Thursday, May 28, 2020
Margaret Thatcher (The Iron Lady) (Other (Not Listed) Sample) Content: NameProfessorCourseDateMargaret Thatcher (The Iron Lady)Margaret Thatcher served as Great BritainÃ ¢Ã¢â ¬s first female prime minister for three consecutive terms (1979Ã ¢Ã¢â ¬1990). It was her leadership skills that earned her the nickname 'Iron Lady.' Her economic and social policies formed the basis of Thatcherism, which is a political philosophy similar to Reaganomics in the United States. The philosophy was a critical pillar of a worldwide neoliberal movement in the 1980s (Jonathan).She was born Margaret Hilda Roberts October 13th, 1925 to Alfred and Beatrice Roberts in Grantham, Lincolnshire, England. Thatcher succumbed to stroke on 8 April 2013 at the age of 87 after several years of struggling.She attended Huntingtower Road Primary School and won a scholarship to Kesteven and Grantham Girls' School and later Somerville College, Oxford, where she studied chemistry from 1943 to 1947. After concluding her education, Margaret became a research chemist at BX Plastics near Colchester and later a barrister.She married Denis Thatcher in December 1951 (Sian). In 1953, Thatcher gave birth to twins Carol and Mark. 1950 and 1951 General Elections she lost the race for Dartford. In 1959, Thatcher won the favour of voters as Member of Parliament for Finchley. In February, 1970 Thatcher won the leadership of the Conservative Party. It was during the General Election of May 1979 when Margaret Thatcher became Prime Minister. She was victorious in the subsequent elections of June 1983 and 1987.Her main contributions were: The Falklands War, Right to Buy Scheme, Supply Side Reforms and Entrepreneurship, Foreign Investment, Defeat of the Trade Unions. Privatizations and share ownership and the end of the cold (Jonathan).Her policies best known as Thatcherism facilitated the conditions for the prospering enterprise economy of the 1980s. Thatcherism forms an important background for capitalism and democracy, which are today seen as the best and only via ble forms of political economy. Margaret Thatcher fought her battle... Margaret Thatcher (The Iron Lady) - 275 Words Margaret Thatcher (The Iron Lady) (Other (Not Listed) Sample) Content: NameProfessorCourseDateMargaret Thatcher (The Iron Lady)Margaret Thatcher served as Great BritainÃ ¢Ã¢â ¬s first female prime minister for three consecutive terms (1979Ã ¢Ã¢â ¬1990). It was her leadership skills that earned her the nickname 'Iron Lady.' Her economic and social policies formed the basis of Thatcherism, which is a political philosophy similar to Reaganomics in the United States. The philosophy was a critical pillar of a worldwide neoliberal movement in the 1980s (Jonathan).She was born Margaret Hilda Roberts October 13th, 1925 to Alfred and Beatrice Roberts in Grantham, Lincolnshire, England. Thatcher succumbed to stroke on 8 April 2013 at the age of 87 after several years of struggling.She attended Huntingtower Road Primary School and won a scholarship to Kesteven and Grantham Girls' School and later Somerville College, Oxford, where she studied chemistry from 1943 to 1947. After concluding her education, Margaret became a research chemist at BX Plastics near Colchester and later a barrister.She married Denis Thatcher in December 1951 (Sian). In 1953, Thatcher gave birth to twins Carol and Mark. 1950 and 1951 General Elections she lost the race for Dartford. In 1959, Thatcher won the favour of voters as Member of Parliament for Finchley. In February, 1970 Thatcher won the leadership of the Conservative Party. It was during the General Election of May 1979 when Margaret Thatcher became Prime Minister. She was victorious in the subsequent elections of June 1983 and 1987.Her main contributions were: The Falklands War, Right to Buy Scheme, Supply Side Reforms and Entrepreneurship, Foreign Investment, Defeat of the Trade Unions. Privatizations and share ownership and the end of the cold (Jonathan).Her policies best known as Thatcherism facilitated the conditions for the prospering enterprise economy of the 1980s. Thatcherism forms an important background for capitalism and democracy, which are today seen as the best and only via ble forms of political economy. Margaret Thatcher fought her battle...
Tuesday, May 19, 2020
Sample details Pages: 6 Words: 1946 Downloads: 5 Date added: 2019/08/15 Category Society Essay Level High school Tags: Animal Poaching Essay Did you like this example? Poaching is a complicated problem in Africa. Although millions of acres are set aside by the African governments to protect wildlife, poaching, or the illegal hunting of protected animals, continues to be heavy, (The World Its People, p577).Ã Ã Poaching has become a huge problem for various reasons and we need to put an end to it. Poachers must be and can be stopped with the right efforts and movements. DonÃ¢â¬â¢t waste time! Our writers will create an original "A Problem Of Poaching in Africa" essay for you Create order Around the world, many people are making efforts to stop this poaching/trafficking debacle. Such measures include passing laws forbidding the buying and selling of wildlife trafficking, training and equipping troops to outsmart the poachers, training dogs to be able to sniff out a trafficker, strengthening law enforcement, providing protection of endangered animals through conservation land, and educating the public. Why are people so interested in killing these endangered animals?Ã Most of the animals are being killed for their tusks and horns as well as other things, like pelt in order to be sold.Ã African elephants are being killed for their ivory tusks.Ã Ivory is used to make jewelry, piano keys, billiard balls, eating utensils, religious figurines, and trinkets. Many elephants are being killed when all of these items could be made using other substances. Due to these actions, over 35,000 elephants are killed per year because of some trinkets (AWF). Other animals that are also killed more often than they should be are black rhinos, mountain gorillas, and Grevys zebras. In the past 50 years, the black rhinos population has dropped over 97% from what it used to be (AWF). The rhino horn is sold to people who believe it has magical medicinal powers that can cure hangovers, cancer, impotence, and fevers. (Library Vol 1, 2008).Ã Out of all four of those beliefs, none of them have been p roven to work. The rhino horn is one of the most expensive items on the planet pound for pound. Currently, a pound of rhino horn is going for 60,000 dollars, compared to gold at 18,000 dollars. (AWF) As for other endangered animals, only 1,000 mountain gorillas remain across the face of the Earth. Some researchers/officials have noticed a rise in infant gorilla trafficking. On the black market, a baby gorilla skin has been said to be sold for 40,000 dollars. The amount of Grevys zebras left in Africa is appalling, only 1,000 are let and is a record low. These zebras are being hunted for their skin so people can flaunt as a jacket or another article of clothing (AWF). Out of those four animals, two of them are critically endangered. Those two are the mountain gorilla and the black rhino (AWF). Why is it so important to stop the poaching/ trafficking of animals?Ã As a human race we have a moral obligation to share the earth with the other living species.Ã If we value human rights, we should value the rights of other living creatures.Ã We need to help those other species survive, not help them become extinct.Ã These animals have the right to live freely in their own natural habitat. Another reason is that the illegal trading of these animal parts is similar to the illegal trading of drugs and weapons.Ã Crime on wildlife is a large business that is lead by dangerous illegal organizations. Funds from these illegal trades help to finance many international terrorist groups.Ã It helps to pay for the training of soldiers/ terroristsÃ and weapons.(OIPA,4 ) These organizations are killing elephants then trading the ivory for over billions of dollars per year. This funding can help terrorists become more advanced. An example of this was an attack at a Kenyan mall in 2013, by Al-Shabaab, who has been proven to trade ivory on the black market (Fieldstadt, 11). Many poachers are becoming more and more advanced using new weapons, tracking devices, night vision goggles, and many other tools. The poachers are getting smarter in other ways, too. They have found loopholes in hunting laws by hiring tourists to shoot the animals, while the poacher collects the commission.Ã They are also finding new ways to sell the items to buyers on the black-market. How can poaching be stopped? Eliminating poaching has proven to be very challenging. Many ideas have been tried, some with more success than others.Ã Creating laws to stop poaching and trafficking is one way. Using technology to fight the war on paching has proven to be helpful.Ã Improving security and law enforcement at key locations in the trade chains would help crack down on trafficking.Ã Educating people on what is happening as aÃ result of poaching is a start and has proven to be beneficial. Countries around the world have been attempting to address the problem by passing laws. Both international laws and national laws help to protect endangered species.