What are the sustainable growth rates for your subject company over the period that you studied? What are the consequences faced by firms that grow at a rate that is not consistent with their sustainable rate?

Select a publicly held company and access the company’s Web page on the Internet to read its most recent annual report. The annual report is typically found in an “Investor Relations” or “Company Information” section within the company’s Web site. You can use this website to look up any publicly traded company’s documents for additional consideration. Complete the following:

Using the company’s financial statements, calculate and evaluate the firm’s sustainable growth rate (SGR) for the last 3 years, and summarize your findings in your paper. Be sure to address the following:

  • What are the sustainable growth rates for your subject company over the period that you studied?
  • What are the consequences faced by firms that grow at a rate that is not consistent with their sustainable rate?
  • If the firm grew at a rate above or below the SGR, how might it finance its excessive growth or reward its stockholders for the underperformance?
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Describe the organizational structure, the network system description, and a diagram of the organization. (Please insert this diagram) Include LAN, WAN, and systems in diagram format (use the OPM systems model of LAN side networks), the intra-network, and WAN side networks, the Internet. Identify the boundaries that separate the inner networks from the outside networks.

NGOKAN – ATTENTION

 

PROJECT 3 – ASSESSING INFORMATION SYSTEM VULNERABILITY AND RISK MITIGATION –

I WILL DO THE LAB, JUST NEED HELP WITH THE SAR and RAR (reports)

Intro video on the deliverables is here https://youtu.be/rStxKMeGXAI

 

Please select part of your references from this below.

http://resources.sei.cmu.edu/library/

 

SEE ATTACHED DOCUMENTS FOR READING AND REFERENCE

 

The deliverables for this project are as follows:

  1. Security Assessment Report (SAR): This should be an 8-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

2.     Risk Assessment Report (RAR): This report should be a 5-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

 

Please select part of your references from this below.

http://resources.sei.cmu.edu/library/

Pick an organization of your choice (pick from any sector, be creative)

1.     Security Assessment Report (SAR) with the following sections: please pay attention to details of the ENTIRE requirements (use figures, tables and diagrams where applicable)

 

·        Organizational Background

Describe the background of the organization you have picked

  • Purpose
    • Describe purpose of the assessment (refer to the incident of OPM below in the transcript)
  • Organizational structure

o   Describe the organizational structure, the network system description, and a diagram of the organization. (Please insert this diagram) Include LAN, WAN, and systems in diagram format (use the OPM systems model of LAN side networks), the intra-network, and WAN side networks, the Internet. Identify the boundaries that separate the inner networks from the outside networks.

o   include a description of how these platforms are implemented in your organization: common computing platforms, cloud computing, distributed computing, centralized computing, secure programming fundamentals. (cite reference)

o   What insider threats are a risk to your organization

o   differentiate between the external threats to the system and the insider threats. Identify where these threats can occur in the previously created diagrams. (cite reference)

o   Define threat intelligence, and explain what kind of threat intelligence is known about the OPM breach. Relate the OPM threat intelligence to your fictitious organization. How likely is it that a similar attack will occur at your organization?(cite reference)

  • Scope

Describe the scope of the assessment

  • Methodology (cite references)

o   Use a suite of security tools, techniques, and procedures that can be used to assess the security posture of your organization’s network in a SAR.

o   identify the security issues in your fictitious organization’s networks. You have already used password cracking tools to crack weak and vulnerable passwords.

o   Provide an analysis of the strength of passwords used by the employees in your organization. Are weak passwords a security issue for your organization?

o   examine security tool resources on firewalls and auditing–RDBMS related to the use of the Relational Database Management System (i.e., the database system and data) RDBMS. Also review these resources related to access control.

o   Determine the role of firewalls and encryption, and auditing – RDBMS that could assist in protecting information and monitoring the confidentiality, integrity, and availability of the information in the information systems.

o   Reflect any weaknesses found in the network and information system diagrams previously created, as well as in the developing SAR.

o   Which of the following types of threats and attack techniques are a risk to your organization; IP address spoofing/cache poisoning attacks, denial of service attacks (DoS), packet analysis/sniffing, session hijacking attacks, distributed denial of service attacks

o   In identifying the different threats:

1.     Identify the potential hacking actors of these threat attacks on vulnerabilities in networks and information systems and the types of remediation and mitigation techniques available in your industry, and for your organization.

2.     Identify the purpose and function of firewalls for organization network systems, and how they address the threats and vulnerabilities you have identified.

3.     Also discuss the value of using access control, database transaction and firewall log files.

4.     Identify the purpose and function of encryption, as it relates to files and databases and other information assets on the organization’s networks.

5.     Further analyze the packet capture for network performance, behavior, and any suspicious source and destination addresses on the networks.

6.     In the previously created Wireshark files, identify if any databases had been accessed. What are the IP addresses associated with that activity? Include this information in the SAR.

o   Provide possible nmap portscan findings in the SAR deliverable.

Provide analyses of the scans and any recommendation for remediation

Identify any suspicious activity and formulate the steps in an incidence response that could have been, or should be, enacted.

Include the responsible parties that would provide that incidence response and any follow-up activity. Include this in the SAR.

Please note that some scanning tools are designed to be undetectable.

While running the scan and observing network activity with Wireshark, attempt to determine the detection of the scan in progress. If you cannot identify the scan as it is occurring, indicate this in your SAR.

