Analyze organizational behavior challenges faced by management professionals.

In this assignment, you will create a PowerPoint presentation that outlines what you believe will be the biggest challenges facing organizations in the next 20 years.

Write an eight (8) slide presentation in which you:

  1. Provide a title slide (as indicated in the format requirements below) followed by a slide with an introduction to your presentation.
  2. Presentation should include your choice of the five (5) challenges you believe organizations will face in the next 20 years. Only include one (1) challenge and your explanation for choosing that challenge per slide for a total of five (5) slides.
  3. Provide one (1) summary slide which addresses key points of your paper.
  4. Provide notes on each slide, indicating what you would say if you were actually presenting in front of an audience.

Your assignment must follow these formatting requirements:

  • This course requires use of new Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
  • Format the PowerPoint presentation with headings on each slide and three to four (3-4) relevant graphics (photographs, graphs, clip art, etc.), ensuring that the presentation is visually appealing and readable from 18 feet away. Check with your professor for any additional instructions.
  • Include a title slide containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.

The specific course learning outcome associated with this assignment are:

  • Analyze organizational behavior challenges faced by management professionals.

Write a brief analysis, in your own words of how the article relates to the selected chapter Key Term.

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

Analyze the issues Choice is likely to experience as it expands its network to full global reach.

Read the case study titled “Choice Hotels International” found in attachment

Write a fully developed paper in which you:

  1. Assess the two distinct networking functions.
  2. Analyze the issues Choice is likely to experience as it expands its network to full global reach. Provide a rationale for your answer.
  3. Critique the Choice implementing free high-speed Internet access for all guests in its Clarion Hotels and Comfort Suites from the security point of view.
  4. Use at leastfour quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Explain the rationale for the logical and physical topographical layout of the planned network.

Write a five to ten (5-10) page infrastructure document in which you:

  1. Provide an introduction that cover the paper.
  2. Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.
  3. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network. Note: The graphically depicted solution is not included in the required page length.
  4. Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.
  5. Create and describe a comprehensive security policy for the company that will:
  • Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.
  • Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information

Effective and efficient use of biometric technology will play a key role in automating method of identifying living persons based on individual physiological and behavioral characteristics. Provide the comprehensive narratives on the advantages and disadvantages of a physical biometric system?

Deterrence is designated to dissuade potential violators from launching threat and criminal acts against organizations. Aura Security in physical security is often heightened by security professional measures such as signs placed along perimeters near openings of the facility. Aura security strives to create strong phycological deterrent warning offenders and keeping them away from the facility. Deterrence has very limited or no physical security mechanism and Detection apparatus is used in most facilities to detect perpetrators. Such devices include devices closed circuit television (CCTV), intrusion sensors, duress alarms, weapons screening devices and protective dogs. Traditionally, these devices are installed to identify violators upon arrival in the facility.

The university president is very concerned about external threats. What countermeasures such as deterrence or detection must be implemented on campus to enhance student, faculty and staff security?

Recognizing the fact usernames passwords are the weakest link in an organization’s security system because username and password are shareable, and most passwords and usernames are vulnerable and ready to be cracked with a variety of methods using adopting a record number of devices and platforms connected to the Internet of Things daily and at an alarming rate.

Provide the all-inclusive and systematic narratives of the impact of physical biometric operations on the current and future generation.

Question-3:

Effective and efficient use of biometric technology will play a key role in automating method of identifying living persons based on individual physiological and behavioral characteristics.

Provide the comprehensive narratives on the advantages and disadvantages of a physical biometric system?

Briefly state below your graph (on the Excel spreadsheet) if the inflation rate more closely follows the growth in M1 or M2, and explain why this might be the case.

Using data from the Federal Reserve Bank of St. Louis FRED database, graph the CPI inflation rate, M1 money growth, and M2 money growth for the US annually for the past 20 years. Briefly state below your graph (on the Excel spreadsheet) if the inflation rate more closely follows the growth in M1 or M2, and explain why this might be the case.

2) Using the same data source, graph the CPI inflation rate against the 3 month Treasury bill interest rate and the 10 year government bond interest rate for the same 20 year time period. Briefly state below your graph if the 3 month or 10 year interest rate is more sensitive to changes in inflation, and explain why this might be the case.

3) For your one page summary brief, discuss the impact that an increase in the expected inflation rate would have on your optimal portfolio allocation at this stage of your life (you may assume that you have a portfolio of $100K for this exercise). Be as specific as possible. (e.g. What other economic factors would affect your decision?, Does the current business cycle matter for your choice?, etc.)