Unit VIII Course Project
University Case Study
Congratulations! You have just become the safety manager for
Podunk University. Your position is at the campus in Podunk,
Colorado, and your predecessor left the job a year and a half
ago. There has been nobody in the position during that interval.
The commitment of the institution to safety is dubious at best,
but you are looking forward to starting your new position and
making a positive change.
After introducing yourself to the secretary you share with a half
dozen other, more senior, people, you decide to focus on
hazardous material and hazardous waste issues since you just
completed a great college course on those topics. You tour the
campus and discover that the following departments and
programs are yours to deal with:
• The biology department has animal dissection, human
dissection, a microbiology lab, and a medical laboratory
education program that uses small quantities of a lot of
chemicals.
• The chemistry department has chemicals that have never
been inventoried and a new forensics program (as in
CSI, not in college debate).
• The physics department has high-voltage equipment, lasers,
and LEDs.
• The English department has lots and lots of books and
papers, as well as photocopiers.
• The math department has lots of computers and whiteboards.
• The automotive technology department has everything
pertaining to auto repair, including solvents, asbestos brake
linings, pneumatic tools, waste oil, and cutting and grinding
tools.
• The Massive Arena is one of the original buildings on
campus and has a variety of interesting problems, including
asbestos insulation, and the building is undergoing a massive
renovation.
Respond to each of the following questions:
1. Where do you start?
2. Where should you focus your initial HazCom efforts? In
what order do you tackle the rest of the departments?
3. What are the HazCom issues in the automotive technology
department?
4. What are the hazardous waste issues in the automotive
technology department?
5. What are the HazCom issues in the chemistry department?
6. What are the hazardous waste issues in the chemistry
department?
7. With the Massive Arena renovation, who are the people to
whom you need to communicate hazards?
8. What are your main concerns with the physics department?
9. What are the hazardous material/waste spill response issues
for the university, and how should you prepare for them?
10. Is any HazCom training needed for the English and math
departments?
11. What are some resources for finding out how to solve the
HazCom issues?
12. You must choose technology or trainers to do the needed
training. What are some issues to consider when selecting
these?
13. Due to budget cuts, you have to do the training yourself,
and you will use PowerPoint. What are some considerations
when developing your PowerPoint Presentation?
14. How can you evaluate your training to ensure that it is
accomplishing your goals?
15. One of the chemistry professors working with some of the
automotive technology faculty members, invents a new
nonflammable compound that will render obsolete the need for
solvents to degrease auto parts. She wants to market the stuff.
What needs to be done before it can be marketed, and who
should do it?
16. The University decides to partner with the chemistry
professor and market this new compound. Due to the lack of
flammability, it is a great hit nationwide. They then decide to
market it worldwide. What concerns need to be addressed?
17. It turns out that this wonderful new compound makes a
really great explosion when used in conjunction with another
chemical. As the University is manufacturing the compound in
large quantities and storing it on the grounds, what concerns do
you now have? What experts should you consult?
18. The biology department has been busy as well. The little
microbiology lab is large now, and they are working with
stronger pathogens. How would you determine the new hazard
communication requirements and things that you should do
beyond that minimum?
After a tough five years, you have the Podunk University
campus running smoothly. Everybody is trained, and your
successor will not have nearly as much of a challenge as you
did. Congratulations, and best wishes on your next challenge!
Your submission must be a minimum of four pages double-
spaced, not including the title and reference pages, and in
APA format. Support your answers to the questions with
appropriate references and in-text citations. Information about
accessing the Blackboard Grading Rubric for this assignment is
provided below.
APA Guidelines
CSU requires that students use the APA style for papers and
projects. Therefore, the APA rules for formatting, quoting,
paraphrasing, citing, and listing of sources are to be followed.
Running head: BUSINESS RESEARCH PROJECT. PART 1
1
Business Research Project. Part 1
Business Problem and Research Questions
Leeshon Guider, Nicola Phillips-Tate,
Shelia Collins, Yekaterina Volchanskaya
QNT/561
June 16, 2014
Neil Eckardt
Business Research Project. Part 1
Business Problem and Research Questions
Identification of an Organization and a Dilemma under Research
Team B collectively decided to identify an organization that
was faced with a dilemma. Retailer, Target experienced a
security breach involving stolen credit card information, names,
mailing addresses, phone numbers and/or email addresses
during the holiday season of 2013 (Target, 2013) .
Customers were not immediately aware because Target had to
perform an investigation. The collected data of the investigation
was to identify those affected and to what degree. According to
the Washington Post (2014), several questions were asked and
answered in order for the organization to successfully address
the issues.
Purpose Statement
The purpose of this research project is to establish whether the
recent security/credit breach at Target has affected the loyalty
of its customers. Direct customers are the people, individuals,
or institutions that have a higher chance of buying the products
floated by an organization (Stieb, 2006). The organization
strives to ensure that the customers are completely satisfied in
order for them to recommend the organization and its products
or services to new prospective consumers. This includes the
provision of maximum security to ensure that their personal
non-public information is safe and secured from any form of
malicious data tampering.