 

  • Data
  • Results

Compare results of wireshark and nmap in a general sense

o   INCLUDE lab report on wireshark and nmap as part of the SAR.

o   Review the information captured in these two links message and protocols and Transmission Control Protocol/Internet Protocol (TCP/IP),

o   identify any security communication, message and protocols, or security data transport methods used such as (TCP/IP), SSL, and others. Make note and mention in your reports.

 

  • Findings

o   Describe the findings in the report to include: weak authentication mechanisms; lack of a plan for life-cycle management of the information systems; lack of a configuration management and change management plan; lack of inventory of systems, servers, databases, and network devices; lack of mature vulnerability scanning tools; lack of valid authorizations for many systems, and lack of plans of action to remedy the findings of previous audits.

o   Describe some critical security practices, such as lack of diligence to security controls and management of changes to the information systems infrastructure were cited as contributors to the massive data breach in the OPM Office of the Inspector General’s (OIG) Final Audit Report, which can be found in open source searches.

o   Describe  Enterprise Architecture: Knowledge of architectural methodologies used in the design and development of information systems, including the physical structure of a system’s internal operations and interactions with other systems and knowledge of standards

o   Describe  Technology Awareness: Explore and address cybersecurity concerns, promote awareness, best practice, and emerging technology

o   Describe  Risk Management : Knowledge of methods and tools used for risk management and mitigation of risk

o   Describe  Incident Detection: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.

o   Describe  Incident Classification: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence appropriately

 

 

 

2.     Risk Assessment Report (RAR) please review requirements and use figures, tables and diagrams where applicable

·        Identify and include information on the threats, vulnerabilities, risks, likelihood of exploitation of security weaknesses, level of impact it would have on the organization and suggested remediation. (cite reference)

·        Include impact assessments for exploitation of security weaknesses, remediation, and cost/benefit analyses of remediation. (cite reference)

·        devise and include a high-level plan of action with interim milestones (POAM), in a system methodology, to remedy your findings. (cite reference)

·        Summarize the results you obtained from the vulnerability assessment tools (i.e., MBSA and OpenVas) in your report.

·        Include the OPM OIG Final Audit Report findings as a possible source for potential mitigations or possible methods to remediate vulnerabilities (cite reference)

 

Notes start here:

You have studied the OPM OIG report and found that the hackers were able to gain access through compromised credentials.

 

The security breach could have been prevented, if the Office of Personnel Management, or OPM, had abided by previous auditing reports and security findings.

In addition, access to the databases could have been prevented by implementing various encryption schemas and could have been identified after running regularly scheduled scans of the systems.

 

The security posture of the information systems infrastructure of an organization should be regularly monitored and assessed (including software, hardware, firmware components, governance policies, and implementation of security controls). The monitoring and assessment of the infrastructure and its components, policies, and processes should also account for changes and new procurements that are sure to follow in order to stay in step with ever-changing information system technologies.

Notes end here:

 

 

 

 

 

 

 

Prepare a Security Assessment Report (SAR) with the following sections:

  1. Purpose
  2. Organization
  3. Scope
  4. Methodology
  5. Data
  6. Results
  7. Findings

The final SAR does not have to stay within this framework, and can be designed to fulfill the goal of the security assessment.

Prepare a Risk Assessment Report (RAR) with information on the threats, vulnerabilities, likelihood of exploitation of security weaknesses, impact assessments for exploitation of security weaknesses, remediation, and cost/benefit analyses of remediation. Devise a high-level plan of action with interim milestones (POAM), in a system methodology, to remedy your findings. Include this high-level plan in the RAR. Summarize the results you obtained from the vulnerability assessment tools (i.e., MBSA and OpenVas) in your report.

 

 

  • 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
  • 1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.
  • 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
  • 1.4: Tailor communications to the audience.
  • 1.5: Use sentence structure appropriate to the task, message and audience.
  • 1.6: Follow conventions of Standard Written English.
  • 5.2 Enterprise Architecture: Knowledge of architectural methodologies used in the design and development of information systems, including the physical structure of a system’s internal operations and interactions with other systems and knowledge of stan
  • 5.6: Technology Awareness: Explore and address cybersecurity concerns, promote awareness, best practice, and emerging technology
  • 7.3: Risk Management : Knowledge of methods and tools used for risk management and mitigation of risk
  • 8.1: Incident Detection: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.
  • 8.2: Incident Classification: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence appropriately.

VIDEO Transcript

You are an Information Assurance Management Officer, IAMO, at an organization of your choosing. One morning, as you’re getting ready for work, you see an email from Karen, your manager. She asks you to come to her office as soon as you get in. When you arrive to your work, you head straight to Karen’s office. “Sorry for the impromptu meeting,” she says, “but we have a bit of an emergency. There’s been a security breach at the Office of Personnel Management.” We don’t know how this happened, but we need to make sure it doesn’t happen again, says Karen. You’ll be receiving an email with more information on the security breach. Use this info to assess the information system vulnerabilities of the Office of Personnel Management.

At your desk, you open Karen’s email. She’s given you an OPM report from the Office of the Inspector General, or OIG. You have studied the OPM OIG report and found that the hackers were able to gain access through compromised credentials. The security breach could have been prevented, if the Office of Personnel Management, or OPM, had abided by previous auditing reports and security findings. In addition, access to the databases could have been prevented by implementing various encryption schemas and could have been identified after running regularly scheduled scans of the systems. Karen and the rest of the leadership team want you to compile your findings into a Security Assessment Report or SAR. You will also create a Risk Assessment Report, or RAR, in which you identify threats, vulnerabilities, risks, and likelihood of exploitation and suggested remediation.

