develop a high-level plan for implementing a Cybersecurity Management Plan that will allow PBI-FS to begin operations in its new, on-island location.

Project #2: Cybersecurity Implementation Plan

Your Task:

The Acquisition of Island Banking Services has moved from the strategy development phase to the integration phase. In this phase, the M&A team will develop transition and implementation plans. Padgett-Beale’s Chief Information Security Officer (CISO) has recommended that a separate Cybersecurity Management Program be established for the Padgett-Beale Financial Services (PBI-FS) subsidiary to isolate as much risk as possible to the PBI-FS organization. This management program will require the establishment of policies, plans, and procedures which are customized to the financial service industry and the operating structure of PBI-FS.

The CISO has asked you to continue supporting the Merger & Acquisition team’s efforts. Your specific tasking is to assist in developing an implementation plan for the previously developed Cybersecurity strategy (Project #1). Since there have been additional developments in the M&A strategy overall, you should pay close attention to the Background Information provided later in this document.

Using your prior work (Project 1), develop a high-level plan for implementing a Cybersecurity Management Plan that will allow PBI-FS to begin operations in its new, on-island location. (The plan for the U.S. headquarters is being developed separately from your efforts.) This plan must take into account compliance requirements for U.S. banking laws, regulations, and standards. It must also include recommendations for required security controls, replacement of outdated hardware and software, and other measures necessary to reduce risk to an acceptable level. You must specifically address measures to reduce risks associated with both insider threats and external threats and threat actors.

Note: you MUST use the implementation plan outline provided later in this document.

You may need to perform additional analysis to address issues specific to the findings from the M&A team regarding the as-is state of the purchased assets which comprise the existing IT infrastructure.

Your high-level plan should include the system development life cycle (SDLC) gates/decision points and relevant tasks required to implement changes in the company’s hardware, software, and infrastructure. See https://www.sebokwiki.org/wiki/System_Life_Cycle_Process_Models:_Vee for more information about the gates & decision points.

You must also address any systems or software interoperability issues which may arise (especially those associated with the company’s existing custom software applications). You do not need to prepare a comprehensive Interoperability Assessment but, you should identify key issues and concerns. See the following resources for definitions and guidance:

 

You must clearly show that you have applied the following frameworks and concepts in your analysis and planning:

 

Note: Make sure that you include (in detail) the steps you would take to secure the new infrastructure.

Background:

As part of the purchase agreement for Island Banking Services, Padgett-Beale made a commitment to the bankruptcy court to operate the call center and transaction processing center on the island for the next five years. The Padgett-Beale, Inc. Merger and Acquisition Strategy for Island Banking Services has been updated and now includes the following stipulations which are derived from requirements to comply with U.S. laws and regulations while also implementing the contractual agreement to continue some operations on the island.

  1. Island Banking Services will become Padgett-Beale, Inc – Financial Services (PBI-FS).
  2. PBI-FS will operate as a wholly owned subsidiary with its own management structure.
  3. PBI-FS’s will be incorporated as a U.S. corporation and will comply with all applicable laws and regulations.
  4. PBI-FS’s headquarters unit and executive staff (including the CEO, COO, and CFO) will have separate offices from PBI but will be located within a 5 mile radius of the PBI Headquarters.
  5. PBI-FS’s call center and transactions processing center will remain on the island but will move to a vacant office building adjacent to the existing Padgett-Beale resort property.
  6. The deputy CISO from Padgett-Beale will serve as the interim CISO for PBI-FS.
  7. The CISO from Padgett-Beale will serve as a consultant to PBI-FS for all matters relating to the establishment of the subsidiary’s Cybersecurity Management Program.

As part of its due diligence efforts, the Padgett-Beale M&A team reviewed the existing cybersecurity posture for Island Banking Services. This review determined that, while there were some IT security protections in place, Island Banking Services never had a formal IT security program. Instead, the company outsourced management of its hardware, software, and networks to an islander owned and operated IT services company. This company installed and managed the networking equipment, firewalls, and workstations. Some workstations were used by tellers to conduct financial transactions using a web-based interface to a back-end database. The M&A team is suspicious of the existing software and databases due to the level of criminal activity that was uncovered during the police investigation into money laundering.

The M&A team also reviewed the inventory of digital assets (HW/SW/Licenses) included in the purchase of Island Banking Services. The team also reviewed existing contracts for services related to those assets. It has determined:

