Michael Barzelay have published various books like Breaking through Bureaucracy

Michael Barzelay have published various books like Breaking through Bureaucracy: A new vision for managing in government, the new public management: improving research and policy dialogue. His research is concerned about making management field into design science. He has extensively written about this in his books and talked about it in conferences. His work focuses on European commission’s supervision of financial management of spending programmes by European union and other member states. His main contribution is in the book Preparing for the future. His ideology of science in public administration is mentioned in his book The new public management : improving research and policy dialogue

Mock Counseling Session

Mock Counseling Session

John Doe

University of Central Florida

Abstract

Professional counseling can be very beneficial to one’s health and well-being. Counseling is used to help clients with change, prevention, or life enhancement. Unfortunately, many people are unaware of the potential benefits and complexity of true counseling. There are many theories and methods which are used to treat clients and regardless of the counselors preferred method they must be trained sufficiently at conducting counseling sessions and interviews. A mock clinical diagnostic interview was conducted with a mock-client and many important skill sets learned through the course were utilized. The counseling session is guided by both non-verbal communication and verbal communication. Active listening and understanding of the clients presenting issues guided the mock session.

The cosmic amount of different theoretical orientations and techniques used by psychotherapists can be overwhelming. The styles are constantly changing as new findings come out. Even psychodynamic theory, which is one of the oldest known theories and links back to Sigmund Freud, has been altered in certain cases to a more contemporary method which is “less dogmatic, more flexible and integrative, supported by evidence, more pragmatic, highly attentive to relational needs, less hierarchical and applicable to a wide range of clinical problems with vulnerable populations” (Bliss & Rasmussen, 2013). The varieties of techniques are ideal for certain situations and a counselor must pick and choose depending on their clients’ needs. Cognitive-behavioral therapy, behavioral theory, humanistic theory, existential theory, and eclecticism theory are just some examples of different styles employed in psychotherapy and are certainly dissimilar to each other.

Counseling has an impressive length of history and can be traced back to the Enlightenment period. Counseling is not necessarily a hard science in a sense because the lack of one specific guideline. According to the American Counseling Association, professional counseling is “the application of mental health, psychological and human development principles through cognitive, affective, behavioral and systematic intervention strategies, which address wellness, personal growth, and career development, as well as pathology” (Kaplan, Tarvydas, & Gladding, 2014). Counseling has many different specialties each suited for different scenarios. However, a common goal of all counseling is to help the client with change, prevention, or life enhancement (Hackney & Cormier, 2013). Unfortunately, many people that could benefit from counseling fail to give it a try due to cultural reasons, bias reasons, or simply are intimidated by the whole process. Some individuals might fear that seeking counseling would damage their family’s reputation due to strong stigma by close others, which might result in the individuals’ development of negative attitudes toward seeking professional help and a lack of willingness to seek counseling (Choi & Miller, 2014).

A mock clinical diagnostic interview was conducted to practice using the skills learned for counseling throughout the course. The interviewing process takes hundreds of times to fully master it and this was my initial interview. Probing is important in the clinical diagnostic interview and when a client states something with an imperative meaning the investigation should be made to further dissect the potential problems. Base lines of questions have been set forth to ask the client but are not meant to be strictly followed but rather as a dedicated guideline. Inferences based on what the client articulates should be given in detail by the client and redundancy should be avoided in the interview.

The counseling intake interview I would be performing is a very important process. “Intake interviews, as part of the assessment phase of counseling, gather information about the client’s reasons for seeking counseling, current and past functioning, social history and interpersonal style, and goals for counseling” (Mears, 2009). First impressions are vital while trying to establish a relationship with the client. If the client feels too uncomfortable with the therapist for any reason proper treatment may not be available or the client could even choose not to continue the counseling process. In this primary interview conducting a good starting rapport with the client will be the main goal along with deciding which psychotherapy technique to use in future sessions. With further counseling down the road and a stronger relationship with the client I could then begin defining the presenting problem, identifying and setting goals, choosing and initiation interventions, and planning termination and follow-up.

Before the mock interview I prepared myself emotionally and physically. Physically, I made sure I was well groomed and would be taken seriously by the client while at the same time seem approachable and not make the client feel awkward. The goal is to make the client feel comfortable enough to open up and even something so subtle such as counselor appearance can have an effect on the mood. I also made sure the mock office was a comfortable setting and ensured there wasn’t going to be any furniture between us which could produce a psychological barrier. As for my psychological preparation, I recited the questions to be asked beforehand so it would be one fluid motion when the time arrived. I also prepared probing questions and studied some Rogerian examples as a refresher to person-centered therapy.

As my mock client walked in I stood up and greeted her. We sat down adjacent to each other and began the mock session. The communication within a counseling session is both verbal and non-verbal. I made sure to sit with an open, relaxed posture as to convey comfort with the process. I would be using the head nod at certain times to show acceptance and understanding of what the client has to say. I also was mindful of my facial expressions because it has been found that “long-held belief that counsellors must engage their clients in a meaningful and demonstrable manner as indicated by their non-verbal behavior appears to generalize to their facial expressions also” (Sharpley, Jeffrey, & Mcmah, 2006). Since the client is at the interview to express her thoughts verbally, I knew when to remain silent and when to speak. One of the most important things a counselor does is listen. The self-improvement of a client is seeking is actually within themselves and the therapist is there to help make that happen. Silence is powerful and encourages many positive effects.

Before this counseling intake interview began I dwelled into as much information on the client as possible and read all paperwork given on the client. Since the purpose of the intake interview is to gather information necessary for the evaluation and treatment of the client I made sure to take notes as we began. I was really interested to know as much as I could about the client so I had her clarify what she is like as a person and important figures within her life. I made sure to have her tell me any current complaints and any history of psychiatric problems as well. She expressed that she has a certain degree anxiety to me. Anxiety is not uncommon for her age, “mental disorders appear to be on the rise among college students and are having a significant effect on their attrition, with anxiety identified as one of the most common presenting issues” (Lindsey, 2014). The anxiety even affects some aspects of her life while lowering self-confidence and having somewhat of a negative impact on everyday things such as driving, working, and sometimes shopping. There were no visible medical complications except a lack of sleep at times due to the anxiety. This lack of sleep was very uncommon so it was not too worrisome. If there had been much sleep disturbance it could be linked to a more serious psychiatric problem as “sleep disturbance is significantly linked with an onset of major depressive disorder” (Batterham, Glozier, & Christensen, 2012). The most recent episode had been about a week ago. She said the episode seemed to increase as she gets older but could not decipher the origination or what triggers it.

While interviewing the mock client I used a variety of verbal skills used by professional counselors. I used open-ended questions, closed questions, clarification responses, reflection responses, minimal reinforcers and paraphrases. The main purpose of using these techniques is to “keep the focus on the clients, their stories, and their reactions” (Hackney & Cormier, 2013). As the interview went on she distressed a traumatic experience with an American Staffordshire Terrier when she was young, which could actually be the source of her anxiety. I then used an open-ended question to probe further into this problem. After further details I determined that this was an important life event that affects her even today so made note to follow up on this subject later on in future counseling sessions because a main goal during the intake interview is to lay the foundation for future interactions. Confronting a client too early in an emerging relationship could have devastating effects. I recited a summary statement of the traumatic event and story she told me to let her know I was actively listening.

After we had been in the interview for some time, I noticed she had resentment towards her father’s work schedule. I used a technique call the interpretation response for this and introduced a counselor-initiated interpretation. This response is used to assign meaning to a feeling that the client is having. The meaning of the feeling can then be moved in a different direction. I tried to use the information given as a question and had the client interpret the meaning. When the client interprets the meaning the therapist can either accept or modify what they have to say.

By the end of the counseling session I had probed more into the anxiety disorder the client had been describing. I suggested that there are many coping strategies that may help with the anxiety including perspective taking, communication strategies, anxiety relief tactics, diversions, self-reflection and self-help, and reviewing possible scenarios (Mortensen, 2014). I gave her the information on potential coping strategies and she agreed to come back for further testing to determine exactly what would be right for her.

In conclusion the mock clinical diagnostic interview conducted was excellent overall and helped clarify many details I was unsure of before I began. Learning about how beneficial counseling can be has given me a deep respect towards psychologists. The Professional Counselor, A Process Guide to Helping by Harold L. Hackney and Sherry Cormier really helped guide me through this mock-interview and this course as a whole. Being a counselor requires someone very knowledgeable and patient and this firsthand experience helped me appreciate the study that much more.

References

Batterham, P. J., Glozier, N., & Christensen, H. (2012). Sleep disturbance, personality and the onset of depression and anxiety: Prospective cohort study. Australian & New Zealand Journal Of Psychiatry, 46(11), 1089-1098. doi:10.1177/0004867412457997

Bliss, S., & Rasmussen, B. (2013). Reflections on contemporary psychodynamic theory in clinical social work. Journal Of Social Work Practice, 27(3), 211-215. doi:10.1080/02650533.2013.818938

Choi, N., & Miller, M. J. (2014). AAPI college students’ willingness to seek counseling: The role of culture, stigma, and attitudes. Journal Of Counseling Psychology, 61(3), 340-351. doi:10.1037/cou0000027

Hackney, H., & Cormier, L. (2013). The Professional Counselor: A Process Guide to Helping. (7th ed.) Boston: Pearson.

