Saturday, December 28, 2019

The Death Of Breast Cancer - 1386 Words

Breast cancer isn’t a death sentence as it was before. Women used to fear being diagnosed with this disease because there was no cure for it. Breast cancer has been around for centuries, but the advancement of medicine has increased the chances of survival, and in the future the improvements will be even greater. The first mention of breast cancer was documented in Egypt in 1600 B.C. It was considered a mysterious disease with no cure to it. In The Edwin Smith Papyrus, there are eight cases of tumors or ulcers in the breast. During these times, the people believed it was caused by a lack of sexual activity and physical injuries. Because of the fact that people believed there was no cure, no one did anything to try to solve the problem.†¦show more content†¦With the advancement of medicine, diagnosing breast cancer is much easier now than it was before. Mammograms are a very common way of diagnosing breast cancer. A mammogram takes x-rays of the breasts and checks for any abnormalities in the breast. A breast ultrasound is also another way of diagnosing breast cancer. â€Å"Ultrasounds use sound waves to produce images of structures deep within the body†.(Mayo Foundation for Medical Education .) The only way to be sure that a patient s lump is cancerous or not, is by performing a biopsy. During the procedure doctors take cells from the affected area and test them to see if they are cancerous. The biopsy also determines the aggressiveness of the cancer, and what type of treatment would be the best for the patient s type of cancer. Not all patients can receive the same form of treatment. There are many ways to treat breast cancer, one being chemotherapy. Chemotherapy uses drugs that kills cancer cells. One of the three major purposes of chemotherapy is to prevent the cancer from coming back after surgery and radiation. That is called adjuvant therapy. Another one of the reasons that patients choose the treatment of chemotherapy, is to shrin k the tumor. If the tumor is smaller than it will be easier to remove during surgery. There is an advantage to chemotherapy because the surgery becomes more risky if the tumor is bigger. The last reason for chemotherapy isShow MoreRelatedBreast Cancer- Leading Cause of Death1436 Words   |  6 Pages Breast cancer continues to be the leading cause of death for middle aged women. In the past year, there were over 194,000 new cases of breast cancer in the U.S., approximately 20% of which did not access treatment in time despite the availability of educational resources. Breast cancer is a malignant tumor that develops in a female or male’s breast cells. Though the condition is not gender specific, it is most prevalent in middle aged to older women. It’s malignant foundation causes it to also conquerRead MoreBreast Cancer : The Second Leading Cause Of Death1244 Words   |  5 PagesBREAST CANCER EXECUTIVE SUMMARY Breast cancer is the second leading cause of death in women. Breast Cancer was first discovered more than 3,500 years ago, surgery was an available option is the mid-19th century. Many procedures were available in the 1990’s and early detection without technology because of visible symptoms. Breast Cancer rate has decreased thirty four percent since the 1990’s. Breast cancer doesn’t just affect women but as well. .01% of men are diagnosed with breast cancer. BreastRead MoreBreast Cancer : The Most Common Cause Of Death Among Women Essay1574 Words   |  7 PagesBreast cancer is the most common cause of death among women (Centers for Disease Control and Prevention, 2016). The latest data from the Centers for Disease Control and Prevention (C.D.C.) state that in 2013 230,815 women in the United States were diagnosed with breast cancer, and in 2013 40,860 women died from breast cancer (Centers for Disease Control and Prevention, 2016). From 2002 to 2012, the occurrences of a breast cancer diagnosis remained at an even level, however the death rate from breastRead MoreBreast Cancer : A Leading Cause Of Death And Major Health Problem2774 Words   |  12 PagesIntroduction Cancer is a leading cause of death and major health problem all over the world. According to the statistics from World Health Organization (WHO), more than 10 million people are diagnosed with cancer and about 6 million will die from these disease each year. Among all the cancers, breast cancer is the most widespread malignancy in women. In 2013, Breast cancer was estimated to claim close to 40,000 lives with over 200,000 new cases in American women, making it major cancer mortality reasonRead MoreBreast Cancer : The Second Leading Cause Death Of The United States1123 Words   |  5 PagesBreast cancer is the second leading cause of death in women in the United States. A mammogram, is a simple test done with x-ray, to screen women for abnormalities of the breast. Over the past six years, the guidelines put out by various healthcare organizations have changed multiple times on when women should begin screening mammograms. Based on statistical data collected by the Kaiser Family Found ation (KFF), 20 percent of women go without a screening mammogram for their own various reasons, ofRead MoreA Brief Look at Breast Cancer Essay1736 Words   |  7 PagesBREAST CANCER Introduction/Background Cancer is characterized by unregulated/uncontrolled growth and spread of abnormal cells. The etiological factors of Cancer include both external factors (tobacco, infectious organisms, chemicals, and radiation) and inherent factors (inherited mutations, hormones, immune conditions, and mutations that occur from metabolism). The etiological factors may act together or in sequence to trigger the development of cancer. It may take several years for the manifestationRead MoreThe Issues of Breast Cancer in Nigeria Essay1552 Words   |  7 Pages‘mild breast lumps.’ It is an ailment that could lead to breast cancer. We are happy to see women respond to our awareness programs.† said Dr. Rosa Phil (1). In her article, Dr. Phil commends Mrs. Anyanwu for taking action against breast cancer as she recommends all women do the same. The issue of breast cancer is fast becoming a major one. There is a huge hole to be filled in the area of breast cancer awareness in Nigeria. An article posted in the ‘The Daily Trust’ titled, â€Å"Breast Cancer amongstRead MoreBreast Cancer : Cancer And Cancer1714 Words   |  7 PagesBreast Cancer The twentieth century has often been called and known as the cancer century. The reason being is that throughout the century, there have been more than a hundred types of cancer discovered across the world. In addition to the discovery of these many cancers, there has been an enormous medical effort to fight all kinds of cancer across the world. In the early decades of the century, cancer was considered to be a fatal disease, resulting in a high number of deaths. Although manyRead MoreEssay On Tannic Acid904 Words   |  4 Pagesand HER2+ breast cancer Project Summary In the United States, 1 in 8 women will develop breast cancer in her lifetime. The investigation into effective post-surgery treatments for prevention of breast cancer recurrence and tissue restoration is paramount. Current post-lumpectomy therapies are purely cosmetic, involving breast reduction or simply reconstructing the breast with traditional silicone implants. There is a great need for a medical implant that not only restores the removed breast tissueRead MoreBreast Cancer : Causes, Signs And Symptoms And Risk Factors1539 Words   |  7 Pagesliterature on overview of breast cancer, its causes, signs and symptoms and risk factors. It will also look at literature on screening methods of breast cancer, particularly mammogram. OVERVIEW OF BREAST CANCER According to Rodney et al (2003), breast cancer is the commonly occurring cancer in women, responsible for one third of all malignancies in females. It is said to be the second to lung cancer as a cause of cancer mortality and has been found to be the leading cause of death for American women between

Friday, December 20, 2019

Child Abuse Is An Issue That s Going On Every Day

Child abuse is an issue that’s going on every day. Child abuse is defined as harmful behaviors against children which can become psychological. Child abuse includes different conditions. It can harm children and teenagers in different ways, including being abused sexually, physically abused, child neglect, emotional neglect and abuse, and failure to thrive. These conditions can effect a child or a teenager’s in different ways. It can interfere with the way the child turns out to be in the future. Children and teenagers are usually abused because the abuser, was abused as a child. In some cases, the abuser didn’t develop characteristics or have the education and skills needed to raise a child. Child abuse has it causes as well as its effects. It is up to the citizens to come up with solutions to stop such unhealthy problem. Child abuse can be caused for many reasons. This happens mostly in families who lack support or are under pressure for some reason. Lack of ed ucation can be a cause for why children and teenagers are getting abused. The abusers lack on discipline, academics, and basic knowledge skills. Most of the time, it is not the abusers fault because this issue was probably going on with their parents in previous generations. Violence between family members can be another cause for why child abuse is occurring. Frequent changes of addresses might be another problem because those individuals don’t know how to adapt to one place which affects the way they treat theirShow MoreRelatedChild Abuse1192 Words   |  5 Pages Doug mikel Child Abuse Sociology 111 Tues./Thurs. 8a-9:15a Tina Harrell 9/21/2014 Imagine living a life you fear, one you have to keep a secret. Always pretending to be happy and carefree when deep down thinking, Please don t let this day be the last. Living in a house where painful marks and scars are hidden by long sleeves, and jeans. Looking over your shoulder wondering when the next assault is going to be. â€Å"Almost five children die every day as a result of child abuse.  