Saturday, March 28, 2020

Global Health And Issues In Disease Prevention

Global Health And Issues In Disease Prevention

Why do we need Intellectual Property Law?

Intellectual Property Law
1. Why do we need Intellectual Property Law?
2. Compare and contrast patents, trademarks, copyrights, and trade secrets in detail.
3. How do you protect inventions internationally? Copyrights internationally?
4. What is a patent troll?
5. Explain a strong versus weak trademark.
6. Summarize the ACPA.
7. Define fair use. How does the concept of fair use affect owner’s rights?
8. Describe the highlights of the DCMA and its provisions.
9. Explain why Napster was not able to hide behind the DCMA.
10. What are the implications (financial, business, legal) of online music sharing services?

List of the input variable assumptions

Investment Project & Project Analysis.
1. Project Description. (Strongly recommended to keep revising along with creating spreadsheet in Excel. Must be realistic based on research.)
e.g. United Pigpen is considering a proposal to manufacture high-protein hog feed. The project would make use of an existing warehouse, which is currently rented out to a neighboring firm. The next year’s rental charge on the warehouse is $100,000, and thereafter, the rent is expected to grow in line with inflation at 4% a year. In addition to using the warehouse, the proposal envisages an investment in plant and equipment of $1.2 million….
2. List of the input variable assumptions. (Why should be this amount? Must be realistic based on research. All input assumptions MUST be described here in Word and in a cell with Note on Excel Spreadsheet) e.g. United Pigpen case Input variables
a. Investment $1.2 million: a similar size of investment from a competitor or industry (assumptions and research with the citation)
b. Revenue $4.2 million: reasonable expected sales price per unit, expected number of goods sold (assumptions and research with the citation)
c. Cost of Capital 12%: Industry average cost of capital (assumptions and research with the citation)
*Please research and complete just one or two variables every day as if you’re planning your own project. You will be enjoying this assignment. (You have plenty of time to complete until the due date, but clock is ticking. Work on just about an hour every day and start right now to avoid procrastinating and cramming.)
3. Investment Proposal. (Why investors or your company should invest) e.g. Blooper Industry case
Conclusion with key points.
Results of DDP(how the project shortens the payback)
NPV(how much value expected)
IRR(how much profitable than cost of capital)
PI(how much profitable than initial investment)
Break Even Analysis(how many units to sell)
Sensitivity Analysis (which variable is most sensitive)
Scenario Analysis(considering risks)
And other comments to propose the investment.

Investment Project & Project Analysis.

Investment Project & Project Analysis.
One of main highlights of the course for the midterm is valuing an investment project and analyzing it. Students will be able to perform the procedure of creating a spreadsheet for a hypothetical project, evaluate it with four investment criteria, and demonstrate breakeven analysis, sensitivity analysis, and scenario analysis.
This assignment is very important in that students will face this type of interview questions in hiring procedure and that students planning their own business must provide investors with the investment project spreadsheet to propose a funding. Please carefully read the instruction to get a high grade and to prepare your future.
A. Instruction
1. Students will create a hypothetical but realistic project just like United Pigpen (Excel Exercise) case and submit Investment proposal in Word file and Spreadsheet in Excel file.
2. Word file MUST include: (1) Project description (2) List of Input variable assumptions (3) Investment proposal (Please use the Word format below.)
3. Excel file MUST include: (1) Input variable assumptions in each cell using Note (2) FCFs spreadsheet model (3) Investment criteria (4) Breakeven analysis (5) Sensitivity analysis (6) Scenario analysis.
   a. You may use Spreadsheet from Excel Exercise example, which is a basic format, but students should develop their own spreadsheet model beyond the example in order to get a higher grade.
   b. Any other project spreadsheet from other websites or Google is acceptable but MUST include all the required work mentioned above.
B. Grading Criteria
1. Must submit Both Word file and Excel file.
2. SharingExcelmodel, project description, orlist of the assumptions with others will result in Zero grade both giver and receiver. (Turnitin over 50%). This is an alternative of Midterm Exam.
3. Reduction criteria. (Refer to the rubrics for the specific point reduction.)
a. Just using the same Excel Example model without development won’t get full credit.
b. Missing or Sharing the requirements on the Word file.
c. Missing or Sharing the requirements on the Excel file.
d. Failure of connecting Input variablesall the way throughspreadsheet. All the values inspreadsheet MUST be connected to input variables. Don’t put a hard number anywhere in spreadsheet except Input variables. (That’s the mostserious failure of spreadsheet in the real business! Investors or your boss will try to change the variables to see how the investment criteria change.)

Prevention and Response Strategies

Prevention and Response Strategies
Prior to or when security measures fail, it is essential to have in place several response strategies. In 1,250-1,500 words:
1. Explain how negotiations with accreditors on compliance should be dealt with. Provide an example.
2. Present appropriate response strategies that can be put into action (i.e., breach notification policies).
3. Present employee training recommendations for creating awareness of the organization's security measurements.
4. Explain how to obtain feedback on the effectiveness of security policies from stakeholders. Provide an example.
5. Explain how to identify new threats, vulnerabilities, or any countermeasures that may not have been present/available when the initial security measures were first implemented. What mechanisms could be in place to catch any oversights? Explain how this would be reported/communicated. Example, an IT professional explains why a specific device is configured, why if it is compliant it will NOT work, or why if it is NOT compliant it does work.
6. Explain how operational managers, stakeholders, and/or individuals affected will be notified. Provide examples for each.
Identify organization management 

workplace conflict, write a reflective conflict analysis memo

workplace conflict, write a reflective conflict analysis memo in which you address the following:
Describe the situation and conflict.
Explain how you handled the conflict at the time. Describe strategies you employed to resolve the conflict.
Reflecting on the final outcome, explain how you would approach the conflict differently to improve your effectiveness at managing the situation.
Referencing the IHI (2017) and ANA (2015) resources, and the AONL competencies, explain how you might implement strategies to encourage a culture of safety and respect to decrease conflict and bullying in the workplace in the future.

Digital Media And Marketing

Digital Media And Marketing
Consumers as well as brands possess their own personalities. Consumers often select and utilize brands whose character is similar to their own self-concept (actual self-concept, ideal self-concept or other’s self-concept).
Kotler and Keller (2016) discuss "five key psychological processes — motivation, perception, learning, emotions and memory — fundamentally influence consumer responses" (p. 72).
For this assignment, you will relate your own personality to the brand personality of a recent purchase you made. In a Microsoft Word document, write a report analyzing one of your most recent purchases of a car, computer, furniture, or clothing and discuss your motivation for the purchase. Be sure to address the following questions:
Did any person or marketing communication from the brand influence your purchase?
What does the purchase say about your own self-concept ideas?
How would you define the personality of the purchased brand as compared to the definitions stated in the chapter by Stanford’s Jennifer Aaker (p. 71) and is it consistent with your own?