Kaplan, D. M., Tarvydas, V. M., & Gladding, S. T. (2014). 20/20: A Vision for the Future of Counseling: The New Consensus Definition of Counseling. Journal Of Counseling & Development, 92(3), 366-372. doi:10.1002/j.1556-6676.2014.00164.x

Lindsey, C. (2014). Trait Anxiety in College Students: The Role of the Approval Seeking Schema and Separation Individuation. College Student Journal, 48(3), 407-418.

Mears, G. (2009). Conducting an intake interview. In I. Marini, M. A. Stebnicki (Eds.) , The professional counselor’s desk reference (pp. 127-134). New York, NY, US: Springer Publishing Co.

Mortensen, R. (2014). Anxiety, work, and coping. The Psychologist-Manager Journal, 17(3), 178-181. doi:10.1037/mgr0000020

Sharpley, C. F., Jeffrey, A. M., & Mcmah, T. (2006). Counsellor facial expression and client-perceived rapport. Counselling Psychology Quarterly, 19(4), 343-356. doi:10.1080/09515070601058706

APPENDIX, TRANSCRIPT:

Therapist: Could you tell me about your childhood. What was it like growing up?

Client: Umm, I had a pretty solid upbringing. My parents stayed together and took good care of my sister and me. We moved a few different states because of my dad’s job and ended up in Florida.

Therapist: Oh?

Client: I didn’t get to keep friends for very long because of the constant moving.

Therapist: I understand that you had to move a lot as a child because of your father’s job and earlier you stated that you weren’t looking forward to seeing him during the holidays. Do you think you resent him because of the constant moving?

Client: I’m sure that has a lot to do with it. I just feel like he never made time for us.

Therapist: So you feel hurt by the fact that he was always working.

Client: Kinda, I know he loves us but I think he could have tried to spend more time with us.

Therapist: That must be very difficult for you. Is this something that you would like to address more during the course of therapy?

Client: Thanks, sure.

Therapist: Can you tell me about your relationship with your mother? What is she like as a person, and what was she like as a parent?

Client: I’m very close with my mom and in terms of the type of mother she was, she was always caring and like catering to others. Do you know what I’m talking about?

Therapist: So your mom is attentive?

Client: Yes, always putting the needs of others and the people she cares about before her own.

Therapist: Now I’d like you to describe a specific encounter with your mother, something that stands out. It can be an incident that’s typical of your relationship, really meaningful, really good, really bad, whatever comes to mind.

Client: I remember I ran off and got lost at a mall once when I was young and she searched frantically and found me despite how many people there were. I was scared and was crying and she came and comforted me.

Therapist: That must have been a chaotic time for you. Is this one of the reasons why you say she is so caring?

MMM306 Final Exam

MMM306 Final Exam

Student’s Name

Student ID Number

Question 1

Introduction

Top management teams and scholars in various fields acknowledge the challenge that globalization presents to organizations today. Businesses are keenly aware of how tough it has become to identify suitable internationalization strategies and choosing the right country to invest and do business with. Still, a majority of companies, especially multinationals corporations, have stuck to approaches that have been conventionally deployed, emphasizing the standardized strategies to new markets and the occasional experimenting with minimal local twists. Consequently, many MNCs are struggling to come up with successful approaches to enter and conquer emerging markets. Starbucks desire to venture in to the Republic of Baldokistan presents a similar scenario. The management of Starbucks must address some important considerations as it ventures into a new, international, emerging market given its unique institutional environment. By entering this market, Starbucks will see to fruition a long term plan to gain more control and bargaining power over the supply chain of raw materials essential to its global business operations. Baldokistan provides a good avenue for such a bold business venture and will support the company’s internationalization strategy.

Analysis

The international business landscape has changed significantly over the last decade following the 2008/2009 financial crisis that crippled firms and industries alike. The last three two years have also changed how international business is conducted with the prevalence of the COVID-19 pandemic. Yet, a fundamental reality is maintained that despite the volatility of emerging markets and their differing economic abilities, they are essential to the development and growth of international companies. Established MNCs have learned that winning in the emerging markets is not easy. In countries such as Baldokistan, the business environment can turn out very difficult, hard to navigate bureaucracies, and poor infrastructure may hamper an organization’s efforts to succeed. Yet, a majority of organizations such as Coca Cola have continued to dominate and succeed in these markets. For Starbucks, capturing important growth opportunities will be key to making a name for itself in a nation that remains largely untouched by the outside world. Before intense competition for raw materials and other resources emerge, Starbucks must employ its strength to control the savvy domestic players.

Starbucks will enter the Baldokistan economy via foreign direct investment (FDI) under a greenfield investment. At present, the external environment in the host country is FDI-conducive as the nation is labelled a a fast-growing emerging economy, the next golden hub of agricultural and food production business opportunities in modern Asia, and a highly adaptable country that is committed to undertaking radical social, political, and economic reforms to align itself with the leading economies in the world and actively engage with and participate in world socio-economic affairs. Further, the country is predicted to become one of the top countries in Asia in terms of ease of doing business in the next five years. These elements are important to Starbucks as they reveal stable nation, one that has the political, legal, environmental, social, cultural, and technological ability to drive the company’s internationalization agenda in Asia.

FDI in the form of business acquisitions has grown in efficiency and strategic alignment. This is an indication that the emerging economies are continuously building advanced local sectors and industries that are attractive to investment targets including MNCs. In the Greenfield approach that Starbucks intends to use in Baldokistan, creating a subsidiary to build operations from the ground up will be a welcome idea in a nation that is actively looking for investment opportunities and growth. A greenfield FDI will provide the highest form of control for Starbucks as it realizes its vision to increase its bargaining power through owning a significant portion of the raw materials supply chain. Overall, FDI will play an important role in transferring technology from the home country into thev host country.

FDI continues to be among the most important contributors of economic growth. FDI is not only a key driver of growth for an MNC but also a tool applied to enter and successfully perform in a new economy. For Starbucks in Baldokistan, FDI will generate an impact of technology as well as knowledge transfer, make significant improvements to its competitiveness, improve the productivity and long-run growth of the firm and overall boost the local economy. Yet, the effects of greenfield FDI are not universal but unique to different nations and locations depending on the situation. One benefit in the case of Baldokistan is that a positive spillover effect would grow the productivity of the domestic firms, augment domestic investments and provide a firm entry into the economy for Starbucks.

Starbucks will attain several advantages by employing a greenfield FDI approach to shape the local institutions in Baldokistan. First, the company will gain high level and high-quality control over the sale and manufacturing of products. This will set an industry pace that will allow it to leverage the technologies and knowledge and skills gained through years of operation. It will then be able to attain economies of scope and scale through the marketing, production, and research and development, a fete that other local competitors might not achieve. Years of operations and a host of partnerships around the world will enable the organization to bypass trade restrictions. By creating jobs for the local Baldokistan economy, Starbucks will control local institutions through CSR and other good will initiatives.

The industry-based view ignores the informal and formal institutions that provide competition among industries. The model sees institutions as a background. In contrast, the institution-based view of strategy focuses on the active interaction between organizations and institutions, considering strategic choices as the main outcome of the choices. In the case of Starbucks in Baldokistan, strategic choice is not only driven by the capabilities of the firm and industry conditions, but also informal and forma institutional frameworks that the firm must confront. Institutions dictate the strategy an MNC takes as it attempts to formulate or implement approaches to generate competitive advantage. The differences in institutional systems between Baldokistan, an emerging economy, and the United States, a developed world where Starbucks originates from, will force the company to pay more attention to the differences created in terms of doing business.

Recommendations

Starbucks should grow in the emerging markets by winning locally, a strategy that may be attained through the creation of competitive advantages o the basis of its size, financial capability, market dominance, marketing prowess, and research and development capabilities. Starbucks should transfer its core competencies and capabilities into Baldokistan and then gradually build profit drivers in there as it continues to increase its bargaining power. By tapping into the rural Baldokistan economy, the country will get additional penetration to offset the saturated American market.

Conclusion and Call to Action

Overall, Starbucks will see to fruition a long-term plan to gain more control and bargaining power over the supply chain of raw materials essential to its global business operations. As an emerging market, Baldokistan provides a good avenue for such a bold business venture and will support the company’s internationalization strategy. Starbucks must leverage its core competencies and advantages in terms of its size and financial muscle to create stronger competitive advantage.