Organizations should therefore ensure consumer information is
protected at all levels. It is troubling to learn for the business
that customers’ non-public security and credit cards information
were tampered as this could translate into the customers’ loyalty
weakening. This scenario also threatens the name and integrity
(Reichheld & Sasser, 1990) of the organization by keeping away
the prospective customers from the organization for the fear of
being affected with the similar breach in the future.
The organization should as a result act quickly to redeem itself
and the customers from any form of loss from the breach. This
also means the investing in a more robust and effective security
platform must be done to safeguard their customers (Stieb,
2006). First, the numerical values of the affected need to be
noted to determine the extent to which the security breach has
caused damage. Also the way the consumers are affected needs
to be brought in consideration which would help to cope with
such situations in the future. Second, it is extremely important
to know the views of the consumers and their response to the
company's products in the future. The rights of customers need
to be given the highest priority and it is worth noting that the
customer's confidence is not lost. Hence this research is vital in
revealing these basic yet very important factors that can
influence business transactions.
Research Questions
To address the problem of the security breach, there are a
variety of paths Target can take to deal with the issue; one is
conducting research to identify the security weakness within the
system. The Jaquith (2007) website suggests the following
questions may be included in the initial research:
1. How many sites are connected directly to the core network
without intermediate firewalls?
2. How many of these sites have deployed unsecured wireless
networks?
3. Starting with zero knowledge, how many minutes are
required to gain full access to network domain controllers?
4. What percentage of user accounts could be compromised in
15 minutes or less?
5. What is the relative "risk score" of each application
compared to the others?
Customer satisfaction is a key performance indicator within the
business which measures how products and services provided to
consumers by companies meet or exceed customers’
expectations. Target is a retail megastore that must compete for
customers; therefore customer satisfaction is a key element of
the business strategy. The security breach has left many
consumers to wonder if they should continue to be loyal to
Target and to gage into what consumers are thinking the
following questions can be proposed:
1. Are consumers satisfied how Target dealt with the security
breach?
2. What factors affect consumers’ satisfaction in this situation?
3. Who are the satisfied consumers in terms of age, gender,
length of time as a Target consumer, and the frequency of using
the store credit card or other credit cards either shopping at a
store or on-line?
Conclusion
It is the hope at the conclusion of this research project that
information can be gained in ways to best protect consumer’s
personal information and gage into how consumers feel towards
an organization that may have potentially put them at risk.
Should consumers stay loyal to the organization or relieve
themselves from any further interactions with them?
References
Jaquith, A. (2007). Sample Questions for Finding Information
Security Weaknesses, CSO Online. Retrieved from
http://www.csoonline.com/article/2121824/metrics-
budgets/sample-questions-for-finding-information-security-
weaknesses.html
Jayakumar, A., Tsukayama, H.(2014). Target Breach: What You
Need to Know. Retrieved from
http://www.washingtonpost.com/business/economy/target-
breach-what-you-need-to-know/2014/01/10/669a5c9c-7a10-
11e3-8963-b4b654bcc9b2_story.html
Reichheld, F., & Sasser, W. (1990). Zero defection: quality
comes to services, Harvard Business Review, pp 105–111.
Stieb, J.A. (2006). Clearing Up the Egoist Difficulty with
Loyalty, The Journal of Business Ethics, vol 63, no 1.
Target. (2013). A message from CEO Gregg Steinhafel about
Target’s payment card
issues. Retrieved from
https://corporate.target.com/discover/article/Important-Notice-
Unauthorized-access-to-payment-ca
BUSINESS RESEARCH PROJECT PART 2: RESEARCH PLAN
2
BUSINESS RESEARCH PROJECT PART 2: RESEARCH PLAN
3
Business Research Project Part 2: Research Plan
Shelia Collins, Nicola Phillips-Tate, Leeshon Guider,
Yekaterina Volchanskaya
University of Phoenix
Applied Business Research and Statistics
QNT-561
Neil Eckardt
June 23, 2014
Running head: BUSINESS RESEARCH PROJECT PART 2:
RESEARCH PLAN 1
Business Research Project Part 2: Research Plan
In the second phase of the research project the team aims to
identify the population and sample for the research. The team
will also determine the data collection process, the format of the
survey and information to be gathered as well as well as how to
collect and distribute the survey.
Population and Sample
According to Target, the investigation determined that the
stolen information includes names, mailing addresses, phone
numbers or email addresses for up to seventy million
individuals. The population chosen will be all seventy million
consumers affected. Sampling for the research will consist of
both, self administered and human administered sampling
methods. “Much of the stolen data is partial in nature, but in
cases where Target has an email address, the company will
attempt to contact affected guests. This communication will be
informational, including tips to guard against consumer scams.
Target will not ask those guests to provide any personal
information as part of that communication” (Target Provides
Update on Data Breach and Financial Performance, 2014). For
those without email addresses on file, Target will contact this
group by mail and request an email address if they wish to
participate online, and provide an alternative to call a toll free
number to participate by phone through automated prompts. In
the event, the guest prefer to receive a questionnaire in the
mail, the company will mail the form as requested. Mailing as
requested will save Target money because they will avoid
printing unnecessary forms. The collaborative methods of
sampling may be costly, but it is prevalent while striving to
rebuild the customer loyalty database. Target is aware of
sampling errors and is working diligently to avoid those errors.
