Edudorm Facebook

Topics and Questions We Can Help You To Answer:
Paper Instructions:

Assessment 2 – Research Proposal

In order to demonstrate your critical engagement with, key concepts and ideas from within the field of applied research methodology, you are required to write a proposal for your dissertation/management report research. Your proposal should be based on a current topic of interest within HRM. Keep in mind also that this is a small-scale research project, therefore you should consider the feasibility of the activities you propose in relation to the resources at your disposal.

It is recommended that you allocate the 3,000 word count as follows: Introduction – 20%; Literature review – 40%; Intended methodology – 40%.

The introduction should provide the rationale for the proposed research study; the background/context for the study, the overall aim (what your study is intended to achieve) and 3-5 specific objectives (what is necessary in order to accomplish your aim). The literature review should locate your proposed study in relation to relevant research and theory. It should provide definitions and concise explanations of key concepts, as appropriate, it should refer to current debates and controversies within the topic area (as relevant to your research aim). Drawing on this review you should indicate the knowledge gap that your research will address, and how this initial review informed the formulation of your research aim.  You should explain your intended methodology in relation to the aim and objectives of your study – what data/material do you need to collect in order to achieve these, and how will you access this material? This involves reflecting on your research philosophy, and the research paradigm that fits most appropriately to your aim and objectives. From within this paradigm indicate the main elements of your research strategy and design. Explain how the research methods (e.g. surveys, interviews, focus groups…) that you propose to use will enable to you to achieve your objectives. You should not provide actual questionnaires or interview schedules, but give some indication of the topics you anticipate they will cover. Indicate who your research subjects will be, and why, and the sampling issues involved (as appropriate). Indicate what method/s of analysis you will apply to your data. You should also make reference to practical concerns and issues of access (to organisations and research subjects), as well as research ethics. You should conclude your proposal with an indicative work plan for completion of your research and writing up of your report/dissertation.

To summarise, in your proposal you should:

•    give a working title for your research study
•    provide a rationale for your choice of topic, and your research aim
•    present one research aim and 3-5 objectives
•    drawing on relevant current concepts, research and theory, identify the ‘research gap’ your study will address
•    locate your proposed study in epistemological terms, informed by the study aim and objectives
•    specify how you propose to undertake empirical research to address the research gap
•    include consideration of ethical issues relevant to your proposed research study
•    conclude with a short work plan, outlining what will be done by what milestone dates (working backwards from the dissertation/report submission deadline),
•    identify the resources you expect to call on to complete the research project.
•    provide a reference list using the Harvard system of referencing 

Assessment will be based on the following:

•    Relevant and appropriate choice of topic
•    Working title, aim and objectives are clear and coherent
•    Literature review is concise, up-to-date and focused on issues relevant to research aim
•    Choice of research strategy and methods consistent with research aims and philosophy
•    Evidence of critical engagement with the research methods literature
•    Evidence of consideration of the practical, logistical and ethical issues involved
•    Correct referencing and full list of references (using Harvard system)

638 Words  2 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

Define and provide an example of a visionary leader, a processor leader, and an operator leader, backing your work with credible sources.

Create a clear distinction between these three styles of leadership, weighing their similarities and differences.

Provide an example of each type of leader (visionary, processor, operator) that you know from personal experience or through research of well-known leaders.

Create a table that lists situations in which each of these styles may be useful.

Be sure to include all citations

92 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

Proverbs 15:1 (Links to an external site.) ”A soft answer turns away wrath, but a harsh word stirs up anger.

Discuss how this proverb could guide you as a manager in your communications within your organization.  What do you think this scripture is telling us?

You may include information from the course weekly assignments or the textbook to support your post.

73 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

It is not ethical to monitor the behavior of employees when they are not at work. Employees of government and public entities have a constitutional right to privacy that protects them from most employer monitoring of, or even inquiring about, their off-the-job conduct. For public employers, this type of monitoring is largely off-limits. In the private sector, a number of laws prohibit employers from intruding into their employees' lives outside of work (Johnson, 2015). Some state constitutions specifically provide for a right to privacy, which prevents private employers from looking into their employees' off-duty activity. An employer is never allowed to physically enter an employee's home without consent (even when searching for allegedly stolen property belonging to the employer (Verbos et al., 2007). Under the National Labor Relations Act (NLRA), it is illegal as well as unethical for an employer to monitor or conduct any surveillance of employee union activities, including off-the-job meetings or gatherings.