Question 2

In an extension strategy, firms are open to various approaches that are all intended at creating the best environment to conduct business. One of the most important avenues is a joint venture. A joint venture provides several benefits including new insights and expertise, better resources, sharing of costs and risks, and are incredibly flexible. Cafe2Go proposed joint venture with a Malaysian firm will provide an opportunity to gain new insights and expertise. It will open up the company to business operations in a new country while hiding behind the buffer of an already experienced business partner. The firm will also reap the benefit of having an access to better resources, including specialized staff and technology, already familiar with the local culture and business operations. The proposal will only take 5 years meaning that the arrangement is by definition, temporary. Overall, the chances of success are higher as the firm is already riding with a renowned brand.

Nonetheless, an issue raised during the meeting is the protection of the firm’s intellectual or strategic assets, particularly the innovation capability of the firm through its unique technology, process and skills of running a specialty coffee shop. This innovation capability has been the foundation of the firm’s competitive advantage because it is not only valuable (V), rare (R), and organised (O) within the firm but also extremely inimitable (I). To address this issue, Cafe2Go will contribute only the amount of information and other resources that are important for the partnership. Intellectual and strategic assets will not be compromised in any way especially the innovation capability of the firm. The use of technical expertise will be protected under the agreement and will only be used to help make the venture stronger. The innovation capability of the organization will allow market penetration in Malaysia, allowing the firm to expand after the terms of the venture come to an end. Overall, the joint venture will provide access to new markets and distribution networks. increased capacity, enable sharing of risks and costs with the local partner, offer access to greater resources, and it is flexible to enable the firm to protect its strategic assets.

It is recommended that the proposed joint venture is an effective strategy that will enhance the firm’s value chain because of synergy and will likely lead to the firm’s competitive advantage in a highly competitive industry in Malaysia. The technological and innovative capability of Cafe2Go will be an important element to push the company forward in a highly competitive industry characterised by buyers’ strong bargaining power. The Malaysian market is not only very competitive but also has pressure from consumers on businesses to get higher quality products, better customer service, and at significant lower prices. Additionally, the markets substantial number of substitutes means that there are other products in other industries that provide similar benefits to consumers. Substitutes limit the potential returns in the industry by placing a ceiling on prices charged to generate profit. Cafe2Go must additionally employ its innovation capability to create competitive advantage. This will allow the joint venture to put pressure on the competition, gain more advantage, and fight the power of consumers and substitute goods in the Malaysian market.

Model Individual Winning Business Proposal for the Homeland Plastics Case

Model Individual Winning Business Proposal for the Homeland Plastics Case

Author’s Name

Institutional Affiliation

Model Individual Winning Business Proposal for the Homeland Plastics Case

To: Project Manager Date: April 27, 2012

From: [Student Name],

Re: Proposal; Homeland Plastics should suspend its operations in Ramina

Background. As a result of the concerns raised in regard to environmental issues relating to Homeland Plastics, it is essential to appreciate that it is a universally accepted foundational concept of business that the primary principle of Homeland Plastics is to maximize profits. Although, there is nothing erroneous with profits maximization, the unceasing pressure for maximum profits may create several ethical problems for Homeland Plastics’ operations in Ramina.

Proposal. Taking into consideration the ethical issues, I suggest that Homeland Plastics suspend operations until it complies with the water emissions guidelines established by Finland’s Ministry of the Environment (MEF). On the other hand, the alternative would be to relocate to Vyborg, where the established water emissions guidelines are less stringent. However, taking into consideration the cost of doing business between the two locations, I hereby propose that Homeland Plastics relocates to Vyborg.

Reasoning. I hereby suggest that, in the best interest of Homeland Plastics, it would be more appropriate to comply with water emissions guidelines established in Ramina. This would however, bring about the issue of business ethics. Business ethics may be largely extraneous for the majority of managers, since it fails to offer any convenient advice. On the other hand, as a chemical engineer, I am of the opinion that moral philosophy, has a propensity to value altruism, the concept that an individual ought to do good, since it is appropriate, or will be of advantage to others, but not since the individual will profit from it. Homeland Plastics is duty bound to protect the environment it operates in, but on the contrary, business ethics may conflict with profit maximization. From a business ethics perspective, externalities permit companies such as Homeland Plastics to contaminate environmental habitat or result in human heath concerns. It ought to be comprehensible that if an externality causes harm to the environment or harms a person, then that externality is an obvious infringement of ethics. However, a number of senior managers in Homeland Plastics may not appreciate the ethical repercussions of the externalities and ecological damage. While all stakeholders in this issue realize Homeland Plastics is rather of a black box in this proposal, the consequence is still an awkward blurring of the confines between the profit maximization, and the quest of self-interest. For instance, the confines between altruism and self-interest, interests and ethics, economic realities and ethical demands, financial and moral costs, and ethical imperatives and profit motives are not readily distinct at Homeland Plastic’s case.

On the other hand, Homeland Plastics’ senior management is bound by fiduciary responsibility.  Fiduciary responsibility in this regard applies to the responsibilities of Homeland Plastics corporate directors to implement the best interests of the company. If the directors of Homeland Plastics construe this mandate narrowly, then there would be a short-range focus on profits that would ultimately harm both the business and society. The unevenness arises from the reality that profit maximization is obliquely justified. It is constructive to note that this predicament is one that business ethics would share with legal principles.

The best next steps: It is essential to note that, the concern with competitive markets that Homeland Plastics engages in, and the market-clearing prices, is not merely an abstract, philosophical hypothesis concerning what may justify the drive for profit-maximization. The whole legal structure of Homeland Plastics, in conjunction with the pertinent regulatory environment, should be organized in a way that would promote competition, as well as the exact category of competition that is liable to produce market-clearing prices.

Men happier than Women in Work-Life balance

(Name)

(Instructors’ name)

(Course)

(Date)

Men happier than Women in Work-Life balance

This article examines one of the most controversial topics regarding employee productivity in the replace. As researchers would argue, a number of factors ranging from motivation to gender affect productivity in the workplace. More specifically, the article draws attention to how an employee’s gender may affect productivity in the workplace. As the article explains, men are more likely to maintain a proper work-life balance than their female counterparts. A survey carried out by the Captivate Network on more than 670 employees illustrated that whereas men are 25% happier at their respective workplaces, women are 75% more happy when in their homes. This, in turn, implies that women are happier when away from their jobs as compared to their male counterparts. A closer examination of the issue reveals that, because women are happier at home, the likelihood of productivity being affected by their personal lives is very high. This further illustrates the inability of some employees to balance their personal and professional lives.

In relation to human resources, this article reflects one of the most imperative human resource practices regarding the provision of a work-life balance for their employees. Human resource personnel need to provide their employees with the opportunity to balance their personal lives and their works, without straining these employees. The effects of having a poor work-life balance is serious especially for women and human resource professionals need to design programs that will allow the provision of these. Employees who lack the necessary balance in their private and professional lives are affected both psychologically and physically. This will in turn affect their productivity in the workplace, as it reduces an employee’s concentration to his or her duties in the workplace. Human Resource professionals are, therefore, urged to develop an organization culture and environment that supports work-life balance for employees. This can be attained through the provision of a number of benefits for the employees, which are solely aimed at promoting a good work-life balance.

This article is relevant for HR professionals because it draws on a topic that demands a considerable amount of input from the human resource department in any organization. This is because it is the human resource department that is charged with the duty of ensuring that the output of each employee in the workplace, regardless of gender, is at its maximum. It also assists in creating awareness in human resource professionals on the different employee demands based on gender. By recognizing these differences, HR professionals can create programs that promote work-life balance, so that a particular gender of employees do not feel that their duties and responsibilities in the workplace strain their personal lives. Sequentially, HR personnel, together with the other managers in the organization need to develop policies regarding the maintenance of a proper work-life balance for employees. This should, however, be done in a way that considers both genders, without having an inclination towards one particular gender of their employees. After all, the human resource department is also charged with the responsibility of promoting workplace equality and fairness. Some of the ways in which HR professionals can guarantee a work-life balance for their employees include creating weekly schedules, taking breaks during the day, proper time management, as well as, taking vacations.

Link:

http://www.hrreporter.com/articleview?articleid=11155&headline=men-happier-than-women-with-work-life-balance-survey

Midterm Paper on Flame

Midterm Paper on Flame

Author’s Name

Institutional Affiliation

Midterm Paper on Flame

Abstract

This midterm paper focuses on addressing Flame as the selected significant cybersecurity event that has happened in the last 10 years. Flame was malicious software used for hacking classified information that occurred in 2012, causing substantial damage to intelligence in the Middle East. This paper examines the causes of Flame as an advanced cybersecurity incident, along with related threats. Furthermore, it delves into the vulnerabilities exploited by perpetrators, besides offering an account of its outcomes. The paper also considers changes to cybersecurity policy because of this malware attack.