Ã Countries have helped by calling for conservation of the habitats of these animals. They have set up refuges, parks, and preserves to help these animals.(Library Vol 1, 2008)Ã In 1989, CITES (Convention of International Trade in Endangered Species) put a hold on the international commercial trade of African elephant ivory.(Breyer, 5)Ã Also, in 1989, President Bush passed the African Elephant Conservation Act (AECA) that banned importing ivory from the African elephant. Since this was passed the market for ivory has collapsed in the United States. (Breyer,5 ) At the time, 70% of illegal ivory was then going to Asia (mostly China Thailand). This has since changed as of the end of 2017, when China finally banned the buying and selling of ivory.Ã For the first time China destroyed its ivory stocks, sending the world a message that ivory trading would not be tolerated. (Dodo) It also sent the message to its people that the elephants lives were more important than the Chinese culture of ivory carving.Ã Laws such as these has drastically reduced illegal trading and helped the elephant population increase. Training troops to stop the poaching in Africa is a necessity. Due to the advanced technology that poachers have established, many high impact weapons are being dealt out to these poachers, making them more and more difficult to stop. The poachers are using Ak-47s, grenade launchers, and even night vision goggle.Ã Enforcing the law is challenging because these animals live in remote area which make it difficult to find poachers.Ã Preparing troops to stay one step ahead of the poachers is essential two important reasons 1) stopping the killing of the animals and 2) keeping themselves safe.Ã Matching the weaponry of these people vital. Arming them with drone technology that uses night vision and thermal imaging is a huge help.Ã This allows the troops to keep better track of how the animals are moving as well as if there are poachers in specific hard to reach areas.Ã Sending wildlife rangers that are trained and prepared to find poachers is a must. Another new, high-tech alarm system helps rangers in South Africa stop poachers from killing rhinos, elephants, and other wildlife. This alarm system uses a combination of things, like WiFi, thermal cameras, scanners, and sensors, to make it a lot easier to catch the predator first. Bruce Watson says Our intention is to eradicate all forms of poaching throughout Africa, India, and Asiaand the ocean.(Neme, 24) The main goal of this new electronic device is to wipe poaching off the face of the earth. Experiments with this product have gone well, it is safe to say that this new technology will be a game changer for the good guys. Having trained sniffer dogs that will be able to sniff out the illegal substance that was taken from a carcass will be a huge help. These sniffer dogs would sit at major transportation sites, like an airport, and just wait for a criminal to pounce on and stop them in their tracks. Utilize the DNA of tusks that have been seized to help figure out the geographic origins to help locate where hot spots for poaching in Africa are.Ã This will help show law enforcement where to go to shut down ivory trade. (Nuwer,51 ) Adding support at these various checkpoints throughout the known illegal trade routes willÃ catch these criminal. Along with that, is making sure law enforcement is strong and honest.Ã Guards who are suspected of taking bribes needs to be removed.Ã Weak or corrupt authorities who can be easily threatened or bribed should not be allowed to hold such positions.Ã Having weak enforcement of poaching laws does not help the efforts of abolishing poaching. Another way to stop poachers/traffickers in their footsteps is by conserving the land around these affected animals. Many people have taken steps to make this an easier target to accomplish. A major goal of the African Wildlife Foundation is to put GPS trackers onto the species and track their movements so they could preserve the land that these animals walk on, therefore the selected animals will have tranquil living space and be able to carry out the natural processes of life. This way the people that live very close to these animals can protect them by all means and have an incentive. Conserving the land will help animals stay safe because the land that they wonder and walk around on will then be protected and not allow these poachers to have easy access to kill these animals. With the land as national parks and such, animals will be able to roam as much as they want and not have to worry about getting killed. These animals also help develop a better ecosystem for the planet. Elep hants eat shrubs or grass to prevent it from overgrowing, and their waste fertilizes soil. Lastly, a major step that needs to be taken to stop poaching is educating the public. If the everyday human is knowledgeable about this topic, then it will be easier for poaching to be stopped. For instance, if no one bought ivory or used it anymore, the need for it would go away, those animals would no longer be in danger. People could also get involved and donate money to the programs that help these animals in danger. The African Wildlife Foundation talked about the measures they have taken to make people understand the situation, Outside the continent, we have launched successful public awareness campaigns in China and Vietnam informing consumers about the brutal truths behind the global wildlife trade. We also advocate for governments and protection agencies to ban international trade in wildlife parts like ivory and introduce stiffer penalties for criminals, (AWF). Another resource that helps spread the word about animal poaching/ trafficking is Roots Shoots.Ã It is an orga nization that Jane Goodall started to help promote understanding of the environment in youth and create future leaders that show compassion towards wildlife. Poaching in Africa can be stopped with the important steps that need to be taken.Ã Ã The most effective way would be if everyone around the world need to boycott ivory products. We can do this by educating people about the senseless, devastating loss of animals.Ã If that happened, it would end the need for illegal killing of these innocent animals. Also, if countries would work with each other to tackle this problem that spans across various countries we would have a better shot.Ã Trained rangers and dogs will help the poachers be stopped. The newly developed GPS technology can make it easier to track both the animals and the poachers.Ã Lastly, as long as the public cares enough to conserve the land that these animals are on, the government trains people to protect it, and if the people across the globe are aware, poaching will be stopped. Overall, it is going to take a combination of all of these ideas to end poaching as we know it today, but it can be done!
Saturday, May 16, 2020
Fetal Alcohol Syndrome Alcohol plays a major role in society today. We consume alcohol for many purposes such as gatherings, holidays, or self fulfillment. One of the most frowned upon things that come with drinking in our society is drinking during pregnancy. Nonetheless, consumption of alcohol during pregnancy can result in pathologies for the mothers fetus leading to growth, mental, and physical birth defects, also known as Fetal Alcohol Syndrome. The severity of the effects from this syndrome can vary and are divided into two separate categories; Alcohol-related neurodevelopment disorder and alcohol-related birth defects. Each of these will have a long term effect on the child. No amount of alcohol is safe to consume during pregnancy. There is never a safe amount of alcohol that can be consumed during pregnancy. If a pregnant woman consumes any percent of alcohol, so does her unborn child which can lead to major defects in the mother fetus. Alcohol passes through the motherÃ¢â¬ â¢s placenta into her bloodstream and goes straight into the baby, since the fetus cannot break down alcohol the way an adult can, the blood alcohol level will remain very high in the immature body of the fetus for a longer period of time, putting the baby in risk of fetal alcohol syndrome. Once alcohol enters the fetus many other damaging defects can occur. Ã¢â¬Å"Alcohol can trigger cell death, causing different parts of the fetus to develop abnormally along with the way nerve cellsShow MoreRelatedCause And Effect Of Fetal Alcohol Syndrome2649 Words Ã |Ã 11 Pagesunreasonable people. Alcohol, a psychoactive drug, found within many adult beverages causes countless problems for people suffering from addiction but even more devastating are the mothers who drink when pregnant. Fetal Alcohol Syndrome is a disorder that refers to mental and physical effects of an individual whose mother consumed large quantities of alcohol during pregnancy. Alcohol can destroy neurons in a growin g fetus along with causing problems with growth and weight. In the past, alcohol has been shownRead More The Irreversible Damage Caused by Fetal Alcohol Syndrome Essay884 Words Ã |Ã 4 Pagesher baby. Excessive exposure to alcohol during pregnancy can inflict serious, permanent physical and mental damage on her child. When a pregnant woman drinks alcohol she is making her child drink also. In knowing how Fetal Alcohol Syndrome can be prevented, what the symptoms are, and who and what make up the risk factors fetal alcohol syndrome can be better understood. The National Organization on Fetal Alcohol Syndrome states Fetal Alcohol Syndrome is the name given to a group of physicalRead MoreThe Effects Of Alcohol And Its Effects On Children856 Words Ã |Ã 4 Pages Alcohol plays a major role in todayÃ¢â¬â¢s society. Everywhere we look, something is advertising alcohol. Alcohol is consumed for many purposes, whether it be for a celebration, out of boredom, or a way to relax. Alcohol has very damaging effects. Not only does alcohol cause self-inflicted diseases, but it harms unborn fetuses as well. Many women drink alcohol before they realize they are pregnant. One of the most severe effects alcohol causes an unborn fetus is Fetal Alcohol Syndrome. Fetal AlcoholRead MoreEssay on Fetal Alcohol Syndrome1390 Words Ã |Ã 6 PagesNutrition is a key component of an individualÃ¢â¬â¢s healthy well being. Many factors have a significant effect on nutrition and it is important to continuously maintain a balanced one. Having a good nutrition is one of the main defenses for an innumerous amount of illnesses and diseases that can harm the body. One would ask, Ã¢â¬Å"What is nutrition per say, and how do we maintain the balance of it?