Study Document
… creating a link between businesses and the LGBTQ community. There are five fundamental services that our company will render to our consumers:
1. public relations
This will include developing a wide range of programs and products that are means to sustain or improve the image and reputation of … community is increasing all over the world. From a psychographic perspective, Valiant Marketing will target companies that are seeking to create a business relations and affiliation with consumers and businesses in the LGBTQ community, with the main of changing how these consumers perceive them and have an ……
References
NGLCC. (2019). About NGLCC. Retrieved from: https://www.nglcc.org/
Hill, C., & Jones, G. (2011). Essentials of strategic management. Nelson Education.
Hill, C. W., Jones, G. R., & Schilling, M. A. (2014). Strategic management: theory: an integrated approach. Cengage Learning.
Study Document
…
In early 1991, the United States launched Operation Desert Storm in response to Saddam Hussein’s invasion and occupation of Kuwait while the American public held its collective breath to see whether Hussein’s threat to wage “the mother of all battles,” including threats to use chemical weapons of … duty to “rally ‘round the flag” in times of crisis, including most especially when the United States is at war. Consequently, the American’s public’s response to Operation Desert Storm was no exception, at least during the early phases of the conflict and immediately thereafter. In this regard, … immediately thereafter. In this regard, Lindsey and Smith (2003) report that, “The Iraq War validated a basic rule of American politics: the American public closes ranks in times of national crisis” (p. 21).
Indeed, the same reaction has been experienced to some extent in response to the … (p. 21).
Indeed, the same……
References
Curtis, J. (2015, November). Reflecting on strategic results of Operation Desert Storm. Army, 65(11), 24-27.
Khan, H. (2011, July 1). An unbiased estimate of present American competitiveness from deontological and teleological perspectives of utilitarianism. Competition Forum, 9(2), 348-352.
Klotzer, C. L. (2002, October). A lesson for Americans: Desert Storm operation reports were full of lies and distortions. St. Louis Journalism Review, 32(250), 34-39.
Lindsey, J. M. & Smith, C. (2003, Summer). Rally 'round the flag: Opinion in the United States before and after the Iraq War. Brookings Review, 21(3), 20-24.
Operation Desert Storm. (2020). U.S. History. Retrieved from https://www.ushistory.org/ us/60a.asp.
Stilwell, B. (2015, September 12). 21 facts about the first Gulf War. Military.com. Retrieved from https://www.military.com/undertheradar/2015/09/21-facts-about-the-first-gulf-war .
Taylor, A. (2016, January 14). Operation Desert Storm: 25 years since the first Gulf War. The Atlantic. Retrieved from https://www.theatlantic.com/photo/2016/01/operation-desert-storm-25-years-since-the-first-gulf-war/424191/ .
Tilford, K. H., Jr. (1993, Summer). Review: The meaning of victory in Operation Desert Storm: A review essay. Political Science Quarterly, 108(2), 327-331.
Study Document
… is viewed as needed by both sides because communication barriers exist and prejudices are ingrained. Instead of seeing one another as enemies, a public health approach like that recommended by Wynia et al. (2016) should be adopted to raise awareness and fill the education gap. For people … that is empathetic. To combat these groups, a change in culture is needed, which can be facilitated by a three-pronged approach using a public health method, governmental collaboration, and a change in laws regarding the expression of polarizing views. Future research for scholars should focus on how……
References
Breger, M. L. (2017). Reforming by re-norming: How the legal system has the potential to change a toxic culture of domestic violence. J. Legis., 44, 170.
Beinart, P. (2017). The rise of the violent left. Retrieved from https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ " target="_blank" REL="NOFOLLOW">
Study Document
… media platforms can be used by medical companies, with respect to doctors gaining referrals and the potential for patient information to be spread public in violation of the privacy rights of patients (Lane, 2019). Moreover, aside from issues of compliance, the nature of marketing has changed to … inquire about it and put pressure on their doctor to prescribe it. These critics feel it is also a way to get the public more used to the idea of a new drug coming to market that is advertised as something that will solve their ailments (while … critics. This is especially true in the social media age, where one complaint can trigger a landslide of vitriolic abuse and create a public relations nightmare for the company in the process. Therefore, it is better to be safe than sorry and to avoid controversial methods of marketing.