END OF TRANSCRIPT

 

The security posture of the information systems infrastructure of an organization should be regularly monitored and assessed (including software, hardware, firmware components, governance policies, and implementation of security controls). The monitoring and assessment of the infrastructure and its components, policies, and processes should also account for changes and new procurements that are sure to follow in order to stay in step with ever-changing information system technologies.

The data breach at the Office of Personnel Management (OPM) is one of the largest in US government history. It provides a series of lessons learned for other organizations in industry and the public sector. Some critical security practices, such as lack of diligence to security controls and management of changes to the information systems infrastructure were cited as contributors to the massive data breach in the OPM Office of the Inspector General’s (OIG) Final Audit Report, which can be found in open source searches. Some of the findings in the report include: weak authentication mechanisms; lack of a plan for life-cycle management of the information systems; lack of a configuration management and change management plan; lack of inventory of systems, servers, databases, and network devices; lack of mature vulnerability scanning tools; lack of valid authorizations for many systems, and lack of plans of action to remedy the findings of previous audits.

The breach ultimately resulted in removal of OPM’s top leadership. The impact of the breach on the livelihoods of millions of people is ongoing and may never be fully known. There is a critical need for security programs that can assess vulnerabilities and provide mitigations.

There are 10 steps that will lead you through this project. You should complete Project 3 during Weeks 2-5. After beginning with the workplace scenario, continue to Step 1: “Organizational Background.”

When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.

  • 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment.
  • 1.2: Develop coherent paragraphs or points to be internally unified and function as part of the whole document or presentation.
  • 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
  • 1.4: Tailor communications to the audience.
  • 1.5: Use sentence structure appropriate to the task, message and audience.
  • 1.6: Follow conventions of Standard Written English.
  • 5.2 Enterprise Architecture: Knowledge of architectural methodologies used in the design and development of information systems, including the physical structure of a system’s internal operations and interactions with other systems and knowledge of stan
  • 5.6: Technology Awareness: Explore and address cybersecurity concerns, promote awareness, best practice, and emerging technology
  • 7.3: Risk Management : Knowledge of methods and tools used for risk management and mitigation of risk
  • 8.1: Incident Detection: Demonstrate the abilities to detect, identify, and resolve host and network intrusion incidents.
  • 8.2: Incident Classification: Possess knowledge and skills to categorize, characterize, and prioritize an incident as well as to handle relevant digital evidence appropriately.

 

Step 1 Organizational Background

Describe the background of your organization, including the purpose, organizational structure, the network system description, and a diagram of the organization. Include LAN, WAN, and systems in diagram format (use the OPM systems model of LAN side networks), the intra-network, and WAN side networks, the inter-net. Identify the boundaries that separate the inner networks from the outside networks.

Take time to click on and read about the following computing platforms available for networks, then include a description of how these platforms are implemented in your organization:

  • common computing platforms
  • cloud computing
  • distributed computing
  • centralized computing
  • secure programming fundamentals

This information can be fictitious, or modeled from existing organizations. Be sure to cite references.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Evaluate and explain inconsistency between customer satisfaction scores and profitability and why it tends to exist in health care organizations.

Unit 3 IP

This MUST Be Plagiarism Free

Assignment Description:

 

A reputable hospital has high quality ratings from patient satisfaction surveys but is still losing market share. For many years, health care organizations, as well as traditional businesses, have been frustrated that high customer satisfaction scores do not necessarily lead to higher levels of profitability or sales.

Prepare a report examining this phenomenon that address the following elements:

  • Evaluate and explain inconsistency between customer satisfaction scores and profitability and why it tends to exist in health care organizations.
  • Apply the statistical procedures discussed in class to support (or refute) the inconsistency.
  • Assess price vs. quality of services as well as the impact of insurance or managed care contracts on a hospital’s market share, regardless of patient satisfaction levels.
  • Explain how you could use high patient satisfaction results to your advantage when negotiating a new managed care contract for the hospital. Discuss ethical issues involved when presenting results.
  • Discuss how qualitative and quantitative data can be used to help this hospital improve market share.

The body of the resultant report should be 5–7 pages and include at least 5 relevant peer-reviewed academic or professional references published within the past 5 years.

 

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Write a 1,050-word report on the company you selected in Week 3, following up on the Individual Assignment of Week 3 (Environmental Scanning), and address the following: Strategy Implementation Discuss International Strategy. Discuss Strategic Implementation. Explain the influence of Governance and Ethics. Discuss the Company Social Value. Discuss Innovation and Diversification. Discuss Legal limitations.

Strategy Implementation, Evaluation and Control

 

Purpose of Assignment 

Weeks 3, 4 and 5 Individual Assignments are integrated to generate a Strategic Management Plan. This is part three of the three part Strategic Management Plan addressing strategy implementation, evaluation and control. The purpose of the Week 5 individual assignment is to allow the student to discuss and explain how the strategies discussed in prior weeks are converted into implementation activities both domestically and internationally, in alignment with legal, social and ethical considerations. Furthermore, the student has an opportunity to explain and discuss how the strategic plan and implementation activities will be monitored.

