Skip to content

best assignment service

BUSIG1 Introduction To Business Concepts

Assignment 1

Question 1

Porter’s five forces in an organization’s external environment are such as –

The threat of new entrants in the first force and the challenges that are associated with the organization or industry includes those new companies and competitors are entering the business which leads to a threat to the organization and managers need to identify what potential competitors or entrants are entering into the business. As several companies analyze before entering into the industry, they will realize the potential of expansion in the industry.

Another one is the threat of substitutes in the market – The threat of new substitutes are considered a porter’s five forces as well as it is a challenge in the market, and substitutes are always available in the market and managers need to analyze what are the substitutes as well as what is the impact on the organization of those substitutes (Zhang, et al., 2020).

Huge Competition exists – Huge competition is existing in every industry if we consider the entertainment industry then huge competition is the present entertainment industry and it is affecting the organization, and managers have to prepare strategies to retain customers as well as retain the market share.

Bargaining power of supplies – Bargaining power of supplies is affecting the external environment of the organization and the demand is high so the bargaining power is also high.

Bargaining power of buyers – It is also high because the demand of consumers is also increasing, and the cost of consumers of switching is also high considered (Zhang, et al., 2020).

 

 

Question 2

Planning, organizing, leading, and controlling are the four functions of management, and they all are different from each other. All four functions of management that are also contributing to and determine the performance of an organization.

The process of planning deals with identifying the goals that need to achieve as well as what direction need to follow, and that is the determination of the required resources as well as identifying actions and activities to achieve the organizational goals.

Organizing is another function of management, and it is the process of building the coordination between all the activities and staff members, as well as coordinating among all the resources (Jones-Washington, 2018).

Leading is also known as direct, and it is another function of management. Leading is the process of directing and motivating employees by managers and directing employees for the full dedication to achieve their goals.

Another function of the management is controlling which the performance of employees will be measured and variances or deviations are identified between the projected performance as well as the actual performance of the organization. Managers’ abilities to handle each one that is affecting the organizational performance is that managers have to perform all the functions of management to maintain the organizational performance (Jones-Washington, 2018).

Leading is the process that is used in the organization to provide instructions, and guidance to all the several teams, controlling helps observe the performance of the organization, and measure the performance from time to time, and organizing is the process of establishing the priorities to maintain the organizational performance.

 

 

Question 3

There are three different levels of management including top-level management, middle-level management as well as lower-level management.

Top-level Management – First one is top level of management which includes the board of directors, as well as the CEO of company and managing director. Their activities include that they work on to oversee the goals, policies, as well as procedures of the company. The main focus is on the planning of activities and goals (Steiger, et al., 2014).

Responsibilities of Managers in Top Level Management include issuing necessary instructions to all team members, laying down their objectives and policies, appointing the executives of middle-level management, also preparing the strategic plans.

Middle-level management – Second one is executive level of management, in which all the members are directly accountable to the top-level management, and they are devoting more time to direction functions as well as organizational functions (Steiger, et al., 2014).

The responsibilities of Managers in the Middle-level management include forming plans for the subunits, sending reports to top management, also they are entitled to evaluate the performance of subordinates, and then inspire the managers who are working under them so that their performance can be improved.

Lower-Level Management –Third one is lower level of management and another name of lower-level of management is the supervisory level of management which includes the supervisors, section, foremen, and managers at the lower level of the organization are focusing on the coordination as well as execution of the day-to-day activities.

Roles and responsibilities of managers include jobs that will be assigned to workers. Moreover, the lower-level managers have to oversee the quality of the production and instruct workers on routine activities.

 

 

Question 4

The organizational environment is considered very important for managerial success because it is a major consideration. The organizational environment includes the scanning of internal as well as external environments, in which all the opportunities, threats as well as strengths, and weaknesses of the organization can be identified. The strategic decisions can also be influenced that has been made by the executives. Understanding the organizational environment by managers for the success of the management in the organization includes the understanding of the functional behavior of employees, trends, and motives of the organization (Errida, 2021).

Key elements of the organizational environment consist of government, economy, customers, competition, public opinion, and there are three different types of environments includes the internal environment which is also known as the microenvironment, the external environment is known as the macro environment, and general environment also known as the industry environment.

The impact of the organizational environment is that complexity of the environment will also be measured by the environmental factors and they have a direct impact on the performance of employees. Organizational factors such as relationships between employees, relations between the employer and employees, organizational structure, mode of leadership, decision-making process. Material factors for the organizational environment include attracting employees and allowing them the incentives that employees are entitled (Errida, 2021).

The external environment of the organization has an impact on the jobs and employment, also they have the uncertainty of environmental, and the relationships of stakeholders. Organizational culture is also affecting the managers that how they are behaving, plan, and organizing.

 

 

References

Errida, A., & Lotfi, B. (2021). The determinants of organizational change management success: Literature review and case study. International Journal of Engineering Business Management, 13, 18479790211016273https://doi.org/10.1177/18479790211016273

Jones-Washington, M. (2018). The Effectiveness of Fayol’s Principles of Management. https://scholarworks.calstate.edu/downloads/76537391v

Steiger, J. S., Hammou, K. A., & Galib, M. H. (2014). An examination of the influence of organizational structure types and management levels on knowledge management practices in organizations. International Journal of Business and Management9(6), 43. https://pdfs.semanticscholar.org/b6bb/6d5c39de433102a16fd67d0c9d78984b2721.pdf

Zhang, C., Leng, M., &Zhou, L. (2020). Developing strategies of social enterprises explained using Porter’s five forces analysis model: Taking mental challenged car wash as an example. International Journal of Organizational Innovation (Online)12(3), 50-64. https://www.ijoi-online.org/attachments/article/192/0972%20Final.pdf

 

 

Catering Management

  1. The event for which all the planning is done is a Christmas event, and the detailed timeline of the event is 12-12-2021 from 5:00 pm to 9:00 pm. The company that is arranging the event is BW Catering Company.

Guests will come at around 5:30 pm, and they will leave at 9:00 pm.

Rentals will arrive at 3:00 pm and they will leave at 10:00 pm

All the staff members will arrive at the party at 2:00 pm, as they have to do the proper planning and leave the party at 11:00 pm after finishing all the work. Staff members include the chef who will cook the food for all the guests (Blanca-Alcubilla, et al., 2018).

Florals and décor will arrive at 3:30 pm for decoration purposes and they will finish the work by 5:00 pm and then they can go to their place.

The detailed timeline for the event includes that event will start at 5:00 pm and will end at 9:00 pm, and all the guests will arrive on time at 5:30 pm and then all the functions, games, and stalls will be opened.

All the activities of the event include that guests will choose a variety from the appetizers, and there is one bar grazing station present on the evening schedule, also there is an appealing theme of renting all the gold items, modern white floral arrangements (Blanca-Alcubilla, et al., 2018).

  1. Rentals would like to create for the dining table only, and different items that are present in the desert, main course as well as starters includes Sweet Potato Pancake, and in Italian, dishes include Mini Pizza, Fried Calamari, and Bruschetta. These all dishes are mostly preferred by the guests who will attend the event.

Arabic dishes include Kebabs, Falafel, Kibosh, Samba, as well as middle eastern cuisine, and Asian dishes include Cherry compote, king cole duck, flatiron steak, cheddar, fritter aioli, and crispy onions.

Tables, chairs, as well as dining table white cloth, will be used for the rental, as well as all the plates and bowls, and all the dishes will be on the rental, so that serve all the guests properly. 10 guests can sit at the table, so that table size would be big and there will be 10 chairs will be rented for each table. Almost 20 tables will be arranged, and approximately 200 customers will be present at the Christmas event (Mukwakungu, et al., 2019).

  1. Shape of the table will be a round table, because it will be more appropriate as 10 people can easily sit on the table and approximately it will be cost-efficient for the organizer, and it will take less space in the party, and 20 tables can easily be arranged, 200 guests can have their sit on the table. Space is of approx. 30 tables, but it will be too congested, and then we have decided to arrange and place 20 tables, but if more guests can come, then we can place 3 or 4 more tables (Shaikh, et al., 2019).

Chair selection for the event of Christmas is event chairs on which the white cloth will be worn out on the table and chair and cover all the chairs and tables by the white cloth.

  1. Dishwash, cutlery, glassware, and napkin selection will be done properly so that they can be handled and managed properly for all the guests that arrive at the party. A set of 20 forks will be purchased and approximately 20 sets will be purchased so that guests can easily use them, and there will be plenty of forks, cutlery items present. Tissue papers will be kept with the dish plates so that guests can use them, a pack of 100 large size tissues will be arranged for the party, and 20 packs will be purchased so that it would be no shortage party of tissues (Shaikh, et al., 2019).

Tableware will be arranged in which the dishware will be used for setting the table, and it includes everything such as cutlery, glassware, as well as serving dishes, and they all must be stainless steel, and in handling they will be durable, as well as they all are the rust-resistant.

  1. Total cost for each person would be $35.00, and it includes the cost of the table, chair as well as tissue paper, forks, dishwasher, and cutlery items. All these items will be added to the invoice that will be prepared for the event, and a total invoice will be prepared including all the guests who are coming to the party (Luo, et al., 2018).
  2. The theme that is selected is the golden theme and all the flowers will be pink and white which will easily go with the theme. This theme is most suitable because it will attract all the customers, and this is the aesthetic look that will go with the golden theme of all tables and chairs. Candles will be also kept on each table, approximately 5 candles will be present on each table as it will also give an aesthetic look and most importantly, it will give a good vibe to all the guests. These candles will not blow off till all the guests will leave the party. It will give a pleasant look to the party (Luo, et al., 2018).

