced an organization’s culture. You’ll apply best practices you learned in course resources and your own research to make recommendations for improving this

organization’s culture.

PREPARATION

Using the same organization from the first two assignments, imagine the CEO has now requested your task force investigate the influence of power and politics on the corporate culture. You have been asked to make a position paper that presents and supports your recommendations to

improve the culture.

Prepare for this assignment by delving into the organization’s culture and identifying the resources you, the task force leader, will use to make a research-supported position paper. Use at least two quality resources such as the course textbook, company website, business websites (CNBC, Bloomberg, etc.), resources from the Strayer Library, and/or outside sources.

Note: Wikipedia and web-based blogs do not qualify as credible resources.

INSTRUCTIONS

Develop your position paper, addressing the following components:

1. Influence of Politics and Power Explain how politics and power-play may have influenced the organization’s culture.

2. Sources of Power
 Explore the sources of power and describe how management could use this influence to benefit your department and improve organizational performance.

3. Leadership Behavior and Culture Make recommendations that support how the study of power and politics could influence leadership behavior and improve the organization’s culture.

4. Leadership Influence
 Discuss the importance and complexity of leadership behavior. How does it influence organizational structure and performance?

5. Executive Summary
 an executive summary that presents your recommendations for ways in which the organization could build a stronger culture. Note: An executive summary is a condensed version of your full report. It should summarize briefly all the main points in concise paragraphs. It should be written clearly and should use
language appropriate for the audience.

Your assignment must follow these general requirements:

Be typed (five to seven pages recommended), font (size 12) with one-inch margins on all sides
Include a References List

The organization used in Assignment 1&2 is Baptist Health South Florida. I can provide the first 2 assignments

internal controls for Bovar’s Company

APA format writing  with proper citationa and references

3 – 4 apa style references in abc’s order

To properly assess the internal controls that are in place at Bovar Company, you have found that there are three major objectives that an entity should follow in designing an effective internal control system. They are as follows:

  • Reliability of financial reporting
  • Efficiency and effectiveness of operations
  • Compliance with laws and regulations

In 3–4 paragraphs, complete the following:

  • Discuss the meaning of each of the following major objectives:
    • Reliability of financial reporting
    • Efficiency and effectiveness of operations
    • Compliance with laws and regulations
  • Discuss how they might be satisfied at Bovar Company.
  • Prepare an unadjusted misstatement audit schedule with a comment on your judgment of the audit findings based on the following audit results for Bovar. Bovar has the following misstatements (any amount more than 5% of current assets, total assets, and income before taxes):
    • Understated allowance for uncollectible accounts: $95,000 estimated based on analytical procedures
    • Accounts receivable or sales cutoff misstatements: $60,000 estimated population misstatements based on the sample, including sampling error ($60,000 accounts receivables or sales were not included in the cutoff reporting period.)
    • Difference between physical inventory and book figures: $120,000 actual population misstatements. (The physical inventory is higher than the book figures by $120,000.)
    • Unrecorded liabilities: $285,000 estimated population misstatements based on the sample, including sampling error
    • Repairs or expense items that should have been capitalized: $90,000 estimated based on analytical procedures

Public Health Education Campaign

Overview: Throughout the semester you have: worked on learning about a public health issue that impacts college student specifically; created a public health campaign; applied persuasive concepts to explain the impact of the campaign; and integrated all that material into a full paper. Now it is time to share this project, with your peers and professionals on campus, that work in the areas that focus on your campaign topics.

In this presentation you will need to:

  • Create an outline of the presentation (10 points)
  • Create a google slides presentation (10 points)
  • Present your outline/slides (30 points)
    • Briefly explain the public health issue you chose to address
    • Share your campaign
      • discuss the reasoning behind why you did what you did
      • you MUST include how specific concepts/theories discussed throughout the semester informed/influenced the campaign (this should come from your Application of Persuasion Concepts to the Campaign section of your paper).
      • you can see more information in the file

Information Systems and Identity Management Project

There are five steps that will help you create your final deliverables. The deliverables for this project are as follows:

  1. Nontechnical presentation: This is an 8-10 slide PowerPoint presentation for business executives and board members.
  2. Technical report: Your report should be a 6-7 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.
  3. Executive summary: This should be a 2-3 page double-spaced Word document.
  4. In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

Step 1: Defining the Information System Infrastructure

Select a hospital or healthcare organization to research. You may choose an organization you are familiar with or can readily obtain information about. To maintain confidentiality, you do not need to mention the name of the organization. You may also choose a hypothetical/fictitious healthcare organization.

