Project 4 (55 Points)

Look into the future of the world, imagine it is the year 2035, and discuss the changes in technology and their effects on society. Analyze economical, social, political, psychological, and environmental effects that one of the following technology types has transformed the world in 2035.

*Choose one from the following list:

Energy (power grid, fuel, etc.)
Workplace (service, manufacturing, construction, etc.)
Weapon Technology
*Note: This is to be your ideas only, no research. Please make sure you address the following discussion topics in your response: economical, social, political, psychological, and environmental effects that your one chosen technology type addresses.

Value Creation Through Diversification

Annotated Bibliography on Value Creation Through Diversification

For this Assignment, you will create an annotated bibliography focusing on models used by companies to leverage diversification. These models also can serve to construct a portfolio management tool that characterizes business unit strategy and measures company results. These results are a valuable tool for evaluating how a corporate strategy differs from a business-unit-level strategy.

To prepare for this Assignment, select four peer-reviewed scholarly articles, with each article addressing a topic of interest for research. For more information, refer to the Walden Writing Center’s annotated bibliography sample document provided in this week’s Required Readings.

By Day 7

Submit 3 page annotated bibliography for the four peer-reviewed resources you selected. In your annotated bibliography, include the following:

A full APA-style bibliographic reference including the author, title, publisher, and place of publication

A summary of the document (2–3 paragraphs for each entry), including the main points, its purpose, the theoretical perspective on which it is based, and the scope

For each article, evaluate the following:

Reliability (research methods used, theories used, and data on which it is based)

Appropriateness for the intended audience

Background and authority of the author

Limitations of the research (which can depend on the scope, reliability, age of the document, and bias)

Significance of the research

Computer science

Application: Creating a Security Policy

You have just purchased a used car at a fantastic price. You are so excited that you decide to take an extended drive. Unfortunately, you experience a flat tire and discover that you do not have a spare. Now, your vehicle is disabled because you are missing a critical component. You are in a potentially bad situation.

One aspect of security policies that is often neglected is what assets staff members are permitted to use and how they may use those assets. Failure to address staff members in security policies might weaken an organization’s legal position. An incomplete security policy, like a missing spare tire, may not be realized until an incident has occurred. Consequently, the organization could find itself in a potentially bad situation.


The U.S. Army has hired your firm, Token Tiger Consulting (TTC), to provide IT services to one of their new civilian contractors. Although the exact nature of this contractor is not known to TTC, the Army has indicated that this contractor will be gathering and storing “sensitive” data, and communicating with the Army via the Internet and communications security (COMSEC) equipment. Furthermore, some contractor staff travel often and are required to use their own personal devices for work.

The Colonel that hired TTC has asked you to begin drafting a security policy for the contractor. You decide to begin with the separation of duties (SoD), staff legal obligations (e.g., bring your own device [BYOD], social media, and acceptable use), and the COMSEC equipment.

write a  security policy that:

  • Specifies SoD requirements for contractor staff who handle sensitive data
  • Addresses the legal obligations that pertain to contractor staff
  • Specifies procedures for COMSEC equipment


family labor and the growth of the northern volonies

  1. The title of Chapter Three is “Family Labor and the Growth of the Northern Colonies.” Discuss the concept of family labor as it applies to the northern colonies of the seventeenth and eighteenth century. How does Who Built America? distinguish this concept from the individualistic free for all which it says characterized the growth of the southern colonies? In what ways does a society based on “family labor,” differ from one based on economic individualism? On democracy?


  1. Who Built America? says that by modern standards, the northern colonies were not democratic, yet they were more. democratic than other societies of the eighteenth century. Do you think that this is a fair summary of social and political conditions in the eighteent century northern American colonies?




Include specific examples that support your thesis and conclusions.

1. What did the Qin Emperor standardize and how did that standardization help him organize and rule his realm?

2. What was life like for peasants during the Han Dynasty? Include a description of the role of women and children.

3. Describe the impact of Chinese civilization on Vietnam and Korea. What aspects of Vietnamese culture were most affected by China, and how were those elements spread from Chinese civilizations? How did non-Chinese accommodate themselves (or not) to these influences from China?