The price per table in which the decoration will be included is $25 for each table. It includes everything that is candles, florals, decorations, tissue paper, as well as dishwashers, and cutlery items that will be arranged on the table (Mukwakungu, et al., 2019).

  1. Labour –Include there is the Christmas party they need to do in downtown Toronto and they are currently scheduled is in December and the BW catering service I booked for this event they have to make sure to handle all the things. Also, the BW catering needs 5 supervisors for this work and they need to do the work in the morning shift as their need to prepare food. Also, we need 3 supervisors for the night shift of the event. As this is the big event we need 13 members of the waitstaff in the event of handle the catering services and the other services will be handle by them from morning till night shift because this is an event which has so many guests has to come and as the catering services, they need to attend this and will complete their services for the better development (Buning, 2016).

There is the requirement of the 4 head chefs to guide the junior chef in the event to attend the event and give their best in the event to fulfill the company services and perfectly turn the event. As there is also required the assistant chef as they have to handle the other services in the event and make sure to get the better services in return for the company development and their better services will impact the company image and improve the company feedback. This is the important thing the company needs to do also, they need the bartenders to attend the beverages department as they need the 4 bartenders and this is the important thing to do to handle the beverages. These are the workers who are required to handle the event and the bartenders need in the night shift after 6 pm at the drink start in the evening to do this is the thing they have to handle the event to complete their catering services in the Christmas party.

  1. As the event is related to the Christmas party and this party is going to start preparing in the morning from the 11 am and it will stay till noon which means till midnight they have to work and we have to provide the midnight services till that day according to the event requirements and the event organizers demand from us. The activity for the catering services will start from setting up the materials and decorating the areas of the catering side also, to preparing the food on time before the event start (Chamberlain, et al., 2019).

The catering manager will arrange the catering areas and divide the food sides and the drink will be placed on the other counters after that they will have to place the food in the containers which are done by the head chef and the assistant of the chef will do this work. After this, they will have to arrange the plates and the utensils which are going to be used by the guest in the event and this activity will be handled by the junior chef and the trainer’s chef in the event are com on the behalf of the BW catering as they are the employees of the organization of the catering services. The Christmas party need to have the theme to have the cake and the pancakes also, the cupcakes on the menu and after that, there is compulsory to have Wine in the beverages and the other hot dishes and the soup will be a demand by the event organizer and as the BW catering services this is our services to do the and fulfill the customers demand and their requirements to get better and this improves the company image in the market and develops the organization working styles too (Buning, 2016).

  1. there are some guests in the event who are not going to attend the event and they will be introduced in the event as the virtual event and for those guests, we have to arrange a separate conner in the event so with the help of that those people will not be left out from the event at any cost (Kavanagh, et al., 2015). The BW catering services have to prepare the 3-course dinner and the bottle of the wine Nand the gift which we are going to organize for the other people in the event related to the theme that is a chocolate box is going to be sent to those guest which is virtually connected to this event and the cost of that per box which contains the dinner of the 3-course dinner and this box cost is $150.00 the junior assistant and the trainer of the staff members from the catering and the delivery boys of the BW catering services are responsible for this duty and they have to make sure to reach the box to the customers before the event start and they have to make sure the food will remain in the box fresh and hot as the Christmas time there is the low temperature and winter will be there and also, there might be chances of the snowfall in the morning and because of this, they have to face challenges to reach on time (Kavanagh, et al., 2015).

The box which has the 3 meal course will contain the soup, cookies, cakes, and salad. Also, we have to organize a setup for the virtual clients in the company to attend the event and for that, we have to set up the projectors in the corner of the event so they also, meet with each other during the event and we have to instruct our other branches from the different cities to make sure to reach and deliver the box of the meal on time before the event start and the bottle of the wine and also, they have to deliver the gift that is customized by according to the party theme and the event organizer demand for this (Jones, 2017).

Description                                                                          price                                    qty                         amount

1 hours d’                                                                                14$                                       5                          70$        2 course sit                                                                            40$                                       3                              120$

3 Dessert station                                                                  14$                                       5                              70$

4 beverages                                                                            45$                                      10                           420$

5Labour                                                                                 35$                                      15                            525$

6virtual boxes                                                                      150                                        –                                  150$

7 appetizer                                                                             14$                                       7                                  98$

8 main course                                                                          23$                                     15                               345$

9 dessert                                                                                    5$                                       8                                  40$

 

Discount                                                                                                                                                                   – 38$

Tax rate 13%234$

Total                                                                                                                                                                       1566$

 

The total cost for each person would be $35.00, and it includes the cost of the table, chair as well as tissue paper, forks, dishwasher, and cutlery items. the desert, main course as well as starters includes Sweet Potato Pancake, and in Italian, dishes include Mini Pizza, Fried Calamari, and., Tyger, L. M., Goryacheva,) Bruschetta. Labour –Include there is the Christmas party they need to do in downtown Toronto and they are currently scheduled is in December and the BW catering service I booked for this event they have to make sure to handle all the things. Also, the BW catering needs supervisors for this work and they need to do the work in the morning shift as their need to prepare food. (Eriksson, M., Osowski,)

Answers 8.    The event for which all the planning is done is a Christmas event, and the detailed timeline The company that is arranging the event is BW Catering Company. In the over group, we send one member to the submit final work on the blackboard. All the activities of the event include that guests will choose a variety from the appetizers, and there is one bar grazing station present on the evening schedule, also there is an appealing theme of renting all the gold items, we send the member and the member give the final work to the blackboard what we order.  And submit the final what we have from your service and all member give the feedback it what we like and the dislike to the catering service Candles will be also kept on each table, approximately 5 candles will be present on each table as it will also give an aesthetic look and most importantly, we have to thank you for the discount and the price of the food and the food was very good and the service is too good. The price per table in which the decoration will be included is $25 for each table. It includes everything that is candles, florals, decorations, tissue paper, as well as dishwashers and cutlery items that will be arranged on the table In the over group, we send one member to the submit final work on the blackboard. All the activities of the event include that guests will choose a variety of appetizers. The box which has the 3 meal course will contain the soup, cookies, cakes, and salad. Also, we have to organize a setup for the virtual clients in the company to attend the event and for that, we have to set up the projectors in the corner of the event so they also, 9Eriksson, M., Osowski,)

 

 

9 Make sure to review the rubric before you submit your work

Answers. Make sure to review the rubric before we submit we have the first time to be we assignment instruction in the end rubric and the two be the key tools of the completed in the assignment of the key guidelines we have to follow the avoid all the problem does not to be the meet the key guidelines the desert, main course, as well as starters, includes Sweet Potato Pancake, and in Italian, dishes include Mini Pizza, Fried Calamari, and Bruschetta. we have to take to read both of thing in the approximately 5 candles will be present on each table as it will also give an aesthetic look and most importantly, we have to thank you for the discount and the price of the food and the food was very good and the service is too good. The price per table in which the decoration will be included is $25 for each table we have taken care of and the edit we work accordingly after we have written unfortunately Make sure to review the rubric before we submit we have the first time to be we assignment instruction in the end rubric and the two be the key tools of the completed in the assignment of the key guidelines. there are some guests in the event who are not going to attend the event and they will be introduced in the event as the virtual event and for those guests, we have to arrange a separate corner in the event so with the help of that those people will not be left out of the event at any cost (Vitas, ad el,.2014).

The first time we have the some want to look at the rubric is when we have to look all the in the begin working on we have to give the only the as we see them continue to use them will be purchased and approximately 20 sets will be purchased so that guests can easily use them, and there will be plenty of forks, cutlery items present. Tissue papers will be kept with the dish plates so that guests can use them, a pack of 100 large size tissues will be arranged for the party this is that is what we do. The activity for the catering services will start from setting up the materials and decorating the areas of the catering side also, to preparing the food on time before the event started (Eriksson, ad el,.2017).

References

 

Blanca-Alcubilla, G., Bala, A., Hermira, J. I., De-Castro, N., Chavarri, R., Perales, R., … &Fullana-i-Palmer, P. (2018). Tackling international airline catering waste management: life zero cabin waste project. State of the art and first steps. Detritus3(1), 159-166. https://pdfs.semanticscholar.org/ec6a/1e5f940e22a0938f19614a1416d47cbad4d9.pdf

Buning, R. J., & Gibson, H. J. (2016). The role of travel conditions in cycling tourism: Implications for destination and event management. Journal of Sport & Tourism20(3-4), 175-193.The role of travel conditions in cycling tourism: implications for destination and event management (iupui.edu)

Chamberlain, D. A., Edwards, D., Lai, J., &Thwala, W. D. (2019). Mega event management of formula one grand prix: an analysis of literature. Facilities. Formula One Singapore Grand Prix Case Study (RG).pdf (bcu.ac.uk)

Eriksson, M., Osowski, C. P., Malefors, C., Björkman, J., & Eriksson, E. (2017). Quantification of food waste in public catering services–A case study from a Swedish municipality. Waste Management61, 415-422.

Garayoa, R., Abundancia, C., Díez-Leturia, M., & Vitas, A. I. (2017). Essential tools for food safety surveillance in catering services: On-site inspections and control of high risk cross-contamination surfaces. Food Control75, 48-54.