Overview of the Cybersecurity Event

In 2012, hackers purportedly working with the United States National Security Agency partnering with the Israeli government developed and disseminated a nation-state-sponsored malicious hacker software called Flame, Skywiper, or Flamer(Holt, Bossler, & Seigfried-Spellar, 2017; Zetter, 2012). This modular computer malware was advanced spyware intended to conduct cyber-espionage in Middle Eastern nations. The primary target was Iran as the attackers were interested in the intelligence surrounding the country’s nuclear program (Nakashima, Miller, & Tate, 2012). Eisenstadt (2016) and Knapp and Langill (2014) affirm that the motive was espionage by stating that while Flame was possibly a more sophisticated derivative of Stuxnet (a 2010 malicious computer worm intended for sabotaging and destroying computer systems), its intention was cyber-espionage and network reconnaissance.

Flame was discovered by security researchers from Kaspersky’s Lab, National Computer Emergency Response Team of Iranian MAHER Center, and Cryptography and System Security Lab at Budapest University of Technology and Economics (Gostev, 2012; Hoffman, 2012; MAHER Center, 2012). All these researchers agree that Flame was the most advanced, complex, and sophisticated malware strain ever developed. Flame targeted computers that were running on Windows OS, whereby it infected specific computers in homes, universities, and government institutions and agencies mainly Middle Eastern countries (Holt, Bossler, & Seigfried-Spellar, 2017). This spyware worked as a cyber-espionage tool that granted backdoor access to files in any system connected to these computers, which enabled the remote recording of network traffic, video conversations, and audio files, data theft, and capturing of keystrokes (Gostev, 2012; Zetter, 2012). Skywiper’s complexity and utility also allowed it to activate Bluetooth functions of infected computers to allow the logging of data from nearby Bluetooth-enabled mobile devices. Also, this malware could easily be rubbed from the infected systems when it became public to eliminate evidence of any infections (Holt, Bossler, & Seigfried-Spellar, 2017).

Causes of the Cybersecurity Event

Flame was not caused by an accidental result but rather by two specific causes: the failure to maintain adequate controls and an active cyber-attack.

Inadequate Security Controls

The Middle Eastern counties whose computer systems were targeted and infected failed to implement and maintain sufficient, state-of-the-art controls on their systems. Experts from Kaspersky Lab, who discovered Flame, established capability and technical gaps between the U.S. arsenal and the tools utilized by other nation-state groups (Cimpanu, 2019). These gaps are an indication that the controls deployed by the Middle Eastern nations for detecting potential cyber-attacks and cyber threats were inadequate. Also, Knapp and Langill (2014) acknowledge that Skywiper/Flame had remained active for years before being discovered. During this time, it was being used in mining sensitive data and returning such data to contemporary and sophisticated command-and-control (C2) infrastructure with 80 domain names. Also, it utilized servers that shifted between multiple locations in Germany, Hong Kong, Latvia, Malaysia, Poland, Switzerland, the U.K., and Turkey (Knapp & Langill, 2014).

Before its discovery, Skywiper existed in multiple modules that include Flame, Gadget, Frog, Munch, Suicide, Telemetry and Gator, Weasel and Jimmy, and Viper. As Knapp and Langill (2015) suggest, each of these modules had its capabilities that remained undetected until 2012, when the Skywiper module was discovered. For instance, Flame could handle routine AutoRun infections. Gadget updated automatically, allowing malware to evolve and accept novel payloads and modules. Frog exploited payloads for password theft, Munch exploited payloads able to capture network traffic, and Viper exploited payloads capable of capturing screenshots. Suicide possessed self-determination capabilities, Telemetry and Gator handled command-and-control routines, and Weasel and Jimmy dealt with file and disk parsing (Knapp & Langill, 2014; Knapp & Langill, 2015; Rubenstein, 2014). While Skywiper combined all these capabilities to execute espionage, these security controls and systems of Middle Eastern countries never detected any of them. This provides evidence that the inadequacy of cybersecurity controls of these countries was one principal cause of Flame.

An Active Cyber-Attack

The second major cause of Flame was an active spyware attack by hackers allegedly working collaboratively with the United States and Israeli governments (Holt, Bossler, & Seigfried-Spellar, 2017; Zetter, 2012). The active attack was aimed at conducting cyber-espionage, mine data, and gather or steal intelligence about the Iranian nuclear program (Nakashima, Miller, & Tate, 2012). So, Flame was a malicious program planted in target machines to perform cyber-reconnaissance, siphon system information, hijack administrative accounts, grant high-level privileges to the hackers, and physically attack the target systems (Gostev, 2012; Zetter, 2012). So, besides espionage and network reconnaissance intents, physical attacks on targeted systems was also a motive behind this malware. The fact that Flame was a dynamic, smart, and sophisticated attack toolkit development by governments (Bahtiyar, 2016) means that its other cause was an active attack by governments against other governments. Flame’s modular and dynamic nature means that it can evolve into weaponized malware for use in executing more aggressive future cyber-attacks, hence necessitating advanced defense mechanisms for cyber-space protection (Bahtiyar, 2016; Knapp & Langill, 2015).

The Associated Threats

Flame related to three major threats. The first was a national security threat. The NSA and Israeli governments collaborated in using Flame to conduct cyber-espionage against Iran and other Middle Eastern countries, collect intelligence about Iranian nuclear efforts, and organize a cyber-sabotage campaign against the nuclear program (Nakashima, Miller, & Tate, 2012). This potentially raised national security concerns as the targeted nations could act in retaliation against the cyber-espionage. Cyber-reconnaissance tends to trigger national security threats, especially when sensationalized by the media (Rubenstein, 2014).

The second was the cyber warfare threat. Cyber-espionage conducted using Flame stimulated enmity between the involved parties, which could culminate in cyber warfare intents in the long run. Also, Bahtiyar (2016) and Knapp and Langill (2015) submit that the modular nature of Flame means that it can advance into weaponized malware that can be used in contemporary cyber warfare. For these reasons, politicians have been directing public policy towards combating cyber-espionage to inhibit the perceived cyber-war threat that remains high following the Flame-based attack (Rubenstein, 2014).

The last threat is that of unwanted cyber-surveillance. Flame’s architecture allowed it to be wiped from the infected systems, hence eliminating proof of any infections (Holt, Bossler, & Seigfried-Spellar, 2017). What this means is that the malware could be used to perform unwarranted cyber-surveillance without anyone noticing. This threat can become rampant in the future if such malware versions are deployed in spying stealthily on actors involved in classified government, military, and intelligence developments in different countries, which also has the potential of exacerbating the cyber warfare threat.

The Vulnerabilities Exploited

The hackers using Flame to conducted cyber-espionage exploited four vulnerabilities. The first includes the technical vulnerability of targeted systems that were because of inadequate security controls. Also, technical vulnerabilities emanated from the fact that the computer technology of targeted countries depended largely on foreign-made hardware and software, which made it virtually defenseless, hence exposing it to extreme vulnerabilities (Loiko, 2012). The second involved cryptography vulnerabilities where Flame used zero-day exploits of Windows operating system similar to those exploited by Stuxnet (Bahtiyar, 2016; Goyal et al., 2012; Knapp & Langill, 2014). This allowed Flame architects to exploit weaknesses in terminal server products of Microsoft and inadequate key-management decisions by the firm’s engineers to generate cryptographic seals that falsely certified Flame as a Microsoft product (Fillinger, 2013; Goodin, 2012). Thirdly, Flame exploited AutoRun vulnerabilities similar to Stuxnet to infect the USB sticks of targeted machines. Finally, it exploited print spooler vulnerability similar to Stuxnet, which allowed it to spread to computers rapidly on local networks (Zetter, 2012).

The Outcomes of the Cybersecurity Event

The principal impact of Flame was that it led to the loss of intelligence and highly classified information that was stolen remotely from Iran and other Middle Eastern countries. Another impact was that its discovery exposed governments’ engagements in sponsoring the development of sophisticated malware that can target industries such as the energy industry. The last impact was that Flame sensitized software architects and engineers from companies such as Microsoft to adopt more proactive design security measures to ensure the security of their update and certificate generation mechanisms (Goodin, 2012).

Changes to Cybersecurity Policy Due to the Event

After the Flame attack, no significant changes have been made in cybersecurity management and policy. The only change is the shift in cybersecurity policy on cyber warfare and cyber-espionage. Specifically, Flame sensitized and awakened cybersecurity policymakers to refocus their attention on combating cyber-espionage to curb cyber-warfare emergence (Rubenstein, 2014). Being wary that Flame and similar malware and spyware can be weaponized, these policymakers are pushing for policies that limit domestic and overseas cyber-espionage activities. Policy experts in intelligence in some countries are also considering outsourcing intelligence services to streamline their cybersecurity management functions.

Conclusion

Following the Flame occurrence, three lessons can be learned. Firstly, governments can be behind the development and deployment of sophisticated malware for cyber-espionage, network reconnaissance, and cyber-based intelligence theft. Secondly, not all software updates and OS upgrades are genuine as some could be high-tech spyware like Flame disguised in software updates. Companies like Microsoft should take this lesson seriously. Lastly, companies, institutions, and countries need to always keep their C2 infrastructure up-to-date to increase the chances of detecting when similar malware is trying to infect their systems. Concisely, Flame sensitizes governments to be proactive and tech-savvy in securing their intelligence, classified data files, and confidential government information from theft by other governments.

