ACCT

1. Discuss some types of personal information that companies collect from their customers and discuss what they are used for. How is information collected, and do the customers know about it? Do they have a choice in the matter? Explain how. 2. One of the basic purposes of internal controls is safeguarding of assets.  For example, most organizations keep cash in the bank rather than in the office itself. Can you give some of the basic purposes and explain with examples? Is employee data part of company assets? 3. Discuss the privacy concerns that might arise from the use of biometric authentication techniques. What about the embedding of RFID tags in products such as clothing? 4. Would there be any privacy concerns if an unauthorized person gets hold of biometric information stored on a server? 5. How can companies use internal controls to safeguard customer information. Have you heard about social engineering computer crime techniques? 6. hackers and other computer crime perpetrators prefer to use “social engineering” techniques to get around system controls.Do you agree? 7. Data protection is very important. Yet many organizations are unable to protect their data. What data protection techniques have worked for your company, or you think will work? 8. Has anyone heard about cloud computing? Do third-party back-up facilities pose major risks? 9. Would there be any privacy concerns if an unauthorized person gets hold of biometric information stored on a server? 10. Should the government mandate minimum standards for controlling and securing information? Discuss some advantages and disadvantages of the mandate. 11. How would you relate your response to Sarbanes Oxley internal control requirements? Hint: publicly traded companies must establish effective controls over financial reporting. 12. Which of the controls should organizations spend more resources on? – Preventive, detective, or corrective. 13. SOX has changed the work of independent auditors; auditors have to evaluate internal controls and issue an opinion. Further, SOX requires public companies to design and implement internal controls.Class: Can you explain the role of SOX in protecting customer information? 14. Do you think it is important for auditors and accountants to acquire information technology skills?15. The “separation of duties” element of an organization’s internal control system means that, for instance, employees who are given responsibility for the physical custody of specific company assets (e.g., handling cash or inventory) should not also be given responsibility for the record keeping functions relating to the assets (e.g., recording cash or inventory transactions in the company\’s journals and ledgers). Otherwise, an employee could misappropriate company assets and then attempt to conceal this fraud by falsifying the accounting records. Class: How does “separation of duties” help in preventing, detecting and correcting computer security breaches? 16. How will you relate your response to user activity trails? 17. Name a company that you think uses process costing. Name the company’s product and state why process costing is appropriate. 18. Process costing is difficult to understand and remember since there are so many little detailed steps in the calculation.      Pick one of the steps in process costing him briefly describe what the step tries to accomplish 19. Do a quick Google search and see if you can find any companies in these that of implementing activity-based costing or who have abandoned an ABC operation. From the details of the article, can you see any trends or issues? 20. What type of organization or company would use activity-based costing? 21. What are the limitations of activity-based costing?     

Immediately

Computer Crimes and Computer SecurityYou have been hired as a security representative at Computers, Security, and Investigations Inc. (CSII). CSII has approximately five hundred employees who specialize in computer security and computer investigations and consulting services.One of your first assignments is to ensure that all employees are educated about computer crime and security. Your supervisor has asked you to chair a meeting with senior managers to outline the issues employees should be made aware of.On the basis of your assigned readings, discuss with your classmates the information you think every employee of CSII should know related to computer security.Submission Details:By , in a minimum of 250 words, post to the  your answers to the following:Support your discussion points with the help of valid sources.