Ã‚  More than threeRead MoreChild Abuse And Its Effects On Children1126 Words   |  5 PagesMrs.Pettit 6 June 2015 Child Abuse â€Å"It’s easier to throw away a child who reacts to his abuse than attempt to heal his pain†- Dwight E. Abbot . As a world we need to protect our children from child abuse whether the abuser is emotionally disabled or not mentally stable if we make a change to stopping child abuse many children lives can be saved. Child abuse endangers the child’s physical and emotional health and development. Our society needs to prevent child abuse at all cost. Throughout theRead MoreKeeping secrets1746 Words   |  7 Pageskinds of reasons for child abuse. As there are different kinds of child abuse. Such as, physical abuse, sexual abuse, mental abuse, and neglect. Abuse occurs in all cultures. It doesn t care if you re rich or poor, what color your skin is, what your religious background is, or any other mitigating factors. No one is immune to abuse. If a child has unexplained bruises, broken bones, and even cigarette burns, that is physical abuse. Physical abuse can also cause death to the child. No adult has a rightRead MoreCurrent Event : Child Abuse Prevention909 Words   |  4 PagesCurrent Event – Child Abuse Prevention in Idaho On April 9th, 2015, the Boise, Idaho law enforcement agency, students, and social workers joined in alliance with a total of 200 people kicking off the introduction to the Child Abuse Prevention Month on the Capitol steps in Boise. The Nampa Family Justice Center hosted their first annual child abuse prevention march. The march began at the Caldwell police station and proceeded to the courthouse where participants planted a garden of blue pinwheelsRead MoreChild Abuse Is A Worldwide Problem1509 Words   |  7 PagesChild abuse is a worldwide problem. According to the Journal of Child Abuse and Neglect, it is interpreted as any recent act of failure to act the part of a parent or caretaker which results in death, serious physical or emotional harm, sexual abuse or exploitation, which is an action or the failure to act which presents an imminent risk of serious harm. Abuse comes in many forms such as: emotional, physical, sexual, verbal and neglect. Neglect is the failure to care pr operly; It has been provenRead MoreDomestic violence1229 Words   |  5 PagesEssay Final Draft â€Å"Every year, in the United States there are over 3 million incidents of reported domestic violence. Every year, 4,000 victims of domestic violence are killed.† (Domestic Violence: Disturbing Facts about Domestic Violence). Domestic violence is a crime that is not just committed in the United States, but worldwide. This crime is committed every day, every hour, every minute, and every second. Anybody can be a victim or the abuser. This can happen to any child, man or woman. ThisRead MoreChild Abuse And Neglect Of Children Essay1208 Words   |  5 PagesFrom the time I was a little girl, I’ve wanted a child. I always loved getting new toy baby dolls, and being able to take care of them as if they were really my children. Now, at age seventeen, I still can’t wait to be a mother. I’ve always promised myself that when I have a child of my own, he or she would be my top priority and I would love him or her with everything I have. Because of this mindset, it breaks my heart when I see or hear about children being abused and neglected by their parentsRead MoreThe Effects Of Physical Abuse On Children And Young People Essay1571 Words   |  7 Pagesmost up to date training in safeguarding as the signs and symptoms, indicators and behaviours of abuse in children and young people can come in different forms, and they are physical abuse, emotional abuse, neglect and sexual abuse. The forms of physical abuse can include signs and symptoms such as unexplainable recurrent injuries or burns, missing hair, a child running away from home, fear of going to the doctors or hospital for a medical examination, fear of contact with others and being touchedRead MoreChild Abuse and Neglect1653 Words   |  7 Pages Child Abuse and Neglect Child abuse, or child maltreatment, is an act by a parent or caretaker that results in or allows the child to be subjected to death, physical injury, sexual assault, or emotional harm. Emotional abuse, neglect, physical abuse, and sexual abuse are all different forms of child abuse. Child abuse is more than bruises and broken bones. While physical abuse might be the most visible, other types of abuse, such as emotional abuse and neglect, also leave deep, lastingRead MoreThe Effects Of Child Abuse On Children1623 Words   |  7 PagesOnce a child is exposed to violence or is abused, it stays with them forever. A child’s brain forms daily and they are always ready to learn. So if they are taught love and care or violence and cruelty then they will sure learn this and mimic it. Once a child experiences any type of abuse they should get treated professionally as soon as possible because the longer they wait to get treated the more risk they run to have emotional problems later in their life. Child abuse affects every child no matter

Wednesday, December 11, 2019

Entering the Ice Cream Business Essay Sample free essay sample

The primary capable affair of this instance is strategic direction for little concern. specifically developing a new merchandise and come ining into a new competitory sphere for an established little household concern. Secondary issues examined include marketing scheme. human resource direction. and operations direction in the little household concern. The instance is appropriate for junior and senior degree undergraduate classs. The instance is designed to be taught in one category hr and is expected to necessitate about three hours of outside readying by pupils. The events described in this instance are based on existent universe experiences. CASE SYNOPSISJeff Kleinpeter. 4th coevals CEO of Kleinpeter Farms Dairy. has boldly led his family’s concern into a new product/market country. specifically the production and distribution of ice pick. For about one hundred old ages. Kleinpeter Farms Dairy has served the south Louisiana country as the taking milk processor and distributer. but now the company has invested 1000000s of dollars in a new. but related merchandise. Jeff seeks to construct on the trueness and good will generated among consumers because of Kleinpeter’s first-class repute for high quality milk merchandises in the south Louisiana country. Kleinpeter entreaties to local clients through cross-branding other Louisiana merchandises. such as Ponchatoula strawberries. Bergeron pecans. and Elmer’s Gold Brick Eggs. After the new merchandise is launched. the company experiences challenges in selling. operations. and human resource direction. Cardinal words: little concern scheme. new merchandise development. selling scheme. household concern Journal of the International Academy for Case Studies. Volume 16. Particular Issue. Number 1. 2010 IntroductionSteping into a quiet corner down the hallway from the bombinating noise of the auction. Jeff Kleinpeter smiled as he spoke into his cell phone. â€Å"Sue Anne. we are in the ice pick concern. â€Å"There is no turning back now. We merely spent $ 58. 000 on one piece of equipment. † â€Å"Jeff you know that I trust your judgement. but this is a spot over the top. don’t you think? Are you certain about this? † Sue Anne questioned in answer as any CFO worth their salt would make. â€Å"I know that this is traveling to be a immense investing for us. We discussed this at length with pa before winging out here to Dallas. Joe May. our ice pick works adviser. is here with us and he assures me that this is a great trade for us. † answered Jeff. â€Å"From the clip I received a notice in the mail that a immense ice pick company here was shuting down ; I thought that this might be our opportunity to purchase ice pick devising equipment at deal cellar mo netary values. † â€Å"Why did they shut down? † asked Sue Anne. â€Å"They said their biggest history had pulled out nightlong. It was 60 per centum of their concern. That was it – they had to close down. † Jeff replied. â€Å"I am glad that Joe is at that place for the proficient advice. We know about milk and the dairy concern. but ice pick is new for us. You are certain about this now. Jeff? † asked Sue Anne once more. â€Å"In the auction. we bid the $ 58. 000 on the ice pick freezer itself – the thing that pumps the air in and has the blades that turn to do the ice pick. It has three barrels and makes 1200 gallons of ice pick per hr. Additionally. we bought six all right pieces of equipment for approximately 10 cents on the dollar. It is beautiful. trade name new equipment – province of the art. Don’t worry ; Joe is reding us on the proficient facets of fillers and shrink-wrappers. † Turning THE Company: THE NEED FOR ICE CREAMWith the purchase of the ice pick equipment in Dallas. Jeff had started the household concern on a great escapade. possibly the biggest hazard taken in 95 old ages at Kleinpeter Farms Dairy. The thought was non new with Jeff. For old ages. the Kleinpeters had thought approximately and talked approximately ways to turn their company and come ining the ice pick concern in peculiar had been considered many times before. but this clip was different. Jeff remembered a recent conversation with his male parent. Ben Kleinpeter. merely before Jeff flew to Dallas to look at the ice pick equipment. â€Å"I love ice pick and I have wanted to acquire into the ice pick concern. Peoples have asked me about it for old ages. but I ever thought it would be excessively much. † said Ben. â€Å"I believe this clip we can do some ace purchases on the right equipment to acquire into the ice pick concern. † replied Jeff. â€Å"In many ways. the production of ice pick would be a natural tantrum for our company. We all know that we need an mercantile establishment to sell or utilize the excess pick from our milk production. † mused Ben. Journal of the International Academy for Case Studies. Volume 16. Particular Issue. Number 1. 