Wednesday, May 6, 2020

Strategic IT Plan for BMW Group

Question: Explain about the Case Study for Strategic IT Plan for BMW Group? Answer: Introduction In this particular report, it provides a strategic IT plan of BMW to meet with and aligns to the business strategy of the organization. It also summarizes the current IT department and its project structure, IT governance, and committees those are operating with BMW. Apart from all this, identification of the organizational mission and its values with the internal and external environmental factors needed to identify the IT risks within BMW using SWOT and PESTAL analysis. When the IT system implements in BMW, then identification of risks are required and mitigate it using the IT strategies. After implementing the IT strategy, it reviewed to implement the best possible IT solutions within the business operations of BMW. Finally, a cost summary is given to create a suitable balance between costs, volume and price to create a sustainable profit, whilst continually staying in positive cash flow. Background of the Company BMW is the largest car manufacturer in Germany and was founded in the year 1917. The company has a strong market position in the automobile sector (BMW, 2015). The company aims to generate a strategic IT plan by focusing on the premium segments in the international automobile markets. The current situation of the Information Technology at BMW is complex due to the poor long-term planning of the organization, limited resourcing as well as uncoordinated efforts. The strategic IT plan of BMW brings light on both strength and weakness of the IT at BMW and it enhances the services and products of IT offered by the BMW Group. Figure 1: Company logo of BMW (Source: BMW, 2015) Business Operation The BMW Group is one of the most successful manufacturers of cars as well as motorcycles globally and the largest industrial companies operated in Germany. It also has operated in aircraft engine production, hardware production, finance as well as service and electronic systems. Business Strategy BMW group provides its particular significance in its own brand through the functioning of its brand strategy (Wren, 2012). Deeply inclined by the high technology of Germany, the manufactured technology of BMW can compete with Mercedes-Benz. As the current situation of the Information Technology at BMW is complex, therefore forming a good image in the automobile sector is a big challenge for BMW to achieve their brand strategy. Current IT Department at BMW The strategic IT plan of BMW reviews the current IT department to view the situational review of the company. The IT department serves the entire requirements of BMW (Alafi, 2014). The current IT department works on highlighting the technology in the company for its future automobile such as vehicle technology, clean energy, Connected Drive as well as IT drive. It is also required to integrate labs as well as workshops that ensures for rapid implementation of technologies developed within the car (Austen, 2014). The purpose of increasing the transparency as well as accountability of the department, the reporting structure changes its dual reporting structure. The roles and responsibilities of the current IT department of BMW Group are as follows: It advances over the flow of interior information as well as developments in the IT division (Elser, 2014). It assists in allocating the resources of IT in the company It also tends to decrease the time as well as cost of the IT life cycles based on review of vendor, selection and authorization of vendor and execution of the IT plan It maintains the security of information as well as availability It also supplies the guidance and its infrastructure in order to deliver a meaningful information to the company (Feldman, 2015). The IT department improves the technique they design as well as handle the customer relationships (Toma, 2012). The department is able to control as well as store a large quantity of historical data efficiently Current Project Structure, IT Governance and Committees Project Structure As depicted in the diagram below, the business departments of BMW and the internal IT department function together for achieving certain goals: such activities include managing the sales and purchase of the project, managing the finances, marketing, production and HR personnel associated with the project (Furth, 2012). The centralized IT department is again grouped into certain teams that are responsible for the following activities: The development of the strategy plans, and the control mechanisms to be used in the project. Providing the IT solutions Providing the IT services Managing the IT infrastructure and Managing the risks and security issues of the project Figure 2: IT Structure of the BMW Group (Source: Furth, 2012, pp-546) IT governance and committees The integrated IT governance operations have to connect with the existing IT management process that is established in the group of BMW (Pasher and Ronen, 2011). These procedures together with coordinated IT governance have the objective to document the entire IT landscape, plan to further improvement over the landscape, identify the shortcomings in the landscape as well as adjust the business and IT. The existing frameworks in order to establish an IT management processes concern on the architecture of BMW and its governance models (Hartman and Werhane, 2013). It does not consider the existing processes such as TOGAF from The Open Group, Cobit from the IT governance institute etc. The committee such as Core Data Stewards is the functional team who design, monitor as well as evolve the flow of the company data, recommends policies, supports the requirements for documentation and gives training to the employees to handle the data (Joanette, 2013). The committee allows all the decentralized IT support at BMW to get a centralized forum in order to improve the communication as well as increase awareness of the issues related to IT. Identification of Organizational Mission and Values (Value Proposition Model) Mission of BMW The group of BMW is the leading provider of premium services as well as products for individual mobility. The values of the BMW are embedded in the golden history with innovative thinking. BMW always preferred to get value in the market during understanding both internal as well as the external business environment of the company (Mackey, 2014). BMW functions based on the following principles to achieve value in their organization: To the employees, the company strives to enhance their experience To provide necessary tools as well as services to enhance the software used in the car To support their strategic IT plans for efficiency as well as enhanced services Value Proposition Model (Refer to Appendix 2) Identification of Organizational Internal and External Environments SWOT Analysis At the time of formulation of IT strategy of the BMW, SWOT is analyzed and it is identified through analysis of the IT team. The following is the SWOT Analysis of BMW (Refer to appendix): Strengths: The IT team members are credited with good interpersonal skills and gives better services. The IT team has good relationships with the vendors and it keeps them supported to implement the IT system (Jones, Li and Cannella, 2013). The IT team has great steps towards the IT governance in the previous number of years. BMW also has advanced technology for its product designing. Weakness: The weakness of the IT teams is the lack of long-term planning that makes their IT system more complex. Due to this reason, the IT investment does not provide measurable value to the organization in order to gain a high level of profitability (Klochko, 2015). The