Data Collection Process
Survey Format and Content
It is important to develop a short customer satisfaction survey
to accurately measure customer satisfaction with the company,
product, and service. It is also essential to understand the
interests, goals, and upsets for the customer in order for the
company to change and improve their services in order to keep
their customer base. The format of the survey will be simple
clear closed-ended questions to determine if the customers are
truly satisfied with the overall service of the company and gain
insight as to whether Target’s responds was conducted in a
quick and professionally manner from the customer viewpoint.
Some of the basic content to gather with the survey includes
gender, age, and length of time as a Target customer, how likely
the customer will remain with Target, and how likely will the
customer refer the company to a friend or colleague. Using a
survey tool such as the Likert-scale which uses a range from
“not at all likely-extremely likely that can incorporate skip
logic to allow customers to answer questions that are applicable
to the services they've actually used, can provide insight into
where the company can improve.
Survey Distribution and Collection
There are a number of ways through which the surveys can be
distributed and collected, the most common ones include; mail
surveys, personal interviews, interviews through phones and
Internet surveys as well. However, the survey will be
distributed over an electronic format, such as the Internet.
Internet surveys are emerging as the most reliable because many
people can be reached, the problem is that one needs Internet
access in order to use it. Smart phone and tablet users are more
familiar and comfortable with the use of the Internet as the
platform for the survey questions. The consumers for this
survey are users of debit/credit cards. The results will be
collected at the end of the survey period; the results are
automatically collated and analyzed by the survey team.
References
James, H. (2009). Introduction to research methods. Oxofrd:
Oxford University Press
Likert-scale. Retrieved from
https://www.surveymonkey.com/mp/likert-scale/
Peter, D. (2011). The sampling approach and surveys. Nairobi:
Longman
Target Provides Update On Data Breach and Financial
Performance. (2014). Retrieved from
http://pressroom.target.com/news/target-provides-update-on-
data-breach-and-financial-performance
Running head: BUSINESS RESEARCH PROJECT. PART 1
1
Business Research Project. Part 1
Business Problem and Research Questions
Leeshon Guider, Nicola Phillips-Tate,
Shelia Collins, Yekaterina Volchanskaya
QNT/561
June 16, 2014
Neil Eckardt
Business Research Project. Part 1
Business Problem and Research Questions
Identification of an Organization and a Dilemma under Research
Team B collectively decided to identify an organization that
was faced with a dilemma. Retailer, Target experienced a
security breach involving stolen credit card information, names,
mailing addresses, phone numbers and/or email addresses
during the holiday season of 2013 (Target, 2013) .
Customers were not immediately aware because Target had to
perform an investigation. The collected data of the investigation
was to identify those affected and to what degree. According to
the Washington Post (2014), several questions were asked and
answered in order for the organization to successfully address
the issues.
Purpose Statement
The purpose of this research project is to establish whether the
recent security/credit breach at Target has affected the loyalty
of its customers. Direct customers are the people, individuals,
or institutions that have a higher chance of buying the products
floated by an organization (Stieb, 2006). The organization
strives to ensure that the customers are completely satisfied in
order for them to recommend the organization and its products
or services to new prospective consumers. This includes the
provision of maximum security to ensure that their personal
non-public information is safe and secured from any form of
malicious data tampering.
Organizations should therefore ensure consumer information is
protected at all levels. It is troubling to learn for the business
that customers’ non-public security and credit cards information
were tampered as this could translate into the customers’ loyalty
weakening. This scenario also threatens the name and integrity
(Reichheld & Sasser, 1990) of the organization by keeping away
the prospective customers from the organization for the fear of
being affected with the similar breach in the future.
The organization should as a result act quickly to redeem itself
and the customers from any form of loss from the breach. This
also means the investing in a more robust and effective security
platform must be done to safeguard their customers (Stieb,
2006). First, the numerical values of the affected need to be
noted to determine the extent to which the security breach has
caused damage. Also the way the consumers are affected needs
to be brought in consideration which would help to cope with
such situations in the future. Second, it is extremely important
to know the views of the consumers and their response to the
company's products in the future. The rights of customers need
to be given the highest priority and it is worth noting that the
customer's confidence is not lost. Hence this research is vital in
revealing these basic yet very important factors that can
influence business transactions.
Research Questions
To address the problem of the security breach, there are a
variety of paths Target can take to deal with the issue; one is
conducting research to identify the security weakness within the
system. The Jaquith (2007) website suggests the following
questions may be included in the initial research:
1. How many sites are connected directly to the core network
without intermediate firewalls?
2. How many of these sites have deployed unsecured wireless
networks?
3. Starting with zero knowledge, how many minutes are
required to gain full access to network domain controllers?
4. What percentage of user accounts could be compromised in
15 minutes or less?
5. What is the relative "risk score" of each application
compared to the others?
