Case scenario Report Assignment Available

Case scenario Report
Case scenario Report

Case scenario report

Order Instructions:

This assignment is of 1500 words. The referencing is Harvard Referencing guide.

Assessment #1 – Case Report (Graded)

Students are required to submit a written report on the analysis of a case scenario. Two case scenarios will be available via the Learn online Course Website and students must choose one (1) from the two. The main aim of case scenario report will be to apply selected theories from the course content to simulated problem solving and decision-making, reinforcing the applicability of theory to practical situations.
Further detailed information including assessment description, marking criteria and academic writing requirements are located on the course learn online webpage.

I have attached all the other requirements for this assignment.

SAMPLE ANSWER

Case Scenario 1 Report

Section 1

From the review of the case scenario and the friend’s account, it is evident that the relationship breakdown between Jeremy and his family is the main issue at hand. This has consequently resulted into depression, loneliness, and a feeling of abandonment that are the underlying causes of his persistent stress hence the intense and prolonged headaches. To counter the pain, Jeremy takes long-acting painkillers and for the feeling of loneliness and abandonment Jeremy abuses alcohol. This interferes with his judgment and, therefore, he misuses the pain drugs and forgets to take his insulin drugs which further worsen his physical condition. In addition, alcohol is contraindicated in diabetes treatment due to the drug interaction that renders the drugs ineffective. From his emotional state at arrival in the hospital, Jeremy seems to have been attempting to commit suicide using an overdose of painkillers taken with alcohol a combination that is clearly contraindicated in medicine. Therefore, apart from the medicine Jeremy is currently using he requires psychiatric therapy to deal with his underlying emotional problems.

Section 2

In reference to the case scenario, the questions of interest here include:

  1. What are the effects of family breakdown on adolescents?
  2. How do adolescents adapt to family breakdowns?
  • How effective are pharmaceutical interventions in treating the symptoms associated with family breakdowns?
  1. What effect does alcohol have on pain and drugs used in Type 1 diabetes?
  2. What is the effectiveness of psychotherapy in the treatment of Jeremy’s condition?

In the case scenario, Jeremy seems to be suffering from a condition that is psychological and affecting his emotional well-being and judgment. These questions will be critical in determining whether the family breakdown is the underlying cause of his stress that in turn requires him to be on constant pain killing medication. In addition, the questions will help determine whether his constant partying, alcohol abuse and the suicide attempt are possible adaptive mechanisms to deal with the emotional distress. Furthermore, they will highlight the effectiveness of pharmaceutical and psychological interventions in handling Jeremy’s case and how alcohol use affects the efficacy of drugs.

Section 3

In the last 30 years, there have been social and demographic changes leading to increased diversity and complexity in the family structure. Today, more couples are cohabiting and becoming parents, and the risk of separation among this group is higher compared to that of divorced parents (Mooney, Oliver, & Smith 2009). However, even among married parents the rates of divorce are significantly increasing. Therefore, children are experiencing parental separations or situations where they have a single parent. This parental separation and family breakdown often has a negative impact on educational achievement, behavior, mental health, self-concept, social competence, and the overall long-term health on the adolescent (Mooney, Oliver, & Smith 2009). Therefore, the question that arises is what the psychological effects of family breakdown on children are.

Per Rodgers and Pyror (1998; 2001) who conducted a review of evidence-based literature on the impact of family breakdown on a child’s outcomes found at those children had an increased risk of developing behavioral problems, poorly performing in school, and required more medical treatment. In addition, they were leaving school and home early, and developing depressive symptoms including higher degrees of smoking, drinking, and other drug use and becoming addicts in adolescence and or adulthood (Mooney, Oliver, & Smith 2009).

Erikson’s Psychosocial Development Theory

According to Erik Erikson, child development occurred under certain predetermined stages and order. Erikson focused on the social development of the child and how this affects their sense of self. He, therefore, developed the Psychosocial Theory of Development that comprises of eight developmental stages (Sigelman & Rider 2014). Each of these stages has two possible developmental outcomes and per the theory, the successful completion of each of the stages results into the development of a healthy personality and proper socialization with others. However, failure to complete a particular stage is associated with a decreased inability to successfully complete the subsequent stages hence development of an unhealthy personality and a poor sense of self. In case a stage is not completed and resolved successfully, this can occur at a later time in the individual’s life. These stages are, “Trust vs. Mistrust, Autonomy vs. Shame and Doubt, Initiative vs. Guilt, Industry vs. Inferiority, Identity vs. Role Conflict, Intimacy vs. Isolation, Generativity vs. Stagnation, and Ego Integrity versus Despair” (Sigelman & Rider 2014).

Application to the Scenario

Due to the family breakdown, Jeremiah was separated from his family at a crucial time when he needed the support of the parents to complete the particular developmental stage that is the identity versus role conflict stage fully, and this resulted into role confusion. In addition, Jeremy was moved to a new country, and since the previous stage was not completed, it became even difficult to complete the next stage (intimacy versus isolation) as these were new people hence he developed feelings of isolation, loneliness and depression hence the headaches.

 

Health Detrimental Beliefs and Attitudes

From the Scenario, Jeremy seems to have health destroying beliefs and attitudes regarding his condition. Due to the family breakdown and separation, Jeremy has clearly developed a psychological condition (depression) and feelings of loneliness and isolation. However, to deal with the stress associated with these feelings he constantly takes painkillers for the stress related pain and to deal with the negative feelings and depressive mood he constantly parties and abuses alcohol as remedies for his state. This negatively impacts his judgment and even he forgets about his diabetes pills. As a final resort, he believes suicide is best for dealing with his problems.

Pathophysiological Processes of Depression

The clinical and etiological heterogeneity related to depression has made it difficult to elucidate the pathophysiology of depression. The current theories in neurobiology having the most-valid foundations empirically and reviewed of the basis of their strengths and weaknesses and selected theories are based on the investigation of psychosocial stress and the stress hormone (Hasler 2010). Stress is attributed to be a cause of depression and the sensitivity to stress is partially gender-specific. While men and women exhibit almost equal sensitivity to stressful events that can lead to depression, the responses differ depending on the type of stressor. Men experience episodes of divorce following separation, divorce, and difficulties in working while women are sensitive events that happen close to their social network (Hasler 2010).

The Corticotropin-releasing hormone from the hypothalamus is released when psychological stress is detected in the brain regions and this critical in the pathogenesis of depression. This hormone brings about several physiological and behavioral alterations that resemble depression. The sickness behavior is as a result of the released hormone with the significant risk factor being suicide (Hasler 2010).

Step 4

In reference to the case scenario, the main problem that to be addressed is the depression. Depression is a mood disorder that results to the development of persistent feelings of sadness and lack of interest. The condition interferes with the thought process and behavior and results into several physical and emotional problems (feelings of worthlessness) (Moragne 2011). Depression is life-threatening and occurs at any age causing severe distress and disruption of life. Due to the negative beliefs regarding depression, ignorance, and a lack of knowledge some of the coping techniques used include alcohol use, drug use, painkillers, comfort eating, self-mutility shopping, suicidal thoughts and even suicide (Brigitta 2002).

To support the client (Jeremy) as a nurse, assessment of the client’s clinical symptoms of depression would be the most important and first in the patient-centered approach. For Jeremy, I would assess of his feelings, behaviors, and verbal response. Once this is done, in a collaborative manner, I would help him conceptualize his treatment goals through the identification of his strengths and weaknesses. Finally,  I would provide depression nursing intervention techniques such as close interaction, encouragement, attentive to the client’s needs, appraising the client’s strengths, and help the client understand the meaning of life and to develop a sense of purpose in order to feel worthy of living. Moreover, I would notify the client of his other medical conditions and the need to adhere to treatment to avoid other negative health consequences that would further worsen his depression.

Therefore, per the Nursing and Midwifery Board of Australia (2006), planning nursing care in consultation with the individual, practicing within the professional and ethical framework, and practicing using a framework that is based on evidence are the ANMC RN Competency Standards required (NMBA 2006).

Conclusion

Depression is life threatening and requires special care from a personal and professional level. I think that the beliefs, attitudes, behaviors, and lifestyle choices that a person having depression has and makes are at the centre on how this disease will progress. For Jeremy, I think if consuming alcohol will worsen his condition. Given the fact that he has another health conditions it is critical that he adheres to the drugs provided and keeps away from the alcohol. A lifestyle change for him would be beneficial as this will help cope with the negative emotions on a long-term basis. From my nursing practice experience, I have realized that many people with depression often engage in health-damaging adaptive mechanisms just like Jeremy, and this often worsens their condition and at times results in death

References

Brigitta, B, 2002, Pathophysiology of Depression and Mechanisms of Treatment, Dialogues Clin Neurosci., 4 (1), 7–20.

Hasler, G, 2010, Pathophysiology of Depression: Do we have any solid evidence of interest to clinicians? World Psychiatry, 9 (3), 155-161.

Mooney, A, Oliver, C & Smith, M, 2009, Impact of Family Breakdown on Children’s Well-Being: Evidence Review, University of London, Institute of Education, London: University of London.

Moragne, W, 2011, Depression, Minneapolis, MN, United States of America, Twenty-First Century Books.

Sigelman, C & Rider, E, 2014, Life-Span Human Development. Stamford, CT, United States of America, Cengage Learning.

The Nursing and Midwifery Board of Australia, 2006, National Competency Standards for the Registered Nurse, 1-11.

We can write this or a similar paper for you! Simply fill the order form!

Major risks to the organization when implementing and using IT

Major risks to the organization when implementing and using IT
Major risks to the organization when implementing and using IT

Major risks to the organization when implementing and using IT

Order Instructions:

It is important to pay close attention to grammatical errors and sentence structure as you compose this paper. you must also try to use research to support your examples. Use the resources below to help you in completing this paper. Also take note that they are a series of questions asked hear and you must clearly respond to each one of them in essay form and remember that a paragraph cannot be anything less than 5 sentences

IT Risk Mitigation

You have examined the role of IT within the organization, including its impact on the structure of the company and the ability to increase competitive advantage. But with the new opportunities that IT can create, there are risks and threats that must be addressed.

– What are the major risks to the organization when implementing and using IT?
– To what degree are IT security risks and business risks interrelated?
– What disadvantages might a business encounter from a “locked-down” IT environment, and how can these be balanced against the disadvantages of a security breach?
– Also include in your discussion the topic of ethics as it relates to handling consumer or patient data and intellectual property.

Be sure to include examples from your own experience or research you have done in your discussion.

Resources

Course Text
• Management Information Systems for the Information Age
Chapter 8, “Protecting People and Information: Threats and Safeguards,” pages 356–365

This chapter discusses privacy, intellectual property, copyright, fair use, and pirated software.
Articles
• Tran, E., & Atkinson, M. (2002). Security of personal data across national borders. Information Management & Computer Security, 10 (5). Retrieved from ABI/INFORM Global database.

This article discusses how national laws regarding personal data can impact transnational companies.
• Halliday, S., Badenhorst, K., & Solms, R. (1996). A business approach to effective information technology risk analysis and management. Information Management & Computer Security, 4(1). Retrieved from ABI/INFORM Global database.

This article connects business risk analysis with information technology risk analysis.
Farahmand, F., Navathe, S. B., Sharp, G. P., & Enslow, P. H. (2005). A management perspective on risk of security threats to information systems. Information Technology and Management, 6(2–3). Retrieved from ABI/INFORM Global database.

This article takes a management, rather than IT, point of view on security threats to information systems

SAMPLE ANSWER

What are the major risks to the organization when implementing and using IT?

Cyber criminality is increasingly becoming sophisticated every day.  The ever growing cleverness in the hacking industry has literally become a critical challenge that organisations are faced with. A survey on cyber security demonstrates that more than 55% of survey correspondents indicated that cyber molestation and the general criminal activities have grown immensely. More than 30% of organisations witnessed negative monetary damage resulting from attacks like hacking and phishing in a period of one year.  Organisations should now compete with a range of hi-tech attacks orchestrated by well structure monetarily driven criminals (Halliday, Badenhorst & Solms, 1996).

Data violations can culminate to embarrassing disclosures, the threat of clientele identity theft, and fines or legal dilemmas. In addition cryptographic keys can fall in wrong hands, granting unauthorized individuals or applications entry to sensitive or important information.  Based on a particular nature of the information, the loss of cryptographic keys can culminate into critical mishaps that are likely to disorient business operations, the loss of clients and legal implications. Application-centered key control procedures present only limited security, leaving sensitive codes and information they safeguard, susceptible to assault. Propagation of fragmented key control systems can enhance the intricacies and security cost control, leading to business procedures that are complex to administer and scale. The complexity of reporting obligations can be enhanced with poorly documented key control.

To what degree are IT security risks and business risks interrelated?