References

Bahtiyar, Ş. (2016). Anatomy of targeted attacks with smart malware. Security and Communication Networks, 9(18), 6215-6226.

Cimpanu, C. (December 12, 2019). A decade of hacking: The most notable cyber-security events of the 2010s. ZDNet: CBS Interactive. Retrieved March 06, 2020, from https://www.zdnet.com/article/a-decade-of-hacking-the-most-notable-cyber-security-events-of-the-2010s/.

Eisenstadt, M. (2016). Iran’s lengthening cyber shadow. Policy Paper No. 34. Washington Institute for Near East Policy.

Fillinger, M. J. (2013). Reconstructing the cryptanalytic attack behind the Flame malware (Doctoral dissertation, University of Amsterdam).

Goodin, D. (June 04, 2012). “Flame” malware was signed by rogue Microsoft certificate. Wired Media Group. Retrieved March 06, 2020, fromhttps://arstechnica.com/information-technology/2012/06/flame-malware-was-signed-by-rogue-microsoft-certificate/.

Gostev, A. (May 28, 2012). The Flame: Questions and answers. AO Kaspersky Lab. Retrieved March 5, 2020, from https://securelist.com/the-flame-questions-and-answers/34344/.

Goyal, R., Sharma, S., Bevinakoppa, S., & Watters, P. (2012). Obfuscation of Stuxnet and Flame malware. Latest Trends in Applied Informatics and Computing, 150, 154.

Hoffman, V. C. (May 30, 2012). Meet Flame, the Ebola virus of malware. CIO: IDG Communications, Inc. Retrieved March 5, 2020, from https://www.cio.com/article/2371366/meet-flame–the-ebola-virus-of-malware.html.

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2017). Cybercrime and digital forensics: An introduction. Routledge.

Knapp, E. D., & Langill, J. T. (2014). Industrial network security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems, 2 Ed. Syngress.

Knapp, E. D., & Langill, J. T. (2015). Hacking industrial control systems. In Industrial Network Security, 171–207. Doi:10.1016/b978-0-12-420114-9.00007-1.

Loiko, S. L. (May 31, 2012). Russia computer experts who detected Flame malware issue warning. The Los Angeles Times. Retrieved March 06, 2020, from https://www.latimes.com/world/la-fg-russia-flame-cyberwar-20120531-story.html.

MAHER Center. (May 30, 2012). Identification of a new targeted cyber-attack. Iran Computer Emergency Response Team. Retrieved March 5, 2020, from https://www.webcitation.org/682bfkhaU?url=http://www.certcc.ir/index.php?name=news&file=article&sid=1894&newlang=eng.

Nakashima, E., Miller, G., & Tate, J. (June 19, 2012). U.S., Israel developed Flame computer virus to slow Iranian nuclear efforts, officials say. The Washington Post. Retrieved March 06, 2020, from https://www.washingtonpost.com/world/national-security/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officials-say/2012/06/19/gJQA6xBPoV_story.html.

Rubenstein, D. (2014). Nation state cyber espionage and its impacts. Washington University in St. Louis.

Zetter, K. (May 28, 2012). Meet “Flame” the massive spy malware infiltrating Iranian computers. Wired. Retrieved March 5, 2020, from https://www.wired.com/2012/05/flame/.

Business Practices and Tactics

Business Practices and Tactics

Student’s Name

Course and Code

Instructor

Date

Business Practices and Tactics

Introduction

The primary aim of every business today is to ensure attainment of maximum profits for the stakeholders and owners while keeping up with expectations on corporate social responsibility. In order for a business to get and stay profitable, Osterwalder and Pigneur (2011) found that several practices are required including heavy investments on the people and resources in order to improve productivity, marketing strategies, excellent customer service, and attracting and retaining top talent. In all activities and approaches, a business is required to have growth, efficiency, profitability, survival and stability. However, recent business strategies and tactics have revealed a slight variation from traditional business concepts. Today, the issue of sustainability and eco-friendliness have become a global concern, turning businesses into advocates of greener strategies, as a way to conserve the environment while keeping the traditional aims of every business. In the agricultural sector, companies such as Monsato and their main product, Roundup, have continued to dominate the herbicide market using tactics and practices that are unconventional. In this report, an article by Four Corners presented by ABC News In-depth (2018) will be reviewed from a dynamics of systems and positioning your studies approach. The business activities and practices employed by the organization reveal that the global business sector is constantly testing boundaries and ideas in an attempt to identify new ways of retaining growth, efficiency, profitability, survival and stability.

Analysis of the News Video

In a detailed informative piece on modern agricultural practices, ABC News In-depth (2018) provided an expose titled “the secret tactics Monsanto used to protect Roundup, its star product.” In this article, several emerging issues were presented including; the benefits of using herbicides for both crop and livestock farmers, the costs of not using such products in farming, the impact of the product on the environment, and the effect it has on users especially in relation to safety concerns and the idea that the product causes various forms of cancer. In the depth of the video, the main issue is not founded on the above-mentioned issues but rather on the way Monsato focuses its strength and power to protect its key product. The article reveals how the company, in a syle similar to other multinational institutions, denies, frustrates, and attempts to conceal all allegations relating to its star product being unsafe for human and environmental use. Despite overwhelming evidence from severe health issues amongst users to scientific proof of its dangers, the company remains adamant that the product is safe and tested scientifically to ensure that it has zero negative consequences to people and the environment.

For farmers in Australia, Roundup has offered so many benefits over the years, including reducing the cost of farming and the losses associated with alternative measures to weed control. However, these benefits have been clouded by a recent revelation of negative health consequences for users. The news article is very objective as it begins by presenting praises of the product from the farmers. It then introduces several controversial issues including the fact that the product, Roundup, could be responsible for several cases of cancer. In America, a grounds maintenance worker exposed to high levels of Roundup per day is shown to have developed a rare form of skin cancer, leading to a lawsuit where he is awarded millions in damages. All through, Monsato maintains that the allegations are false and even proceeds to fight the court decision. What follows is a series of practices with an intention of burying the main issue and presenting the cases where farmers have had health issues as isolated incidents. In a dynamics of systems and positioning your studies perspective, the next section will provide a thorough analysis of the matter.

Dynamics of Systems Theory

The systems thinking theory recognizes the need to test ideas on social systems similar to how the same is done in engineering and other scientific concepts. Systems thinking begins by defining a system as a collection of different parts that together form a group (Baporikar, 2020). As these parts interact, the sum of its individual parts act in a system or structure. System thinking examples in the business world include the stakeholders, the business structures and frameworks, the processes, and the culture. Combined, Oliveira et al. (2020) note that the practices that are used in a system thinking create either healthy or unhealthy cultures. Therefore, in a process of looking at how things are influenced or influence each other in a whole, the systems thinking approach can be used to explain the business practices that Monsato applied in protecting its product and how farmers in Australia and America also interpreted the same.

Monsato’s attempts to conceal the issue of Roundup as a harmful product and its business practices including indirect influence on political parties through funding reveal a number of processes in efforts that influence outcomes. Monsato reveals a set of practices and habits in the corporate world within a structure that is based on the belief of control and profit maximization regardless of the consequences to users. The systems thinking approach is described by Jaaron and Backhouse (2018) as a system that observes the whole, focuses on relationships, looks at structures, explores interdependence, dynamics, and reveals complexities. By applying this point of view, Monsato’s strategy can be analyzed as one that involves expanding the company view to consider larger numbers in many interactions in order to attain growth, efficiency, profitability, survival, and stability.

Monsato’s strategy as presented in the news article is a display of a systems thinking. The main features of a systems thinking are noted by Mambrey et al. (2020) to include a consideration of both the short and long term implications of strategy, an understanding of the big picture, observes the changes in a system over time including trends and patterns, recognizes behavior as a result of a system structure, and identifies the circular nature and implication of relationships. There is a strong relationship between Monsato, its product, and the customers (users of Roundup). In the relationship, there are clear trends and patterns relating to use, expectations, and a realization of the effects. The video highlights the different stages of the relationship beginning with the acknowledgement of the benefits of using Roundup, followed by a phase of uninterrupted consequences, and later a realization of the costs of using the product. From Monsato’s perspective, assumptions are constantly tested, including a consideration of every possible outcome before acting, identification of leverage points, and a focus on structure. Monsato understands the interdependencies as well as the causes and effects of the relationship it has with various stakeholders including other companies in the industry, the government, political parties, and users. The decision to fight the court verdict and the constant denial of the health effects of the product also point to how Monstao understands the need to retain structure in order to maintain its perspective and leverage points.