Others have researched several healthcare organizations, which have suffered major security breaches, extensively.

  1. Describe the organization and structure including the different business units and their functions. You may use an organizational chart to provide this information.
  2. Choose one or more mission-critical systems of the healthcare organization. Define the information protection needs for the organization’s mission-critical protected health information (PHI). This information is stored in database medical records for doctors, nurses, and insurance claims billing systems, which are used to fulfill the organizational information needs.
  3. Define the workflows and processes for the high-level information systems that you have just identified that will store PHI. Workflows and processes for healthcare organizations define how the organization gets its work done. They describe the movement of patient information to the business units that have needs to process and manage that information, from billing to physician care. All these organizations have hardware and software implementations of their information systems, and it is critical to understand these components, and how they are connected (known as their topology), so the appropriate protections can be applied. Your research may produce instances and examples of how an information system is connected, to include cybersecurity components like firewalls, in the information system and network diagram. Be sure you understand the benefits and weaknesses for the different network topologies.

    You may incorporate what you find in your research, in your definition for workflows and processes for the high-level information systems and provide explanation of how that topology fulfills the mission for the health care organization. Your definition should include a high-level description of information systems hardware and software components and their interactions. Take time to read the following resources. They will help you construct your definition.

  4. You may supply this information as a diagram with inputs, outputs, and technologies identified. Consider how you might restrict access and protect billing and PHI information.

  5. The links shown below provide access to essential information you’ll need to complete this part of the hospital’s information system infrastructure definition. Click each link, review its resources, and refer to them as you compose this part of the definition.

You will include these definitions in your report.

Step 2: Threats

Now that you have defined the hospital’s information system infrastructure, you will have to understand what are the threats to those systems and describe the types of measures that could address those threats. In this section, you will learn about different types of identity access management solutions and how they protect against the threat of unauthorized access.

To complete this section of the report, you’ll brush up on your knowledge of threats by reading the following resources: web security issues, insider threats, intrusion motives/hacker psychology, and CIA triad. Take what you learned from these resources to convey the threats to the hospital’s information systems infrastructure. Include a brief summary of insider threats, intrusion motives, and hacker psychology in your report as it relates to your hospital data processing systems. Relate these threats to the vulnerabilities in the CIA triad.

This section of your report will also include a description of the purpose and components of an identity management system to include authentication, authorization, and access control. Include a discussion of possible use of laptop devices by doctors who visit their patients at the hospital, and need access to hospital PHI data. Review the content of the following resources. As you’re reading, take any notes you think will help you develop your description.

  1. Authorization
  2. Access control
  3. Passwords
  4. Multi-factor authentication

Next, expand upon your description. Define the types of access control management to include access control lists in operating systems, role-based access controls, files, and database access controls. Define types of authorization and authentication and the use of passwords, password management, and password protection in an identity management system. Describe common factor authentication mechanisms to include multi-factor authentication.

You will include this information in your report.

Step 3: Password Cracking Tools

You have successfully examined the threats to a healthcare organization’s information systems infrastructure. Now, you must begin your research into password cracking software. Do some quick independent research on password cracking as it applies to your organization.

You can click on this link to find the instructions for Navigating the Workspace and the Lab Setup.

Enter Workspace and complete the lab activities outlined in the Project 1 Workspace Exercise Instructions. There are additional password cracking tool resources, tutorials, and user guides to continue your familiarity with the tools.

Click here to access the Project 1 Workspace Exercise Instructions.

After completing the lab, you will have successfully tested more than one password cracking tool. Not all password cracking tools will necessarily perform with the same speed, precision, and results, making it important to test a few different products. Compare the password cracking tools based on these characteristics, and include as part of your assessment and recommendations on the use of such tools. You will test the organization’s systems for password strength and complexity and complete validation testing. You will compare the results obtained from your first and second tool.
You have tested and made comparisons of the performance of various password cracking tools and you have the data to support your recommendations for the use of such tools.
Not all password cracking tools will necessarily perform with the same speed, precision, and results, making it important to test a few different products. The comparison will be part of your assessment and help you make recommendations on the use of such tools. You will test the organization’s systems for password strength and complexity and complete validation testing. You will compare the results comparing the various tools.

