Posts

Select and apply appropriate accounting techniques to critically analyse financial data in a variety of business decision making scenarios. Make informed financial judgements based on the outcome of such accounting analyses.

Case Study – Report

Learning Outcomes Assessed by this Assignment:
MLO1: Select and apply appropriate accounting techniques to critically analyse financial data in a variety of business decision making scenarios.

MLO2: Make informed financial judgements based on the outcome of such accounting analyses.

MLO3: Critically appraise the techniques used and the information to which they have been applied.

MLO4: Demonstrate a critical understanding to the internal, external and legal environments in which the judgements are being made.

MLO5: Understand the objectives of preparing management information and the need to adapt techniques in a changing commercial environment that can help in decision making in relation to costing, pricing, product range and marketing strategy.

MLO6: Evaluate the strategic performance of a business, understand the significance of the relationship between financial and non-financial indicators of business performance and recommend appropriate performance measures.

Summarize the ethical issue(s) and put it/them in context. Examine the company’s mission statement in light of the ethical issues. Make four suggestions for creating a more ethical organizational culture in this organization.

Ethical Culture

Choose one of the following companies and locate at least two different articles having to do with ethical problems regarding that company.

  • Apple
  • Boeing
  • Enron
  • Facebook
  • Google
  • Nissan
  • Starbucks
  • Tesla
  • Uber
  • Volkswagen
  • Wells Fargo

Then compose a 500- to 750-word paper (2 to 3 pages) in which you:

Summarize the ethical issue(s) and put it/them in context.

Examine the company’s mission statement in light of the ethical issues.

Make four suggestions for creating a more ethical organizational culture in this organization.

Support your positions with critical analysis. Format all references in proper APA format.

Be sure your paper is well organized and well written, with proper grammar and punctuation.

Explain how organizational culture can affect ethical health care management practices. Be sure you consider this from the perspective of both a negative organizational culture as well as a positive one.

Organizational culture and ethics

Imagine that you are a department manager in a mid-size health care organization that is in the process of undergoing a major change (perhaps a merger, buy-out, or restructuring). Your director has called a meeting of all department managers to develop a strategy for taking the organization successfully through the change. A major component of managing this change is safeguarding the organizational culture, which is currently very positive and based on ethical principles and practices. In addition, the organization has quality ratings in both patient safety and organizational integrity.

At the end of the meeting, the director asks each manager to draft a strategic change management plan to help them guide their department through the change. To help you get started, the director has provided a statement to be used in each plan. Each plan must consider the role of ethics and ethical management in organizational culture. You must bring your plan to the next strategy meeting in two weeks.

use the following statement as your thesis or opening statement for this assessment:

Creating and maintaining a positive organizational culture requires exceptional awareness, communication, and management skills on the part of leaders in any organization in any industry. When a shared identity is created and acceptance of the overall goals and mission of an organization is strong, ethical issues can more easily be prevented and resolved. This is vitally important in the health care industry as every aspect of management faces crucial ethical elements.

Then, in the rest of your assessment, complete the following:

-Explain how organizational culture can affect ethical health care management practices. Be sure you consider this from the perspective of both a negative organizational culture as well as a positive one.

(Hint: think about other aspects that may be affected by organizational culture.)

-Describe possible ethical issues related to organizational change that could affect the existing organizational culture, patient safety, and organizational integrity.

-Explain the role of personal moral integrity in effectively leading change and maintaining a positive organizational culture.

-Describe evidence-based strategies health care leaders can use to prevent or resolve ethical challenges related to changes in organizational culture.

Write a policy paper discussing how one of the below drivers can lead to increased integration in the European Union or exactly the opposite, disintegration in the European Union.

Increased integration in the European Union

Write a policy paper discussing how one of the below drivers can lead to increased integration in the European Union or exactly the opposite, disintegration in the European Union.
Choose to keep this at the European Union level, as well as looking into specific member states.