Positioning your Studies

In business, like every other sector, perspectives have a huge role to play in determining outcomes. Competing paradigms and points of view have been present since time immemorial. What is considered a mainstream model may not exist in a different part of the world. The same is true for perceived benefits of a product versus its costs and effects. The concept of mental models is defined by Magzan (2012) as a key determinant in what people see. What is present in a business setup may not be aligned to what people/stakeholders see. Based on the Senge model, what is seen is not usually factual but an individual interpretation based on expectations and demands (Nejad et al., 2012). For example, the perspectives of Monsato and the various farmers in America and Australia regarding the benefits of Roundup do not match. For the farmers, there are hidden costs associated with continued use of the product. For the company, their product is of high quality, tested, and beneficial to all users. Ultimately, mental models create sense making and perception in a manner that influences how one approaches an issue as evidenced in the ABC News In-depth (2018) article.

In a mental model approach, Kara and Ertürk (2015) acknowledge the need to create a sense-making structure in an attempt to give meaning to experience. The process involves questioning the situation regarding the occurrences, the differences, and the reasons why these issues are present. There is also a need to explore means to respond to situations in a sense-making and perception creating approach. Ultimately, the entire process is noted by Grüter et al. (2018) to influence how people perceive things differently. Monsato’s perception of its star product, Roundup, and the consequences of continued use differs significantly from the point of view of farmers who use the product on a daily basis. It is worth noting that none of the executives who defend the product as safe have ever used it. They rely on scientific tests and other avenues that inform their decision on the product. Gaffkin (2008) looks at theory as an ideation that helps to resolve and understand complex issues including business practices and unethical practices. In the news article, every different perspective makes a claim that is aimed at creating influence and presenting their claims as reliable knowledge.

Understanding of the Topic Based on the Theories

The two theories explored above relate to how entities interpret information and events. The topic of harmful business practices and strategies as explored in the Monsato case study indicates why perceptions, sense-making, and competing mental models are important in showing a need to include methods to support claims. In the systems thinking approach, the article reveals that each of the issues mentioned are interrelated, interdependent, and leads to different outcomes for each stakeholder group. In the mental models, perception, and sense-making approach, the theories highlight that one’s point of view on an issue may not be reflective of facts. In a deeper review of the news article, Monsato’s strategies are somewhat controversial. Nonetheless, the evidenced piled upon the company by the various interest groups does not provide conclusive evidence no whether Roundup is harmful. Despite the moving and emotional narrations from various users of the product, the points of view for the opposing entities do not converge even after court rulings and scientific evidence. Therefore, the topic can be said to be controversial and dependent on one’s understanding of the systems and their mental models.

Conclusion

The discussion intended to analyse an article by Four Corners presented by ABC News In-depth (2018) from a dynamics of systems and positioning your studies approach. The systems thinking approach and the mental models theories have been employed to get a glimpse of the issues addressed in he video. Having reviewed how systems operate and the role of mental models, perceptions, and expectations, the report finds that business activities and practices employed by Monsato reveal that the global business sector is constantly testing boundaries and ideas in an attempt to identify new ways of retaining growth, efficiency, profitability, survival and stability.

Reference List

ABC News In-depth. 2018. The secret tactics Monsanto used to protect Roundup, its star

product | Four Corners. YouTube. Retrieved from https://www.youtube.com/watch?v=JszHrMZ7dx4

Adam V 2004, ‘Systems thinking as a major skill of business students–A new teaching

concept at the University of Zurich, Switzerland,’ The Journal on Systemics, Cybernetics and Informatics, vol. 2, no. 6, pp. 43-47.

Baporikar, N. 2020, ‘Logistics Effectiveness Through Systems Thinking,’ International

Journal of System Dynamics Applications (IJSDA), vol. 9, no. 2, pp. 64-79.

Gaffikin, M.J 2008, Accounting theory: Research, regulation and accounting practice.

Grüter, T., Takeda, A., Rohde, H. and Schafer, A.J., 2018. Intersentential coreference

expectations reflect mental models of events. Cognition, 177, pp.172-176.

Jaaron, A.A. and Backhouse, C.J., 2018, ‘Operationalisation of service innovation: a

systems thinking approach,’ The Service Industries Journal, vol. 38, no. 9-10, pp. 561-583.

Kara, S.B.K. and Ertürk, A., 2015, ‘Mental models of the school principals on

“leadership”,’ Procedia-Social and Behavioral Sciences, no. 174, pp. 2145-2152.

Mambrey, S., Timm, J., Landskron, J.J. and Schmiemann, P., 2020. The impact of system

specifics on systems thinking. Journal of Research in Science Teaching, 57(10), pp.1632-1651.

Magzan, M., 2012, ‘Mental models for leadership effectiveness: Building future different

than the past,’ Journal of engineering management and competitiveness (JEMC), vol. 2, no. 2, pp. 57-63.

Oliveira, B.G., Liboni, L.B., Cezarino, L.O., Stefanelli, N.O. and Miura, I.K., 2020, ‘Industry

4.0 in systems thinking: From a narrow to a broad spectrum,’ Systems Research and Behavioral Science, vol. 37, no. 4, pp. 593-606.

Osterwalder, A. and Pigneur, Y. 2011, ‘Aligning profit and purpose through business

model innovation,’ Responsible management practices for the 21st century, pp. 61-76.

Business Systems Analysis

Business Systems Analysis

Student’s Name

Institutional Affiliation

Course

Professor

Date

Table of ContentsContents

TOC o “1-3” h z u Table of Contents PAGEREF _Toc110070760 h 2Introduction PAGEREF _Toc110070761 h 4Problem Statement PAGEREF _Toc110070763 h 4Two Technologies PAGEREF _Toc110070764 h 4Business Requirements PAGEREF _Toc110070765 h 5Objectives PAGEREF _Toc110070766 h 5Project Description PAGEREF _Toc110070767 h 5Technology Requirements PAGEREF _Toc110070768 h 6Competitors and Technology PAGEREF _Toc110070769 h 6Mobile Commerce PAGEREF _Toc110070770 h 7Social Computing PAGEREF _Toc110070771 h 7Technology benefit PAGEREF _Toc110070772 h 7Technology Solutions PAGEREF _Toc110070773 h 8Mobile Commerce PAGEREF _Toc110070774 h 8Social Computing PAGEREF _Toc110070775 h 8Recommendations PAGEREF _Toc110070776 h 8Overall Benefit PAGEREF _Toc110070777 h 9Basic Security Considerations PAGEREF _Toc110070778 h 9Security Features PAGEREF _Toc110070779 h 9Third Party Vendors PAGEREF _Toc110070780 h 9Internal Safeguarding PAGEREF _Toc110070781 h 9References PAGEREF _Toc110070782 h 10Table 1 PAGEREF _Toc110070783 h 12Figure 1 PAGEREF _Toc110070784 h 13

IntroductionStyled by Mocha is a small brick and mortar business with a small online presence. We offer designer clothing, shoes and accessories for men and women. We do have a website that only contains a few items from our store. Customers are currently only able to purchase items in our store. This is becoming a big problem because we are not able to reach many of our customers as easily as all our competitors. Our goal at Styled by Mocha is to promote growth with an online presence and provide convenience to our customers.Problem StatementThe business owner is looking for a technology solution that will meet the following key technology requirements: integrating online shopping, managing inventory and shipping, providing order status and online payment processing, facilitating collaboration internally and externally (with staff and customers), managing customer contacts, providing reporting, and being able to use the new technology to manage the current brick-and-mortar processes (sales, payments, inventory, and customer contact).

Two TechnologiesI have identified 2 technologies that will help reach this goal. The first technology is Wireless, mobile computing and mobile commerce. Society today depends heavily on wireless devices which can be used to shop online (Chhonker et al., 2017). Mobile commerce creates opportunities for the business to deliver new services to existing customer while attracting new ones. The second technology that I have chosen is social computing an area of computer science that is concerned with the intersection of social behavior and computational systems (Fernando et al., 2016). Social media is a huge platform for advertising and representation of a company.

Business RequirementsObjectivesTo promote online shopping and shipping by providing order status and online payment processing.

To facilitate collaboration internally and externally (with staff and customers).

To manage customer contacts so as to get reports and feedback.

To create an online platform to be used to advertise the business to online potential clients.

Project DescriptionThe first strategy that needs to be put in place is hiring a virtual assistant. A virtual assistant can provide your company with cutting-edge technological solutions with a human touch. On freelance websites, virtual assistants are widely accessible and reasonably priced, even for tiny firms. They can take on demanding jobs, saving you time and expanding your business. A virtual assistant also comes equipped with social media marketing skills and will therefore help create an online platform (Georgescu, 2018). Secondly, the business owner will need productivity applications. These apps come at no cost and are easy to use. All that is needed is a smartphone mobile device installation. Through the sending and receiving of payments online, web-based payment systems support the growth of enterprises. Web-based payment has made it possible for many firms to reach out to potential clients because of the variety of payment alternatives and their versatility (Tounekti et al., 2019). This is so that you can attract more clients who prefer using a certain web-based payment solution by offering a variety of payment methods.

