Describe guidelines for making concessions with examples during a negotiation process.
NEGOTIATION TECHNIQUES, LSM 422
Homework 2, Fall 2022
Due Monday, September 09, 2022
Q1. Describe the following by a scenario, showing seller’s view and buyer’s view:
a. Initial offer/asking price
b. Target points
c. Resistance points
d. Walk-away points
e. Conditions for making a deal or not making a deal
You need to take a scenario or example different from the one given in the textbook. (40)
Q2. Describe guidelines for making concessions with examples during a negotiation process. (10)
Create a plan for project oversight that includes identifying the project’s greatest challenges and mitigation recommendations.
Assignment – Project Proposal: Execution, Control, and Closure
Overview
Note: This is the third of three assignments that, as a whole, cover all aspects of the project life cycle relevant to your selected project. Now, it is time for you to discuss your project’s challenges (e.g., risks), performance management plan (e.g., earned value management), and proposed plan for closing the project when it is done.
Instructions
Write a 4–6 page paper in which you define the execution, control, and closure aspects of your chosen project. In your paper you must:
- Create a plan for project oversight that includes identifying the project’s greatest challenges and mitigation recommendations. The plan should also include rationale for why the selected challenges are the greatest challenges and why the chosen mitigation recommendations were made.
- Provide specific and detailed information on how you will measure project performance. Define how the project will be measured and include at least three key EVM metrics that will be used to determine progress and performance success. This should also include rationale on why those specific metrics were chosen.
- Create a plan for closing the project properly that includes details on how that closure will be coordinated with any necessary stakeholders.
- Create a performance evaluation to measure project effectiveness that includes scope, cost, time, and quality.
- Use at least three sources to support your writing. Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. The specific course learning outcome associated with this assignment is:
- Develop a process for measuring the progress of a project, providing oversight, coordinating project closure, and determining project effectiveness.
Explain a minimum of two techniques you currently utilize to protect your valuable data from being a target of cyber crime.
Protection from Cybercrime
Prior to beginning work on this discussion, please read all of the required resources for this week. Review the instructions below and research a minimum of five additional articles in the UAGC Library that were published within the last 10 years to help support your statements. Be sure to include a reference list for your articles at the end of your post in APA format as outline by the UAGC Writing Center (Links to an external site.).
Cybersecurity is not only an issue for governments and large corporations, it also impacts us as individuals. From a criminal justice professional perspective, provide a professional opinion about the issues related to security and protection from cybercrime.
From a personal perspective, address the following.
Required Resources
Articles
Finklea, K. & Theohary, C. A. (2015). Cybercrime: Conceptual issues for congress and U.S. Law Enforcement (Links to an external site.). Congressional Research Service. Retrieved from https://www.fas.org/sgp/crs/misc/R42547.pdf
- This article provides a comprehensive overview about issues for congress and national law enforcement to consider in the security and protection of cybercrime.
Accessibility Statement does not exist
Privacy Policy (Links to an external site.)
Kelly, B. B. (2012). Investing in a centralized cybersecurity infrastructure: Why “hacktivism” can and should influence cybersecurity reform (Links to an external site.). Boston University Law Review, 92(5), 1663-1711.
- The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article provides a comprehensive overview and analysis about the need for cybersecurity reform.
Lohr, S. (2010, January 17). Companies fight endless war against computer attacks (Links to an external site.). New York Times. Retrieved from http://www.nytimes.com
- This article explores how Google and other companies are attempting to prevent and respond to cyber-attacks.
Accessibility Statement does not exist
Privacy Policy (Links to an external site.)
Macmanus, S. A., Caruson, K., & McPhee, B. D. (2013). Cybersecurity at the local government level: Balancing demands for transparency and privacy rights (Links to an external site.). Journal of Urban Affairs, 35(4), 451-470. http://dx.doi.org/10.1111/j.1467-9906.2012.00640.x
- The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article examines what is needed to better balance privacy protection and transparency in cybersecurity policy making.
Verini, J. (2010, November 10). The great cyberheist (Links to an external site.). New York Times Magazine. Retrieved from http://www.nytimes.com
- This article provides a real-world example of one criminal’s cybercrimes and the aftermath.
Accessibility Statement does not exist
Privacy Policy (Links to an external site.)
Recommended Resource
Website
MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com/)
- This resource site will provide assistance in researching additional sources for the assessments within this course.
- Describe the data you currently have that you consider important.
- Explain a minimum of two techniques you currently utilize to protect your valuable data from being a target of cyber crime.
- Describe what you could do to better protect yourself from cyber crime.
From a professional, evidence-based perspective, address the following.
- Explain the basic legal rights of individuals and companies who are affected by cyber crime.
- Explain the ways in which questions about cybersecurity are out of your hands. (In other words, what can’t you do to protect yourself?)
- Analyze the risks inherent to corporations that cannot be controlled or limited through any protective actions.
What forms are required to be filed with the SEC?
What is the mission of the SEC?
What forms are required to be filed with the SEC?
