Operations Management Essays (Examples)

Studyspark

Study Document Study Document

Elite Business Solutions EBS Worldwide Inc Field Report

Pages: 8 (2504 words) Sources: 5 Document Type:Essay Document #:33805230

Elite Business Solutions (EBS) Worldwide, Inc.
Introduction
Change management is a crucial part of any business because, given the ever-shifting economy and the relevant economic forces, a business must change to adapt … economy and the relevant economic forces, a business must change to adapt to the prevailing market forces (Doppelt 2017). The process of change management can either be successful or a failure, and its success or failure can significantly affect the continuation of the business. It is not … a failure, and its success or failure can significantly affect the continuation of the business. It is not always that failure of change management will translate to failure of the business, but it can significantly affect growth. This paper focuses on the Indian business environment by analyzing … Medium Enterprise (SME) and an Entrepreneur who has experience of managing change. The analysis of the business will be done through……

References

References

Doppelt, B., 2017. Leading change toward sustainability: A change-management guide for business, government, and civil society. Routledge.

EBS Worldwide Inc., 2009. Retrieved from http://www.ebsworldwide.biz/index.php

Financial Express, 2002. EasyBuyMusic renames itself, expands product range. Retrieved from  https://www.financialexpress.com/archive/easybuymusic-renames-itself-expands-product-range/37717/ 

Rodrigues, M., 2012. Five entrepreneurs tell us how they reinvented themselves. India Today. Retrieved from  https://www.indiatoday.in/magazine/supplement/story/20120813-business-entrepreneurs-stock-vinay-gupta-nikhil-velpanur-759294-2012-08-01 

Shirey, M. R. (2013). Lewin\\\\\\\\\\\\'s theory of planned change as a strategic resource. JONA: The Journal of Nursing Administration, 43(2), 69-72.

Studyspark

Study Document Study Document

Database Security Backup Or Recovery

Pages: 7 (2090 words) Document Type:question answer Document #:98484993

… as each process must wait for the “QuantityOnHand” resource to be unlocked before processing. If the optimistic approach is taken, most of the operations for both transactions are run independently until the lock, verify, and update part, which is a relatively shorter delay and equally without deadlock. … time. This reduces the tendency for multiple failed transactions and speeds up the entire operation.
Part 2: Security and Backup/Recovery
7. Suppose that management at Bev’s Boutique identifies four groups of users: sales personnel, managers, administrative personnel, and system administrators. Managers and administrative personnel can perform Item ……

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

… social life of a nation depends upon having a functioning energy infrastructure (Maras, 2014). Making sure that the “generation, transmission, distribution, and system operations” of the energy infrastructure are secure is a top priority of every nation that aims to survive in an increasingly hostile world (Wilshusen, … is part of the CBRN Response Enterprise. Its mission and capabilities in response to a CBRN attack focus mainly on search and rescue operations. For instance, if a bomb is used in an urban area, the National Guard will conduct a search and rescue operation to find … beneath piles of rubble and help bring survivors of the attack back to the surface where they can be treated.
The resources the National…[break]…operations can be conducted and intelligence and law enforcement shared and coordinated (Pate et al., 2007). Interagency operation centers are crucial to the provision ……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… meant the availability of vast quantities of data, which also creates considerable risks to the data itself, computer systems, and critical infrastructures and operations it supports. Despite developments in information security, numerous information systems continue to display susceptibility to both external and internal breaches (Suduc, Bîzoi & … data – i.e., individuals, groups, programs, or devices). Moreover, these measures also include authorizing access ("Which entities are permitted to carry out what operations on a given object?") and decision auditing ("what occurred and what was the reason for its occurrence").
The goal of user access control …
Audit frameworks
i. ISO 27001 Framework
ISO 27001, a kind of taxonomy of potential controls, outlines conditions for the establishment, adoption, monitoring, maintenance, operations, review, and improvement of a documented ISMS (Information Security management System) for overall organizational risks. This standard aims at ensuring appropriate, reasonable security controls are chosen to safeguard data……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Trends In Civil And Criminal Liability In The Private Security Industry

Pages: 2 (698 words) Sources: 4 Document Type:Essay Document #:47555416

… industry will become generalists in the next century. The industry must be well versed in a number of disciplines. It must base its operations and decisions on demographic and economic trends, and rapid technological changes. Traditionally, the private security industry focused mainly on security and safety of … requires extensive knowledge in other emerging critical areas to become successful. The additional areas include, but are not limited to law, computers and management (Dempsey, 2008).
Current and future private security companies require extensive knowledge of the law. Legislations governing the industry have either been passed by … industry have either been passed by various states or in the processed of being passed. Furthermore, several federal laws indirectly or directly affect management of the private security industry. For instance, legislation on denying employers polygraph use in pre-employment screening and drug testing have significantly affected the … industry leadership must be cognizant……

References

Works Cited

Dempsey, John S. Introduction to Private Security. Belmont, CA: Thomson Wadsworth, 2008. Print.

