Personality Theory and Business Environment

Apply personality theory within a business environment.

Choose either a medical supply company, a hospitality services company (i.e., hotels, inns, tours, etc.), an event security service, an industrial manufacturer, or a beverage company. [Note: You cannot choose a real company. This must be a fictitious company using the scenario below.]
Scenario:

A family company (in the industry of your choice from those options above, but no real companies may be used) has been in business for over 40 years. They have always had a family member as president of the company. The business has been mostly conducted via email, phone, and in-person; but in general, the business systems are outdated. Now with the increasing competition, they realize that without change, the business may not survive. With no family member currently to lead the company, they must do an intensive search for an individual suited not only to their industry with the right expertise and education, but the right personality to lead the company into a new era.

This company has a culture that is currently very insular and most employees effectively pass their jobs on to someone else residing in the local community who they refer for the job; so all employees really feel like one extended family. They look to each other to help one another out in times of duress either at work or personally. Although their market has been predominantly in the U.S., with little or no diversity in the workforce, they are increasingly getting inquiries from Mexico and Latin America. There are 300 employees in this major metropolitan eastern city, and the salaries and benefits have always been on a par with the industry salaries elsewhere in the U.S. Their belief in family first, timely response to customers, and honesty have been hallmarks of this family business.

The founders remaining family members are not inclined or are unable to take over the business and have called you in as their consultant to tackle the executive search. In light of the possible future demands and needs of this company, address the checklist items.

Checklist:

Identify the industry choice from the five options provided (you can name the company with whatever name you choose, but it should not be a real company). This will be the title of your paper. An example would be: Finding a new leader for Industrial Widgets Company (fill in the underlined part with your company name). Explain what the company makes or services it provides and the industry you chose from the options provided.
Summarize the problem, and the companys culture as presented in the scenario. Describe any changes that might be necessary and that will pertain to the type of personality the new president will need to have.
Explain the traits and personality factors that should be considered when selecting the next president using the Reading from Chapter 5. Include the Big Five personality traits, Hollands typology, and at least one other personality theory (for Competency) or at least two other personality theories (for Mastery) in your response (you may use the Internet but provide the source url).
Explain how the personality of the new president you described previously would benefit the employees and the success of the company going forward.
Submit your 810 slide PowerPoint presentation with no more than five bulleted items per slide, using 24-point font, with either audio (or speaker notes below each slide) with additional title and reference slides to the Dropbox.

Minimum Submission Requirements

Address all the checklist items using correct English grammar and spelling and submit your original PowerPoint presentation with no more than five bulleted items per slide. Then include speaker notes to provide details concerning each bulleted item (below each slide) or audio should be provided for each slide.
Be sure to cite both in-text and reference list citations where appropriate and reference all sources. Your sources and content should follow proper APA citation style. Review the APA citation style found by accessing the Academic Tools area and choosing the APA resources. Your presentation should include an additional title slide and it should be using 24-point font, with correct citations, Standard English with no spelling or punctuation errors, and correct references (on the last additional reference slide.)

Lean Operations and Scheduling

Lean manufacturing is a philosophy of production that focuses on the minimization of resources used throughout the organization in the production of goods and services. Lean manufacturing involves identifying and eliminating non-value adding activities in design, production, supply-chain management, and in dealing with the customers.

Select a manufacturing business in the Middle East and discuss the following:

What the company does
Its value adding and non-value adding activities, including tools for Lean Six Sigma such as just-in-time manufacturing
Any rapid change-over activities the company uses or could use
The companys employee empowerment opportunities

Please include introduction and conclusion also use 5 references including this book as main reference Stevenson, W. (2018). Operations management (13th ed.). New York, NY: McGraw-Hill Irwin. ISBN-13: 9781259667473 book in attachment chapter 14 related to this assignment

Literary Non-fiction Essay 1

Take RISKS!! Task: Write a literary nonfiction essay that explores a topic related to one of the essays that youve read in class this term. Review the essays that your teacher has assigned to choose a topic. This literary nonfiction essay is not an academic essay. This assignment requires you to incorporate a more literary approach to argumentation.

Style: Since weve studied literary nonfiction this term, your use of language should reflect the study: make effective choices as a writer to engage the audience (academic peers). Employ rhetorical devices and literary devices to enhance your argument.

Security of Cloud Applications in Government and Industrial Automation

Please review the following for this week as well as All Week 8 Online Course Materials:
    NIST SP 800-82 Rev. 2, Guide to Industrial Control Systems (ICS) Security, May 2015.
View the following video:
https://www.youtube.com/watch?v=2jbFOCcvEJk&feature=youtu.be&t=4

————————————————————
Final Exam

Question 1 (2 pages)
1.      (a) In the NIST Cybersecurity Framework, the Framework Core provides a set of activities to achieve specific cybersecurity outcomes, and references examples of guidance to achieve those outcomes. It presents key cybersecurity outcomes identified by stakeholders as helpful in managing cybersecurity risk.  What are elements that comprise the Core? (Answer: Identify, Protect, Detect, Respond, and Recover)

(b)  Provide a brief description of each of these elements.   
(c) The cybersecurity Framework also incorporates Implementation Tiers that provide context on how an organization views cybersecurity risk and the processes in place to manage that risk.  Tiers describe an increasing degree of rigor and sophistication in cybersecurity risk management practices. They help determine the extent to which cybersecurity risk management is informed by business needs.  Please list the different Implementation Tiers.
(d) In which Tier are the organizations risk management practices formally approved, expressed as policy, and regularly updated based on the application of risk management processes to changes in business/mission requirements.

Question 2 (2 pages)
NIST SP 800-82, Guide to Industrial Control Systems (ICS) Security, provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC), while addressing their unique performance, reliability, and safety requirements. The document provides an overview of ICS and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provides recommended security countermeasures to mitigate the associated risks.
The document specifies sets of security controls, control enhancements, and supplemental guidance derived from the application of tailoring guidance to security control baselines described in NIST SP 800-53.  The baseline controls are the starting point for the security control selection process and chosen based on the security category and associate impact level of information systems.
1.    According to NIST SP 800-82, what are the key factors that drive design decisions regarding the control, communication, reliability, and redundancy properties of the ICS?  List the factors and provide a short description of each in your own words.
2.    Based on NIST SP 800-82, effectively integrating security into an ICS using cloud technology requires defining and executing a comprehensive program that addresses all aspects of security, ranging from identifying objectives to day-to-day operation and ongoing auditing for compliance and improvement.  What steps does NIST SP 800-82 describe as the basic process for developing a security program?
————————————————————
Week 8 Discussion: Security of Cloud Applications in Government and Industrial Automation (1 page)

Write one page using APA format and providing one reference.
From what you have gathered from this lesson, in your opinion, what are some of differences in the issues related to ICS cloud applications and conventional IT applications.

————————————————————
Week 8 Assignment: Security of Cloud Applications in Government and Industrial Automation (2 pages)

Write one page (for each question) using APA format and providing two references. Precede each answer with the question and its corresponding number.
1.    In a DoD cloud application, the Mission Owner inherits compliance from the CSPs Cloud Service Offering (CSO) for the security controls (or portions thereof) that the CSP meets and maintains. Figure A-1 depicts, in general terms, the varying degrees of compliance shared by the Mission Owner and the CSP as a function of the type of service offerings.  Please discuss why the proportions are different for each type of service offering.
 
Figure  A-1 (See attachment labeled Figure A-1)

2.    Using wireless communication in industrial control systems poses possible risks and vulnerabilities. According to NIST SP 800-82, what are some of the guidelines that have to be observed in ICS wireless applications?