2010 â€Å"Yes. consumers are demanding more low-fat or skim milk. We have ever removed the pick from our milk. but now we have to make this even more so. The yearss of high demand for Golden Guernsey rich. thick creamy milk are past. I don’t think the tendency toward low-fat merchandises will alter. † Jeff added. â€Å"We do sell some butter and floging pick and half-and-half. but non plenty to put to a great extent in works and equipment. † â€Å"There are other options. Jeff. We could increase our grosss with other merchandises besides milk and ice pick. † Ben conjectured.â€Å"Yes. Dad. you are right. We do bottle juice and H2O. We buy the H2O from Kentwood. which is natural spring H2O. We would hold to make things like rearward osmosis with our H2O in order to utilize it. non that our H2O is bad. Plus. they buy the plastic bottles from us to set the H2O in. We have a reciprocating relationship. † said Jeff. â€Å"Another option would be to put more to a great extent in the production of cheese. † â€Å"Yes. I have thought of that every bit good. but which one is traveling to work out our job the best? Which one will utilize the most pick? † questioned Ben. â€Å"Producing ice pick will necessitate more pick than bring forthing cheese. That is one issue. but the other thing is which 1 might be the most profitable. With our conditions in Louisiana. we have merely two seasons – hot and hotter. † Jeff replied. â€Å"Do you think people will purchase more cheese here in Louisiana or ice pick? † â€Å"Do people buy more cheese or ice pick here? I think it would be ice pick. † answered Ben. â€Å"Cheese sells here in Louisiana. but I think that it is largely the wide market for generic cheese. I mean the cheese that goes on pizza and so forth. There are tonss of unnatural ingredients at that place. We have built the Kleinpeter trade name name by bring forthing high quality. great savoring milk. Our scheme is to do a better merchandise. non to be the low-price leader. Our doctrine is to supply a natural merchandise with no unreal ingredients like rBGH ( a growing endocrine that induces cattles to bring forth more milk ) . † â€Å"How many rivals are at that place in the cheese concern versus the ice pick concern? We would be the lone ice pick manufacturer locally in Louisiana. † stated Jeff. â€Å"We have been selling a oiler burden of extra pick every hebdomad. six 1000 gallons. We pay a premium monetary value to the dairy husbandmans for their milk. but so we sell this extra pick on the topographic point market at a loss. which is non good. † Ben declared. â€Å"What can we make with the extra pick? Well. we need a value-added merchandise. This has been traveling on for old ages. Grandfather used to sell pick to people in New Orleans and transport it via the railway to the eating houses. So. I have been believing about this. How could we add value to this and get down doing money alternatively of losing money? Ice pick! It has 12 per centum butterfat. which is reasonably high. † Jeff said enthusiastically. Journal of the International Academy for Case Studies. Volume 16. Particular Issue. Number 1. 2010 FAMILY AND COMPANY HISTORYDuring the 2nd half of the 18th century. Spain. which owned the Louisiana district at the clip. attempted to incorporate the invasion of Great Britain and France. The authorities of Spain issued a call for colonists. peculiarly Roman Catholics. to come and cultivate the land. In return for this pioneering work. the Spanish authorities offered generous land grants. Answering this call. Johann George Kleinpeter settled in Baton Rouge. Louisiana in 1774. Johann’s household and eleven other Catholic households made the backbreaking trip from Maryland. coming by raft down the Ohio and Mississippi rivers. Often. they traveled at dark through unsafe district. Once they arrived in Louisiana. the Kleinpeters received a big land grant. including much of the land area presently belonging to Louisiana State University. Developing deep roots. coevalss of Kleinpeters have remained in Baton Rouge. Some household members owned general shops. while others farmed the l and. turning harvests such as sugar cane or care cattles for dairy intents. Dairy husbandmans must milk their cattles every twenty-four hours and they need to treat that milk really rapidly. Therefore. local milk processing concerns sprang up across the United States. In 1913. Sebastian Kleinpeter and his boy. Leon Richard Kleinpeter. opened Kleinpeter Farms Dairy to run into the milk treating demands of dairy husbandmans in Baton Rouge and southern Louisiana. Like their dairy agriculture neighbours. the Kleinpeters besides had a little herd of â€Å"woods† cattles. The â€Å"creamery† or milk processing operation is still booming today as the largest independent dairy in Louisiana. Sebastian and Leon Kleinpeter learned from LSU agricultural professors that Guernsey cows produce milk of superior gustatory sensation. so they decided to augment their herd of cattles in late1913 by buying two boxcars full of Guernsey cattles from Wisconsin and conveying them by train to Baton Rouge. The experiment worked and the Kleinpeters began to specialise in Guernsey milk. This remains one of the keys to the Kleinpeters’ success even today. as Kleinpeter milk is go od known for its exceeding gustatory sensation. Upon the decease of Sebastian Kleinpeter in 1929. Leon Kleinpeter continued to pull off the creamery concern. Leon and his married woman. Mary Lillian. had eleven kids. of these ; five boies and one girl worked extensively in the milk processing operation. Mary Lillian worked as a bookkeeper for the company for many old ages. Leon divided the duties of the concern among his kids. Leon. Jr. became president. Thomas was in charge of the farm. Vincent was the corporation secretary. Michael was the works director. Ben was in charge of gross revenues and bringing. and Betty served as bookkeeper following her female parent? This sibling partnership managed the household concern from the late 1940’s until 1987. Leon passed off in 1984. go forthing the concern in the custodies of his kids. At this point. immature Ben Kleinpeter. who had spent most of his calling in gross revenues. made the bold fiscal determination to purchase out his brothers’ involvement in Kleinpeter Farms Dairy. In 1987. Ben obtained a bank loan and purchased the concern. paying his brothers with the returns. In this mode. Ben gained complete leading of the company and steered it off from possible household webs. Journal of the International Academy for Case Studies. Volume 16. Particular Issue. Number 1. 2010 Through a combination of difficult work to increase gross revenues and belt-tightening on disbursals. Ben Kleinpeter was able to pay off the bank loan in four old ages. Although Ben was successful in retiring the bank loan. the sum of work and complexness of the concern was about overpowering. Ben’s boies Kenny. Ben. Jr. . and Steve and girls Mary Alice and Sue Anne worked with their male parent in the concern. The youngest boy. Jeff. entered the household house in 1987. To assist bridge the spread left by the retirement of his four brothers. Ben hired Tom Zicarelli. from outside of the household. as general director. in 1989. Tom’s assignment consisted of runing the concern and developing the following coevals of Kleinpeters to pull off the house. Unfortunately. Ben. Jr. passed off in 1994. Mary Alice left the concern in 1995. Then. Kenny left the concern to prosecute his involvement in music in 1998. and Steve besides left in January 2003. This left Sue Anne and Jeff as the chief household member directors. Current OperationsTom Zicarelli served as president of the company and provided first-class preparation and advice until his decease in 2003. Today. Jeff Kleinpeter has taken the reigns as president of the company and Sue Anne Kleinpeter Cox is the secretary-treasurer and CFO. They form the 4th coevals of Kleinpeters to run the operation and now lead a squad of 185 employees. Ben has retired and passed his stock on to his kids. Jeff and Sue Anne own the voting stock. while the other siblings hold non-voting stock. In kernel. this leaves the corporation in control of the household members really pull offing the concern. The non-voting shareholders portion in one-year dividends and in the returns were the concern to be sold. The current line of Kleinpeter merchandises include milk. orange juice. butter. margarine. eggs. bungalow cheese. yoghurt. java. tea. clout and containers made for both Kleinpeter and other companies. a service that was added in 2005. Milk histories for approximate ly 80 per centum of company gross revenues as Kleinpeter Farms Dairy processes 60. 000 gallons per twenty-four hours. The company distributes the milk and other merchandises to about 3. 000 shops. eating houses. and institutional installations within a 150-mile radius of Baton Rouge ( Riegel. 2009 ) . Recently. following the Interstate 10 corridor. Kleinpeter connected with retail mercantile establishments as far west as Lake Charles. LA and as far east as Biloxi. MS. Enjoying a close relationship with Rouse’s Supermarkets. Kleinpeter has benefited from the south Louisiana grocer’s purchase of 20 former A A ; P Sav-A-Center Supermarkets in the New Orleans and southeasterly Louisiana part. Rouse’s operates 16 of those shops and affords ample shelf infinite for Kleinpeter merchandises. At present. supermarket gross revenues account for about 70 per centum of Kleinpeter’s overall concern. Additionally. the company sells to eating houses. nursing places. infirmaries. schools. offshore providing. nutrient services. and makers. Journal of the International Academy for Case Studies. Volume 16. Particular Issue. Number 1. 