Customer satisfaction is a key performance indicator within the
business which measures how products and services provided to
consumers by companies meet or exceed customers’
expectations. Target is a retail megastore that must compete for
customers; therefore customer satisfaction is a key element of
the business strategy. The security breach has left many
consumers to wonder if they should continue to be loyal to
Target and to gage into what consumers are thinking the
following questions can be proposed:
1. Are consumers satisfied how Target dealt with the security
breach?
2. What factors affect consumers’ satisfaction in this situation?
3. Who are the satisfied consumers in terms of age, gender,
length of time as a Target consumer, and the frequency of using
the store credit card or other credit cards either shopping at a
store or on-line?
Conclusion
It is the hope at the conclusion of this research project that
information can be gained in ways to best protect consumer’s
personal information and gage into how consumers feel towards
an organization that may have potentially put them at risk.
Should consumers stay loyal to the organization or relieve
themselves from any further interactions with them?
References
Jaquith, A. (2007). Sample Questions for Finding Information
Security Weaknesses, CSO Online. Retrieved from
http://www.csoonline.com/article/2121824/metrics-
budgets/sample-questions-for-finding-information-security-
weaknesses.html
Jayakumar, A., Tsukayama, H.(2014). Target Breach: What You
Need to Know. Retrieved from
http://www.washingtonpost.com/business/economy/target-
breach-what-you-need-to-know/2014/01/10/669a5c9c-7a10-
11e3-8963-b4b654bcc9b2_story.html
Reichheld, F., & Sasser, W. (1990). Zero defection: quality
comes to services, Harvard Business Review, pp 105–111.
Stieb, J.A. (2006). Clearing Up the Egoist Difficulty with
Loyalty, The Journal of Business Ethics, vol 63, no 1.
Target. (2013). A message from CEO Gregg Steinhafel about
Target’s payment card
issues. Retrieved from
https://corporate.target.com/discover/article/Important-Notice-
Unauthorized-access-to-payment-ca

More Related Content

PDF
My Ideal Valentine Essay
DOCX
Running Head CIGO .docx
PDF
Solution Manual for Marketing Research, 9th Edition, Alvin C. Burns Ann F. Veeck
DOCX
I probably should have titled this section Who Ensures that Digita.docx
PDF
Why I Want To Go To College Essay Sample
DOCX
Discussion Questions Chapter 15Terms in Review1Define or exp.docx
PDF
College Essay Different Types Of Expository Essays
DOCX
Unit VIII Course Project University Case Study Congratulations! .docx
My Ideal Valentine Essay
Running Head CIGO .docx
Solution Manual for Marketing Research, 9th Edition, Alvin C. Burns Ann F. Veeck
I probably should have titled this section Who Ensures that Digita.docx
Why I Want To Go To College Essay Sample
Discussion Questions Chapter 15Terms in Review1Define or exp.docx
College Essay Different Types Of Expository Essays
Unit VIII Course Project University Case Study Congratulations! .docx

Similar to Unit VIII Course ProjectUniversity Case StudyCongratulatio.docx (12)

PDF
How To Write An Conclusion For A Research Paper
DOCX
Research Topic and Methodology Form—Unit 4Use the research s.docx
DOCX
Week 2  External Environmental Analysis1. What economic factors.docx
DOC
Brm assignments
PDF
How To Write An Essay In Mla
PDF
Strategic Management Text and Cases 8th Edition Dess Solutions Manual
DOCX
Group 5 part 1 students name borong pang, chenzhi
DOCX
Briefing Note Assignment GuidelinesWeight 15Learning Out.docx
DOCX
(1) For this assignment, you will need to read the case, IKEAs Gl.docx
PDF
Apa Format Example Paper
PDF
Persuasive Essay Topics For Middle Schoolers. Top 145
PDF
Business Case Competition solution proposal - E-learning platform, Car Parts ...
How To Write An Conclusion For A Research Paper
Research Topic and Methodology Form—Unit 4Use the research s.docx
Week 2  External Environmental Analysis1. What economic factors.docx
Brm assignments
How To Write An Essay In Mla
Strategic Management Text and Cases 8th Edition Dess Solutions Manual
Group 5 part 1 students name borong pang, chenzhi
Briefing Note Assignment GuidelinesWeight 15Learning Out.docx
(1) For this assignment, you will need to read the case, IKEAs Gl.docx
Apa Format Example Paper
Persuasive Essay Topics For Middle Schoolers. Top 145
Business Case Competition solution proposal - E-learning platform, Car Parts ...