weaknesses of the team are due to poor IT infrastructure of BMW, software as well as integration. Opportunities: One of the largest opportunities in the IT team is that innovation of new technology in their business operations leads to utilization of the information technology. BMW focuses to implement strategic IT plan to improve the data breach in the automobile industry. This plan will translate into best possible actions as well as changes. Threats: The availability of the financial resources on implementing the plan is one of the threats. The availability of the perfect skills for implementing the plan among the IT team members are less, therefore they are not taking the best actions for overcoming the data security issues (Kreitlein, Spreng and Franke, 2015). There is no sufficient time to schedule changes in the plan due to lack of financial sources. PESTLE Analysis Factors Description Political factors Political factors emphasize the governmental laws as well as regulations, actions of security that are applied to BMW. The factors that influence the automobile industry are: Laws and policies related to security of information Introduction of new technology in the industry Taxes and governmental foreign policies Economic factors Economic factors related to the economic growth of the company globally by improving over its security breach. The factors are: There is an implementation of new technology for manufacturing of car. It helps to grow a large amount of revenue in designing of a new product. Total increase in the GDP of the company Economic recession in the marketplace of US Social factors It is related to the change in both culture and its demographics apart from the modification in the buying techniques of the customers. Change in buying patterns due to downturn in the grown markets Environmental problems as well as awareness of risky emissions throughout the automobiles Technological factors Enhance in the use of technology in order to increase a competitive advantage Use of sophisticated design in order to overcome the decrease in profit margin of BMW Modification in the technology due to cause environmental pollution Environmental factors Transferring the taste of the customers towards eco-friendly cars as well as hybrid cars Severe application of the standards of EURO set up the curb pollution within the developing countries Awareness of the global warming Legal factors Information is gathered about the likes and dislikes of the customers using the business intelligence system. This information is the part of the legal authority of the website of the company. Table 1: PESTAL Analysis of BMW (Source: Liao and Hsu, 2012, pp-82) Risk Analysis of Current IT system at BMW Serial No. Identification of IT risks Mitigation of the risks Estimated cost to mitigate the risk (in ) Time taken to mitigate risk 1. Security risk due to storing of information of the customers In the automotive industry, it is required to keep the vital documents of the company and its prototypes of design safe from the hackers (Mackey, 2014). It is done through communications control, firewalls and encryption programs. The issue in the BMW is the data safety. BMW utilizes the e-commerce to obtain the information about the consumers likes and dislikes. This information attracts the customers more towards their automotive industry (Magdanov, 2015). This information is gathered using business intelligence system. This information is the part of the legal authority of the website of the company. Digital forensic investigation is required to identify the risks and its impacts on the industry. Timely forensic analysis helps to include the damage, conclude the scope of the breach as well as plan for a complaint response. This investigation helps to store the information of their customers and keeps the customers data secured from the third party persons. 2567 3 weeks 2. Issue in the software used inside the car of BMW The external security of BMW is breached as the hackers get free access to the onboard vehicle computer system that manages the engines and brakes of the car. The hackers might break the wireless networks on the cars in order to exploit the software glitches and vulnerabilities to attempt to hurt the drivers. The car software information should be kept secured and they should encrypt the communications in the car by using HTTP standard used in the web browsers for securing the e-commerce. 3892 4 weeks Issue due to use of public server for exchanging information The exchange of information with other factories as well as offices is done through the public server (Magdanov, 2015). Using of the public server for the exchanging of information is one of the key issues in breaching of data. BMW should use the private server for exchanging information such as cable or WiFi (Moran, 2015). It keeps the constant flow of the information as well as the innovation of new technology gives the competitive advantage for excellent communication with the factories all over the world. 2789 3 weeks Issue due to use of electronic surveillance system The issues are raised due to utilizing of electronic surveillance. BMW uses it to protect their bad utilizes (Mangram, 2012). In this case, throughout agreements prepared with the administration in corporations possessed, the construction of BMW has the accurate to contain an electronic surveillance system but it must enclose a sing notify the people in going the building regarding the CCTV. The electronic surveillance system is used for the identifying the hacker in the office. The CCTV should be kept secret and the employees should not know about the presence of CCTV in the office building. 4580 2 weeks Formulation of IT strategies to manage the Identified Risks Initiatives Based on the review of IT at BMW, its visions and values established in the plan, some initiatives are taken such as basic service, expansion of their service and service renewal. Initiatives IT strategies to manage the risk Base services The base services of BMW are initiated by increasing the security visibility of the organization (Mosavi, 2014). Theirs data are secured by two-factor authentication, secured by passwords, monitored the system and trusted employees should have access to the computer system. Service Expansion BMW should good at tracking as well as presenting the security operations through using technical metrics. The securities are measured using security KPI. It makes expansion of their service (Rodrigues, Nappi and Rozenfeld, 2014). Security KPI measures the level of risk and understands the acceptable risk thresholds from the business units. This initiative focuses on the delivery of the survey tool that is available to the staffs (Hussey and Ong, 2012). It allows the researchers in order to standardize the tool and it assures that the data collection outcomes are both secured as well as backed up (Santora and Bozer, 2015). The manager harnesses the tool that allows to collect data from the customers and employees as well as their communities. Service Renewal The network infrastructure of BMW is renewed and its aging network is renewed over a three-year period (Sassa, 2012). This renewal makes their service easier and faster than previous. Implementation of Strategic IT plan In the above section of the report, the initiatives that are being taken to mitigate the security risks of BMW have been discussed (Sassa, 2012). It has been observed that the recurrent data breaches and unauthorized access to enterprise data have occurred in the recent past, thus being indicative of the fact that the current status of the system being used to store and manage the enterprise is not up to the desirable security levels. The total time