4. The Tang dynasty is said to have been one of the high points of Chinese civilization. What were the accomplishments of this period in Chinese history?

Business Studies

  1. Company Overview

2.1.   Background

Products / Services: Briefly summarize the company; describe each brand, division, and/or service.  What is the company’s mission, values, and objectives?

History: Develop a brief timeline of the company that includes the date of the founding and major corporate events including IPOs, M&A’s, CEO transitions, other major events (e.g., bankruptcy filings), etc.

Industry: List the company’s primary and secondary SIC codes and NAICS codes and include the industry descriptions.  In addition, include the company’s stock symbol, CUSIP number, and all other relevant classification information.

Background summary: Comment on the situation the company is facing in the case you read.

2.2.   Performance Analysis (some of these will require external research)

Financial Performance: Select two performance measures/ratios.  Then, in separate graphs, plot the performance measure over a five-year period comparing the measure against those of the company’s top 2 or 3 competitors and the industry average.  In a short paragraph, discuss whether the company is enjoying competitive advantage or suffering competitive disadvantage.

Now discuss the company’s primary stakeholder performance (i.e., investors, customers, and employees):

Investor Performance: In a single graph, plot the company’s stock price against the stock prices of its top three competitors and the S&P 500 index.  Make note of any stock splits, stock buybacks, etc.  Then, in one table, summarize the stock analysts’ buy/sell recommendations of stock analysts (see Yahoo! Finance).  Compare this information to the company’s top three competitors.  Finally, in a short paragraph, summarize the information and assess the company’s investor performance.  To what extent is the company meeting investor expectations?

Customer Performance: Find customer satisfaction rankings, product reviews, product recall information, etc. from Consumer Reports.  If you can find the data, discuss the rate of repeat business, price comparisons, quality, etc.  Provide a comparison to the company’s top competitors. Then, in a short paragraph, assess the company’s customer performance.  To what extent is the company capable of satisfying its customers’ needs?  How does the company’s customer satisfaction and/or product quality compare with its competitors?

Employee Performance: Find any information on the company’s performance in context of its workforce.  Look for rankings of the “best companies to work for,” news reports of labor troubles (e.g., lawsuits), and whether the company’s workforce unionized).  Then, in a short paragraph, assess the company’s employee performance.  To what extent is the company capable of satisfying its employees’ needs?  Is the company rated a good employer?

Other Stakeholder Satisfaction: Find information concerning the company’s environmental performance (e.g., rankings of “green companies” and company environmental programs). Find information concerning the company’s social responsibility (e.g., charitable and “cause-related” activities).

Performance Summary:  In a short paragraph, summarize what the performance assessment reveals about the company.  A good financial analysis goes beyond the numbers and makes conjectures about emerging trends and likely strategic implications of the numbers, often by combining insights from multiple elements of the financial statements.  Consider some of these questions in your discussion: How does the performance of the company compare with its competitors?  Over the past five years, has the company’s performance improved or decline?  Based on your analysis, does it appear that the firm’s financial performance is headed in the right direction?  What is your prognosis for the next couple of years?  Are there signs of competitive (dis)advantage?



The United Nations predicts that by 2050, the world’s population will exceed 9 billion people.

Discuss the consequences of population growth on the world’s resources (include environmental and health factors such as food, water, air, access to medicine). Why is the world’s population growing so fast? And how is technology contributing to this rapid growth?

McDonald’s Hot Coffee Case

Using one or more online sources, review the fact situation that led to the tort litigation and examine the situations, legal issues, and court resolutions of the case. Describe your opinion of tort law, its advantages and disadvantages for businesses and consumers, and your understanding of who might benefit from tort law protections.

White Collar Crimes

“Certain types of crime are prone to being committed by businesspersons. These crimes are often referred to as white-collar crimes.” What is your understanding of the difference between white-collar crimes and common crimes affecting businesses? How does a focus on business ethics and mandatory ethics training impact the commission of crimes in a business environment? Are there specific examples in the past decade that can be cited as evidence to support your position and statements?

Russia: Stalin

use Robert Service, A History of Modern Russia: From Tsarism to the Twenty-First Century. Cambridge, Massachusetts: Harvard University Press 2009.