Describe strategic planning techniques used to formulate alternative strategies designed to achieve stated business goals.

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: • Analyze the role of a company mission, vision, and objectives and the impact to business strategy. • Describe strategic planning techniques used to formulate alternative strategies designed to achieve stated business goals. • Analyze the external and internal environment for opportunities, threats, strengths, and weaknesses that impact the firm’s competitiveness. • Use technology and information resources to research issues in strategic management.

Define the type of information security policies namely Enterprise Information Security Program (EISP) and Issue-specific

Question 1Information security is about recognising the value of information and protecting it. Information security activities cannot be effectively performed without the mobilisation of a unified administrative, physical and technical plan. There are standards that recommend unified information security activities namely International Organization for Standardisation and International Electro technical Commission (ISO/IEC), Information security requirements and evaluation items of the Certified Information Systems Auditor (CISA) and Certified Information Systems Security Professional (CISSP).Visit websites related to the above standards and explain how these standards address the three information security domains namely administrative, physical and technical.Question 2Policies can help organizations to avoid litigation. The development of these policies meant to improve employee productivity and also to prevent potentially embarrassing situations. Security policy would drives the performance of personnel in order to enhance the information security of an organization’s information assets.a) Define the type of information security policies namely Enterprise Information Security Program (EISP) and Issue-specific Information Security Policies (ISSP).b) Search for your company security policies or any sample of security policies on the Internet. List THREE (3) ISSP policies and state whether the policies are issued or coordinated by the same individual of department. Propose TWO (2) possible ISSP policies if the company security policies are not in place.Question 3Establishing a Computer Security Incident Response Team (CSIRT) is an effective way of mitigating and minimising damage from attacks on information systems and breaches of information security.a) Assuming that your company is planning to develop a Computer Security Incident Response Team (CSIRT), provide your recommendations on the steps that need to be taken in order to establish the CSIRT.b) Design an incident response plan for your company information security. Include actions that need to be taken if the following events occur:-a. Virus attackb. Power failure

Define motivation and talk about it a bit and then u need to select an organization that u work basically and then describe behaviors/attitudes that have been observed in that organization

Define motivation and talk about it a bit and then u need to select an organization that u work basically and then describe behaviors/attitudes that have been observed in that organization and then discuss how the concept of literature that means how the theories that are mentioned in the text book go with situation that have been observed i.e whether does it go as per theory or does it challenge thr theory (it can be either way). We need atleast 3 theories and then explain how understanding of those theories can be applied to manage people to work more effectively. The referencing is both in-text and in the end. After this it Needs a self reflection. The guidelines for both have been provided. It’s due on 23 but i have a class on 20 so it would be great if i just get a rough draft for 20 and then get feedback. As long as we follow the guidelines mentioned in the mail and even in pictures there shouldn’t be a need of any changes but still after feedback there may be just few minor change ( but there is les chance).

Discuss the extent to whichFairphone exemplifies these entrepreneurial traits and characteristics.

Assignment Word limit: 1200 words in total (plus or minus 10%)Parts of the following article/case was published on https://studybreaks.com/tvfilm/isfairphonechanging-the-future-of-smartphones/- June 2018 (attached)The Overall TaskThe following questions are all based on the above Fairphone article/case. Basing your argumentson the topics that you have studied in the first five weeks of this unit, write a report addressing thefollowing two questions:a) Entrepreneurs – and by extension, the firms they run – have been identified as having certaintraits and characteristics. Some of these traits are evident in the case of Fairphone, and how they‘go about’ developing and implementing their business model. Discuss the extent to whichFairphone exemplifies these entrepreneurial traits and characteristics. Justify your response withreference to academic sources (e.g. academic journal articles, textbooks, etc.).b) The article clearly outlines what we might consider ‘social entrepreneurship’, whereby anentrepreneur establishes and/or leads an organisation or initiative engaged in social change. Butlaunching and running a social enterprise is not without its challenges. Describe at least three majorboundaries or challenges involved in running a social enterprise. Again, you should be looking touse academic sources as the foundation of your review. Wikipedia or web blogs are not consideredas ‘sound’ academic sources.Write up your analysis. This should be in a report format. Here is a suggested structure:a. Executive Summaryb. Introductionc. Analysis of Entrepreneur traits/characteristics (ie. linking them Fairphone)d. Major Boundaries or Challenges in Social Entrepreneurshipe. Conclusionf. Referencesg. Appendix (if required)