Garayoa, R., Díez-Leturia, M., Bes-Rastrollo, M., García-Jalón, I., & Vitas, A. I. (2014). Catering services and HACCP: temperature assessment and surface hygiene control before and after audits and a specific training session. Food Control43, 193-198.

Jones, M. (2017). Sustainable event management: A practical guide. Routledge. 2011SUMMER-COLUMN-SustainableEventManagement.pdf (ifea.com)

Kavanagh, K. M., Rochford, O., &Bussa, T. (2015). Magic quadrant for security information and event management. Gartner Group Research Note. Gartner_MQ_SIEM_2020.pdf (cryptos.com.mx)

Luo, Y. (2018, December). Innovative Research on Catering Management [J]. In International Workshop on Advances in Social Sciences. Hongkong, China (pp. 12-13). https://webofproceedings.org/proceedings_series/ESSP/IWASS%202018/IWASS1231207.pdf

Mukwakungu, S. C., Lumbwe, A. K., Niati, D., &Mbohwa, C. (2019, October). The importance of quality management system and leadership in the South African restaurant, fast food and catering sector-case of the Gauteng region. In Proceedings of the Fourth North American International Conference on Industrial Engineering and Operations Management, Toronto, ON, Canada (pp. 23-25). http://ieomsociety.org/toronto2019/papers/105.pdf

Shaikh, A., Singh, A., Walawalkar, G., & Kapasi, F. (2019). CATERING MANAGEMENT. https://d1wqtxts1xzle7.cloudfront.net/58351002/IRJET-V6I1278-with-cover-page-v2.pdf?Expires=1648474565&Signature=VmtjU6nebQvcSd8YOkng44r6UytAYttd7WiN59SMN9UnAXrmlhbgk6H3y-uPgYjznrm9bZIz2k-VoiMjnNkhJMbG~wOJ82gede9uU4eync4isJx693pDE2M4jLcA-q8WHNvLbuUnHDZ6fRgvNyVt6hNKysal4gVnN43aYrjT7bV7rdpXuIhjdQyqj2RUEPX7tGnRX3n79QpgtKVp8m-zTxSLxS43-SBgVUa5DjFxUbDzWFnr1C5LZSKzxdjPF97T-KeNOhIpyjOlDLecobrm5Gax1n~v9OEz2fH0fLKoQ1WzI2EZIX6LpGu046JyE88cgz7PAbF2Gb6M8JIbbOTL9A__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA

Shaitura, S. V., Nedkova, A. S., Tyger, L. M., Goryacheva, E. D., Morozova, N. O., &Berketova, L. V. (2020). Food security and catering. Revista Turismo Estudos&Práticas, (S3), 11-11.

 

 

 

Search Engine Optimization

 

Search Engine Optimization Marriott: 1. Using a business 5-star strategy: It is very imperative for the website to main its 5-star category as people generally search with the help of the particular niche and they have many options to choose from. 2. Using appropriate and attractive key words: Google understands an arithmetic algorithm, it shows different results and the most apt results with the help of the exact keywords as it catches it easily. 3. Providing different sections for discounts and offers: Most of the individuals search hotels with the help of the categorizing them on the basis of offers and discounts so it is a very beneficial SEO technique. 4. Maintenance of the ratings: Ratings show how well the company is performing and how satisfied the individuals are by the services. 5. Update the page with attractive images and profiles: The visual content of the website must be very attractive as it is of Marriott’ website. It plays a very imperative role. Hilton:1. Having brand credibility: Utilization of the celebrities and influencers can help the website to boost up the credibility and tracking the improvements. 2. YouTube SEO: YouTube generates adds and individuals see adds before watching the content so it helps in advertisement of the particular hotel of the company. 3. Choosing right set of keywords: Using the exact keywords understanding the content is very essential as google understand and shows the results according the keywords.4. Highlighting strengths: If a hotel has some type of strength of a special feature, it should highlight its feature in its keywords so that helps in inviting a greater number of consumers. 5. Internal linking: Finding appropriate in terms of internal linking opportunities that helps in flowing the equity of linking and should link its internal pages as for increasing linking opportunities.  References Marriott. (2022). About us https://www.marriott.com/default.mi?gclid=Cj0KCQjw3IqSBhCoARIsAMBkTb3CpQpovIPcNSUfwWCr0oFBw-VG_06qssXrE5e3ps__kJPKkneTRrcaAhn_EALw_wcB&gclsrc=aw.dsHilton. (2022). About us https://www.hilton.com/en/

 

Global Water Shortage Debate

 

Topic- Can the global community successfully confront the global water shortage?

Summary

Global Water Shortage Debate ,in the article, the author summarizes water as a human right and common public and environmental goals as well. It is often opposed by the water view as the commodity which needs to be priced to make sure water is used effectively and in a sustainable manner. It also summarizes that there are millions of people throughout the planet who needs suitable induction to one of the important parts of life which are clean water.

I disagree with the author on this issue. According to me, the global water shortage cannot be confronted successfully by the global community, but I believe they can reduce the outcomes of water crises. Adopting the 2018 UN World Water Development strategy to find nature-based solutions will be one of the best solutions for the rising and upcoming water crises. Some answers will be provided by the NBS to minimize the damages which can occur from the degradation of the ecosystem, increase, and development of water supply management, among the population water quality, can be increased. At a higher way, there is an increase in global warming. With the increase in the emission of carbon, the water is being polluted. The freshwater volumes are decreasing and only a few columns are left when the freshwater is polluted it is very difficult to get the freshwater (Ungureanu, et al., 2020).

Below are my 3 arguments to disagree with the author are-

1) Awareness of the people 

The beginning stage is only for the socially aware and educated. Although there will be a more skilled effect when the general society joins the center which motivates the individual to save the water. The people of the country can be educated about the change in consumption and lifestyle. It is very important to make people aware of the decreasing freshwater volumes. Now a day’s shortage of freshwater is a crucial issue, to get clean water even though many rich people are using various filters and poor people are getting unclear water to drink. Due to the shortage of water people are facing various issues like the destruction of habits, migration waves, and loss of biodiversity (Voicu, et al., 2020).

They can be made aware of the various solution for managing water scarcity like-

1) Special tanks can be stored for saving the rainwater for irrigation.

2) For more efficient watering drip irrigation can be used.

As per the report, various factors have been highlighted in the article which can lead toGlobal Water Shortage Debate crises. In the article looming water crises are highlighted from the 6 interconnected contexts:

  • Scarcity of water and insecurity
  • Disasters that are related to waters
  • Water
  • Sanitation and health crises
  • Water infrastructure deterioration and destruction
  • In sustainable development
  • Degradation of ecosystem

But there are various reasons which can lead to water crises in a specific area (Wada, et al., 2018).

2) To do agriculture in scientific ways

For taking the water management issues it also shows the various measures. There will be effective management which means tackling the issues which are neglected like wastage of water in the present system but this particular situation is not the solution for all the issues.

As per the viewpoint of farmers smart farming can be adopted to save water. In smart farming techniques, water is used effectually and there is also no wastage of water. There are several ways which can be used by farmers using herbicide-tolerant crops and herbicides. These techniques do not allow for no-farming so it does need soil to be turned over and moisture can be retained. With the help of no-till farming, soil moisture can be increased by the farmers (Rosa, et al., 2020).

Recently China has become the world trailblazer in respect of bioengineering which makes them more solid and helpful. According to the viewpoint of farmers, smart farming must be the outfit of the farmers with the addition of better and unique maltreatment chiefs and exercises.

Information system of management- for the solid events planned structures, getting prepared and taking care off and in the construction aspect scattering the data to take proper care of assignments of farms and limits (Greve, et al., 2018).

 

3) Around the world role of management institutions and policy maker’s role 

One more measure which is provided in the article by the author by facing these issues is a congestive and intelligent way will water will continue to support the life, biodiversity, and development of our future and children as well. But according to me, this is correct and useful for developing countries they are not having resources. Better policies and regulations can be developed and enacted to save water. It is not only the responsibility of the global community and they only also cannot confront the shortage of water (Dell’Angelo, et al., 2020).

Government bodies need to redefine the roles. To ensure more protection government can expand the clean water act. Distribution infrastructure systems can also be improved to save water. Due to poor infrastructure, the economy and health are affected. It adds costs, wastes resources, quality of life is diminished and it also allows the preventable water-bones diseases to spread among the populations which are vulnerable, mainlychildren. To the developing world, the issue is not confined. On the regular basis,with the burst of pipes in the US, boil alerts are promoted (Kellner, 2021).

Conclusion

I have concluded that the crises of water are a global issue and it can be only talked about when each country will be known that they minimize the use of available resources which they have. It is the only responsibility of the global community. If we need to save water then everyone must do a little effort to save water. It is important to protect the investment in the water-related infrastructure from stress and shocks. Many ways can be adopted to save water like rainwater harvesting, wastewater can be recycled, and rainwater harvesting. These are some of the ways to save water. More awareness can be spread about the ways to save water. Last, again I want to say that the water shortage cannot be successfully confronted by the global community, they can minimize its effect but they can not resolve it fully (Kellner, 2021).