taken to implement the strategic IT plan within the business operations of BMW is around 3 months. Under such circumstances, increasing the security levels of the database system should be considered as the primary objective of the IT strategic planning. Ay the lower levels, the inclusion of the following strategic plans would be helpful in meeting the objectives of the IT strategic plan: Implementation of two way secured password systems to restrict the utilization of the database to the employees of the organization only. The IT administrators associated with the organization should have full control over all the systems being utilized to increase the security of the computer network used by the BMW: considering certain sections of the network to be restricted, based on the importance and the sensitivity of the data stored in those sections of the network (Shiva, 2015). The access to these restricted sections would be available to only those employees who are authorized to review such data. Implementation of intrusion detection and prevention systems would also reduce the chances of data intrusion or attacks on the said computer network remain noticed (Siefers, 2014). Review and Adoption of IT strategic Plan Impact of the Business of BMW Before implementing the new security solutions, BMW struggles to control over its business operations and unable to mitigate the financial risks associated with the failure of security and data breach (Magdanov, 2015). It gives threats to their customer retention. 46% of the business of BMW suffers due to failure to implement the encryption solution of their data. The percentage of causes of data breaches is shown in (Appendix 5). The IT strategic plan has a great impact on the company. It helps to increase the security visibility of BMW. By using the security KPI, it uses to measure the security operations and its customer based services increases as they are assured that their personal information is secured. The business operations of BMW are improved due to implementing security solutions. The improved area are the customers data are more secured and it is not hacked by third party. The design of their cars is kept secured with two-factor authentication password. Impact of the IT department at BMW The IT department works on highlighting the technology in the company for its future automobile such as vehicle technology. This plan, the company should us the best-secured software in their car such that their car designs are secured (Wils, Wils and Tremblay, 2014). They are increasing their security visibility so that the hackers are not getting access to the onboard vehicle computer system that manages the engines as well as brakes of the car. Therefore, this two-factor authentication is the better IT solutions for the company. Reassess strategies and the strategic planning process The principle of the concluding step is to assessment of the implemented strategies as well as the process of planned (Woodhouse, 2013). Most of the part of the implementation step occurred at the ongoing IT part of BMW. However, BMW is not engaged in the strategic planning for sometimes, therefore it is required to mark off the step as an individual one. The implementation of the two-factor authentication helps the organization to restrict the authorization of the personal data from the company (Khachidze, 2012). Therefore, the data are secured and the customers are assured of their data. The management also controlled over the security data and they should focus on the security of their car designs. The implementation of the detection system is planned to detect the attacks of the computer network. Therefore, the company should be aware of the hackers outside the company and within the company. BMW uses are new security standard for securing its e-commerce site that is used to secure the personal information of their customers. The design of the cars is stored in the company database that is secured by the password (Mackey, 2014). The password standard set out the rules for complexity of password as well as their windows standard sets out rules for hardening the clients of windows. The company uses the electronic surveillance system within the company to protect their bad employs. The strategy is made regarding that; the employees entering the building should not be notified of the security camera (Lake, 2012). The security cameras are fitted in the data storage room and trusted person should control it. The Wi-Fi password should be kept secured and it should not be shared with others. The exchange of information with other offices is done through the public server. It is the most vital issue as it is easier for the hackers to hack the computer network (Lee, 2013). Therefore, the company plans to use the private network for sharing of information. Figure 3: BMW Strategic Planning Process (Source: Woodhouse, 2013, pp-575) Costing Summary Profit and Loss for BMW Assumptions of profit and loss Year 1 Year 2 Year 3 Year 4 Year 5 Increase in yearly cumulative price - 1.00% 3.00% 5.00% 7.00% Increase in annual cumulative inflation - 1.00% 3.00% 5.00% 6.00% The rate of interest at the finale cash balance 0.50% 0.50% 0.50% 0.50% 0.50% Year 1 Year 2 Year 3 Year 4 Year 5 Revenue Gross income $500,000 $520,000 $550,000 $577,500 $658,900 Cost of IT strategic plan 200,000 200,000 206,000 216,300 240,000 Gross margin $300,000 $320,000 $344,000 $361,200 $418,900 Additional revenue $0 $0 $10,000 $0 $0 Income for interest $2,000 $2,000 $0 $0 $0 total of the revenue $302,000 $322,000 $354,000 $361,200 $418,900 Expenses for operating Plan for the strategic IT $50,000 $52,000 $53,560 $56,902 $65,000 Payroll with taxes 62,000 $63,908 $54,000 $890,245 $943,660 Depreciation 41,000 40,000 24,890 56,000 45,000 Insurance 41,000 $56,000 $56,902 $54,000 $78,906 Maintenance of the system 17,000 13,000 14,000 15,750 15,908 Utilities 32,890 $23,489 $25,000 $26,000 $28,000 Taxes for property 14,000 $14,590 $15,098 $15,853 $17,000 Administrative fees 20,000 $23,000 $23,890 $25,689 $26,000 Additional 5,000 $7,000 $8,000 $9,000 $9,540 Sum of the operating expenses $282,890 $292,987 $275,340 $1,149,439 $1,229,014 Operating income $19,110 $29,013 $78,660 ($788,239) ($810,114) Interest expense on the debt for long-term 3,600 2,789 2,190 1,290 500 Operating income before other items $15,510 $26,224 $76,470 ($789,529) ($810,614) Loss or gain on the asset sale 0 0 1,000 0 0 Additional remarkable operating cost 0 0 0 0 0 Earnings before taxes $15,510 $26,224 $77,470 ($789,529) ($810,614) Taxes on income 30% 4,653 7,867 23,241 0 0 Net income (loss) $10,857 $18,357 $54,229 ($789,529) ($810,614) Balance Sheet Assets Initial balance Year 1 Year 2 Year 3 Year 4 Year 5 Cash by means of short-range savings $49,000 $200,000 $248,900 $287,148 $459,087 $467,890 Receivable amounts 2,000 2,000 2,000 2,000 2,000 2,000 Sum of inventory 26,000 26,000 26,000 26,000 26,000 26,000 Prepaid fixed cost 1,300 1,300 1,300 1,300 1,300 1,300 Tax for income 0 0 0 0 0 0 Additional existing property 5,900 5,900 5,900 5,900 5,900 5,900 Sum of existing assets $84,200 $235,200 $284,100 $322,348 $494,287 $503,090 Security of the company $150,000 $150,000 $150,000 $150,000 $150,000 $150,000 Plan of securing the risk 120,000 120,000 120,000 120,000 120,000 120,000 Improvements over capital 0 0 0 0 0 0 equipment 120,000 120,000 120,000 120,000 120,000 120,000 Less: Accumulated depreciation expense 0 41,000 81,000 105,890 161,890 206,890 Net property/equipment $390,000 $349,000 $309,000 $284,110 $228,110 $183,110 Plan for goodwill $0 $0 $0 $0 $0 $0 Delayed in tax of income 0 0 0 0 0 0 Reserves 0 0 0 0 0 0 Deposit 0 0 0 0 0 0 Additional long-range resources 0 0 0 0 0 0 Sum of property $474,200 $584,200 $593,100 $606,458 $722,397 $686,200 Liabilities preliminary balance Year 1 Year 2 Year 3 Year 4 Year 5 Accounts owed $3,000 $3,000 $3,000 $3,000 $1,500 $1,500 Accrue operating cost 0 0 0 0 0 0 Short-range liability 0 0 0 0 0 0 Assets lease 0 0 0 0 0 0 Additional existing accountability 200 200 200 200 200 200 Sum of current liabilities $3,200 $3,200 $3,200 $3,200 $1,700 $1,700 Long-term liability from loan expense $78,000 $65,522 $50,000 $34,358 $17,598 $0 Additional long-term debt $100,000 $200,000 $150,000 $175,000 $225,000 $150,000 Sum of debt $181,200 $268,722 $203,200 $212,558 $244,298 $151,700 Additional liabilities 0 0 0 0 0 0 Sum of liabilities $81,200 $68,722 $53,200 $37,558 $19,298 $1,700 Equity Initial balance Year 1 Year 2 Year 3 Year 4 Year 5 Equity of proprietor $55,000 $55,000 $55,000 $55,000 $55,000 $55,000 Paid-in capital 200,000 200,000 200,000 200,000 200,000 200,000 Favored equity 0 0 0 0 0 0 Retain in earnings 0 10,857 29,214 83,443 (709,236) (1,519,850) Total equity $255,000 $265,857 $284,214 $338,443 ($454,236) ($1,264,850) Total liabilities and equity $336,200 $334,579 $337,414 $376,001 ($434,938) ($1,263,150) Cash Flow Year 1 Year 2 Year 3 Year 4 Year 5 Total Operating actions Net income $25,000 $37,000 $50,000 $53,890 $77,000 $242,890 Depreciation 30,000 40,900 24,890 45,000 45,000 185,790 Financial records receivable 0 0 0 0 0 0 Equipments required 0 0 0 0 0 0 Financial records payable 0 0 0 (1,500) 0 (1,500) Paying back 0 0 0 0 0 0 Additional accountability 0 0 0 0 0 0 In commission cash flow 0 0 0 0 0 0 Total operating actions $55,000 $77,900 $74,890 $97,390 $122,000 $427,180 Investing actions Expenditures $0 $0 $0 $0 $0 $0 Gaining of commerce 0 0 0 0 0 0 Sale for the constant assets $0 $0 ($1,000) $0 $0 (1,000) Additional spending cash flow 0 0 0 0 0 0 Sum of investing actions $0 $0 ($1,000) $0 $0 ($1,000) Financing activities Long-range liability $87,522 ($65,522) $9,358 $33,240 ($92,598) ($28,000) Favored supply 0 0 0 0 0 0 Sum of the cash dividend compensated 0 0 0 0 0 0 General stock 0 0 0 0 0 0 Additional financing cash flow 0 0 0 0 0 0 Total financing actions $87,522 ($65,522) $9,358 $33,240 ($92,598) ($28,000) Increasing cash flow $142,522 $12,378 $83,248 $130,630 $29,402 $398,180 Beginning cash balance $49,000 $191,522 $203,900 $287,148 $417,778 Ending cash balance $191,522 $203,900 $287,148 $417,778 $447,180 Timeline IT Strategic Plan Weekly Timeline Week 1 - 3 Week 4 - 6 Week 7- 8 Week 9 - 10 Week 11 - 12 Preliminary planning Identification of the organizational goals and values Identification of the risks and issues related to security Plan to implement a strategic IT plan Implementation of the IT strategic plan Review and adoption of strategic IT plan Conclusion It is concluded that the IT strategic plan for BMW focuses to overcome the security breach of the company. BMW utilizes the e-commerce to obtain the information about the consumers likes and dislikes, but their data are being hacked by others. The implementation of the two-factor authentication helps the organization to restrict the authorization of the personal data from the company. Besides this, the IT department of BMW should also develop specific IT risk mitigation plans that would be utilized in case any threat or attack is launched against the security system of the computer network, from internal or external sources. It should be noted that the regular up-gradation of the security system would be required to avoid further cases of data breaches. Reference List Books Hussey, R. and Ong, A. (2012).Strategic cost analysis. [New York, N.Y.] (222 East 46th Street, New York, NY 10017): Business Expert Press. Khachidze, V. (2012).Contemporary research on E-business technology and strategy. Berlin: Springer. Lake, N. (2012).The strategic planning workbook. London: Kogan Page. Lee, M. (2013).Risk Assessment and Evaluation of Predictions. New York: Springer. Pasher, E. and Ronen, T. (2011).The complete guide to knowledge management. Hoboken, N.J.: John Wiley Sons. Toma, M. (2012).The risk of trading. Hoboken, N.J.: Wiley. Wren, C. (2012).Risk assessment and environmental management. Leiden, Netherlands: Maralte. Journals Alafi, K. (2014). Developing World: Increasing Jordanian Tourism: A Strategic Plan.jmr, 6(1), p.192. Austen, D. (2014). The Value Proposition Challenge of AFS.Fisheries, 39(4), pp.149-149. Elser, J. (2014). STRATEGICALLY PLAN TO CHECK IN ON THE ASLO STRATEGIC PLAN.Limnology and Oceanography Bulletin, 23(1), pp.13-14. Feldman, G. (2015). American College of Medical Genetics and Genomics: revised scope of practice and strategic plan.Genetics in Medicine, 17(9), pp.713-713. Furth, S. (2012). Society for Pediatric Research 2012 Presidential Address: SPR strategic plan priorities 2012.Pediatr Res, 72(5), pp.545-547. Hartman, L. and Werhane, P. (2013). Proposition: Shared Value as an Incomplete Mental Model.BEJR. Joanette, Y. (2013). Living Longer, Living Better: Preview of CIHR Institute of Aging 20132018 Strategic Plan.Can. J. Aging, 32(02), pp.209-213. Jones, C., Li, M. and Cannella, A. (2013). Responses to a Governance Mandate: The Adoption of Governance Committees by NYSE Firms.Journal of Management, 41(7), pp.1873-1897. Klochko, O. (2015). PECULIARITIES OF STRATEGIC PLANNING DURING THE INTERNATIONAL STRATEGY DEVELOPMENT.Business Strategies, (9), p.4. Kreitlein, S., Spreng, S. and Franke, J. (2015). E|Benchmark A Pioneering Method for Process Planning and Sustainable Manufacturing Strategies.Procedia CIRP, 26, pp.150-155. Liao, C. and Hsu, A. (2012). Common Membership and Effective Corporate Governance: Evidence from Audit and Compensation Committees.Corporate Governance: An International Review, 21(1), pp.79-92. Mackey, S. (2014). National Pain Strategy Task Force: The Strategic Plan for the IOM Pain Report.Pain Med, 15(7), pp.1070-1071. Magdanov, P. (2015). THE GENESIS OF THE CONCEPT OF STRATEGIC PLANNING IN THE CONTEXT OF CHANGING TECHNOLOGICAL STRUCTURES.Business Strategies, (6), p.3. Magdanov, P. (2015). THE MODELS OF STRATEGIC PLANNING PROCESS WITHIN A CORPORATION.Business Strategies, (1), p.4. Mangram, M. (2012). The globalization of Tesla Motors: a strategic marketing plan analysis.Journal of Strategic Marketing, 20(4), pp.289-312. Moran, M. (2015). Board Acts on Strategic Plan, Certification, Other Issues.PN, 50(8), pp.1-1. Mosavi, A. (2014). Exploring the roles of portfolio steering committees in project portfolio governance.International Journal of Project Management, 32(3), pp.388-399. Rodrigues, K., Nappi, V. and Rozenfeld, H. (2014). A Proposal to Support the Value Proposition in Product Oriented Service Business Model of Product Service Systems.Procedia CIRP, 16, pp.211-216. Santora, J. and Bozer, G. (2015). How nonprofit organizations can ensure stability and sustainability through succession planning: make HR a strategic partner in the process.Strategic HR Review, 14(6). Sassa, K. (2012). ICL strategic plan 20122021To create a safer geo-environment.Landslides, 9(2), pp.155-164. SHIVA, V. (2015). Limiting Corporate Power and Cultivating Interdependence: A Strategic Plan for the Environment.Tikkun, 30(2), pp.26-27. Siefers, H. (2014). The ISBER Strategic Planning Process and 2014 Operating Plan.Biopreservation and Biobanking, 12(3), pp.220-221. Wils, T., Wils, L. and Tremblay, M. (2014). Revisiting the Career Anchor Model: A Proposition and an Empirical Investigation of a New Model of Career Value Structure.Relations industrielles, 69(4), p.813. Woodhouse, J. (2013). A strategic plan.br j gen pract, 63(616), pp.575-575. Website BMW, (2015).BMW | Company Profile. [online] Innovationleaders.org. Available at: https://innovationleaders.org/bmw_company_profile.html [Accessed 8 Jan. 2016].