  1. Telecommunications. Undersea fiber optic cables connect the island to the global Internet. These cables are managed by a consortium of companies that contract with national and regional governments to provide telecommunications services (voice, video, and data) to a country or region. On-island access to Internet, cable television, and land-line telephone service are provided to residents and businesses on a contract basis by a government owned Communications Services company. The island’s local communications infrastructure was upgraded to buried fiber optic cables providing broad-band service after a hurricane destroyed the previous above ground copper cable infrastructure. Island Banking Services’ contract for communications services includes Voice over IP telephone service, one physical telecommunications connection via fiber optic cable, and one static IP address associated with that connection. Domain name services for the company’s Internet presence are provided by the island’s Communications Services company. The company uses network address translation services provided by the premises router to assign internal IP addresses to workstations and servers.
  2. Network Equipment. The network equipment is more than five years old and should be replaced. Since the company is moving PBI-FS’s operations to a new physical location, the entire network infrastructure from cables to routers to firewalls to wireless access points will be replaced. The network equipment closet also contains a special purpose access control system that uses hard wired RFID badge readers and RFID badges to control employee access to exterior and interior doors. This equipment is out of date and will need to be replaced once the company moves.
  3. Workstations. The computer workstations are more than five years old and currently run Windows 8.1. The workstations were custom built using refurbished components. All copies of Windows have an OEM license installed.
    1. Licenses for Office 2019 were included in the purchased assets.
    2. Three business licenses for an anti-virus program were included in the purchased assets. These licenses were installed on computers that were seized and taken into evidence as part of the ongoing law enforcement investigation. It is unclear whether these licenses will be usable in the future.
    3. More than 10 computer workstations were found to be using “free” versions of an anti-virus application. These licenses state “for non-commercial or personal, home use only.”
  4. Banking Applications Database & Servers (Hardware & Software). The current banking applications software uses a custom browser-based interface built on an Apache Web server connected to a MySQL database. The Apache Web server also hosted the company’s internal web site. The server software licenses, the code for the custom browser-based interface, and the web server and database server hardware were included in the purchased digital assets. The storage media (hard disk drives) containing the Linux operating system, applications software, and database files were seized as part of the investigation and have not yet been returned to the company.
  5. Electronic Mail and Public Web Server. At the time of purchase, Island Banking Services was in the middle of converting from an internally hosted email server based on Linux/Exim to individual Gmail accounts (not owned or managed by the company). The company had recently moved its public website from the internal Apache server to the Wix hosting service. This public website provides customers with access to the company’s custom built, web-based mobile banking services application.
  6. Data Backups and Data Recovery Services. The system administrator for Island Banking Services used a commercial image backup utility to manually backup the company’s servers on a weekly basis. The image backups were written to multiple Solid State Disks (SSDs) that were connected to a Linux server connected to the company’s internal network. The financial transactions software (custom written) used electronic journaling to create copies of each transaction record in a MySQL instance hosted in a private cloud (Platform as a Service). The entire transactions database was copied to this private cloud once every 12 hours. Transaction records were copied to the cloud database every 30 minutes.

Figure 1. Island Banking Services IT Infrastructure (as-is).

Putting It All Together

Your plan will be a combination of a paper and a detailed list of steps and resources that you would follow to implement and complete this project. Think about all of the actions, resources, and tasks that you would need to ensure a successful implementation of the “to-be” state for the PBI-FS cybersecurity program and infrastructure. These should also be included as part of the plan. The minimum structure for this assignment is below:

  • INTRODUCTION
    • Purpose of Plan (implementation of the security strategy)
  • GOALS AND OBJECTIVES
    • Business Goals and Objectives
    • Project Goals and Objectives
  • SCOPE
    • Scope Definition
    • Items Beyond Scope
  • ASSUMPTIONS
    • Project Assumptions
  • CONSTRAINTS
    • Project Constraints
    • Barriers to Success
  • PROJECT MANAGEMENT PLAN (for implementation of the security strategy)
    • People
    • Processes
    • Technologies
  • STRATEGY IMPLEMENTATION
    • Security Controls
      • Baseline (mandatory controls)
      • Compensatory Controls (Administrative, Operational, Tactical)
    • System Development Life Cycle/Schedule
      • The 7 phases are: planning, requirements, design, development, testing, deployment, and maintenance
    • Milestones
    • Resource Requirements (People, Finances)
  • ENTERPRISE IT ARCHITECTURE (“To-Be” – must include overview diagram)
    • Hardware
    • Software
    • Network Infrastructure
    • Cybersecurity Defenses

Additional Information

  1. Consult the grading rubric for specific content and formatting requirements for this assignment.
  2. Your 10-12 page Implementation Plan should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. The listed page length is a recommended target. You should not, however, exceed double that page count (i.e. no more than 25 pages including diagrams, tables, and lists).
  3. Your deliverable should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts Review for recommended resources.
  4. Your Enterprise IT Architecture Overview diagram may be constructed using commercial clip art but you may not copy / glue together architecture diagrams from other sources. MS Word and Power Point both provide drawing tools and clip art which you can use to construct your diagram. See Figure 1 in this file for an example of the type of diagram / level of detail required.
  5. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Paper_Template(TOC+TOF,2021).docx.
  6. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count.
  7. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.
  8. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). Note: you may use footnotes to credit sources when doing so will improve the readability of the deliverable.

 

 

What are the effects of European colonialism?
  1. What are the effects of European colonialism in [choose case/example]?

 

 

Assignment One must show evidence that you have thought about, and understood, the content of the relevant lectures and tutorials (i.e. see in particular weeks 1 and 2).

 

 

Assessment One Checklist

 

Your assessment should include:

 

A title (or front) page, which lists:

  • the course unit code: POLI20902,
  • the title of your chosen Research Question
  • your student number (to ensure anonymous marking)
  • your tutorial leader’s name,
  • The word count (the number of words in the text).