Criminal Justice

The focus of the Holistic Victim Restitution Plan is to critically analyze victimology through the application of information from sociology, law, psychology, ethics, and related fields to the study of victimology and to develop a holistic plan for victim restitution.Consider the following questions when analyzing the 10 required scholarly sources:In creating your Holistic Victim Restitution Plan, you are required toThe Holistic Victim Restitution Plan

Marketing 3

You will continue your comprehensive marketing plan, researching the company that you researched in previous units. You will conduct an Industry Analysis and a Competitive Analysis. Perform an industry analysis detailing how the overall industry is performing. Research trends in the industry as well as projections for the future. Remember to cite your research.Perform a competitive analysis reviewing multiple competitors that offer similar products/services. How is your company different from its competitors? Think about the products/services offered or their pricing strategy or even their distribution strategy. What is the overall brand perception in the mind of the consumer? How does each rank base upon a pertinent parameter? Should be a , double-spaced with a reference page and title page. References should include at least one additional, credible reference beyond the textbook. All sources used must be referenced; paraphrased and quoted material must have accompanying citations and cited per APA guidelines. Include the use of subheadings (consider using Industry Analysis and Competitive Analysis). 

Rey Writer

 word APA formatted paper:  – Proposing a funding strategy for the knowledge management strategy that you have designed up to this point. – Proposing a plan on cultivating a knowledge-sharing culture to include the three major ways to directly influence the norms and behaviors of knowledge workers for the company that you chose to support in your week two assignment.Be sure to use a title page, an introductory paragraph, and first level headings that align with the assignment requirements and the Reference Page. 

Marketing

 Within the Discussion Board area, write 750–1,000 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.The board members were very impressed with your presentation and how you are moving through the product development process. Michelle is ready now to start looking at the promotional part of the plan. She has been reading technical publications that laud the advantages of high-tech or digital promotional tools (i.e., Internet, social media, blogs, etc.) over traditional approaches (i.e., TV, radio, newspapers, and magazines) to reach potential customers. You catch up with her in her office before she leaves on a business trip. Respond to at least 2 of your fellow classmates with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:The materials found in the M.U.S.E. may help you with this assignment. Additional information is also provided in the found at the following link:

chapter 3 #11

The element occurs on earth as titanium (IV) oxide and is found mostly in the mineral called . Rutile is abundant in beach sands in Australia and South Africa. For titanium to be useful, rutile has to be processed to obtain the basic metal form of titanium. Although the process is costly, titanium is gaining popularity as a material for various equipment due to its strength and light weight. One such application is in sports equipment.Your total response must be at least 200 words in length.APA FORMATALL WORK CITED

Coding of multi-user network program with client and server on microsoft visual studiobe multi-user network based ï±incorporate basic Graphical User Interfacemake…

Coding of multi-user network program with client and server on microsoft visual studiobe multi-user network based incorporate basic Graphical User Interfacemake use of multi-dimensional arrays and/or generic collections for organization and processing of data during program executionincorporate exception handling mechanism involve reading and writing of data to persistent data storage 

Measuring and Interpreting Brand Performance

15 to 18 pages   The New Product Launch            Part 1: Updated Unit 2 Individual Project   Copy and paste your Unit 2 Individual Project into this week\’s template. If your instructor suggested updates, these should be included in this submission. You will want to omit the sections of the headings that say \”Part 1 & Part 2.\”   Part 2: Brand Positioning & Concept   In this portion of the brand launch, you will cover the following areas:        Part 1 of the Individual Project should be 2 1/2 – 3 pages in length. Be sure to cite your resources.    Part 3: The Strategy   Consider all aspects of promotion from traditional to new media:        Part 2 of the Individual Project should be 3-4 pages in length. Be sure to cite your resources.         YOU WILL SUBMIT TWO COPIES OF YOUR ASSIGNMENT THIS WEEK. PLEASE FOLLOW THE INSTRUCTIONS CAREFULLY.         2.       Go to the Group Discussion Board. Create a Discussion Thread for yourself and COPY AND PASTE the Unit 3 Individual Project so that you may receive critique from your group in Unit 4.       

business law research – employment lay

In a 1-2 page paper, discuss  of the ten following laws. Explain why they were enacted. Give a short summary of each law/act that you choose. Explain what it does, who  it effects, and how. How does it protect employees and/or employers? What occurred which brought forth the need for laws to be established? Remember to place the name of the law above your description and choose only  of the ten listed below.