Another strategy to be put in place is to improve social marketing through advertising. The business can get two model, male and female who will be used to model the clothes on Facebook, Instagram and Tiktok. The platforms will also be used to schedule surveys and questionnaires so as to get customer feedbacks and requests (Evans et al., 2021). Customers are more likely to recommend a business to others when they now that the business listens to their needs. By doing so the business creates a good image to its customers as well potential clients. Hence the business is able to give its competitors a competitive edge.

Technology RequirementsI’ve discovered 2 technologies that will facilitate achieving this objective. Wireless, mobile computing, and mobile commerce make up the first technology. Today’s society is increasingly reliant on wireless gadgets, which can be utilized to do internet shopping (Chhonker et al., 2017). Mobile commerce gives businesses the chance to offer new products to current customers while luring in new ones. The second technology I’ve selected is social computing, a branch of computer science that studies how social behavior and computational systems interact (Fernando et al., 2016). A significant marketing and brand-representation platform is social media.

Competitors and TechnologyThe best well known competitors in the fashion industries are Gucci and Chanel. Gucci however has a competitive advantage. Gucii uses its products to market for the company. Their customers post the products on the various social media platform therefore attracting other potential clients (Romo et al., 2017). They have studied their customers’ behavior and realized that people like posting clothes they look good in. Their products are also of very high quality hence attracting long-term clients. Gucci has made an image for itself such that the whole world knows that it provides quality products. As much as its competitors such as Chanel have good products, Gucci still remains on top.

Mobile CommerceFashion retailer Forever 21 is deserving of high praise for its use of social media. Social media is mostly available smartphones and other devices that can access the internet. Fashion 21 promotes advocacy and engagement in all its social media platforms. According to McCollum, Facebook is used by Forever 21 to present fashion in a fun, compelling, and shareable way. Given the large presence of the brand’s primary customer, which consists of teens who are digital natives, on Instagram, it makes perfect sense (Chhonker, 2017). What better way to foster a relationship with them and encourage them to drop by on the weekend to try the newest item.

Social ComputingA large selection of women’s clothing may be found at Sophie and Trey, an online fashion retailer. Since Sophie and Trey have been working in the online fashion industry for a while, they have demonstrated how fashion companies can use Instagram as a powerful marketing tool (Fernando et al., 2016). Their social media activity and visibility are growing daily, but their Instagram and Pinterest pages have garnered greater attention in terms of marketing. The best aspect of their social media marketing plan is that they continually use various strategies and engage in friendly banter with their customers and supporters

Technology benefitThe fashion companies Forever 21 and Sophie and Trey and gaining massively from their online social media platforms. Their customers can easily order from them online and get their products delivered. They do not have to make physical appearances so as to buy the products (Stephen, 2016). Customers are also exposed to products of variety of types, colours and sizes giving them options to choose from. The social media platforms enable the customers to review the products and offer feedback. This gives the companies information on what to improve on. The companies are also able to use the different online platforms to advertise their products. The target market online is bigger compared to physical advertisement (Stephen, 2016). The companies are also able to monitor their competitors’ social media platforms and scan potential gaps.

Technology SolutionsMobile CommerceHaving smartphones will help for easier communication with clients. The landline phones are not portable and have no access to the internet. With smartphones, one can download apps such as slack and asana which are very profitable for the business (Chhonker et al., 2017). They also have access to social media platforms which makes it easy to advertise and attract potential buyers.

Social ComputingThe technology will help analyze social behavior of potential buyers. By doing so they will understand their needs and the target markets wants and find ways to satisfy them (Fernando et al., 2016). The current target market is both men and women. Conducting studies using surveys and questionnaires can be very effective.

RecommendationsThe technology solution that best suits my business is hiring a virtual assistant who can also be my social media manager. He or she will be able to create online platforms which can be used for advertising, shopping, payments, reviews and feedback. The virtual assistant can also use the different platforms to monitor social behavior and trends. This technology solution will help identify market gaps and potential clients.

Overall BenefitAt Styled by Mocha, the main benefit we hope to acquire from the technology solution is to encourage growth through an online presence in order to benefit our clients and gain a competitive edge (Stephen, 2016). We will also be able to attract more clients hence more sales hence more profits.

Basic Security ConsiderationsSecurity FeaturesIntroducing your business to the online platforms has a lot of advantages. However, everything with an advantage has a disadvantage. The different social media accounts are prone to hacking and other insecurities. The business should consider a number of security features. One of the features is confidentiality (Qayyum, 2021). All employees should handle all passwords and information regarding the online platforms with confidentiality. Unauthorized personnel should have no access to them. The business administration should also perform random audits to ensure that there are no breaches (Qayyum, 2021).

Third Party VendorsThird party vendors also need to be managed by conducting risk assessment to ensure that the potential vendor exceeds the company’s security standards. The risk assessment may be tiring but it is better than hiring a vendor who may not be confidential (Kim & Altmann, 2020).

Internal SafeguardingThe company should also input internal safeguarding protocols. These include having screenlocks on all company devices, clearing out old data and updating passwords often (Qayyum, 2021). Employees should also be advised against using public wifi to access company data.

ReferencesChhonker, M. S., Verma, D., & Kar, A. K. (2017). Review of technology adoption frameworks in mobile commerce. Procedia computer science, 122, 888-895.

Evans, D., Bratton, S., & McKee, J. (2021). Social media marketing. AG Printing & Publishing.Fernando, M. D., Ginige, A., & Hol, A. (2016). Impact of social computing on business outcomes. 13th International Cnference on Web Based Communities and Social Media (WBC2016).

Georgescu, A. A. (2018). Chatbots for Education-Trends, Benefits and Challenges. ELearning & Software for Education, 2.Kim, K., & Altmann, J. (2020). Platform provider roles in innovation in software service ecosystems. IEEE Transactions on Engineering Management.MacCollum, C., Pape, H., Romley, N., & Witmer, O. FOREVER 21 CASE STORY.

Romo, Z. G., Medina, I. G., & Romero, N. P. (2017). Storytelling and social networking as tools for digital and mobile marketing of luxury fashion brands. International Journal of Interactive Mobile Technologies, 11(6), 136-149.

Stephen, A. T. (2016). The role of digital and social media marketing in consumer behavior. Current opinión in Psychology, 10, 17-21.

Tounekti, O., Ruiz-Martinez, A., & Gómez, A. F. S. (2019). Users supporting multiple (mobile) electronic payment systems in online purchases: an empirical study of their payment transaction preferences. IEEE Access, 8, 735-766.

Table 1Use of Social Media over the years

FacebookInstagramYoutubeTiktok2017 70% 53% 35% 24%

2018 73% 60% 44% 33%

2019 70% 67% 51% 45%

2020 66% 80% 67% 72%

Figure 1Percentage Profits of Gucci vs Chanel

Figure 1

ACADEMIC REQUIREMENTS AND EVALUATION PROCEDURES

Syllabus

Fall 2022

CJUS 561

COURSE DESCRIPTION

Catalog: Study of a major aspect of, or problem in, the criminal justice area.

Supplemental: The purpose of this course is to provide students with an opportunity to

take a CJUS course to augment their regular schedule. Likewise, this course will allow the student to enhance or develop his/her research and writing skills. Furthermore, the student is provided with an opportunity to research a topic of serious interest to them for personal and/or academic reasons.

TEXTBOOK None

ACADEMIC REQUIREMENTS AND EVALUATION PROCEDURES

This course is a TBA course without formal class meetings and lectures, but no student should imagine that less than suitable academic work will somehow be rewarded with a superior final grade for this class.

Students enrolled in this course will select a suitable research topic and clear it with the instructor to assure that the topic is appropriate and acceptable. After getting the topic approved by the professor, the student will spend significant time gathering information, facts, figures and so forth needed to actually write a high quality research paper.

I expect a 25 page research paper of true academic quality as the end product. This length DOES NOT include a reference page/pages that I expect will be attached at the end of the actual research paper. The paper should be done in 12 font, double-spaced, and follow APA referencing guidelines.

Please feel free to contact me should you need additional guidance, instructions, or help.

ALL papers are DUE on 25 November 2022. I will automatically lower your grade if the paper is tardy or late. Since you have an entire semester to work on this research paper, please do not wait until the last minute to begin your research and write your paper.

DO NOT DOWNLOAD A PAPER FROM THE INTERNET and present it to me as original work performed by you!! This has happened in the past…Do not do it!!

Academic Integrity Statement:

Please visit the MSU web page at http://www.mcneese.edu/integrity for McNeese

State’s official policy regarding cheating, plagiarism, and other issues pertaining to

academic honesty and integrity. It is expected that students will abide by these policies.

Business Plan for a Diversified Fast-Food Establishment

Business Plan for a Diversified Fast-Food Establishment

Students Name

Student Number

Submission Date

Business Plan for a Diversified Fast-Food Establishment

1. Business Model

1.1 Project Background

There has been a robust growth in the fast-food industry in Chinese market since the last decade (Al-Shargie, & Ahmed, 2019). The major cause of the increased growth is attributed to the high number of tourists visiting the Middle East Countries especially China. It is also due to the large population of China, the Chinese living in China are said to be 1.378 billion according to 2016 (Al-Shargie, & Ahmed, 2019). The large population turns out to be the major contributor to the fast growth of the fasts food industry in China.