Ã¢â¬ Nutrition is defined as Ã¢â¬Å"the sum of the processes by which [a living thing] takes in and utilizes foodRead MoreFetal Alcohol Syndrome Essay1707 Words Ã |Ã 7 Pagesof prenatal alcohol exposure (Lupton, 2003). This number will only continue to grow if the risk of drinking alcohol while pregnant is not brought to the peopleÃ¢â¬â¢s attention. When the mother takes a drink of alcohol, so does the fetus, which will cause physical and behavioral problems after birth. Fetal Alcohol Syndrome ( FAS) is completely preventable and irreversible. FAS awareness and prevention is important; expectant mothers need to know the background information about the syndrome, some commonRead MoreFetal Alcohol Syndrome942 Words Ã |Ã 4 Pages Fetal Alcohol Syndrome According to Seaver, Fetal Alcohol Syndrome (FAS) is birth defects causing learning, and behavioral problems in individuals whose mothers drank alcohol during pregnancy. This disorder is very serious, yet it is recognized as one of the most preventable. This causes major issues, when something so serious could be prevented but is not. Fetal Alcohol Syndrome is a problem because it leaves a permanent effect on the unborn child, but some solutions could be educating women andRead MoreFetal Alcohol Syndrome Essay1727 Words Ã |Ã 7 PagesFetal Alcohol Syndrome Fetal Alcohol Syndrome is an increasing problem in our world today. At least 5,000 infants are born each year with FAS, or about one out of every 750 live births, which is an alarming number. In the United States there has been a significant increase in the rate of infants born with FAS form 1 per 10,000 births in 1979 to 6.7 per 10,000 in 1993 (Chang, Wilikins-Haug, Berman, Goetz 1). In a report, Substance Abuse and the American Woman, sent out by the Center on AddictionRead MoreThe Disorder Of Fetal Alcohol Syndrome1018 Words Ã |Ã 5 Pagesthe the disorder Fetal Alcohol Syndrome .This paper will aim to discuss what the disorder is ,it s history how it is diagnosed and the treatment and prevention of this disorder. Taking a sip a int hip Introduction :Behold, thou shalt conceive, and bear a son; and now drink no wine nor strong drink, neither eat any unclean thing(Bible-Judges 13:7).It has been known throughout history that the effects of alcohol use in pregnancyRead MoreThe Truth About What Alcohol Abuse Does to a Fetus1118 Words Ã |Ã 5 PagesThe Truth About Fetal Alcohol Abuse Would you have ever thought of physically, mentally, and/or emotionally harming an unborn child? In the 1990s people have noted the significant impact alcohol-related birth defects are having on our society then and now. My essay will discuss alcohol consumption among pregnant women and its adverse effects on fetal development. Fetal Alcohol Syndrome or FAS is physical and mental health problem that destroys a childs learning development.Read MoreFetal Alcohol Syndrome Essay1522 Words Ã |Ã 7 PagesFetal Alcohol Syndrome (FAS) is a disorder that can happen to children whose mothers drank sufficient amounts of alcohol sometime throughout their pregnancy. Fetal Alcohol Syndrome is a condition classified in a group called Fetal Alcohol Spectrum Disorders, and is the most known and severe of the group. FAS, depending on the factors such as location, population and race studied is considered one of the leading known causes of mental retardation and birth defects, with 0.2 Ã¢â¬â 1.5 out of every 1
Wednesday, May 6, 2020
Incompatible Ideals As children, we grow up believing that we can do anything, be anything. The world is our playground, and we were free to imagine our future. Consequently, this imagination and boundless opportunities is what draws so many to the ideals of the American Dream. The unwavering hope that anything can be achieved through determination and a tireless work-ethic. The common misconception is once we have attained the dream, the luxuries will come soon after. In actuality what happens when this dream is finally attained? Does the expectation live up to the reality? Or is our imagined facade shattered by what the future presents? The ideals and the reality of the American Dream are clearly exemplified in the protagonist of theÃ¢â¬ ¦show more contentÃ¢â¬ ¦From that day one, he leaves behind the identity of James Gatz forever. The rest of his life he will be known as Jay Gatsby, an incurable and idealistic romantic who fills his life with dreams. The most poignant and life-altering moment for the new Gatsby, is the arrival of Daisy in his life. Daisy brought youth and much needed colour into GatsbyÃ¢â¬â¢s life. Their whirlwind romance is short-lived, but the impact stays with them long after their parting. Gatsby is determined to win back the love of his life. He concludes that if he amasses a substantial wealth, he will be able to manipulate time, erasing DaisyÃ¢â¬â¢s marriage and fixing her future with him. Perhaps, this is why so many people are able to resonate with Gatsby, he invokes the sentiment of a common man. So many others have believed that if they simply change one aspect of their life and imagine it to be a particular way, the future will fall right into their hands. However, the inherent logical fallacy in this approach is the assessment that the other person in the relationship will still be the same person. What happens when the love fades, or the lover changes? Nevertheless, Gatsby future was not bound by common sense or logic. He pursued his goal by getting involved in bootlegging, and other questionable business endeavors to make quick money. He buys an ostentatious mansion on West Egg, in order to be directly across the bay from DaisyShow MoreRelated Symbols and Symbolism in The Great Gatsby Essay1207 Words Ã |Ã 5 PagesSymbolism in The Great Gatsby Ã Ã FitzgeraldÃ¢â¬â¢s The Great Gatsby has more relevance in todayÃ¢â¬â¢s society than it did when it was written. With the recent societal trend that emphasizes lack of morals and material wealth over a meaningful existence, FitzgeraldÃ¢â¬â¢s message really hits home. Which is more important - money or love? Social status or being true to oneself? Fitzgerald uses metaphor and symbols to great effect in order to illustrate what can happen when the pursuit of happinessRead MoreTheme Of Reality In The Great Gatsby1842 Words Ã |Ã 8 Pagesreality as it is.Ã¢â¬ The Creation of a false sense of reality is a prominent theme that is explored in the novel The Great Gatsby by F. Scott Fitzgerald. Through his work, Fitzgerald displays how those who build illusions to oppose the harsh realities of their dreams, cannot deal with such conflict and will, therefore, suffer dire consequences. Myrtle, Daisy and the titular protagonist Gatsby all create false illusions of their liv es as a result of conflict, forbidding them from living a life a honourable
Construct validity has to do with establishing correct operational measures for the concepts being studied (Yin 2009, p. 40). Yin (2009), writes that researchers can improve construct validity construct validity can be if multiple sources of data is employed (triangulation of data), establishing chain of evidence, and reviewing the report with their informants (p. 41). In making sure that one can draw a meaning and useful inferences from scores on particular instruments of data collection and to demonstrate the accuracy of their findings, Creswell (2013) also advice the use of member checking and triangulating data (p. 201). Quarm (2009) and Sarquah (2008) both used several data sources (interviews, documents, media, and internet) inÃ¢â¬ ¦show more contentÃ¢â¬ ¦Both studies are said to be exploratory in nature. For example, Quarm (2009) study seek to describe the main actors and the strategies they employed to push the domestic violence bill onto the government agenda for attentio n whereas Sarquah (2008) study seek to describe the main factors affecting the implementation of the fiscal decentralization policy in Akuapem South district of Ghana. 