 

 

The main body should include:

  • A justification for your choice of research question (approx. 150-200 words)
  • This must be from the list of 47 available questions at the end of this course guide and on blackboard
  • When writing your justification, think about the following:
  • What are you interested in researching and why?
  • Is it an empirical or theoretical puzzle?
  • Why is this an important question to research?
  • How viable is it for a politics research project?

 

A short Annotated Bibliography related to your selected research question (1250-1000 words)

You must include at least 6 sources, all of which must be scholarly sources, This means articles published in scholarly peer-reviewed journals and books published by academic/university presses). Text books do not count. All sources must be in the English language (1250 – 1500 words).

 

When reading this literature and writing your bibliography, think about the following:

  • What is the existing literature on your topic?
  • What has been said before?
  • Who are the key scholars?
  • What is the “state of the art” today?
  • What are key themes or approaches?
  • What is the key debate/divide?
  • What non-academic/scholarly literature is available?
  • How does each source help you answer your question and how will it guide your research design?

 

Things to consider for each entry (i.e. each piece of literature):

  • What is the main argument/what is the main finding of the article/book/source?
  • What cases does this source utilize?
  • What methodology does it employ?
  • How does this source contribute to the debate?
  • How does this source help you refine your question? Or help you develop your own research project?
  • How is this source different from other sources you have used?

*you do not have to write the answer to each of these bullet points for each entry. Consider what the book/article/source’s most important contribution is to your RQ and about how the pieces link together. E.g. does it employ a different methodology to the others? Does it offer an answer to a different piece of the puzzle?

 

Concluding statement (100-150 words):

  • How will you continue to search for more literature – what other types of sources may you also require?
  • Revisit to your research question and ask yourself, based on what the literature discusses, do you need to further specify your question?
    • Do you need to specify a particular period of time?
    • Do you need to specify a case study?
    • Do you need to specify that you will use a comparative method?

 

identify an ethical dilemma and write a position paper on an ethical topic a nurse may face in practice, education, leadership, health informatics technology, and/or with various nurse’s positions.

Description

For this assignment, students will identify an ethical dilemma and write a position paper on an ethical topic a nurse may face in practice, education, leadership, health informatics technology, and/or with various nurse’s positions. Identify a selected ethical dilemma that requires a masters prepared nurse to take a nursing position on. 2. Describe the ethical dilemma and the impact on patients (clients), nursing practice, and the research process. 3. Compose a research question related to the ethical dilemma. 4. Formulate a position on this ethical dilemma 5. Discuss one (1) advantage information technology may have on this ethical dilemma. 6. The scholarly paper should be in narrative format, four (4) to five (5) pages excluding the title and reference page. 7. Include an introductory paragraph, purpose statement, and a conclusion. 8. Include level 1 and 2 headings to organize the paper. 9. Write the paper in third person, not first person (meaning do not use ‘we’ or ‘I’) and in a scholarly manner. To clarify: I, we, you, me, our may not be used. In addition, describing yourself as the researcher or the author should not be used. 10. Include a minimum of four (4) professional peer-reviewed scholarly journal references to support the paper (review in Ulrich Periodical Directory) and be less than five (5) years old. 11. APA format is required (attention to spelling/grammar, a title page, a reference page, and in-text citations).

Compare and discuss Mills’s definition of the power elite to Bourdieu’s understanding of privilege.

Topic:

Question ) Compare and discuss Mills’s definition of the power elite to Bourdieu’s understanding of privilege.

Description

Hi, The question for my essay is

Compare and discuss Mills’s definition of the power elite to Bourdieu’s understanding of privilege. The essay must draw on appropriate academic literature and must be illustrated with relevant examples that go beyond lecture content. Also the reference format (in-text citation and Reference List) is Harvard. Please when you refer to their writings, provide both the original year of publication and the year of the edition you relied on. for example: Mills’s Power Elite was published in 1956. You might have looked at a 2008 edition. –> Mills (2008[1956]) and include

Discuss the main types of auditing according to its objectives with giving examples for each type. Your answer for each type should include its purpose, to whom it is provided and who is eligible to conduct it.

COVID-19 FoMLSS/ Accounting and Finance Auditing,

AFE5009-B (Individual Coursework)

INSTRUCTIONS TO CANDIDATES

This is an individual assignment with a limit of 3,000 words. This Individual Coursework constitutes 100% weighting of the grade for this module.  Format:  A typed electronic submission on the Canvas.  General alignment: justified. This individual assignment consists of 3 Questions. Answer ALL the Questions 2 | P a g e COVID-19 Answer the following questions