As firms globally take advantage of ICT to curtail cost and enhance performance, digital data can be shared or accessed through interlinked information structures, the threat of information violation in increasingly concerned (Farahmand et al. 2005).  Various major threats that concern ICT experts and business investors include system malfunctioning, disaster recovery, data reliability, which are equally concerns of the potential business threats. Security issues subsist from all assaults that include; connectivity such as; IP spoofing, spamming, and malicious programs. Such intrusions end up tampering with data, data modification, data disclosure and service interruption on power grids and even physical harms like was the case of Staxnet, which dealt a heavy blow on the Iranian nukes. In fact, malware technology has become so lethal that it can now create a physical destruction. With the enormity of such security threats in an IT setting, the business fraternity remain vulnerable especially in the absence of security analysis. Firms will still be vulnerable if they fail to implement a comprehensive security plan. As Tran and Atkinson (2002) state, business environments are fitted with some proficient security measures like data encryption, security socket layer (SSL) protocol to encode the transmission, and biometric validation that manages the physical entry.

What disadvantages might a business encounter from a “locked-down” IT environment, and how can these be balanced against the disadvantages of a security breach?

Firms that are run on heavy computerized networks would be disadvantaged with a locked down IT setting. Nonetheless, the limitation of such backdrops is the rigidity of application updates. IT experts should come in to decide a balance between practicality, fee, comfort, as well as safety measures as the “locked down” IT environment expects managerial leadership. Information and Technology experts require utmost support from the managerial that should comprehend the potential threats.  By and large, implementing a locked down IT framework will be instrumental for the business. Most companies should take advantages of Microsoft Windows 2008 to ensure security is guaranteed. Apart from the Cisco firewall, online activities should be validated with SSL apart from static web server (Tran and Atkinson, 2002). Moreover, the issue of security can be enhanced by redirecting emails through virus interceptors and spam filters prior to hitting the front end substitution of all incoming emails. While personal emails should not be allowed within the corporate systems, the organization should implement programs that filter spamming and safeguard web traffic.

Ethics as it relates to handling consumer or patient data and intellectual property

The truth is that humans tend to abuse the technology per se by simply abusing the best practices.  Human virus can alter how applications work, like tampering with payroll information to enhance the wage bill. This can be done by administrators on the back-end, to alter figures without any documentation. This is to say personnel represent the highest risks particularly when they abuse their rights and professional ethics (Farahmand et al. 2005).  At that point, it becomes paramount to implement safety assessment in almost all structures and networks through an independent party to preclude the issue of unethical behaviors as well as practices.

References

Farahmand, F., Navathe, S. B., Sharp, G. P., & Enslow, P. H. (2005). A management perspective  on risk of security threats to information systems. Information Technology and  Management, 6 (2–3).

Halliday, S., Badenhorst, K., & Solms, R. (1996). A business approach to effective information    technology risk analysis and management. Information Management & Computer Security, 4(1). Retrieved from ABI/INFORM Global database.

Management Information Systems for the Information Age Chapter 8, “Protecting People and  Information: Threats and Safeguards,” pages 356–365

Tran, E., & Atkinson, M. (2002). Security of personal data across national borders. Information    Management & Computer Security, 10 (5)

We can write this or a similar paper for you! Simply fill the order form!

Natural-Accidental Disasters Assignment

Natural-Accidental Disasters
Natural-Accidental Disasters

Natural-Accidental Disasters

Order Instructions:

Local, State, and Federal Partnerships: Natural/Accidental Disasters

1)National Response Framework. Review areas specifically pertinent to local, state, and federal government leaders and emergency management practitioners (pp. 11-19).

http://www.fema.gov/media-library-data/20130726-1914-25045-1246/final_national_response_framework_20130501.pdf

2)You will also need to become familiar with the “memorandum of understanding” approach to cooperative engagements.

a)Provide two examples of a memorandum of understanding. Explain why you chose these examples.
b)Explain why it is advantageous to have a reciprocal emergency response agreement with the town or city that adjoins your town or city. Give examples.

SAMPLE ANSWER

Local, State, and Federal Partnerships: Natural-Accidental Disasters

  1. Provide two examples of a memorandum of understanding. Explain why you chose these examples

The two examples of memorandum of understanding that have been observed in this document are found in the section that discusses the emergency responses in tribal areas as well as the responses that are offered by federal departments.

Under Tribes: “The NRF’s Tribal Coordination Support Annex outlines processes and mechanisms that tribal governments may use to request direct Federal assistance during an incident regardless of whether or not the incident involves a Stafford Act declaration. ”

The reason why this is considered to be a memorandum is the fact that it details a mutual agreement between the various native Indian tribes and the Federal government. The memorandum is expressly detailed under the heading of the “NRF tribal Coordination Support Annex.” The reason for this memorandum is to ensure that the different tribal regions get the assistance they need in the event of an emergency. The reason for this is that many of the tribal regions are remote and lack resources necessary to enable them adequately respond to different natural disasters and man-made emergencies. The federal government on the other hand does have these resources as well as the capacity to adequately handle the emergencies. As such it became necessary for this memorandum that obligates the federal government to provide emergency assistance.

Under Federal Departments: “All Federal departments and agencies must cooperate with one another, and with local, state, tribal, territorial, and insular area governments, community members, and the private sector to the maximum extent possible. Although Federal disaster assistance is often considered synonymous with Presidential declarations under the Stafford Act, Federal assistance can actually be provided to state and local jurisdictions, as well as to other Federal departments and agencies, through a number of different mechanisms and authorities.”

The above extract also qualifies to be a memorandum of understanding. In this scenario unlike the above one where one of the parties bears the obligation, all the parties have a shared responsibility to provide the other department with the necessary assistance that is required. The reason for this memorandum is the fact that different departments are specialized in different areas and different emergency situations call for different tangible and intangible resources.

  1. Explain why it is advantageous to have a reciprocal emergency response agreement with the town or city that adjoins your town or city. Give examples

A reciprocal emergency response arrangement with a city or town adjoining the one I live in is advantageous in that it guarantees immediate and quicker assistance in the event that the emergency situation in the jurisdiction of local authorities in my region. This could be a road accident that has occurred near a border region, it is ideally the responsibility of our local authorities to respond but it will be more effective if the situation is handled by the response team that is closest even if it is from the neighboring town. At times a coordinated effort is crucial for the effective handling of large scale operations such as preparedness for a natural calamity such as a flood or forest fire which has no respect for regional boundaries. The agreement will facilitate more effective responses with operations like evacuation and rescue missions being carried out with more resources available for use (National Response Framework, n.d.).

Reference

National Response Framework. Review areas specifically pertinent to local, state, and federal government leaders and emergency management practitioners. Retrieved from http://www.fema.gov/media-library-data/20130726-1914-25045-1246/final_national_response_framework_20130501.pdf  on August 11, 2014

We can write this or a similar paper for you! Simply fill the order form!

Trusted Supply Chains Case Study

Trusted Supply Chains
Trusted Supply Chains

Trusted Supply Chains- Client Report: Sanken Power Systems (UK) Product

Order Instructions:

A3 Report Structure

Client Requirements
To undertake a study to create a Strategic Evaluation of the market structure for Sanken BR200 device in the European Telecommunication Market.

This study shall strengthen the projects potential to:

• Establish a target market in the European telecommunication industry.
• Approach nearest potential customers.
• Identify if the BR200 fits in the telecommunication industry.
• Identify the companies tier position in relation to the telecommunication market.

Deliverables

• Examine the tools that are required to enter the telecommunication market and establish a target market to approach the nearest potential customers, by looking at:
• Market Research
• Market Segmentation
• Evaluating the company’s BR200 device and their current position in the market, by looking at:
• Porters Five Forces
• PESTEL analysis
• SWOT analysis
• Determine the supply Chain tiering through mapping the process, by looking at:
• Value Chain Mapping
• Supply Chain Segmentation
• Supporting Theory
• Objective Based:
• Market Research Hague, Paul (2004) –Market Research is used in business models and frameworks to gather information that can be either qualitative or quantitative, to draw a clear picture of the current market structure. Such as surveys provide vital information to assess the market size and competition.

• Market Segmentation Malcolm McDonald (2012) Market Segmentation is dividing the target market into segments in which each customer in the segment share common interests. Therefore, a more narrow focused strategy can be designed and dedicated towards achieving customer’s needs. This method is used to identify the potential customers in the market.

• PESTEL Analysis Jim Downey (2007)–Is assessing the Political, Economic, Social, Technological,Environmental and legal variations in the business environment. This method can be used to provide important information for Sanken to look for new potential opportunities in Europe and take into consideration any possible limitations.

• Porters Five Forces Tony Grundy (2006) – This model can be used by Sanken to set up strategies to explore opportunities that lie within the Telecommunication market, such as mapping the competition and market attractiveness. This model includes threats of new entrants, the threats of substitute products or service, the bargaining power of suppliers, and the intensity of competitive rivalry.

• Value Chain Mapping Mike Morris (2001)–To examine all the value addedactivities that take a product from the beginning process until it finally reaches the customer. It is also used to look deeply into refining the process to make it more efficient.

• Supply Chain Segmentation Douglas Thomas (1996)–Segmentation analysis enables Sanken to focus on specific key sectors to create a tier, as well as build supply chain resources, knowledge and competencies in any division to successfully meet customers’ demands in the market.

• SWOT Analysis Andrews et al (1969) – This tool is used to summarize and analyse the overall strengths, weaknesses, opportunities and threats of the project. To draw a clear picture for the decision makers to consider different aspects of the project as well as organize their thought process.

Table of Content
1.0 Client Aim and Objectives
2.0 Supporting Theory
2.1 Objective 1
2.1.1 Market Research
2.1.2 Market Segmentation
2.2 Objective 2
2.2.1 Porters Five Forces
2.2.2 PESTEL Analysis
2.2.3 SWOT Analysis
2.3 Objective 3
2.3.1 Value Chain Mapping
2.3.2 Supply Chain Segmentation
3.0 Gantt Chart
3.1 Gant Chart Methodology
4.0 Contribution
4.1 Market Analysis
4.2 Shakeholder analysis
4.3 (Add+ )
4.4 ( Add+)
5.0 Reflection
6.0 References

What is the aim of the Client Project?
Client: Sanken Power Systems (UK) Products, Bridgend South Wales
• The purpose of the report is to show the client Why you would use the methods identified.
• What is the (strategic) reason/rationale/motivation for this project? i.e. what is the range of problem(s) or issues involved?

• Consultants(ME) need to submit a report that clearly shows and explains How? they would do the study.
• A Client wants to do something new and needs a study to identify whether it is possible and or desirable e.g. Launch Sanken’s BR200 into a new market.
• For example when talking about the analysis tools i.e. PESTEL analysis discuss only why this tool is relevant to the study and why it needs to be used. Do not explain each and every Stage!
• Create a Gantt Chart and dicuss its methodlogy
Deliverable:
Consultants need to produce a 6,000 word report outlining the main objectives of the study and the methods that would be employed – following the A3 report structure provided.

SAMPLE ANSWER

Trusted Supply Chains

Trusted Supply Chains— Client Report: Sanken Power Systems (UK) Product

The rise in amount of information transmitted and received has promoted the rapid proliferation of ICT services and gadgets such as cloud services and smartphones (Walkenhorst et al., 2009, n.p). In response to these emerging trends, the devices used in control power supply for the DSPs, MCUs, and FPGAs that constitute the core elements of these emerging ICT gadgets must equally be able to support much higher output currents and lower voltages (Hilmersson and Jansson, 2012, n.p). Therefore, the DC/DC converters commonly used in control power supply should have high current and low voltage specifications as well as a fast response to the rapidly changing loads. The non-isolated step down converter module which is the new BR200 series produced by Sanken features a line-up of seven products all with an output current of either 20 A or 10 A perfectly fits this specification.

  • Client Aim and Objectives

Aim:

To undertake a study to create a Strategic Evaluation of the market structure for Sanken BR200 device in the European Telecommunication Market.

Objectives:

  1. To Examine the tools that are required to enter the telecommunication market and establish a target market to approach the nearest potential customers
  2. To evaluating the company’s BR200 device and their current position in the market
  3. To determine the supply Chain tiering through mapping the process

2.0 Supporting Theory

Sanken is a top global supplier of semiconductor products with their core business being that of semiconductor power devices. Although most of their power devises are widely used in the Automobile industry, the company eyes an opportunity in the Telecommunication industry especially for its BR200 device. The reason for this kind of inclination is motivated by the fact that optical communication is becoming increasingly popular and as such, Sanken needs to engage deeper into the optical systems (Dolnicar and Lazarevski, 2009, p. 360). Moreover, Sanken’s BR200 device is a key component in the telecommunication industry and thus the need for the company to establish the type of component required within the network loop (Hilmersson and Jansson, 2012, n.p). Sanken must establish if their BR200 equipment is appropriate in the telecommunications sector and consequently identify a target market for it within the European market.

