Week 7- Case Study #3

In: Business and Management

Submitted By idk99
Words 288
Pages 2
What to do with Howard?
Week 7- case study #3

Synopsis: Agrigreen, Inc. is a company that manufactures a verity of agricultural fertilizer. With plants located in the western United States and Canada, Agrigreen employees are certified surveyors to make sure the quality and safety of every project is correct. Tad Pierson position at one of Agrigreen plants is a project engineer which he enjoys being. As project engineer Tad is put over the operation of the plant surveying group. Since being there Tad Pierson is becoming more aware of some performance, safety, and conflict issues within the surveyor group. These issues are beginning to escalate in and is causing Tad to become worried and concern in regards to the safety of the employees, the issues are also interfering with the production schedules leaving Tad Pierson to consider possible actions that he may need to take to resolve the issue within the organization.

After receiving his surveyor’s certificate from the local civil technologies college, Howard Lineberry had gone to work for the State Highway Department as a chainman but the job hadn’t paid him very well So, when a job for a lead surveyor had opened up at Agrigreen eighteen years ago, Lineberry had been glad to get it. Howard Lineberry became a lead surveyor and has been employed with Agrigreen for eighteen years. Over the years working at Agrigreen he has been supervised by five different managers, and a total of three surveyor helpers. Over the years of working there Howard’s work began causing multiple safety and production issues for others at the job. Because of His errors it began causing conflicts with the engineering staff, his managers, and pretty much everyone else Howard worked…...

Similar Documents

Case Study Week 3

...Case Study Week 3 Principles of Info System Security Professor Gross by Nick Post Concerning the research collaboration of ABC Institute of Research and XYZ Inc., there are two standard methods that shall be considered for the encryption of all sensitive data being transmitted over the Internet. There is symmetric encryption and asymmetric encryption. It is the intention of this paper to describe both methods and give an opinion on which method to use to secure the sensitive date. When a symmetric encrypted key is used, both parties share the same key to both encrypt and decrypt data. Since symmetric encryption's use-case is to share information between users, each has to posses a shared key. Although a symmetric key requires less computer resources, is simplistic and easy to understand, the utmost security measures should be set in place to ensure the safety and secrecy of the shared key by all collaborators. Should the key become compromised in some way, all sensitive data will be compromised. Also, exchanging the secret key over the Internet or over a large network is extremely risky because it can become intercepted by an attacker who could then use that key to decrypt the shared data. There is an alternative to this type of encryption, however, that could be more secure, though it poses its own disadvantages: asymmetric encryption. An asymmetric encrypted method relies on a public and private key. The public key is available to anyone who might......

Words: 451 - Pages: 2

Week 3 Case Study

...Petrie’s Electronics Chapter 5 Case Questions 1. What do you think are the sources of the information Jim and his team collected? How do you think they collected all of that information? Conducted interviews with key stakeholders inside the company, He had also worked with the marketing group to put together some focus groups made up of loyal customers, to get some ideas about what they would value in a customer loyalty program. Jim had also spent some time studying customer loyalty programs at other big retail chains and those in other industries as well, such as the airlines, known for their extensive customer loyalty programs. 2. If you were looking for alternative approaches for Petrie’s customer loyalty program, where would you look for information? Where would you start? How would you know when you were done? An alternative approach would be by Business Process Reengineering. It is the search for, and implementation of, radical change in business processes to achieve breakthrough improvements in products and services. The first step would be to identify key business processes which are the structured set of measurable activities designed to produce a specific output for a particular customer or market. 3. Why shouldn’t Petrie’s staff build their own unique system in-house? From the list of requirements, it was clear that Petrie’s staff should seek outside IT consulting to build their system. It would be too expensive and time consuming, not to mention, building a......

Words: 486 - Pages: 2

Week 3 Case Study

...Week 3 Case study BYOD has the potential for big cost savings because organizations that let employees bring their own devices to work don't waste money on corporate phones. Plus, when an employee can work from a device of his own choosing, it's more enjoyable than being forced to use a corporate-issued device. That means happier and more productive users. Another advantage of BYOD is that it supports a mobile and cloud-focused IT strategy. From their personal mobile devices, employees can access their work in the cloud, further improving productivity. The overall BYOD benefits are that they save the company money and they make workers happy. There are however four big BYOD risks. Think about how you'll pay for services. Users might pay for devices, but who's going to pay for the voice and data plans? There are a couple of ways you can handle cost-sharing, but it's important to pick one and get users to agree to it.  You're going to have to draft acceptable use and security policies that include the consequences of violation. Then you need to train users and help desk staff on best practices and support. You'll have to know how to handle the biggest  BYOD challenges, security. At a urban health plan inc their doctors travel a large hospital with their iThings, recording patient information, diagnostic data and preparing reports. The network travels with the doctor, following him or her throughthe building. When it’s time to print, the request is sent to the closest......

