Questions
ThyssenKrupp Elevator Canada INTRODUCTION During a lunchroom break, a male employee at ThyssenKrupp decided to take...

ThyssenKrupp Elevator Canada

INTRODUCTION During a lunchroom break, a male employee at ThyssenKrupp decided to take up a dare from a fellow colleague for $100 and the Jackass-like prank was videotaped then posted to YouTube. When it came to the attention of the HR manager and other senior management, the employee was fired for violating company policy. The employee argued in court that the organizational culture allowed such behaviour. But would the Ontario Labour Relations Board (OLRB) agree?

BACKGROUND ThyssenKrupp Elevator Canada was subcontracting elevator installation at a construction site in downtown Toronto where a large office building was being built. All the workers on the site, including those from ThyssenKrupp, and the main contractor of the site, PCL Construction, were male and the culture of the workplace was described as a “macho” environment where pranks were played. There were reportedly pictures of women and provocative calendars hanging on walls, as well as signs displaying vulgar humour. There was little concern about these as access to the building was restricted to people involved in the construction project. One of ThyssenKrupp's employees at the site was an elevator mechanic. He and several other employees engaged in what he called “picking” on each other and playing pranks to keep things light at work. They also watched pornographic scenes on a worker's iPod and episodes of the television show Jackass, which features individuals doing stupid activities on dares.

ESCALATION OF PRANK BEHAVIOUR Over a period of a few weeks, the mechanic and other employees performed more and more pranks that copied some of the ones they saw on the Jackass show. Typically these events took place in the basement lunchroom where employees gathered for breaks and meals, to change clothes, and to socialize. Soon, money was being offered on dares to do certain actions. For example, one ThyssenKrupp employee accepted a dare that involved a $60 payment—money collected from fellow employees, including three foremen. The dare involved the employee eating spoiled food found in the common refrigerator of the lunchroom. A couple of weeks after the first dare, the mechanic was observed playing with a stapler in the lunchroom on a break. One of the foremen walked in and jokingly said, “What are you going to do with that? Why don't you staple your nuts to something?” The mechanic jokingly replied that he'd do it “if you get enough money.” Though he claimed it was intended as a joke, word spread within a few hours, and soon $100 was raised among seven other ThyssenKrupp and three PCL employees. Another four people were in the lunchroom later that afternoon watching when the mechanic decided to go ahead with the staple dare. He proceeded to drop his work uniform trousers and staple his scrotum to a wooden plank, which was met by “cheering and high fives,” according to the mechanic. With the mechanic's knowledge, the prank was filmed on video. Included on-camera were all those employees present, wearing full worksite uniforms, PCL logos on hats, and TK shirt patches—all easily identifiable and recorded by a worker who was present that day. The mechanic was advised at a later date that the event was posted on YouTube. Initially, the mechanic did nothing about the YouTube posting, but eventually asked for it to be taken off the site. To ensure this was done, the mechanic went back to YouTube searching for the video clip, but couldn't find it. He assumed it had been removed, however it was not—he just didn't search correctly. In total, the video clip was assessable on YouTube for two weeks, during which time many employees in the construction industry watched it. It was during these two weeks that ThyssenKrupp became aware of the video after the HR department received an email with a link to the video, and several people discussed it with a ThyssenKrupp executive at a construction labour relations conference. Conference participants insisted the employee was from ThyssenKrupp, and they questioned how the company could allow something like that to happen during work hours. At this point, ThyssenKrupp management reviewed the video one more time and decided that the mechanic had violated its workplace harassment policy, which prohibited “practical jokes of a sexual nature which cause awkwardness or embarrassment.” The mechanic was fired for “a flagrant violation” of ThyssenKrupp's harassment policy and risking the company's reputation.

CULTURE AT FAULT Upon being fired from his job, the mechanic filed a grievance with the OLRB. He argued that dismissal was too harsh given the culture of the workplace which was accepting of that type of behaviour. He also said no one told him not to do it, no one expressed displeasure, and no one mentioned they were offended. He argued that other employees had done stunts but questioned why he was the only one disciplined for his actions. He also claimed to have never seen the workplace harassment policy, even though it was part of the orientation package.

THE DECISION In July 2011, the OLRB found the mechanic's misconduct on the employer's premises, plus his permission to record it, “patently unacceptable in almost any workplace.” The fact that his employer was easily identified in the video clip contributed to the decision. The fact that the mechanic claimed not to have known about the corporate harassment policy was irrelevant—he should have known better. The OLRB also dismissed as irrelevant that no one protested or objected to the prank during the lunch break, which the mechanic argued was “not during work hours.” The court stated that ThyssenKrupp has an interest in preventing such horseplay and stunts in the workplace. They are in a safety-sensitive industry and such employee misconduct places the firm's reputation in jeopardy. The seriousness of the mechanic's misconduct also superseded any other factors, such as his claim of being a good employee with a clean record and the argument around the culture. There was no evidence that the company was aware of other pranks, and his role as the principle offender wasn't diminished by the culture, said the board. In dismissing the mechanics grievance, the board stated, “If (ThyssenKrupp) employees want to emulate the principles of Jackass by self-abuse, they may be free to do so when they are not on the (employer's) premises and cannot be identified as being associated with (ThyssenKrupp).”

Question 5. If this case goes to court, what arguments the Plaintiff’s Lawyer, representing the fired worker, would present before the court?

Question 6. What would be the line of Defense for the Lawyer of Thyssen Krupp Elevator?

Each question may be answered in about 150 to 200 words.

In: Operations Management

ThyssenKrupp Elevator Canada INTRODUCTION During a lunchroom break, a male employee at ThyssenKrupp decided to take...

ThyssenKrupp Elevator Canada

INTRODUCTION During a lunchroom break, a male employee at ThyssenKrupp decided to take up a dare from a fellow colleague for $100 and the Jackass-like prank was videotaped then posted to YouTube. When it came to the attention of the HR manager and other senior management, the employee was fired for violating company policy. The employee argued in court that the organizational culture allowed such behaviour. But would the Ontario Labour Relations Board (OLRB) agree?

BACKGROUND ThyssenKrupp Elevator Canada was subcontracting elevator installation at a construction site in downtown Toronto where a large office building was being built. All the workers on the site, including those from ThyssenKrupp, and the main contractor of the site, PCL Construction, were male and the culture of the workplace was described as a “macho” environment where pranks were played. There were reportedly pictures of women and provocative calendars hanging on walls, as well as signs displaying vulgar humour. There was little concern about these as access to the building was restricted to people involved in the construction project. One of ThyssenKrupp's employees at the site was an elevator mechanic. He and several other employees engaged in what he called “picking” on each other and playing pranks to keep things light at work. They also watched pornographic scenes on a worker's iPod and episodes of the television show Jackass, which features individuals doing stupid activities on dares.

ESCALATION OF PRANK BEHAVIOUR Over a period of a few weeks, the mechanic and other employees performed more and more pranks that copied some of the ones they saw on the Jackass show. Typically these events took place in the basement lunchroom where employees gathered for breaks and meals, to change clothes, and to socialize. Soon, money was being offered on dares to do certain actions. For example, one ThyssenKrupp employee accepted a dare that involved a $60 payment—money collected from fellow employees, including three foremen. The dare involved the employee eating spoiled food found in the common refrigerator of the lunchroom. A couple of weeks after the first dare, the mechanic was observed playing with a stapler in the lunchroom on a break. One of the foremen walked in and jokingly said, “What are you going to do with that? Why don't you staple your nuts to something?” The mechanic jokingly replied that he'd do it “if you get enough money.” Though he claimed it was intended as a joke, word spread within a few hours, and soon $100 was raised among seven other ThyssenKrupp and three PCL employees. Another four people were in the lunchroom later that afternoon watching when the mechanic decided to go ahead with the staple dare. He proceeded to drop his work uniform trousers and staple his scrotum to a wooden plank, which was met by “cheering and high fives,” according to the mechanic. With the mechanic's knowledge, the prank was filmed on video. Included on-camera were all those employees present, wearing full worksite uniforms, PCL logos on hats, and TK shirt patches—all easily identifiable and recorded by a worker who was present that day. The mechanic was advised at a later date that the event was posted on YouTube. Initially, the mechanic did nothing about the YouTube posting, but eventually asked for it to be taken off the site. To ensure this was done, the mechanic went back to YouTube searching for the video clip, but couldn't find it. He assumed it had been removed, however it was not—he just didn't search correctly. In total, the video clip was assessable on YouTube for two weeks, during which time many employees in the construction industry watched it. It was during these two weeks that ThyssenKrupp became aware of the video after the HR department received an email with a link to the video, and several people discussed it with a ThyssenKrupp executive at a construction labour relations conference. Conference participants insisted the employee was from ThyssenKrupp, and they questioned how the company could allow something like that to happen during work hours. At this point, ThyssenKrupp management reviewed the video one more time and decided that the mechanic had violated its workplace harassment policy, which prohibited “practical jokes of a sexual nature which cause awkwardness or embarrassment.” The mechanic was fired for “a flagrant violation” of ThyssenKrupp's harassment policy and risking the company's reputation.