Apparently, Sanken postulates that the telecommunications market opportunities largely lie in the major European market players such as Ericsson and Fujitsu. However, the company still beliefs that there is potential for expansion through identification and entry into new markets. The success of venturing into new markets will greatly depend on the capacity of the company to access and acting upon reliable market information (Fabling and Sanderson, 2013, p. 428). Information is particularly needed to narrow down on potential customers, understand their position within the telecommunications market for the purpose of positioning themselves in the supply, and as a basis for approaching their nearest customer to engage with within the supply chain in telecommunication.

Sanken Power Systems (UK) Ltd seeks for the services of a reputable and reliable supply chain company. The PackIT Logistics limited is a leading supply chain based in Cardiff, South Wales and providing efficient services in warehousing, order fulfilment, storage, sock management and distribution, E-Commerce Fulfilment customer service, back office systems, account management, data management services, contract packing, and response management in a range of businesses and industries across UK and internationally.

In the case of Sanken, it is necessary that appropriate information is provided to enable the company master the complexities of the telecommunications market. Market information will focus on investment, customer base, competitiveness, and market entry strategies (Baldwin and Yan, 2012, n.p). Telecommunication market in Europe is characterised by high dynamism in terms of technological innovation cycles, product differentiation, quality improvement, and high capital intensity (Haveman,  2013, p. 602).

The BR200 series consists of a line-up of non-isolated step-down converters that can offer a fast response to any changing loads making it easy to mount. These types of converters offers a stable supply of power output to the MCU, DSP, and FPGA components, whose loads have rapid fluctuates. It also allows high-intensity mounting and in turn facilitating the development of more compact equipment (Wright and Larsen, 2014, p. 171). As such it presents as a competitive alternative to most of the current devises that lacks these essential aspects.

2.1 Objective 1

To examine the tools that are required to enter the telecommunication market and establish a target market to approach the nearest potential customers2.1.1

Market Research

Market research is a key consideration when evaluating a new market or product. Research is essential in providing Sanken with the data and information that will enable the company make viable decisions about venturing into the new market. Indeed, the company requires a combination of both primary and secondary research in order to obtain the required data (Rudež et al., 2013, p. 131). The principle aim of the market research is to identify a competitive landscape for the BR200 device in terms of the understanding competitors marketing approaches, pricing structure, as well as strengths and weaknesses.

As Quinn, (2009, p. 272) notes, one of the areas that require market research before venturing into the new market is on market trends. According to Jae Young et al., (2013, p. 290) an analysis of the industry trends is very necessary as a basis for forecasting postulated levels of sales in the potential market. Market trends offer a comprehensive guide to potential market size growth prospects. This offers a strategic market analysis of factors influencing the market, demand, and companies including distribution and supply chain factors, pricing, new product development and introduction, and economic issues.

Regarding trade regulations Sanken must be aware of all the legislative requirements that they need to comply with for smooth running of the business (Dibb and Simkin, 2009, p. 376). Additionally, other considerations when venturing into the new market are technical standards desired in the new market and product safety as well as any rules or regulation in exercise in these markets or countries. Again, it is very crucial that tariffs and duties for the particular electronic devices be considered. A wide range of laws and guidelines within the country or market of destination must be first met before the BR200 device can enter the new market. To ensure market success, the design and usability of the device must satisfy the end user’s desires and expectations. Telecommunications industry is largely driven and characterized by innovation (Min et al., 2008, p. 16). Consumer needs, expectations, and behaviour are constantly evolving. Market research is therefore, very necessary to determine exactly what is required in the market and how best to deliver it. This entails reviewing of designs and market information about the product being introduced. This must include product viability and usability in the potential market as well as the safety of the electrical device to ensure that they are ready for the market.

2.1.2 Market Segmentation

In order to compete successfully in today’s’ competitive and volatile business markets, companies must attack niche markets exhibiting unique wants and needs. Battisti (2013, p. 41) defines market segmentation as a process of grouping customers into homogeneous groups or categories in order to optimize on the use of resources and to increase efficiency in terms of distribution, pricing, product adoption, branding, and communication. The principle purpose of market segmentation For Sanken is to reflect on some aspects that are being faced by the telecom industry. This is necessary since venturing into new telecom markets requires proper consideration of huge amounts of data from various sources such as banks, online shops, and insurance about potential customers.

`Market segmentation is the foundation upon which the other activities in analysing of the potential market are based (Schlager and Maas, 2013, p. 45). It requires major commitment on the part of the management to facilitate customer-oriented research, planning, and implementation and control. By and large, the use of the market segmentation information is bound to improve the company’s competitive advantage putting it in a better position to serve the needs of their customers.

Market segmentation analysis entails segment identification, market selection, and strategic positioning (Juan, 2014, p. 88). Segment identification involves establishing based on selected segmentation criteria and variables a given number of similar market segments say in terms of justifiable size, accountable, profitability, and customer-focused segments. To specify on market opportunities, it is crucial to make strategic choices concerning corporate objectives, financial and technical resources available, competitive opportunities, and customer needs. Positioning is a key factor in ensuring that the company carves out on a market niche. This involves searching out unique advantages, seeking new market segment not being cultivated by competitors, and then develop new approaches to these old problems. Positioning should be based on both real sources such as quality and superiority and intangible factors like reputation to gain competitive advantage for the company (Kuen-Hung et al., 2013, p. 722).

Market segmentation analysis has the capacity to enhance responsiveness of products so as to meet the needs and conditions of the marketplace (James and Raee, 2013 p. 32). The process facilitates the developing cost-efficient and effective promotional tactics and campaigns. Through market segmentation analysis, it will be possible to gauge the company’s market position in the potential markets and customers in relation to the competition. In this context, the company is able to plan for its business strategies in the entry of the new market. When launching the new venture it is very critical for Sanken to identify and understand the type of companies they are targeting and how well to reach them. Therefore, conducting a market segment analysis is necessary for focusing the new product to the most promising segment.

2.2 Objective 2

To evaluate the company’s BR200 device and their current position in the market
2.2.1 Porters Five Forces

The Porter’s five forces model is a framework used for the analysis of the business strategy development. It describes five forces that highlight the competitive intensity and attractiveness of the market as; bargaining power of customers, threats of new entrants, threats of substitute products, bargaining power of the suppliers, and competitive rivalry within the industry. These factors are referred to as the micro-environment and have direct impacts its ability to make profits and serve its customers (Lamore et al., 2013, p. 701). Any changes in these factors require that the company reassesses its marketplace. The model will be used to analyse the attractiveness of the European telecommunications industry.

The five forces analysis will facilitate the understanding of a factors impacting profitability in the telecommunication industry in terms of developing competitive strategies and to increase capacity in the market. It is specifically ideal for the EU market since there are more than three competitors (Al-Araki, 2013, p. p. 230). As Lorca-Susino (2014, p. 33) argues, it is effective in several other ways including establishing the impact of the government on the industry and considering the lifecycle stage of the industry as well as considering the dynamic characteristics of the specific industry. It is an effective tool for identifying and analysing the competitive position and strength of the company within the particular market.

The theory is based on the perspective that there are five basic drivers that determine the competitive attractiveness and intensity of a market (Kaufmann and Roesch, 2012, p. 9). The model helps to identify areas where power lies within a given business situation in this case the case being that of the position of the Sanken Power Systems within the European market for their BR200 device. This is a significant step since it will help in understanding the strength of the company’s current competitive position as well as the strength of a new business opportunity that it may look to move into. The model in this case will help to understand if the introduction of a new product in a new market is potentially viable and profitable. The theory is also effective in identifying and understanding where power lies and areas of strength as a basis for the strategic move in a new market.

2.2.2 PESTEL Analysis

The PEST analysis of Sanken will be used as a strategic tool to analyse the external environment in which it operates (Global Semiconductor Industry, 2013, n.p). It is an acronym for political, economic, social, and technological factors. These factors play a very crucial role in the value creation opportunities of the company’s strategy. However, these factors are usually outside the company’s control and must be considered as either opportunities or threats.

PESTEL analysis helps to show the big picture of a company’s external environment especially ones related foreign markets (Ghazinoory et al., 2011, p. 24). It helps gain a better understanding of the potential opportunities and threats likely to be faced when venturing into new markets. It aids in building a better vision of the development or expansion of business and ways in which the company can compete profitably. It analyzes for market growth or decline and as such the potential, position, and direction for the business. These factors are particularly important when the company is planning into entering into a new market as is the case with Sanken. This is achieved through creating insight into market status of key flatness of the market, both in terms of the future and present trends.

The first step in making the most out of the PESTEL analysis is to consider the relevance of each of the six factors in the analysis to the business context (Briciu et al., 2012, p. 147). The second step involves identifying and categorizing the information applicable in these factors. Finally, the data should be analyzed in order to draw conclusions (Nunan and Di Domenico, 2013, p. 7).
2.2.3 SWOT Analysis

When launching a new product it is very critical that the company evaluates the four pillars related to marketing; place of sale, promotion, product, and price of sale (Millson, 2013, p. 1). For successful analysis of these factors it is necessary to analyze the external and internal factors of the company which will in turn help in maximize the opportunities and strengths while minimizing on the threats and weaknesses. New products ought to be developed around two concepts of satisfying the demand or need of a specific target market and with a selling benefit (Simoneaux and Stroud, 2011, p. 75). A weakness related to launching a new product may not necessarily mean that something is wrong with the product, it might instead be signalling the advantage that the competition has over the company. Developing a new product implies an opportunity for the company in the market (Quinn and Dibb, 2010, p. 1244). As such early influencers and adopters are companies who like to try the hottest new product and to tell others their experience with it. This will allow the company to set prices appropriately. Once the new product has been introduced in the market, the competitors will likely react. In this case Sanken is likely to face a great threat after launching their BR200 by competitors changing the playing field. In this regard, it is critical that Sanken has a backup plan for the promotion, distribution channels, and pricing of the product in readiness to respond to competitor changes.

Harwood and Ward, (2013, p. 252) postulate that the SWOT analysis examines the business’ strengths and weakness, as well as threats and opportunities in the potential market. By focusing on these key factors that are likely to affect the business in the new market, the analysis provides a clear basis for establishing the business performance and prospects. The reviewing of the potential business performance will motivate action (Dobbs, 2014, p. 32). The analysis is an effective step towards identifying how successful the new market or product can do through the analysis of the favourable and unfavourable conditions in the potential market. SWOT analysis is a strong basis for planning when undertaking a major business venture (Min et al., 2008, p. 22). The system combines environmental analysis information and separates it into two components. This level of analysis facilitates the company to determine the factors likely to aid in the achievement of some specific objectives or on the obstacles to be overcome before the company can achieve the desired outcome.

2.3 Objective 3:

To determine the supply Chain tiering through mapping the process

2.3.1. Value Chain Mapping

It requires a great deal of resources in terms of finances and time to launch a new product effectively, quickly, and ahead of the competition. An efficient launching of the BR device requires coordination and integration along the chain for the purpose of product design, planning, and manufacturing, procurement, sales and marketing. A value chain strategy in this case is the crucial collaboration of the various functions of the business, primary and support activities with the aim of meeting a certain business objective (Ereaut, 2002, n.p). Value chains are a leading-edge business strategy that guides every participant to contribute to creating value for consumers (Kahn and Kahn, 2010, n.p).

Value chain mapping describes activities that take place within a business and relates them to an analysis of its competitive strength (Competitive Market Analysis, 2009, n.p). The primary activities are those that concern directly with creating and delivering a product while support activities are those that are not involved in the production directly although they may increase efficiency and effectiveness.

By conducting a value chain analysis the Sanken will be able to introduce the BR200 device through involving the management in creating value, deciding the way communication is to be handled, ensuring volatile supply and demand, and chain efficiencies and risks (Market Selection, 2013, n.p). Value chain mapping is an effective means of developing a differentiated product, whole chain marketing, and ensuring consistency of supply.

2.3.2 Supply Chain Segmentation

Proctor (2010, p. 86) postulates that supply chain segmentation is the designing and operating distinctly the different end-to-end value chains form suppliers to customers and optimized through a combination of unique product attribute, business value considerations, customer value, and manufacturing and supply capabilities. It is the dynamic alignment and integration of customer channel supply and demand response capabilities that are optimized for net profitability for each segment (John 2014, n.p). The prevailing fierce completion in the telecommunication industry coupled with the economic downturn across Europe has necessitated the need for businesses to tackle some of the most conflicting challenges of reducing costs and driving growth through innovation (Presutti and Mawhinney, 2013, n.p). Traditionally, the aspect of sales has always been assigned to the marketing function while that of cost reduction is directed towards supply chain. Business alignment is geared towards developing congruence between the supply chain, marketing, and product strategy.