Ad

More from dickonsondorris (20)

DOCX
Copyright © eContent Management Pty Ltd. Health Sociology Revi.docx
DOCX
Copyright © Pearson Education 2010 Digital Tools in Toda.docx
DOCX
Copyright © Jen-Wen Lin 2018 1 STA457 Time series .docx
DOCX
Copyright © John Wiley & Sons, Inc. All rights reserved..docx
DOCX
Copyright © by The McGraw-Hill Companies, Inc. The Aztec Accou.docx
DOCX
Copyright © Cengage Learning. All rights reserved. CHAPTE.docx
DOCX
Copyright © by Holt, Rinehart and Winston. All rights reserved.docx
DOCX
Copyright © 2020 by Jones & Bartlett Learning, LLC, an Ascend .docx
DOCX
Copyright © 2019, American Institute of Certified Public Accou.docx
DOCX
Copyright © 2018 Pearson Education, Inc. All Rights ReservedChild .docx
DOCX
Copyright © 2018 Pearson Education, Inc. C H A P T E R 6.docx
DOCX
Copyright © 2018 Capella University. Copy and distribution o.docx
DOCX
Copyright © 2018 Pearson Education, Inc.C H A P T E R 3.docx
DOCX
Copyright © 2018 by Steven Levitsky and Daniel.docx
DOCX
Copyright © 2017, 2014, 2011 Pearson Education, Inc. All Right.docx
DOCX
Copyright © 2017 Wolters Kluwer Health Lippincott Williams.docx
DOCX
Copyright © 2016, 2013, 2010 Pearson Education, Inc. All Right.docx
DOCX
Copyright © 2017 by University of Phoenix. All rights rese.docx
DOCX
Copyright © 2016 John Wiley & Sons, Inc.Copyright © 20.docx
DOCX
Copyright © 2016 Pearson Education, Inc. .docx
Copyright © eContent Management Pty Ltd. Health Sociology Revi.docx
Copyright © Pearson Education 2010 Digital Tools in Toda.docx
Copyright © Jen-Wen Lin 2018 1 STA457 Time series .docx
Copyright © John Wiley & Sons, Inc. All rights reserved..docx
Copyright © by The McGraw-Hill Companies, Inc. The Aztec Accou.docx
Copyright © Cengage Learning. All rights reserved. CHAPTE.docx
Copyright © by Holt, Rinehart and Winston. All rights reserved.docx
Copyright © 2020 by Jones & Bartlett Learning, LLC, an Ascend .docx
Copyright © 2019, American Institute of Certified Public Accou.docx
Copyright © 2018 Pearson Education, Inc. All Rights ReservedChild .docx
Copyright © 2018 Pearson Education, Inc. C H A P T E R 6.docx
Copyright © 2018 Capella University. Copy and distribution o.docx
Copyright © 2018 Pearson Education, Inc.C H A P T E R 3.docx
Copyright © 2018 by Steven Levitsky and Daniel.docx
Copyright © 2017, 2014, 2011 Pearson Education, Inc. All Right.docx
Copyright © 2017 Wolters Kluwer Health Lippincott Williams.docx
Copyright © 2016, 2013, 2010 Pearson Education, Inc. All Right.docx
Copyright © 2017 by University of Phoenix. All rights rese.docx
Copyright © 2016 John Wiley & Sons, Inc.Copyright © 20.docx
Copyright © 2016 Pearson Education, Inc. .docx
Ad

Recently uploaded (20)

PDF
My India Quiz Book_20210205121199924.pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
HVAC Specification 2024 according to central public works department
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
What’s under the hood: Parsing standardized learning content for AI
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
PDF
Journal of Dental Science - UDMY (2021).pdf
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PPTX
Education and Perspectives of Education.pptx
PDF
Complications of Minimal Access-Surgery.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
Virtual and Augmented Reality in Current Scenario
My India Quiz Book_20210205121199924.pdf
B.Sc. DS Unit 2 Software Engineering.pptx
HVAC Specification 2024 according to central public works department
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
BP 505 T. PHARMACEUTICAL JURISPRUDENCE (UNIT 2).pdf
Unit 4 Computer Architecture Multicore Processor.pptx
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
A powerpoint presentation on the Revised K-10 Science Shaping Paper
What’s under the hood: Parsing standardized learning content for AI
Cambridge-Practice-Tests-for-IELTS-12.docx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Mucosal Drug Delivery system_NDDS_BPHARMACY__SEM VII_PCI.pdf
Journal of Dental Science - UDMY (2021).pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
Education and Perspectives of Education.pptx
Complications of Minimal Access-Surgery.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Environmental Education MCQ BD2EE - Share Source.pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
Virtual and Augmented Reality in Current Scenario

Unit VIII Course ProjectUniversity Case StudyCongratulatio.docx

  • 1. Unit VIII Course Project University Case Study Congratulations! You have just become the safety manager for Podunk University. Your position is at the campus in Podunk, Colorado, and your predecessor left the job a year and a half ago. There has been nobody in the position during that interval. The commitment of the institution to safety is dubious at best, but you are looking forward to starting your new position and making a positive change. After introducing yourself to the secretary you share with a half dozen other, more senior, people, you decide to focus on hazardous material and hazardous waste issues since you just completed a great college course on those topics. You tour the campus and discover that the following departments and programs are yours to deal with: • The biology department has animal dissection, human dissection, a microbiology lab, and a medical laboratory education program that uses small quantities of a lot of chemicals. • The chemistry department has chemicals that have never been inventoried and a new forensics program (as in CSI, not in college debate). • The physics department has high-voltage equipment, lasers, and LEDs. • The English department has lots and lots of books and papers, as well as photocopiers. • The math department has lots of computers and whiteboards. • The automotive technology department has everything pertaining to auto repair, including solvents, asbestos brake linings, pneumatic tools, waste oil, and cutting and grinding
  • 2. tools. • The Massive Arena is one of the original buildings on campus and has a variety of interesting problems, including asbestos insulation, and the building is undergoing a massive renovation. Respond to each of the following questions: 1. Where do you start? 2. Where should you focus your initial HazCom efforts? In what order do you tackle the rest of the departments? 3. What are the HazCom issues in the automotive technology department? 4. What are the hazardous waste issues in the automotive technology department? 5. What are the HazCom issues in the chemistry department? 6. What are the hazardous waste issues in the chemistry department? 7. With the Massive Arena renovation, who are the people to whom you need to communicate hazards? 8. What are your main concerns with the physics department? 9. What are the hazardous material/waste spill response issues for the university, and how should you prepare for them? 10. Is any HazCom training needed for the English and math departments? 11. What are some resources for finding out how to solve the HazCom issues? 12. You must choose technology or trainers to do the needed training. What are some issues to consider when selecting these? 13. Due to budget cuts, you have to do the training yourself, and you will use PowerPoint. What are some considerations when developing your PowerPoint Presentation? 14. How can you evaluate your training to ensure that it is accomplishing your goals? 15. One of the chemistry professors working with some of the