Question 1 A. Discuss the main types of auditing according to its objectives with giving examples for each type. Your answer for each type should include its purpose, to whom it is provided and who is eligible to conduct it. (10 marks) B. Discuss the FOUR regulatory layers of the audit profession in the UK. Your answer should include the role of each regulator with giving examples. (10 marks) C. Discuss three types of opinion that auditors can express in their audit reports with giving an example of when each type should be used. (10 marks) Total 30 marks Question 2 A. Discuss Five ethical principles that auditors should comply with according to the UK ethical standards. (10 marks) B. You have been given the information below for one of your audit clients: “In the next year, the company intends to undertake a stock exchange listing. The company has spent $2m on the development of new product lines which is included within intangible assets. Additionally, it purchased and installed a new manufacturing line. All costs, incurred in the purchase and installation of that asset, have been included within property, plant and equipment. In order to finance the new manufacturing line, the company issued $3m of irredeemable preference shares. The company offered extended credit terms to its customers. In addition, it provided a ‘price promise’: that it would match the prices of any competitor for similar products purchased within one month of the date of purchase. During the year, a product recall has been initiated for one product as a result of faults in the production process. Required Using the information provided, describe Five situations where audit risks are existed and explain the auditor’s response to each risk in planning the audit process. Note: Prepare your answer using three columns headed The Issue, Audit risk and Auditor’s response respectively. (25 marks) Total 35 marks 3 | P a g e COVID-19 Question 3 A. Auditors need to assess the effectiveness of the internal control system of their clients as part of the audit procedures that need to be conducted before setting the audit plan. Discuss FIVE main characteristics of the good internal control system and how they can be used in the auditors’ assessment with giving examples. (10 marks) B. Apple & Co has been an audit client of your audit firm ANWAR & Co for the last Eight years. The audit staff of ANWAR & Co and the client staff of Apple & Co have always celebrated a meal together at the beginning of the final audit process. The finance director of Apple & Co has suggested this year that both staff can go away for the weekend – instead of the meal – to a luxury hotel at Apple & Co expense. The finance director has also suggested that the current year audit fees is negotiated to be a percentage of Apple & Co net profit for the year. This year, for the first time, Apple & Co has approached your audit firm to help in promoting the process of issuing shares – of Apple & Co – in the stock market. Discussions now are at the early stage and no actions has been taken yet. The total fees of the audit and other work would fall within acceptable levels in line with applicable code of ethics. The financial manager of Apple & Co requires this year that their audit to be completed within 15 days; however, this is a very busy time for your audit firm and so it is intended to use more junior staff as they are available. Additionally, in order to save time and cost, ANWAR & Co have not contacted Apple & Co’s previous auditors. Required: Identify and explain FIVE situations where ethical threats which arise from the above action are existed; and for each ethical threat explain the steps which ANWAR & Co should adopt to reduce the threats arising. Note: Prepare your answer using three columns headed The Issue, Ethical threats and Auditor’s response respectively. (25 marks) Total 35 marks

What are the academic arguments used to defend Canada’s first-past-the-post voting system? Do you find them compelling, or not, and why?

Election Campaigns in Canada

In this research essay students are expected to critically engage different views on an important issue concerning Canadian elections, and develop their own argument through an informed and balanced analysis of the existing debate on the subject. Students much choose their topic from the list of choices included below. All essays must begin with a clear thesis statement and contain proper citations of the sources used. Students should rely extensively on scholarly sources like journal articles and academic books, and use more popular sources like newspapers and blog posts very sparingly. This assignment should be written as an ‘argumentative’ essay. In other words, it must develop and defend a particular position on an issue or topic. Students should write with a sense of purpose – in this case to convince the reader to accept the validity of the argument being made. To that end, essays must engage and fairly assess alternative views on the research question and all opinions must be informed by facts and arguments. Students must prepare a one-page proposal for their term paper outlining how they plan to take up their chosen topic and include a bibliography of at least 5 academic sources demonstrating that they have done some preliminary research. Note: the final paper itself should contain many more sources than just five. The proposal will be due March 18th and requires approval from the instructor to proceed. In addition to the completed essay, students must also submit outline drafts and the notes they have taken from the sources they have used to prepare their essay (note – outline drafts and research notes do not count toward the essay page/word count). Essays will be graded in terms of three specific criteria: -argument, organization and logic Is the thesis clear and presented in a logical and convincing manner? -research and use of evidence Does the essay demonstrate both extensive and effective use of available research sources? Does it contain proper footnoting and a bibliography? -communication Is the paper organized and written as clearly and concisely as possible? For help with your research essay, consult with your professor or a librarian. For help with your writing skills, check out the York’s Learning Skills Services or The Writing Centre.