Weeks 3, 4, and 5 Individual Assignments are integrated to generate a Strategic Management Plan. This is Part 3 of the three part Strategic Management Plan.

Assignment Steps

Write a 1,050-word report on the company you selected in Week 3, following up on the Individual Assignment of Week 3 (Environmental Scanning), and address the following:

  • Strategy Implementation
    • Discuss International Strategy.
    • Discuss Strategic Implementation.
    • Explain the influence of Governance and Ethics.
    • Discuss the Company Social Value.
    • Discuss Innovation and Diversification.
    • Discuss Legal limitations.
  • Evaluation and Control
    • Explain Strategic Metrics.
    • Discuss Key Financial Ratios. 

Cite at least 3 scholarly references.

Format your paper consistent with APA guidelines

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Forty-five percent of the chocolate we consume in the United States and in the rest of the world is made from cocoa beans grown and harvested on farms in the Ivory Coast, a small nation on the western coast of Africa. Few realize that a portion of the Ivory Coast cocoa beans that goes into the chocolate we eat was grown and harvested by slave children. The slaves are boys between 12 and 16—but sometimes as young as 9—who are kidnapped from villages in Explore the Concept on mythinkinglab.com

Forty-five percent of the chocolate we consume in the

United States and in the rest of the world is made from cocoa

beans grown and harvested on farms in the Ivory Coast,

a small nation on the western coast of Africa. Few realize

that a portion of the Ivory Coast cocoa beans that goes into

the chocolate we eat was grown and harvested by slave children.

The slaves are boys between 12 and 16—but sometimes

as young as 9—who are kidnapped from villages in

Explore the Concept on

mythinkinglab.com

ETHICS AND BUSINESS 65

surrounding nations and sold to the cocoa farmers by traffickers.

The farmers whip, beat, and starve the boys to force

them to do the hot, difficult work of clearing the fields,

harvesting the beans, and drying them in the sun. The boys

work from sunrise to sunset. Some are locked in at night in

windowless rooms where they sleep on bare wooden planks.

Far from home, unsure of their location, unable to speak the

language, isolated in rural areas, and threatened with harsh

beatings if they try to get away, the boys rarely attempt to

escape their nightmare situation. Those who do try are usually

caught, severely beaten as an example to others, and

then locked in solitary confinement. Every year unknown

numbers of these boys die or are killed on the cocoa farms

that supply our chocolate.

The plight of the enslaved children was first widely

publicized at the turn of the twenty-first century when

True Vision, a British television company, took videos

of slave boys working on Ivory Coast farms and made a

documentary depicting the sufferings of the boys. In September

2000, the documentary was broadcast in Great

Britain, the United States, and other parts of the world.

The U.S. State Department, in its Year 2001 Human

Rights Report , estimated that about 15,000 children from

the neighboring nations of Benin, Burkina Faso, Mali,

and Togo had been sold into slavery to labor on Ivory

Coast farms. The International Labor Organization reported

on June 11, 2001 that child slavery was indeed

“widespread” in Ivory Coast and a Knight-Ridder newspaper

investigation published on June 24, 2001 corroborated

the use of slave boys on Ivory Coast cocoa farms.

In 2006, The New York Times reported that child slavery

continued to be a problem in West Africa. In 2007, BBC

News published several stories on the “thousands” of children

who were still working as slaves on cocoa farms in

Ivory Coast. Fortune Magazine in 2008 reported that slavery

in the Ivory Coast was still a continuing problem, and

a BBC documentary entitled Chocolate: The Bitter Truth ,

broadcast on March 24, 2010, a decade after the use of

slave boys in the chocolate industry was first revealed,

showed young boys were still being used as slaves on the

cocoa farms of the Ivory Coast.

Although slavery is illegal in the Ivory Coast, the

law is poorly enforced. Open borders, a shortage of enforcement

officers, and the willingness of local officials to

accept bribes from people trafficking in slaves, all contribute

to the problem. In addition, prices for cocoa beans in

global markets have been depressed most years since 1996.

As prices declined, the already impoverished cocoa farmers

turned to slavery to cut their labor costs. Although prices

began to improve during the early years of the twenty-first

century, cocoa prices fell again in 2004 and remained low

until the summer of 2010 when they again began to rise.

The poverty that motivated many Ivory Coast cocoa

farmers to buy children trafficked as slaves was aggravated

by other factors besides low cocoa prices. Working on isolated

farms, cocoa farmers cannot communicate among

themselves nor with the outside world to learn what cocoa

is selling for. Consequently they are at the mercy of local

middlemen who drive out to the farms, buy the farmers’

cocoa for half of its current market price, and haul it away

in their trucks. Unable to afford trucks themselves, the

farmers must rely on the middlemen to get their cocoa to

market.

Chocolate is a $13 billion industry in the United

States which consumes 3.1 billion pounds each year. The

names of the four largest U.S. chocolate manufacturers—

all of whom use the morally “tainted” cocoa beans from the

Ivory Coast in their products—are well known: Hershey

Foods Corp. (maker of Hershey’s milk chocolate, Reeses,

and Almond Joy), M&M Mars, Inc. (maker of M&Ms,

Mars, Twix, Dove, and Milky Ways), Nestlé USA, (maker

of Nestlé Crunch, Kit Kat, Baby Ruth, and Butterfingers),

and Kraft Foods (which also uses chocolate in its baking

and breakfast products). Less well known, but a key part

of the industry, are the names of Archer Daniels Midland

Co., Barry Callebaut, and Cargill Inc., all of whom serve as

middlemen who buy the beans from the Ivory Coast, grind

and process them, and then sell the processed cocoa to the

chocolate manufacturers.