  • 3. automotive technology faculty members, invents a new nonflammable compound that will render obsolete the need for solvents to degrease auto parts. She wants to market the stuff. What needs to be done before it can be marketed, and who should do it? 16. The University decides to partner with the chemistry professor and market this new compound. Due to the lack of flammability, it is a great hit nationwide. They then decide to market it worldwide. What concerns need to be addressed? 17. It turns out that this wonderful new compound makes a really great explosion when used in conjunction with another chemical. As the University is manufacturing the compound in large quantities and storing it on the grounds, what concerns do you now have? What experts should you consult? 18. The biology department has been busy as well. The little microbiology lab is large now, and they are working with stronger pathogens. How would you determine the new hazard communication requirements and things that you should do beyond that minimum? After a tough five years, you have the Podunk University campus running smoothly. Everybody is trained, and your successor will not have nearly as much of a challenge as you did. Congratulations, and best wishes on your next challenge! Your submission must be a minimum of four pages double- spaced, not including the title and reference pages, and in APA format. Support your answers to the questions with appropriate references and in-text citations. Information about accessing the Blackboard Grading Rubric for this assignment is provided below. APA Guidelines CSU requires that students use the APA style for papers and projects. Therefore, the APA rules for formatting, quoting,
  • 4. paraphrasing, citing, and listing of sources are to be followed. Running head: BUSINESS RESEARCH PROJECT. PART 1 1 Business Research Project. Part 1 Business Problem and Research Questions Leeshon Guider, Nicola Phillips-Tate, Shelia Collins, Yekaterina Volchanskaya QNT/561 June 16, 2014 Neil Eckardt Business Research Project. Part 1 Business Problem and Research Questions Identification of an Organization and a Dilemma under Research Team B collectively decided to identify an organization that was faced with a dilemma. Retailer, Target experienced a security breach involving stolen credit card information, names, mailing addresses, phone numbers and/or email addresses during the holiday season of 2013 (Target, 2013) . Customers were not immediately aware because Target had to perform an investigation. The collected data of the investigation was to identify those affected and to what degree. According to the Washington Post (2014), several questions were asked and answered in order for the organization to successfully address the issues. Purpose Statement The purpose of this research project is to establish whether the recent security/credit breach at Target has affected the loyalty of its customers. Direct customers are the people, individuals,
  • 5. or institutions that have a higher chance of buying the products floated by an organization (Stieb, 2006). The organization strives to ensure that the customers are completely satisfied in order for them to recommend the organization and its products or services to new prospective consumers. This includes the provision of maximum security to ensure that their personal non-public information is safe and secured from any form of malicious data tampering. Organizations should therefore ensure consumer information is protected at all levels. It is troubling to learn for the business that customers’ non-public security and credit cards information were tampered as this could translate into the customers’ loyalty weakening. This scenario also threatens the name and integrity (Reichheld & Sasser, 1990) of the organization by keeping away the prospective customers from the organization for the fear of being affected with the similar breach in the future. The organization should as a result act quickly to redeem itself and the customers from any form of loss from the breach. This also means the investing in a more robust and effective security platform must be done to safeguard their customers (Stieb, 2006). First, the numerical values of the affected need to be noted to determine the extent to which the security breach has caused damage. Also the way the consumers are affected needs to be brought in consideration which would help to cope with such situations in the future. Second, it is extremely important to know the views of the consumers and their response to the company's products in the future. The rights of customers need to be given the highest priority and it is worth noting that the customer's confidence is not lost. Hence this research is vital in revealing these basic yet very important factors that can influence business transactions. Research Questions To address the problem of the security breach, there are a variety of paths Target can take to deal with the issue; one is conducting research to identify the security weakness within the
  • 6. system. The Jaquith (2007) website suggests the following questions may be included in the initial research: 1. How many sites are connected directly to the core network without intermediate firewalls? 2. How many of these sites have deployed unsecured wireless networks? 3. Starting with zero knowledge, how many minutes are required to gain full access to network domain controllers? 4. What percentage of user accounts could be compromised in 15 minutes or less? 5. What is the relative "risk score" of each application compared to the others? Customer satisfaction is a key performance indicator within the business which measures how products and services provided to consumers by companies meet or exceed customers’ expectations. Target is a retail megastore that must compete for customers; therefore customer satisfaction is a key element of the business strategy. The security breach has left many consumers to wonder if they should continue to be loyal to Target and to gage into what consumers are thinking the following questions can be proposed: 1. Are consumers satisfied how Target dealt with the security breach? 2. What factors affect consumers’ satisfaction in this situation? 3. Who are the satisfied consumers in terms of age, gender, length of time as a Target consumer, and the frequency of using the store credit card or other credit cards either shopping at a store or on-line?