References

Johnson, C. E. (2015). Meeting the ethical challenges of leadership: Casting light or shadow( 5th ed.). Thousand Oaks, CA: SAGE Publications.

Verbos, A., Gerard, J., Forshey, P., Harding, C., & Miller, J. (2007). The positive ethical organization: Enacting a living code of ethics and ethical organizational identity. Journal of Business Ethics, 76(1), 17-33.

221 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:
There is a strong possibility that if any followers, team members or employees see a leader or someone in a leadership position behaving, acting or being less than truthful in any business dealings or happenings, then they may very well believe and feel that it is okay for them to carry on and conduct themselves in the same manner. This can prove more than detrimental to any department of any particular organization. The leadership’s values and actions are those that should shape and reinforce the culture of the organization. Leaders are the ethics officers of their organizations, casting light or shadow in large part through the example they set. When it comes to ethics, followers look to their leaders as role models and act accordingly. Leaders are generally seen as legitimate, credible, and attractive because they occupy positions of authority with power and status. Ethical leaders build on this foundation. (Johnson, 2013). In monitoring my organization’s culture to determine if the culture is aligned to my ethics policy would call for me to be an effective listener; reassuring my team members that they are not alone and that we share their feelings and thoughts may be together, I would make sure to specifically and frequently recognize employees who demonstrate the positive behaviors aiding in the greater good for the organization; for this allows to feel appreciated and well taken and I would definitely lead by example, giving team members something to model themselves by.

Reference:

Johnson, C. E. (2013). Meeting the ethical challenges of leadership, Casting light or shadow (5th ed.). Sage Publications, Inc. Retrieved from http://gcumedia.com/digital-resources/sage/2013/meeting-the-ethical-challenges-of-leadership_ebook_5e.php

281 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:
Ephesians 2:10 (Links to an external site.) “For we are his workmanship, created in Christ Jesus for good works, which God prepared beforehand, that we should walk in them.”

Discuss how does this scripture relates to corporate communications and how you could show good works and integrity.


another half page to response this discussion:
I believe that Ephesians 2:10 is saying that God created us with a skill and purpose and we should use it.  In a sense, he has already created a plan of what He wants us to do with our lives and there is no reason to step out of that path.  He already had planned what we will do and we should trust in that plan and it will lead to good works.  I believe that this verse can relate to corporate communication if we follow the plan that God has laid out for us and good works will prevail.  I believe you should do what God has done and have a plan of what to do and keep true to that plan.  I believe that if you go into a corporate discussion unprepared, then that is when you will fail.  When it comes to corporate discussions, you should come prepared, be true to yourself, and do not try to become someone you are not.  I think that it has become so easy for people to set aside their values when it comes to corporate issues, but I believe if you can keep to those values then you can become a difference maker in your company.  That could be the plan that God has for you and if you follow that, then that could be how you show your good works and integrity.

300 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

Transformational theory proposes a process through which leaders engage others and create a connection that enhances motivation and morality in themselves as well as followers.  Transformational leaders possess strong internal values and motivate others to put aside self-interest.

find and read  Caillier, J. (2014). Transformational leadership, public service motivation, mission valence, and employee performance:  A preliminary study.  Public Personnel Management.

evaluate transformational leadership theory as an explanation of leadership in general and within the Criminal Justice System in particular.

The paper must follow APA requirements. 

96 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

Deborah enters your office ready to discuss the project. She discusses her feedback on the plan thus far. She states that your team is doing an excellent job researching and you've been keeping her up-to-date on your findings. She commends you for your focus on effective management strategies because your team has been looking at every aspect of the company and considering both internal and external pros and cons. She asks that your team now apply the findings to develop a strategic framework so that the company can begin its global expansion programs. You decide that Deborah has brought up another good point and decide that the balanced scorecard would make a good part of strategic framework.