While all the major chocolate companies used beans

from Ivory Coast farms, a portion of which relied on

the labor of enslaved children, many smaller companies

avoided using chocolate made from Ivory Coast beans and

instead turned to using chocolate processed from “untainted”

beans grown in other parts of the world. These

companies include: Clif Bar, Cloud Nine, Dagoba Organic

Chocolate, Denman Island Chocolate, Gardners Candies,

Green and Black’s, Kailua Candy Company, Koppers

Chocolate, L.A. Burdick Chocolates, Montezuma’s Chocolates,

Newman’s Own Organics, Omanhene Cocoa Bean

Company, Rapunzel Pure Organics, and The Endangered

Species Chocolate Company. Other small companies

turned to using fair trade chocolate and organic chocolate

because these are made from beans grown on farms that

are regularly monitored and so they, too, are made from

untainted beans.

That many farmers in the Ivory Coast use slave boys

to farm their cocoa beans was already known to American

chocolate-makers when media reports first began publicizing

the issue. In 2001, the Chocolate Manufacturers

Association, a trade group of U.S. chocolate manufacturers

(whose members include Hershey, Mars, Nestlé, and

others), admitted to newspapers that they had been aware

of the use of slave boys on Ivory Coast cocoa farms for

some time. Pressured by various antislavery groups, the

Chocolate Manufacturers Association stated on June 22,

2001 that it “condemned” “these practices” and agreed to

fund a “study” of the situation.

66 BASIC PRINCIPLES

On June 28, 2001, U.S. Representative Eliot Engel

sponsored a bill aimed at setting up a labeling system

that would inform consumers whether the chocolate they

were buying was “slavefree,” i.e., guaranteed not to have

been produced by slave children. The measure passed the

House of Representatives by a vote of 291 to115. Before

a measure can become law, however, both the House of

Representatives and the Senate must approve it. U.S.

Senator Tom Harkin therefore prepared to introduce the

same bill in the Senate. Before the Senate could consider

the bill, the U.S. chocolate industry—led by Mars, Hershey,

Kraft Foods and Archer Daniels Midland and with

the help of lobbyists Bob Dole and George Mitchell—

mounted a major lobbying effort to fight the “slave-free”

labeling system. The companies argued that a labeling system

would not only hurt their own sales, but in the long

run could hurt poor African cocoa farmers by reducing

their sales and lowering the price of cocoa which would

add to the very pressures that led them to use slave labor

in the first place. As a result of the industry’s lobbying,

the “slave-free” labeling bill was never approved by the

Senate. Nevertheless, Representative Engel and Senator

Harkin threatened to introduce a new bill that would prohibit

the import of cocoa produced by slave labor, unless

the chocolate companies voluntarily eliminated slave labor

from their production chains.

On October 1, 2001, the members of the Chocolate

Manufacturers Association and the World Cocoa

Foundation, caught in the spotlight of media attention,

announced that they intended to put in place a system

that would eliminate “the worse forms of child labor” including

slavery. In spring of 2002, the Chocolate Manufacturers

Association and the World Cocoa Foundation

as well as the major chocolate producers—Hershey’s,

M&M Mars, Nestle, and World’s Finest Chocolate—and

the major cocoa processors—Blommer Chocolate, Guittard

Chocolate, Barry Callebaut, and Archer Daniels

Midland—all signed an agreement to establish a system

of certification that would verify and certify that the

cocoa beans they used were not produced by the use of

child slaves. Known as the “Harkin-Engel Protocol,”

the agreement also said the chocolate companies would

fund training programs for cocoa bean farmers to educate

them about growing techniques while explaining the importance

of avoiding the use of slave labor. The members

of the Chocolate Manufacturers Association also agreed

to “investigate” conditions on the cocoa farms and establish

an “international foundation” that could “oversee and

sustain efforts” to eliminate child slavery on cocoa farms.

In July, 2002, the first survey sponsored by the Chocolate

Manufacturers Association concluded that some 200,000

children—not all of them slaves—were working in hazardous

conditions on cocoa farms and that most of them

did not attend school.

Unfortunately, in 2002, Ivory Coast became

embroiled in a civil war that continued until an uneasy

peace was established in 2005 and finalized in 2007; rebel

forces, however, continued to control the northern half

of the country. Reports claimed that much of the money

funding the violence of both the government and rebel

groups during these years came from sales of cocoa, and

that buyers of “blood chocolate” from Ivory Coast were

supporting this violence.

The 2005 deadline the major chocolate companies

and their associations had set, came, and passed without the

promised establishment of a certification system to ensure

beans were not being produced by slave children. At this

point, the chocolate companies amended the protocol to

give themselves more time by extending their own deadline

to July, 2008, saying that the certification process had

turned out to be more difficult than they thought it would,

particularly with the outbreak of a civil war. Although the

companies did not establish a certification system while

the civil war raged, however, they did manage to secure

enough cocoa beans to keep their chocolate factories going

at full speed throughout the war.