… than sorry and to……
References
Arnold, D. G., & Oakley, J. L. (2013). The politics and strategy of industry self-regulation: the pharmaceutical industry's principles for ethical direct-to-consumer advertising as a deceptive blocking strategy. Journal of Health Politics, Policy and Law, 38(3), 505-544.
Blythe, J. (2009). Key Concepts in Marketing. Los Angeles: SAGE Publications Ltd.
Chand, S. (2019). Target Marketing: Four Generic Target Marketing Strategies. Retrieved from http://www.yourarticlelibrary.com/marketing/target-marketing-four-generic-target-marketing-strategies/13400
Dolliver, M. (2009). Take care when targeting the younger generations. Retrieved from https://www.adweek.com/digital/take-care-when-targeting-the younger generations-online-113643/
Goi, C. L. (2009). A review of marketing mix: 4Ps or more?. International journal of marketing studies, 1(1), 2.
Hartley, K. & Rudelius, W. (2001). Marketing, The Core, 4th Ed., McGraw-Hill.
Hawn, C. (2009). Take two aspirin and tweet me in the morning: how Twitter, Facebook, and other social media are reshaping health care. Health affairs, 28(2), 361-368.
Lane, T. (2019). Healthcare marketing laws. Retrieved from https://smallbusiness.chron.com/healthcare-marketing-laws-67307.html
Study Document
… lend itself towards overcoming the differences that these groups feel. It does not really foster and promote bipartisanship. The two sides—Right and Left, public and Democrat—create a political arena in which the members of the two sides adopt a competitive spirit and demonstrate active animosity towards one ……
References
Barnett, B. A. (2015). 20 Years Later: A Look Back at the Unabomber Manifesto. Perspectives on Terrorism, 9(6), 60-71.
Beinart, P. (2017). The rise of the violent left. Retrieved from https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ " target="_blank" REL="NOFOLLOW">
Study Document
… is clicking, and where traffic is coming from as this will show how well Nike’s new direction is gaining traction with the American public (Freberg, Graham, McGaughey & Freberg, 2011).
Managing resistance to change is another important aspect that has to be considered. Change management requires that ……
Bibliography and References
Balaji, S., & Murugaiyan, M. S. (2012). Waterfall vs. V-Model vs. Agile: A comparative study on SDLC. International Journal of Information Technology and Business Management, 2(1), 26-30.
Boehm, B. (2002). Get ready for agile methods, with care. Computer, (1), 64-69.
Boehm, B. (2007). A survey of agile development methodologies. Laurie Williams, 45, 119.
Fernandez, D. J., & Fernandez, J. D. (2008). Agile project management—agilism versus traditional approaches. Journal of Computer Information Systems, 49(2), 10-17.
Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.
Cameron, E. and Green, M. (2015), Making Sense of Change Management: A complete Guide to the Models, Tools and Techniques of Organizational Change. Kogan Page: London
Kotter, J. P. (2012). Leading Change. Harvard Business Review Press.
TMZ. (2018). Kaep Deal Adds Up... WE GOT NIKE'S CUSTOMER BREAKDOWN. Retrieved from https://www.tmz.com/2018/09/06/colin-kaepernick-nike-contract-urban-consumers-market-research/
Study Document
...Public relations Nike
Executive Summary
Nike’s decision to tap into “woke culture” and turn the out of work former NFL quarter Colin Kaepernick into a brand ambassador has been a controversial one since the sportswear company launched its Colin ad campaign in 2018. This paper discusses the strategic issue underlying Nike’s controversial campaign and shows how it was intended to leverage “woke culture” and gain competitive advantage in an industry that had largely stayed quiet on socio-political issues. This paper provides an external analysis, internal analysis, and financial analysis before addressing the strategic issue. Alternatives are also discussed along with a recommendation and an implementation plan. Before beginning, background information on Nike is provided here below.
Company Vision/Mission
Nike’s Vision is to “to bring inspiration and innovation to every athlete in the world.” Its mission is to create “groundbreaking sport innovations, by making our products more sustainably, by building a creative and diverse global……
References
About Nike. (2020). Retrieved from https://about.nike.com/
Bartash, J. (2020). Apple’s Covid-19 warning. Retrieved from https://www.marketwatch.com/story/how-much-will-covid-19-hurt-the-us-economy-its-anyones-guess-right-now-2020-02-12
Delventhal, S. (2019). Nike facing challenging dynamics. Retrieved from https://www.investopedia.com/news/nike-facing-challenging-dynamics-goldman-sachs/
Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.