Picture 1: A graph of the general growth of the fast-food industry in China up to 2019 (Al-Shargie, & Ahmed, 2019)

1.2 Organizational Form

Success in establishing and running the fast-food joint requires effective acquisition of the investors. This way the whole project is able to acquire the required financial support. Through investors, the project can also benefit from the diversified business skills. These are mainly the skills that are brought to the table by the investors. For the business to achieve success in attaining investors and general establishment it should assume the corporation form of business. Corporation business has a limited liability to all investors, which is a crucial point in attracting investors. Corporations are also beneficial in that they are not limited to the number of investors. Therefore, for expansion and other future intentions the corporation organizational form, acts on the best interest of establishing and running the intended fast-food joint.

1.3 Business Model

A business success is highly attached to the type of business model adopted by the specific business. According to Hendriarto (2021), a suitable business model is crucial to achieving growth and viability of a business for a long time. The proposed food joint should be set up so as to serve the proposed qualities and specifications. The project is expected to assume the direct sales business model. This model benefits the project in that major control of the business is left to us as the creators (China Chain, n.d). Direct sales business model helps us implement the right strategies for the business. This business plan is crated for a diversified fast-food joint which can only be achieved only when the decision-making role and the management role is left to us as the creators. Franchise business model does not favor independent decision making. Major decision making is done by the franchising company. Independence in decision making is vital to build and grow the diversified fast-food joint. Therefore, the proposed business project assumes the direct sales business model.

2. Financial Projection

2.1 Project Introduction

Lease a two-storey mini hall along one of the busy streets of Shanghai China.

Hire a contracting company to renovate the space such that it should offer kitchen space and customers serving and eating area.

Hire qualified chefs, waiters, cleaners and security agency.

Hire renown and reputable marketing agency to create our brand awareness.

Create an IT department and hire IT personnel to avail our services on an online platform for online orders and deliveries.

2.2 Fixed Cost Description

Item Description

Registration Fee This is the amount of money paid in order to have the business legally known and controlled by the laws of the government.

Leasing Fee Includes the amount of money paid to the landlord for using his/her space

Renovation and Labor cost Includes the money paid in acquisition of materials of renovating the space as well as the wages for the workers in action during the process.

Furnishing Cost Involves the cost of the furniture, Kitchen equipment, IT equipment, lighting products among other products used for furnishing the place.

Operation Expenses Involves the money to be spent on all employees working in the business.

Marketing Cost This is all the money paid to the agency hired to market the business to create brand awareness.

Maintenance cost This is the money used in sustaining the condition of the equipment in operation.

3. Cost-Volume-Profit Analysis of a store in Beijing

Earning forecast within five years (Currency in RMB Yuan)

Description Price/Cost

(RMB) Remarks

Average cost of a meal/person 20 RMB Yuan

(variable costs/day)

Average daily sales

(Physically and online) 24 000 Electricity and Water bill 4000 Cleaning services 3 000 Cooking fuel consumed 4 000 Ingredients Cost 7 067 Gross Profit 8 367

(Fixed Cost/Day)

Registration fee 6 500 Staff Wages/ Salaries 136 000 Annual registry of salary

Lease fee 650 000 Furnishing cost 70 000 Marketing Cost 45 000 Maintenance Expenses 80 000 Operation Cost 50 000 Total Cost 1, 037, 500 Daily profit is calculated as an average value of the completed orders made both physically and through online platform. Upon deduction of the daily expenses of 485 RMB the daily profit is left at 1056 RMB. On the other hand, the annual expenses accrued total to 1,037,500 RMB, therefore the break-even volume sales can be calculated as 1037500/ 8 367=124

So the turn over period of the business is expected to be 124 days in a single year

Earning forecast after five years. (Currency in RMB Yuan)

Description Price/Cost

(RMB) Remarks

Average cost of a meal/person 20 RMB Yuan

(variable costs/day)

Average daily sales

(Physically and online) 24 000 Electricity and Water bill 4000 Cleaning services 3 000 Cooking fuel consumed 4 000 Ingredients Cost 7 067 Gross Profit 8 367

(Fixed Cost/Day)

Registration fee Staff Wages/ Salaries 136 000 Annual registry of salary

Lease fee Furnishing cost Marketing Cost 45 000 Maintenance Expenses 80 000 Operation Cost 50 000 Total Cost 311, 000 4. Financing Plan

According to the financing forecast results obtained, assuming all the acting factors remain constant or within the margin of error allowed, then;

The one-time investment on the store is as follows

Registration fee Leasing fee Furnishing cost

Amount 32500 650 000 70 000

One time Investment 3,632,500

Daily annual expenses (along the error margins considered)

Staff wages/Salaries Marketing cost Maintenance fee Operating cost

Amount 136,000 45,000 80,000 50,000

Daily Expenses 311,000

The business has two types of capital requirements, one-time investment and the annual amount of daily cost of operation. The first and initial phase of the business establishment requires a large capital investment. For the larger amounts of capital requirements, loans may not form the best source of the financial acquisition. Loans are tied to a percentage of interest per year causing time extensions for the business to break even. Therefore, for this kind of capital the business should consider equity financing. Equity should be allowed for three to four shareholders taking up to 40% of the total business equity. For daily operational cost financing, we should consider low interest business loans. This phase of the business does not require a lot of capital. Low interest business loans can be the best way to sort this phase. The low amounts of capital required for operation may not accrue large interests upon payment. Considering the low interest rates, the business loans are suitable for the daily operations cost financing.

5. Risk Assessment

The large population of China creates a large market that is highly diversified. Despite the large market of food and hospitality industry, there still lie risks within this industry.

5.1 Risk of consumer preference

The numerous types of fast food available for consumers possess the risk of customer preference. A single mistake in marketing or the encroachment of bad reputation from a prior consumer may impact the business fatally. We should work on the marketing to ensure that all information getting out concerning the business service is clean and promotes the business.

5.2 Risk of competition

The food industry is densely populated with different business offering different differentiated products and services. The high number of businesses creates a highly competitive environment. We should ensure our services are high end with low to none chances of mistakes.

6. Investment Income Analysis

As the brand gradually grows, there are noticeable changes especially in sales and the cost of marketing (Timothy, 2020). Growth of the brand brings with it the loyalty of certain customers and the continuous flow of new customers. An increase in customers results to increased sales. Consequently, brand growth reduces the need of intensive marketing. Reduction of the cost of marketing results to higher profit margins.

Cash flow= Average annual sales within the expected error limits- staff salary/wages-marketing cost-operation cost-Maintenance cost

NPV Analysis=Cash flow × (1 + discount rate) × number of years

According to the NPV results obtained, the business idea is worth investment. The analysis generally proves the survivability of the business plan.

7. Research

The general demand for snack-oriented food has highly increased in China and the greater Middle Eastern countries. The world has seen a increment of 33.2% increase in the consumption of fast foods in Asian countries which is higher than that of the United States of America at approximately 9.9% (Li et al., 2020). Adolescents have been classified as the group in high consumption rate of the fast food. 55.2% of the world adolescents have been considered to consume fast food at least once a week.

The fast-food industry has as a result grown exponentially. The industry marks revenue of more than a billion dollars in the current year 2021. This is said to rise by approximately 2.5% in the future five-year margin (Wang et al., 2016). The major aspects of this market include: the age of consumers, the time of meal consumption and the type of meal choice.

References

Al-Shargie, F., & Ahmed, E. (2019). Fast Food Industry Growth in China. https://doi.org/10.31232/osf.io/w74vqChina Chain: Fast Food: Business Revenue. CEIC, https://www.ceicdata.com/en/china/fast-food/cn-chain-fast-food-business-revenue.

Hendriarto, P. (2021). Understanding of the role of digitalization to business model and innovation: economics and business review studies. Linguistics and Culture Review, 5(S1), 160-173.

Lian, L., Ning, S., Lina, Z., Guodong X, Jingjing, L., Jingcen, H., Zhiying, Z., Jianjun L., Hongxia, D., Zhisen, Shen., & Liyuan, H. (2020). Fast food consumption among young adolescents aged 12–15 years in 54 low- and middle-income countries, Global Health Action, 13:1, DOI: 10.1080/16549716.2020.1795438Robin, R., Lorelle, F., & Park, T. (2020). A Western franchise in Shanghai, China: a late entrant’s success, Journal of Strategic Marketing. DOI: 10.1080/0965254X.2020.1823457Wang, Y., Wang, L., Xue, H., & Qu, W. (2016). A Review of the Growth of the Fast Food Industry in China and Its Potential Impact on Obesity.  International journal of environmental research and public health, 13(11), 1112. https://doi.org/10.3390/ijerph13111112