8.3 External Validity Yin (2009) defines external validity as establishing the domain to which a studyÃ¢â¬â¢s findings can be generalized beyond the immediate case study (p.40). It has to do with replication of results; generalization occurs when the same procedures are used by another researcher, the same results will be produced. Two types of generalizations have been identified by Yin (2009); these are Ã¢â¬Å"statistical generalizationÃ¢â¬ which rely on sample survey data) and Ã¢â¬Å"analytical generalizationÃ¢â¬ , which comes from case studies like experiments (p.43). In analytical generalization researchers try to generalize a set of findings to some broader theory (ibid). Both Quarm (2009) and Sarquah (2008) aimed at making analytical generalization hence both used theories in their single-case studies. Quarm (2009) study is analytically generalizable to models of agenda setting of domestic violence law in Ghana with respect to NGOs but not the agenda setting of other policies in Ghana. Sarqu ah (2008) findings in similar way can on be generalized to theories ofShow MoreRelatedExternal, Internal, and Construct Validity Essay1316 Words Ã |Ã 6 PagesValidity pertains to both the methods and the design of a research study and indicates Ã¢â¬Å"the degree with which correct inferences can be made from the results of a research studyÃ¢â¬ (Indiana University Of Pennsylvania, 2010). According to Trochim and Donnelly, there are four types of validity including conclusion, internal, construct, and external (2008). In this assignment, three of these types will be discussed. Internal validity is the extent to which a test measures what it claims to measure. ExternalRead More Validity: External, Internal, and Construct Essay examples2009 Words Ã |Ã 9 PagesValidity In research paradigm, validity and reliability are the most basic characteristic issues used in qualitative and quantitative analysis. Validity as a psychometric standard is embedded in a positivist approach, which is relevant in reflecting on the qualitative point of view ascribed to the establishment of the truth. In view of this, definition of positivism ascribe to a theory systematic to validity. Additionally, other empirical conceptions culminating from resided validity includeRead MoreCompare and Contrast the Characteristics of External, Internal, and Construct Validity1790 Words Ã |Ã 8 PagesCompare and Contrast the Characteristics of External, Internal, and Construct Validity Validity is an important aspect of the research design. For instance, in research the uses statistics as the primary form of measurement. Validity applies to the truth of a standard. A measure is valid, in general, when it (Renata, 2011, 1) includes what it devised to measure. Renata (2011) explained, Internal and external validity are the two primary types of validity (para. 1). However, both display diverse aspectsRead MoreThe Principles Of Reliability And Validity Essay928 Words Ã |Ã 4 Pagesscientific proof, then validity and reliability are what you need. In the work by Xie, Huang (2014) they describe the following: The principles of reliability and validity are fundamental cornerstones of the scientific method. Reliability is defined as the extent to which a measure is repeated under ideal conditions. Validity refers to the degree to which a test measures what it purports to measure. Establishing good quality studies need both high reliability and high validity. (p.326). BothRead MoreCommon Tests of Reliability882 Words Ã |Ã 4 PagesThese inaccuracies could mistakenly be attributed to the research variables. One of the most common tests of reliability is replication, which takes the form of test-retest, parallel forms of instruments, odd-even item correlations, or measures of internal consistency (Campbell Stanley, 1963). In inter-rater reliability, different people are utilized with the same test. This is also a strategy used to validate the reliability of data coding in qualitative research. For test-retest procedures, measurementRead MoreExternal Validity And Its Impact On The World1344 Words Ã |Ã 6 Pagesstatistics class I have had the amazing opportunity of learning about various validities and dataÃ¢â¬â¢s. The three validities in which I learned about were, internal, external and construct. I will explain these validities as well as experimental data and their usefulness in the world. Lastly, I will explain how one of these data could be useful to me in resolving an issue that I may meet in life. External Validity includes generalization claims, or the study s capacity to sum up the outcomesRead MoreA Study That Affects College Students Of Sleep1357 Words Ã |Ã 6 Pages 1. Give a one-sentence definition of internal validity. As an example, IÃ¢â¬â¢m going to conduct a study that deprives college students of sleep, to prove their grades will go down as a result. If I found a link between reduced sleep and reduced grades, what is an internally valid conclusion about the results of this study (be specific)? Internal validity is isolating certain variables to determine how well an experiment goes. In your example, we are determining the link between sleep and a decreaseRead MoreNegative Consequences Of Sharp Drop Of Crude Oil Prices On The Nigerian Economy1485 Words Ã |Ã 6 Pagesfocus more on how to measure and ensure the validity of the study, including the data collection, data analysis and overall methodology, design and even research findings. However, we are going to focus more on the validity. VALIDITY: Validity in general is the determination of how sound the information presented in the study is; based on the facts that a valid research study will present valid and believable findings (Trochim, Donnelly, 2008). Validity of a research study relies on the validlyRead MoreA Contemporary Analysis Of Accounting Professionals Work Life Balance1741 Words Ã |Ã 7 PagesA research paper is only considered valuable if it is both valid and reliable in measuring the constructs that it claims to. This paper is aimed at evaluating the validity and reliability of the research paper titled Ã¢â¬Å"A Contemporary Analysis of Accounting ProfessionalsÃ¢â¬â¢ Work-Life BalanceÃ¢â¬ by Buchheit, Dalton, Harp and Hollingsworth, published in the Accounting Horizons Journal in March 2016 in its first issue of volume 30. The research paper endeavoured to provide answers for two main research questionsRead MoreExternal, Internal, And Construct Essay738 Words Ã |Ã 3 PagesValidity: External, Intern al, and Construct Internal validity measures what it intends to measure or, more generally, if it examines what it sets out to examine. In effect, a valid study gives real answers to the research questions and provides a real test of the hypotheses. According to Aken, Berends, and Bij (2007), Ã¢â¬Å"Internal validity concerns conclusions about the relationship between phenomena. The results of a study are internally valid when conclusions about relationships are justified and
Question: Explain about the Case Study for Strategic IT Plan for BMW Group? Answer: Introduction In this particular report, it provides a strategic IT plan of BMW to meet with and aligns to the business strategy of the organization. It also summarizes the current IT department and its project structure, IT governance, and committees those are operating with BMW. Apart from all this, identification of the organizational mission and its values with the internal and external environmental factors needed to identify the IT risks within BMW using SWOT and PESTAL analysis. When the IT system implements in BMW, then identification of risks are required and mitigate it using the IT strategies. After implementing the IT strategy, it reviewed to implement the best possible IT solutions within the business operations of BMW. Finally, a cost summary is given to create a suitable balance between costs, volume and price to create a sustainable profit, whilst continually staying in positive cash flow. Background of the Company BMW is the largest car manufacturer in Germany and was founded in the year 1917. The company has a strong market position in the automobile sector (BMW, 2015). The company aims to generate a strategic IT plan by focusing on the premium segments in the international automobile markets. The current situation of the Information Technology at BMW is complex due to the poor long-term planning of the organization, limited resourcing as well as uncoordinated efforts. The strategic IT plan of BMW brings light on both strength and weakness of the IT at BMW and it enhances the services and products of IT offered by the BMW Group. Figure 1: Company logo of BMW (Source: BMW, 2015) Business Operation The BMW Group is one of the most successful manufacturers of cars as well as motorcycles globally and the largest industrial companies operated in Germany. It also has operated in aircraft engine production, hardware production, finance as well as service and electronic systems. Business Strategy BMW group provides its particular significance in its own brand through the functioning of its brand strategy (Wren, 2012). Deeply inclined by the high technology of Germany, the manufactured technology of BMW can compete with Mercedes-Benz. As the current situation of the Information Technology at BMW is complex, therefore forming a good image in the automobile sector is a big challenge for BMW to achieve their brand strategy. Current IT Department at BMW The strategic IT plan of BMW reviews the current IT department to view the situational review of the company. The IT department serves the entire requirements of BMW (Alafi, 2014). The current IT department works on highlighting the technology in the company