Neikirk, T. (2019). Nike sales are again way up. Retrieved from https://hillreporter.com/nike-sales-are-again-way-up-following-conservative-boycott-40033
Nusser, S., Mahle, I., & Pätzmann, J. U. (2015). How Social Commerce Communication can support Brand Loyalty: An Analysis of Nike‘s Efforts in Facebook Community Management. Markenbrand, (4/2015), 48-57.
Oyedele, A. (2018). Nike surges. Retrieved from https://markets.businessinsider.com/news/stocks/nike-earnings-q4-2018-2018-6-1027328545
Storey, G. (2019). Nike and the importance of meaningful brand values. Retrieved from https://polpeo.com/nike-and-the-importance-of-meaningful-brand-values/
Study Document
...Public relations Technology Proposal/Implementation Paper
A: Introduction
The Department of Veterans Affairs (VA) remains a vital entity in as far as the provision of key services to veterans in the country is concerned. The Veteran Benefits Administration (VBA), to a large extent, concerns itself with the administration of U.S. Department of Veteran Affairs’ programs. This is more so the case with regard to the provision or advancement of various forms of support to not only veterans and survivors, but also their dependents. Towards this end, some of the main programs that VBA administers include, but they are not limited to; pension and compensation, rehabilitation and employment, loan guaranty, and insurance. In the year 2016, the National Archives and Records Administration (2016) released a records management inspection report which was categorical that “the VA Records Management Program lacks several basic records management fundamentals.” The relevance of VA records cannot be overstated when it……
References
Aziz, A.A., Mohammad Y., Mokhtar, U.A. & Ambari, D.I. (2017). Establishing Policy for the Implementation of Electronic Document and Records Management System in Public Sector in Malaysia: The Influencing Factors. Advanced Science Letters, 23(11), 10732-10736.
National Archives and Records Administration (2016). Department of Veterans Affairs Records Management Program: Records Management Inspection Report. Retrieved from https://www.archives.gov/files/records-mgmt/pdf/va-2016-inspection.pdf
U.S. Department of Veteran Affairs (2020). About VBA. Retrieved from https://www.benefits.va.gov/BENEFITS/about.a sp
Study Document
… unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found … insights on this topic, future studies should examine the issue based on empirical or primary data.
Keywords: cyber espionage, acceptability, state behavior, cyberattacks, relations, intelligence gathering, national security, cyber warfare, cyber capabilities.
Introduction
Cyberspace has become an important element in the operations of any given country since … espionage involves illegal practices that result in information theft that could be used to attack an adversary. It poses threats and risks to relations between states and has become a complex international problem in the modern world. Cyber espionage is largely viewed as a new intelligence gathering … which is legally and ethically……
Bibliography
Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018. https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf
Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf
Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).
Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).
Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).
Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017. https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf
Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.
Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015. http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/
Study Document
… the royal decree appointing him to the premiership, from there (Roosevelt, 1979).
To make sure that the coup received popular support from the public, the Boscoe Brothers and other gangs were to collect a group of civilians and go to the radio stations to loot the residences ……
References
Contini, C. (2013). A Realistic View on Iran: International relations and Global Politics. GRIN Verlag.
De Seve, M. (2020). Operation Ajax: The Story of the CIA Coup that Remade the Middle East. Verso Books.
Fowler, R. (2018). More Than a Doctrine: The Eisenhower Era in the Middle East. U of Nebraska Press.
Lee, C. T. (2013). A Cold War Narrative: The Covert Coup of Mohammad Mossadeq, Role of the U.S. Press and Its Haunting Legacies. Senior Theses, Trinity College, Hartford, CT. http://digitalrepository.trincoll.edu/theses/300
Levin, Y. A. (2018). Operation Ajax in the CIA analytics: colonial knowledge in postcolonial age. Samara Journal of Science, 7(2), 200-203.
Luce, D. D. (2017, September 20). The specter of operation AJAX. The Guardian. https://www.theguardian.com/politics/2003/aug/20/foreignpolicy.iran
Merica, D., & Hanna, J. (2013). In declassified document, CIA acknowledges role in\\\\\\'53 Iran Coup. CNN News. Retrieved June 15, 2020.
Roosevelt, K. (1979). Countercoup, the Struggle for the Control of Iran. McGraw-Hill Companies.
We have over 150,000+ study documents to help you.
Sign Up for FREE