  1. Read this article about cyberattacks, perform two different types of cyberattacks in the first, and in the second tool, crack user account passwords. Describe them in simple nontechnical terms for the leadership. You can identify which tool is the most effective and why for your organization’s IT environment
  2. Compare and contrast the results from the two methods used to crack the accounts for the three passwords (each encrypted by the two hash algorithms). Show their benefits. You can make certain conclusions that help your company’s cybersecurity posture after using these methods.
  3. Explain to the director of IT and the members of the board that the healthcare organization’s anti-virus software will detect password cracking tools as malware. Also explain how this impacts the effectiveness of testing security controls like password strength. Help the leadership understand the risks and benefits of using password cracking tools, through persuasive arguments in your report and presentation. If any of the tools take longer than 4-5 minutes to guess a password, record the estimated length of time the tool anticipates to guess it.

Step 4: The Non-Technical Presentation

You now have the information you need to prepare your product for stakeholders. Based on the research and work you’ve completed in Workspace, you will develop two items: a technical report for the director of IT, and a nontechnical slide show presentation for the members of the board. You will tailor the language of your reports appropriately to the different audiences.

The nontechnical presentation: Your upper-level management team consists of technical and nontechnical leadership, and they are interested in the bottom line. You must help these leaders understand the identity management system vulnerabilities you discovered in password cracking and access control. They need to clearly see what actions they must either take or approve. The following are a few questions to consider when creating your presentation:

  1. How do you present your technical findings succinctly to a non­technical audience? Your technical report for IT will span many pages; but you will probably be afforded no more than 30 minutes or 8-10 slides for your presentation and the following discussion with leadership.
  2. How do you describe the most serious risks factually but without sounding too temperamental? No one likes to hear that their entire network has been hacked, data has been stolen, and the attackers have won. You will need to describe the seriousness of your findings while also assuring upper-level management that these are not uncommon occurrences today.
  3. How do your results affect business operations? Make sure you are presenting these very technical password cracking results in business terms upper-level management will understand.
  4. What do you propose? Management will not only want to understand what you have discovered; they will want to know what you propose as a solution.

Step 5: The Technical Report and Executive Summary

The technical report and the nontechnical presentation will identify compromises and vulnerabilities in the information systems infrastructure of the healthcare organization, and identify risks to the organization’s data. You will propose a way to prioritize these risks and include possible remediation actions.

The technical report: Provide recommendations for access control and authentication mechanisms to increase the security within the identity management system. Review the mission and organization structure of this healthcare organization. Review the roles within the organization, and recommend the accesses, restrictions, and conditions for each role. Present these in a tabular format as part of your list of recommendations.

Provide a comparison of risk scenarios to include the following:

  1. What will happen if the CIO and the leadership do nothing, and decide to accept the risks?
  2. Are there possible ways the CIO can transfer the risks?
  3. Are there possible ways to mitigate the risks?
  4. Are there possible ways to eliminate the risks?
  5. What are the projected costs to address these risks?

Provide an overall recommendation, with technical details to the director of IT.

The executive summary: In addition to your technical report, also create a nontechnical report as an executive summary.

Management Issues

SWOT analysis and 4-5 paragraphs

An integral part of the strategic planning process is to gather information. One method of doing this is by conducting a strengths, weaknesses, opportunities, and threats (SWOT) analysis. Now that you have reviewed your chosen standards, you will examine the impact of both internal and external forces on your chosen facility.

  • Conduct a SWOT analysis for your chosen facility that examines the forces that may affect the facility.
  • Be sure to pay particular attention to the issues of financing, productivity, and marketing, as well as others you feel have the potential to impact the facility.
  • Present your SWOT analysis using a standard SWOT analysis matrix.
  • Below your SWOT analysis, identify and discuss at least one issue from each section of your SWOT analysis in further detail in an effort to analyze why you feel the chosen issue may have the greatest impact on the facility.
    • When discussing your weakness and threats, be sure to include:
      • 12 goals that should be created to improve in these areas
      • A brief description (12 paragraphs) of a plan of action to improve in these areas that includes how you will accomplish the goals that you set in the first bullet point. In an action plan, there is usually a time frame, steps to how you plan to meet the goals you set, and how you will measure the goals.

Note: Use APA style to cite at least 2 scholarly sources.