CULTURE AT FAULT Upon being fired from his job, the mechanic filed a grievance with the OLRB. He argued that dismissal was too harsh given the culture of the workplace which was accepting of that type of behaviour. He also said no one told him not to do it, no one expressed displeasure, and no one mentioned they were offended. He argued that other employees had done stunts but questioned why he was the only one disciplined for his actions. He also claimed to have never seen the workplace harassment policy, even though it was part of the orientation package.

THE DECISION In July 2011, the OLRB found the mechanic's misconduct on the employer's premises, plus his permission to record it, “patently unacceptable in almost any workplace.” The fact that his employer was easily identified in the video clip contributed to the decision. The fact that the mechanic claimed not to have known about the corporate harassment policy was irrelevant—he should have known better. The OLRB also dismissed as irrelevant that no one protested or objected to the prank during the lunch break, which the mechanic argued was “not during work hours.” The court stated that ThyssenKrupp has an interest in preventing such horseplay and stunts in the workplace. They are in a safety-sensitive industry and such employee misconduct places the firm's reputation in jeopardy. The seriousness of the mechanic's misconduct also superseded any other factors, such as his claim of being a good employee with a clean record and the argument around the culture. There was no evidence that the company was aware of other pranks, and his role as the principle offender wasn't diminished by the culture, said the board. In dismissing the mechanics grievance, the board stated, “If (ThyssenKrupp) employees want to emulate the principles of Jackass by self-abuse, they may be free to do so when they are not on the (employer's) premises and cannot be identified as being associated with (ThyssenKrupp).”

1. Considering that the mechanic claimed that the ThyssenKrupp culture contributed to such behaviour, in your opinion, does ThyssenKrupp need to change its corporate culture? If not, why not?

In: Operations Management

ThyssenKrupp Elevator Canada INTRODUCTION During a lunchroom break, a male employee at ThyssenKrupp decided to take...

ThyssenKrupp Elevator Canada INTRODUCTION During a lunchroom break, a male employee at ThyssenKrupp decided to take up a dare from a fellow colleague for $100 and the Jackass-like prank was videotaped then posted to YouTube. When it came to the attention of the HR manager and other senior management, the employee was fired for violating company policy. The employee argued in court that the organizational culture allowed such behavior. But would the Ontario Labour Relations Board (OLRB) agree?

BACKGROUND ThyssenKrupp Elevator Canada was subcontracting elevator installation at a construction site in downtown Toronto where a large office building was being built. All the workers on the site, including those from ThyssenKrupp, and the main contractor of the site, PCL Construction, were male and the culture of the workplace was described as a “macho” environment where pranks were played. There were reportedly pictures of women and provocative calendars hanging on walls, as well as signs displaying vulgar humor. There was little concern about these as access to the building was restricted to people involved in the construction project. One of ThyssenKrupp's employees at the site was an elevator mechanic. He and several other employees engaged in what he called “picking” on each other and playing pranks to keep things light at work. They also watched pornographic scenes on a worker's iPod and episodes of the television show Jackass, which features individuals doing stupid activities on dares.

ESCALATION OF PRANK BEHAVIOUR Over a period of a few weeks, the mechanic and other employees performed more and more pranks that copied some of the ones they saw on the Jackass show. Typically these events took place in the basement lunchroom where employees gathered for breaks and meals, to change clothes, and to socialize. Soon, money was being offered on dares to do certain actions. For example, one ThyssenKrupp employee accepted a dare that involved a $60 payment—money collected from fellow employees, including three foremen. The dare involved the employee eating spoiled food found in the common refrigerator of the lunchroom. A couple of weeks after the first dare, the mechanic was observed playing with a stapler in the lunchroom on a break. One of the foremen walked in and jokingly said, “What are you going to do with that? Why don't you staple your nuts to something?” The mechanic jokingly replied that he'd do it “if you get enough money.” Though he claimed it was intended as a joke, word spread within a few hours, and soon $100 was raised among seven other ThyssenKrupp and three PCL employees. Another four people were in the lunchroom later that afternoon watching when the mechanic decided to go ahead with the staple dare. He proceeded to drop his work uniform trousers and staple his scrotum to a wooden plank, which was met by “cheering and high fives,” according to the mechanic. With the mechanic's knowledge, the prank was filmed on video. Included on-camera were all those employees present, wearing full worksite uniforms, PCL logos on hats, and TK shirt patches—all easily identifiable and recorded by a worker who was present that day. The mechanic was advised at a later date that the event was posted on YouTube. Initially, the mechanic did nothing about the YouTube posting but eventually asked for it to be taken off the site. To ensure this was done, the mechanic went back to YouTube searching for the video clip, but couldn't find it. He assumed it had been removed, however, it was not—he just didn't search correctly. In total, the video clip was assessable on YouTube for two weeks, during which time many employees in the construction industry watched it. It was during these two weeks that ThyssenKrupp became aware of the video after the HR department received an email with a link to the video, and several people discussed it with a ThyssenKrupp executive at a construction labor relations conference. Conference participants insisted the employee was from ThyssenKrupp, and they questioned how the company could allow something like that to happen during work hours. At this point, ThyssenKrupp management reviewed the video one more time and decided that the mechanic had violated its workplace harassment policy, which prohibited “practical jokes of a sexual nature which cause awkwardness or embarrassment.” The mechanic was fired for “a flagrant violation” of ThyssenKrupp's harassment policy and risking the company's reputation.

CULTURE AT FAULT Upon being fired from his job, the mechanic filed a grievance with the OLRB. He argued that dismissal was too harsh given the culture of the workplace which was accepting of that type of behavior. He also said no one told him not to do it, no one expressed displeasure, and no one mentioned they were offended. He argued that other employees had done stunts but questioned why he was the only one disciplined for his actions. He also claimed to have never seen the workplace harassment policy, even though it was part of the orientation package. THE DECISION In July 2011, the OLRB found the mechanic's misconduct on the employer's premises, plus his permission to record it, “patently unacceptable in almost any workplace.” The fact that his employer was easily identified in the video clip contributed to the decision. The fact that the mechanic claimed not to have known about the corporate harassment policy was irrelevant—he should have known better. The OLRB also dismissed as irrelevant that no one protested or objected to the prank during the lunch break, which the mechanic argued was “not during work hours.” The court stated that ThyssenKrupp has an interest in preventing such horseplay and stunts in the workplace. They are in a safety-sensitive industry and such employee misconduct places the firm's reputation in jeopardy. The seriousness of the mechanic's misconduct also superseded any other factors, such as his claim of being a good employee with a clean record and the argument around the culture. There was no evidence that the company was aware of other pranks, and his role as the principal offender wasn't diminished by the culture, said the board. In dismissing the mechanic's grievance, the board stated, “If (ThyssenKrupp) employees want to emulate the principles of Jackass by self-abuse, they may be free to do so when they are not on the (employer's) premises and cannot be identified as being associated with (ThyssenKrupp).

(4) Did the Ontario Labour Relation Board (OLRB) accept the defense that organizational culture contributed to the employee behavior? Explain their reasoning. Considering the company’s work environment, what factors need to be considered while updating the company’s health & safety policy?

In: Operations Management

CASE STUDY ON LEADERSHIP/ Aidensfield hospital currently faces major problems with staff, management, general performance and...