for its future automobile such as vehicle technology, clean energy, Connected Drive as well as IT drive. It is also required to integrate labs as well as workshops that ensures for rapid implementation of technologies developed within the car (Austen, 2014). The purpose of increasing the transparency as well as accountability of the department, the reporting structure changes its dual reporting structure. The roles and responsibilities of the current IT department of BMW Group are as follows: It advances over the flow of interior information as well as developments in the IT division (Elser, 2014). It assists in allocating the resources of IT in the company It also tends to decrease the time as well as cost of the IT life cycles based on review of vendor, selection and authorization of vendor and execution of the IT plan It maintains the security of information as well as availability It also supplies the guidance and its infrastructure in order to deliver a meaningful information to the company (Feldman, 2015). The IT department improves the technique they design as well as handle the customer relationships (Toma, 2012). The department is able to control as well as store a large quantity of historical data efficiently Current Project Structure, IT Governance and Committees Project Structure As depicted in the diagram below, the business departments of BMW and the internal IT department function together for achieving certain goals: such activities include managing the sales and purchase of the project, managing the finances, marketing, production and HR personnel associated with the project (Furth, 2012). The centralized IT department is again grouped into certain teams that are responsible for the following activities: The development of the strategy plans, and the control mechanisms to be used in the project. Providing the IT solutions Providing the IT services Managing the IT infrastructure and Managing the risks and security issues of the project Figure 2: IT Structure of the BMW Group (Source: Furth, 2012, pp-546) IT governance and committees The integrated IT governance operations have to connect with the existing IT management process that is established in the group of BMW (Pasher and Ronen, 2011). These procedures together with coordinated IT governance have the objective to document the entire IT landscape, plan to further improvement over the landscape, identify the shortcomings in the landscape as well as adjust the business and IT. The existing frameworks in order to establish an IT management processes concern on the architecture of BMW and its governance models (Hartman and Werhane, 2013). It does not consider the existing processes such as TOGAF from The Open Group, Cobit from the IT governance institute etc. The committee such as Core Data Stewards is the functional team who design, monitor as well as evolve the flow of the company data, recommends policies, supports the requirements for documentation and gives training to the employees to handle the data (Joanette, 2013). The committee allows all the decentralized IT support at BMW to get a centralized forum in order to improve the communication as well as increase awareness of the issues related to IT. Identification of Organizational Mission and Values (Value Proposition Model) Mission of BMW The group of BMW is the leading provider of premium services as well as products for individual mobility. The values of the BMW are embedded in the golden history with innovative thinking. BMW always preferred to get value in the market during understanding both internal as well as the external business environment of the company (Mackey, 2014). BMW functions based on the following principles to achieve value in their organization: To the employees, the company strives to enhance their experience To provide necessary tools as well as services to enhance the software used in the car To support their strategic IT plans for efficiency as well as enhanced services Value Proposition Model (Refer to Appendix 2) Identification of Organizational Internal and External Environments SWOT Analysis At the time of formulation of IT strategy of the BMW, SWOT is analyzed and it is identified through analysis of the IT team. The following is the SWOT Analysis of BMW (Refer to appendix): Strengths: The IT team members are credited with good interpersonal skills and gives better services. The IT team has good relationships with the vendors and it keeps them supported to implement the IT system (Jones, Li and Cannella, 2013). The IT team has great steps towards the IT governance in the previous number of years. BMW also has advanced technology for its product designing. Weakness: The weakness of the IT teams is the lack of long-term planning that makes their IT system more complex. Due to this reason, the IT investment does not provide measurable value to the organization in order to gain a high level of profitability (Klochko, 2015). The weaknesses of the team are due to poor IT infrastructure of BMW, software as well as integration. Opportunities: One of the largest opportunities in the IT team is that innovation of new technology in their business operations leads to utilization of the information technology. BMW focuses to implement strategic IT plan to improve the data breach in the automobile industry. This plan will translate into best possible actions as well as changes. Threats: The availability of the financial resources on implementing the plan is one of the threats. The availability of the perfect skills for implementing the plan among the IT team members are less, therefore they are not taking the best actions for overcoming the data security issues (Kreitlein, Spreng and Franke, 2015). There is no sufficient time to schedule changes in the plan due to lack of financial sources. PESTLE Analysis Factors Description Political factors Political factors emphasize the governmental laws as well as regulations, actions of security that are applied to BMW. The factors that influence the automobile industry are: Laws and policies related to security of information Introduction of new technology in the industry Taxes and governmental foreign policies Economic factors Economic factors related to the economic growth of the company globally by improving over its security breach. The factors are: There is an implementation of new technology for manufacturing of car. It helps to grow a large amount of revenue in designing of a new product. Total increase in the GDP of the company Economic recession in the marketplace of US Social factors It is related to the change in both culture and its demographics apart from the modification in the buying techniques of the customers. Change in buying patterns due to downturn in the grown markets Environmental problems as well as awareness of risky emissions throughout the automobiles Technological factors Enhance in the use of technology in order to increase a competitive advantage Use of sophisticated design in order to overcome the decrease in profit margin of BMW Modification in the technology due to cause environmental pollution Environmental factors Transferring the taste of the customers towards eco-friendly cars as well as hybrid cars Severe application of the standards of EURO set up the curb pollution within the developing countries Awareness of the global warming Legal factors Information is gathered about the likes and dislikes of the customers using the business intelligence system. This information is the part of the legal authority of the website of the company. Table 1: PESTAL Analysis of BMW (Source: Liao and Hsu, 2012, pp-82) Risk Analysis of Current IT system at BMW Serial No. Identification of IT risks Mitigation of the risks Estimated cost to mitigate the risk (in ) Time taken to mitigate risk 1. Security risk due to storing of information of the customers In the automotive industry, it is required to keep the vital documents of the company and its prototypes of design safe from the hackers (Mackey, 2014). It is done through communications control, firewalls and encryption programs. The issue in the BMW is the data safety. BMW utilizes the e-commerce to obtain the information about the consumers likes and dislikes. This information attracts the customers more towards their automotive industry (Magdanov, 2015). This information is gathered using business intelligence system. This information is the part of the legal authority of the website of the company. Digital forensic investigation is required to identify the risks and its impacts on the industry. Timely forensic analysis helps to include the damage, conclude the scope of the breach as well as plan for a complaint response. This investigation helps to store the information of their customers and keeps the customers data secured from the third party persons. 2567 3 weeks 2. Issue in the software used inside the car of BMW The external security of BMW is breached as the hackers get free access to the onboard vehicle computer system that manages the engines and brakes of the car. The hackers might break the wireless networks on the cars in order to exploit the software glitches and vulnerabilities to attempt to hurt the drivers. The car software information should be kept secured and they should encrypt the communications in the car by using HTTP standard used in the web browsers for securing the e-commerce. 