  • 7. Conclusion It is the hope at the conclusion of this research project that information can be gained in ways to best protect consumer’s personal information and gage into how consumers feel towards an organization that may have potentially put them at risk. Should consumers stay loyal to the organization or relieve themselves from any further interactions with them? References Jaquith, A. (2007). Sample Questions for Finding Information Security Weaknesses, CSO Online. Retrieved from http://www.csoonline.com/article/2121824/metrics- budgets/sample-questions-for-finding-information-security- weaknesses.html Jayakumar, A., Tsukayama, H.(2014). Target Breach: What You Need to Know. Retrieved from http://www.washingtonpost.com/business/economy/target- breach-what-you-need-to-know/2014/01/10/669a5c9c-7a10- 11e3-8963-b4b654bcc9b2_story.html Reichheld, F., & Sasser, W. (1990). Zero defection: quality comes to services, Harvard Business Review, pp 105–111. Stieb, J.A. (2006). Clearing Up the Egoist Difficulty with Loyalty, The Journal of Business Ethics, vol 63, no 1. Target. (2013). A message from CEO Gregg Steinhafel about Target’s payment card issues. Retrieved from https://corporate.target.com/discover/article/Important-Notice- Unauthorized-access-to-payment-ca BUSINESS RESEARCH PROJECT PART 2: RESEARCH PLAN 2
  • 8. BUSINESS RESEARCH PROJECT PART 2: RESEARCH PLAN 3 Business Research Project Part 2: Research Plan Shelia Collins, Nicola Phillips-Tate, Leeshon Guider, Yekaterina Volchanskaya University of Phoenix Applied Business Research and Statistics QNT-561 Neil Eckardt June 23, 2014 Running head: BUSINESS RESEARCH PROJECT PART 2: RESEARCH PLAN 1 Business Research Project Part 2: Research Plan In the second phase of the research project the team aims to identify the population and sample for the research. The team will also determine the data collection process, the format of the survey and information to be gathered as well as well as how to collect and distribute the survey. Population and Sample According to Target, the investigation determined that the stolen information includes names, mailing addresses, phone numbers or email addresses for up to seventy million individuals. The population chosen will be all seventy million
  • 9. consumers affected. Sampling for the research will consist of both, self administered and human administered sampling methods. “Much of the stolen data is partial in nature, but in cases where Target has an email address, the company will attempt to contact affected guests. This communication will be informational, including tips to guard against consumer scams. Target will not ask those guests to provide any personal information as part of that communication” (Target Provides Update on Data Breach and Financial Performance, 2014). For those without email addresses on file, Target will contact this group by mail and request an email address if they wish to participate online, and provide an alternative to call a toll free number to participate by phone through automated prompts. In the event, the guest prefer to receive a questionnaire in the mail, the company will mail the form as requested. Mailing as requested will save Target money because they will avoid printing unnecessary forms. The collaborative methods of sampling may be costly, but it is prevalent while striving to rebuild the customer loyalty database. Target is aware of sampling errors and is working diligently to avoid those errors. Data Collection Process Survey Format and Content It is important to develop a short customer satisfaction survey to accurately measure customer satisfaction with the company, product, and service. It is also essential to understand the interests, goals, and upsets for the customer in order for the company to change and improve their services in order to keep their customer base. The format of the survey will be simple clear closed-ended questions to determine if the customers are truly satisfied with the overall service of the company and gain insight as to whether Target’s responds was conducted in a quick and professionally manner from the customer viewpoint. Some of the basic content to gather with the survey includes gender, age, and length of time as a Target customer, how likely
  • 10. the customer will remain with Target, and how likely will the customer refer the company to a friend or colleague. Using a survey tool such as the Likert-scale which uses a range from “not at all likely-extremely likely that can incorporate skip logic to allow customers to answer questions that are applicable to the services they've actually used, can provide insight into where the company can improve. Survey Distribution and Collection There are a number of ways through which the surveys can be distributed and collected, the most common ones include; mail surveys, personal interviews, interviews through phones and Internet surveys as well. However, the survey will be distributed over an electronic format, such as the Internet. Internet surveys are emerging as the most reliable because many people can be reached, the problem is that one needs Internet access in order to use it. Smart phone and tablet users are more familiar and comfortable with the use of the Internet as the platform for the survey questions. The consumers for this survey are users of debit/credit cards. The results will be collected at the end of the survey period; the results are automatically collated and analyzed by the survey team.
