What are some ethical issues that an organization may face when entering the global market? Do organizations have different brand messages for different ethnic groups and does an organization have ethical and social responsibilities when entering the global market? How do you determine the ethical standards in various countries? Provide examples of organizations that have effectively introduced products into foreign markets. Provide examples of organizations that have had other unsuccessful product introductions in foreign markets. What factors contributed to this unsuccessful attempt?
In: Operations Management
Course Name: Professional Communication
Required:
Make six slide presentation
TOPIC: Corona Virus has impacted the entire world. UAE is no exception. And your Company is also no exception. Make a presentation to showcase how your Company or department managed the crisis. Assume you are presenting to the highest Council in UAE.
Note:
Start with deciding why you are making a presentation to the highest Council. Do you need some money to support your department because of the crisis? Do you need some other support from the Council? Or are you presenting how you have utilized the funds the government has given to your department?
Based on the objective you choose, make a presentation on the above topic. 6 slide power point presentation
i need a simple slides no need big
In: Operations Management
In: Operations Management
Rocket Pitch (Housekeeping idea)
Issue
What is the problem?
How does it affect the client?
The solution of the problem
What is the solution?
Value proposal?
What is the product or service?
Benefits offered?
Market
What is the target market?
Size of the market?
Estimated in sales?
Expected growth?
Gross profit?
Resources
What resources do you need?
What is the purpose?
In: Operations Management
The Cyberattack on Ukraine
After Russia annexed Crimea from Ukraine in 2014, authorities started nationalizing Ukrainian-owned energy companies in Crimea. In late 2015, Ukrainian supporters physically attacked electrical power distribution centers, plunging two million Crimeans in the dark.
Each of Ukraine's 24 regions is served by a different electric company. On December 23, 2015, the Ukrainian power grid experienced a cyberattack. The activists simultaneously attacked three power distribution substations, cutting power to some 230,000 Ukrainians.
The multistage, targeted cyberattack actually started in the spring of 2015. Let's take a look at how the cyberattack unfolded.
The Spear-Phishing Attack. In the first stage, the attackers launched a spear-phishing attack on IT staff and system administrators at three of the power distribution companies in Ukraine. The attack sent e-mails to employees that contained a malicious Word file. If an employee clicked on the document, a popup window told them to enable macros for that file. If they did so, a malicious software program named BlackEnergy3 infected their computers and allowed the hackers entry into their system.
Reconnaissance. The spear-phishing attack allowed the intruders to access the power distribution companies' corporate networks. However, the intruders still had to gain access to the supervisory control and data acquisition (SCADA) networks that actually operated the power grid, but the power companies had competently separated those networks from corporate networks with a firewall. Therefore, the attackers had to search the corporate networks and gain entry to the Windows Domain Controllers. From there, the hackers gathered employee login credentials from the user accounts. Some of these login credentials were used by employees to access virtual private networks (VPNs) to remotely log in to the SCADA network. The attackers now had access to the SCADA networks.
Disabling the uninterruptible power supply. The attackers now rejigged the supply of uninterruptible power to the three systems' control centers. They wanted to cut power to the operators as well as the customers.
Disabling the converters. The attackers then coded malicious software to supersede the actual software on converters at power company substation control systems. (These converters handle data from the SCADA network to the substations.) Disabling the converters stopped employees from transmitting remote commands to reestablish power after it was cut. The converters could not work and could not be recovered. This situation meant that the power companies could not recover until they obtained new converters and incorporated them into the power system. (Note: Power companies in the United States use the same type of converters as those used in Ukraine.)
Denial-of-service attack. The attackers now targeted customer call centers, initiating a telephone denial-of-service attack. That meant that customers could not call in to report the blackout when it occurred. The attack jammed up the distribution centers' call centers with thousands of false calls, blocking actual customers from getting through. This denial-of-service attack allowed the attackers more time to work on their attack because not only were substation employees seeing false information on their hijacked computers, but they were receiving no phone calls reporting power outages.
Causing the blackout. On December 23, the attackers used the commandeered VPNs to access the SCADA networks and deactivate the uninterruptible power supply that they had already reconfigured. Then they removed substations from the power grid.
Deploying KillDisk. Lastly, the attackers deployed software called KillDisk to complete their path of destruction. KillDisk deletes or overwrites essential system files from operators' computers to disable them as well. Because KillDisk also wipes the master boot file, operators could not reboot the crashed computers.