Encyclopedia of Security Management: Techniques & Technology. Place of publication not identified: Elsevier Science, Inc, 1993. Print.

Nemeth, C.P. (2018), Private Security: An Introduction to Principles and Practices, CRC Press

Nemeth, Charles. Private Security and the Law. , 2011. Internet resource.

Studyspark

Study Document Study Document

Strengths And Weaknesses Of Various Organizational Behavior Theories

Pages: 14 (4343 words) Sources: 16 Document Type:Essay Document #:17367904

… who helps them learn what they need to know in order to succeed.…[break]…have been cancelled with substantial loss of revenue;
· Government and management have invariably come out as strong critics of union action and remained firm in disapproval;
· Unions have been derecognized and their offices … their offices shut down;
· Employees have been dismissed, but reinstated later;
· Unions have been recognized again and continued to function;
· operations have been resumed after various lengths of partial shutdown.
Clearly, these efforts ignored the new reality faced by Air India in its post-merger … that claimed the lives of 329 people, including passengers and crew members (Ribkoff 2012). This tragedy underscored the seriousness involved in Air India’s operations as well as the need for good working interrelationships between its numerous divisions in order to provide the safest and most reliable air ……

References

References

‘About Air India.’ Air India. [online] available:  http://www.airindia.in/about-airindia.htm .

Arena, MJ ‘Understanding Large Group Intervention Processes: A Complexity Theory Perspective.’ Organization Development Journal, 27, no. 1 (Spring 2009): 49-53

Braunstein, JR and Zhang, JJ ‘Dimensions of Athletic Star Power Associated with Generation Y Sports Consumption.’ International Journal of Sports Marketing & Sponsorship, 6, no. 4 (July 2005): 242-245.

Buble, M and Juras, A ‘The Relationship between Managers\\' Leadership Styles and Motivation.’ Management: Journal of Contemporary Management Issues, 19, no. 1 (June 2014): 161-165.

French, JRP & Raven, B ‘Bases of power.’ In D. Cartwright (Ed.), Studies in Social Power (pp. 150-167). Ann Arbor, MI: University of Michigan, 1959.

Gruia, GC and Kavan, M ‘An Off-Line Dual Maximum Resource Bin Packing Model for Solving the Maintenance Problem in the Aviation Industry.’ Global Economic Observer, 1, no. 1 (January 1, 2013): 135-140.

Hillman, AJ, Withers, MC and Collins, BJ ‘Resource dependence theory: A Review.’ Journal of Management, 35, no. 6 (2009): 1404-1427.

Jain, AK ‘Organizational Citizenship Behaviour as a Potential Source of Social Power.’ Indian Journal of Industrial Relations, 45, no. 3 (January 2010): 396-401.

Studyspark

Study Document Study Document

Counterintelligence

Pages: 12 (3490 words) Sources: 6 Document Type:question answer Document #:11133529

… and ONCIX plans to use automated records checkers to help identify applicable counterintelligence information that would assist in identifying an insider threat.[footnoteRef:4] Risk management is also part of its strategy: insider threat methods are meant to include counterintelligence equities within a risk-based framework for detection purposes. [4: … will not be able to function in any meaningful manner, regardless of the technological support systems used to monitor employee behaviors.
The successful operations in U.S. Counter-Intelligence will depend highly upon the work of employees in the ONCIX, and these workers will need to buy into the ……

References

Bibliography

Counter intelligence for National Security, CIA, 1993. https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol2no4/html/v02i4a10p_0001.htm

Johnston, David and James Risen, “U.S.had evidence of espionage,” New York Times, 2001. https://www.nytimes.com/2001/02/23/us/us-had-evidence-of-espionage-but-fbi-failed-to-inspect-itself.html

National Counterintelligence Strategy of the United States of America 2016 (Strategy).  https://www.dni.gov/files/NCSC/documents/Regulations/National_CI_Strategy_2016.pdf 

Prunckun, Hank. 2012. Counterintelligence Theory and Practice, Lanham: Rowman&Littlefield Publishers Inc. Read the following: Chapters 8 to 14, pages 131 to 217. Appendices A to D, pages 219 to 231.

Richelson, Jeffrey. 2007. “The Pentagon’s Counterspies: The Counterintelligence Field Activity (CIFA).” (September 17). National Security Archive. Accessed January 19, 2017.  http://nsarchive.gwu.edu/NSAEBB/NSAEBB230/ .