Words: 341 - Pages: 2

Week 7 - Case Study 2

...Week 7, Case Study 2: Collaboration Systems at Isuzu Australia Limited Isuzu Australia Limited or IAL is a subsidiary of Isuzu Motors Limited in Japan and are responsible for all things Isuzu Trucks in Australia. The company needed a way to connect a large dealer network and to improve the speed and accuracy of their communications between headquarters and each dealer and other business partners (Isuzu Australia, 2008). The reasoning behind getting this communication network up and running is the high priority requirement for access to the latest materials and information from IAL head office (Bigdoli, 2014). In 2005 they distributed all information in printed format and shipped via the Australia Post. The benefits to creating a centralized communication network would be exponential to their productivity, dealers and other business partners would be able to access information and submit issues in real time instead of relying on post. IAL decided to use IBM’s WebSphere portal and Workplace Web Content Management (WCM), along with Lotus SameTime instant messaging, Lotus Quickr for team based project management and Portal Document Manager (PDM) for a central repository of documents. The reasoning behind this was given by the Staff Operations Manager, Aninka Morhall – We chose WebSphere Portal and WCM because this solution was more capable of meeting our needs than the other offerings in the market, in particular in terms of its scalability. We were also interested in all of......

Words: 495 - Pages: 2

Case Study Week 3

...influence a public servant. Some of these charges are felonies and carry a maximum sentences of six years in prison. Richard Heen pled guilty to the felony charge of attempting to influence a public servant and received four years probation, was prohibited from receiving and financial benefit from the case during the period of the probation; and received 90 days of jail time with 60 days being work release time. Richard pled to more serve felony charge so that his wife could be charged with misdemeanor, a lesser charge. She, thereby, could avoid deportation back to Japan. Mayumi pled guilty to false reporting to authorities. She was sentenced to 20 days in jail, which she can serve on weekends after her husband’s release Sheriff Aderman was seeking full restitution of approximately 50,000 USD for the cost of investing the hoax. The FAA planned to seek a fine of 11,000 Question 2: What stage of moral reasoning is exhibited by Richard Heene's actions? Do you believe the punishment fit the crime? Why or why not? Richard Heene was reasoning at stage 2 in the pleading guilty to a felony charge, Richard was reasoning at stage 3 (fairness to others) and showing loyalty to his wife. Question 3 :Explain how the cognitive-developmental approach influences one's ability to make ethical judgments? Cognitive development approach assumes that individuals construct a system of moral reasoning. Moral development proceeds through successive stages, each stage involves more complex......

Words: 949 - Pages: 4

Cis 524 Week 7 Case Study 3

...A++PAPER;http://www.homeworkproviders.com/shop/cis-524-week-7-case-study-3/ CIS 524 WEEK 7 CASE STUDY 3 CIS 524 Week 7 Case Study 3, Case Study 3: Security Due Week 7 and worth 100 points A large, fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user id and password combination to log in to the register. The system allowed the incorrect password to be entered four (4) times before the register would lock and require a manager to unlock it with a key card. To prevent unauthorized access, the registers would lock after three (3) minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart. After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user Id and password, so other cashiers would log in for them. It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register. The managers would have to reboot the system, a three to five (3-5) minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive. Write a five to eight......

Words: 638 - Pages: 3

Ctts Case Study Week 3

...|Milestone 1, 2, 3, 4_Week 3 Assignment | | | | | |Class Project: CSC - Coastline Systems Consulting | |Sunset Blvd, Los Angeles, CA | | | | | |IS581_Systems Analysis, Planning, and Control - 7th Edition | | | |Keller Graduate School (DeVry University) ......