Supply chain segmentation is an effective approach towards mapping the end-to-end supply chain in order to provide visibility within the different segments of the business. Segmentation helps to identify the scope of integration for active management by the supply chain organization (De Backer and Miroudot, 2014, n.p). It is an easy way of identifying the primary customer for the supply chain organization. Segmentation in this case will serve a strategic purpose by reflecting what is important to the growth and profitability of the new product. This approach also gains the much needed internal support to drive the new venture. Sectoring the supply chain is strategic in that it facilitates support for company plans as well as maximizing growth and returns for the new business. In this way, resources are aligned where they are most needed.

According to (Yeates et al., (2010, n.p) value-based approach segments customers on the basis of economic value. The segmenting highlights characteristics in each of the segments. For instance, the company can look at areas where customers in each of the segments differ from others in terms supply chain service. This information can then be used as a basis for strategizing on the entry approach. A needs-based segmentation matches well with the management of supply chain (Lymbersky, 2008, n.p). In this case segmentation is done on the basis of driver that clients have for a specific supply chain service. Clients are categorized in terms of the common set of needs they share. The purpose is to match each sector needs with the current supply chain service. This would guide in enabling the company deliver services in each sector better than the competitors does and as such earn a competitive advantage. Segmentation is, therefore, a very effective approach to understanding Sanken’s supply chain for the purpose of venturing in to the new market. It will enable the company to focus attention and attention in segments where they can create value and provide strategic support.

  • Gantt Chart

3.1 Gant Chart Methodology

Gantt charts provide clear illustrations of the status of a project. To complete the venture successfully, Sanken will need to control a large number of activities in order to ensure that they are completed within schedule. This is to avoid knock-on effects on other activities in case some of the tasks in instances where deadlines are missed or tasks are finished out of sequence causing late delivery of products and more costs for the company (Market Entry Strategies, 2013, n.p). Gantt charts will convey this information visually and effectively by outlining all the tasks involved in the venture, and their order which are shown against a timescale. This clearly highlights overview of the venture as well as its associated tasks and when these tasks need to be accomplished.

Glowik (2009, n.p) notes that a Gantt chart helps to work out practical aspects of the venture in terms of the minimum time required for covering a given task and which activity needs to be completed before others can start. This information will then be used to determine the critical path; the sequence of activities that must first be individually completed on time if the whole venture is to deliver on time. Additionally, the Gantt chart will be used to inform the relevant teams informed of the progress.
4.0 Contribution
4.1 Market Analysis

Market analysis is the evaluation of the dynamics and attractiveness of a given market within a particular industry (Cayla and Paloza, 2012, p. 44). In the case of Sanken, a market analysis will form the basis for planning pertaining to the introduction of their new product in the telecommunications industry. Market analysis can be done in various dimensions such as market size, trends, growth rate, profitability, or industry cost structure, distribution channels, and key success factors. The goal of conducting the market analysis is to gain an understanding of the potential opportunities and threats and then relating them to the company’s strengths and weaknesses. Sanken will use the findings of the analysis guide their investment decision and in turn advance their success. The findings can also motivate the changing of certain aspects of its investment strategy.

In terms of the market size, the market volume presents the totality of the realized volume of sales within a given market (Wilkie et al., 2012, p. 957). This is dependent on the quantity of consumers as well as their consequent ordinary demand. Notably, the market potential is also a crucial factor for consideration which will provide the information concerning the potential for growth of the telecommunication industry. Examples of information that are key in determining market size are trade association data, company surveys, government data, and financial data from major players. Market trends entail evaluation of the upward and downward movement in a given market which offers information about new opportunities and threats. One of the ways of forecasting market growth for Sanken is through extrapolating the historical data into the future or through the study of market trends in complementary products. Analysis done through the Porter’s five forces will be important at this point in evaluating the attractiveness or profitability of the telecommunications market.

The most important factor for any company that plans on introducing a product in a new market is the pilot study. This clearly outlines the market situation in the new market or country, a picture of what to expect while venturing in.  However, most ventures still fail for some reasons. In most cases, companies will fail due to failure to do objective research, or to follow the guidelines outlined in the same. Failure may also emanate from the use of wrong communication, advertising, and advertising channels.  To achieve a successful launching in a new market, therefore, a proper set of processes that are based on research is a key factor to consider.

4.2 Stakeholder Analysis

Stakeholder analysis is the technique of identifying the key people that require to be won over. It involves working out stakeholder’s power, interest, and influence, in order to identify what to focus on (Alternative Market Entry Strategies, 2012, n.p). It is critical that Sanken develops a good understanding of the most important of the stakeholders. This will enable the company to establish how they are likely to respond and plan on how to win their support. By identifying the key people to work in the venture, Sanken will be able to make use of the powerful opinions that most of the stakeholders are likely to bring over to shape the venture at an early stage.

Apart from the possible support that stakeholders are likely to bring on board, their input is equally crucial since it can enhance the quality of the venture. Winning the support of stakeholders is an important consideration in the venture since it helps in anticipating people’s reaction towards the venture which is crucial to building into the company’s plan of action to win people’s support. Effective communication with stakeholders is essential in ensuring that they fully understand the significance of the venture and as such they will be willing to support when necessary.

4.3 Pricing in a New Market

The major objective of entering in to a new market is to increase profits. Pricing has huge impacts on the profitability of a product (Jolly, 2008, n.p). For this reason, the pricing strategy needs to be evaluated methodically before a final price can be reached. The four pricing strategies available for Sanken are the value-based pricing, market based pricing, cash-plus pricing, and the negotiation pricing (Murray et al., 2012, p. 56). In developing a pricing strategy it is very important to have a basic understanding of competitors as well as the level of competition. This enables the company to create value for themselves and for the customers. Choosing the right pricing strategy will, therefore, largely depend on how well Sanken understands the potential market they are venturing into.

Pricing in a new market is highly dependent on the market dynamics and prospects that exist in the host country (Halliburton et al., 2011, p. 95). As such, it is crucial that Sanken makes a deep market analysis through proper consideration of the pricing framework. Sales offices emerge as the most profitable for a Sanken to venture in to a new market. The company will have the opportunity to use the local knowledge and experience of sales teams and in turn reduce on contribution costs of the new product.

Pricing strategies will play a crucial role in determining the number of customers that are going to buy BR200 device. The pricing strategy adopted should be in a position to cover costs, grow market share, and earn reasonable profits for Sanken (Piercy, 2009, n.p). To grow the market share for instance will require that the company offers product selections at a price that will take the market away from the competitors. Cost based pricing entails adding up the total costs incurred to manufacture the product and then adding up the mark-up (Phan and Markman, 2011, n.p). Competitive pricing on the other hand entails matching prices of competitors for similar products. The other option is for the company to set high prices for the new product on the rationale that the attributes of the BR200 device are unmatched in the market.

4.4 Market Entry Strategy

Market entry strategy is an important factor when entering a new market. It is the planned method of delivering the company’s products to a target or potential market and distributing them there. It is very critical for Sanken to understand the preferences of the new customers as well as the management and business culture as a basis for identifying the best talent in driving new business in the new market. Morley (2014, n.p) contends that the different market entry models that are available for the company are upsala model, eclectic paradigm, industrial networks, business strategy, the agency approach, the bargaining power approach, or the transactional cost analysis theory.

Entering into new markets offers great opportunities to companies to increase their sales and enhance their brand awareness. The process of entering a new market requires proper analysis of the existing competitors and potential customers (Donadelli and Persha, 2014).

According to Allen et al., (2012, p. 212) entry plans involves a set of procedures that needs to be considered. First, is the process of selecting the market. In this stage, comparison is done of the different alternatives available in terms of market size, competitors, prices, technology available, as well as the consumer profiling (Collis, 2014 n.p). Secondly, consider the Go-to market strategy.  At this stage once the market has been identified a strategy to get into the actual market has to be developed. Models that can be use include the direct model, in-direct model, or the acquisition model (Using Business Analyses, 2014, n.p).

Markets that are much developed calls for the use of the direct model and requires more investment in terms of money and resources. The indirect approach entails partnering with a player who will support the growth and establishment of the business in that market. In this model, it is important to start with one or two partners as you familiarize with challenges and other factors in that market (Greenblatt, 2013, n.p). Acquisition approach is applicable for medium sized firms with stable firms, assets and management teams to enable them develop long-term decisions (Thomas et al., M 2012, n.p). This stage is crucial in facilitating the budget process for the whole process of market entry.

The fourth stage involves identifying the key customers for the BR200 device, prospecting as well as lead generation (Plötner, 2012, n.p). This is achieved by preparing a list of targeted decision makers and a marketing plan. A crucial consideration to make when planning at this point is the available revenue. Market entry mode is a fundamental decision for Sanken as it plans on entering into a new market. Sanken can choose between the exporting, agent, dealer, or sales office mode of entry. Entry timing is also very important for the company which is dependent on the type of the product, competition levels in the particular market, and the prevailing market factors. The market entry strategy for Sanken will map out the approach to follow in selling, delivering, and distributing the BR200 device in the new market.

5.0 Reflection

It is important to note that a company’s entry into new markets provides an opportunity to increase their sales and gain a wide view of the market dynamics as presented by the diversity. Several factors need to be factored in the process to start a business in a new market. First, the organization has to conduct a survey on the market and employ key models such as the PESTEL analysis tool and SWOT. Information gathered through these models gives an insight into the overview of what to expect in terms of competitors, customers, costs, and technology. For instance, in this case the introduction of BR200 device would be informed by vast market, stakeholder, and industry information gathered through market research, market analysis, and stakeholder analysis of the telecommunication industry within Europe.

Once information has been gathered on the opportunities, threats, and potential of the new market it is time to come up with an entry strategy.  The plan is to maximize on the potential and opportunities while minimizing the threats. Sanken will then be able to come up with a budget and guidelines into which approach of entry to employ. The company should avoid at all costs misconceptions concerning any factors when implementing the plan. Lack of proper survey and implementation plans could result to failing of the business. In this study, it was evident that the success of the plan to venture in to a new market with the new product for Sanken is dependent on the viability of the analysis of the telecommunication market.

References

Al-Araki, M 2013, ‘SWOT analysis revisited through PEAK-framework’, Journal Of Intelligent & Fuzzy Systems, 25, 3, pp. 615-625.

Allen, M, Walker, K, & Brady, R 2012, ‘Sustainability Discourse Within a Supply Chain Relationship: Mapping Convergence and Divergence’, Journal Of Business Communication, 49, 3, pp. 210-236.

Baldwin, J, & Yan, B 2012, ‘Market Expansion and Productivity Growth: Do New Domestic Markets Matter as Much as New International Markets?’, Journal Of Economics & Management Strategy, 21, 2, pp. 469-491.

Battisti, M 2013, ‘REASSESSING SEGMENTATION IN THE LABOUR MARKET: AN APPLICATION FOR ITALY 1995-2004’, Bulletin Of Economic Research, 65, pp. s38-s55.

Briciu, S, Căpuşneanu, S, & Topor, D 2012, ‘DEVELOPMENTS ON SWOT ANALYSIS FOR COSTING METHODS’, International Journal Of Academic Research, 4, 4, pp. 145-153.

Collis, DJ 2014, International Strategy : Context, Concepts And Implications, West Sussex: John Wiley and Sons, Inc.

‘Competitive Market Analysis’ 2009, Credo Reference Collections.

De Backer, K, & Miroudot, S 2014, Mapping Global Value Chains, n.p.: Frankfurt am Main.

Dibb, S, & Simkin, L 2009, ‘Implementation rules to bridge the theory/practice divide in market segmentation’, Journal Of Marketing Management, 25, 3/4, pp. 375-396.

Dobbs, ME 2014, ‘Guidelines for applying Porter’s five forces framework: a set of industry analysis templates’, Competitiveness Review, 1, p. 32

Dolnicar, S, & Lazarevski, K 2009, ‘Methodological reasons for the theory/practice divide in market segmentation’, Journal Of Marketing Management, 25, 3/4, pp. 357-373.

Dolnicar, S, & Leisch, F 2014, ‘Using graphical statistics to better understand market segmentation solutions’, International Journal Of Market Research, 56, 2, pp. 207-230.

Ereaut, G 2002, Analysis And Interpretation In Qualitative Market Research, London: Sage.

Fabling, R, & Sanderson, L 2013, ‘Exporting and firm performance: Market entry, investment and expansion’, Journal Of International Economics, 89, pp. 422-431.

Ghazinoory, S, Abdi, M, & Azadegan-Mehr, M 2011, ‘SWOT METHODOLOGY: A STATE-OF-THE-ART REVIEW FOR THE PAST, A FRAMEWORK FOR THE FUTURE’, Journal Of Business Economics & Management, 12, 1, pp. 24-48.