2010 Beginning ICE CREAM OPERATIONSAfter winging back to Baton Rouge. Jeff instantly began the procedure of constructing an ice pick works. â€Å"I called the designers. the builders. and the contractors that we knew here in Baton Rouge and said. ‘We have to construct an ice pick works. ’ This was in July and I wanted to hold the edifice ready by December 31 in order to reimburse money on the Geaux Zone funding and revenue enhancement recognition inducements. † Amazingly. Kleinpeter was able to carry through this ambitious end. â€Å"The contractors worked their dress suits off. The equipment people got us all the other things that we needed – the piping. the compressors. and a immense generator that can run this whole installation in instance we lose power during a hurricane. We did it in four and a half months. † Jeff explained. The CEO’s energy and enthusiasm. along with solid local ties to builders. contractors. and authorities bureaus. enabled the company to construct the ice pick works in record clip. The entire investing for the undertaking came to $ 5. 5 million. The Kleinpeter ice pick was foremost sold in Baton Rouge country supermarkets on January 28. 2008. Constructing on their established relationships. Kleinpeter began their ice pick gross revenues with the half-gallon size. which is targeted for supermarket clients. Soon after. the company developed a pint size and mini-cup size. Harmonizing to Jeff Kleinpeter. â€Å"The pints are a convenience shop point. The bulk of the gross revenues of pints are in convenience shops. We are shopping right now for 30 or 40 chest-height show instance deep-freezes to set in convenience shops. It is portion of what you have to make sell the ice pick. † The mini-cup size is chiefly targeted for kids. LOUISIANA FLAVORSJeff led the selling research for the company to find which ice pick spirits consumers in Louisiana preferred. Consequences showed that the best merchandising spirits are vanilla. cocoa. and so strawberry. Vanilla leads all spirits with 60 per centum of the market. So. Jeff started with the top three and so began to add other spirits. Harmonizing to Jeff. â€Å"We started with vanilla. went to chocolate. and so to strawberry. made with Ponchatoula strawberries. † Possibly. the Ponchatoula strawberry spirit served as inspiration to bring forth other ice pick spirits with the Louisiana local genius. â€Å"Then. we went to butter pecan. made with Bergeron’s pecans from New Roads. a 3rd coevals household concern. † explained Jeff. â€Å"We went to pralines and pick. made with Aunt Sallie’s pralines from New Orleans and Bergeron’s pecans. Louisiana cane sugar. and Kleinpeter milk and butter. rBGH free ( no unreal growing endocrines are given to the cattles ) . Then. we went to no-sugar vanilla and no-sugar cocoa. Then. we went to sweet potato pie. made with Bruce Food’s Sweet murphies from New Iberia. a 4th coevals household concern. Then. we did the Community Coffee spirit –cafe aulait. These are all Louisiana spirits. Then. we did the Gold Brick Egg spirit. Elmer’s Gold Brick Egg was started in New Orleans and has been in concern for 140 old ages and is now in Ponchatoula. The people at Gold Brick are thrilled because 95 per centum of Journal of the International Academy for Case Studies. Volume 16. Particular Issue. Number 1. 2010 their gross revenues occur in merely two and a half months. Now. they can get down selling their merchandise in the summer clip. † One twe lvemonth after the debut of ice pick at Kleinpeter. gross revenues of the sweet comprise eight per centum of entire company gross revenues. Kleinpeter Farms Dairy now produces all of the top merchandising spirits of ice pick and has worked its manner down the list to the smaller merchandising spirits. For case. while vanilla is 60 per centum of the market. no-sugar vanilla is merely approximately 1. 5 per centum of the market. â€Å"We followed the market until we got down below three per centum. Now. we are free to make whatever we want. What has been effectual has been utilizing Louisiana ingredients and Louisiana companies that we all know and love. The biggest hit has been Gold Brick Egg. It keeps selling out and we haven’t been able to do sufficiency to acquire it in all the shops. † provinces Jeff. To day of the month. Kleinpeter is the lone manufacturer of Gold Brick Egg ice pick and sweet murphy pie ice pick in the universe. Jeff exudes enthusiasm for the new merchandises. â€Å"In the nutrient subdivision of the paper ( Baton Rouge Advocate ) last Thursday. the nutrient editors voted Gold Brick Eg g their most favourite spirit. It could be bigger than pralines and pick and the 3rd most popular spirit. Gold Brick Egg now has a dark cocoa Heavenly Hash. which may be our following spirit. What is following? Possibly. bananas surrogate spirit. made with Aunt Sallie’s bananas foster pralines or banana split or banana pudding. We are looking at a blueberry spirit. made with Louisiana blueberries. or Ruston Prunus persica. † External ChallengeWhile Kleinpeter has begun selling ice pick in south Louisiana. there are some external challenges that have affected the company. It has non been all Prunus persicas and pick. The first major component in the external environment is the country’s economic recession. Kleinpeter built their ice pick works as the state stumbled into a recession. â€Å"I watch our gross revenues closely every twenty-four hours. comparing this twelvemonth to last twelvemonth. Every month our gross revenues have increased. Restaurant gross revenues have slowed. but our food market gross revenues have increased. To keep our market portion and seek to maintain clients from exchanging to hive away trade names of milk and ice pick. we have run some advertisement runs to raise the consciousness of our trade name. † Recently. Kleinpeter has run two really interesting advertisement runs – one featuring Ben and Jeff as a male parent and boy in a household concern and another that shows the Kleinpeter cattles as employees of the company. The household concern ads appeal to households with kids. a premier mark market for Kleinpeter. Consumers love the employee cow ads. which have besides been adapted to frost pick. Jeff explains. â€Å"A group of our employees come to me with an thought. The screen splits and there are three cattles coming up to me. Since our milk is so good. why don’t we make ice pick? So. we listened to them. It shows me in the lab experimenting with cocoa. In another commercial topographic point. we talk about utilizing local ingredients. Now. we are proud to present Kleinpeter ice pick. We show the ice pick. We thank you and the employees thank you. We show three cattles. † The 2nd major component in the external environment for Kleinpeter Farms Dairy is intense competition in both the milk and ice pick spheres. While the lone rival that sells both merchandises in the south Louisiana market country is Borden’s. there is plentifulness of competition for food market shop shelf infinite. In add-on to hive away trade names such as Great Value and Rouse’s. milk rivals include Barbe’s. Brown’s Dairy. Horizon Organic. Lactaid. Lala Foods. and Silk Soy Milk. Kleinpeter is non the cheapest milk on the shelf. typically pricing at about one dollar to two dollars higher per gallon than the low monetary value leaders. but still turn toing the wide market. In footings of scheme. Kleinpeter relies on superior tasting ; rBGH free. locally produced milk to make a competitory advantage ( Barney. 1991 ) . This competitory advantage allows the company to command a higher monetary value for its merchandises. utilizing the generic scheme of mercha ndise distinction ( Porter. 1980 ) . In the ice pick sphere. the taking rival is Blue Bell. which is a regional company runing in 12 provinces with workss in Texas. Alabama. and Mississippi. Perceived as a strong selling company with a good merchandise. Blue Bell leads the market in south Louisiana with every bit much as 70 per centum of the concern. Harmonizing to Porter’s five forces theoretical account. Kleinpeter. as a new entrant in this merchandise market must happen a manner to vie successfully with entrenched rivals ( Porter. 1979 ) . Following the same scheme as their milk. Jeff Kleinpeter provinces. â€Å"In order to distinguish ourselves. we have to do ice pick as good or better and give it more value. Our ice pick is rBGH free. We market the fact that we are a Louisiana merchandise and that we are purchasing other Louisiana merchandises to set in our ice pick. which is called cross stigmatization. Peoples here in Louisiana like to utilize local merchandises. † Other ice pick rivals in the wide or general market include store trade names. Brown’s Velvet. Blue Bunny. Kemp’s. Edy’s. and Breyer’s. Ben A ; Jerry’s and Haagen Dazs. while surely good known. compete in the ace premium class of ice pick. These companies make a merchandise with 14 per centum butterfat and are priced about two times higher than Kleinpeter. OPERATIONAL CHALLENGESThe cool forenoon mist was merely get downing to lift. uncovering dark green grass heavy with dew. In the distance. the soft groans of cattles fresh from milking and returning to the grazing land could be heard above the smooth boom of gum elastic auto tyres on Airline Highway and the bump and rattle sounds of bringing trucks resiling out of the Gatess at Kleinpeter Farms Dairy. Inside the unpretentious. but serviceable company central office. Jeff met his sister. Sue Anne Kleinpeter Cox. at the door to Jeff’s office and greeted her warmly with a steadfast handshaking and a cheery smiling. â€Å"It’s good to see you. Sue Anne. Thanks for dropping by this forenoon ; I would wish to discourse a few things with you refering our ice pick operations. † â€Å"Jeff. you know I am ever willing to listen and offer my sentiment. but it seems to me that things are traveling good with the ice pick. † replied Sue Anne. Journal of the International Academy for Case Studies. Volume 16. Particular Issue. Number 1. 