Potential Research Essay Topics

1. What are the academic arguments used to defend Canada’s first-past-the-post voting system? Do you find them compelling, or not, and why? 2. Why has voter turnout been declining in Canadian elections since the 1970s? What might/can be done about it, if anything? 3. What are the concerns about how media cover elections? Is there anything that is or can be done about? 4. Are Canadian elections very democratic? Why or why not? 5. How is social media reshaping the way Canadian elections are conducted? Are the concerns about it impact justified or overblown? 6. How should money come into elections? Unregulated private donations, regulated private donations, public subsidies and tax credits, a combination of some of these or something else entirely? 7. What steps might be taken to get a greater diversity of people to run in Canadian elections? Here diversity could be understood in terms of both identity and/or class position. 8. Independent candidates – those not running with a major party – seldom get elected in Canada. Why not? What contributes to the rare victory for an independent? 9. Should Canada’s Senate be elected? How would such a thing be organized? How might electing Canada’s Senate alter the way Canada is governed? 10. Should ‘third parties’ (i.e. organized groups that are not political parties) be limited in participating in Canadian elections? What are the concerns about their involvement? 10 Steps to a Research Essay 1. Pick a topic -general topic, can be narrowed later -try to think in terms of a question you want to answer 2. Research your topic -is any or sufficient information available? -is too much information available? -time to narrow or broaden topic 3. Read some key sources -try to get a sense of what debate exists on the topic -read the more recent work first, try to find a review essay -re-evaluate your decision – is topic ‘do-able’? If not return to step one. If it is, go to step 4 4. Firm up the research question -convert your exploratory question into a tentative thesis -sketch out a preliminary outline of how you think you’ll pursue this question 5. Enter the research phase -gather all the relevant materials – books, journal articles, etc. -take notes on each source – copy down proper publishing information/page numbers 6. Revise the thesis and outline -after reading and taking notes on sources, revise thesis and outline accordingly, adding more detail, and changing elements in light of your new knowledge -outline should now clearly indicate how you plan to develop your argument – i.e. the specific question you will be addressing, the various opinions on it, and what will you be arguing -essays don’t organize themselves – you have to think about how you will make your argument and make decisions about what issues to take up first, second, and so on. In other words, you have think about which ideas logically follow others to make your point 7. Write the rough draft -leave plenty of time for writing – don’t use up all your time in the research phase -write draft -don’t worry at this stage about getting things absolutely perfect; you can edit later -when completed, leave some time before moving on to final draft; a day or even just a few hours – you can better judge the paper’s real strengths and weaknesses after a break -get a second opinion – have a friend look over the paper and make comments 8. Getting to the final draft -reassess the paper – is the organization most effective? Should some sections be rearranged or eliminated so the paper is stronger or flows better? -fine-tune thesis if necessary -rewrite paper – smooth out writing, fix awkward sentences and transitions between ideas 9. Proofread your work -re-read final draft – check for spelling, grammar, page numbers, proper citations -have someone else read the paper to catch things you’ve missed -make changes and finalize copy to submit 10. Getting the paper in -make sure that all relevant information is on the title page including your name, your professor’s name, the course name and number, the paper’s title, and the date -hand in the paper on time, at the right place, and to the right person.

Discuss in detail the strengths and limitations of your analysis in the context of the problem faced by Catanza Technologies.

Assessment Task: Apply decision analysis techniques

Format: Report

Word length: 3000-3500

 

Task description: – Complete your assessment based on the Catanza Technologies Case Study provided below.

 

Question 1

You have been engaged as a consultant to Catanza executive to consider

the information presented. You are asked to apply decision analysis techniques to the

decision problem facing Catanza Technologies and advise the company on

their outcome options and recommended course/s of action. Clearly state any assumptions

you have made.

 

**Your discussion should include:

  • A brief overview of the key facts and your approach to the problem.
  • A clear statement of assumptions about the information provided and your analysis.
  • A decision tree of potential decision paths and events including Probabilities, Net Present Value calculations and Expected Values.
  • The application of at least one other decision-making technique,

for example, SMART Analysis.

  • Recommended course of action.

 

Question 2

Discuss in detail the strengths and limitations of your analysis in the context of the problem faced by Catanza Technologies. Your discussion of limitations should include consideration of potential biases, heuristics or other considerations that may have been used or applied by Catanza and its staff.

**This question constitutes: –

  • Strengths of analysis
  • Limitations of analysis
  • Additional information (which would have helped)
  • Make specific recommendations for other information or investigations that would be needed to improve your analysis.

 

 

 

 

 

***Assessment Submission Requirements: –

Produce a report addressing the 2 questions – text, illustrations, diagrams and calculations –

supported by reference to the sources of information and theoretical frameworks of

understanding. The main steps: –

  1. Prepare a Decision Tree
  2. Populate the Decision tree with the probabilities
  3. Set up an Excel spreadsheet for the cash flows for the options.

 

There are 8 options, 4 for Electric wire (EW) model and 4 for the GPS model

 

4 options EW model

Production ready by Jul 2020 – Good Market

Production ready by Jul 2020 – Poor Market

Production ready by Jan 2021 – Good Market

Production ready by Jan 2021 – Poor Market

 

4 options GPS MODEL

Production ready by Jan 2021 – Good Market

Production ready by Jan 2021 – Poor Market

Production ready by Jan 2022 – Good Market

Production ready by Jan 2022- Poor Market

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The Assessment structure must be as follows: –

Title Page

Executive Summary

Table of Contents

Introduction

Background

Environment Overview

Products and Markets

Past Performance

Comments on current strategies

Methodology

  1. Decision Trees
  2. Net Present Value
  3. Rollback method
  4. The application of at decision-

making technique: – SMART Analysis

  1. Scenario Planning
  2. List your Assumptions

Findings and Analysis of Results

Alternatives available and respective payoffs

Recommended option/s

Strengths of analysis

Limitations of analysis

Conclusion

Recommendations

References

 

Appendices

1.Decision Tree

2.NPV Calculations

3.SMART Analysis

  1. etc

 

 

 

 

 

 

 

 

 

 

 

 

 

Catanza Technologies Case Study

(Written as at January 2019)

Read the case study which follows and answer the 2 questions at the conclusion.