 

 

Reference

Greve, P., Kahil, T., Mochizuki, J., Schinko, T., Satoh, Y., Burek, P., … & Wada, Y. (2018). Global assessment of water challenges under uncertainty in water scarcity projections. Nature Sustainability1(9), 486-494.https://sci-hub.hkvisa.net/10.1038/s41893-018-0134-9

Kellner, E. (2021). The controversial debate on the role of water reservoirs in reducing water scarcity. Wiley Interdisciplinary Reviews: Water8(3), e1514.https://wires.onlinelibrary.wiley.com/doi/pdf/10.1002/wat2.1514

Rosa, L., Chiarelli, D. D., Rulli, M. C., Dell’Angelo, J., & D’Odorico, P. (2020). Global agricultural economic water scarcity. Science Advances6(18), eaaz6031.https://sci-hub.hkvisa.net/10.1126/sciadv.aaz6031

Ungureanu, N., Vlăduț, V., & Voicu, G. (2020). Water scarcity and wastewater reuse in crop irrigation. Sustainability12(21), 9055.https://sci-hub.hkvisa.net/10.3390/su12219055

 

 

MINI ASSIGNMENT

Table of Contents

Question 1. 3

Question 2. 4

Question 3: 5

Question 4. 6

Reference. 8

 

 

 

Question 1

  1. As per the utility function U = P 5

In this P is recognized to be price of pie. The main benefit in spending $10 on pie is $10.

The price will be equal to utility because the consumable basically be motivated in adjusting the purchase so that the price of every good will be considered equal to the marginal utility.

  1. The net benefit will be recognized to be negative If benefits is recognized to less than the particular cost of $10 (Webpage, 2022). If the benefits are equal to $10 then the net benefit will be zero. If the benefit result in exceeding the cost of $10 then the net benefit will be considered positive.
  2. Net worth of Yennifer is recognized to be less than dollar 10 then she will basically we not able in purchasing the pie. This means that she will accept the free pie as the cost will be equal to zero and the net benefit will be considered positive.
  3. If it has been assumed that there is dollar 7 in pocket of Yennefer then she will purchase by en afternoon. However, the amount of dollar 10 is already been spent by Geralt in the origin we will not be able in purchasing the in afternoon.

 

Question 2

a.

Particulars If project is abandoned If project is completed
Cost already incurred 200 200
Additional cost 0 170
Total cost 200 370
Benefit 0 380
Profit/ loss (B- A) -200 10

If the project has been abandoned, then it will result in leading to the dead loss of 200 million in which the project will be completed and it can result in profit of 10 million. So it has been determined that this project will be continued.

Particulars If project is abandoned If project is completed
Cost already incurred 200 200
Additional cost 0 300
Total cost 200 500
Benefit 0 380
Profit/ loss (B- A) -200 -120

If the project has been abandoned, then it will result in the Dead loss of 200 million and profit of 120 million. By looking into the alternative options available and if there are no options then the company should continue with the project and completed (Webpage, 2022).

Particulars If project is abandoned If project is completed
Cost already incurred 500 500
Additional cost 0 100
Total cost 500 600
Benefit 0 380
Profit/ loss (B- A) -500 -220

In March 2020 the organization has basically spent 500 million on the project and if the project is particularly abandoned it will result in loss. Therefore, it can be stated if the completion of the project is done than it can reserved in recovering to 80 million of loss and so it will be advisable in completing the project.

 

Question 3:

S No. Total revenue Total cost Marginal revenue Marginal cost
0 0 0 0 0
1 1200 1100 1200 1100
2 2340 2200 1140 1100
3 3420 3300 1080 1100
4 4440 4400 1020 1100
5 5400 5500 960 1100
6 6300 6600 900 1100

 

The profit is maximum when MR = MC and MC is rising.

When the production level result in reaching the point that production cost of producing the additional unit result is exceeding the revenue from the particular output unit then production of the additional unit of output it will result in reducing profit (Webpage, 2022). At this time form will not produce any profit. As per the above calculation it has been determined that the above firms are required in making the 2 fishing trips for gaining the maximum profit.

 

Question 4

  1. Aluminum production: Australia is having the absolute advantage in comparison to Malaysia as it can result in producing more amount of aluminum in comparison with Malaysia.
  2. Fertilizer production: Australia is considered in having the absolute advantage for production of fertilizers over Malaysia as it can help in producing more amount of fertilizers in comparison to the other country.
  3. Opportunity cost of Australia: 40/80 =0.5
  4. Opportunity cost of Malaysia: 16/20=0.8

The opportunity cost can be considered as the amount that is forgone and that would have been derived from the option that has not been chosen. According to the calculation it has been determined that the opportunity cost for fertilizer production in Australia is 0.5 and opportunity cost for production of fertilizer in Malaysia is 0.8. According to this it has been stated that Australia is having the comparative advantage in comparison to Malasiya.

  1. Opportunity cost of Australia: 80/40 =2
  2. Opportunity cost of Malaysia: 20/16 = 1.25

As per calculation of opportunity cost of aluminum it has been stated that opportunity cost of Australia is 2 and opportunity cost of Malaysia is 1.25. It has been analyzed that Malaysia is having the comparative advantage in comparison to Australia. This is because only 1.25 units of Aluminum is foregone for producing of extra units.

  1. Maximum price = 80/20 = 4

As per this calculation it has been determine than the Australia will mainly pay the maximum of 4 for getting 1 unit of Malaysian aluminum. By having the four unit of fertilizers the Australia can easily get the one unit of the particular aluminum. This has been generally depicted through the opportunity cost that is being computer among Australian and Malaysia. Through the years it has been suggested that a particular trip of in which the Australia result in getting the aluminum from Malaysia is considered to be advantages as the Malaysia will get for in exchange of one unit of aluminum.

  1. It has been indicated that each will generally want 5 million aluminum tones in which the price of 1-ton fertilizer will be 1.75 tons of aluminum. It can be demonstrated that the Australia will easily get one unit of aluminum by having the 0.5 for fertilizer in comparison to the self production that is recognized to be one unit of aluminum and the particular cost of therefore the greater 1.75 prove that Australia basically specializes in production of fertilizers so that they can exchange it cheaply with production of aluminum in Malaysia.

 

Reference

“Profit Maximizing – Output — Agricultural Law And Management”, Ag.Ndsu.Edu (Webpage, 2022) https://www.ag.ndsu.edu/aglawandmanagement/agmgmt/coursematerials/productiontheory/MRMC#:~:text=Maximum%20profit%20is%20the%20level%20of%20output%20where%20MC%20equals%20MR.&text=When%20the%20production%20level%20reaches,will%20not%20produce%20that%20unit.

“What Is Opportunity Cost?”, The Balance (Webpage, 2022) https://www.thebalance.com/what-is-opportunity-cost-357200

(Webpage, 2022) https://www.mytutor.co.uk/answers/450/GCSE/Maths/Why-is-MC-MR-at-the-profit-maximizing-level-of-output/

(Webpage, 2022) https://www.stlouisfed.org/open-vault/2020/january/real-life-examples-opportunity-cost

 

Final Summative Essay

Components of Foreign policy

Foreign policy determining factor of any country is geographical situation, history, similarities, features, rules, history of that country all play an important role in determined foreign policy. In this, the strength of the soldiers, the economic status of country also matters. The formulation of this policy is important for the national interests and for making coordination among themselves.Basically, foreign policies are divided into three parts the first part is Economical part, second is political part and third is military or security part.

Economical part is defined the economy of a country and wealth of it. As long as the nation is economically strong, its power and governance will continue. Foreign policies surrounded by and turn around in the management of economical flow across borders. The four main goals of economical foreign policy are protection of all the citizens and their rights and providing them all kinds of resources they need, give them a healthy and prosperity full environment.

Politics has always had a big stake in foreign policy and a number of general factors which taken together that political party play an important role in foreign policy to work with full processed way. Political party is operated all kinds of systems of government and economic conditions in nation.

Military and security policy is important part of foreign policy because military policy is public policy it is dealing with multinational security. The security of the nation has several kinds of dimensions including economic security, food security, environmental security, health security, personal security (Olszewski,2019).

How they are determined

Basically, foreign policies are created by head of government. The most important major factor that impact the foreign policies are culture and history, economical factor, technology of nation, national potential, leadership skills, political obedience. Possible policies are created and implemented by government of nation the government apply one policy. The suitable government agencies approved the policies. The officials and agencies judge when the policies have been successful. The foreign policies are very helpful to create friendship between all the nations. It helps to grab national economic progress. It helps to gain national economic progress and it is also help to create world peace.

The deals with the rules of trade are conduct and negotiating. Always use a justified trading plain and deals. Take only that kind of risk that you can handle. Create a good trading strategy. Treat trading like a business.

Trade rules: International of domestic?

Domestic policies cover a large and wide range of area including many types of things like money and tax, natural resources, personal rights, freedom, education, energy healthcare, social things. The term and conditions refer to the plains and actions taken by the national government. Domestic policy is created by the organized government of nation.

International business policy is exchange gods and service business. It is conduct in multiple country.it play’s an important role in the growth of country’s economy. It is divided into two groups. First is importing and second is exporting.  First trade is untouchable things like banking , travelling ,account and many more and second is trade in goods like raw material, clothes and many more other things (Cohen, 2015).

 

 

References

Cohen, B. C. (2015). Press and foreign policy. Princeton university press.

Olszewski, M. W. (2019). The Framework of Foreign Policy. In The German Democratic Republic (pp. 179-198). Routledge.