CASE STUDY ON LEADERSHIP/

Aidensfield hospital currently faces major problems with staff, management, general performance and service quality. It is conceivable that these problems are related to the ‘leadership’ styles adapted by those in charge. The senior management have proposed some changes within the organisation to hopefully make improvements but making such decisions requires an in-depth understanding of what is going wrong and why.

Leadership as a concept is often considered in isolation when in reality, it is coherent with management. Their amalgamation gives rise to the term ‘managerial leadership’ – a combination of Mullins’(2007) task and maintenance functions. In simpler terms, good managers do not view workers as machines artlessly pumped with fuel (or money) to produce output (the job) like Henry Ford. More appropriately, they are considered, for lack of a simpler expression, like horses that besides given food must also be pampered and directed to maximise productivity. Therefore, managerial leadership is characterised, along with task-oriented behaviour, by motivation, attention, communication and interest in the worker as these are the principles that agglutinate leader and subordinate (Buchanan & Huczynski 2010). Several leadership style classifications parade in general knowledge but the problem is they are usually considered  in vacuo. It is impossible to simply adapt one classified style because, like Castell (2010) argued, it will be unreasonable not to scrutinise the epistemology behind this rigid taxonomy. He stated that;

“Managers cannot adopt neutral stances with an air of scientific detachment because such detachment cannot exist ... the knowledge that managers bring to management is constructed situationally ... in the present and in relation to the context” (2010, pg. 234);

The key word here is ‘constructed’. Delving into real life applications of managerial leadership, contingency theorists argued that selective combination of relevant elements within styles to fit whatever circumstance that presents itself is ideal (Mckenna, 2012). Hence, this essay aims to critically cull ideas from the distinct styles and theories, explaining how they may coalesce into academically supported explanations of issues in Aidensfield’s unique context. Firstly considering motivation, which is apparently the most pressing issue, relevant traditional theory will be discussed extensively. The discussion will then move on to how motivation can be determined by perception and the psychological contract. Prompted by perception, communication concepts will follow before finishing with leader-member relationships, trust and group dynamics. Throughout, these determinant factors will be linked to various leadership styles and supported with examples from the Aidensfield case.

Although the theory that performance is directly affected by leadership is supported by some empirical evidence, critics like Porter and McLaughlin (2006) argue that majority of research has been anecdotal. Therefore, concluding that there is a direct relationship between performance and leadership is probably an “act of faith” (Currie & Lockett, 2011, pg. 292). Nevertheless, one certainty is leadership style determines motivational levels which predetermine morale levels which in turn regulates performance. Therefore, motivation is the key link between leadership and performance.

McGregor (1987) conceived two approaches to motivation; Theory X, which only occurs at the physiological and security levels in Maslow’s (1943) needs hierarchy, and Theory Y, which focuses on higher level needs (Buchanan & Huczynski 2010). Noticeably, the lower levels have been satisfied in workers at Aidensfield based on the fact that sixty per cent of employees have been on the same job for a decade.. This statistic indicates that the leaders adopt the Theory X approach – a common behaviour within autocratic practices. As a result, staff are not discontent with their work. Unfortunately, Maslow (1943) warned that once a need has been satisfied, it might no longer serve as a motivator. So, even though low turnover may be interpreted as a positive, it is actually linked to the reason workers lack motivation. Herzberg’s (1987) theories explain that having only lower needs (hygiene factors) satisfied will result in no dissatisfaction (Latham & Ernest, 2006) but create a lack of motivation because higher level needs (growth factors) have been ignored (Shuck & Herd, 2012). This lack of motivation is demonstrated by the falling quality of service reported e.g. Drivers making patients wait. From De Cremer’s (2006) point of view, quality of service can only be improved using intrinsic motivation i.e. the Theory Y approach – common in democratic leadership.

This direct relationship between motivation and performance is elucidated in Mullins’(2010) formula; Performance = function (ability X motivation). Considering that function and ability are relatively constant, and motivation is the only variable, then low motivation equates low performance. One must note that this formula, although still viable, fails to consider emotional factors like trust (Kreitner and Kinicki, 2009), happiness and well-being – which will be discussed later – as factors that also determine motivational levels. At Aidensfield, the attempt to extrinsically motivate through bonus rewards systems seem to be failing as it has only short term effects. On the other hand, intrinsic motivation, even though more desired, might be equally ineffective because the jobs have little variety or challenge. According to Porter and Lawler’s (1968) expectancy model, employee performance in jobs like this will hardly be improved by intrinsic rewards. Further proving this, the jobs have a low Motivating Potential Score (MPS). According to Hackman and Oldman’s (1980) formula MPS can be calculated thus

MPS = (skill variety + task variety + task significance)/3  X autonomy  X feedback

Since autonomy and feedback stand alone as non-averaged variables, they have a more significant effect on the MPS Score (Buchanan & Huczynski, 2007). It was reported that employee empowerment is a problematic issue at Aidensfield (lack of autonomy) and that it suffers from a slack reporting structure which may result in a lack of clear channels for information on performance effectiveness (feedback), therefore there is minimal opportunity within the job design for motivation. Brytting & Trollestad (2000) and Van Vugt et al (2004) support this with their arguments that employees starved of responsibility tend to react with passivity rather than interest, and is apparent when the Aidensfield security staff display nonchalant attitudes to customers – Another negative aspect of autocratic leadership. With the absence of an effective feedback system mentioned earlier, expectancy theorists may argue that it signifies there is no clarified procedure for performance evaluation. Hence the staff may not ‘perceive’ any equitable rewards for their effort.

This leads on to the idea of perception as a factor that affects motivation and behaviour. An employee’s level of engagement is built around their perception of the work environment and unique encounters with leadership (Shuck, Rocco & Albornoz, 2011). It determines their expectations of the employer and what they think their obligations are – like an invisible contract drawn-up mentally – the ‘psychological contract’ (Conway & Coyle Sharpio, 2011). Guest et al (2003) advised that breaches can be avoided if employees adopt effective people management practices but as highlighted in the report, the supervisory grades at Aidensfield abdicate said people management responsibilities. Conway, Guest and Trenberth’s (2011) research on psychological contract breach suggests that this begotted the reported lack of commitment, poor employee engagement and the perceived job insecurity.

There seems to be a psychological contract breach between the line managers and senior management as well. The delegation of HR practices to them may have been perceived as excess work outside their obligations. It is evident that this delegation has been done without their proper consultation – an autocratic method of decision-making. The senior management may have done this in an attempt to empower them because according to Rich, LePine & Crawford (2010), more intellectual work creates a higher level of engagement and may in turn, result in increased performance. Apart from the possible breach, this empowerment may not have been successful because the reported slack reporting structures and weak lines of communication. This suggests that the line managers did not have the required support to take on such work in the first place. If the job descriptions had been properly ‘communicated’, possibly through a more democratic method of constant dyadic exchange (Felfe & Schyns, 2010; Conway & Coyle Sharpio, 2011), this problem may not have occurred.

This brings us to communication, as a leadership tool. Adensfield’s organisational structure diagram suggests a chain communication network amongst the senior management. This centralised system is common within authoritative leadership where all information is routed through a predetermined channel (Mullins, 2007). It is questionable because even though it may be appropriate for simple tasks, the accumulated complexity of the entire ancillary operations may need to be handles within a decentralised network – a more participative approach to communication (Restubog et al, 2010). On the other hand, the simplicity of the tasks at lower levels where the charge hands’ teams operate may require a more centralised network to be optimally efficient. Even though it may be more effective, pressure might built up on the charge hands who do not feel qualified to do the job and is possibly the reason they abdicate responsibility as reported.