‘Global Semiconductor Industry – Porter’s Five Forces Strategy Analysis – 2016’, 2013, Electronics Business Journal, 2013.

Harwood, T, & Ward, J 2013, ‘Market research within 3D virtual worlds: An examination of pertinent issues’, International Journal Of Market Research, 55, 2, pp. 247-266

Haveman, HA 2013, ‘Follow the Leader: Mimetic Isomorphism and Entry into New Markets’,Administrative Science Quarterly, 38, 4, pp. 593-627.

Hilmersson, M, & Jansson, H 2012, ‘Reducing Uncertainty in the Emerging Market Entry Process: On the Relationship Among International Experiential Knowledge, Institutional Distance, and Uncertainty’, Journal Of International Marketing, 20, 4, pp. 96-110.

Jae Young, C, Jungwoo, S, & Jongsu, L 2013, ‘Strategic management of new products: Ex-ante simulation and market segmentation’, International Journal Of Market Research, 55, 2, pp. 289-314.

James, R., & Raee, M. (2013). An analysis of the telecommunication industry in the Sultanate of Oman using Michael Porter’s competitive strategy model. Competitiveness Review, (3), 234.

John M., M 2014, Chapter 3: Supply Chain Strategies And Planning, n.p.: McGraw-Hill Professional, AccessEngineering.

Jolly, A 2008, Growing Business Handbook : Inspiration And Advice From Successful Entrepreneurs And Fast Growing UK Companies, [N.p.]: [N.p.],

Juan, Y 2014, ‘Market Segmentation, Information Asymmetry and Investor Responses in the Chinese A- and B-Markets’,Australasian Accounting Business & Finance Journal, 8, 1, pp. 79-100.

Kahn, M, & Kahn, M 2010, Sentiment Market Analysis / Michael N. Kahn, n.p.: Upper Saddle River, N.J. : FTPress Delivers, c2010.

Kaufmann, L, & Roesch, J 2012, ‘Constraints to Building and Deploying Marketing Capabilities by Emerging Market Firms in Advanced Markets’, Journal Of International Marketing, 20, 4, pp. 1-24.

Kuen-Hung, T, Chi-Tsun, H, & Mu-Lin, T 2013, ‘Reviews of market drivers of new product performance’, International Journal Of Market Research, 55, 5, pp. 719-738.

Lamore, P, Berkowitz, D, & Farrington, P 2013, ‘Proactive/Responsive Market Orientation and Marketing-Research and Development Integration’, Journal Of Product Innovation Management, 30, 4, pp. 695-711.

Lorca-Susino, M 2014, ‘The Eurozone And The Economic Crisis: An Innovative Swot Analysis’, Economics, Management & Financial Markets, 9, 2, pp. 27-40.

Market Selection And Retail Location Analysis: Writing And Speaking Exercise 2014, n.p.: South-Western.

Millson, Mr 2013, ‘Refining The Npd/Innovation Path To Product Market Success With Partial Least Squares Path Analysis’, International Journal Of Innovation Management, 17, 2, p. -1.

Min, S, Kalwani, M, & Robinson, W 2008, ‘Market Pioneer and Early Follower Survival Risks: A Contingency Analysis of Really New Versus Incrementally New Product-Markets’, Journal Of Marketing, 70, 1, pp. 15-33.

Morley, M 2014, Understanding Markets And Strategy : How To Exploit Markets For Sustainable Business Growth, Philadelphia, PA: Kogan Page.

Nunan, D, & Di Domenico, M 2013, ‘Market research and the ethics of big data’, International Journal Of Market Research, 55, 4, pp. 2-13

Phan, P, & Markman, G 2011, Competitive Dynamics Of Entrepreneurial Market Entry, Cheltenham, UK: Edward Elgar.

Piercy, N 2009, Market-Led Strategic Change : Transforming The Process Of Going To Market, Amsterdam: Elsevier/Butterworth-Heinemann.

Plötner, O 2012, Counter Strategies In Global Markets, Basingstoke: Palgrave Macmillan.

Presutti, W, & Mawhinney, J 2013, Understanding the Dynamics Of The Value Chain, [New York, N.Y.] [222 East 46th Street, New York, NY 10017]: Business Expert Press.

Proctor, T 2010, ‘chapter five: MARKET ANALYSIS’, Strategic Marketing, pp. 82-101.

Quinn, L 2009, ‘Market segmentation in managerial practice: a qualitative examination’, Journal Of Marketing Management, 25, 3/4, pp. 253-272.

Quinn, L, & Dibb, S 2010, ‘Evaluating market-segmentation research priorities: Targeting re-emancipation’, Journal Of Marketing Management, 26, 13/14, pp. 1239-1255.

Rudež, H, Sedmak, G, & Bojnec, Š 2013, ‘Benefit Segmentation of Seaside Destination in the Phase of Market Repositioning: the Case of Portorož’, International Journal Of Tourism Research, 15, 2, pp. 138-151.

Schlager, T, & Maas, P 2013, ‘Fitting International Segmentation for Emerging Markets: Conceptual Development and Empirical Illustration’, Journal Of International Marketing, 21, 2, pp. 39-61.

Simoneaux, S, & Stroud, C 2011, ‘SWOT Analysis: The Annual Check-Up for a Business’, Journal Of Pension Benefits: Issues In Administration, 18, 3, pp. 75-78.

Thomas, A, & Chartered Institute of, M 2012, Analysis And Decision, London: BPP Learning Media Ltd.

Using Business Analyses 2014, n.p.: Gale Virtual Reference Library

Walkenhorst, P, Shaw, W, & Newfarmer, R 2009, Breaking Into New Markets : Emerging Lessons For Export Diversification, Washington, D.C.: World Bank.

Wright, N, & Larsen, V 2014, ‘Capital Investment and Market Segmentation: Making Movies for Ormon Audiences‘, Marketing Education Review, 24, 2, pp. 167-172.

Yeates, D, Paul, D, & Cadle, J 2010, Business Analysis, Swindon: British Informatics Society.

We can write this or a similar paper for you! Simply fill the order form!

International firms Research Assignment

International firms
International firms

International firms

Order Instructions:

INDIVIDUAL ASSIGNMENT

The individual assignment is worth 30% of your final grade.

Each student will be expected to submit an individual assignment of 2,000 words in their Week 8 tutorials and via Turnitin. The required format for the assignment is an ESSAY. The topic is as follows:

Choose and collect two newspaper or periodical articles that have relevance for international firms from developed markets doing business in emerging/developing markets.

Your chosen articles must be published between 23rd June and 11th August 2014 in one of the following newspapers or periodicals:
The Sydney Morning Herald, The Australian, The Australian Financial Review, The Wall Street Journal (US edition), Business Review Weekly, The Economist

Based on your articles you should address the following points within your essay:
What are the implications for international firms doing business within an emerging/developing market? Do you consider the legal, political, cultural and economic differences between home and host countries to be important considerations for international firms?

In your opinion, what is the most relevant macro-environment factor for an international business when choosing to internationalise into an emerging/developing market? Discuss any international business concepts or theories that could be used to help justify your answer.

Include copies of both articles (either the original ‘cut-outs’ or a print out of the article from the newspaper’s website) as appendices to your assignment.

Your essay should incorporate at least 12 different references. These can be sourced from the following:
Academic articles
Relevant textbooks
Periodicals
Newspapers
Relevant online sources

The 12 references should be evenly balanced between these five resource options. Examples of all of these reference options are detailed on pages 4-5 of this guide.

Students are expected to maintain an appropriate standard in presenting their essay Remember to acknowledge your sources throughout the paper using the Harvard referencing system. The report is to be typed and 1.5 spaced (a standard 12 point font should be used). It should be checked for spelling, consistency and clarity of expression.

No extensions will be granted. Late tasks will be accepted up to 72 hours after the submission deadline. There will be a deduction of 10% of the total available marks made from the total awarded mark for each 24 hour period or part thereof that the submission is late (for example, 25 hours late in submission – 20% penalty). This penalty does not apply for cases in which an application for unavoidable disruption is made and approved.

Your essay must be submitted to Turnitin.

We can write this or a similar paper for you! Simply fill the order form!

Constitutional impediments and Commonwealth-State rivalry

Constitutional impediments and Commonwealth-State rivalry
Constitutional impediments and Commonwealth-State rivalry

Constitutional impediments and Commonwealth-State rivalry prevent Australia having effective national, corporate regulation.

Order Instructions:

Topic
“Constitutional impediments and Commonwealth-State rivalry prevent Australia having effective national, corporate regulation.”
Is this statement an accurate description of the situation in Australia today? Discuss, in the light of recent reforms to the regulatory scheme and problems which may arise in the future.

Guidelines
The word limit is 2400 words. If the assignment exceeds the word limit by 100 words or less, there will be no penalty. If the assignment exceeds the word limit by more than 100 words, there will be a penalty of half a mark deducted for each extra 50 words or part thereof. Footnotes will not comprise part of the word count nor will a bibliography. If the assignment word count is well below 2400 words (2100 words or less) there will be penalty.
Refer to the Rules concerning all assignments for the circumstances when these penalties may be waived. Remember that the extension to the submission deadline is exception rather than the rule and it can be granted only in exceptional circumstances.
The assignment may cover all unit objectives, though content will vary with the topic selected. In addition to matters developed in more detail below the marker will examine whether you have:
1. identified and clearly stated the relevant issues;
2. applied relevant legal principles to the resolution of these issues;
3. critically analysed deficiencies in the law and recommended appropriate changes to the law;
4. integrated and evaluated relevant knowledge from both the material covered in this unit and your own independent research;
5. developed and sustained a concise and convincing legal argument through to a logical conclusion;
6. correctly referenced and acknowledged sources;
7. fluent, clear, concise writing, not containing poor expression, grammar or spelling; and
8. answered the specific question asked.

It is most important that your assignment address the issues raised in your chosen topic. Think about the topic and make sure you understand what the topic is about before you proceed. Marks cannot be awarded for irrelevant material, no matter how good that material is.

The assignment should contain:
1. an introduction, clearly setting out the broad direction of the assignment, its objectives, any parameters of the assignment, and perhaps a summary of the arguments;
2. presentation of argument, review of literature and compilation of evidence relevant to the topic;
3. conclusion, clearly summarising the arguments or findings;
4. a reference list, setting out all the books, articles and other sources you have referred to in the course of writing the assignment. You need not have necessarily read each reference from start to finish, but you should have at least looked up each reference;
5. accurate citation of your sources of information. Your written material must be presented in accordance with the most recent Australian Guide to Legal Citation (AGLC) adopted by this School (you can download a copy of the AGLC from ).

Students should note the following:
· Many people are not familiar with the requirements of assignments. Basically they are like any other piece of good writing. They must have a beginning, a middle and an end. They must be organised so that one point leads to another in a logical sequence. Headings and subheadings are usually of assistance to the reader, who should be easily able to ascertain the logic of your arguments. You should look at the articles you read in the course of your research as a model for style and organisation.
· Statements of fact must be supported by referencing in the proper form. Also arguments and ideas you are adopting or disagree with must be properly referenced. This is one of the most important aspects of your assignment, and severe penalties will be imposed if you do not reference. Be aware of the University’s and Law School’s rules on plagiarism. You should avoid overreliance on only a small number of sources. You are expected to have read widely on the chosen topic.
· You are expected to employ your critical and analytical skills in this assignment. Avoid mere description or regurgitation and do not quote excessively. Generally speaking, no more than 10% of the assignment should be direct quotes or substantive copying of other people’s work. Both your observations and your use of other people’s writing should reflect this critical/analytical dimension. In sum, your intellectual input should be clearly discernible in the assignment.
· You are not marked for your political or social views or opinions, but rather for your ability to present coherent, rational and logical arguments, properly supported by authority.
· You are also marked for your ability to express yourself clearly, logically and succinctly. Poor expression, grammar and spelling will detract from your overall mark.

· Many students do not also realise that the more drafts of the assignment that are written, the better standard the final product will normally be. You should aim to find the time to complete at least two, if not three, drafts prior to handing the assignment in. This will be especially important in ensuring that the word limit is not exceeded.

Marking criteria
Important information: You are advised to consider the following information carefully before starting your assignment.
The assignment will be marked according to the following criteria.
Research (40%) You are expected to demonstrate a comprehensive review of the primary law sources (legislation, case law) as well as an adequate review of secondary sources (for example textbooks, journal articles, case commentary, explanatory memoranda, Law Reform Commission reports). Your research should be used to identify and clearly state the relevant issues and legal principles and support your analysis.
Analysis (50%) You are expected to analyse the information gathered and evaluate the relevant legal principles. You are expected to develop your argument logically through clear analysis and apply relevant legal principles to the resolution of issue(s). Your analysis should also:
· integrate and evaluate relevant knowledge from the material covered in this unit;
· develop and sustain a concise and convincing legal argument through to a logical conclusion; and
· importantly, answer the specific question asked.