Drivers include:
Taxation, Digitalization, Climate change, Health care, Decentralized finance, Social inequality, COVID-19, Transparency, Financial markets, Sustainability, Migration, populism

What would the United States Air Force have to do to achieve cyberspace supremacy? How can the typical computer user protect himself/herself from vulnerabilities and cyber threat actors? What are some common sense rules and regulations that should be implemented in cyberspace?

The United States Air Force Path to Cyberspace Superiority: The Impact of Governance and Cyber Threat Actors on Cyber Readiness

Problem Statement
There is a clear problem with the United States Air Force’s intention to achieve cyberspace superiority. Most academic research conducted on the cyberspace domain has revealed it to be an ungovernable virtual environment. Cyberspace is riddled with cyber threat actors in the forms of hackers, organized crime group, cyberterrorism, and nation state (Hollis & Ohlin, 2018). The Air Force, private and nonprofit organizations and typical internet users are not exempt from cyber threat actors. This problem not only threatens the Air Force workforce ability to operate in cyberspace but also hinders management of information and communications infrastructure networks (NATO HQ, 2021). Most professionals and stakeholders consider cyber security measures and strict governance for combating cybercrime. This study will investigate the Air Force strategy for cyberspace superiority, current cyberspace rules and regulations, and cyber threat actors using both qualitative and quantitative research methods to query plausible solutions.

Participants, Data, and Access
In addressing the Air Force cyberspace strategy, this research will identify the Airmen and civilians tasked with maintaining the Information and Communications Technology (ICT) systems. These individuals vary by ranks, pay grade, duty positions, and experience but they serve in both network defensive and offensive, and base help desk roles. Normally, defensive operators safeguard DOD and non-DOD systems and networks from inside and outside intrusion (Panwala, 2021). It warrants manpower and expertise to maintain network and mission operations, and develop techniques to counter the threats. The Air Force network operators and administrators receive industry-level trainings and certifications prior to getting access to both unclassified and classified networks (Nishimura, Kanoshima, & Kono, 2019). They are informed about the Air Force’s cyberspace strategy and cyber security measures. They would be the ideal target population to participate in this research study. As a Communications Operations Officer (17D) in the Air Force, I am exposed to everything information and communications related. In addition to having access and proficiency in the Air Force cyberspace mission, I also lead some key cyber security functions for my installation. I possess firsthand experience with the Air Force’s cyber security protocols. I have also served in several positions of authority and worked alongside civilian leaders in military ranks. Locally, I can contact all 156 personnel workforce tasked with managing the installation ICT network. In addition, as a member of 17D Facebook Group, I have access to another pool of 3,000 participants. Eliminating bias from the research is foundational. The research design, data collection, and analysis process were selected to drastically reduce systemic errors and bias. My involvement as 2 researcher is restricted to collecting and analyzing the data collected. Participants will sign waivers to only provide valid and reliable data. Participants selected will be asked general cyberspace domain questions concerning the Air Force ICT networks, cyber security approach, and cyberspace governance. The participants should be able to provide insights on the Air Force’s strategy to secure cyberspace superiority and maintaining a robust cyber security posture. At my location, I will conduct interviews with participants and rely on questionnaire to capture data from non-local participants. Data collected from interviews and questionnaire will be used to fulfill the quantitative aspect of the study. The research methodology calls for both qualitative and quantitative methods. Interviews, field observations, and surveys will help with hypothesis development and supplement the mixed methodology approach. All primary and secondary data collected will be saved on my password protected computer. Clearance and permission to vet and interview the base cyber workforce will be submitted to the current base Commander for approval. Similarly, a formal request will be sent to 17D Facebook Group Administrators prior to surveying its members. Participants’ responses will be scrutinized for misinformation and bias, and ultimately omitted from the research. Over a period of 30 days, I will conduct personal interviews with the base participants and store the data on a Voice Recorder for analysis. The Facebook respondents will take a questionnaire. Each question on the questionnaire should contribute to testing one or more hypothesis or research question established in the research design (Brown, 2006). Prior to formal release, the questionnaire will undergo 3 a pilot testing to test for clarity, bias, and design conflict. Participants for the pilot trial will be randomly selected from the study population.