2010 â€Å"Well. they are. Sue Anne. We planned things out reasonably good. We knew that we would hold to add some employees and some trucks to present the ice pick. We have added about 20 employees and we have bought six new trucks in the first twelvemonth since presenting ice pick. We are up to about 110 units including dawdlers. dry new waves. and trucks. As you know. the ice pick truck has to be -20 grades and the milk has to be 35 grades. It is a whole different truck. This is raising some challenges for us because ice pick does non hold the same bringing demands as milk. † said Jeff. â€Å"For large shops. we deliver milk every twenty-four hours. but ice pick can be delivered every other twenty-four hours. We do need to look into the show of ice pick every twenty-four hours. Our turnover in ice pick is non every bit fast as it is for our milk. I wish it were. Even if a truck driver had ice pick on his truck. he would merely present it every 3rd twenty-four hours or so. Now. on an ice pick truck. the driver has 75 histories as compared to about 20 histories for milk. It is a different bringing plan. † â€Å"We realized from the beginning that we could acquire some synergism between milk and ice pick production through the usage of our extra pick. but we still need to unite the bringing operations because we are one little concern. non some kind of inefficient pudding stone. † remarked Sue Anne. â€Å"I hope we will acquire to the point where we have to travel to all the shops for ice pick every twenty-four hours. but even our rivals do non make that. † Jeff stated. â€Å"I have seen companies that have both milk and ice pick. They wound up holding separate representatives for their milk and their ice pick. † â€Å"We surely do non desire that state of affairs here at Kleinpeter. † agreed Sue Anne. â€Å"I did non believe that we did either. So. I told the reps. ‘When you go into a shop. you check both the milk and the ice pick. ’ Doesn’t that make sense alternatively of two cats walking into a shop with one look intoing ice pick and the other look intoing milk? † questioned Jeff. â€Å"We do hold separate gross revenues directors for milk and ice pick. † remarked Sue Anne. â€Å"One rep holding two foremans is non a truly good thing. † â€Å"That is why it is a challenge for those two gross revenues directors to be truly close. They are right following to each other in the same office. sharing ideas on how to direct the reps. † Jeff replied. â€Å"There are ever turning strivings when we expand our concern. It sounds like we have an unusual organisational construction traveling here. † Sue Anne offered. â€Å"With a new ice pick division. you may hold to portion and work together because the new division is non large plenty to back up an full squad. † Jeff added. â€Å"Jeff. we have some human resource and organisational construction issues here. Meanwhile. we are spread outing with an wholly new merchandise line in the ice pick. developing wholly advanced new spirits of ice pick. and come ining new geographic market countries both to the West in Lake Charles and to the E with the new Rouse’s shops and into Mississippi. Are we distributing ourselves excessively thin to cover all this gr owing? † asked Sue Anne. Mentions Barney. J. 1991. Firm resources and sustained competitory advantage. Journal of Management. 17: 99-120. Galbraith. J. ( 1973 ) . Planing Complex Organizations. Reading. MA: Addison-Wesley Publishing Co. Porter. M. E. 1979. How competitory forces form scheme. Harvard Business Review. March-April. Porter. M. E. 1980. Competitive Strategy. The Free Press. New York. Riegel. S. 2009. Buying the farm. Greater Baton Rouge Business Report. April 7. 32-33. Journal of the International Academy for Case Studies. Volume 16. Particular Issue. Number 1. 2010

Wednesday, December 4, 2019

Business Organizations Professional Research and Communication

Question: Discuss about the Business Organizations for Professional Research and Communication. Answer: Introduction Outline of the thesis: In this present market circumstances, the researcher has found that the competition intensity has drastically increased among the retail organizations of Australia. The success of the business organization is solely dependent on the service level with the, which organizations delivers to the targeted customers in the market (Agyei-Mensah, 2016). All the department and the employees of the business organization needs to work coordinately in order meet the needs and enhance the market position of the company in the competitive market (Belleflamme Lambert, 2016). Basically, it is the responsibility of the business organizations to protect all the organizational data as well as the important information about the targeted customers of the organization. Every business organizations incorporate specific policies and procedure in order to run the business in an authentic way (Besson Rowe, 2012). Information system securities are an effective process, by which the business organizations mainly keep all the important information, confidential data and documents of the business organization (Beynon-Davies, 2013). Brocke et al., (2013) commented that by restricting access of the information and important data of the business organization, the management mainly tries to protect the unethical use of the information by the individuals. It has been found that none of the business organization ever discloses the information system securities with others. Presently all the renowned retail organizations has given much emphasis on the information system security management and operations (Bruno et al., 2016). Through this effective initiative, the organization mainly tries to protect the organizational system from hacking. Presently, the governmental bodies has incorporated few policies for operating and maintaining the information system securities within the business organizations (Chan et al., 2014). Different business organization uses and implements different kinds of policies and procedures in order to maintain and operate the information system securities in the business organization (Chang et al., 2013). By giving much emphasis on the information security system the business organization mainly, try to operate the system and the business in a unique way. In order to conduct this study, the researcher has mainly chosen Woolworths as the company. Additionally it has also focused on the information system securities is creating an impact on the overall operational system and the performance level of the business organization in the global market. Background of the organization: Woolworths is considered as one of the largest supermarket. It mainly maintains a big store chain in the Australian market. Additionally it has been found that the company mainly sells the grocery products in the market. The researcher also has found that the company has got almost its stores in 961 locations. As per the report of 2015, the total revenue of the company is around $42.132 billion. On the other hand, around 11,000 employees work in the company. The main competitors of the company Metcash limited and Wesfarmers limited. Presently the market share of the company has reduced due to disclosing of companies information to the other parties in the market. Problem statement: In the recent market situation the competition is facing a tough situation in order to build up the business in the market. Presently, the researcher has found that the company is unable to effectively maintain and operate the information system securities within the organization. On the other hand, it has been found that the employees who are operating the system do not have much knowledge about the system and its operations. Due to this reason, most of the informations and data are being disclosed to the third parties. Chuang Lin (2013) commented that this is directly creating an adverse impact in the overall operations and management of the business organization. Apart from this it has been also found that the technologies and the software are, which the company is using is not much effective to protect the system from hacking and password disclosing. Research objectives: The main objectives of the study are as follows: To understand the importance of information system securities in an business organization To evaluate the information system security operates by Woolworths in the organization To Identify the challenges and barriers that the Woolworths is facing to manage the entire information system security To analyze the effective strategies implemented by Woolworths in order to manage and operate the system To provide suitable recommendation for Woolworth for future development of the organization Research questions: What is the importance of information system security in a business organization? What way Woolworths operates its information system securities in the business organization? What are the barriers and the challenges Woolworths is facing in managing the information system security? What are the unique strategies Woolworths is incorporating for managing the system? What are the effective recommendations suggested to Woolworths for the future development of the organization? Structure of the dissertation: Figure: Structure of the dissertation (Source: Created by the Author) Literature Review IntrodUction: In this chapter, the researcher has mainly focused on the previous thesis done by the other researchers and scholar sin this particular topic. The previous study helps the researcher to comprehend the research topic in an effective way. On the other hand, here the researcher also has discussed several models and theories related to the topic. Concept of information system securities: In the current scenario, the information system security has become much common in every business organizations. In order to maintain the privacy of the organizational policies, the business organization has implemented effective softwares and technologies for keeping the confidential documents, data, and information of the business organization (Chung Kim, 2016). Additionally, this particular system helps the company to protect their entire system from hacking. On the other hand, it restricts the unethical usage of the organizational data. On the other hand, the information