Technical aspects (10%) You are expected to:
· correctly reference and acknowledge sources;
· use fluent, clear, concise writing that contains clear expression, correct grammar, syntax, sentence structure and spelling; and
· use headings and subheadings (where appropriate), an introduction, conclusion and bibliography or reference section.

SAMPLE ANSWER

Constitutional impediments and Commonwealth-State rivalry

Introduction

Australia is otherwise known officially as the Commonwealth of Australia. Australia is a federation of six states and several territories. The country formed a federation in 1901 after the adoption of a new federal constitution and has since functioned as a federal parliamentary democracy under a constitutional monarchy (http://www.asic.gov.au/). The federal system of government formed in 1901 has three branches namely the legislature, the executive and the judiciary. Executive power is vested with the sovereign (the British monarch) who exercises it through the Governor-General (www.comlaw.gov.au). The Governor-General is appointed by the monarch at the advice of the Prime Minister. The Governor-General can dismiss the Prime Minister if there are substantial grounds to do so. The Commonwealth of Australia has a legislature that is made up of a senate and a house of representatives. Each state in the federation has its own state constitution that guides that state’s legislature, judiciary and executive. These state constitutions however are required to be read subject to the federal constitution (www.comlaw.gov.au).

The impact of constitutional impediments and Commonwealth-State rivalry on effective national corporate regulation

The Australian constitution has a lot of safeguards that provide amble space for an effective national corporate regulation. The constitution provides that any state regulation that is inconsistent with any law that has been passed by the Commonwealth parliament is invalid to the extent of that inconsistency. This therefore ensures that no state regulation can be enacted that will hamper or hinder the functions of corporates from other states and free flow of goods and services (http://www.asic.gov.au/). This ensures therefore that all regulation is applicable throughout the commonwealth states without discrimination. The Commonwealth constitution prohibits establishment of taxes and custom duties among states. This ensures that taxes are uniform throughout the Commonwealth and tariffs are also uniformly set by the federal government pursuant to acts of parliaments enacted by the Commonwealth parliament and approved by the Governor-General. The Federal constitution also provides for free trade among states and prohibits any discrimination among states (http://www.uclaw.com.au/home/;
http://www.asic.gov.au/).

According to Chapter IV of the Constitution (sections 81–105A), the constitution contains provisions to regulate trade and commerce throughout the Commonwealth states of Australia.  Provisions in the current Australian constitutions enable the country to have a single trade area.  The constitution ensures that custom duties are uniform and abolishes protectionist policies between states (MURRAY and PEETZ, 2013). This ensures that corporate regulation is applicable uniformly in all states in the realm. Section 88 of the constitution prohibits state parliaments from imposing custom duties while at the same time empowering the Commonwealth parliament to impose uniform customs duties.  The same section of the constitution provides that trade among states in the Commonwealth of Australia shall be completely free.  These provisions ensure that national corporate regulation in Australia is effective since it could be applied uniformly in all states (http://www.uclaw.com.au/home/).

The composition of the senate and House of Representatives is drawn from all the states that make up the Commonwealth of Australia. In the event of corporate regulation debate in the Commonwealth parliament each state is able to give its input equally through its elected representatives. Laws enacted must be passed by the senate and must be approved by the Governor-General. The monarch can also set aside a law if it is not in the interests of the national government. All these checks and controls ensure that corporate regulation is effective throughout Australia. The Commonwealth parliament has powers conferred by the constitution to make laws on a wide variety of issues that could impact on corporate regulation (http://www.uclaw.com.au/home/). These touch on taxation, bounties on the production or export of goods, borrowing money on public credit of the federal government, postal, telegraph, telephone, seaways, airways etc.  Commonwealth parliament has powers to make banking laws that are applicable in all states. These powers are aimed at making uniform legislation that makes interstate trade uniform, free and fair. National corporate regulation is also anchored on these provisions (http://www.asic.gov.au/).

However, there are some impediments in the constitution that may make effective national corporate regulation impossible to achieve. The first constitutional impediment appears to be in separation of powers between the executive, the legislature and the judiciary. The Constitution in Chapters I, II, and III confer the legislature the power to make laws, confer the executive the power to administer these laws and carry out the business of government through government institutions and confer the judiciary the power to determine legal disputes through established court processes (http://www.uclaw.com.au/home/).  There is however no strict demarcation between executive and legislative powers despite the structures set by the constitution. Sometimes the legislature delegates its legislative power to the executive but may thereafter disallow regulations that the executive makes. This causes confusion and is an impediment that prevents the country from having effective corporate regulation (http://www.uclaw.com.au/home/).

The next impediment is that even though the constitution confers power on the Commonwealth Parliament to make laws, this power is limited to particular subjects which include defense, external affairs, interstate and international trade, taxation, foreign trading and financial corporations, marriage and divorces, arbitration, interstate industrial conciliation and arbitration. This limitation places an impediment on the country in making effective national corporate regulation since it excludes such important areas as criminal law, education, environment etc. Some of these important subjects are handled exclusively by state constitutions which may vary depending on the state in focus (http://www.uclaw.com.au/home/). This hinders uniformity and may create confusion in its application. Under the federal system created by the Australian constitution, it guarantees the continuous existence of each state and preserves each of their constitutions. A state parliament is allowed to make laws on any subject whether corporate or not which is specific to that state and this creates an impediment to effective corporate regulation in Australia. This is because each state can modify or add to its existing corporate regulation and thus make it markedly different from what exists in other states. This would create confusion and make corporates undergo different pieces of regulation on similar issues depending on the state they choose to operate in (http://www.asic.gov.au/).

Unlike the Commonwealth parliament, it has been noted that state parliaments can pass a wide range of laws on the subjects of criminal law, education, roads etc. which would impact on corporate regulation in each state differently. It should be noted however that Commonwealth parliament has been regarded generally as superior to state parliaments. According to Section 109 of the federal constitution, if a valid Commonwealth law is inconsistent with a state parliament law then the Commonwealth law is operational and the state law is inconsistent  and invalid to the extent that inconsistency (http://www.asic.gov.au/).  As far as laws that are made by Commonwealth parliament is concerned, there is no conflict with state parliament laws as a result. The danger arises though where state parliaments make laws on subjects that Commonwealth parliament does not deal with and which have a bearing on corporate regulation. Such laws will impact corporates differently if they are different from one state to the next (TUSHNET, 2013).

Laws touching on corporate regulation have to be approved by the senate and House of Representatives before it is made an act of parliament by the Governor-General. This provides for a lengthy process which may make amending unfavourable acts hard to achieve. Again, state rivalry may work against pieces of legislation drafted by professionals from different states. In situations where legislation is viewed as potentially benefiting corporates from one state and potentially able to give it a big lead in terms of resources, other states might gang up to oppose it even if it is potentially a nice piece of regulation that could benefit Australia as a whole in the long run (http://www.asic.gov.au/).

Actions of the judiciary have also made effective national corporate regulation a mirage. Recent judgments by the High Court have posed a challenge to federal structure of corporate law in Australia. Even though Corporate law in Australia has for many years been viewed as a federal law,  it is a widely held view by many legal minds in Australia that corporate law is essentially made of up of laws specific to each state with some federal features. Each state therefore has a distinctive corporate law that has some features from the federation (http://www.asic.gov.au/). The High Court judgement in the case of New South Wales v Commonwealth (1990) 169 CLR 482 necessitated the requirement that states enact their own Corporations Acts but include some aspects of federalism. In this case the High Court considered section 51 of the federal constitution as an attempt to enact Corporations Act that would be applicable nationally. In this case the court held that matters to do with incorporation of companies are not one of the mandates of the commonwealth parliament and the power to deal with such matter lie with parliaments of each state.   This judgement made it impossible to have a national corporate regulation (http://www.asic.gov.au/).

An attempt by the Commonwealth parliament to institute national corporate regulation in late 1980’s and early 1990’s (including incorporation of companies) was faced by persistent problems which included lack of a uniform administration by  National Companies and Securities Commission and the  Corporate Affairs Commissions of each state. It was also felt that the structure lacked adequate national government enforcement mechanisms. This problem led to negotiations between various state governments and the national government which saw each state being allowed to enact its own Corporations Act but required to add several federalizing features.  Some of the federalizing features included enactment of the Australian Securities and Investments Commission as the national regulator (http://www.asic.gov.au/). The Administrative Appeals tribunal and the Commonwealth Ombudsman were mandated to be corporate regulators at the federal level. Australian Securities and Investments Commission, the federal police and the Commonwealth director of public prosecutions were given the mandate to investigate and prosecute offences under the various state Corporations Acts. Matters arising under the various state Corporations Acts were to be determined by the federal court. Even though the Commonwealth parliament in the High Court judgment in case of New South Wales v Commonwealth implied that it did not have the power to deal with the incorporation of companies a lot of effort in the form of federalizing features were put in place to have national corporate regulation in place (http://www.asic.gov.au/).

However, the authority of the federal High Court to determine cases involving Corporate regulation was thrown out in the case   of Re Wakim (1999) 31 ACSR 99;17 ACLC 1,055 (http://www.asic.gov.au/). In this case the High Court struck down the mandate given after the New South Wales v Commonwealth case which gave federal court cross vesting legislation to determine corporate regulation matters.  In the Re Wakim case, the high court held that it was unconstitutional for the Federal High Court to hear such matters as brought forward in this case under Chapter III of the Australian constitution.  This position was held despite the fact that all state and commonwealth governments had agreed that the Federal court play a role of determining disputes arising under the State Corporations Acts. After this case state governments had to pass emergency validating legislation that upheld previous judgments made by the Federal court since they stood the risk of being declared unconstitutional and therefore null and void (http://www.asic.gov.au/).

The High Court decision in the Re Wakim (1999) 31 ACSR 99; 17 ACLC 1,055. Case had profound and far reaching consequences.  All corporate regulation cases pending in the federal court had to be transferred to their respective state high courts with far reaching financial implications. Many state courts were at a loss as to what jurisdiction still remains with the federal court post Re Wakim case. Expertise which the federal court had acquired over the years was lost after this case. The Re Wakim case is not the only case that proved that constitutional impediments have continued to hamper effective national corporate regulation (RAMSAY, 2000).  In the case of Bond v The Queen, the High Court held that the Commonwealth director of public prosecutions had no power to appeal against a state courts sentence for breach of the states corporations Act under the constitution. The only power that the Commonwealth director of public prosecutions, as regards to a sentence imposed for a breach of a state Corporations Act is to initiate and institute prosecutions for such breaches (LI, 2011).  Another case in focus is the case of The Queen v Hughes. The high court judgement in this case received extensive coverage by the media. In this case prosecuted by the Commonwealth director of public prosecutions the Federal High Court found that Hughes by obtaining $300,000 from investors had breached the Corporations Act of Western Australia. The high court held that appropriate commonwealth legislation needs to be enacted that will be applicable to all states.  Hughes was only able to be prosecuted because he had dealt internationally by investing money in the United States of America (LANSLEY, GIBSON and FOGARTY, 2002).

Conclusion

It is evident by reading the federal constitution that adequate clauses have been enacted which provide for uniform application of corporate laws throughout the states of Australia. The constitution clearly stipulates that states constitutions are to be read subject to federal constitution and any inconsistencies found in state constitutions are to be invalid to the extent of the inconsistencies.  There are some clauses that can be misread and misinterpreted. One of which is the separation of powers which does not easily put a demarcation between executive roles and legislative roles (http://www.asic.gov.au/). Some recent court cases have also added into the confusion. The Re Wakim case is one such case in which the prosecutorial powers of the Commonwealth director of public prosecutions were put into curtailed.  Several strategies have been advanced to resolve this mess. This includes holding a referendum to amend the constitutions to give the Commonwealth director of public prosecutions powers to initiate and institute prosecutions on breach of state Corporations Act (HUMPHRYS, 2013). The next method is by instructing state courts to refer such corporate regulation cases to the federal court for determination. This referral is allowed in the current constitution and is also tested and tried in the United States of America and found to be workable. The final method would be putting in place a split regulation that separates prosecutorial powers between the state governments and the Commonwealth director of public prosecutions. For instance the state courts could handle mergers, acquisitions, etc whereas the federal court handles cases arising from state Corporation Acts (HUMPHRYS, 2013)

References

HUMPHRYS, E., (2013). THE BIRTH OF AUSTRALIA: NON-CAPITALIST SOCIAL

RELATIONS IN A CAPITALIST MODE OF PRODUCTION? The Journal of Australian Political Economy, (70), pp. 110-129.

http://www.uclaw.com.au/home/
http://www.asic.gov.au/

LANSLEY, A., GIBSON, B. and FOGARTY, M., (2002). Corporate governance in Australia. International Financial Law Review, , pp. 33-38.