By early 2008, the companies had still not started

work on establishing a certification system or any other

method of ensuring that slave labor was not used to produce

the cocoa beans they used. The companies issued a

new statement in which they extended to 2010 the deadline

for complying with their promise to establish a certification

system. According to the companies, they had

been investing several million dollars a year into a foundation

that was working on the problem of child labor.

However, an investigative reporter, in an article published

in Fortune Magazine on February 15, 2008, found the

foundation had only one staff member working in Ivory

Coast. The activities of the staff member were limited

to giving “sensitization” workshops to local people during

which he would explain that child labor is a bad thing.

The foundation was also helping a shelter that provided

housing and education to homeless street children. The

reporter found no signs of work being done on a certification

system. By now the monitoring systems used in

the fair trade and organic parts of the industry had been

functioning for several years, yet the larger companies operating

in Ivory Coast seemed unable or uninterested in

learning from their example.

The existence of a large and well-organized system

for trafficking children from surrounding countries onto

Ivory Coast farms was once against demonstrated on June

18, 2009. On that date INTERPOL, the international

police organization, carried out a series of raids of several

farms believed to harbor slave children and managed to

rescue 54 children. Aged between 11 and 16, the children

had been working 12 hours a day for no salary; many were

regularly beaten and none had received any schooling. In

ETHICS AND BUSINESS 67

a public statement, INTERPOL estimated that “ hundreds

of thousands of children are working illegally in the

plantations.”

On September 30, 2010, the Payson Center at

Tulane University issued a report on the progress that

had been made on the certification system the chocolate

industry in 2002 had promised to establish, as well

as on the progress the industry had made regarding its

promise to eliminate “the worse forms of child labor,”

including child slavery, on the farms from which the industry

sourced its cocoa. The report was commissioned

by the United States Department of Labor who had been

asked by Congress to assess progress on the “Harkin-

Engel Protocol,” and who gave Tulane University an

initial grant of $4.3 million in 2006, and an additional

$1.2 million in 2009 to compile the report. According to

the report, “Industry is still far from achieving its target

to have a sector-wide independently verified certification

process fully in place . . . by the end of 2010.” The

report found that between 2002—the date of the original

agreement—and September 2010, the Industry had

managed to contact only about 95 (2.3 percent) of Ivory

Coast’s cocoa farming communities, and that to complete

its “remediation efforts” it would have to contact an additional

3,655 farm communities. While the Tulane group

“confirmed” that forced labor was being used on the cocoa

farms, it also found that no industry efforts to “remediate”

the use of forced labor “are in place.”

Not surprisingly, the problem of certification still

remained unresolved in 2011. After the media attention

had died down, the manufacturers and distributors buying

Ivory Coast cocoa beans seemed incapable of finding

a way to “certify” that slavery was not used to harvest

the beans they purchased. Representatives of the chocolate

companies argued that the problem of certification

was difficult because there are more than 600,000 cocoa

farms in Ivory Coast; most of them small family farms

located in remote rural regions that are difficult to reach

and that lack good roads and other infrastructure. Critics,

however, pointed out that these difficulties did not seem

to pose any obstacles to obtaining beans from these many

scattered cocoa farms. Cocoa bean farmers, poor and buffeted

by the low price of cocoa beans, continued to use enslaved

children although they were secretive about it. To

make matters worse, on February 2011, fighting between

the rebels in the north and the Ivory Coast government

in the south again broke out for a brief period in a dispute

over who was the legitimate winner of the 2010 presidential

election. The fighting ended in April 2011 when one

of the candidates finally conceded the election, allowing

Allassane Ouattara to be declared the legitimate president.

In 2010 another film, this one entitled The Dark

Side of Chocolate, once more documented the continuing

use of enslaved children on Ivory Coast farms, although

representatives of the chocolate companies interviewed

in the film denied the problem or claimed they did not

know anything about it. The beans tainted by the labor

of slave boys are therefore still being quietly mixed together

in bins and warehouses with beans harvested by

free paid workers, so that the two are indistinguishable.

From there they still make their way into the now

tainted chocolate candies that Hershey’s, M&M Mars,

Nestle and Kraft Foods make and that we buy here and

in Europe. Without an effective system of certification, in

fact, virtually all the chocolate we eat that is made from

West African (Ivory Coast and Ghana) cocoa contains a

portion of tainted chocolate made from beans harvested

by enslaved children.

 

 

Questions

 

 

1. What are the systemic, corporate, and individual

ethical issues raised by this case?

2. In your view, is the kind of child slavery discussed in

this case absolutely wrong no matter what, or is it only

relatively wrong, i.e., if one happens to live in a society

(like ours) that disapproves of child slavery? Explain

your view and why you hold it.

3. Who shares in the moral responsibility for the slavery

occurring in the chocolate industry?

4. Consider the bill that Representive Engle and Senator

Harkin attempted to enact into a law, but which

never became a law because of the lobbying efforts

of the chocolate companies. What does this incident

show about the view that “to be ethical it is enough for

 

businesspeople to follow the law”?

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Create a report that describes and critically analyzes at least 5 contemporary best practices to improve customer loyalty in a health care organization. Be sure to discuss the (multiple) benefits that loyal, repeat customers offer to health care organizations.