system securities also help the company to protect the telephonic conversation data also (Deman Klun, 2015). Sometimes, it becomes very much risky for the business organization to protect the authentic data of the business organization. Effectiveness of information system securities: In the present competitive situation, it has become much significant for the big business organization to maintain the data of the business organization (Sousa Oz 2014). By implementing effective system, the business organization can maintain the secrecy within the business organization (Feng et al., 2014). Additionally, it helps the business organization to overcome any sort of risk related to the information system. Presently, the retail business organization like Tesco, Sainsbury and Morrison are framing effective plans for managing and operating the information system security effectively within the business organization. Fichman et al,. (2014) commented that Leakage of the important information and data can destroy the business organization image as well as also can destroy the whole operational system of the organization. There is some important information, which needs to be protected from unauthorized access (Galliers Leidner, 2014). It has been also found that poor and ine ffective system can harm the entire operation of the business organization. On the other hand, it has been found that the customers are now much concerned Components of information system securities: Gibson, (2014) put forward that the information system securities play an important role in the business organization. As per the organizational policies and the nature of the business, the business organization mainly implements the effective plan in order to maintain system in an accurate way within the organization (Zhang et al. 2013). Here the researcher has found that there are mainly three components of information system securities, namely confidentiality, integrity and availability. Integrity: Here the researcher has found that through integrity of information the business organization mainly tries to protect the information of the organization from any sort of modification or manipulation by any unauthorized parties. Any kind of manipulated information or modified information can easily create an adverse impact on the operations as well as the image of the company (Gozman Currie, 2015). Additionally, it has been also found that Cryptography plays an important role ensuring the data integrity. There are many business organizations, were the employees of the business organization modifies the information and the data of the business organization (Li et al. 2013). This creates a huge barrier in the whole operational system of the business organization. Confidentiality: By maintaining the confidentiality, the business organization mainly tries to protect the information from any sort of misuse. Kim and Solomon, (2013) commented that the key element of the information confidentiality is encryption. Through encryption, the right people can easily access the important information and data of the business organization (Kong et al., 2015). It has been found that there are many business organizations, which does not maintain the policies incorporated by the governmental bodies for maintaining the confidentiality of the data and information of the business organization (Lauffer, 2015). Availability: The availability of information means that the business organization gives the power only to the authorized parties to access the information and the data of the business organization (Kuhn et al. 2014). The authorized people can access the information at the right time. Additionally, it has been found that different softwares and techniques are being used to protect the important information of the organization (Lnsiluoto et al,. 2016). Gap of the literature: While conducting the study, the researcher has faced several problems in the research. As the topic is a bit different, it was quite difficult for the researcher to find out authentic information and data for the study. On the other hand, the researcher was unable to find and use effective theories and models in the study. Due to this reason, the researcher solely has to depend on different available websites. Research Methodology Introduction: In this particular chapter, the researcher has used dissimilar kinds of tools and methods in order to collect the authentic information and data from different available sources. Here the researcher has collected information from both the primary sources and the secondary sources. Additionally, here the researcher also has used effective data collection method and research design in order to conduct the research study in the right way. Data collection method: In case of any research study, the data collection plays an important role. The collection of inaccurate data and information can hamper the quality of the research study. In order to collect the authentic information for the study, the research has used equally the primary sources as well as the secondary sources (Taylor et al., 2015). Through the interview and survey process, the researcher has composed the authentic statistics and information from the employees 50 employees of the company. Additionally, by using the interview process, the researcher has collected the viewpoints of the managers of the company. Research design: There are several kinds of research design, namely explanatory, exploratory and descriptive research design. In order to conduct this particular study, the researcher has mainly chosen the descriptive research design. Through using this effective research design, the researcher can conduct the study in much more detail. In depth research, study will help the researcher to analyze the topic in the right way (Flick, 2015). Additionally, it will also help the researcher to fulfill the research aims as well as objectives. Research hypothesis: Here the researcher has mentioned the researcher hypothesis: The information system securities does not create any impact on the operation of the business organization The information system securities creates an adverse impact on the operations of the business organization Result and findings Quantitative data collection process: Questionnaire 1: Relationship with the organization For how long you are working for Woolworths? Options No of response Percentage of response Total no of respondent More than 5 years 7 14 50 1-4 years 7 14 50 1-3 years 15 30 50 1-2 years 12 24 50 6 months 1 year 9 18 50 Mean Median Mode SD 3.18 3 3 1.288727 Table 1: Relationship with the organization (Source: Created by the Author) Figure 2: Relationship with the organization (Source: Created by the Author) Findings: From the above table and figure, the researcher has found that around 14% of the employees are working in the company for more than 5 months in the company. More than 4 years 14% of the employees are working in the company. On the other hand, it has been also found that more than 30% of the employees in the organization are working for 3 years in the company. Additionally, it has been found that 24% of the employees are working in the company for 2 years in the company. On the other hand, 18% of the employees are attached with the company for more than 6 months. Here the researcher has found that the mean is 3.18. On the other hand, the median is 3 and mode is also 3. Additionally, it has been found that the SD is 1.288727. Questionnaire 2: Operating services of the company Are you satisfied with the information system security program of Woolworths? Options No of response Percentage of response Total no of respondent Highly satisfied 9 18 50 Satisfied 12 24 50 Neutral 15 30 50 Dissatisfied 10 20 50 Highly Dissatisfied 4 8 50 Mean Median Mode SD 2.76 3 3 1.204752 Table 2: Operating services of the company (Source: Created by the Author) Figure 3: Operating services of the company (Source: Created by the Author) Findings: From the above table it has been found that among 50 employees, 18% employees are highly satisfied with the information system securities of the company. On the other hand, it has been found that 24% of the employees are satisfied with the services of the company. 30% of the employees are neutral. On the other hand, 20% of the employees are dissatisfied with the information system securities program of the company. 4% employees are highly dissatisfied. The value of the mean is 2.76 and the median is 3. Additionally, it has been found that the mode is 3 and the value of the SD is 1.2044752. Questionnaire 3: System securities of the organization Do you agree that an ineffective information system securities program creates an adverse impact on the business operations? Options No of response Percentage of response Total no of respondent Strongly agree 15 30 50 Agree 13 26 50 Neutral 10 20 50 Disagree 9 18 50 Strongly Disagree 3 6 50 Mean Median Mode SD 2.44 2 1 1.264266 Table 3: System securities of the organization (Source: Created by the author) Figure 4: System securities of the organization (Source: Created by the author) Findings: From the above table and paragraph, it has been found that the 30% of the employees of the organization strongly agree that ineffective information system securities programs can easily create an adverse impact on the business operations of the business organization. On the other hand, 20% of the employees are neutral. Additionally, 26% of the employees agree that the ineffective information system management can easily create an adverse impact on the overall business operations. The mean is 2.44, median 2 and the mode is 1. On the other hand it has been found that the value of the SD is 1.264266. Questionnaire 4: Service Improvement of the organization According to you, how the company can improve its information system securities? Options No of response Percentage of response Total no of respondent Implementing advance technologies 15 30 50 Upgrade software system 13 26 50 Train the employees 10 20 50 Time management 8 16 