LI, Y., (2011). The Relationships of Corporate Governance, Government Regulation and Performance of Small Manufacturing Business in Australia. Rochester: Social Science Research Network.

MURRAY, G. and PEETZ, D., (2013). RESTRUCTURING OF CORPORATE OWNERSHIP IN AUSTRALIA THROUGH THE GLOBAL FINANCIAL CRISIS. The Journal of Australian Political Economy, (71), pp. 76-105.

RAMSAY, I., (2000). States, commonwealth put on the gloves: Challenges to Australia’s federal corporate law. JASSA, (3), pp. 26-29.

TUSHNET, M., (2013). Constitution-Making: An Introduction. Texas Law Review, 91(7), pp. 1983-2013.
www.comlaw.gov.au

We can write this or a similar paper for you! Simply fill the order form!

Goralski Dance Analysis Assignment

Goralski Dance Analysis
Goralski Dance Analysis

Goralski Dance Analysis

Order Instructions:

Required text: Jeff Todd Titon et al. Worlds of Music: An Introduction to the Music of the World?s Peoples, Shorter Version/3rd Edition. Belmont, Ca.: Schirmer, 2009, ISBN: 978-0=495-57010-3 (includes 3 audio CDs).

Listen to the Goralski dance suite from the rural Podhale district of Poland, recorded in 5 short sections on CD 1:25-29, textbook pp. 154-163.

A. Each of the five dances is different, but how are they similar? (minimum 250 words)

B. Is there a contemporary American equivalent to such a set of dances? (minimum 250 words)

SAMPLE ANSWER

Goralski Dance Analysis

  1. Each of the five dances is different, but how are they similar?

The first similarity that one notices as he or she listens to the dances is the instruments that are employed. The members of the band use a variety of violins which produce distinct sounds that then make up the music. The second similarity is the presence of voices that are distinctly or ideally male and female with the respective voices dominating the dance at selected times during the song. The third similarity of these dances is the language that is used by the members of the band. All of the songs are sung in the same traditional Polish dialect. Last but not least, the dances had a similar arrangement enabling a listener to predict when the climax of the song will be (Titon, 2009).

  1. Is there a contemporary American equivalent to such a set of dances?

A possible contemporary American equivalent to such dances is the collection of dances performed by ‘cowboys’ from the Western Parts of the country. These dances include line dancing and the cowboy boogie. The reason why this can be considered to be a contemporary equivalent is the fact that the American version always features one or more acoustic guitars and a lead vocalist. During the dance, men and women take up different dance moves at select moments in the duration of the song. The dances can involve a minimum of two people while the upper limit can only be restricted by floor space. The arrangement of country music which is favored by line dancers also follows a predictable arrangement pattern.

References

Titon, J. et al. Worlds of Music: An Introduction to the Music of the World’s Peoples, Shorter Version/3rd Edition. Belmont, Ca.: Schirmer, 2009, ISBN: 978-0=495-57010-3

We can write this or a similar paper for you! Simply fill the order form!

Applying Ethical Frameworks Assignment

Applying Ethical Frameworks
Applying Ethical Frameworks

Applying Ethical Frameworks

Order Instructions:

Applying Ethical Frameworks
The 2011 National Business Ethics survey reported that 45% of respondents witnessed ethical misconduct at work, a record low for the survey; 63% of those respondents reported the misconduct, a record high. Of those whistleblowers, 22% reported retaliation (Ethics Resource Center, 2012).

These statistics seem to indicate increased attention to ethical business practice. However, they also point to an ongoing need to continue to strengthen commitment to ethical business practice. Business professionals and scholars need to know how to face ethical dilemmas and make sound ethical decisions. DBA students should have a basic understanding of various ethical frameworks and understand how these frameworks influence real-world business decisions. Northouse (2013) stated, “ethical theory provides a system of rules or principles that guide us in making decisions about what is right or wrong and good or bad in a particular situation. It provides a basis for understanding what it means to be a morally decent human being” (p. 424). Ethical values are used daily for decision making in business. Understanding and analyzing various ethical frameworks will enable you to better solve ethical dilemmas.

Use academic justification and two scholarly resources, in addition to those presented in the Learning Resources, to support your solution.
•By Day 7 of Week 6, read all of your colleagues’ posts and respond to three colleagues. Provide scholarly critiques of their analyses. For each response, be sure to include all of the following:
•Two strengths of your colleague’s analysis
•Two weaknesses of your colleague’s analysis and solution
•Suggestions of ways to improve upon the weaknesses
•An alternative solution
Be sure to include at least one new scholarly resource to support each response.

SAMPLE ANSWER

Applying Ethical Frameworks

Two strengths of my colleague’s analysis

Colleague #3’s analysis has two significant strengths, first of which is that he provides a framework of the virtues that guided him in arriving at his ethical decisions and the hierarchy of importance of the various values (Bagozzi, Sekerka & Hill, 2009). This framework is especially useful for anyone questioning the basis of his ethical decisions and it is a crucial strength in his solution, despite the final decisions being either ethical or unethical. The decision-making chart is a perfect example of a leader teaching his followers how to make ethical decisions even in scenarios that are ambiguous based on a set of values and their personal importance. The second strength is in the decision, which was totally appropriate as it incorporated all the virtues and attributes of leaders just as stipulated by Northouse (2013). There was no doubt about the leader’s decision.

Two weaknesses of my colleague’s analysis and solution

The first weakness identified is in colleague #1’s response. I find it too general, as it does not recommend any specific actions that the individual faced with the ethical dilemma can take to resolve the dilemma (Jackson, Wood, & Zboja, 2013). The virtue and deontological ethical theories might apply in this scenario, but the question remains, how do they apply? The second weakness identified lies in colleague #2’s response, which gives a lot of detail about what motivates individuals to choose the ethical response. He clearly states that most individuals are motivated by their inner need to do what is right or their fear of consequences. His teleological and deontological solutions are both his strengths and weakness because they advocate for the individual to act ethically for fear of the consequences of his actions. However, a question arises as to how the individual would act in a scenario where his actions would have no visible negative consequences for the accused employee.

Suggestions of ways to improve upon the weaknesses

My suggestion for the improvement of colleague #1’s response is that he should recommend a specific action that the leader should have taken so as to act ethically in accordance with the supporting theories he has given (Morales-Sánchez & Cabello-Medina, 2013). An example of such an action would be the leader saying no to his friend and reporting his actions based on his virtue of honesty and personal responsibility. My next suggestion is for the improvement of colleague #2’s response, which I find to be quite appropriate, but I do feel that it lacks the aspect of the inner personal desire to do what is right. According to Abrhiem (2012), people are motivated to act ethically based on their sense of duty for what is right or wrong and my colleague’s response does not take this fully into account. I believe that as a leader he should have allowed the officers a chance to rethink their actions by making them personally responsible through articulating the consequences of their actions.

An alternative solution

An alternative solution would be to combine both the strengths of colleague #3’s response and the weaknesses of the other two colleagues and to combine them with the suggested improvements. The alternative solution should have a decision-making chart that clearly explains the decision-making process and highlight the values used by the leader in making his decision just like #3’s solution suggests. Lastly the solution should incorporate an element of training where the leader gives the individuals an opportunity to show him that they have learned how not to make unethical decisions again, just as suggested in the improvements section (Thiel, Bagdasarov, Harkrider, Johnson & Mumford, 2012).

References

Abrhiem, T.H. (2012). Ethical leadership: Keeping values in business culture. Business & Management Review, 2(7), 11-19.

Bagozzi, R., Sekerka, L., & Hill, V. (2009). Hierarchical motive structures and their role in moral choices. Journal of Business Ethics, 90, 461-486.

Jackson, R., Wood, C., & Zboja, J. (2013). The Dissolution of Ethical Decision-Making in Organizations: A Comprehensive Review and Model. Journal of Business Ethics, 116(2), 233-250.

Morales-Sánchez, R., & Cabello-Medina, C. (2013). The Role of Four Universal Moral Competencies in Ethical Decision-Making. Journal Of Business Ethics, 116(4), 717-734.

Northouse, P. G. (2013). Leadership: Theory and practice (6th ed.). Thousand Oaks, CA: Sage.

Thiel, C., Bagdasarov, Z., Harkrider, L., Johnson, J., & Mumford, M. (2012). Leader Ethical Decision-Making in Organizations: Strategies for Sensemaking. Journal of Business Ethics, 107(1), 49-64.

We can write this or a similar paper for you! Simply fill the order form!

Business Plan for Urgent Care Center in Anaheim California USA

Business Plan for Urgent Care Center in Anaheim California USA
Business Plan for Urgent Care Center in Anaheim California USA

Business Plan for Urgent Care Center in Anaheim California USA

Order Instructions:

The purpose of this application is to provide the student an opportunity to develop an advanced practice nursing (APN) professional business plan.

BUSINESS PLAN for Urgent Care Center in Anaheim California USA

Introduction to the APN professional business plan:
Introduces the purpose of the paper and addresses all background information elements (who, what, where, when, and why) for the proposed APN professional business plan.

Description of proposed APN business profile:
Individually addresses each element of the proposed APN business profile with discussion of how each element could be achieved if implemented.
When describing the proposed APN business profile, be sure to include: (a) proposed vision statement; (b) proposed services; and (c) proposed process for obtaining all anticipated registrations (i.e., Central Contractor Registration [CCR#]; Clinical Laboratory Improvement Amendment [CLIA#]; Commercial And Government Entity [CAGE#]; Dun & Bradstreet Number [DUNS]; Employer Identification Number [EIN]; Marketing Partner Identification Number [MPIN]; National Provider Identifier [NPI#] and Taxonomy Registration; North American Industry Classification System [NAICS#]; Small Business Administration [SBA#]; Standard Industrial Classification [SIC#]; Trading Partner Identification Number [TPIN]), if implemented.

Presentation of proposed APN service delivery:
Individually addresses each element of the proposed APN service delivery with discussion of how each element could be achieved if implemented.
When presenting the proposed APN service delivery, be sure to include: (a) proposed staffing (emphasis on total number of practice years as a licensed healthcare professional); (b) marketing plan and economic feasibility analysis (address potential sources of funding); and (c) management plan with proposed organizational chart

Conclusion:
An effective conclusion identifies the main ideas and major conclusions from the body of your manuscript. Minor details should not be included. Summarize important aspects of the proposed APN professional business plan.

SAMPLE ANSWER

Business Plan for Urgent Care Center in Anaheim California USA

Introduction

Background

Emergency rooms in Anaheim California are characterized by long queues that translate to long waiting hours and for the young children having critical conditions, pediatric urgent care centers have become an alternative for providing child care especially in the after-hours. Taking care of the chronically ill requires a lot of patience and compassion and even more of these attributes are demanded when taking care of sick children especially in the afterhours. Sickness does not consider convenience and with a few urgent care centers and a population of approximately 345,000 people there is a definite need to introduce extra urgent care centers in Anaheim. There is an ever growing need and urgent requests that require filling due to the shortage of emergency pediatric urgent care centers. To help reduce this burden, the Urgent Pediatric Care Centre (UPCC) will be established on the State College Boulevard to cater for the emergency pediatric needs of the citizens in the area.

Business Profile

Mission Statement

It is the mission of the Urgent Pediatric Care Centre (UPCC) to provide high-quality child-centered care for all the children at an affordable price and in the shortest time possible in all of Anaheim.

Vision Statement

Our vision is to become the best pediatric urgent care centre in the country that provides the high-quality pediatric services through continuous education of our staff at affordable prices and the centre of choice for all children and parents nationally.

Services Offered

Children need special attention and care in times of illness. Therefore, UPCC will provide comprehensive care for the children and cater for the needs of the parent while at the centre. The multidisciplinary team comprising of General Practitioners, pediatric doctors, specialists, nurses, surgeons, and other support staff will provide a wide range high-quality services that are walk-in hours throughout the week and year. These include pharmacy, laboratory and x-ray services for quick diagnosis and monitoring, and a fracture program that is comprehensive and overseen by the pediatric specialist. treatment will be provided by for cuts and bruises, cold and flu-like symptoms, ear infections, burns, throat infections, sprains, and rushes just to mention a few. Apart from these, counseling services will be provided for the parent, guardian and or significant other in case of severe life conditions. Where emergency services are required, the support staff will immediately connect you to the nearest hospital or Emergency Room for specialized treatment. The center will be dedicated towards the provision of care and support to the child patient including their parents in every step in the recovery process. While providing such care parents are required to provide company to their child from the start to finish and be actively involved in the recovery and healing process to ensure acceptance and adherence to treatment and positive treatment outcome. 