3892 4 weeks Issue due to use of public server for exchanging information The exchange of information with other factories as well as offices is done through the public server (Magdanov, 2015). Using of the public server for the exchanging of information is one of the key issues in breaching of data. BMW should use the private server for exchanging information such as cable or WiFi (Moran, 2015). It keeps the constant flow of the information as well as the innovation of new technology gives the competitive advantage for excellent communication with the factories all over the world. 2789 3 weeks Issue due to use of electronic surveillance system The issues are raised due to utilizing of electronic surveillance. BMW uses it to protect their bad utilizes (Mangram, 2012). In this case, throughout agreements prepared with the administration in corporations possessed, the construction of BMW has the accurate to contain an electronic surveillance system but it must enclose a sing notify the people in going the building regarding the CCTV. The electronic surveillance system is used for the identifying the hacker in the office. The CCTV should be kept secret and the employees should not know about the presence of CCTV in the office building. 4580 2 weeks Formulation of IT strategies to manage the Identified Risks Initiatives Based on the review of IT at BMW, its visions and values established in the plan, some initiatives are taken such as basic service, expansion of their service and service renewal. Initiatives IT strategies to manage the risk Base services The base services of BMW are initiated by increasing the security visibility of the organization (Mosavi, 2014). Theirs data are secured by two-factor authentication, secured by passwords, monitored the system and trusted employees should have access to the computer system. Service Expansion BMW should good at tracking as well as presenting the security operations through using technical metrics. The securities are measured using security KPI. It makes expansion of their service (Rodrigues, Nappi and Rozenfeld, 2014). Security KPI measures the level of risk and understands the acceptable risk thresholds from the business units. This initiative focuses on the delivery of the survey tool that is available to the staffs (Hussey and Ong, 2012). It allows the researchers in order to standardize the tool and it assures that the data collection outcomes are both secured as well as backed up (Santora and Bozer, 2015). The manager harnesses the tool that allows to collect data from the customers and employees as well as their communities. Service Renewal The network infrastructure of BMW is renewed and its aging network is renewed over a three-year period (Sassa, 2012). This renewal makes their service easier and faster than previous. Implementation of Strategic IT plan In the above section of the report, the initiatives that are being taken to mitigate the security risks of BMW have been discussed (Sassa, 2012). It has been observed that the recurrent data breaches and unauthorized access to enterprise data have occurred in the recent past, thus being indicative of the fact that the current status of the system being used to store and manage the enterprise is not up to the desirable security levels. The total time taken to implement the strategic IT plan within the business operations of BMW is around 3 months. Under such circumstances, increasing the security levels of the database system should be considered as the primary objective of the IT strategic planning. Ay the lower levels, the inclusion of the following strategic plans would be helpful in meeting the objectives of the IT strategic plan: Implementation of two way secured password systems to restrict the utilization of the database to the employees of the organization only. The IT administrators associated with the organization should have full control over all the systems being utilized to increase the security of the computer network used by the BMW: considering certain sections of the network to be restricted, based on the importance and the sensitivity of the data stored in those sections of the network (Shiva, 2015). The access to these restricted sections would be available to only those employees who are authorized to review such data. Implementation of intrusion detection and prevention systems would also reduce the chances of data intrusion or attacks on the said computer network remain noticed (Siefers, 2014). Review and Adoption of IT strategic Plan Impact of the Business of BMW Before implementing the new security solutions, BMW struggles to control over its business operations and unable to mitigate the financial risks associated with the failure of security and data breach (Magdanov, 2015). It gives threats to their customer retention. 46% of the business of BMW suffers due to failure to implement the encryption solution of their data. The percentage of causes of data breaches is shown in (Appendix 5). The IT strategic plan has a great impact on the company. It helps to increase the security visibility of BMW. By using the security KPI, it uses to measure the security operations and its customer based services increases as they are assured that their personal information is secured. The business operations of BMW are improved due to implementing security solutions. The improved area are the customers data are more secured and it is not hacked by third party. The design of their cars is kept secured with two-factor authentication password. Impact of the IT department at BMW The IT department works on highlighting the technology in the company for its future automobile such as vehicle technology. This plan, the company should us the best-secured software in their car such that their car designs are secured (Wils, Wils and Tremblay, 2014). They are increasing their security visibility so that the hackers are not getting access to the onboard vehicle computer system that manages the engines as well as brakes of the car. Therefore, this two-factor authentication is the better IT solutions for the company. Reassess strategies and the strategic planning process The principle of the concluding step is to assessment of the implemented strategies as well as the process of planned (Woodhouse, 2013). Most of the part of the implementation step occurred at the ongoing IT part of BMW. However, BMW is not engaged in the strategic planning for sometimes, therefore it is required to mark off the step as an individual one. The implementation of the two-factor authentication helps the organization to restrict the authorization of the personal data from the company (Khachidze, 2012). Therefore, the data are secured and the customers are assured of their data. The management also controlled over the security data and they should focus on the security of their car designs. The implementation of the detection system is planned to detect the attacks of the computer network. Therefore, the company should be aware of the hackers outside the company and within the company. BMW uses are new security standard for securing its e-commerce site that is used to secure the personal information of their customers. The design of the cars is stored in the company database that is secured by the password (Mackey, 2014). The password standard set out the rules for complexity of password as well as their windows standard sets out rules for hardening the clients of windows. The company uses the electronic surveillance system within the company to protect their bad employs. The strategy is made regarding that; the employees entering the building should not be notified of the security camera (Lake, 2012). The security cameras are fitted in the data storage room and trusted person should control it. The Wi-Fi password should be kept secured and it should not be shared with others. The exchange of information with other offices is done through the public server. It is the most vital issue as it is easier for the hackers to hack the computer network (Lee, 2013). Therefore, the company plans to use the private network for sharing of information. Figure 3: BMW Strategic Planning Process (Source: Woodhouse, 2013, pp-575) Costing Summary Profit and Loss for BMW Assumptions of profit and loss Year 1 Year 2 Year 3 Year 4 Year 5 Increase in yearly cumulative price - 1.00% 3.00% 5.00% 7.00% Increase in annual cumulative inflation - 1.00% 3.00% 5.00% 6.00% The rate of interest at the finale cash balance 0.50% 0.50% 0.50% 0.50% 0.50% Year 1 Year 2 Year 3 Year 4 Year 5 Revenue Gross income $500,000 $520,000 $550,000 $577,500 $658,900 Cost of IT strategic plan 200,000 200,000 206,000 216,300 240,000 Gross margin $300,000 $320,000 $344,000 $361,200 $418,900 Additional revenue $0 $0 $10,000 $0 $0 Income for interest $2,000 $2,000 $0 $0 $0 total of the revenue $302,000 $322,000 $354,000 $361,200 $418,900 Expenses for operating Plan for the strategic IT $50,000 $52,000 $53,560 $56,902 $65,000 Payroll with taxes 62,000 $63,908 $54,000 $890,245 $943,660 Depreciation 41,000 40,000 24,890 56,000 45,000 Insurance 41,000 $56,000 $56,902 $54,000 $78,906 Maintenance of the system 17,000 13,000 14,000 15,750 15,908 Utilities 32,890 $23,489 $25,000 $26,000 $28,000 Taxes for property 14,000 $14,590 $15,098 $15,853 $17,000 Administrative fees 20,000 $23,000 $23,890 $25,689 $26,000 Additional 5,000 $7,000 $8,000 $9,000 $9,540 Sum of the operating expenses $282,890 $292,987 $275,340 $1,149,439 $1,229,014 Operating income $19,110 $29,013 $78,660 ($788,239) ($810,114) Interest expense on the debt for long-term 3,600 2,789 2,190 1,290 500 Operating income before other items $15,510 $26,224 $76,470 ($789,529) ($810,614) Loss or gain on the asset sale 0 0 1,000 0 0 Additional remarkable operating cost 0 0 0 0 0 Earnings before taxes $15,510 $26,224 $77,470 ($789,529) ($810,614) Taxes on income 30% 4,653 7,867 23,241 0 0 Net income (loss) $10,857 $18,357 $54,229 ($789,529) ($810,614) Balance Sheet Assets Initial balance Year 1 Year 2 Year 3 Year 4 Year 5 Cash by means of short-range savings $49,000 $200,000 $248,900 $287,148 $459,087 $467,890 Receivable amounts 2,000 2,000 2,000 2,000 2,000 2,000 Sum of inventory 26,000 26,000 26,000 26,000 26,000 26,000 Prepaid fixed cost 1,300 1,300 1,300 1,300 1,300 1,300 Tax for income 0 0 0 0 0 0 Additional existing property 5,900 5,900 5,900 5,900 5,900 5,900 Sum of existing assets $84,200 $235,200 $284,100 $322,348 $494,287 $503,090 Security of the company $150,000 $150,000 $150,000 $150,000 $150,000 $150,000 Plan of securing the risk 120,000 120,000 120,000 120,000 120,000 120,000 Improvements over capital 0 0 0 0 0 0 equipment 120,000 120,000 120,000 120,000 120,000 120,000 Less: Accumulated depreciation expense 0 41,000 81,000 105,890 161,890 206,890 Net property/equipment $390,000 $349,000 $309,000 $284,110 $228,110 $183,110 Plan for goodwill $0 $0 $0 $0 $0 $0 Delayed in tax of income 0 0 0 0 0 0 Reserves 0 0 0 0 0 0 Deposit 0 0 0 0 0 0 Additional long-range resources 0 0 0 0 0 0 Sum of property $474,200 $584,200 $593,100 $606,458 $722,397 $686,200 Liabilities preliminary balance Year 1 Year 2 Year 3 Year 4 Year 5 Accounts owed $3,000 $3,000 $3,000 $3,000 $1,500 $1,500 Accrue operating cost 0 0 0 0 0 0 Short-range liability 0 0 0 0 0 0 Assets lease 0 0 0 0 0 0 Additional existing accountability 200 200 200 200 200 200 Sum of current liabilities $3,200 $3,200 $3,200 $3,200 $1,700 $1,700 Long-term liability from loan expense $78,000 $65,522 $50,000 $34,358 $17,598 $0 Additional long-term debt $100,000 $200,000 $150,000 $175,000 $225,000 $150,000 Sum of debt $181,200 $268,722 $203,200 $212,558 $244,298 $151,700 Additional liabilities 0 0 0 0 0 0 Sum of liabilities $81,200 $68,722 $53,200 $37,558 $19,298 $1,700 Equity Initial balance Year 1 Year 2 Year 3 Year 4 Year 5 Equity of proprietor $55,000 $55,000 $55,000 $55,000 $55,000 $55,000 Paid-in capital 200,000 200,000 200,000 200,000 200,000 200,000 Favored equity 0 0 0 0 0 0 Retain in earnings 0 10,857 29,214 83,443 (709,236) (1,519,850) Total equity $255,000 $265,857 $284,214 $338,443 ($454,236) ($1,264,850) Total liabilities and equity $336,200 $334,579 $337,414 $376,001 ($434,938) ($1,263,150) Cash Flow Year 1 Year 2 Year 3 Year 4 Year 5 Total Operating actions Net income $25,000 $37,000 $50,000 $53,890 $77,000 $242,890 Depreciation 30,000 40,900 24,890 45,000 45,000 185,790 Financial records receivable 0 0 0 0 0 0 Equipments required 0 0 0 0 0 0 Financial records payable 0 0 0 (1,500) 0 (1,500) Paying back 0 0 0 0 0 0 Additional accountability 0 0 0 0 0 0 In commission cash flow 0 0 0 0 0 0 Total operating actions $55,000 $77,900 $74,890 $97,390 $122,000 $427,180 Investing actions Expenditures $0 $0 $0 $0 $0 $0 Gaining of commerce 0 0 0 0 0 0 Sale for the constant assets $0 $0 ($1,000) $0 $0 (1,000) Additional spending cash flow 0 0 0 0 0 0 Sum of investing actions $0 $0 ($1,000) $0 $0 ($1,000) Financing activities Long-range liability $87,522 ($65,522) $9,358 $33,240 ($92,598) ($28,000) Favored supply 0 0 0 0 0 0 Sum of the cash dividend compensated 0 0 0 0 0 0 General stock 0 0 0 0 0 0 Additional financing cash flow 0 0 0 0 0 0 Total financing actions $87,522 ($65,522) $9,358 $33,240 ($92,598) ($28,000) Increasing cash flow $142,522 $12,378 $83,248 $130,630 $29,402 $398,180 Beginning cash balance $49,000 $191,522 $203,900 $287,148 $417,778 Ending cash balance $191,522 $203,900 $287,148 $417,778 $447,180 Timeline IT Strategic Plan Weekly Timeline Week 1 - 3 Week 4 - 6 Week 7- 8 Week 9 - 10 Week 11 - 12 Preliminary planning Identification of the organizational goals and values Identification of the risks and issues related to security Plan to implement a strategic IT plan Implementation of the IT strategic plan Review and adoption of strategic IT plan Conclusion It is concluded that the IT strategic plan for BMW focuses to overcome the security breach of the company. BMW utilizes the e-commerce to obtain the information about the consumers likes and dislikes, but their data are being hacked by others. The implementation of the two-factor authentication helps the organization to restrict the authorization of the personal data from the company. Besides this, the IT department of BMW should also develop specific IT risk mitigation plans that would be utilized in case any threat or attack is launched against the security system of the computer network, from internal or external sources. It should be noted that the regular up-gradation of the security system would be required to avoid further cases of data breaches. Reference List Books Hussey, R. and Ong, A. (2012).Strategic cost analysis. [New York, N.Y.] (222 East 46th Street, New York, NY 10017): Business Expert Press. Khachidze, V. (2012).Contemporary research on E-business technology and strategy. Berlin: Springer. Lake, N. (2012).The strategic planning workbook. London: Kogan Page. Lee, M. (2013).Risk Assessment and Evaluation of Predictions. New York: Springer. Pasher, E. and Ronen, T. (2011).The complete guide to knowledge management. Hoboken, N.J.: John Wiley Sons. Toma, M. (2012).The risk of trading. Hoboken, N.J.: Wiley. Wren, C. (2012).Risk assessment and environmental management. Leiden, Netherlands: Maralte. Journals Alafi, K. (2014). Developing World: Increasing Jordanian Tourism: A Strategic Plan.jmr, 6(1), p.192. Austen, D. (2014). The Value Proposition Challenge of AFS.Fisheries, 39(4), pp.149-149. Elser, J. (2014). STRATEGICALLY PLAN TO CHECK IN ON THE ASLO STRATEGIC PLAN.Limnology and Oceanography Bulletin, 23(1), pp.13-14. Feldman, G. (2015). American College of Medical Genetics and Genomics: revised scope of practice and strategic plan.Genetics in Medicine, 17(9), pp.713-713. Furth, S. (2012). Society for Pediatric Research 2012 Presidential Address: SPR strategic plan priorities 2012.Pediatr Res, 72(5), pp.545-547. Hartman, L. and Werhane, P. (2013). Proposition: Shared Value as an Incomplete Mental Model.BEJR. Joanette, Y. (2013). Living Longer, Living Better: Preview of CIHR Institute of Aging 20132018 Strategic Plan.Can. J. Aging, 32(02), pp.209-213. Jones, C., Li, M. and Cannella, A. (2013). Responses to a Governance Mandate: The Adoption of Governance Committees by NYSE Firms.Journal of Management, 41(7), pp.1873-1897. Klochko, O. (2015). PECULIARITIES OF STRATEGIC PLANNING DURING THE INTERNATIONAL STRATEGY DEVELOPMENT.Business Strategies, (9), p.4. Kreitlein, S., Spreng, S. and Franke, J. (2015). E|Benchmark A Pioneering Method for Process Planning and Sustainable Manufacturing Strategies.Procedia CIRP, 26, pp.150-155. Liao, C. and Hsu, A. (2012). Common Membership and Effective Corporate Governance: Evidence from Audit and Compensation Committees.Corporate Governance: An International Review, 21(1), pp.79-92. Mackey, S. (2014). National Pain Strategy Task Force: The Strategic Plan for the IOM Pain Report.Pain Med, 15(7), pp.1070-1071. Magdanov, P. (2015). THE GENESIS OF THE CONCEPT OF STRATEGIC PLANNING IN THE CONTEXT OF CHANGING TECHNOLOGICAL STRUCTURES.Business Strategies, (6), p.3. Magdanov, P. (2015). THE MODELS OF STRATEGIC PLANNING PROCESS WITHIN A CORPORATION.Business Strategies, (1), p.4. Mangram, M. (2012). The globalization of Tesla Motors: a strategic marketing plan analysis.Journal of Strategic Marketing, 20(4), pp.289-312. Moran, M. (2015). Board Acts on Strategic Plan, Certification, Other Issues.PN, 50(8), pp.1-1. Mosavi, A. (2014). Exploring the roles of portfolio steering committees in project portfolio governance.International Journal of Project Management, 32(3), pp.388-399. Rodrigues, K., Nappi, V. and Rozenfeld, H. (2014). A Proposal to Support the Value Proposition in Product Oriented Service Business Model of Product Service Systems.Procedia CIRP, 16, pp.211-216. Santora, J. and Bozer, G. (2015). How nonprofit organizations can ensure stability and sustainability through succession planning: make HR a strategic partner in the process.Strategic HR Review, 14(6). Sassa, K. (2012). ICL strategic plan 20122021To create a safer geo-environment.Landslides, 9(2), pp.155-164. SHIVA, V. (2015). Limiting Corporate Power and Cultivating Interdependence: A Strategic Plan for the Environment.Tikkun, 30(2), pp.26-27. Siefers, H. (2014). The ISBER Strategic Planning Process and 2014 Operating Plan.Biopreservation and Biobanking, 12(3), pp.220-221. Wils, T., Wils, L. and Tremblay, M. (2014). Revisiting the Career Anchor Model: A Proposition and an Empirical Investigation of a New Model of Career Value Structure.Relations industrielles, 69(4), p.813. Woodhouse, J. (2013). A strategic plan.br j gen pract, 63(616), pp.575-575. Website BMW, (2015).BMW | Company Profile. [online] Innovationleaders.org. Available at: https://innovationleaders.org/bmw_company_profile.html [Accessed 8 Jan. 2016].