50 Others 4 8 50 Mean Median Mode SD 2.46 2 1 1.296935 Table 4: Service Improvement of the organization (Source: Created by the author) Figure 5: Service Improvement of the organization (Source: Created by the Author) Findings: The above table portrays that around 30% of the employees thinks that the company needs to implement advance technologies for improving the service system. On the other hand 26% of the employees think that the company should upgrade the softwares to upgrade the system. Around 20% of the employees think that the company should train the employees for practice the operation in an better way. Moreover, 16% of the employees think that the company should give much emphasis on the time management and 4% of the employees think that the company should focus on other. The mean is 2.46, median is 2 and the mode is 1. Additionally the SD value is 1.296935. Questionnaire 5: Implementation of strategies for better operation According to you what are the strategies that Woolworths should incorporate for developing the information system securities operations? Options No of response Percentage of response Total no of respondent Frame accurate planning 10 20 50 More effective softwares 12 24 50 Implementation of new technologies for more protection 15 30 50 Usage of effective password 9 18 50 Others 4 8 50 Mean Median Mode SD 2.7 3 3 1.216385 Table 5: Implementation of strategies for better operation (Source: Created by the author) Figure 6: Implementation of strategies for better operation (Source: Created by the author) Findings: Around 20% of the employees think that the company needs to frame accurate planning for operation the system in a better way. On the other hand, 30% of the employees think that the company needs to implement new strategies for protecting the information and the data of the organization. Additionally, 18% of the employees thinks that the company must use unique passwords for improve the information system securities. The mean is 2.7. Median is 3, mode is 3 and the SD is 1.21638. Qualitative data collection process: Why the company is unable to operate and manage the information system securities effectively within the organization? As per the first manager, due to the lack of knowledge of the employees the business organization is unable to maintain the information system securities of the organization. On the other hand, the second manager, put forwarded that the company is unable to incorporate the effective technologies and softwares within the organization. Sometimes, due to the mishandling of the security codes, the important information are being leaked to the unauthorized parties. Interview question 2: What are the major barriers does the company is facing to manage the whole operating system? As per the first manager, it has been found that the employees of the business organization are not much trained and knowledgeable. Due to this reason, the employees are facing barriers to adopt and practice the new advance system within the operating system. On the other hand, the second manager put forward that due to lack of communication the employees and the management does not work coordinately with the other operating teams in the organization. Discussion and Analysis 1. For how long you are working for Woolworths? As the mean value is 3.18, it means that 15% of the employees are functioning in the corporation for more than 3 years in the company. On the other hand, the median is 3, it can be said out of 50 employees 15% of the workforce are working in the corporation for more than 3 years. This indicates that Woolworths has the scope to engage the employees more than 3 years in the company. The mode is 3, it indicates that the employees are working in the company for more than 3 years in the company. Thus, it can be said in the future there is a huge chance of increasing tenure of the employees in the organization. As the SD value is more than 1, there is a high risk for the company in future. Are you satisfied with the information system security program of Woolworths? The value of the mean is 2.76 which means that 30% of the employees neutral about the information system securities of the company. On the other hand, it can be also found that 20% of the employees are dissatisfied with the information system securities. The media is 3, out of 50 employees 30% of the employees are neutral about the security program of the Woolworths. In order to improve the services, the organization needs to focus on their security systems. The mode is 3, 30% of the employees are neutral and they also thinks that the company has got a huge opportunity to improve their information system security. Do you agree that an ineffective information system securities program creates an adverse impact on the business operations? The mean value is 2.44, this indicates that 26% of the employees agree that the ineffective information system securities can hamper the overall security system. On the other hand the median is 2, which means that 30% of the employees agrees and thinks that the business organization needs to give much emphasis on the information security system of the business organization. On the other hand, it has been found that the mode is 1, 30% of the employees strongly agrees that by giving much more importance to the information security system,, the business organization can manage the operation in a better way . The value of the SD is 1.264266, as the SD is 1 there is high risk for the company in the future. According to you, how the company can improve its information system securities? The mean value is 2.46, it indicates that 26% of the employees think that the company should implement new softwares to improve the level of protection. On the other hand it has been found that the median 2, which indicates that the employees needs to give much emphasis on the software development. The value of the mode is 1, which determines 30% of the employees think that by implementing new technologies that company can easily grab the new opportunities to development the service level. Additionally, the value of the SD is 1.296935, as the SD value is more than 1, this indicates that there are some risk factors for the company in the near future. According to you what are the strategies that Woolworths should incorporate for developing the information system securities operations? The mean value is 2.7, this indicates that think the company needs to incorporate new technologies for more protection. The median value is 3, this means that 30% of the employees feels that the company should adopt new technologies to improve the management function. Additionally, the mode is 3, 30% of the employees think that the company needs to adopt new technologies, and this helps the company to grab the new opportunities. The value of the SD is 1.216385. As the value of the SD is more than 1, this indicates that there are some risks for the corporation in the near outlook. In order to overcome the risks the business association needs to incorporate effective strategies techniques within the organization, in order to maintain the flow of the operation in the organization. Conclusion After the completion of the study, this can be said that presently information security system plays the most important role for protecting the important information and the data of the business organization. In the present scenario, the main responsibility of the business organization to protect every kind of data and information from unauthorized access. The protection of the data helps the business organization to run the business in the competitive market in a different way. On the other hand, it has been found that due to the lack of technological advancement the business organization is unable to upgrade the protection level within the organization. Due to this mismanagement the business organization is unable to retain the loyal customers of the company. This is directly creating an adverse impact on the sales as well as the market share of the company. Moreover, it has been also found that the competition level has also drastically increased within the retail organizations. Almost all the business organizations are using different kinds of strategies and techniques in order to manage and operate the information system securities within the business organization. Reflective study: In the recent times, I have found that the business organizations are giving much emphasis on the information system securities programs. The operations are mainly maintained to track all the important information of the organization and the customers. Additionally, it has been found that the different business organizations run the business in their unique way and process. In the very first chapter, introduction the researcher has mainly introduced the topic. I think that it is the first and the foremost responsibility of the business organization is to manage and operate the system of the business organization in an effective way. Additionally, I have also found that the business organization uses different kinds of strategies, techniques and policies in order to operate the system to gain additional advantage in the market. I have found that the researcher has found that Woolworths is unable to implement the new advance technologies and softwares within the company due to the inefficiency of the employees. The whole scenario is somehow affecting both the sales as well as marketing share of the business organization. The unauthorized access of the third parties is creating a barrier in the whole system in the business organization. Woolworths is considered as one of the famous retail organization in Australia. I have found that there are several competitors of the company in the market. I have found that in the first chapter, the researcher has mainly discussed the research questions as well as the objectives of the study. The main objective of the research study is to analyze that how the information system securities are directly creating an adverse