Process for Obtaining all Anticipated Registrations

To obtain all the relevant registrations, the following processes would be applied. First is the Clinical Laboratory Improvements Amendments (CLIA). Since the centre intends to provide laboratory services, certification and registration will allow provision of laboratory services through Medicare and Medicaid payments perks. Second, since the centre is going to provide care under different payment plans, the NPI standard will be sought for accountability purpose and for the sake of sharing with other institutions. Finally, for identification purposes, the Employer ID Numbers will be crucial as this is used by the IRS identify a business entity.

Service Delivery

Staffing

Pediatric care involves both the theoretical and evidence-based approach to practice and provision of care. The care here is not limited to the provision of differential diagnosis and treatment of conditions relating to medical interventions and therapeutics that occurs whether there is a disease or not. Interventions here are holistically provided and incorporate the human and family norms in treatment. Therefore, staffing will be done in a manner that supports the United States healthcare system and requirements and meets the needs of the patients. Staffing will involve supporting the United States healthcare system and the need to acquire highly qualified and well experienced and registered staff. Several options of clinical leads are available, and these leads will handle the emerging cases that “walk-in” to these centers and stabilize the patients before further treatment is provided, or referrals made. The leads will be required to have a minimum of eight years of practice as a licensed pediatric caregiver. The total number of staff required is forty to provide the best care possible.

 

Clinical Leads

Number

General Practitioner

1

Pediatric Doctor

1

APRN

1

Lab Specialist

1

Pharmacist

1

Radiologist

1

Medical Staff

 

Nurses

10

Pharmaceutical Technologist

2

Pharmacy Assistant

1

Lab technologist

2

Lab assistant

1

Physician Assistants

4

Counselor

2

Non-medical  staff

 

CEO,

1

Human Resource Manager

1

Chief Financial Officer

1

Accountant

1

Other Staff

6

 Marketing Plan and Economic Feasibility Analysis

The marketing strategy will be focused on the target population of children and their parents in Anaheim. Since there is a specific target group, the marketing strategy can be narrowed down only to address this group. Advertisement and media usage will be at the heart of the centre’s marketing strategy. Since television advertisements are often very effective, a short one-minute advert will be used with most of the media advert being done on local radio stations for a period of two weeks. The publicity and promotional approach that will be significantly used will be the print media. Billboards will be stylishly designed and placed in the region in strategic locations. Adverts will be published in the Newspaper on a daily basis for the first two weeks then on weekends only for the next four weeks. Pamphlets and brochures will also be prepared that will be handed out to individuals on the streets and to large organizations such as schools, hospital, and day care centers just to mention a few. Since gas filling stations often allow businesses to place their advertisements, posters will be prepared that will be placed on filling stations and the same applied to supermarkets, convenient stores, public toilet, or near children play areas. A promotional event will be organized and sponsorship of local events. The opening will be a community event aimed at introducing the staff and practice to the Anaheim populace. Free services such as blood screening will be done on a monthly basis in public institutions and facilities.

The cost structure will be semi-structured depending on the method of payment and source of payment. Medicare, Medicaid, and other insurance programs will have their price structures that will be dependent on the services provided.  There will be three levels of pricing that will be based on a full comprehensive visit at $75, an intermediate problem that is new $65, follow-up visits at $35, and lab services $50. Counseling will be offered free of charge if the child is treated at the centre, however, for those who come from outside, a flat rate of $50 per every 45 minutes will be charged. Educational programs will be free at the hospital, but in case of outside invitations, the fee will be dependent on the location, depth of the program, and number of days the education shall be provided. The closest Urgent care centre here is the Anaheim Urgent Care. They charge higher prices and, therefore, UPCC is expected to attract more clients due to its lower prices and; in addition; they do not open for 24 hours. The centre will seek funds from the government; in addition, the CEO is expected to contribute towards the establishment of the funds. Through community activities, the centre will request for donations, grants, and gifts for establishing and running the institution. Finally, a bank loan will be sought to finance setting up of the centre, and this will be a quarter of the amount required as most financing will come from the government.

Management Plan

UPCC will be incorporated to become a limited liability corporation. This is with the goal of enabling the centre to benefit from taxing regulations, separate liability, and hence similar to a sole proprietorships but with reduced risk associated with sole-proprietorship. This form of business allows a single owner; however, it allows the addition of partners. The main decision maker will be the CEO for the non-medical decisions while the APRN will be the leader decision maker for the non-medical staff; however, this will be on consultation with the management team. This team will comprise of the CEO, CFO, and the HRM.

Conclusion

             From the mission statement, UPCC aims at becoming the best urgent care centre not only in Anaheim but the entire nation. The institution will employ three approaches to ensure efficient registration and compliance with the IRS that are CLIA, EIN, and NPI. This will also ensure it provides care to a large population with different insurance plans and payment methods. The institution will offer a broad range of services that include pharmacy, laboratory and x-ray services for quick diagnosis and monitoring, and a fracture program. These will be offered on top of the conventional treatments in pediatric urgent care centers that include treatment for cuts and bruises, cold and flu-like symptoms, ear infections, burns, throat infections, sprains, and rushes just to mention a few. The centre will employ a total of 40 staff members that are highly qualified and experienced. Although it will be located near a well established urgent care centre it will provide the services at a reduced cost and on a 24 hour basis that will give it a competitive advantage. The government will be the main source of funding, and the rest will be sought through the bank, CEO contributions, and grants and gifts from the community. The CEO will be the overall decision maker, but for the medical staff the APRN will be the head responsible for decision making.

Reference

Cox, C., Hill, M., & Lack, V. (2013). Advanced Practice in Healthcare: Skills for Nurses and  Allied Health Professionals. New York, NY, United States: Routledge.

 We can write this or a similar paper for you! Simply fill the order form!

Local, State, and Federal Partnerships: Terrorism

Local, State, and Federal Partnerships: Terrorism
Local, State, and Federal Partnerships: Terrorism

Local, State, and Federal Partnerships: Terrorism

Order Instructions:

Local, State, and Federal Partnerships: Terrorism
For this level, access the following:

1. Federal Government Partner Guide of the NRF. The “Partner Guide provides a targeted index to information in the NRF core document that is specifically pertinent to local [state and federal] government leaders and emergency management practitioners. The Guide is intended to serve as a ready reference to assist users in quickly locating sections of the NRF that are applicable to local [state and federal] partners.” (Source: FEMA.gov)

2. National Incident Management System (NIMS). NIMS works hand in hand with the NRF. NIMS provides the template for the management of incidents, while the NRF provides the structure and mechanisms for national-level policy for incident management.
Respond to the following:

1. Explain the chain-of-command structure when receiving information about a possible act of terrorism in your city. The incident is confirmed to be the work of terrorists. Now what?

2. Review the NRF and the NIMS in reference to terrorism (e.g., explosions, shootings, biological attacks) and note the locations in these documents.

3. What do the documents note concerning biological, chemical, radiological, and nuclear terrorism?

4. Go to the Texas Department of Public Safety website and find the document regarding the biological terrorism response plan. Summarize the document’s strengths and weaknesses as a response plan in light of the prior questions and readings.

Assignment Expectations
Length: Case assignments should be at least three pages long.
References: IN addition to the required readings, at least two additional references should be included from an academic sources (e.g., peer-reviewed journal articles). The references should be cited within the text and also listed at the end of the assignment in the References section (preferably in APA format).
Quoted material should not exceed 10% of the total paper (since the focus of these assignments is critical thinking). Use your own words and build on the ideas of others. When material is copied verbatim from external sources, it must be enclosed in quotes.
Organization: Subheadings should be used to organize your paper.
Format: APA format is required for this assignment

The following items will be assessed in particular:
• Relevance – All content is connected to the question.
• Precision – Specific question is addressed. Statements, facts, and statistics are specific and accurate.
• Depth of discussion – Points that lead to deeper issues are presented and integrated.
• Breadth – Multiple perspectives and references, multiple issues/factors considered.
• Evidence – Points are well-supported with facts, statistics, and references.
• Logic – Presented discussion makes sense; conclusions are logically supported by premises, statements, or factual information.
• Clarity – Writing is concise, understandable, and contains sufficient detail or examples.
• Objectivity – Paper avoids use of first person and subjective bias

SAMPLE ANSWERS

Local, State, and Federal Partnerships: Terrorism

1. Explain the chain-of-command structure when receiving information about a possible act of terrorism in your city. The incident is confirmed to be the work of terrorists. Now what?

When a possible incident of terrorism is reported in the city of Los Angeles, California, patrol officers will be the first on the scene among other first responders who arrive at the scene with the sole aim of helping the public who may be wounded or in harm’s way. Once the first responders arrive at the scene, they will radio in the situation to their respective departments for appropriate response with the police officers radioing the situation to their base station. A senior officer at the base is usually assigned the case immediately it is reported who then appoints an incident commander who has special training in emergency response who shall be in charge of the operation (Kane, 2004). The incident commander quickly takes over and starts gathering important information from officers who are at the scene while at the same time dispatching an emergency police unit to the scene. The incident commander also coordinates with the city’s emergency response center so as to confirm that the incident is actually an act of terrorism after which the matter becomes a top priority for homeland security, but they will still coordinate with the police and the emergency response command center.
 2. Review the NRF and the NIMS in reference to terrorism (e.g., explosions, shootings, biological attacks) and note the locations in these documents.

According to the NRF document, the references to terrorism are located in the chapters II and II of the document, which are dedicated to response actions and in case of such incidents. The term is mentioned between pages 27 in the introduction to page 70 at the close of chapter III. On page 48, which discuses the role of a Multiagency Coordination System (MACS) whose role is to coordinate events away from the field and allocate resources in high demand within the field (FEMA, 2008a). Page 53 mentions the role of Homeland Security in staffing counterterrorism units. Page 54 mentions the Counterterrorism Security Group (CSG), which is an interagency group that develops terrorism prevention measures. The National Counterterrorism Center (NCS) is mentioned on page 57.

The NIMS document mentions the term terrorism on page 5 all the way throughout the document up to page 148, addressing all forms of terrorism including bioterrorism and nuclear terrorism. There is also a definition of terrorism done by the Homeland Security Act of 2002, which characterizes it as an act that poses danger to human life or has the potential to cause damage to critical infrastructure. In the U.S, it is a violation of state or federal criminal laws, its objective is to coerce or intimidate civilians, or to affect the operations of a government by mass criminal acts (FEMA, 2008b).

3. What do the documents note concerning biological, chemical, radiological, and nuclear terrorism?

The NIMs document is very categorical about all the above types of terrorisms attacks, which should be managed by an Incident Command System (ICS) since they involve multiple agencies and may cover multiple jurisdictions. The ICS should facilitate the coordination of response actions by integrating equipment, personnel, facilities, procedures, and communication system between response teams. The NIMS document also proposes that additional command staff may be necessary for the above terrorism attacks (FEMA, 2008b). An Area Command is also recommended for the above types of terrorism attacks, as they require the coordination of large-scale responses and different types of organizations that are managed by different ICS. Emergency Operations Centers may also be established in times of such terrorism attacks that have significant lasting effects and will usually include staff from a variety of jurisdictions and disciplines. The Operations Section discuses the management of terrorism sites so as to save lives and property, while also establishing control and returning the situation to normal (FEMA, 2008b).

4. Go to the Texas Department of Public Safety website and find the document regarding the biological terrorism response plan.

Strengths

The strengths of the Appendix 6 to Annex H (Biological Terrorism Response Plan) document lie in section IV on situation and assumptions as most of the situation described are correct and extremely accurate, thus, they represent the situation on the ground in the state of Texas (TxDPS, 2011). Situations that describe how terrorist may carry out attacks on specific populations or areas in the state and the motivations for such targeted attacks being to cause mass casualties or to inflict economic loss are extremely accurate. The situation is quite accurate because it reflects the definitions of acts of terrorism, which is contained in the NIMs document. Another appropriate situation is described as a biological terrorism attack that may target critical infrastructure and vital resources. The assumptions in the document are also appropriate as they reflect the nature of terrorism attacks, such as in order for a response to a bioterrorism attack to be successful, accurate information should be released to the public on time so that they can take appropriate measures regarding public health issues (TxDPS, 2011). Most of the other assumptions are also quite accurate.

Weaknesses

The main weaknesses of the document lie in its description of the concept of operations and the biological terrorism response strategy and policy, which I find is quite inadequate and might not reflect the true situation on the ground during bioterrorism attacks. I recommend that the department adopts much faster detection systems such as the use of monitoring drones to minimize the time lag between the biological attack and its detection. Such measures will ensure that the response have maximum effect.

References

Kane, J. (2004). The critical incident response manual for supervisors and managers. California: D-Prep, LLC.

FEMA. (2008, January). National Response Framework. Washington  DC. Department of Homeland Security.

FEMA. (2008, December 18). National Incident Management System. Washington DC. Department of Homeland Security.

Texas Department of Public Safety. (2011, September). State of Texas Emergency Management Plan. Texas: Texas Department of State Health Services

We can write this or a similar paper for you! Simply fill the order form!