What financial statements must be filed with them quarterly and annually?
please provide sources
Explain three ways you will ensure that insurance companies pay for your drug.
Case Scenario: Launching a Cancer Drug: Comanapracil
You are a pharmaceutical executive and you are preparing a presentation for a Board of Directors. You believe that your firm, Ropache, may have developed a promising new drug, Comanapracil, which seems to arrest the progress of breast cancer for 2 years with no significant side effects. Clinical trials suggest that the drug is 100% effective for 2 years. After 2 years, tumor growth resumes at the same rate. Therefore, Comanapracil can only be used for a 2-year course, after which it loses its effectiveness.
This assessment has two-parts. Click each of the items below to complete this assessment.
Part I: Determining Pricing and Marketing Strategy for a New Drug
· You have been tasked with developing a pricing and marketing strategy for Comanapracil, which you will share in a 10 – 15 slide presentation with board of directors. As you undertake this task, be sure to address the following:
· U.S. Breast Cancer Statistics
· Annual Costs of Cancer Care—Cancer Prevalence and Cost of Care Projections
· Chemo Costs in U.S. Driven Higher by Shift to Hospital Outpatient Facilities
· Breast Cancer Drug—Comparison Chart
· Develop and present estimates for the demand for Comanapracil and the price of the drug you think the market will bear. Be sure to include the number of customers for this drug.
· Describe where and to whom you will focus your marketing efforts. For each, detail why they are important.
· Explain three ways you will ensure that insurance companies pay for your drug.
· Explain the elasticity of demand for a drug like Comanapracil. What factors could potentially change the elasticity of demand?
· Assume you are able to obtain a patent and are ready to go to market immediately. Explain the length of time for which your drug will receive patent protection, so that you are protected from competition prior to generics entering the market. Also, explain why patent protection exists in healthcare.
Note: Your presentation should provide key concepts in the slides with a full discussion as your narrative below in the speaker notes, while using the rubric for guidance to meet expectation.
Describe how different cultures influence the negotiation process.
- Describe how different cultures influence the negotiation process.
- Identify regional, international, and cultural differences in communications.
- Explain current business trends for key insights and relevance to management fundamentals.
- Summarize current global issues as related to business disciplines, concepts, and theories.
Explain why it is so important to manage these issues with health care professionals
Please write a 2- to 3-page paper (excluding the title page and reference page(s)) using APA 7th Edition Format and Style.
The topic of your paper is ‘managing health care professionals’
Please include the following points in your paper:
· Explain the following terms in your own words (remember to cite your references correctly using APA 7th Ed)
· job satisfaction
· job burnout
· turnover
· retention
Please include relevant examples pertaining to each of these terms
· Explain why it is so important to manage these issues with health care professionals
· Explain steps that health care managers can take to minimize job burnout and turnover among their health care professionals (thereby reducing turnover and increasing retention)
Looking at the online website, address three issues that require revision?
- Each day, we use the Internet on our personal computers and mobile devices to access information and purchase goods. Websites often have their own mobile form factor while others maintain the same Website user experience, creating challenges when trying to use navigation, overcome errors, search, and complete the most mundane tasks. For this assignment, you are to review a website as well as a Mobile Site. For example, you would evaluate Amazon.com on Microsoft Edge (PC) and Amazon.com on your iPhone using Safari. Conducting a heuristic evaluation (self-evaluation), you will write an assessment on each Website answering the following questions:
- What Website did you evaluate?
- What industry does the company participate in?
- Looking at the online website, address three issues that require revision? For each issue, please provide a screenshot and explicitly mark why you feel this issue is problematic.
- Looking at the online website, how would you suggest that the issues requiring revision are corrected based on what you have learned in the class so far?
- Moving to the mobile site, compare those same three features. Did you find the user experience to be problematic or better suited for the mobile form factor?
- With the mobile site, how would you enhance the experience for those same issues you found on the Website to be problematic.
- This paper length is 4 -6 pages. Since this is a personal review of a website, sources are not necessary. However, you are still to follow the APA format in presenting the paper.
Why does the author think it is essential to know these things? Is it necessary to you to know them?
Assignment 1
short stories are attached answer length – 500-600 words
I want you to close read your chosen short story and answer the 4 sets of questions above for your chosen short story.
- What is the book about as a whole? You must try to discover the leading theme of the book and how the author develops this theme in an orderly way… (Theme)
- What is being said in detail, and how? You must try to discover the main ideas, assertions, and arguments that constitute the author’s particular message.
- Is the book true, in whole or in part? You cannot answer this question until you have answered the first two. You must know what is being said before you can decide whether it is true or not. When you understand a book, however, you must make up your mind. Knowing the author’s mind is not enough.
- What of it? If the book has given you information, you must ask about its significance. Why does the author think it is essential to know these things? Is it necessary to you to know them?
Describe the internal and external criticism that is used to evaluate middle range theories.
Making judgement as to whether a theory could be adapted for use in research is very important. Describe the internal and external criticism that is used to evaluate middle range theories.