Capital Budgeting Decision

 

Table of Contents

Introduction. 3

Three Different Cases. 3

Conclusion. 4

References. 5

Introduction

Capital Budgeting Decision will be taken to identify whether accept or reject the project. There are three different projects in which one project will be selected and the reasons will be identified behind that whether the project is selected or rejected. Different businesses use different methods to determine whether the project is accepted or rejected. In most cases, the Net Present Value method is used, and it has been determined that if the NPV is positive then the project will be accepted and if the NPV is less than zero or it is negative then the project must be rejected (Balarabe, 2020).

Three Different Cases

Proposals that have the yield of return greater than the required rate of return or the cost of capital then it should be accepted, and the rest all the projects must be rejected, and all the independent projects must be accepted.

  1. The First project is Micron Inc.’s Cost of capital is 6.4%, NPV (Net Present Value) is equal to zero, and the required rate of return is 9.1%. When the NPV (Net Present Value) is equal to zero, the project may accept or rejected.

Also, the Cost of Capital = Internal Rate of Return, and the Required Rate of Return = Hurdle Rate.

IRR (Internal Rate of Return) = Cost of Capital = 6.4%

Hurdle rate = Required rate of return = 9.1%

6.4% < 9.1%, therefore the IRR (Internal Rate of Return)< Hurdle Rate.

If the IRR (Internal Rate of Return) is less than the hurdle rate, then the project will be rejected(Bora, 2015).

  1. Second project is Gramercy Inc. Internal Rate of Return = 10.8%, Initial Investment = $90,000 and hurdle rate = 10.2%

IRR (Internal Rate of Return) = 10.8%

Hurdle Rate = 10.2%

10.8% > 10.2%

IRR (Internal Rate of Return) > Hurdle Rate

Therefore, the IRR(Internal Rate of Return) is more than the Hurdle Rate and the project will be accepted.

  1. In the third case, Dinamo Inc. has NPV (Net Present Value) is ($5000). The Hurdle Rate is 8%.

Also, when the NPV(Net Present Value) is negative or NPV(Net Present Value) is less than zero, it means the project must be rejected. Therefore, the third project will be rejected (Bora, 2015).

Out of all three cases, the second project will be accepted.

Conclusion

Capital Budgeting is an important tool because it will evaluate the decision and measure the project value throughout its life cycle. The ranking of the projects will be done by taking the capital budgeting decision, and capital budgeting is used for the decision-making purpose of the long-term investment. Capital budgeting decision determines the ranking of the project and the company will use capital budgeting to determine whether the business should take this project or not(Balarabe, 2020).

Therefore, out of all the three projects, 2nd project of Gramercy Inc. in which there is an initial investment of $90,000 and the internal rate of return is 10.8% and the hurdle rate is 10.2% will be accepted because the internal rate of return is higher in this case.

 

 

References

Balarabe, B. (2020). Capital Budgeting Decision and Its Implication ToFirm’S Growth in Nigeria. International Journal of Advanced Academic Research6(4), 100-106.https://www.ijaar.org/articles/v6n4/sms/ijaar-sms-v6n4-apr20-p15.pdf

Bora, B. (2015). Comparison between net present value and internal rate of return. International Journal of Research in Finance and Marketing5(12), 61-71.https://d1wqtxts1xzle7.cloudfront.net/41051869/comparison_between_NPV_and_IRR-with-cover-page-v2.pdf?Expires=1650701980&Signature=XccrCfgwdXx~tmXfHsS308MgTQdaVas9rH4XnyEQcB8r9BmHUChX1Qy1h17-Fi7nZEscaV58GmHWGMODWOfFAX-2CSrJPT0cJWR8CsKvBHIQukTqbdsqjB~EbKMSjiXU6S7g1JbwYAuqJ7ORI5Hpo53PHVzfrHTpqX94PICm-7wJ1MfgWObtdrB9BQtfi9MGeroDzAqbNb9cBTPvLF8nF~iYbMYho28ShkaUlRJ1743tU-t9kfLyGoTsHhj36vLrwVfqrsZUGsN6F1QzCJgluX-JlwB4-darHTbjhuYq2DkV4cEqVbTbKU3n~3dYeVkZPwxQKzi2bjDcl8HMBbDsmg__&Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA

 

 

 

 

 

BSBWOR203 Work Effectively with Others

Table of Contents

TASK -1. 3

TASK -2. 5

PART-1. 5

References. 7

 

 

 

TASK -1

Question 1

At the time Jason was very busy in his massage therapy practice.Boss was offered a client at the last minute and expected that he performs well, that is the main issue that happens in practice. Jason thinks that he is not able to attend to the client because he had not enough experience and has not completed their therapy practice yet.

 

Question 2

The incident will be prevented by using some techniques are as follows:

1) Jason completes their practice and then provides him with a client to attend them so with full knowledge he attends to the client perfectly. and this situation will not arise.

2) The second technique is boss shouldn’t have shoutedat Jason and he should have tried to understand him and given time to Jason to complete his practice.

3) The third one is instead of Jason give this responsibility to another one to attend to the client.

 

Question 3

Possible conflict resolution techniques are:

1) pay attention to the conflicts don’t ignore them

2) simplify what the issue is

3) classify a solution to solve conflicts in the workplace

4) keep an eye on and follow up on the conflicts

5) Bring engaged parties together to talk

 

Question 4

Organizational standards, policies, and procedures are very important not only in Jason’s workplace but for all of us.

Organizational standards, policies, and procedures are:

1) Equivalent employment opportunity.

2) make available guidelines for executive processes

3) standards and protocols

4) employee presentation management and rule

 

Question 5

Jason and the staff’s responsibilities are:

1) Jason and staff members maintain a proper level of training and hygiene.

2) Take responsibility in the absence of their boss

3) maintain a workplace environment

4) do work safely and properly

5) follow instruction

6) co-ordination with your employee

TASK -2

PART-1

REPORT

INTRODUCTION

This report states how to support team members to achieve their goals and how to build your reputation inthe workplace.do work effectively in a workgroup. It would explain how to Encourage your team workers, and how to deal with workplace conflicts situation. We also include how to be aware of new policies at your workplace.It tells how much important to know about your responsibility and duties.

MAIN CONTEXT

It has been explained that supporting your team members help them to achieve their goals by communicating regularly with your team member or telling them how important to set your goal to achieve success in your life. Tell them to be accountable, Always present on time. Roles and responsibilities must be clear to all team members.A clear set of directions must be provided to all the team members to achieve their goals. Monitoring must be done on the roles of all team members. encourage them to attend or participate in meetings and voice apprehension as well as suggestions for improvement. (Moore,2014)motivating them as well as do inspirational positive communication with them so that they work together as a team. Monitor the progress of every member, and if there is wrong something then tell them about that or help them to solve it.Always follow established workgroup agreements. Complete assignments on time so that this behavior shows your accuracy and punctuality for your work.(Zander,2018) The ability to run great workshops is becoming a vital skill for anyone that works creatively. give them clear instructions, stick to the schedule, and be responsible for your work.Seek feedback from clients and your colleagues. Positive and negative feedback is really important because it helps to break bad habits and qualifies teams to work more effectively towards the goals. Feedback creates an open market relationship between the team leader and members and also with their customers.(Singer,2018)Conflicts in the workplace are very common because of not employees do not understand each other. It’s the duty to identify appropriate conflicts reasons, listen properly and let everyone have their say after that take the right decision without any discrimination and exhort them it is not positive behavior for an organization.To make effective workplace relationships, individuals who work well in a team,do their fair share of the work and give credit to them.Take the burden or help your team members when they are struggling to complete a project. Trust on team members or make them believe that they can do everything more effectively.Understand the goal, and what strategy should be used to achieve the organization’s goal. Share information regarding the work with workgroups. It’s the main role or responsibility to solve team members’ issues, problems, and conflicts an all.

CONCLUSION

The conclusion is as a team leader provides support to team members, and encourages them to work together as a team. Help them in their projects. Monitor progress and work of all team members. Develop effective workplace relationships. Share information relevant to work with workgroups. Identify conflict’sreasons and deal effectively with them. Make plan strategies for achieving their goal.

 

 

 

 

References

Moore, C. W. (2014). The mediation process: Practical strategies for resolving conflict. John Wiley & Sons.https://books.google.co.in/books?hl=en&lr=&id=34wfAwAAQBAJ&oi=fnd&pg=PR9&dq=Identify+problems+and+use+appropriate+conflict+resolution+techniques&ots=Dig1ZK-fEh&sig=tBehQI_YeO22ur5Pnq4dBHnBI1s&redir_esc=y#v=onepage&q=Identify%20problems%20and%20use%20appropriate%20conflict%20resolution%20techniques&f=false

Singer, L. R. (2018). Settling disputes: Conflict resolution in business, families, and the legal system. Routledge.https://www.taylorfrancis.com/books/mono/10.4324/9780429494666/settling-disputes-linda-singer

Zander, A. (2018). Motives and goals in groups. Routledge.https://www.taylorfrancis.com/books/mono/10.4324/9781351308960/motives-goals-groups-alvin-zander

 

PRJ5105 Project Integration and Change Management

Table of Contents

Assessment 3. 3

Introduction. 3

Aims and benefits. 3

Integration management. 4

Project management integration. 5

Change amendment plan. 8

Conclusion. 11

References. 13

Assessment 3

Introduction

Bartone highway improvement strategy helps to guide the development of the NSW road corridor for the development of the people. This is the project which is working currently in New Zealand. The main reason behind this improvement management strategy of the Barton Highway. The key benefit of this barton highway improvement strategy is to improve the efficiency of the roads. They also, increase the safety procedures of the organization. The main motive of the project development is to develop and construct the highway road and the bridge. They want to construct this bridge with all the safety and the maintenance of the security for the people. The Australian and NSW government joint their funds for the improvement of the Barton Highway. The motive of the development of this highway is to use it for transportation with the roads and the maritime. This project should be completed in a short period of the duration. They also, have to use the proper protection procedures on the highway. They are focusing on the improvement procedures of the safety procedures and the road safety.