Words: 1716 - Pages: 7

Cis 417 Week 7 Case Study 3 Casey Anthony Trial

...417 WEEK 7 CASE STUDY 3 CASEY ANTHONY TRIAL To purchase this visit here: http://www.activitymode.com/product/cis-417-week-7-case-study-3-casey-anthony-trial/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 7 CASE STUDY 3 – CASEY ANTHONY TRIAL On July 5, 2011, Casey Anthony was found not guilty of first-degree murder in the 2008 death of her daughter, Caylee. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: 1. Provide a brief summary of the background, charges, and trial of this high-profile court case. 2. Explain, from a forensics perspective, the digital evidence found on the Anthony family computer that helped the prosecutors build a case against Anthony. 3. Describe what the prosecution was unable to prove based on the digital evidence found. Indicate whether or not you think this is a common problem with digital evidence and provide a rationale for your response. 4. Explain the software issue that was found to have caused inaccurate evidence to be admitted into the trial. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 7 Case Study 3 Casey Anthony Trial in order to ace their studies. CIS 417 WEEK 7 CASE STUDY 3 CASEY ANTHONY TRIAL To purchase this visit here: http://www.activitymode.com/product/cis-417-week-7-case-study-3-casey-anthony-trial/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 7......

Words: 655 - Pages: 3

Hrm 517 Week 8 Case Study 3 Case Study 3

...HRM 517 WEEK 8 CASE STUDY 3 CASE STUDY 3 To purchase this visit here: http://www.activitymode.com/product/hrm-517-week-8-case-study-3-case-study-3/ Contact us at: SUPPORT@ACTIVITYMODE.COM HRM 517 WEEK 8 CASE STUDY 3 CASE STUDY 3 HRM 517 Week 8 Case Study 3 - Case Study 3: Risk Management on a Satellite Development Project - Latest 2015 Version Strayer University Read the case titled: “Risk Management on a Satellite Development Project” found in Chapter 10. Write a 3-4 page paper in which you: 1. Suggest the issues that could have developed had the team not had a risk plan. 2. Justify the value of risk plan considering the time, effort, cost, and resources it took to develop such a plan. 3. Assess how to determine the level of risk management appropriate for a project. Imagine the team working on the satellite development project was a virtual team in which team members were unable to meet in person. 4. Explain the expected impact on the project, and suggest two (2) ways the team could maintain its current goal in both planning and execution. 5. Use at least four (4) resources in this assignment. Activity mode aims to provide quality study notes and tutorials to the students of HRM 517 Week 8 Case Study 3 Case Study 3 in order to ace their studies. HRM 517 WEEK 8 CASE STUDY 3 CASE STUDY 3 To purchase this visit here: http://www.activitymode.com/product/hrm-517-week-8-case-study-3-case-study-3/ Contact us at: SUPPORT@ACTIVITYMODE.COM HRM......

Words: 694 - Pages: 3

Cis 502 Week 7 Case Study 3 Strayer Latest

...CIS 502 WEEK 7 CASE STUDY 3 STRAYER LATEST To purchase this visit following link: http://coursehomework.com/product/cis-502-week-7-case-study-3-strayer-latest/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 502 WEEK 7 CASE STUDY 3 STRAYER LATEST CASE STUDY 3: MOBILE DEVICES SECURITY Due Week 7 and worth 100 points The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge”, located at http://www.treasuryandrisk.com/2011/02/08/pr-mobile-device-attacks-surge, and FIPS 140-2 Security Policy, located at http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1648.pdf. In addition, read the report titled, “Emerging Cyber Threats 2012”, located at http://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdf Write a five to eight (5-8) page paper in which you: 1. Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. 2. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile......

Words: 551 - Pages: 3

Cis 502 Week 7 Case Study 3 Strayer New

...CIS 502 WEEK 7 CASE STUDY 3 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-7-case-study-3-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 7 CASE STUDY 3 STRAYER NEW CASE STUDY 3: MOBILE DEVICES SECURITY Due Week 7 and worth 100 points The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge”, located at http://www.treasuryandrisk.com/2011/02/08/pr-mobile-device-attacks-surge, and FIPS 140-2 Security Policy, located at http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1648.pdf. In addition, read the report titled, “Emerging Cyber Threats 2012”, located at http://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdf Write a five to eight (5-8) page paper in which you: 1. Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. 2. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices...

Words: 1043 - Pages: 5

Cis 502 Week 7 Case Study 3 Strayer New

...CIS 502 WEEK 7 CASE STUDY 3 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-7-case-study-3-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 7 CASE STUDY 3 STRAYER NEW CASE STUDY 3: MOBILE DEVICES SECURITY Due Week 7 and worth 100 points The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user’s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, “Mobile device attacks surge”, located at http://www.treasuryandrisk.com/2011/02/08/pr-mobile-device-attacks-surge, and FIPS 140-2 Security Policy, located at http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1648.pdf. In addition, read the report titled, “Emerging Cyber Threats 2012”, located at http://www.gtisc.gatech.edu/doc/emerging_cyber_threats_report2012.pdf Write a five to eight (5-8) page paper in which you: 1. Describe the emerging cybersecurity issues and vulnerabilities presented in the “Emerging Cyber Threats 2012” report. 2. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices...