Catanza Technologies was founded in Brisbane in 2002 at Eagle Farm as a specialist in

industrial sensor technology. In 2008, they expanded into industrial robots, however this

sector fell into decline leading-up to the departure of automotive manufacturers from

Australia by 2017. In 2014 they launched a commercial grade robotic floor cleaner which has

had a steady growth in revenues and market share.

 

The company’s turnover by product type is shown below:

Product 2014

 

2015

 

2016

 

2017

 

2018
Industrial

Sensors

16.2 12.8 19.4

 

16.9

 

17.2

 

Industrial

Robots

8.2 6.4

 

4.9

 

4.7

 

5.1

 

Robotic Floor

Cleaner

0.4 0.8

 

1.3

 

1.9

 

2.6

 

 

The company is now (January 2019) considering the development of commercial robotic lawn management tools and equipment and, as a first step, a detailed plan has been put forward to produce a commercial grade robotic lawnmower (code named the RLM19). Market research was conducted in 2015-2016 and this revealed that commercial customers make their decisions in this market on the basis of mowing area per day based on running time per charge and battery charging time, maximum height of cut, precision of navigation, ease of programming, adaptability to uneven surfaces, hill-climbing ability, obstacle sensing and avoidance, price, safety and anti-theft.

Taking this market research information into account, the company is now seeking to develop a production prototype based on one of two different approaches. Electric wire (EW) perimeter or GPS and sensing navigation (GPS). For the EW model, a wire is placed around the perimeter of the area to be mown and then connected to an electrical source. This mower is programmed not to cross the wire. Because of the need to lay wire and the battery life the EW model will have a mowing area of about 3000 square metres per day. The GPS model would use sensors to detect garden edges and also GPS and mapping data to navigate without use of the wire. This enables them to be more versatile and suited to larger areas of up to 12000 square metres per day.

 

The market research and development of the designs so far have already cost $1.65 million.

If a decision to continue is made, it is hoped that a successful prototype can be developed by December 2019.

 

 

 

For the EW prototype, the company’s chief engineer, Scott Shorten, has estimated that there is a 75% chance that the December target could be achieved for the EW model with a further investment of $1.75m. If the target is not achieved, the company will review the situation in January 2020.

 

It could decide to abandon the entire project or to allow further work on the

prototype. Shorten estimates that modification of an unsuccessful prototype would cost

around $0.8 million and the modifications would take an additional six months to implement. He is, however, sure that all problems would be overcome by end June 2020.

 

For the GPS prototype, Shorten estimates that there is a 60% chance that the December

target could be achieved for the GPS model with a further investment of $3.3m. If the target

is not achieved, the company will review the situation in January 2020. It could decide to

abandon the entire project or to allow further work on the prototype. Shorten estimates that modification of an unsuccessful prototype would cost around $1.9 million and the

modifications would take an additional year to implement. He is, however, sure that all

problems would be overcome by end December 2020.

 

Following the development of a successful prototype, manufacturing would be conducted in

partner facilities in China. The manufacturing facilities require a six-month lead-time for

retooling and component sourcing for the EW and twelve months for the GPS solution.

 

If a successful EW prototype was developed by Dec 2019, production could commence in

July 2020. However, if the prototype development for the EW solution took until June 2020,

then production could commence in Jan 2021. Shorten estimates the retooling and

production line set-up costs for the EW solution to be $1.25m. EW units are expected to sell

for between $3500 and $4500.

 

If a successful GPS prototype was developed by Dec 2019, production could commence in

Jan 2021. However, if the prototype development for the GPS solution took until December

2020, then production would not commence until Jan 2022. Shorten estimates the retooling

and production line set-up costs for the GPS solution to be $2.7m. GPS units are expected to

sell for between $14000 and $16000.

 

Sales of the RLM19 would be supported by a major advertising and marketing campaign at

trade shows, direct to grounds maintenance contractors, councils and other owners of golf

courses, airfields and playing fields. This would be conducted especially in the first few

months after its launch, demonstrating the major cost saving benefits. In order to estimate

the sales that would result, extensive use has been made of market research, economic and

industry-wide data. A key threat is the development of competitive products by leading

mower manufacturers and new entrants with robotics and electric motor technologies.

 

To simplify the problem, the management team has decided to estimate sales under two

different market conditions: Good, and Poor. These conditions can be assumed to prevail

through the entire life of the product. The probabilities of these conditions prevailing are

thought to depend to some extent on how quickly the product can be launched since an early launch will give Catanza an edge over potential competitors.

 

 

 

 

 

The Marketing Department has estimated the following probabilities:

 

Market Conditions Prevailing Good Poor
Month Production Commences

 

   
July 2020

 

0.8 0.2
January 2021

 

0.65 0.35
January 2022

 

0.5

 

0.5
     

 

It has been decided to use a 6-year planning horizon (i.e. up to December 2025) since

technological developments would probably mean that a new model would be required for

the market for later years. The tables below show the estimated net cash flows which will

occur during the years of the product’s life.

 

  EW – Good EW – Poor

 

GPS – Good

 

GPS – Poor

 

1st Year

 

$6m $2m $10m $4m
2nd Year

 

$9m

 

$4m

 

$16m

 

$7m

 

3rd Year

 

$12m $6m

 

$18m

 

$9m

 

4th Year

 

$16m $7m

 

$22m $11m
5th Year **

 

$18m $9m

 

$26m

 

$13m

 

 

** If required

In the event of the either prototype development being cancelled it can be expected that the intellectual property associated with the research output will have no residual value.