Having a centralised communication network amongst charge hands’ groups does not necessarily mean their adapted leadership style must be authoritative in nature. Decisions can be made centrally to maintain speed and effectiveness but according Restubog et al (2010) it is still possible maintain high quality Leader-Member Exchange (LMX) along the same centralised communication lines. High LMX is more common within democratic or transformational leadership settings. It is evident that there is low level LMX amongst senior management, charge hands and group members at Aidensfield because when the breaches in psychological contract mentioned earlier occurred, it had significant detrimental effect on the in-role performances of staff. Zhao et al (2007), speaking from a ‘social support’ perspective, argue that if high quality LMX is present in an organization, the leaders will easily help their subordinates manage and recover from the breach. On the contrary, the ‘betrayal’ perspective argues that the effect on staff may be too much to handle (Restubog et al, 2010). They argued that high LMX begets greater expectations and trust in leaders and therefore when the inevitable breach occurs, the staff will feel highly betrayed or for lack of a better word, ripped- off (2010). Besides this highlighted disadvantage, many social identity theorists, including Felfe, Schyns (2010) and Turner (2005) still encourage high LMX because, even though breach is inevitable, it will be less likely. This is supported by the fact that similar people, reason similarly and are less likely to have conflicting perceptions.

To facilitate LMX it is necessary for leaders to share common values or represent the collective identities of their subordinate groups (Rizzo, House & Lirtzman, 1970; Tajfel & Turner, 1986). This is referred to as ‘leader-group prototypicality’ and is part of Social Identity theory commonly practiced amongst transformational leaders. Considering that there have been close knit informal groups developed within the charge hands’ formal groups, the presence of high leader-group prototypicality can be deduced, despite the low LMX environment. Hogg et al (2004) explained that the collective values of group members determine the group norms and behaviour. Therefore, a group-prototypical leader will behave in a similar way as group members. This explains why charge hands and operational staff at the hospital share common characteristics of lack of motivation and passivity towards work. Though transformational in nature, these values are not aligned with those of the organisation at all.

This commonality in personal characteristics invokes mutual trust within team members (Tanghe, Wisse and Flier, 2010). This in turn makes a strong cohesive group but does not necessarily mean improved productivity. Kelly and Barsade (2001) and Smith et al (1995) argue that members of a group may work well together but performance is only improved when their group values are in line with that of the organization .The small groups of five appear to share high levels of intra-group trust that have propagated an equally high level of inter-group distrust which explains why they are reported to have highly demarcated traditions and work very independently. Mullins (2007) states that these strongly cohesive Informal groups may experience low staff turnover but are notorious for low productivity, inter-group conflict and neglect of organizational functions for more social activities – all of which are reportedly present within staff at Aidensfield. The aforementioned role ambiguity is another reason for informal group formations. Cicero, Pierro and van Knippenberg (2010) support this possibility by suggesting that role uncertainty in a job tends to make workers rely more on group social memberships for identity than on organisational descriptions. Understanding this complex ‘trust – uncertainty – behaviour’ relationship explains why staff are doing the things they are.

Not just group dynamics, but all the factors discussed, from motivation down to trust, are clearly very important in understanding staff behaviour and deciding a leaders approach to his subordinates. As mentioned in the introduction, it is impossible to classify Aidensfield’s leaders with one style. For example, there were so many autocratic characteristics identified earlier but yet, the reported lack of managerial control suggests a laissez-faire approach. Therefore, instead of rigid classification, the consideration of these little details are what shape managers’ or leaders’ responses – like the numerous tiny screws, nuts and bolts that enable a complex machine to work. They are necessary to create a competitive workforce in Aidensfield’s sector of service and to prevent being left behind by competitors who strive to attain higher levels of service.

Q1. Explain the relationship between motivation and performance as explained in the case.

Q2.Discuss how employee empowerment can be used as a development tool with reference to the case.

In: Operations Management

An Emerging Threat: Ransomware The attack, expertly planned, was insidious. For six weeks or more, cybercriminals...

An Emerging Threat: Ransomware

The attack, expertly planned, was insidious. For six weeks or more, cybercriminals purportedly from either North Korea or Russia wormed their way into Monroe College’s computer systems, maneuvering undetected as they sought out weak points. Then, in July 2019, they pounced. Using an IT staffer’s pilfered password across platforms, hackers infected every server on Monroe’s two New York City-area campuses with a virus, effectively locking down administrative files, email, learning management systems, and website. “The college was a big house we were all locked out of,” says Marc Jerome, president of Monroe, a for-profit institution with 8,000 students. What’s more, as the campus reeled, hackers held Monroe’s tech infrastructure for ransom. They would restore it, they told the college’s leaders, in exchange for the Bitcoin equivalent of $1.6 million.
As Monroe students became instantly reacquainted with turning in assignments on paper, campus officials sprang into action, working feverishly to restore damaged systems. But without a policy for dealing with such attacks, Monroe was faced with few choices. After a couple weeks of failed attempts to use backup systems (which had also been infected) and with little hope of restoring its online presence, college officials decided to contact the college’s insurance company, as well as hire a law firm and a tech expert to negotiate with the attackers. In the end, Monroe paid them a considerably lesser sum than had been demanded in order to obtain the
T
• •