Tuesday, May 5, 2020

Self-Assessment of Specialized Knowledge Goals

Question: Describe about the Self Assessment of Specialized Knowledge Goals? Answer: Introduction: Self assessment is a procedure where a person can judge himself on different aspects of his life and make some points of his improvements (Lau et al., 2014). NMBA is a governing body which states some parameters for the nurses for their self assessments and helps to improve their standards as per the guidance (Price, 2013). As a part of healthcare domain duty and quality of a nurse is very much important that is why before placing into a hospital it is the duty to set some goals and achieve them with confidence (An Organizational Competency Validation Strategy for Registered Nurses, 2014). This is the part of a life where self assessment helps to achieve the targets (Experienced Registered Nurses' Satisfaction with Using Self-Learning Modules Versus Traditional Lecture/Discussion to Achieve Competency Goals during Hospital Orientation, 2007). Plan of Goals: The goals of life should be set on the basis of requirements. A nurse should be capable of giving demonstration about nursing concerns which leads her as a registered nurse (The Professional Practice of Registered Nurses, 2014). Nurses should be able to give care of every type of patients like acute, inhabited or may be school or colleges etc. The capabilities which NMBA needs are specialized performance, significant analysis, condition and management of care and remedial observations (Burns and Poster, 2008). Every nurse has a duty to achieve these basic goals. To enter into the professional field some goals should be set as a marker to see the achievement capability. Up gradation of Ethical Knowledge by day to day practice and case studies will help to increase the standard of nursing (Pauly et al., 2009). Strategy for doing this is very simple. Learning from every kind of situations are the best learning procedures for anyone who wants to improve his capability. Social as well as ethical improvements are very necessary for being a successful nurse and give career a boost. This ultimately specialize the performance and helps to protect any unethical practice. The nurse should assess the personal development to fulfill the needs of the patient which possible when someone follows ethical guidelines and control the mind from any illegal behavior. Maintain Professional as well as Personal Relationship with a patient is very important. Nurse is a word which people can correlates with care. Professionalism is good for everyone but for this we should not forget we are the humans and personal relation should also be maintained (Bobay, Gentile and Hagle, 2009). Strategy not needed to be developed to be a caring human being with a high ethical professional attitude. Positive attitude, mental consciousness of giving response and caring approach is sufficient to be like that. This will indicate the mutual practice enhancement. Collaboration is a great factor which helps to treat a patient correctly and this will help the organization to establish their existence in that area. This is a relevant development needed in a nurse. Increase the capability to solve critical problems which ultimately helps to increase professional knowledge as well as established as a good nurse. Critical problems are the eye opener which ultimately enhance the problem solving ability and give opportunity to learn newer things (Yoo and Park, 2014). Strategy to increase the resolving power is to handle maximum number of critical cases. Documentation of a critical procedure and assessment of this will leads to enhance the concept and increase the capability to solve problems. Significant thinking and the analysis of the same will helps the person to establish as a good professional as well as increase the capability to think and to solve further critical problems. Contributions for the development of the organization are very vital. This is the practice where a person can show his or her metal as well as physical ability for the development of the association. This is the highest challenge for a working employee to develop his or her knowledge and also develop the institution by serving the qualitative as well as qualitative aspects (Ryan and Tatum, 2012). Organizational appreciation is very important to get hike into someones carrier. Strategy is very simple to do so. Hard working with intelligence is very important. SMART work that is specific, measurable, assignable, realistic and time based work is the key to the success. An organization will always prefer this kind of employee who will follow SMART working and also appreciates their work. Contribution and self management in the organization is always noticeable. A person should carry forward his or her professional image throughout the professional journey. This is also a type of self ana lysis and will help a professional to reach the height of success. Evaluation of treatment which is very necessary because if this is not evaluated the core assessment will not be fulfilled. The nursing care is the main core work of a nurse. Every type of patients need care and love. Proper care and monitoring by nurse will help the doctors to give a patient relief from his or her disease (Bostrm et al., 2009).The general as well as critical conditioned patients are going through different types of analysis so give them complete, secure and useful nursing care will give a good output to the patients. Strategy to do so is to practice the nursing care because practice gives maximum perfection. Ethical knowledge as well as efficient working ability is needed to do so. This is the management of care which is the core work of a registered nurse. The ability to give someone hopes to survive in his or her unhealthy condition is the key success of a nurse. The evaluation of own treatment is the answer of own success. Conclusion: Nursing is a noble profession and setting the goals of the carrier and makes some clear strategies to maintain them is very essential part. Proper nursing care with SMART working will helps to reach the goals. Day to day self assessment and monitoring of the strategies will improve the confidence (Ritter-Teitel, 2004). The care and relationship with others helps to establish the cause of serving. For doing well in professional field basically self assessment and self satisfaction is the main goals. Clear and fundamental ideas are also important to apply by your own for satisfaction. Ultimately there is a only conclusion that clear effective and dedicated work is the only key for success. References: An Organizational Competency Validation Strategy for Registered Nurses. (2014).Journal for Nurses in Professional Development, 30(2), pp.E1-E2. Bobay, K., Gentile, D. and Hagle, M. (2009). The relationship of nurses' professional characteristics to levels of clinical nursing expertise.Applied Nursing Research, 22(1), pp.48-53. Bostrm, A., Ehrenberg, A., Gustavsson, J. and Wallin, L. (2009). Registered nurses' application of evidence-based practice: a national survey.Journal of Evaluation in Clinical Practice, 15(6), pp.1159-1163. Burns, P. and Poster, E. (2008). Competency Development in New Registered Nurse Graduates: Closing the Gap Between Education and Practice.The Journal of Continuing Education in Nursing, 39(2), pp.67-73. Experienced Registered Nurses' Satisfaction With Using Self-Learning Modules Versus Traditional Lecture/Discussion to Achieve Competency Goals During Hospital Orientation. (2007).Journal for Nurses in Staff Development (JNSD), 23(5), pp.221-222. Lau, R., Willetts, G., Hood, K. and Cross, W. (2014). Development of self-efficacy of newly graduated registered nurses in an aged care program.Australasian Journal on Ageing, p.n/a-n/a. Pauly, B., Varcoe, C., Storch, J. and Newton, L. (2009). Registered Nurses' Perceptions of Moral Distress and Ethical Climate.Nursing Ethics, 16(5), pp.561-573. Price, A. (2013). National Competency Framework for Critical Care Nurses.Nursing in Critical Care, 18(1), pp.52-52. Ritter-Teitel, J. (2004). Registered Nurse Hours Worked per Patient Day.JONA: The Journal of Nursing Administration, 34(4), pp.167-169. Ryan, C. and Tatum, K. (2012). Objective Measurement of Critical-Thinking Ability in Registered Nurse Applicants.JONA: The Journal of Nursing Administration, 42(2), pp.89-94. The Professional Practice of Registered Nurses. (2014).permj, 18(2), pp.95-95. Yoo, M. and Park, J. (2014). Effect of case-based learning on the development of graduate nurses' problem-solving ability.Nurse Education Today, 34(1), pp.47-51.