Words: 1564 - Pages: 7

Case Study Week 7

...Tara Smith HSA505  Prof. Harold Griffin Stopping Outshopping Tara Smith HSA505  Prof. Harold Griffin Stopping Outshopping Marketing Strategies within the Health Care Industry Scarlet Hospital, a not-for-profit health care facility based in Walnut Grove, population 25,454. The purpose of this case study is to reveal the market competition and strategies required to compete and survive in the health care market. Because recent construction has given Walnut Grove residents access to nearby Salem 50 miles away, patients whose only option was locally based Scarlet Hospital, now have 4 major medical centers to choose from in the town of Salem. President and CEO of Scarlet Hospital Timothy Rodgers, is well aware of the impending threats this highway expansion may bring to the businesses of Walnut Grove. Before construction of the highway, Walnut Grove would not have been able to compete with the medical centers of Salem for several reasons. The patient retention rate before the highway construction was only maintained because Scarlet Hospital stood as the only hospital within a 50 mile radius. According to Frontenberry’s text, though Scarlet Hospital had no competition from other major medical centers, its competitors were still able to function because Scarlet Hospital does not offer outpatient care. According to Mr. Frontenberry, “delivering medical services in a highly insulated market, softening its competitive prowess, but not its......

Words: 1439 - Pages: 6

Cis 502 Week 7 Case Study 3 - Mobile Devices Security

...CIS 502 Week 7 Case Study 3 - Mobile Devices Security Click Link Below To Buy: http://hwaid.com/shop/cis-502-week-7-case-study-3-mobile-devices-security/ The use of mobile devices is prevalent and growing rapidly as users heavily depend on them. Unfortunately, attackers follow the money and user population. In addition, mobile devices do not receive patches for their vulnerabilities. The Zeus-in-the-Mobile (ZitMo) attack against Android users is an example defeating the emerging technology to steal user s credentials and ultimately money. Mobile devices can also spread malware. Read the article titled, Mobile device attacks surge andFIPS 140-2 Security Policy. In addition, read the report titled, Emerging Cyber Threats 2012. Write a five to eight (5-8) page paper in which you: 1. Describe the emerging cybersecurity issues and vulnerabilities presented in the Emerging Cyber Threats 2012 report. 2. Analyze vulnerabilities of mobile devices in regard to usability and scale based on your research and suggest methods to mitigate the vulnerabilities of mobile devices. 3. Assess and describe the value of cryptography and encryption in regard to Equifax s approach to implementing stronger security policies around mobile devices. 4. Justify Gunter Ollmann s comments about Zeus-in-the-Mobile (ZitMo) and describe the implications of advanced security breaches such as this. 5. Several challenges of controlling information......

Words: 302 - Pages: 2

Bsop 330 Week 7 Case Study Final

...BSOP 330 WEEK 7 CASE STUDY FINAL To purchase this tutorial visit here: http://mindsblow.us/question_des/BSOP330WEEK7CASESTUDYFINAL/232 contact us at: help@mindblows.us BSOP 330 WEEK 7 CASE STUDY FINAL Question 1. Which variations in demand for police services should be considered in an aggregate plan for resources? Which variations can be accomplished with short-term scheduling adjustments? Question 2. Evaluate the current staffing plan. What does it cost? Are 26 officers sufficient to handle the normal workload? Question 3: Determine the cost of the Chiefs plan. Do you need to implement the Chief’s plan or can the current staff handle the load? Explain your thinking Question 4: From the data in the case, determine the schools current cost to provide police services during football games. Question 5: There isn’t any one right answer for this question. This a critical thinking question. Based on what you have read and the scheduling and costs you put together, what do you see as alternatives for the manning the schedule. BSOP 330 WEEK 7 CASE STUDY FINAL To purchase this tutorial visit here: http://mindsblow.us/question_des/BSOP330WEEK7CASESTUDYFINAL/232 contact us at: help@mindblows.us BSOP 330 WEEK 7 CASE STUDY FINAL Question 1. Which variations in demand for police services should be considered in an aggregate plan for resources? Which variations can be accomplished with short-term scheduling adjustments? Question 2. Evaluate the current staffing plan.......

Words: 2017 - Pages: 9

WallPaper | Most Bids | Lilyhammer