Aims and benefits

The highway construction company aims to build the highway in the combined forms. This will provide the benefit of the tour site and makes the easy way for them to travel in the city. This also reduces traffic and pollution and makes things faster in society. Building this project is an important thing to do and for this, they have to follow the working policy and the procedures. During the construction of this project, the Australian government is using an intelligent transport system. This is the manufacture of the project and this will help the people to get the information and the related to the key and the location (Cozens, 2015).

They want to produce a better level of the services and this will help the people to understand the direction. Building the highway and helping the people will become the fastest route in transportation. This is the duty of the government to help the development and the infrastructure of the highways. This construction will help the country to build the economic procedures of the country. The aim and the benefits of this project development are to make sure to handle the infrastructure in the highway site.  Their motive and aim are to provide an extra level of safety and security to their local people in the city. They are also, focusing on expanding and improving the safety procedures of the people who are going to be using the highway. This is the main reason the government of Australia and New Zealand is spending their money on the fund and for the development of the NSW roads (Cozens, 2015).

Integration management

Integration management is the thing that is used in the construction of the highway with full of safety procedures. During the management of the project and with the help of integration management is to they will be able to handle all departments on the construction site. In the architectural design of the bridge and therefore, they have to make sure to handle the things. The project management integration has to divide into the different types of tasks and the resources and also, they have the various types of responsibilities (Cozens, & Van der Linde, 2015).

In this management procedure, they will start the work by completing the task step by step. In task 1 they have to purchase the raw materials and the types of equipment for buildings the highway and the roads. Therefore they will buy the materials and the resources for the company’s development. The materials that will use in the construction of the highway are the soil, sand, bricks, and cement also, the stones. These all are the types of equipment that are used in the manufacturing of the products and the highway construction (Cozens, & Van der Linde, 2015).

In the second task, they want to allocate their work to their supervisor according to their working policy. they also, divide their work based on the demand of the company and the workers working specialty. This will be the task that will be handled by the supervisor and the resources will take from the project management plan and the project management schedule and their report. This is all management should be done during the time of the construction. This will be the duty of the supervisor to handle this department to divide the work between the team members (Foster, et al., 2016).

The third task is about developing the design of the bridge. This will be done under the supervision of the engineer’s team and the architecture. They have to develop the design of the highway and in they have to take care of everything related to the environment. They have to make sure to protect the environment and after that, they will set up the roadside facilities. These are the facilities that will help the company to increase safety and provide safety measures to the people. The resources that are used in developing the design of the bridge with the help of the design documents. Highways have to be in the maintenance and developed under the supervision and with the help of the civil engineers for the safety of the people (Foster, et al., 2016).

Task 4 is the last step to starting the procedures of developing and constructing the Highway. The team management has to purchase the technologies and types of equipment also, as the machinery. These are the machinery that will work on the big level and this may cost high. Some technologies are used in manufacturing and constructing the highway. The camera, video graffing, maps, and design template. These are the various types of resources that are used in developing and manufacturing the highway. The responsibility for this is the purchase manager of the management and the construction team. This is their duty to make sure to handle things and develop a better and more secure plan for the construction of the Highway. These all are the details and the step that will be followed in the construction of the highway in the project management integration of the highway (Ghomi, et al., 2016).

Project management integration

These management steps include the four-step and the meaning of this step is to manage the construction of the highway. They want to the management of their project development. There are four tasks which they have to do in the management of the construction of the highway. In the first task, they will have to measure the roads and then based on the measurement they will calculate them. During the measurement, they have to use the measurement types of equipment to maintain the balance. The contractor and their team members are responsible for this department or the task management. Also, they will have to handle the measurement and the other things should be maintained because they have to provide the securities to the people (Ghomi, et al., 2016).

In the second task, they have to find out the best level of the contractor and the reason behind this is that. They have to build a better level of the highway and the reason is that it will be sued by the people at a large level. This has been very clear that there is an estimate that a total of 95% of people will be able to use this highway in a day. The resources which are conducted and collected from the resources are the details of the construction company. The internet, google, magazines also, newspapers. these are all sources that will help the management team of the highway construction to build a bridge in a better and more protective manner.  The marketing team manager and their teammates have to handle this department and make sure to finalize the deals with the construction contractors’ companies (Giles, 2016).

During the development and construction of the highway. They have to follow the task third in this task they have to check the quality. The quality of the materials during the construction of the highway is an important thing. The reason behind checking the quality is because this is the main source on which the highway building. The materials will describe the strong and the manufacturing level of the construction of the highway. They have to check the best level of the materials and based on this they have to make a list of the materials and then buy it (Jurewicz, et al., 2016).

The list contains all the materials and the rescue details that provide the warranty and the security for a long time in the building of the highway. This is the reason they have to make sure to do the quality standard is the rescues which are they have to do to handle the things. The quality manager and their team members also, the financial budget and their HOD will be responsible for the company’s development. This is the point they have to buy and finalize the materials based on their demand and the budget which is created by the Australian government and the NZ governed (Playford, et al., 2021).

S.no.  Task  Resources  Responsibilities 
1.  Measurement of roads to build the highway. Measurement equipment. Contractor team
2.  Find the best contractor to build the highway or roads. Detail related to the contractor companies. Marketing manager and team.
3.  Check the quality of work done by the project team. Quality standards Quality manager
4.  Purchase an intelligent transportation system to help the road user. Intelligent transportation system Purchase manager

In the fourth and the last task of this process, they want to purchase the electronics and their support. Also, the types of equipment for the rescues that help in the development of the highway. During the fourth task, they have to get the help of the intelligence and transmission system at this time. This will be used by the road user and provide safety to the people as they feel safe traveling on the highway at night time. This has been a common issue in the society in which most the people face some kinds of crimes and the risk during the traveling at the night time at the highway. This is the reason the security which is provided by them will help them to get and feel safer while traveling alone, and the long-distance (Jurewicz, et al., 2016).

These all are the four task which is followed and handled by the project management integration team. After that, they have to follow these procedures to get better and fine deliveries during the construction of the bridge on the highway (Playford, et al., 2021).

Change amendment plan

During the development of the strategies and manufacturing of the highway, they have to do changes in their management plan. The change is required in the management team plan. Based on these the government has to find out the best level of contractors for their company and handle the development. This is the main reason the government of Australia and New Zealand is spending their money on the fund and for the development of the NSW roads. Based on these they have to make sure to handle the things in the manufacturing of the highways. This is the reason they have to handle the materials that will describe the strong and the manufacturing level of the construction of the highway.

In the second step of the change management plan of the company during the building the construction of the highway. They have to deal with the contractors and the suppliers of the materials. This is the reason they have to contact the suppliers which have the best quality of the materials available at a reasonable price. This will provide benefit the highway team and the government of Australia and New Zealand.

The changes in the management plan for the construction of the highway have to maintain the contract between the suppliers of the materials and the best level of the technology holder. They have to make deals with the suppliers or the dealers that will provide affordable prices for developing the bridge and the highway.  This is the main reason they have to check the price of the materials and the types of equipment and also, the resources will become under the budget maintenance. The budget will be developed by the financial department of the construction highway team of the Australian government. The changes in the management describe the importance of the construction team and their engineers’ development. Engineers and the architecture have the duty to present the authority of the Australian government and New Zealand. There are various types of tasks and the preparation required for the company’s development. This has been very clear that most of the construction companies and the machinery manufacturers will come to the team of the construction for the contract.

During the process of contracting with the companies and the supporting partner for building the bridges they have to make sure to maintain the laws and the rules, also the regulations. This is for the safety of the people and the country’s government that are funding the development of the bridge. This is their duty to make sure to handle things and develop a better and more secure plan for the construction of the Highway. These all are the details and the step that will be followed in the construction of the highway in the project management integration of the highway. They have to make sure to handle things and observe the working process. The construction team and their team members have to make sure to follow the working procedures while the establishment of the highway (Szymanek, 2015).

The motive of the building this highway on such a large scale with the big team and their settlement security and also, under their supervision. This is the manufacture of the project and this will help the people to get the information and the related to the key and the location. This is the feature that helps them to relocate to the location when they get lost during their time of traveling. Also, this is the reason the security which is provided by them will help them to get and feel safer while traveling alone, and the long-distance (Szymanek, 2015).

The motive for using this equipment at the place like the traveling at the midnight. The use of these tools and the techniques to relocate the location for the people who get lost while traveling is because this will be used by the road user and provide safety to the people as they feel safe traveling on the highway at night time.

The government of Australia and New Zealand want to install the camera on the roadside. This will help the people and the society to maintain security in the society. Also, reduce the rate of crime in the cities and people will feel free to travel. Some data present the highway crimes in Australia and these are all the data that is present and happen at the road safety and their crashing period. The statics of the data and the crime comparison on the western Australian highway describe the crime rates on the highways. There is data that present and describe the road deaths by the cars and the other vehicles on the highways (Scott-Parker, 2017).