•   

• •


WITH SUPPORT FROM
decryption keys needed to eliminate the virus and bring the campus’s tech services back online. Monroe had been victimized by a ransomware attack — and it isn’t the only college that has had to face off with international criminal enterprises that have perpetrated such disruptions in recent years. Most attacks start with “phishing” expeditions. Cybercriminals send virus encoded emails in the hope that someone at a college — a professor, a staff member, a student — will open one and set in motion the virus or malware contained therein. The virus then replicates itself throughout a network. Some institutions have fended off ransomware incursions with security software or with the help of enhanced computer-safety training, while others have seen their systems disabled and their daily operations threatened. Some have devised policies for dealing with attacks, while others are in the process of considering them. Several institutions report that they have created policies but are not making them public. Doing so, they argue, might encourage such attacks or give cybercriminals an angle from which to start one. Such secrecy is far from rare. Many ransomware attacks are not reported. Colleges may not want the public to know that they have been successfully targeted. IT experts say such reticence leads some college officials to underestimate the threat. Because criminal enterprises, usually originating in China, Eastern Europe, North Korea, Russia, and Vietnam, typically demand payment in cryptocurrency to protect their anonymity, it has proved difficult to track them down or slow the rate of attacks. Law-enforcement agencies generally offer few answers. The onus on preventing ransomware attacks and policing tech systems falls on the institutions themselves. This, too, can prove difficult, given that colleges provide faculty members and students with wide access to their networks and content. The very openness that many institutions point to with pride can often become a security headache. While there is some question as to whether the threat of ransomware at colleges and universities is growing or flattening out, there is evidence that more higher-ed institutions are stepping up protection. More colleges now carry
insurance policies designed to pay them for the lost revenue and repairs that can result from cyberattacks. Several institutions have stepped up training of computer users and shored up security to forestall invasive tactics. And some have invited outside experts to look for potential vulnerabilities in their systems. Facing their seemingly built-in disadvantages, many colleges are devising policies that will make their campuses and systems safer, experts say, whether by preventing attacks, dissuading criminal enterprises from attempting them, or protecting themselves against loss. This Trends Snapshot outlines the latest efforts.   
The very openness that many institutions point to with pride can often become a security headache.
“No-Pay” Policies The FBI, among other law-enforcement agencies, urges colleges to refuse to pay ransoms. Many institutions, especially larger ones, have heeded the advice, devising a “just say no” strategy to deter criminals and make themselves less of a target. At the University of California at San Diego, two recent ransomware incidents did some temporary damage. But the university refused to cave in to demands for cash. Three years ago, the university lost access to its data during an attack, but because it had backed up both its data and its systems, it was able to recover them on its own within a week. About 18 months ago, a targeted breach centered on the work of one research faculty member. The researcher lost some data, though the loss wasn’t considered catastrophic. San Diego has since made strong efforts to persuade its research faculty members to back up their data in a safe place. The university created a website with instructions on how to do that. It also started a separate datamanagement plan for researchers to follow. Still, officials at some institutions who
an emerging threat : ransomware 3
have promised never to pay criminals admit that there may be some circumstances in which that stance becomes less absolute, such as when students’ medical information has been stolen and a threat has been made to publish it online. Even among institutions that have pledged never to give in to demands, there is a belief that there might, one day, be a particular case that offers a reason to pay out, especially if a college lacks insurance against ransomware attacks.
Many colleges have gotten the word out that, no matter how far down in the tech hierarchy staff members or students might be, they should be on the lookout for nefarious online schemes.
Training and Communications At several colleges, IT staffers run tabletop exercises for academic department members and students as well as administrators. The goal is to learn how much they know about the threat of ransomware, and to test their reactions to simulated ransomware-borne denial-of-service attacks. The websites of the University of Michigan and Pennsylvania State University offer examples of phishing expeditions, so that students know what to look for and how to respond. The Penn State site also includes videos of what people on campus can do to avoid allowing ransomware hackers to enter a system. Many colleges have gotten the word out that, no matter how far down in the tech hierarchy staff members or students might be, they should be on the lookout for nefarious online schemes. A chain of communication following an attack is also important, and has become a part of many institutions’ hacker-response strategies. Some colleges maintain an “escalation policy” that lays out in detail which campus officials should be contacting others, who receives certain kinds of messages, and in what order. Colleges
have also made contingency plans for when their email is down, such as using automated phonecalling, text alerts, and social-media blasts to reach staff members and students when a campus system is held hostage by ransomware.
Improving Security Several institutions report working harder to make their IT systems safe from attacks. At the University of California at Berkeley, a virtual private network was created with several safeguards. To remotely access it, Berkeley users must authenticate their credentials to get through several firewalls. Such measures, the university hopes, will make it much tougher for attackers to get through. Other colleges are doing something similar by expanding requirements that people on campus use multifactor authentication to gain access to networks. Larger universities frequently employ system patches, antivirus software, and common decryption keys that can free a system from ransomware. Others are beefing up their backup systems so they can replicate their main systems if ransomware takes them down. Many institutions report that they regularly test their systems against attacks. And some have taken the step of removing their campus directories, or at least parts of them, from webpages to make it harder for ransomware attackers to send infected emails en masse. Still, IT experts warn that many colleges, particularly smaller ones, aren’t availing themselves of modern cybersecurity solutions. Tech offices at institutions with budget trouble are especially vulnerable — something that could intensify as Covid-19 forces colleges to cut costs further, including by eliminating some security personnel.
Insurance While not protecting institutions against attacks, insurance policies typically can offer institutions a way back after one. After a college uses money from an insurance claim to pay off ransom demands, attackers usually remove the virus, freeing up an institution’s network. By law, if an insurance policy covers damage by
an emerging threat : ransomware 4
ransomware, insurers must respond to a college’s claim, even if that means paying it for damages. Cyber insurance companies have mushroomed in the past decade, according to one IT expert, who adds that more than $2 billion has been paid out in ransomware claims of all types (including colleges) in recent years. Purchasing a cyber insurance policy is the most common way colleges deal with possible ransomware, according to a survey of chief information officers and chief information security officers conducted by the Leadership Board of CIOs (LBCIO). The survey also found that 76 percent of higher-ed institutions now carry insurance against ransomware disruptions, up from 63 percent in 2018. Though such policies can offer a way out of danger, some experts worry that they also bring some peril. Cyberattackers who learn that an institution is insured might see it as a better opportunity. Buying insurance presents other caveats as well. For one, there is no guarantee that paying a ransom will result in the full return of an IT system. Colleges that negotiate with criminal enterprises are relying on them to be honest about the delivery of decryption keys, or the extent to which such keys will actually restore control of their original systems.
Outside Audits While most colleges rely on their chief
information officers and chief information security officers to make the technical calls to fend off ransomware attacks, some have opted to invite outside experts to assess their systems or provide continuing oversight. While on-campus professionals can develop plans and policies that make it harder for cybercriminals to commandeer a college’s computing and data systems, issues of campus culture can prevent those officials from creating and enforcing rules on how faculty and staff members and students should behave online. Some CIOs are regularly frustrated by faculty members who download unsafe software or who don’t report such actions to the IT office. Having an outside check on the system can lead to stronger, more enforceable policies, some college leaders believe. Outside experts can feel freer to monitor weak points in a system and make suggestions as to how to keep stakeholders in line with IT-security goals. In the past decade, the proportion of college-IT officials who have contracted with outside tech auditors has grown from 55 percent to 71 percent, according to the LBCIO survey. Among those institutions now planning to make third-party IT audits a regular part of their security regimen is Monroe College, which will soon retain an outside vendor in the hope that it can avoid the embarrassment and expense it suffered one year ago.

1. You are a consultant in charge of creating a Business Continuity Plan (BCP) for UALR. Based on the article what will be your focus, given the prevalent of cyber-attacks at institutions of education. Identify an area that you will focus on to prevent ransomware attacks and devise a plan so that when it happens you have a strategy to recover. Explain the reason for focusing in this area/ Explain why that area is important to institutions of education such as UALR (30 points)

2. Using paper and pen technology to store records and document process poses threats to Personally Identifiable Information (PII) . Identify 2 examples of PII and use the template below to perform a risk assessment of Personal Identifying Information (PII) stored by institutions of education, such as UALR. Using the template provided evaluate, and assess threats, vulnerabilities, risks, and Maximum Tolerable Downtime (when these PII will be inaccessible) (40 Points)
Threats : What an organization is defending itself against, e.g. a natural disaster, man-made disasters.
Vulnerabilities : The gaps or weaknesses in the IT infrastructure that undermine an organization’s IT security efforts, e.g. a firewall flaws that lets hackers into a network. Lack of employee training, ineffective BCP, flawed processes etc.
Risks : Calculated assessment of potential threats to an organization’s security and disruption of operations and the vulnerabilities within its information systems infrastructure.




Risk Assessment Template

Type of PII Threats Vulnerabilities Risks MTD

3. Based on your risk assessment and recommended Maximum Tolerable Downtime (MTD), make recommendation for Recovery Time Objective (RTO) and Alternate Processing Sites ( Cold, Hot, Warm, Mobile) to achieve the RTO . Explain why you selected that alternate processing site

In: Computer Science

Refresher on Variables: Classifying variables as independent or dependent: The independent variable is the one being...

Refresher on Variables:

Classifying variables as independent or dependent:

The independent variable is the one being manipulated or grouped in the study for comparison. A tip to remember this is to think that independent starts with “I” and I, the researcher, manipulate that variable or have control over who is grouped in the study. The way we will be using independent variables in this course is in terms of between group analysis, so our focus will be on groups being compared. Note that the participants are not the independent variable! Rather, the independent variable is the concept by which you group the participants.

*Do not forget to include the levels (groups) for the independent variable when you type up your lab answers. The levels are the groups being compared.

The dependent variable is the outcome, the variable on which the groups are being compared. This variable is measured for all participants.

Example: If the goal was to compare Caucasian to African Americans to see whether they differ on salary, ethnicity is the independent variable, with Caucasian and African Americans being the two IV groups. Salary is the dependent variable.

Measurement scales (modified from Cozby, 2013)

This classification system categorizes the variables as being measured on a nominal, ordinal, interval, or ratio scale. A variable’s measurement scale has implications for the types of statistical analysis used; certain statistical tests are appropriate for certain measurement scales. As such, classifying variables correctly is a necessary step before one can run the appropriate statistical tests. You will have to classify variables in subsequent labs as well as for your research project, so it is important to master these concepts. Here is a reminder of the scales:

Nominal: There is no relative ordering of the levels for the variable; the different levels are simply different from each other but not in order. In other words, the levels reflect different categories of the variable, but there is no order to them. The assignment of numeric scores to each level (e.g., 1 for Caucasian, 2 for African American) is arbitrary. For example, in terms of ethnicity: Caucasian is not more, higher, better, less, lower, or worse than African American. It is simply a different category than African American.

Ordinal: There is an order to the levels, but the distance between the levels is unknown because you assigned values to the different levels given the variable’s levels are not already in quantified form. The assignment of values to the levels is somewhat arbitrary and meaningless, and there is no way to know whether the difference is equal between levels. Again, you assign numbers to the various levels, but the numbers are meaningless and somewhat arbitrary. For example, you may assign 1-5 to the levels, and you know that 5 is more or higher than the lower levels, but you do not know whether the magnitude of difference between level 5 and 4 is the same as between 4 and 3.