The company’s cost of capital is estimated to be 8%. For simplicity, it can be assumed that all cash flows occur at the end of the year. Also, the effect of factors like taxation and

development grants should be ignored.

 

create and implement a plan in dealing with various daytime robberies in City X.

 Criminal Justice Assignment 7

Criminal Justice

As a consultant of City X, my responsibility will be to create and implement a plan in dealing with various daytime robberies in City X. The Law enforcement agents in City X are getting limited information when every robbery happens. In my first week within the department, I plan to develop a strategic draft, operative, and investigative plan in addressing the thefts. In creating a strategic operational and investigative plan, our strategy will be to follow ten steps to assist in developing a plan of fighting the current crime.

 

First Step

Our first step is to arrive at the scene, which will entail dispatching law enforcement agents to the crime scene to collect data and information associated with the crime. The national institute of Justice notes that taking notes and logging dispatch information, including location, address, parties, time, and type of call and date, will help the agents (Devery, 2010). Once the agents approach the scene, they are supposed to check their surroundings, including vehicles that leave the area and the individuals in the region. Police officers need to approach the crime scene with caution. While training our officers to approach the crime scene, it is advisable to look, listen and smell around the area. The observations are vital in helping investigators in developing the scene of the crime and probably provide an opportunity to be ahead of the criminals. It is critical to secure the location of the crime.

 

Step Two

The National Institute of Justice (2017) states that the identification of persons at the scene of the crime, such as suspects, bystanders, and witnesses, is crucial. I can recall from my training that it was essential to separation of all people in order to prevent them from coming up with a story. These people may likely slip when they tell their story, and maybe the story may not be consistent. Also, family and victims are supposed to be treated with dignity and respect during the questioning process. Therefore, as the first responder, it is vital to ensure you control and inform dispatch if medical assistance is needed. It will also incorporate gathering all information and record by the officers purposely for future reference.

 

Step Three

After gathering all witnesses and potential suspects, we will begin documentation and evaluation of the scene. The officer at the crime scene is obligated to record all evidence discovered, put in place observations, and preserve evidence. According to the National Institute of Justice, concerning the observations of the crime scene that include the location of individuals and items in the crime scene, appearance and the condition of the scene upon arrival must be maintained (National Institute of Justice, 2017). Ensuring that the evidence is sealed appropriately is essential to avoid contaminating it. Also, when handing off the evidence, it is vital to fill out the proper paperwork that illustrates the evidence was given off appropriately.

 

Step four:

This step entails processing the crime scene, but processing the robberies is quite tricky. This case study shows that the robberies involved happened at homes, thus the potential entry points are the doors and windows. The investigator will have to take the lead at the crime scene, informing individuals where to go and where to help other people who may require assistance. The forensic team with the assistance and collection of evidence, police officers for interviewing and securing the place, and medical emergency responders and deceased people (National Institute of Justice, 2017). Therefore, having the right measurements of the exact places and two fixed points in the outlined region. Sketching of the area is important and even as the first responder it is vital to gather sketches in place. When processing the crime scene, the investigators and forensic scientist will be required to follow technological assistance such as photographic equipment that include video cameras, cameras, black lights, lens, and scanning tools. Trace evidence kit, fingerprint kit, blood collection kit, and impression kit are the other tools required in proving the robber at the crime scene.

 

Step five:

It will include an analysis of the scene of the crime and evaluation. The investigators will deploy technological tools such as Automated Fingerprint Identification Systems (AFIS) to investigate if the fingerprints collected at the location of the crime match the system. Analyzing video surveillance near the crime, such as traffic cameras, will provide information on whether footage of the robbers around the crime scene exists. Also, cameras near the adjacent stores and buildings near the scene of the crime will be analyzed to determine if the robberies happened at the time and place of occurrence of the robberies (National Institute of Justice, 2017). Enhanced 911 will dispatch law enforcement units for patrolling the potential buildings that may be targeted next. Also, computers will use in mapping and assessing crime patterns and commonalities within the robberies attacks. While patrolling such areas, they will be using radios to communicate. The police officers will use in-car systems if possible suspects have been stopped, and they are supposed to carry out a background check on them. To try to identify the suspects, DNA may be analyzed from the blood or any trace evidence left behind (Devery, 2010). This technical assistance may be substantial in conducting the operation.

 

Step Six

Synthetization of data permits investigators in compiling the earlier reported robbery incidences. Therefore, it is vital to work with the other jurisdiction to give room for the data to be shared concerning robberies and their operation areas. The modus operandi of the suspect has the potential of helping police officers in identifying and apprehending them. Merriam Webster (n.d) argues that synthesizing is making something by putting together various things to create something new. Synthesizing according to the criminal justice system is connecting, combining, and putting together data according to the significance order so that it can be used during the investigative process. It also assists in decision-making and analyzing information relevant to the investigation.