Calendar year Driver Passenger Pedestrian Motorcyclist Cyclist Australia
2008 670 303 189 245 28 1,437
2009 707 333 196 224 31 1,491
2010 636 284 170 224 38 1,353
Baseline1 671 307 185 231 32 1,427
2011 568 286 186 202 34 1,277
2012 610 260 170 223 33 1,300
2013 557 204 158 213 50 1,187
2014 533 228 151 191 45 1,151
2015 555 251 161 203 31 1,204
2016 622 208 182 249 29 1,292
2017 566 234 161 211 39 1,221
2018 522 204 177 191 35 1,135
2019 577 205 159 211 39 1,195
2020 534 189 138 188 41 1,095
12 months to Dec-20212 532 181 134 234 39 1,127
% change to baseline -20.7% -41.0% -27.6% 1.3% 21.9% -21.0%

 

These are the data that describe the road accident details and the other data which is also, lead to the accident procedures. This is the main motive of both the country’s government for raising the fund and development. Also, installing the cameras on the corner side of the roads will help the government to track the records. This is the step that will help them to get a better level of the services and the government will be able to find out the main reason behind such level of the cases that happen on the highway. According to the data of the 12 months of road accidents that describe the death of drivers is around 532 and the passenger death is 181 (Tao et al., 2022). This is the source that is presented by the Australian road deaths data based as of November 2021 (Tao et al., 2022).

Conclusion

The conclusion of the report which has been mentioned above is the details of the construction of the highway. This is the project which is working currently in New Zealand. The main reason behind this improvement management strategy of the Barton Highway. The key benefit of this barton highway improvement strategy is to improve the efficiency of the roads. Australian and New Zealand countries’ government wants to provide security the traveling at midnight on the highway. This will help the people and the society to maintain security in the society. Also, reduce the rate of crime in the cities and people will feel free to travel. Manufacture of the project and IT will help the people to get the information and the related to the key and the location. This is the feature that helps them to relocate to the location when they get lost during their time of traveling. Also, this is the reason the security which is provided by them will help them to get and feel safer while traveling alone, and for the long distance.

 

 

References

Cozens, P., & Love, T. (2015). A review and current status of crime prevention through environmental design (CPTED). Journal of Planning Literature30(4), 393-412.

Cozens, P., & Van der Linde, T. (2015). Perceptions of crime prevention through environmental design (CPTED) at Australian railway stations. Journal of Public Transportation18(4), 5.

Foster, S., Hooper, P., Knuiman, M., Christian, H., Bull, F., & Giles-Corti, B. (2016). Safe RESIDential Environments? A longitudinal analysis of the influence of crime-related safety on walking. International Journal of Behavioral Nutrition and Physical Activity13(1), 1-9.

Ghomi, H., Bagheri, M., Fu, L., & Miranda-Moreno, L. F. (2016). Analyzing injury severity factors at highway railway grade crossing accidents involving vulnerable road users: A comparative study. Traffic injury prevention17(8), 833-841.

Giles, M. (2016). Study in prison reduces recidivism and welfare dependence: A case study from Western Australia 2005-2010. Trends and issues in crime and criminal justice, (514), 1-9.

Jurewicz, C., Sobhani, A., Woolley, J., Dutschke, J., & Corben, B. (2016). Exploration of vehicle impact speed–injury severity relationships for application in safer road design. Transportation research procedia14, 4247-4256.

Playford, D., Strange, G., Celermajer, D. S., Evans, G., Scalia, G. M., Stewart, S., … & NEDA Investigators. (2021). Diastolic dysfunction and mortality in 436 360 men and women: the National Echo Database Australia (NEDA). European Heart Journal-Cardiovascular Imaging22(5), 505-515.

Scott-Parker, B., & Oviedo-Trespalacios, O. (2017). Young driver risky behaviour and predictors of crash risk in Australia, New Zealand and Colombia: Same but different?. Accident Analysis & Prevention99, 30-38.

Szymanek, A. (2015). Methodological aspects of risk management in road transport. Journal of KONBiN36(1), 51.

Tao, W., Agha Abbasi, M., Ali, M., AL Maliki, A. H., Zainol, R., AL Maliki, A. A., & Hussein, E. E. (2022). An Advanced Machine Learning Approach to Predicting Pedestrian Fatality Caused by Road Crashes: A Step toward Sustainable Pedestrian Safety. Sustainability14(4), 2436.

MIS607 Cybersecurity Mitigation Plan for Threat Report

 ASSESSMENT 3 BRIEF

Executive summary

This report is about improving the security of the Peters Excellent Packers (PEP). Peter excellent Packers is the service of meatpacking and delivery that is located in western Sydney. Their enterprise is from small to medium and previous year their turnover was approximately $15 million. They also hire some employees and utilize their software system, established in-house. This entire system will be used for all the inventory as well as accounting purposes and huge reporting of the tax. They are concerned about the attacks that had been done with JBS Foods. The PEP has a website that takes the orders for their services and problems invoices. In this report, the mitigation project with some suggestions for ongoing security management had been designed. This is extremely significant to have accurate security management in the system therefore all the system resources could be secured from the malicious and dangerous users or attackers accessing illegally. The system integrity requirement had to be handled and controlled.

Table of Contents

Introduction. 4

Threats List and STRIDE Categorisation Summary. 5

Threats Analysis (Using Risk Matrix) 9

Threats and Controls. 12

Mitigation Scheme. 13

Conclusion & Recommendations. 15

References. 16

 

 

 

Introduction

This report is about the Peter excellent Packers which is service of meat packing and delivery and that is located in western Sydney as well. The PEP’s previous year’s turnover was approximately $15 million. They wanted to improve the security of their organization. They are utilizing their software system and the system will be utilized for all the accounting as well as inventory methods. Recently JBS foods had gone through malicious attacks. PEP is concerned regarding the attacks that had been done on JBS foods. PEP wants to secure over the same type of malicious attacks or other attacks that had been hit in JBS foods. This organization also wants some mitigation strategies over all these vulnerabilities or threats that Might find it after the research or study of the JBS foods organization. The main purpose of this assessment is to mitigate the PEP organization from the attacks that can be hit on their security system. Their security system has all the important information therefore it should not be hit. This assessment is important because it provides different threats that can be done in the organization and various attackers could hack the security systems. The mitigation strategies and the control measures are also provided in this report. Therefore, all the trades could be handled properly if the exact mitigation theory had been implemented in the organization.

 

 

Threats List and STRIDE Categorisation Summary

In the software system of PEP, there were various types of threats that could occur. The entire system is having internal as well as external threats. The PEP system could be accessed by two types of clients. One client is the general client that could access the interface of the web for locating the orders. Other is the members of a staff that could access the inter intranet for internal operations of the staff.Various types of threats are given below-

Leaking of Username and password- There were leaking of passwords and usernames of the legitimate users could occur Then the malicious user utilizes all this to access any network that they are trying.

Ransomware- These types of attacks could disturb the entire system therefore There is a requirement to be aware of these kinds of attacks. It could also cause some big losses to the operations of the organization. JBS foods the world’s largest producer of meat also per dollar million in the ransomware attack. It had been revealed by the company that it had been hit the day before by what is known as an organized cyber security attack on their North American and Australian systems and it was in the restoring process by having some backups. This attack is malware that encrypts the system of the target. Then the attackers demand a ransom to unlock all the files that they have. In some cases, the hack could also obtain access to the data of the target, and then the ransom would also guarantee that it will not be made publicly. Therefore, the PEP was away here from the ransom were attacks that could happen in the organization (Duncan et al., 2021).

Daniel of service attacks- In this attack the network on the machine shut down, creating it inaccessible to its intended users. DoS Attacks achieved this by flooding the target with traffic or sending the data or information that gives a crash in the network. The attackers sneak and go into the network to access all the data as well as information that the organization has. The organization has much important information in the systems or networks that they have created. Then the attackers could also assess that data that is having no direct allowance.

Hardware destructions- In hardware destruction there is no system of backup. In the main transaction server of the PEP, there could occur some destructions. All these destructions would lead to entire data loss.

Virus attacks- There are attackers to send some program pieces that could even destroy the entire current data as well as the system integrity. After this, the virus attacks the system and starts behaving abnormally (Mohurle& Patil, 2017).

Phishing- To the client machine there were many malicious URLs are send. When the company clicks on that URL then the system will be hacked and there would be rerouted to the site of the clone.

Insider threats- Different insider users could access the system by maintaining their self-interest. They will share the information with the other parties without having any allowance to the organization.

Privilege escalation- In this, the attackers could enhance their access privileges therefore they could access all the product’s knowledge for that they have no authorization or authentication.

STRIDE Threat modeling– Itis a significant tool in an export’s arsenal of security. The threat modeling is the team of security by a practical substructure for dealing with the threats that are coming. This model code also recommended what defenses to involve, likely the profile of the attacker, attack vectors, and attackers of assets that needed most. STRIDE Model includes six thread categories spoofing identity, tampering with the data, Repudiation threats, information disclosure threat, Daniel of services, and elevation of privileges (Namias& Chace, 2022).