Interval: The variable’s levels are in quantified form. As such, there is an order to the levels, which is meaningful, and the distance between levels is equal over all levels of the scale. However, there is no absolute or true zero point. For example, the difference between level 1 and 2 is the same as between 2 and 3, but there is no true zero point. NOTE that the textbook mentions extraversion as a personality measure that could be an example of interval. Personality measures are NOT true interval variables, but researchers in social sciences may argue that some measures of psychological concepts have been standardized and as such, those measures can be considered interval. They are not true interval variables, but classifying them as such allows researchers to use more advanced statistical analysis. For this course and assignment, we are using the true definition of interval variable as described in this paragraph. Psychological measures for which values are arbitrarily assigned are ordinal, not interval!

Ratio: This is similar to interval in that the distance between levels is meaningful and equal over all levels of the scale, but there is also a fixed and true zero point. If you are measuring a variable and there is equal distance between the levels, think about whether it makes sense that there is a true 0 point for the variables. Ask yourself could the variable cease to exist if the value was 0. If so, the variable would be ratio.

Many students find these concepts confusing, so take your time Although the categories are not listed for the variables in the measurement scales section of the lab, there is enough information there for you to determine its measurement scale.

Independent vs Dependent Variables (1.5 points each = IV is worth 1 point, DV is worth .5 point)

For each of the following four descriptions of studies, identify the independent and dependent variables. When typing in your answers, follow the example below. For the independent variable, be sure to include in parentheses the groups being compared.

Example: Students watched a cartoon either alone or with others and then rated how funny they found the cartoon to be.

            IV: Cartoon (alone and others)

            DV: Funniness

An adolescent egocentrism questionnaire was given to male and female college students.

IV:

DV:

Women suffering from PMS volunteered to participate in a study about a drug to alleviate the symptoms of PMS. The women were randomly spilt: half received the drug and the other half received a placebo. Severity of PMS symptoms was recorded during their next premenstrual cycle.

IV:

DV:

After watching a love movie or a horror movie, a romanticism questionnaire was given to a group of adults.

IV:

DV:

Parents were classified into the type of parenting style (e.g., authoritative, authoritarian, or permissive) they use. The parents were asked to rate their perception of how much discipline they use with their children.

IV:

DV:

Measurements of Scale (1 point each)

For each the following descriptions of variables, identify whether a nominal, ordinal, interval, or ratio scale is being used.

Example: An item measuring Ethnic group categories of people in a neighborhood, with options being White, Black, Hispanic, or Asian. = nominal

A check box item measuring gender, with male or female as options. =

An item measuring the wife’s household income, with income filled in the blank. =

Items measuring self-esteem on a disagree to agree scale. =

An item where preschool children participants must check their favorite color, with blue, red, yellow, green, purple, or pink as options. =

An item measuring number of times a preschooler says the word “love,” with the number filled in the blank. =

An item measuring the parenting style of teen mothers, with authoritative, authoritarian, uninvolved, or permissive as options. =

An item measuring the high temperature on each day of the week, with temperature filled in the blank. =

A check box item measuring the religious affiliation of the Presidents of the United States, with Christian, Jewish, Mormon, Islam, or Muslim as options. =

An item measuring the math SAT scores of Sand Creek High School seniors, with options ranging continuously from 200-800. =

An item measuring the social competence score for adolescents who spend more than 3 hours per day on social networking sites, with options ranging from low competence to high competence. =

In: Statistics and Probability

Assignment on Multiple Linear Regression                                     &nb

Assignment on Multiple Linear Regression

                                                                                        

The Excel file BankData shows the values of the following variables for randomly selected 93 employees of a bank. This real data set was used in a court lawsuit against discrimination.

Let

= monthly salary in dollars (SALARY),

= years of schooling at the time of hire (EDUCAT),

= number of months of previous work experience (EXPER),

= number of months that the individual was hired by the bank (MONTHS),

= dummy variable coded 1 for males and 0 for females (MALE).

Let um = the mean salary for all male bank employees, and uf = the mean salary for all female bank employees. Using the t-test studied in Section 10.2, you could find some evidence of um > uf and provide some support for a discrimination suit against the employer. It is recognized, however, that a simple comparison of the mean salaries might be insufficient to conclude that the female employees have been discriminated against. Obviously there are other factors that affect the salary to which the relation um > uf might be attributed. These factors have been identified as x1, x2 and x3 defined above.

Assume the following regression model,

y = B0 + B1x1 + B2x2 + B3x3 + B4x4 + E

and apply Regression in Data Analysis of Excel to find the estimated regression equation

1. Clearly show the estimated regression equation. Assuming that the values of x1, x2 and x3 are fixed, what is the estimated average difference between the salaries of all male and female employees?

2. What salary would you predict for a male employee with 12 years educations, 10 months of previous work experience, and with the time hired equal to 15 months? What salary would you predict for a female employee with 12 years educations, 10 months of previous work experience, and with the time hired equal to 15 months? What is the difference between the two predicted salaries? Compare this difference with that found in Task 1.

3. Is there a significant difference in the average salaries for male and female employees after accounting for the effects of the three other independent variables? Use a 5% level of significance to answer this question. Clearly show the null and alternative hypotheses to be tested, the value of the test statistic, the p-value of the test, your conclusion and its interpretation.

     The detailed example of using Regression in Data Analysis of Excel is shown on pages 312 – 314.

     Use Microsoft Word to write a managerial report with your name shown on the first page. The report should include your Excel output from Regression (copy and paste it), so do not attach any separate Excel file.

SALARY EDUCAT EXPER MONTHS        MALE

4620      12          11.5       22                        1

5040      15          14          3                          1

5100      12          180        15                        1

5100      12          315        2                          1

5220      12          29          14                        1

5400      12          7            21                        1

5400      12          38          11                        1

5400      12          113        3                          1

5400      15          17.5       8                          1

5400      15          359        11                        1

5700      15          36          5                          1

6000      8            320        21                        1

6000      12          24          2                          1

6000      12          32          17                        1

6000      12          49          8                          1                        

6000      12          56          33                        1

6000      12          252        11                        1

6000      12          272        19                        1

6000      15          25          13                        1

6000      15          35.5       32                        1

6000      15          56          12                        1          

6000      15          64          33                        1

6000      15          108        16                        1          

6000      16          45.5       3                          1

6300      15          72          17                        1

6600      15          64          16                        1

6600      15          84          33                        1

6600      15          215.5    16                        1

6840      15          41.5       7                          1

6900      12          175        10                        1

6900      15          132        24                        1

8100      16          54.5       33                        1

3900      12          0            1                          0

4020      10          44          7                          0          

4290      12          5            30                        0

4380      8            6.2         7                          0

4380      8            7.5         6                          0

4380      12          0            7                          0

4380      12          0            10                        0

4380      12          4.5         6                          0

4440      15          75          2                          0

4500      8            52          3                          0

4500      12          8            19                        0

4620      12          52          3                          0

4800      8            70          20                        0

4800      12          6            23                        0

4800      12          11          12                        0

4800      12          11          17                        0

4800      12          63          22                        0

4800      12          144        24                        0

4800      12          163        12                        0

4800      12          228        26                        0

4800      12          381        1                          0

4800      16          214        15                        0

4980      8            318        25                        0

5100      8           96          33                        0

5100      12          36          15                        0

5100      12          59          14                        0

5100      15          115        1                          0

5100      15          165        4                          0

5100      16          123        12                        0

5160      12          18          12                        0

5220      8            102        29                        0

5220      12          127        29                        0

5280      8            90          11                        0

5280      8            190        1                          0

5280      12          107        11                        0

5400     8            173        34                        0

5400      8            228        33                        0

5400      12          26          11                        0

5400      12          36          33                        0

5400      12          38          22                        0

5400      12          82          29                        0

5400      12          169        27                        0

5400      12          244        1                          0

5400      15          24          13                        0

5400      15          49          27                        0

5400      15          51          21                        0

5400      15          122        33                        0

5520      12          97          17                        0

5520      12          196        32                        0

5580      12          132.5    30                        0

5640      12          55          9                          0

5700      12          90          23                        0

5700      12          116.5    25                        0

5700      15          51          17                        0

5700      15          61          11                        0

5700      15          241        34                        0

6000      12          121        30                        0

6000      15          78.5       13                        0

6120      12          208.5    21                        0

6300      12          86.5       33                        0

6300      15          231        15                        0

In: Statistics and Probability

Data Set 3 --Buena School District Bus Data Bus Number Maintenance Age Miles Type Bus-Mfg Passenger...