Van Cleave, Michelle. “Strategic Counterintelligence: What Is It and What Should We Do About It ?” 2007. CIA Center for the Study of Intelligence. https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html

Studyspark

Study Document Study Document

Valiant

Pages: 8 (2450 words) Sources: 3 Document Type:Marketing Plan Document #:95871630

… is committed to the expansion of economic prospects and developments for LGBTQ individuals, and the select certifying entity for LGBTQ-owned businesses (NGLCC, 2019).
management Team and Company Structure
The company structure of Valiant Marketing will be hierarchical comprising of different rakings using the top-down approach:
Industry Analysis
… and services. Social media platforms and online advertising is on the rise and progressively more businesses are seeking services to market their business operations online. Automated processes facilitate expedient business processes, which not only bring in a greater consumer base but at the same time also increase … plans afterwards to go global. Subsequent to having a greater number of consumers and increase service sales, we plan to extend our business operations to neighboring states and further to internationally. The LGBTQ community is increasing all over the world. From a psychographic perspective, Valiant Marketing will ……

References

References

NGLCC. (2019). About NGLCC. Retrieved from:  https://www.nglcc.org/ 

Hill, C., & Jones, G. (2011). Essentials of strategic management. Nelson Education.

Hill, C. W., Jones, G. R., & Schilling, M. A. (2014). Strategic management: theory: an integrated approach. Cengage Learning.

 

Studyspark

Study Document Study Document

Nike S Colin Kaepernick Ad Campaign

Pages: 7 (2187 words) Sources: 6 Document Type:Research Paper Document #:13776078

… have lost jobs to overseas. Nike could be a Made in America company, which would boost its image and allow it to maintain operations as the virus……

References

References

About Nike. (2020). Retrieved from  https://about.nike.com/ 

Bartash, J. (2020). Apple’s Covid-19 warning. Retrieved from  https://www.marketwatch.com/story/how-much-will-covid-19-hurt-the-us-economy-its-anyones-guess-right-now-2020-02-12 

Delventhal, S. (2019). Nike facing challenging dynamics. Retrieved from  https://www.investopedia.com/news/nike-facing-challenging-dynamics-goldman-sachs/ 

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Neikirk, T. (2019). Nike sales are again way up. Retrieved from  https://hillreporter.com/nike-sales-are-again-way-up-following-conservative-boycott-40033 

Nusser, S., Mahle, I., & Pätzmann, J. U. (2015). How Social Commerce Communication can support Brand Loyalty: An Analysis of Nike‘s Efforts in Facebook Community Management. Markenbrand, (4/2015), 48-57.

Oyedele, A. (2018). Nike surges. Retrieved from  https://markets.businessinsider.com/news/stocks/nike-earnings-q4-2018-2018-6-1027328545 

Storey, G. (2019). Nike and the importance of meaningful brand values. Retrieved from  https://polpeo.com/nike-and-the-importance-of-meaningful-brand-values/

Studyspark

Study Document Study Document

Strategic Marketing Plan For Lemon Thirst Energy Drink

Pages: 11 (3288 words) Sources: 10 Document Type:Research Paper Document #:54106401

… it only has two employees who are the founders. However, the founders plan to hire ten staff soon.
When the Company starts full operations, the two founders will be in charge of the entire structure. One of the founders will head the production and operations departments of the Company, while the other will head the administration, marketing, and finance departments of the Company. Because the Company does not ……

References

References

Ahmed, R. R., Vveinhardt, J., Streimikiene, D., & Awais, M. (2016). Mediating and Marketing factors influence the prescription behavior of Physicians: An Empirical Investigation. Amfiteatru Economic Journal, 18(41), 153-167.

Al-Shaar, L., Vercammen, K., Lu, C., Richardson, S., Tamez, M., & Mattei, J. (2017). Health effects and public health concerns of energy drink consumption in the United States: a mini-review. Frontiers in public health, 5, 225.

Barney, J. B., & Hesterly, W. S. (2010). Strategic management and competitive advantage: Concepts and cases (pp. 4-25). Upper Saddle River, NJ: Prentice-Hall.

Freeman, B., Kelly, B., Vandevijvere, S., & Baur, L. (2016). Young adults: beloved by food and drink marketers and forgotten by public health?. Health promotion international, 31(4), 954-961.

Hitt, M. A., Ireland, R. D., & Hoskisson, R. E. (2012). Strategic management cases: competitiveness and globalization. Cengage Learning.

Kotler, P., & Armstrong, G. (2010). Principles of marketing. Pearson education.

Kunst, A. (2019). Energy drinks consumption: consumers of energy drinks in the United States in 2018. Statista.

Mahajan, S. (2020). Sports And Energy Drinks Market Size & Share Analysis Report, 2019-2026.

Join thousands of other students and

"spark your studies".