Tuesday, May 5, 2020
Question: Describe about the Self Assessment of Specialized Knowledge Goals? Answer: Introduction: Self assessment is a procedure where a person can judge himself on different aspects of his life and make some points of his improvements (Lau et al., 2014). NMBA is a governing body which states some parameters for the nurses for their self assessments and helps to improve their standards as per the guidance (Price, 2013). As a part of healthcare domain duty and quality of a nurse is very much important that is why before placing into a hospital it is the duty to set some goals and achieve them with confidence (An Organizational Competency Validation Strategy for Registered Nurses, 2014). This is the part of a life where self assessment helps to achieve the targets (Experienced Registered Nurses' Satisfaction with Using Self-Learning Modules Versus Traditional Lecture/Discussion to Achieve Competency Goals during Hospital Orientation, 2007). Plan of Goals: The goals of life should be set on the basis of requirements. A nurse should be capable of giving demonstration about nursing concerns which leads her as a registered nurse (The Professional Practice of Registered Nurses, 2014). Nurses should be able to give care of every type of patients like acute, inhabited or may be school or colleges etc. The capabilities which NMBA needs are specialized performance, significant analysis, condition and management of care and remedial observations (Burns and Poster, 2008). Every nurse has a duty to achieve these basic goals. To enter into the professional field some goals should be set as a marker to see the achievement capability. Up gradation of Ethical Knowledge by day to day practice and case studies will help to increase the standard of nursing (Pauly et al., 2009). Strategy for doing this is very simple. Learning from every kind of situations are the best learning procedures for anyone who wants to improve his capability. Social as well as ethical improvements are very necessary for being a successful nurse and give career a boost. This ultimately specialize the performance and helps to protect any unethical practice. The nurse should assess the personal development to fulfill the needs of the patient which possible when someone follows ethical guidelines and control the mind from any illegal behavior. Maintain Professional as well as Personal Relationship with a patient is very important. Nurse is a word which people can correlates with care. Professionalism is good for everyone but for this we should not forget we are the humans and personal relation should also be maintained (Bobay, Gentile and Hagle, 2009). Strategy not needed to be developed to be a caring human being with a high ethical professional attitude. Positive attitude, mental consciousness of giving response and caring approach is sufficient to be like that. This will indicate the mutual practice enhancement. Collaboration is a great factor which helps to treat a patient correctly and this will help the organization to establish their existence in that area. This is a relevant development needed in a nurse. Increase the capability to solve critical problems which ultimately helps to increase professional knowledge as well as established as a good nurse. Critical problems are the eye opener which ultimately enhance the problem solving ability and give opportunity to learn newer things (Yoo and Park, 2014). Strategy to increase the resolving power is to handle maximum number of critical cases. Documentation of a critical procedure and assessment of this will leads to enhance the concept and increase the capability to solve problems. Significant thinking and the analysis of the same will helps the person to establish as a good professional as well as increase the capability to think and to solve further critical problems. Contributions for the development of the organization are very vital. This is the practice where a person can show his or her metal as well as physical ability for the development of the association. This is the highest challenge for a working employee to develop his or her knowledge and also develop the institution by serving the qualitative as well as qualitative aspects (Ryan and Tatum, 2012). Organizational appreciation is very important to get hike into someones carrier. Strategy is very simple to do so. Hard working with intelligence is very important. SMART work that is specific, measurable, assignable, realistic and time based work is the key to the success. An organization will always prefer this kind of employee who will follow SMART working and also appreciates their work. Contribution and self management in the organization is always noticeable. A person should carry forward his or her professional image throughout the professional journey. This is also a type of self ana lysis and will help a professional to reach the height of success. Evaluation of treatment which is very necessary because if this is not evaluated the core assessment will not be fulfilled. The nursing care is the main core work of a nurse. Every type of patients need care and love. Proper care and monitoring by nurse will help the doctors to give a patient relief from his or her disease (Bostrm et al., 2009).The general as well as critical conditioned patients are going through different types of analysis so give them complete, secure and useful nursing care will give a good output to the patients. Strategy to do so is to practice the nursing care because practice gives maximum perfection. Ethical knowledge as well as efficient working ability is needed to do so. This is the management of care which is the core work of a registered nurse. The ability to give someone hopes to survive in his or her unhealthy condition is the key success of a nurse. The evaluation of own treatment is the answer of own success. Conclusion: Nursing is a noble profession and setting the goals of the carrier and makes some clear strategies to maintain them is very essential part. Proper nursing care with SMART working will helps to reach the goals. Day to day self assessment and monitoring of the strategies will improve the confidence (Ritter-Teitel, 2004). The care and relationship with others helps to establish the cause of serving. For doing well in professional field basically self assessment and self satisfaction is the main goals. Clear and fundamental ideas are also important to apply by your own for satisfaction. Ultimately there is a only conclusion that clear effective and dedicated work is the only key for success. References: An Organizational Competency Validation Strategy for Registered Nurses. (2014).Journal for Nurses in Professional Development, 30(2), pp.E1-E2. Bobay, K., Gentile, D. and Hagle, M. (2009). The relationship of nurses' professional characteristics to levels of clinical nursing expertise.Applied Nursing Research, 22(1), pp.48-53. Bostrm, A., Ehrenberg, A., Gustavsson, J. and Wallin, L. (2009). Registered nurses' application of evidence-based practice: a national survey.Journal of Evaluation in Clinical Practice, 15(6), pp.1159-1163. Burns, P. and Poster, E. (2008). Competency Development in New Registered Nurse Graduates: Closing the Gap Between Education and Practice.The Journal of Continuing Education in Nursing, 39(2), pp.67-73. Experienced Registered Nurses' Satisfaction With Using Self-Learning Modules Versus Traditional Lecture/Discussion to Achieve Competency Goals During Hospital Orientation. (2007).Journal for Nurses in Staff Development (JNSD), 23(5), pp.221-222. Lau, R., Willetts, G., Hood, K. and Cross, W. (2014). Development of self-efficacy of newly graduated registered nurses in an aged care program.Australasian Journal on Ageing, p.n/a-n/a. Pauly, B., Varcoe, C., Storch, J. and Newton, L. (2009). Registered Nurses' Perceptions of Moral Distress and Ethical Climate.Nursing Ethics, 16(5), pp.561-573. Price, A. (2013). National Competency Framework for Critical Care Nurses.Nursing in Critical Care, 18(1), pp.52-52. Ritter-Teitel, J. (2004). Registered Nurse Hours Worked per Patient Day.JONA: The Journal of Nursing Administration, 34(4), pp.167-169. Ryan, C. and Tatum, K. (2012). Objective Measurement of Critical-Thinking Ability in Registered Nurse Applicants.JONA: The Journal of Nursing Administration, 42(2), pp.89-94. The Professional Practice of Registered Nurses. (2014).permj, 18(2), pp.95-95. Yoo, M. and Park, J. (2014). Effect of case-based learning on the development of graduate nurses' problem-solving ability.Nurse Education Today, 34(1), pp.47-51.