Thursday, April 16, 2020

Osteoporosis essay Essay Example

Osteoporosis essay Essay Osteoporosis â€Å"Thirty-five year old Donna Duckworth is learning how to care for her newborn of five weeks, when she bends over the baby’s crib and feels something give in her back. The next day and the following week, the pain becomes unbearable in her back. She is breast-feeding and does not want to take any medication so she lives with the intense and continuing pain. Within a few weeks, she can no longer stand it so she goes to see her physician who orders blood work, does a complete physical and as a result, sends her to see an orthopedist who x-rays and does a bone density study. The diagnosis comes back as osteoporosis and it is found she has fractured three of her lumbar and four of her cervical vertebra.† Osteoporosis is a disease that affects the inside of your bones. Osteoporosis can affect anyone at any time in his or her life, but mostly in his or her later years. After reading, one can know what the signs and symptoms of osteoporosis are, what the probable diagnosis is, if it is treatable, what the prognosis is, what a health care practioner would do, who can be effected, what can be done to prevent it, and what new treatments are available. (NOF, 2010) â€Å"A person that has osteoporosis has bones that have lost substances as well as calcium, and other minerals† (UCSF Medical Center, 2010). Osteoporosis has signs and symptoms that one can look for within them. Osteoporosis is not gender selective. There are no symptoms of osteoporosis in its early stages, but there are symptoms that occur late in the disease. Some of the symptoms that occur late in the disease are bone pain or tenderness, fractures, loss of height, lower back pain due to fractures, neck pain due to fractures and curvature of the spine (The New York Times, 2010). Even though any bone break could be a sign of osteoporosis, one is most likely to have a compress fracture in their spinal vertebra. â€Å"These bone fractures are a result of weakened bone cracking from the normal pressure of a person standing upright† (UCSF Medical Center, 2010). The spinal vertebra breaks often result in the curvature of the spine at the shoulders (UCSF Medical Center, 201 0). â€Å"The curvature of the spine is sometimes called a ‘widow’s hump’† (UCSF Medical Center, 2010). (NOF, 2010) We will write a custom essay sample on Osteoporosis essay specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Osteoporosis essay specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Osteoporosis essay specifically for you FOR ONLY $16.38 $13.9/page Hire Writer â€Å"Pregnant adult women need an extra 400 milligrams of calcium daily† (Willis, 2010). â€Å"Thats about 50 percent more than recommended for women 25 and older† (Willis, 2010). â€Å"If there is not enough calcium in the mothers diet, the fetus may draw calcium from the mothers bones† (Willis, 2010). â€Å"Calcium deficiency in pregnancy may result in osteopenia (decreased bone density) in the mother† (Willis, 2010). Ms. Duckworth was in the standing position at the time that she felt something give in her back. Considering Ms. Duckworth gave birth within a year and her age, the likelihood of her having osteoporosis probable due to the improper amount of calcium intake. Diagnosis is crucial in osteoporosis. One of the best ways to determine if one has osteoporosis is by doing a bone density test. There are different types of techniques that can be performed in order to diagnose osteoporosis. Some of the different techniques are dual X-ray absorptiometry (DXA), ultrasound, quantitative computerized tomography (QCT), and lateral radiographs (UCSF Medical Center, 2010). DXA is a can of the spine with a low-dose X-ray (UCSF Medical Center, 2010). (NOF, 2010) Ms. Duckworth should have a DXA of the spine and hip areas as well as the blood and urine tests. If necessary, a QCT should be ran based on the results of the DXA. These tests will determine the severity of Ms. Duckworth’s bone density issue. It will tell if she has osteopena due to pregnancy or a more severe case, osteoporosis. â€Å"Almost 80% of bone density is determined by heredity and 20% by lifestyle† (WebMD, 2010). â€Å"Bone mineral density tests (BMD) shows how dense bones are and whether you have osteoporosis† (WebMD, 2010). â€Å"This information helps determine which prevention or treatment steps are needed† (WebMD, 2010). There are different laboratory tests that can be ran by doctors that helps in diagnosing osteoporosis. These tests are run with samples of blood and urine from the patient. Some of the tests are blood calcium levels, 24-hour urine calcium measurement, thyroid function tests, parathyroid hormone levels, testosterone levels in men, 25-hydroxyvitamin D test to determine whether the body had enough vitamin D, and biochemical marker tests, such as NTX and CTX (NOF, 2010). Osteoporosis is a treatable disease, but not a curable one. There are different types of treatment for osteoporosis. Some of the medications that can be taken for treatment of osteoporosis are estrogen, bisphosphonates, calcitionin, raloxifene, parathyroid hormone, and testosterone replacement (UCSF Medical Center, 2010). Some of the more common names for bisphosphonates are Fosamax, Actonel, Boniva, and Reclast (Mayo Clinic, 2009). These treatments are taken orally once a week or once a month. In addition to the medications, there is also the treatment of exercise and diet. With a diet high in calcium, stopping