  Threat Violated property Explanation of threat
S Spoofing Identity Authentication It happens when the hacker or attacker impersonates the authenticated device or user to spread malware, bypass the access control system or steal the information.
T Tampering with data Integrity It is the modifying act like manipulating, editing, or destroying the data with the help of unauthorized mediums.
R Repudiation Non-repudiation These attacks occur if the system or the application does not obtain controls to Properly track as well as actions of log users, therefore, allowing malicious manipulation or forging the identification of the new action (Alkasassbeh et al., 2016).
I Information Disclosure Confidentiality It is also known as information leakage and it happens if the website unintentionally reveals all the private information of the organization to the other users.
D Denial of service Availability In this attack the network on the machine shut down, creating it inaccessible to its intended users. DoS Attacks achieved this by flooding the target with traffic or sending the data or information that gives a crash in the network.
E Elevation of privileges Authorization In this the attackers could enhance their access privileges therefore they could access all the product’s knowledge for that they have no authorization or authentication (Agrafiotis et al., 2018).

 

 

 

Threats Analysis (Using Risk Matrix)

Threat analysis the processor utilized to determine that system component required to be secured as well as security risk types or the threat they must be secured. The threat modeling assists the PEP Organisation to quantify vulnerabilities and risks, confirming those that require extreme attention as well as resources do therefore reduce the surface of the attack which is the purpose of the attacker.

S. No. Threat Likelihood Consequence Overall risk Explanation of threat
1 Spoofing Identity Possible Major High It happens when the hacker or attacker impersonates the authenticated device or user to spread malware, bypass the access control system or steal the information.
2 Tampering with data Unlikely Minor Moderate It is the modifying act like manipulating, editing, or destroying the data with the help of unauthorized mediums (Simmons et al., 2014, June).
3 Repudiation Possible Moderate High These attacks occur if the system or the application does not obtain controls to Properly track as well as actions of log users, therefore, allowing malicious manipulation or faking the identification of the new action.
4 Information Disclosure Likely Major Extreme It is also known as information leakage and it happens if the website unintentionally reveals all the private information of the organization to the other users.
5 Denial of service Possible Catastrophic Extreme In this attack the network on the machine shut down, creating it inaccessible to its intended users. DoS Attacks achieved this by flooding the target with traffic or sending the data or information that gives a crash in the network.
6 Elevation of privileges Unlikely Moderate Moderate In this the attackers could enhance their access privileges therefore they could access all the product’s knowledge for that they have no authorization or authentication (Mozafari et al., 2020).

 

Threats and Controls

In the Peter Excellent Packers (PEP) the controls for the trades had also been recommended. All the threats could be mitigated if some Precautions are kept in mind. The best manner to secure from the spoofing involves setting up two-facto authentication (2FA), Ignoring emails and calls from unknown sources, utilizing a secured web browser, and utilizing or network firewall. Data tempering prevention could involve easy measures of security like data encryption and this could involve length like FIM or File integrity monitoring system for better security and control. For preventing the information disclosure attack the organization should use strong authorization, secure communication links by protocols that gave confidential text, use strong encryption, and do not store passwords or secret information in plain text. The Daniel of service medication defines as the processor of successfully securing a network or targeted server from distributed attacks of Daniel of services. The targeted victim or network is capable to mitigate the coming threat or risk with the help of designing network equipment or service of cloud-based protection (Raiyn, 2014). To mitigate the ransomware risk the organization has an accident response plan. The backups are also critical in this attack. The organization should utilize anti-spam and antivirus solutions. The organization should maintain all the systems patched. The organization should restrict internet access and utilize a proxy server for internet access. They should also restrict access to usual entry points of ransomware like social networking sites and personal emails accounts. The organization must apply the least privilege principles as well as segment the network.

 

 

Mitigation Scheme

Control access to ecosystem applications– As many employers are hired in the organization then it is very difficult to confirm who is the right person and who is assessing the applications at the right time. So locating robust access management or AM abilities at the manufacturing technology or steak permits the organization or the companies to influence Standardised protocols, the identity of federated and context-driven SSO that is also known as one single sign-on to confirm that the right phase of access control had been applied at the correct time. The workflow of AM would easily develop and change the manufacturing ecosystem that continues to increase and it would also decrease the cost, time, and risk in the organization.

Strengthen Authentication– In the organization more workers, partners and suppliers utilize antiquated means of authentication. Therefore, by leveraging contextual signals, CARTA or Continuous adaptive risk and trust, and security of zero trust then the organization could make stronger and reinforce the years step up and basic authentication workflows as well as it will also reduce or entirely decrease the reliance on passwords and usernames. It would also mitigate the risk of weak credentials, phishing attacks, and malicious actors’ ability to spread ransomware and malware attacks over the company.

Modify correctly- Nowadays all the organizations wanted to modify their systems and they are also obtaining cloud-based IAM. Implementing these technologies and modifying the technologies will be beneficial for the organization but somewhere the security could become at risk. Therefore obtaining the hybrid IAM solution permits the company to control the modernization at their speed and to expeditiously Legacy system that creates a huge risk to the security. The most useful and successful hybrid solution gives the Means to unity that recognize over various on premises, hybrid, and cloud identity stores while contributing to entire tenant isolation and the latency to control spear in the traffic.

Secure non-human identities- The explosion of both industrial, as well as consumer IoT in the manufacturing industry, had made weakness growingly exploited by other malicious attacks. By influencing hi capabilities of IAM at the edge company or capable to make seamless and secure management for the link and control devices of IoT and other identities of non-human. Establishing a standards-based method for authorizing as well as authenticating this identity gives the company a scalable as well as and automated method for implanting zero trust security at the manufacturing technology stack score by not needing human interventions. This would also permit companies to simply integrate the identities that are non-human by the organization applications at pace.

 

 

 

Conclusion & Recommendations

It had been concluded from the entire report that Peter excellent Packers or PEP is the meat Packing as well as delivery service that is located in western Sydney. They have a website for delivering and packing the services. From that website, they take the orders and the issue invoices also come from that website. All the transactional databases had been linked by that website. They have heard about JBS foods that got hit by attacks on their site. Therefore PEP wanted to know what kinds of threats could come into their organization and how they will mitigate all these risks and threats. In the report, the threats that could come to the organization had been mentioned and the mitigation strategy and scheme were also mentioned in the report. The threat analysis of the risk that could come in the organization or also mentioned in the report. It had been recommended that the organization and all the users should be aware of the coming risks and threats. The organization should implement and locate robust access management or AM abilities at the PEP. Nowadays all the organizations wanted to modify their systems and they are also obtaining cloud-based IAM. Implementing these technologies and modifying the technologies will be beneficial for the organization but somewhere the security could become at the risk.

 

 

References

Agrafiotis, I., Nurse, J. R., Goldsmith, M., Creese, S., & Upton, D. (2018). A taxonomy of cyber-harms: Defining the impacts of cyber-attacks and understanding how they propagate. Journal of Cybersecurity4(1), tyy006. https://academic.oup.com/cybersecurity/article-abstract/4/1/tyy006/5133288

Alkasassbeh, M., Al-Naymat, G., Hassanat, A., &Almseidin, M. (2016). Detecting distributed denial of service attacks using data mining techniques. International Journal of Advanced Computer Science and Applications7(1), 436-445. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.742.3528&rep=rep1&type=pdf

Duncan, S., Carneiro, R., Braley, J., Hersh, M., Ramsey, F., & Murch, R. (2021). Beyond ransomware: Securing the Digital Food Chain. https://vtechworks.lib.vt.edu/bitstream/handle/10919/107740/2021%20Duncan%20et%20al%20Beyond%20Ransomware%201021_F1_Cybersecurity%20Food%20Technology.pdf?sequence=2

Mohurle, S., & Patil, M. (2017). A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science8(5), 1938-1940. https://sbgsmedia.in/2018/05/10/2261f190e292ad93d6887198d7050dec.pdf

Mozafari, N., Weiger, W. H., &Hammerschmidt, M. (2020). The Chatbot Disclosure Dilemma: Desirable and Undesirable Effects of Disclosing the Non-Human Identity of Chatbots. In ICIS. https://www.researchgate.net/profile/Maik-Hammerschmidt/publication/344416480_The_Chatbot_Disclosure_Dilemma_Desirable_and_Undesirable_Effects_of_Disclosing_the_Non-Human_Identity_of_Chatbots/links/5f734ebc299bf1b53efe91d9/The-Chatbot-Disclosure-Dilemma-Desirable-and-Undesirable-Effects-of-Disclosing-the-Non-Human-Identity-of-Chatbots.pdf

Namias, D., & Chace, J. (2022). US Warfare Within the Fifth Domain: Deterring Russian Cyber Aggression. https://digitalcommons.liberty.edu/cgi/viewcontent.cgi?article=1267&context=hsgconference

Raiyn, J. (2014). A survey of cyber attack detection strategies. International Journal of Security and Its Applications8(1), 247-256. https://www.researchgate.net/profile/Jamal-Raiyn/publication/281026425_A_survey_of_Cyber_Attack_Detection_Strategies/links/5f44be57458515b7294f1ffa/A-survey-of-Cyber-Attack-Detection-Strategies.pdf

Simmons, C., Ellis, C., Shiva, S., Dasgupta, D., & Wu, Q. (2014, June). AVOIDIT: A cyber attack taxonomy. In 9th Annual Symposium on Information Assurance (ASIA’14) (pp. 2-12). https://www.albany.edu/wwwres/conf/iasymposium/proceedings/2014/ASIA14Proceedings.pdf#page=12