About half the homes in Ukraine's Ivano-Frankivsk region lost power. The cybercriminals also simultaneously attacked a large mining company and a major railway. The incidents seem to have been politically motivated, meant to disable Ukrainian critical infrastructure in a strike, according to security analysts at Trend Micro (www.trendmicro.com).
Homes and businesses in the impacted areas only lost power from one to six hours. However, more than two months later, the control centers were still not completely back online. Electricity was still being delivered, but employees had to manually operate the power substations.
The attack caused only digital damage; if the substations had been physically damaged, it would have taken much longer to restore power. In 2007, the U.S. government showed how criminals could remotely destroy a power generator through a SCADA attack with just 21 lines of malicious code.
Infrastructure personnel can learn many lessons from the attack. Ukraine's power generation control systems were unexpectedly more robust than some in the United States. The reason is that the Ukrainian SCADA networks were separated from the business networks with excellent firewalls. However, the Ukrainian control systems still had security weaknesses. For example, employees remotely accessing the SCADA network were not prompted to use two-factor authentication, which enabled the hackers to steal login information and gain entry to the SCADA systems.
Another lesson is that in the United States many power systems lack manual backups. That is, if criminals were to attack automated SCADA systems in the United States, it would be much more difficult to bring the grid back online.
This first-ever successful attack of a power grid's computers is a dire safety warning for other such systems across the world. Experts in industrial control systems at the Sans Institute (www.sans.org) say the hack of the Ukrainian power grid was the first time that cybercriminals have managed to directly bring down a power grid.
In December 2016, Ukraine was attacked again. Reports alleged that a group of Russians attacked computers at a control center of a power supplier in Kiev. The attackers apparently used phishing attacks on workers, enabling the intruders to grab login information and disable substations. The shutdown affected some 20 percent of Kiev's nighttime electrical use.
Sources: Compiled from J. Condliffe, “Ukraine's Power Grid Gets Hacked Again, a Worrying Sign for Infrastructure Attacks,” MIT Technology Review, December 22, 2016; E. Markowitz, “After Ukraine Cyberattacks, FBI and DHS Urge U.S. Power Companies to Develop Better Safety Protocols,” International Business Times, April 21, 2016; “FBI, DHS Issue Warning about Increasing Cyber Threat to Nation's Power Grid after Downplaying It in January,” Cyberwar.news, April 12, 2016; B. Gertz, “FBI Warns of Cyber Threat to Electric Grid,” The Washington Free Beacon, April 8, 2016; K. Zetter, “Inside the Cunning, Unprecedented Hack of Ukraine's Power Grid,” Wired, March 3, 2016; D. Voltz, “U.S. Government Concludes Cyber Attack Caused Ukraine Power Outage,” Reuters, February 25, 2016; W. Ashford, “Ukraine Cyber Attacks Beyond Power Companies, Says Trend Micro,” Computer Weekly, February 12, 2016; J. Robertson and M. Riley, “How Hackers Took Down a Power Grid,” Bloomberg BusinessWeek, January 14, 2016; M. Heller, “Russian Actors Accused of Attacking Ukraine with BlackEnergy Malware,” TechTarget, January 4, 2016; D. Goodin, “First Known Hacker-Caused Power Outage Signals Troubling Escalation,” Ars Technica, January 4, 2016; J. Cox, “Malware Found Inside Downed Ukrainian Grid Management Points to Cyberattack,” Motherboard, January 4, 2016.
In: Operations Management
What are some of the steps required to conduct an ethics audit
In: Operations Management
Post your article here and include the following information in your post:
1. What is the article about?
2. What did you learn?
3. How does it relate to the readings from the book this week?
This discussion for the class BU 491Management Issues and
Society
In: Operations Management
According to Transparency International, the United States is the least corrupt country in the world.
Question 1 options:
True | |
False |
Question 2 (4 points)
If a company does not hold any patents, then they do not have any intellectual property issue to deal with abroad.
Question 2 options:
True | |
False |
Question 3 (4 points)
While increased regional economic integration means that markets that were once protected and not open to foreign trade and investment are increasingly opening, it also means both domestic and foreign companies will
Question 3 options:
Have increased competition within the integrated region and abroad |
|
Have more standards to apply for within these regional markets |
|
Have higher tariff barriers to entry between countries in the economic region |
Question 4 (4 points)
If a U.S. company files and receives a patent from the U.S. Patent and Trademark Office, they do not have to file for patent and other intellectual property protection in other countries.