Data Set 3 --Buena School District Bus Data
Bus Number Maintenance Age Miles Type Bus-Mfg Passenger
X1 X2 X3 X4 X5 X6 X7
135 329 7 853 Diesel Bluebird 55 Passenger
200 505 10 822 Diesel Bluebird 55 Passenger
40 466 10 865 Gasoline Bluebird 55 Passenger
387 422 8 869 Gasoline Bluebird 55 Passenger
326 433 9 848 Diesel Bluebird 55 Passenger
861 474 10 845 Gasoline Bluebird 55 Passenger
122 558 10 885 Gasoline Bluebird 55 Passenger
887 357 8 760 Diesel Bluebird 6 Passenger
686 329 3 741 Diesel Bluebird 55 Passenger
490 497 10 859 Gasoline Bluebird 55 Passenger
464 355 3 806 Gasoline Bluebird 55 Passenger
875 489 9 858 Diesel Bluebird 55 Passenger
883 436 2 785 Gasoline Bluebird 55 Passenger
57 455 7 828 Diesel Bluebird 55 Passenger
482 514 11 980 Gasoline Bluebird 55 Passenger
704 503 8 857 Diesel Bluebird 55 Passenger
731 432 6 819 Diesel Bluebird 42 Passenger
75 478 6 821 Diesel Bluebird 55 Passenger
600 493 10 1008 Diesel Bluebird 55 Passenger
358 461 6 849 Diesel Bluebird 55 Passenger
692 469 8 812 Diesel Bluebird 55 Passenger
43 439 9 832 Gasoline Bluebird 55 Passenger
500 369 5 842 Gasoline Bluebird 55 Passenger
279 390 2 792 Diesel Bluebird 55 Passenger
884 381 9 882 Diesel Bluebird 55 Passenger
977 501 7 874 Diesel Bluebird 55 Passenger
725 392 5 774 Diesel Bluebird 55 Passenger
982 441 1 823 Diesel Bluebird 55 Passenger
39 411 6 804 Gasoline Bluebird 55 Passenger
418 504 9 842 Diesel Bluebird 55 Passenger
984 392 8 851 Diesel Bluebird 55 Passenger
953 423 10 835 Diesel Bluebird 55 Passenger
507 410 7 866 Diesel Bluebird 55 Passenger
540 529 4 846 Gasoline Bluebird 55 Passenger
695 477 2 802 Diesel Bluebird 55 Passenger
321 450 6 856 Diesel Bluebird 6 Passenger
918 390 5 799 Diesel Bluebird 55 Passenger
101 424 4 827 Diesel Bluebird 55 Passenger
714 433 7 817 Diesel Bluebird 42 Passenger
768 494 7 815 Diesel Bluebird 42 Passenger
29 396 6 784 Gasoline Bluebird 55 Passenger
554 458 4 817 Diesel Bluebird 14 Passenger
699 475 9 816 Gasoline Bluebird 55 Passenger
954 476 10 827 Diesel Bluebird 42 Passenger
660 337 6 819 Gasoline Bluebird 55 Passenger
520 492 10 836 Diesel Bluebird 55 Passenger
814 426 4 757 Diesel Bluebird 55 Passenger
120 503 10 883 Diesel Keiser 42 Passenger
427 359 7 751 Gasoline Keiser 55 Passenger
759 546 8 870 Diesel Keiser 55 Passenger
10 427 5 780 Gasoline Keiser 14 Passenger
880 474 9 857 Gasoline Keiser 55 Passenger
481 382 3 818 Gasoline Keiser 6 Passenger
370 459 8 826 Gasoline Keiser 55 Passenger
989 380 9 803 Diesel Keiser 55 Passenger
162 406 3 798 Gasoline Keiser 55 Passenger
732 471 9 815 Diesel Keiser 42 Passenger
751 444 2 757 Diesel Keiser 14 Passenger
948 452 9 831 Diesel Keiser 42 Passenger
61 442 9 809 Diesel Keiser 55 Passenger
9 414 4 864 Gasoline Keiser 55 Passenger
365 462 6 799 Diesel Keiser 55 Passenger
693 469 9 775 Gasoline Keiser 55 Passenger
38 432 6 837 Gasoline Keiser 14 Passenger
724 448 8 790 Diesel Keiser 42 Passenger
603 468 4 800 Diesel Keiser 14 Passenger
45 478 6 830 Diesel Keiser 55 Passenger
754 515 14 895 Diesel Keiser 14 Passenger
678 428 7 842 Diesel Keiser 55 Passenger
767 493 6 816 Diesel Keiser 55 Passenger
705 403 4 806 Diesel Keiser 42 Passenger
353 449 4 817 Gasoline Keiser 55 Passenger
156 561 12 838 Diesel Thompson 55 Passenger
833 496 8 839 Diesel Thompson 55 Passenger
314 459 11 859 Diesel Thompson 6 Passenger
396 457 2 815 Diesel Thompson 55 Passenger
398 570 9 844 Diesel Thompson 14 Passenger
168 467 7 827 Gasoline Thompson 55 Passenger
671 504 8 866 Gasoline Thompson 55 Passenger
193 540 11 847 Diesel Thompson 55 Passenger

The attached MS-Excel file contains data on the contains data the bus fleet of the Johnson Bus Fleet. Download the file and analyze the characteristics of the Johnson Bus fleet.

a.Sort the data by type of Bus Manufacturer and calculate the Average Cost and Standard Deviation of Maintenance for each Manufacturer

b. Sort the data by Fuel Type and calculate the cost of Maintenance and the Average Mileage and Standard deviation of mileage by each fuel type of fuel

c. Present your results in a table. Cut and paste your chart and table into MS-Word and attach your results.

In: Statistics and Probability

You are a student nurse working with a school nurse (registered nurse) in a secondary school....

You are a student nurse working with a school nurse (registered nurse) in a secondary school. You and your mentor are supervising a bubble soccer match this afternoon (26th March) which commenced at 1400 hrs. The match goes for 40 minutes with a 5 minute break in between the two halves. It is a hot and sunny day, the air temperature is 32 oC and the humidity is 45%. Bubble soccer After the match, your mentor asks you to perform a range of health assessments to make sure the students are fit to go home. Jessie Lin is 16 years old and in Year 11. Jessie Lin It is now 1450 hours.

You assess Jessie's vital signs and record the following results: Temperature (tympanic) 38.5 oC Pulse rate 140 beats/min Respiratory rate (RR) 29 breaths/min Blood pressure (BP) 130/70 mmHg Jessie has flushed skin (see picture above) and her t-shirt is soaked. Her past medical history has not yet been documented in the school record as she is a new student and only enrolled in the school last week after moving from another state. She informs you that her mother is waiting for her in the car park, but she feels very hot and that her heart feels like it is beating very fast. She asks you for a bottle of cold water and a chair.

Jessie's previous observation records (on a clinical chart) are: Date 23rd March 2020 :BP, Pulse, RR, Temp ,110/60 ,70, 14, 36.8