impact on the business operations of the company. Additionally, I have also found that the business organization does not maintain or incorporated any sort of policies and strategies to run the information system effectively in the organization. Due to this reason the company is unable to protect the authentic data and information of the organization as well as of the customers. I have found that due to the mismanagement and inefficiency of the employees, the business organization is unable to protect the information security system of the business organization. After discussing the research question s and the objectives, I found that the researcher has also mentioned the structure of the dissertation, which mainly sho wcase in which chapter the researcher has discussed. I found that the second chapter is the Literature review chapter; this chapter is considered as one of the important chapter of the dissertations. In this section, I have found that the researcher has mainly focused on the previous studies done by the other scholars in this particular topic. In this section, I have found that the companies like Tesco, Sainsbury, and Morrison has given their much emphasis on the information system securities of the business organization. Through this effective approach the business organization has gained several additional advantages in the company. The previous studies have helped the researcher to understand the topic and conduct the present study in a better way. In this section I have found that the researcher has mainly discussed the concept related to information system securities. On the other hand, the researcher also has discussed the components related to the information system securities. However, in the literature review section I have found several gaps in the study. I have found it was difficult to find out the relevant information and data for the study. Moreover, there was no such models and theories related to the study. It becomes quite difficult for the researcher to access the topic in a detailed way. In the next chapter, research methodology chapter, I have found that the researcher has mainly used different kinds of tools and techniques in order to collect authentic information and data for the study. I have found that in this chapter the researcher has used both the primary as well as the secondary sources for the study. From the primary sources the researcher has collected the information from the 50 employees of Woolworths and also has taken the interview of the two managers of the company. Additionally, for the secondary sources, the researcher has mainly collected the information from different websites, authentic journals as well as articles. As the research design, the researcher has mainly chosen, I have found that the researcher preferred to use descriptive design. This has helped the researcher to conduct the study in much more details. The next chapter is result and findings. In this section, I have found that the researcher has mainly analyzed the authentic data and the information, which the researcher has collected from the different sources. Here the researcher has mainly represent the collected data through graphical representation and tables. Additionally, I have found that the finding of the result has given a clear picture of the assessment. Moreover, here the researcher has interpreted the data in general way. However, in the next chapter, discussion and analysis, I have found that the researcher has mainly analyzed the data through mean median mode and standard deviation for better analysis. It has been found the the different graphical representation has showcased different kind of outcomes. In the very last chapter, conclusion, I have found that the researcher has mainly concluded the chapter. It has been found that presents almost all the retail business organizations of Australia, has given much emphasis on the information system security programs in order to maintain the operation and the system in a better way. Moreover, I have found that due to lack of implementation of technology and effective strategies, Woolworths is unable to protect the access of the important information and data from the third parties. It has been also found that due to this specific reason the business organization is unable to retain the large amount of customers in the market. Overall it has created a huge impact on the revue as well as the market share of the company. In order to improve the information system security management the business organization needs to incorporate proper strategies, technologies and softwares to upgrade the whole system within the organization. Reference list: Agyei-Mensah, B. K. (2016). Internal Control Information Disclosure and Corporate Governance: Evidence From an Emerging Market.Corporate Governance: The International Journal of Business in Society,16(1). Belleflamme, P., Lambert, T. (2016). An Industrial Organization Framework to Understand the Strategies of Crowdfunding Platforms$.International Perspectives on Crowdfunding: Positive, Normative and Critical Theory, 1. Besson, P., Rowe, F. (2012). Strategizing information systems-enabled organizational transformation: A transdisciplinary review and new directions.The Journal of Strategic Information Systems,21(2), 103-124. Beynon-Davies, P. (2013).Business information systems. Palgrave Macmillan. Brocke, J. V., Riedl, R., Lger, P. M. (2013). Application strategies for neuroscience in information systems design science research.Journal of Computer Information Systems,53(3), 1-13. Bruno, E., Iacoviello, G., Lazzini, A. (2016). The Adequacy of Information Systems for Supporting the Asset Quality Review Process in Banks. Evidence from an Italian Case Study. InStrengthening Information and Control Systems(pp. 59-75). Springer International Publishing. Chan, T., Sclafani, J., Dobrick, J. M., Yadlapalli, R. T., Bax, M., Fezza, D. X. (2014).U.S. Patent No. 8,738,514. Washington, DC: U.S. Patent and Trademark Office. Chang, M. K., Cheung, W., Tang, M. (2013). Building trust online: Interactions among trust building mechanisms.Information Management,50(7), 439-445. Chuang, S. H., Lin, H. N. (2013). The roles of infrastructure capability and customer orientation in enhancing customer-information quality in CRM systems: Empirical evidence from Taiwan.International Journal of Information Management,33(2), 271-281. Chung, C. S., Kim, D. (2016). Analysis on Personal Information Protection Issue of E-Government1. Deman, M., Klun, M. (2015, June). Efficiency and Usability of Information Systems: E-Recovery System in Slovenia. InProceedings of the 15th European Conference on eGovernment 2015: ECEG 2015(p. 79). Academic Conferences Limited. Wang, H. J., Li, M. (2014). A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis.Information sciences,256, 57-73. Fichman, R. G., Dos Santos, B. L., Zhiqiang (Eric) Zheng. (2014). Digital Innovation as a Fundamental and Powerful Concept in the Information Systems Curriculum.Mis Quarterly,38(2), 329-343. Galliers, R. D., Leidner, D. E. (2014).Strategic information management: challenges and strategies in managing information systems. Routledge. Gibson, D. (2014).Managing risk in information systems. Jones Bartlett Publishers. Gozman, D., Currie, W. (2015, January). Managing Governance, Risk, and Compliance for Post-crisis Regulatory Change: A Model of IS Capabilities for Financial Organizations. InSystem Sciences (HICSS), 2015 48th Hawaii International Conference on(pp. 4661-4670). IEEE. Kim, D., Solomon, M. G. (2013).Fundamentals of information systems security. Jones Bartlett Publishers. Kong, H., Jung, S., Lee, I., Yeon, S. J. (2015). Information Security and Organizational Performance: Empirical Study of Korean Securities Industry.ETRI Journal,37(2), 428-437. Kuhn, J. R., Courtney, J. F., Morris, B. (2015). A theory of complex adaptive inquiring organizations: application to continuous assurance of corporate financial information.The Knowledge Engineering Review,30(03), 265-296. Lnsiluoto, A., Jokipii, A., Eklund, T. (2016). Internal control effectivenessa clustering approach.Managerial Auditing Journal,31(1), 5-34. Lauffer, R. B. (2015).U.S. Patent No. 9,060,063. Washington, DC: U.S. Patent and Trademark Office. Li, J., Huo, M., Chao, S. (2015, September). A Study of Information Security Evaluation and Risk Assessment. In2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC)(pp. 1909-1912). IEEE. Lugmayr, A. (2013, July). Brief introduction into information systems management research in media industries. In2013 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)(pp. 1-6). IEEE. ORiain, S., Harth, A., Curry, E. (2012). Linked data driven information systems as an enabler for integrating financial data.Information Systems for Global Financial Markets: Emerging Developments and Effects, 239-270. Peffers, K., Dos Santos, B. L. (2013). Research opportunities in information technology funding and system justification.European Journal of Information Systems,22(2), 131-138. Pulwarty, R. S., Sivakumar, M. V. (2014). Information systems in a changing climate: Early warnings and drought risk management.Weather and Climate Extremes,3, 14-21. Schroeder, J. H., Shepardson, M. L. (2016). Do SOX 404 Control Audits and Management Assessments Improve Overall Internal Control System Quality?.The Accounting Review. Shin, S., Lee, Y. (2013). Business Performance Impact Caused by Display Restriction of Customer Information Identifier: Focusing on Domestic Securities Business.The Journal of Information Systems,22(4), 49-69. Sousa, K., Oz, E. (2014).Management information systems. Nelson Education. Zhang, L., Mol, A. P., He, G. (2016). Transparency and information disclosure in China's environmental governance.Current Opinion in Environmental Sustainability,18, 17-24. Taylor, S. J., Bogdan, R., DeVault, M. (2015).Introduction to qualitative research methods: A guidebook and resource. John Wiley Sons. Flick, U. (2015).Introducing research methodology: A beginner's guide to doing a research project. Sage