Rethinking Global Supply Chains

Rethinking Global Supply Chains

Unit # 8 PowerPoint Presentation

Instructions

It is important to understand what information systems are and why they are essential for running and managing a business. The case studies below will provide you with an opportunity to review many of the concepts covered in this course. These case studies provide you with an opportunity to critically analyze events that are taking place in real-life organizations. This helps to develop your critical thinking and research skills as you research each of these scenarios.

For this assignment, you will review four case studies. Then, in a PowerPoint presentation, you will evaluate the studies and address each of the requirements listed below, using both critical thinking and theory as well as supporting documentation.

Review and analyze the Chapter 1 Case Study “Will the Coronavirus Pandemic Make Working from Home the New Normal?” and address the following in a minimum of four slides:

Define the problem described in this case. What are the management, organization, and technology issues raised by this problem?
Identify the information technologies used to provide a solution to this problem. Was this a successful solution? Why, or why not?
Will working from home become the dominant way of working in the future? Why, or why not?
Review and analyze the Chapter 2 Case Study “Is Social Business Good Business?” and address the following in a minimum of four slides:

Identify the management, organization, and technology factors affecting adoption of internal corporate social networks.
Compare the experiences implementing internal social networks of the organizations described in this case. Why was Standard Bank successful? What role did management play in this process?
Should all companies implement internal enterprise social networks? Why, or why not?
Review and analyze the Chapter 8 Case Study “Is the Equifax Hack the Worst Ever—and Why?” and address the following in a minimum of four slides:

Identify and discuss the security and control issues that resulted from flaws in Equifax security and control.
What management, organization, and technology factors contributed to these problems?
Discuss the impact of the Equifax hack.
How can future data breaches like this one be prevented? Explain your answer.
Review and analyze the Chapter 15 Case Study “Rethinking Global Supply Chains” and address the following in a minimum of three slides:

Discuss the advantages and disadvantages of global supply chains.
What measures can companies take to mitigate supply chain risk?
Should companies continue to maintain global supply chains? Explain your answer
In formatting your PowerPoint presentation, do not use the question-and-answer format; instead, use bullets, graphs, and/or charts in your slides to identify important points, and then discuss those points in the speaker notes of each slide. The speaker notes section of each slide should not repeat slide information but serve as an area in which you augment or elaborate on slide information so that your audience has a better understanding of the material. You must have a minimum of 100 words in the Speaker Notes section of each content slide.

Your PowerPoint presentation should be a minimum of 15 slides in length (not counting the title and reference slides). You are required to use a minimum of two peer-reviewed, academic sources that are no more than 5 years old to support each case study. You may use your eTextbook once in each case study. All sources used, including the eTextbook, must be referenced; all paraphrased material must have accompanying in-text citations. At least two sources must come from the CSU Online Library. APA style and formatting is required.

 

How do you place an order?

It takes a few steps to place an order with Us:

  • The first step is to place your order. You will need to provide us with some basic information about your project.
  • Once you have placed your order, you will be taken to our secure payment page.
  • Once we receive your order, we will carefully review it and match you with a writer who has the skills and experience.
  • Stay in contact with the writer and discuss vital details of research.
  • Your completed proposal will be delivered via email within the specified deadline.

You are secure when using our service

It's critical for each client to feel secure. As a result, we at Research Proposal Writing take precautions to secure your data.

Financial security You may securely pay for your purchase using a variety of secure payment methods.
Personal security The personal information of our clients is secure. Nobody else will have access to it.
Academic security We use a specialized program to check every completed paper to ensure that we deliver no-plagiarism samples.
Web security This website is safe from unauthorized breaches. We maintain our privacy management in line with the latest laws and regulations.

You can get help placing your order. If you have any questions about our services, please contact us. Our support staff is accessible 24 hours a day, 7 days a week.

If you're still looking for a way to improve your grades and hire expert writers, we've got you covered. Place an order on our website, and we'll help you with any paperwork you want. We will exceed your expectations.

Order now Get a quote