24th March 2020: 112/60 74 12 36.6

What you need to do in your clinical reasoning report Provide a concise summary of Jessie's situation as an introduction to your report (approximately 50 words) - what pertinent information would someone reading your report need to know about who Jessie is and the context of this scenario? List the objective and subjective data (cues) that you have gathered from reviewing the information provided above (approx. 50 words) Analyse and interpret the identified cues and explain the assessment findings in relation to Jessie's context (approx. 450 words) To do this successfully, you should: categorise the cues and identify what elements are normal or abnormal, and compare the current situation and vital signs with previous health information known about Jessie, and recall and apply knowledge of anatomy and principles of physiology (including concepts of homeostasis and the body's responses to physical activity) to explain her vital signs and other cues. Then propose what further cues you want to collect and explain why these are relevant and important to the situation (approx. 450 words) To do this successfully, you will need to form a logical opinion about what the further cues should be, when you would undertake the assessments to collect these cues (e.g. after some immediate actions for Jessie) and why these cues should be assessed. Relate your justification to Jessie's situation AND to the principles of anatomy and normal physiology (focusing on homeostasis). Suggestions for structuring your clinical reasoning report There is no set template for how you have to structure your report as long as the sequence of the information that you present flows logically and the reader can follow your clinical reasoning as it unfolds. The following suggestions are based on answers to frequently asked questions: Section headings can be a helpful signpost for how you have applied the clinical reasoning process. You may choose to use some of the keywords from the phases of the clinical reasoning cycle (e.g. Patient Situation, Cue Collection and Processing Information, Further Cue Collection) or any other headings are also fine. You may use a table to present the objective and subjective cues that you have gathered and which elements are normal or abnormal if you wish. In this particular assignment, information included in a table will contribute to the overall word count. The majority of your report will need to be sentences organised into paragraphs, not just a list of dot points. When explaining something, such as the assessment findings, you need to make the reasons for how they came to be the way they are clear to the reader. Paragraphs will allow you to make the relationships between things evident, whereas a dot point format can sometimes appear as a list of facts without the necessary connections for explaining something. As you are the student nurse in the scenario, you may write your report using 'first person' tense. This would be useful in the section of your report where you propose what further cues you want to collect and when you would undertake the assessments e.g. "I would ask Jessie...". Writing in first person is not mandatory so if you are more comfortable writing objectively in the 'third person' (removing personal pronouns from your writing), then you can do so as long as it flows logically! You may use accepted clinical abbreviations in your report, but be sure to introduce all abbreviations the first time that you use them e.g. blood pressure (BP), heart rate (HR), respiratory rate (RR) You are required to use relevant scholarly sources of information (textbooks, journal articles, evidence-based practice guidelines or clinical care standards) to support your analysis of your patient’s health information. A health assessment and/or anatomy and physiology textbook will be useful. The UTAS Library Guide for Health and Medicine is a helpful starting point for how to find other scholarly sources of information. There is no set number of references required, but the references which you use should be of an academic source and used appropriately to support your work. Ensure that you express your writing in your own words to demonstrate your understanding of the patient's situation and reference all sources of information, both in-text and a reference list at the end of the report, using the Harvard referencing style. Assessment criteria and marking rubric Your clinical reasoning report will be assessed against the following criteria: Apply a beginner's level of clinical reasoning to assess and interpret health information in relation to the patient's context. Apply knowledge of anatomy and principles of physiology to explain assessment findings in relation to the patient's context. Apply a beginner's level of clinical reasoning to propose and justify further cues that are to be collected in relation to the patient's context. Communicate using academic writing conventions with references to scholarly sources of information that conform to the Harvard referencing style.

In: Nursing

Today is November 1, 2020. You, CPA, have just been hired by Custom Auto Parts (CAP)...

Today is November 1, 2020. You, CPA, have just been hired by Custom Auto Parts (CAP) as an accountant to provide financial expertise during its current expansion. CAP was founded in 1995 by Jerome Blackman (sole shareholder), and CAP has remained a private corporation ever since. From its humble beginnings, CAP has grown substantially. CAP's operations focus on the production of both standard and unique car parts. CAP always strives to use modern technology to produce quality car parts. When CAP commenced, it produced car parts for Canadian automotive companies that were seeking to outsource their production. Soon after, as word spread on the quality of its parts, CAP's products were being sought after by companies outside of Canada. In addition, CAP began selling its to individuals who were looking for unique car parts to restore older cars.

As a car buff, you are very excited about the position as it allows you to apply your accounting knowledge in an industry that interests you. On your first day, you met with CAP's CFO, Robert Ryder. Robert begins by explaining how excited he is that you have joined CAP's team and he looks forward to the expertise that you will bring to CAP's accounting department.

Robert continues by explaining that as CAP has grown, so has its on external financing. Just this year, CAP had purchased additional equipment to handle its recent growth. CAP has had a long-standing relationship with its bank. However, given the recent credit crisis, the bank has changed its policies on all loans. Robert has provided you with a copy of CAP's statement of financial position (see Exhibit I) as at October 31, 2020, which is CAP's fiscal year-end date.

Exhibit I ( CAP's FINANCIAL POSITION)

                                                                      Custom Auto Parts

                                                               Statement of Financial Position

                                                                      as at October 31

Assets

current assets 2020                      2019

Cash $ 35,000 $ 20,000

Accounts receivable 13,000 10,000

Inventory 20,000 12,000

Prepaids 3,000 3,000

  Total current assets 71,000 45,000

Property, plant, and equipment (net) 2,800,000 2,200,000

Total assets 2,871,000 2,245,000

Liabilities

Current liabilities

      Accounts payable 25,000 20,000

      Notes payable 13,000 25,000

  Current portion of long-term debt 150,000 50,000

188,000 95,000

Long-term debt 1,800,000 1,450,000

Total liabilities   1,988,000 1,545,000

Shareholders's equity

        Share capital 100 100

        Preferred shares 100,000 100,000

        Retained earnings 782,900 599,900

Total equity    883,000   700,000

Total liabilities and shareholders equity    $2,871,000 $2,245,000

                                           Debt equity    2.67 2.21

After the meeting, Robert asks you to analyze the new accounting issues surrounding CAP and to provide recommendations on their resolution. He concludes by reminding you that the bank is eager to see the year-end financial statements. As you make your way back to your desk, you begin by reviewing a file outlining important transactions undertaken by CAP. You note the following issues:

1.      On November 1, 2019 (the beginning of the fiscal year), CAP acquired a of its equipment through a lease agreement with Lessor Corp. The lease contract has the following terms and conditions:

¡        CAP agrees to lease equipment from Lessor Corp. with a fair market value of $900,000

¡         The term of the lease is for seven years, with annual rental payments of $145,000 due at the beginning of each year. CAP knows the implicit interest rate on the lease agreement is 5%. CAP knows that it could borrow at an incremental rate of 6%.

¡        There is no residual value.

¡        CAP will cover the executory costs associated with the lease. The executor costs will be approximately $10,000 per annum and are included as part of the $145,000 rental payment.

¡        The lease offers a bargain purchase option to purchase the equipment for $50,000 at the end of the seventh year. At the end of year seven, the fair market value of the asset is expected to be $70,000.

¡        The first payment was made on November 1, 2019, with annual payments thereafter. You remember from auditing a client in the past that equipment such as this usually has an economic life of nine years. CAP has classified this lease as an operating lease. You remember from your discussion with Robert that he was unsure of the benefits of leasing versus buying an asset. This information is for Robert for any future capital budgeting decisions.

2.       After reviewing the statement of financial position, you notice that there are preferred shares valued at $100,000, which equals a total of 1,000 shares outstanding. The preferred shares are redeemable and have a 5% annual dividend. The dividend will double every three years up to a maximum 20% dividend yield. The preferred shares convertible into common shares if CAP does not pay the specified dividend on the preferred shares.

3.      The file also contained a letter from CAP's lawyer (Stonechild, Pilla, and Partners). The letter from the lawyers explained a current lawsuit undertaken against CAP. Apparently, a customer had asked for 50,000 parts to be produced and delivered no later than July 15, 2020. However, due to major downtime in July, CAP could not produce the parts as scheduled. In turn, the customer was late in delivering its vehicles to its distributors and had to pay a penalty equivalent of $600,000. This customer is now suing CAP for retribution for these costs. The letter goes on to state that retribution will be inevitable; however, it is believed that a settlement between $350,000 to $550,000 can be reached.

4.      On November 1, 2019, an additional $500,000 of long-term loan was taken out to help finance the purchase of certain manufacturing equipment for $600,000. (Note: the additional $100,000 was paid for with cash.) Given this new loan and CAP's revised debt load, CAP must now maintain a maximum debt to equity ratio of 3:1 and its financial statements must comply with ASPE. If CAP breaches the covenant, the bank has the ability to call for the loan in full.

The manufacturing equipment that was purchased during the year will be depreciated over 10 years. It is classified as class 39 and has a CCA rate of 25%. CAP is taxed at the highest rate of 45%, and the half-year rule applies. Robert explained that CAP has not taken any consideration for potential tax consequences on the equipment purchase. (Note: for simplicity, assume that all other future tax considerations have been properly addressed.)

After reviewing this information, you realize that you have much to contemplate as to how these issues should dealt with.

Required

Provide a report to Robert outlining your recommendation on the accounting issues and note other important issues.

In: Accounting