  • 11. References James, H. (2009). Introduction to research methods. Oxofrd: Oxford University Press Likert-scale. Retrieved from https://www.surveymonkey.com/mp/likert-scale/ Peter, D. (2011). The sampling approach and surveys. Nairobi: Longman Target Provides Update On Data Breach and Financial Performance. (2014). Retrieved from http://pressroom.target.com/news/target-provides-update-on- data-breach-and-financial-performance Running head: BUSINESS RESEARCH PROJECT. PART 1 1 Business Research Project. Part 1 Business Problem and Research Questions Leeshon Guider, Nicola Phillips-Tate, Shelia Collins, Yekaterina Volchanskaya QNT/561 June 16, 2014 Neil Eckardt Business Research Project. Part 1 Business Problem and Research Questions Identification of an Organization and a Dilemma under Research Team B collectively decided to identify an organization that
  • 12. was faced with a dilemma. Retailer, Target experienced a security breach involving stolen credit card information, names, mailing addresses, phone numbers and/or email addresses during the holiday season of 2013 (Target, 2013) . Customers were not immediately aware because Target had to perform an investigation. The collected data of the investigation was to identify those affected and to what degree. According to the Washington Post (2014), several questions were asked and answered in order for the organization to successfully address the issues. Purpose Statement The purpose of this research project is to establish whether the recent security/credit breach at Target has affected the loyalty of its customers. Direct customers are the people, individuals, or institutions that have a higher chance of buying the products floated by an organization (Stieb, 2006). The organization strives to ensure that the customers are completely satisfied in order for them to recommend the organization and its products or services to new prospective consumers. This includes the provision of maximum security to ensure that their personal non-public information is safe and secured from any form of malicious data tampering. Organizations should therefore ensure consumer information is protected at all levels. It is troubling to learn for the business that customers’ non-public security and credit cards information were tampered as this could translate into the customers’ loyalty weakening. This scenario also threatens the name and integrity (Reichheld & Sasser, 1990) of the organization by keeping away the prospective customers from the organization for the fear of being affected with the similar breach in the future. The organization should as a result act quickly to redeem itself and the customers from any form of loss from the breach. This also means the investing in a more robust and effective security platform must be done to safeguard their customers (Stieb,
  • 13. 2006). First, the numerical values of the affected need to be noted to determine the extent to which the security breach has caused damage. Also the way the consumers are affected needs to be brought in consideration which would help to cope with such situations in the future. Second, it is extremely important to know the views of the consumers and their response to the company's products in the future. The rights of customers need to be given the highest priority and it is worth noting that the customer's confidence is not lost. Hence this research is vital in revealing these basic yet very important factors that can influence business transactions. Research Questions To address the problem of the security breach, there are a variety of paths Target can take to deal with the issue; one is conducting research to identify the security weakness within the system. The Jaquith (2007) website suggests the following questions may be included in the initial research: 1. How many sites are connected directly to the core network without intermediate firewalls? 2. How many of these sites have deployed unsecured wireless networks? 3. Starting with zero knowledge, how many minutes are required to gain full access to network domain controllers? 4. What percentage of user accounts could be compromised in 15 minutes or less? 5. What is the relative "risk score" of each application compared to the others? Customer satisfaction is a key performance indicator within the business which measures how products and services provided to consumers by companies meet or exceed customers’
  • 14. expectations. Target is a retail megastore that must compete for customers; therefore customer satisfaction is a key element of the business strategy. The security breach has left many consumers to wonder if they should continue to be loyal to Target and to gage into what consumers are thinking the following questions can be proposed: 1. Are consumers satisfied how Target dealt with the security breach? 2. What factors affect consumers’ satisfaction in this situation? 3. Who are the satisfied consumers in terms of age, gender, length of time as a Target consumer, and the frequency of using the store credit card or other credit cards either shopping at a store or on-line? Conclusion It is the hope at the conclusion of this research project that information can be gained in ways to best protect consumer’s personal information and gage into how consumers feel towards an organization that may have potentially put them at risk. Should consumers stay loyal to the organization or relieve themselves from any further interactions with them? References Jaquith, A. (2007). Sample Questions for Finding Information Security Weaknesses, CSO Online. Retrieved from http://www.csoonline.com/article/2121824/metrics- budgets/sample-questions-for-finding-information-security- weaknesses.html Jayakumar, A., Tsukayama, H.(2014). Target Breach: What You Need to Know. Retrieved from http://www.washingtonpost.com/business/economy/target- breach-what-you-need-to-know/2014/01/10/669a5c9c-7a10-
  • 15. 11e3-8963-b4b654bcc9b2_story.html Reichheld, F., & Sasser, W. (1990). Zero defection: quality comes to services, Harvard Business Review, pp 105–111. Stieb, J.A. (2006). Clearing Up the Egoist Difficulty with Loyalty, The Journal of Business Ethics, vol 63, no 1. Target. (2013). A message from CEO Gregg Steinhafel about Target’s payment card issues. Retrieved from https://corporate.target.com/discover/article/Important-Notice- Unauthorized-access-to-payment-ca