Toggle navigation

Assignment

Skip Navigation

Type:  Individual Project
Due Date:  Tue, 4/4/17
Points Possible:  100
Points Earned: 0
Deliverable Length:  5-7 pages; minimum 5 academic/professional references published in last 5 yrs
You have been hired as an outside consultant for a large durable medical equipment and medical supply company. The company specializes in a wide range of medical supplies and equipment. Some of its most profitable offerings include hospital bed rental to private residents, wheelchairs, walkers, scooter and other mobility equipment. However, they have come to realize that competition is increasing and market share is getting tight. They note that most of their customers are new costumers and very few are repeat customers. They are concerned with customer loyalty. The medical supply company owner has asked you to train develop a plan to improve customer loyalty and train the staff.

  • Create a report that describes and critically analyzes at least 5 contemporary best practices to improve customer loyalty in a health care organization.
  • Be sure to discuss the (multiple) benefits that loyal, repeat customers offer to health care organizations.
  • Develop and defend at least 4 recommendations for the medical supply company based on your research on how to improve customer loyalty. Include a brief overview of how each recommendation would be implemented at the company.
  • Develop an initial training plan for the company relative to 1 recommendation, explaining expected results in terms of staff and customer outcomes.

The body of the resultant paper should be 5-7 pages and include at least 5 relevant peer-reviewed academic or professional references published within the past 5 years.

For a resource guide on using the online library to search for references, please click here.

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Your assignment will be graded in accordance with the following criteria. Click here to view the grading rubric.

There is no additional information to display at this time.

 Legend

  • Extra Credit
  • View Assignment Rubric
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Write a 1,400- to 1,750-word paper in which you provide evidence of how this CRM program was implemented. Include the following in your response: · Distinguish between various team concepts as they relate to performance during and after this training program.

Based on the CRM work you have done throughout this course, you are now called on to act as a consultant to apply your knowledge to other industries that have an existing CRM program that would be beneficial to employees and organizations to reduce human error and improve employee efficiency.

 

Select one agency that employs a CRM program.

 

Research how this agency employed a CRM program in a similar or different way than was identified in the aviation article from Week 2.

 

Write a 1,400- to 1,750-word paper in which you provide evidence of how this CRM program was implemented. Include the following in your response:

 

·         Distinguish between various team concepts as they relate to performance during and after this training program.

 

·         Explain the difference between leaders and managers, as well as the influence and power they may have on the success of this program.

 

·         Evaluate at least two theories of leadership and the role that leaders utilizing these theories play in facilitating this program.

 

·         Analyze the general effects on the organization that may result from this program, referencing the concepts of organizational development and various organizational theories.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Identify the theme of the poem. How do you know this is the theme? Define the poetic devices (e.g., rhythm, figurative language, etc.) used in the poem. Offer at least two examples. Analyze how these poetic devices contribute to the development of the poem’s message. Support your ideas with textual details and analyses.

Asignment1

Prior to beginning your initial post, read the poems “We Real Cool” and “My Papa’s Waltz” in your textbook. You are also required to listen to “We Real Cool” and “My Papa’s Waltz” before completing this discussion. These clips demonstrate the importance of performance, rhythm, and musicality in the poetic form.

http://www.poetryarchive.org/poem/my-papas-waltz

https://www.poets.org/poetsorg/poem/we-real-cool

Poetry is a literary form that can offer readers a different experience based on whether the poem is read silently, read aloud, or simply listened to when read by someone else. For example, you might hear a certain rhythm or change of pace that you might not catch when simply reading the poem silently to yourself. For this week’s discussion, you read and listened to poetry. If you didn’t the first time, read and listen with careful eyes and ears so you can respond thoughtfully to the two parts of the discussion this week.

Part One – Answer the following questions about one of the poems based on your reading of them:

  • Identify the theme of the poem. How do you know this is the theme?
  • Define the poetic devices (e.g., rhythm, figurative language, etc.) used in the poem. Offer at least two examples.
  • Analyze how these poetic devices contribute to the development of the poem’s message.
  • Support your ideas with textual details and analyses.

Part Two – Describe your listening experience of the same poem you wrote about above. If you are unable to listen to these poems due to an auditory impairment, please reach out to your instructor for an alternative prompt for this discussion. Respond to at least two of the following questions:

  • How did hearing the poem recited aloud compare to a silent reading of it?
  • Did the performance highlight certain words or phrases that were not as apparent in a silent reading?
  • Did the pace change and, if so, how did it change your understanding of the poem?
  • Did words have different connotations when spoken aloud, and, if so, what kind(s) of connotation did you associate with the poem?
  • Do you think reading poetry aloud is a worthwhile endeavor when analyzing it? Why, or why not?

 

 

Assignment 2

First, read the information on the Ashford Writing Center’s web page, Thesis Statements. Then, read the ENG125 Sample Literary Analysis. Pay close attention to the body paragraphs and thesis statements.

Compare your working thesis statement to the thesis statement in the Sample Literary Analysis. Does your thesis address relevant points like the example thesis? Then, look at a body paragraph in the Sample Literary Analysis. Compare its construction to a body paragraph in your own paper.