A balanced scorecard suggests that we view the organization from four perspectives (the learning & growth perspective, the business process perspective, the customer perspective, and the financial perspective). Create a 2-3 page paper that discusses the following:

Briefly discuss the four perspectives of the balanced scorecard and analyze what each means to your organization.
In addition to the balanced scorecard, provide an overview of two other strategies that would be part of your company’s strategic framework for global expansion.
Why is it important to combine different strategies when pursuing global expansion?

219 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

Philippians 2:14-15  ESV “Do all things without grumbling or disputing, that you may be blameless and innocent, children of God without blemish in the midst of a crooked and twisted generation, among whom you shine as lights in the world.”

What actions can we take to live this bible passage at work? How might it relate to how you communicate at work?

74 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

Advantages that partners can receive from forming a strategic alliance to increase their chance of success in entering a new foreign market.

33 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

Describe The projected supply and demand for the next 10 years as a real estate broker, you must consider the barriers to entry , e.g., education that may affect the supply

42 Words  1 Pages

Topics and Questions We Can Help You To Answer:
Paper Instructions:

Consider a company for which you have worked, or one with which you are familiar. Would you characterize the company as ‘Theory X’ or as ‘Theory Y’?  Do the same for how it would rate as ‘mechanistic’ or ‘organic’ in outlook

52 Words  1 Pages

Topics and Questions We Can Help You To Answer:

Prepare a detailed written report discussing the potential security threats and vulnerabilities of a fictitious organization, Adventure Scuba and Diving Institute (ASDI).
Please see the Specification section for more details on assignment submission requirements.
Scenario:
Adventure Scuba and Diving Institute (ASDI) is located in the United States and offers training and certification programs for scuba and deep-sea diving. ASDI is a premier training school in the area of diving and scuba and has developed a wealth of proprietary training resources, videos, guides and manuals. The school suspects that competitors have tried to breach the organization’s computer systems to gain access to these training materials.
ASDI’s network is comprised of two web servers, two file servers, one email server, 50 employee workstations, and a 50-workstation student computer lab. The school also has public and private Wi-Fi availability throughout the campus.
Your firm has been hired as the IT security analyst to review, evaluate, and make recommendations with respect to maintenance of security of the organization’s computer and network systems. You have been charged by your supervisor to prepare a preliminary report documenting the most critical security threats that ASDI faces. Your supervisor has given you the following resources that might be useful in your research and analysis:
•    An article on the Help Net Security website (Links to an external site.)
•    Common Vulnerabilities and Exposure (CVE) database search (Links to an external site.)
•    Security organizations, such as Secunia (Links to an external site.)
Your supervisor has asked you to consider and account for the following questions as you shortlist the threats and prepare your report:
•    What threats are new this year and which have become more prevalent?
•    Why are these threats more common and why are they important?
•    What threats remain constant from year to year? Why?
•    What threats do you believe will become more critical in the next 12 months? Why?
•    Has an exploit been released?
•    What is the likelihood of an exploit?
•    How widely used is the software or system?
Specifications for this Assignment:
•    Submit the report as a single document in Word format.
•    8-10 pages in length
•    Document and citation formatting should be in conformity with the    APA Requirements
•    Cite and discuss at least three credible sources other than (or in addition to) the course textbook. The three sources recommended in this assignment description may be among these sources, which may also include sources found via Web search or library
•    Include in your report a network diagram of how you propose the network structure should be configured for optimum security. You can create this diagram using any drawing tool, including those embedded in Word, or by drawing the diagram by hand, scanning into an image file, and then pasting into your report.
•    The sections of your report should be as follows:
•    Cover Page
•    Table of Contents
•    Executive Summary (provide a project overview and summary in this section)
•    Body of the report in narrative form in two sections: Section 1 of the on Vulnerabilities and Threats in narrative form, providing responses to each of the questions posed in the assignment scenario, and Section 2 on Countermeasures and Prevention
•    Network Diagram
•    References

555 Words  2 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...