Design Choice
The primary design choice for this research is grounded theory. Since the methodology will involve both qualitative and quantitative elements, the research also calls for the integration of survey-based research designs. While the grounded theory is time-consuming and labor-intensive, it limits bias and produces more diverse set of answers to research questions (Brown, 2006). Grounded theory also supports changes in research while discarding assumptions. The researcher is granted flexibility to be creative and methodical to data analysis (Creswell, 2016). There is not much information readily available about cyberspace governance. Normally, the grounded theory research approach is used to fill in the gap in research and/or propose new theories. Data collected through interviews and survey will help in forecasting the needed rules and regulations in cyberspace. The investigation into the Air Force cyberspace strategy and cyber security posture as compared to industry standards will also instigate an understanding for cyber literacy and safety.

Purpose Statement
In most developed countries, people spend as much time in the physical world as they do in cyberspace. Cyberspace represents the ideal environment for information sharing and social connection. The United States Air Force ruminates cyberspace as a domain for war, in addition to land, sea, air, and space. However, achieving cyberspace superiority entails overcoming the security threats found in cyberspace and lack of governance. The purpose of this systematic review is to uncover and analyze the Air Force’s strategy for cyberspace superiority and defensive measured to counter cyber threat actors. Enquiry of the rules and regulations in cyberspace should provide needed explanation for lack of governance. This study will follow a mixed-methodology approach for data collection. Cyber professionals located at my current Air Force base will be interviewed to capture personal experiences and daily job functions. Quantitative data collected through questionnaire via specialized Cyber Facebook page will complement the research premise. All primary and secondary data collected will be stored in Alfresco, which is a document and content management software.

Research Questions
This study will address the following research questions:
Research Question 1: What would the United States Air Force have to do to achieve cyberspace supremacy?
Research Question 2: How can the typical computer user protect himself/herself from vulnerabilities and cyber threat actors?
Research Question 3: What are some common sense rules and regulations that should be implemented in cyberspace?
Research Question 4: What is the importance of cyberspace and why is it so critical to the Air Force and national security?
Research Question 5: Do the current applicable rules and regulations in cyberspace are enough to deter cybercrime?
Research Question 6: What are the limitations with prosecuting international cyber threat actors?
Research Question 7: Are certain hardware and software classified as hacking tools? If yes, should the authorities account for the individuals who buy them?
Research Question 8: Is it an achievable goal for the Air Force to attain cyberspace supremacy?
Research Question 9: How can cyberspace users and/or organizations protect their ICT systems from cyber threat actors?

Write about four works of art: Albrecht Dürer’s Self-Portrait of 1500 and three additional portraits that you select. Choose one self-portrait from each of the following lessons videos: Lesson 6, Lesson 7, and Lesson 8.

Final exam

Part 1: You will write about four works of art: Albrecht Dürer’s Self-Portrait of 1500 and three additional portraits that you select. Choose one self-portrait from each of the following lessons videos: Lesson 6, Lesson 7, and Lesson 8

Part 2: You will write about four structures: Equestrian Portrait of an Emperor and three additional works of art that you select. The three works of art you select need to be from Lessons 5, 6, 7, or 8 lecture videos

TO FIND LECTURE VIDEOS FOLLOW THESE INSTRUCTIONS

1.) GO TO https://canvas.ku.edu/courses/42501/pages/lesson-1-1-what-is-art-history?module_item_id=888784

2.) Go to western art class

3.) Click on modules

4.) Use videos from lessons 5-8 (stated in instructions)

What changes were made at Disney Animation? How did the structure at Disney Animation change? What was the role of small changes/small wins in their approach? What was the role of evaluation and experimentation in their approach?