unhealthy habits, like smoking and drinking, and regular exercise can reduce the likelihood of bone fractures in people with osteoporosis (The New York Times, 2010). In Ms. Duckworth’s incident, it would be recommended that she increase the amount of calcium in her diet and exercise, and depending on the severity of the osteoporosis, medication. Prognosis for osteoporosis is that the disease is treatable, but not curable. There is not one simple treatment for this disease. If one has the markers for osteoporosis, then the amount of risks should be kept to a minimal. Prevention is the best way to lower the odds of obtaining osteoporosis. One should make sure that the amount of calcium needed is in their diet. They should also develop an exercise program that avoids the risk of falling or could be considered high-impact, as that those could cause fractures. Ms. Duckworth future could turn to one as beneficial as it was before the spinal fracture. With proper diet with high calcium intake, an exercise program to reduce the likelihood of fractures, medication, and check-ups Ms. Duckworth could be back to her normal activities. As a healthcare practioner, Ms. Duckworth would be advised to increase the amount of calcium in her diet and add an exercise regiment. Based on Ms. Duckworth’s blood and urine analysis, it would also include medication if necessary. Ms. Duckworth would also be scheduled for routine check-ups to see the progression or recession of the osteoporosis. Family history would also need to be looked at for Ms. Duckworth. As previously stated, 80% of persons with osteoporosis obtained the disease through hereditary genetics, 20% obtain it through life choices and medical conditions. If Ms. Duckworth were suffering from osteoporosis from hereditary, treatment with medication would be probable, instead of just diet and exercise. Osteoporosis most commonly is diagnosed in women and men over the age of 50. Osteoporosis is considered a health threat for 44 million U.S. women and men aged 50 and older (NOF, 2010). The following chart gives an indication of the prevalence of osteoporosis in women and men in the U.S. through the year 2020 (NOF, 2010). Prevalence of Osteoporosis and Low Bone Mass in People Aged 50 and Over 200220102020 Osteoporosis and Low Bone Mass in Women and Men43,600,00052,400,00061,400,000 Osteoporosis in Women and Men10,100,00012,000,00013,900,000 Low Bone Mass in Women and Men33,600,00040,400,00047,500,000 Women With Osteoporosis or Low Bone Mass29,600,00035,100,00040,900,000 Women With Osteoporosis7,800,0009,100,00010,500,000 Women With Low Bone Mass21,800,00026,000,00030,400,000 Men With Osteoporosis and Low Bone Mass14,100,00017,300,00020,500,000 Men With Osteoporosis2,300,0002,800,0003,300,000 Men With Low Bone Mass11,800,00014,400,00017,100,000 (NOF, 2010) Even though there are several different ways to prevent progression of osteoporosis, they are not a guarantee that it will stop the progression. With the medication as treatment for the osteoporosis, there are still occasions that bone fractures can occur. â€Å"The Food and Drug Administration issued a warning linking long-term use of popular osteoporosis drugs to an unusual fracture of the thigh bone† (Wilson, 2010). With the profound results of the bisphosphonates slowing the loss of bone mass, they have been proven to have nagging safety concerns that are jaw osteonecrosis, arrhythmias, and esophageal cancer (Wilson, 2010). Drug makers are working to find new ways of treating osteoporosis. â€Å"The Food and Drug Administration (FDA) approved a new injectable osteoporosis treatment for post menopausal women† (FDA, 2010). â€Å"Prolia is a treatment for postmenopausal women with osteoporosis who are at high risk for fractures† (FDA, 2010). Osteoporosis is an unforgiving disease. It cannot be cured, but can be slowed in its progression. Prevention is the way to proactive. One should be sure to consume calcium in their diet that is adequate for their needs and to be in an exercise regiment that will aid in reducing fractures. One should also be careful in putting himself or herself at risk by smoking, drinking, being off balanced, or doing rigorous exercising that could possibly cause fractures. If one does these things and has regular check-ups, then they should be able to reduce the likelihood of severe osteoporosis. Total Words: 1,422 Works Cited U.S. Food and Drug Administration (FDA). (2010, June 1). FDA Approves New Injectable Osteoporosis Treatment for Postmenopausal Women. Retrieved from FDA.gov: Mayo Clinic. (2009, August 27). Osteoporosis Treatment Puts Brakes on Bone Loss. Retrieved from MayoClinic.com: National Osteoporosis Foundation (NOF). (2010). Diagnosing Osteoporosis. Retrieved from nof.org: National Osteoporosis Foundation (NOF). (2010). Prevalence Report. Retrieved from nof.org : http://www.nof.org/print/219 The New York Times. (2010). Osteoporosis Overview. Retreived from nytimes.com: UCSF Medical Center. (2010, October 29). Osteoporosis Diagnosis. Retrieved from ucsfhealth.org: UCSF Medical Center. (2010, October 29). Osteoporosis Signs and Symptoms. Retreived from ucsfhealth.org: UCSF Medical Center. (2010, October 29). Osteoporosis Treatment. Retreived from ucsfhealth.org: WebMD. (2010). Osteoporosis Guide Diagnosis Tests. Retreived from webmd.com: Willis, Judith Levine. (2010). All about Eating for Two. Retreived from childbirthsolutions.com: Wilson, Duff. (2010, October 13). Prescriptions. Retreived from nytimes.com:

Wednesday, April 15, 2020

Essay Explaining Bad Grades - Use This Article As a Way of Getting Into College

Essay Explaining Bad Grades - Use This Article As a Way of Getting Into CollegeIn the last few years, a lot of students have begun to use essay explaining bad grades as their way of getting into college. They use these types of essays in the process of applying for financial aid. The reason why they do this is that they want to present themselves in a positive light so that they can get the money they need.There are many schools that accept these types of essays as part of the application process and they will usually require some sort of supporting documents to back up what the student has written in their essay. You will have to show your proof to your tutor as well as the school. If you have any trouble understanding why these things are being done, then it may be better if you stop using this type of essay. This is because there are some people out there who are completely unethical and will actually try to scam people out of money.The main reason for why these essays are being u sed in the first place is because they are very successful at getting someone accepted. It's an effective way of showing that you are capable of handling the academic work that is required. If you are a student who wants to get into a top-notch university but you know that you do not perform well in academics, this is the perfect way to show that you can do it. You do not even have to worry about your grades because the school will already be aware of them and will make sure that they're well taken care of.It can be very frustrating when you do not have a lot of confidence and think that you should really have good grades. You may even want to be able to get those grades back from the school you are applying to, but you can't because you have bad grades. This is why you will have to use the essay explaining bad grades as your way of getting into college.If you were a good student and also did not perform well in the academic section, it is likely that the school you are applying to has a set of criteria in order to determine if you are good enough. Some of these criteria include things like GPA and class rank. You can apply for these types of essays in order to show the school that you can handle the work that is required.While it can be an effective way of getting back into school, you may want to stop using the essay explaining bad grades because there are other means that are more effective. Even if you have bad grades, you can still show your ability to handle the work that is needed by getting a GED or a high school diploma. You will want to show that you are capable of doing this instead of trying to use the essay explaining bad grades.If you are not comfortable with the academic work that you have, you should look into improving your academic skills instead. This way, you will not need to rely on the essay explaining bad grades and you will be able to earn the grades that you need. In addition, you will not have to worry about the essay explaining bad g rades so much and you will be able to focus on getting the grades that you need.The essay explaining bad grades is one of the methods that are used by colleges today in order to determine how much you have improved. You can apply for this type of essay when you want to improve your grades or you can just apply for the GED or diploma. It is possible that you could be accepted for both, so it is always a good idea to check out both options.

Friday, March 13, 2020

Athletic Injuries essays

Athletic Injuries essays There are many psychosocial factors that contribute to the occurrence and severity of athletic injuries. Many studies have found that there is a relationship between the occurrence and severity of athletic injuries and stress. Stress affects everyone and it is because of this we need to be properly educated about it. It is the bodys nonspecific response to any demand (Williams, 1996). Stress is composed of many factors and is often described as any feelings of nervousness or anxiety. It has been established that there is a direct positive relationship between stress and the severity and occurrence of athletic injuries (Hanson, McCullagh Despite proper rehabilitation, many athletes are not psychologically equipped to cope with the impact of an athletic injury (Larson, Zaichkowsky, & Starkey, 1996). Advances in sports medicine have allowed remarkable physical recoveries, however, many members of the medical community are urging injured athletes to have the psychological aspects of their injuries treated as well. Initially, sport psychology was used as a catalyst to enhance athletic performance. There is a growing awareness of specific psychological risk factors that are associated with athletic performance. More frequently mental health professionals are needed to assist an athlete adjust to life after an athletic injury. The psychological im...

Wednesday, February 26, 2020

SWOTT Analysis Paper and Table Essay Example | Topics and Well Written Essays - 1500 words

SWOTT Analysis Paper and Table - Essay Example We intend to amplify our business by using greener alternatives whenever possible, for example: Moreover, it is also important for us to be seen in the public domain making a difference. Therefore we will actively work with various local environmental organizations, such as, Miami Green Commission. Over the past five years, there has been an increasing awareness regarding work life balance, mainly due to the rise of dual income families, but also due to flexible working practices affecting quality time spent as a family unit. Customers are influenced mainly by price and convenience, however, information is not readily available in the public domain, hence, shopping for ‘best’ bargains is hampered and reduced to what is available locally in the high street. When surveyed, given a choice of alternatives within the same price bracket, 68% of consumers would choose a greener alternative method of dry cleaning. 82% of consumers had little brand loyalty and could not name the dry cleaning company they used. Therefore, they have considerable power as switching costs are minimal, and the perceived ethical rewards are substantial. Currently, 97% of dry cleaners operating in Miami offer traditional Perc dry cleaning. We also feel that the dry cleaning industry thus far has been slow to make people aware of what is on offer in the industry, this in our view, gives us a considerable advantage. Currently there are few suppliers of alternative solvent machines. This seems to give the suppliers a certain degree of power. However, machines are extremely reliable and have a lifespan of almost ten years, thus, limiting the interaction with the supplier. Also, solvents are available from various companies but, levels of usage are not high and their prices have remained static for numerous years without any gaps in supply. Potential start up costs are relatively low

Sunday, February 9, 2020

Research in Motion Entering a New Era of Marketing Case Study

Research in Motion Entering a New Era of Marketing - Case Study Example With the combination of the three, companies gain a more competitive advantage in the market. The consumer population is attracted to the most modern, advanced and attractive commodities (Rantanen, 2005). In the business of mobile phones, the scenario is the same. This paper will discuss the RIM’s marketing plan and the improvements the company can make on the basis of a general marketing analysis. Research In Motion deals with mobile phones and handsets. The company enjoys over 20 year’s existence in the market. However, the existence of the company in the market has taken shifts in the modern century corporate environment. The number of competitors is significantly increasing. It is for this reason that the future of RIM is questioned. With the coming of smaller firms in the market, RIM’s future is greatly threatened. For instance, the coming of Samsung in the market has greatly threatened the significance of RIM. Over the past two years, Samsung commodities have more demand in the market than I-phone and the Blackberry. Apart from demand, other companies are stepping up their marketing strategies. These factors are increasingly putting pressure on RIM to upgrade its marketing strategies. With the increase of consumer demand on mobile phones, RIM could be losing a lot of profits due to competition. In the case analysis regarding mobile phones and telecommunication, competition lies as the main problem. Apart from the competitors, the consumer should be pleased with the product an organization offers. Competition in this industry is based on technology and trends. We live in a society where trends and technology is a basic want for all consumers. When it comes to mobile phones, the current consumer population looks at the technologically advanced features of a gadget. For instance, gadgets with the Android operating system have greater market recognition than phones which do not have this operating system (Ferrell & Hartline, 2010).