 

Post your working thesis and your strongest body paragraph into the discussion by Thursday (Day 3) at midnight; do not attach it as a separate document. For the purposes of this discussion only, signify your working thesis by including it in bold type and italicize the topic sentence of your body paragraph. Your body paragraph should include at least three examples of paraphrases and/or quotations (there should be at least one of each) with correct citations in APA format. After the body paragraph, be sure to include reference page citations for the paraphrased and cited sources. Then, in a separate paragraph, answer the following three questions:

  • Explain the connection between the topic sentence and your working thesis. Would this connection be clear to someone without your explanation? If so, why? If not, how can you modify your topic sentence and/or thesis statement to make this connection more clear?
  • Explain the choice of reference material. How do the references support the topic sentence? Would this connection be clear to someone without your explanation? If so, why? If not, what information should you add to the paragraph to make this connection more clear?
  • Does the paragraph contain any unnecessary information? Does everything in it work to support the topic sentence? What information could be added or removed? In essence, you are being asked to evaluate the cohesion of your paragraph.
  • Note any other specific challenges faced or successes experienced when writing this paragraph or completing this discussion post.
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Question 1 4 / 4 pts When a company borrows cash from a bank, which of the following will occur? An increase to cash A decrease to accounts receivable A decrease to notes payable An increase to owners’ capital

Question

Question 1

4 / 4 pts

When a company borrows cash from a bank, which of the following will occur?

An increase to cash

A decrease to accounts receivable

A decrease to notes payable

An increase to owners’ capital

Question 2

4 / 4 pts

Which of the following assets is assumed to have an unlimited useful life?

Furniture

Land

Machinery

Building

Question 3

4 / 4 pts

The primary responsibility for setting the rules of accounting rests with the:

Financial Accounting Standards Board (FASB).

American Institute of CPAs (AICPA)

Generally Accepted Accounting Principles (GAAP)

Security and Exchange Commission (SEC)

Question 4

4 / 4 pts

Which financial statement includes only those activities that result in cash changing hands during the period?

Statement of cash flows

Income statement

Balance sheet

Statement of owner’s equity

Question 5

4 / 4 pts

The income statement reports:

Only sales amounts paid in cash

The financial position on a particular date

Net income or loss for the period

Revenues, assets and expenses

Question 6

4 / 4 pts

Expenses are:

Incurred only when cash is paid

Costs incurred to generate revenues

Increases to owner’s equity

Recorded as credits in journal entries.

Question 7

4 / 4 pts

Which of the four basic financial statements provides a snapshot of the business on a particular day?

Balance sheet

Statement of owner’s equity

Income statement

Statement of cash Flows

Question 8

4 / 4 pts

For external financial reporting GAAP requires use of:

Either cash basis or accrual basis accounting

Accrual basis accounting

Cash basis accounting

Credit basis accounting

Question 9

4 / 4 pts

The statements of financial accounting standards and other authoritative pronouncements that define what constitutes acceptable accounting practice for financial reporting are collectively referred to as:

SEC

GAAP

FASB

SFAS

Question 10

4 / 4 pts

Which depreciation method produces an equal amount of depreciation each period?

Declining-balance

Straight-line

Units-of-production

Weighted Average

Question 11

4 / 4 pts

Financial information that is __________ ensures that it is unbiased and verifiable.

relevant

comparable

consistent

reliable

Question 12

4 / 4 pts

Amortization:

Is another term for depreciation of fixed assets

Can be used to expense the cost of intangible assets with unlimited lives.

Is an accelerated depreciation method

Is a method used to allocate the cost of an intangible asset over its limited useful life

Question 13

4 / 4 pts

Terms for the left and right side of an account are known as:

Positive/Negative

Up/Down

Debit/Credit

Increase/Decrease

Question 14

4 / 4 pts

Activities involving the purchase and sale of long-term assets as well as other major items used in a business’s operation are referred to as:

Financing activities

Planning activities

Operating activities

Investing activities

Question 15

4 / 4 pts

A debit is:

A decrease in an account.

The left side of a T-account

An increase in an account

The right side of a T-account

Question 16

4 / 4 pts

Which inventory costing method assigns the earliest units received to cost of goods sold?

Weighted average

Specific identification

LIFO

FIFO

Question 17

4 / 4 pts

Which of the following statements is true?

Double-entry accounting systems have existed for at least 2,000 years

Before the advent of a money economy, the double-entry accounting system was not feasible

The double-entry accounting system came about as a result of the Great Depression

Accounting systems developed in the 18thcentury because, by then, most people were literate

Question 18

4 / 4 pts

The organization responsible for setting U.S. external financial reporting practice is the:

Financial Accounting Standards Board

American Institute of Certified Public Accountants

Federal Government

Securities and Exchange Commission

Question 19

4 / 4 pts

When sales are made on account, which of the following will occur?

Accounts receivable will increase

Cash will increase

Accounts payable will decrease

Revenues will decrease

Question 20

4 / 4 pts

Which of the following is not one of the four basic financial statements?

Balance sheet

Accounting equation

Statement of cash flows

Income statement

Question 21

4 / 4 pts

When expenses are incurred, what is the effect on the accounting equation?

Assets will increase

Owner’s equity will increase

Liabilities will decrease

Owner’s equity will decrease

Question 22

4 / 4 pts

When faced with uncertainty about the amount at which assets and liabilities should be recorded, accountants should follow which principle, in order to avoid misleading users of financial statements?

Consistency

Conservatism

Comparability

Continuity

Question 23

4 / 4 pts

Resources a business owns are called:

Liabilities

Assets

Revenues

Owner’s equity

Question 24

4 / 4 pts

An account with the word “prepaid” in the title is a(n):

Expense

Liability

Liability

Asset

Question 25

4 / 4 pts

Which of the following is an example of a liability account?

Prepaid Rent

Unearned Revenue

Equipment

Inventory

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"