Question 4 options:
True | |
False |
Question 5 (4 points)
When entering international partnership agreements (i.e., distribution or sales rep agreements), those non-U.S. partners are not subject to U.S. laws against corruption, as long as they are not directly employed by the U.S. company.
Question 5 options:
True | |
False |
Question 6 (4 points)
A primary challenge that Netshoes.com faced and corrected was:
Question 6 options:
Providing quality experience customer service via eCommerce |
|
Shipping to customers on time |
|
Having the correct brands available |
|
Understanding the primary sports to supply |
Save
Question 7 (4 points)
When building websites, most languages will appear the same within website templates
Question 7 options:
True | |
False |
Question 8 (4 points)
A common challenge to rural market development, particularly in developing countries, is
Question 8 options:
Lack of data for market research |
|
Distribution difficulties due to infrastructure |
|
Marketing challenges for educating customers |
|
All the above |
Question 9 (4 points)
Arcelik held a significant amount of market share domestically in Turkey. As a result, this brand recognition was a strength when they entered other markets, as they were well known globally.
Question 9 options:
True | |
False |
Question 10 (4 points)
A primary method company use to market their products abroad, build relationships and meet potential new business partners is:
Question 10 options:
Industry Trade Shows |
|
Social Media Connections |
|
Cold Call via Telephone |
|
Direct Email Newsletter Marketing |
In: Operations Management
Think of all the examples of
forecasting experience on a regular basis; such as the weatherman
on TV each night.
Now, considering the technology we have at our disposal today, why
can't we get a "Perfect" forecast?
Response to this question must be 350-500 words.
In: Operations Management
9. | At the end of a job interview, you may be invited
to ask questions. What should you ask about?
(10%) |
||
A. | The exact salary for the post | ||
B. | When you can expect to hear from them | ||
C. | Whether overtime work is required for the post | ||
D. | The work style of your prospective superior |
10. | During the interview, which of the following should
be avoided?
(10%) |
||
A. | Having a direct eye contact with the interviewer(s) | ||
B. | Saying ‘please’ and ‘thank you’ | ||
C. | Using ‘yes’ or ‘no’ when answering questions | ||
D. | Thanking them for their time |
In: Operations Management
Zeus Computer Chips, Inc., used to have major contracts to produce the Centrino-type chips. The market has been declining during the past three years because of the dual-core chips, which it cannot produce, so Zeus has the unpleasant task of forecasting next year. The task is unpleasant because the firm has not been able to find replacement chips for its product lines. Here is demand over the past 12 quarters: |
TWO YEARS AGO | UNITS | LAST YEAR | UNITS | THIS YEAR | UNITS |
I | 4,793 | I | 3,493 | I | 3,196 |
II | 3,493 | II | 2,693 | II | 2,097 |
III | 4,293 | III | 3,493 | III | 2,693 |
IV | 2,993 | IV | 2,393 | IV | 1,693 |
Use the decomposition technique to forecast demand for the next four quarters. (Do not round intermediate calculations. Round your answers to 2 decimal places.) |
Period |
Forecast (Units) |
I | |
II | |
III | |
IV | |
In: Operations Management
In: Operations Management
5. | Which of the following is a work attitude?
(10%) |
||
A. | Honesty | ||
B. | Assertiveness | ||
C. | Creativity | ||
D. | Team work |
6. | Before a job interview, you should collect
information about the prospective company from the internet. What
kind of information should be obtained?
(10%) |
||
A. | Its sales revenues | ||
B. | The name of the person in charge of the department you may work for | ||
C. | The name of the CEO with the company | ||
D. | Its mission statement and business nature |
In: Operations Management
What are the major phases in the process improvement methodology?
In: Operations Management
Advertising & the First Amendment
The question is often asked: Does the First Amendment protect advertisements? Advertising is indeed protected by the First Amendment of the U.S. Constitution. However, advertising or "commercial speech" enjoys somewhat less First Amendment protection from governmental infringement than other types of speech. Should this be the case? How should advertising be regulated? By who? Why? "Your posting should contain at least 200 words of quality discussion."
In: Operations Management