Group Discussion – change management

You will need to imagine that you had a group discussion regarding the case with castmates. (Feel free to make up whatever you see fit in terms of your group discussion). This paper does not need an intro and a conclusion. It is not an essay. Just answer the questions below in paragraph form.

1. Group assessment of case questions?

(For this section of the paper, imagine you were asked to have a discussion in class with a group about the questions below. What was the group’s assessment of these questions?

– These are the case questions—
What changes were made at Disney Animation? How did the structure at Disney Animation change?
What was the role of small changes/small wins in their approach? What was the role of evaluation and experimentation in their approach?

2. Group decision-making process

3. How you feel about the group decision (support, dissent)? Why?

4. If you were to go through this process again, what would you have done differently/the same? Also, how would you rate yourself on your individual assessment/developing a group assessment?

What is the main question that the author is trying to answer? Where do the data come from? Who is included in the sample, etc.?

Graduate Econometrics

Replication Project: Part 1
The following paper is posted to Canvas, along with the dataset:
“Using Geographic Variation in College Proximity to Estimate the Return to Schooling”. In L.N.
Christofides, E.K. Grant, and R. Swidinsky, editors, Aspects of Labor Market Behaviour: Essays in Honour of John Vanderkamp. Toronto: University of Toronto Press, 1995.

Checklist for your final writeup for Part 1:
Briefly summarize the paper’s main question and data, being sure to address:

  • What is the main question that the author is trying to answer?
  • Where do the data come from? (Who is included in the sample, etc.?)

Replicate the results in Table 1, columns (2) and (3).

Note: There may be a few small discrepancies between what you estimate with the data and what is presented in the paper. The table in your final writeup must match your do file.

You must submit the following files in Canvas:

  •  Do File
  •  Log File
  •  PDF or Word document that contains no more than 2 pages: one each for the formatted output (table) and writeup.

Note: The dofile and log file must show all work with the data, including opening the dataset, any data manipulations, and all subsequent code to produce the final output for your tables and responses.

Critically evaluate the key components of professional practice within counselling psychology as distinct from other professions; drawing upon ethical, theoretical, professional and empirical literature.

Critical essay

Critically evaluate the key components of professional practice within counselling psychology as distinct from other professions; drawing upon ethical, theoretical, professional and empirical literature.

Specific Assessment Criteria:

• Critically understand the philosophical and empirical paradigms underpinning Counselling Psychology as a distinctive profession within psychology;

• Demonstrate an informed commitment to the principles embedded within the the British Psychological Code of Ethics and the Health and Care Professions Council Standards of Conduct Performance & Ethics, and a critical awareness of the role of ethics in competent counselling psychology practice;

• Demonstrate a critical understanding of the role of assessment and formulation in counselling psychology practice;

• Demonstrate a critical understanding of risk and risk assessment in counselling psychology practice;

• Demonstrate an understanding of the role of record keeping and report writing in counselling psychology practice;

• Demonstrate an ability to make informed judgements or decisions on complex issues in the absence of complete or consistent data/information/guidance;

• Demonstrate an ability to respond to challenges in creative and original ways;

• Demonstrate advanced, well-structured and coherent academic writing within a specified word limit (including appropriate referencing).

From the following information, prepare an Income Statement, Statement of Owner’s Equity, and Balance Sheet for the month of May of the current year.

Balance Sheet

Assignment Details Assignment Description From the following information, prepare an Income Statement, Statement of Owner’s Equity, and Balance Sheet for the month of May of the current year.

My Work: Online Deliverables: Submissions
Looking for tutoring? Go to Smart Thinking
Cash

Accounts Receivable

Equipment
Notes Payable
Accounts Payable
S. Jones, Capital
S. Jones, Drawing
Service Revenue

Telephone Expense

Rent Expense
Advertising Expense
$12,000
16,000
350
16,500
550
350
1,100
$13,000
12,000
18,000
6,000

$49,000

$49,000

Submit your assignment. For assistance with your assignment, please use your text, Web resources, and all course materials.