 

Step Seven

Profiling. After collecting and synchronizing data, the department will carry out profiling of the robberies to assist them in apprehending and catching the suspects. The department will use assistance from the units of profiling to develop a profile that will assist us in solving these criminalities (Devery, 2010). When the police officers are provided with descriptive information regarding the type and kind of a person who possibly committed the crime, including psychological and demographic features, they will likely find the offenders (Devery, 2010). Notably, profiling narrows down the offenders and assists investigators in concentrating on their limited resources and time in searching for the suspects.   The profilers will determine the strategies used in breaking an entry, things that are stolen when the thefts happen, and asses trace evidence to determine if any trace matches other scenes of the crime. Mapping the targeted scene of the crime to determine if any kind of a thing sticks out, such as location, and at the end, carrying out a background search for the possible offenders who live around the area who were released lately or arrested due to robberies claims is vital.

 

Step Eight.

I will make sure a task force is assembled to assist with the investigations. It will encompass patrol units, psychologists, patrol car units, surveillance units, criminal profilers, and investigators. Moreover, I will be my handler in this task force since I have been a K9 handler for many years. The ability to sniff out people may be beneficial, and it is an essential asset to any task force put in place.

 

Step Nine

To maintain the workforce, I will make sure these taskforces are fully funded to offer the needed personnel. Also, I will make specific communication equipment, including purchasing radios to facilitate communication of the units with each other. Also, I will make sure that officers are equipped with appropriate equipment such as stun guns, handguns, bulletproofs, and pepper spray for safety reasons (National Institute of Justice, 2009). Since the robbers are armed and dangerous, I will make sure that patrol cars have the needed tools, including cameras, working lights, computers, sirens, and voice command systems, are equipped.

 

Step Ten

The task force will have the profile of the possible suspects and the location of the targets where robberies may occur. There will be patrolling of the streets during the day because thefts seem to happen during the day. Subsequently, thefts do not happen at a specific store, we determined that the target location is founded on limited visibility and the public. Therefore, the areas with limited traffic movements and the public will have surveillance. Also, the investigators will continue examining the evidence from the crime scene to keep searching for a possible lead.

 

 

 

 

 

References

Devery, C. (2010). Criminal profiling and criminal investigation. Journal of Contemporary Criminal Justice, 26(4), 393-409.

Merriam Webster. (n.d.). Synthesize. Retrieved from ttp://www.merriam-
webster.com/dictionary/synthesize

National Institute of Justice. (2017, July 12). Crime scene investigation: Guides for law enforcement. National Institute of Justice. Retrieved March 31, 2022, from https://nij.ojp.gov/topics/articles/crime-scene-investigation-guides-law-enforcement

National Institute of Justice. (2009, May 31). Equipment needed for crime scene investigation. National Institute of Justice. Retrieved March 31, 2022, from https://nij.ojp.gov/topics/articles/equipment-needed-crime-scene-investigation

 

 

What kind of changes could you make in your life that would be good for the environment that would have little or no impact on your happiness?

Topic:

What kind of changes could you make in your life that would be good for the environment that would have little or no impact on your happiness? Discuss what social psychological phenomenon could be used to effect wide-scale changes in other people’s behavior in these areas.

Description

Opinions can be stated in a Forum, opinions should be backed up by facts (with proper citations and related references). It has to be in APA citing and APA reference. I only need 350 words for the discussion. I need at least two sources please. Thank You for your help.

compare the responses of the individuals to the first video by genders, should they use a pooled or independent T-test?

Assignment 08

 

To complete the following questions, you need the dataset VideoQuestions.csv, which you can find on Lab 10 on Moodle. This dataset contains the number of correct answers of 241 to two questionnaires which the participants completed after watching 2 educational videos. It also contains their gender and age.

 

 

  1. Deciding on a T-Test: The researcher wants to compare the responses of the individuals to the first video by genders, should they use a pooled or independent T-test?
  2. Try to answer the question above with a hypothesis test. What is your null and what is your alternative?
  3. Use the appropriate test to answer (a). What is your p-value? What is the verdict?

 

  1. Executing the T-Test: The researcher then wants to find if there is a difference in the number of correct answers for video 1 for the two genders, using a T-test comparison.
  2. What is your null and alternative hypothesis?
  3. Create some summary statistics, for the variable Vid1, by the two genders.
  4. What are some assumptions that need to be checked for the process to work?
  5. Test if the variable Vid1 is normally distributed for the two genders respectively.
  6. Use SAS or R to run the appropriate T-test, present your T score and the p-value.
  7. What is your verdict?

 

  1. Paired T-Test: Continuing question 1, the research wants now to find if the two videos produce statistically similar results.

 

  1. What is the appropriate test? What is the null and what is the alternative hypothesis?
  2. What are the assumptions for this test?
  3. Run the appropriate test in R or SAS. What is the p-value?
  4. What is your verdict?

 

  1. Proportions test: The researcher now wants to find if the ratio of kids is the same among the two genders.

 

  1. Create a table with the variables Gender and Char, to find the proportion of Kids vs Not Kids for both genders.
  2. Set up a hypothesis test. What is your null and what is your alternative hypothesis?
  3. What are the assumptions for this test? Check the ones you can check and mention the ones you cannot.
  4. Compute the corresponding statistic and the p-value. What is your verdict?