IMC Plan PowerPoint Template

Executive Summary

Prepare this slide last and submit it with the final plan at the end of the semester.

Contents of this slide should include:

•Summary of the key findings of your analysis, including new communications objectives.

•Briefly state your promotion mix recommendations for coming year.

•Identify any corporate policy items that will be impacted with new recommendations.

Table of Contents

Part 1 Table of Contents

•Product marketing strategies

•Marketing overview of the product and its role in the market.

•Current product’s competitive position

•Value proposition

•Primary target market characteristics

•Target market buyer’s decision process

•Brand strategy of the product/service

•Type of product/service lifecycle and benefits/features analysis

•First year communication objectives

•Issues impacting the objective attainment

•SWOT analysis

•Competitive analysis

Part 1
Current Marketing Situation
Product Marketing Strategies

•Go Pro camera brand is known for its exceptional performance and innovative features such as:

•Durability

•Compactness

•High-quality video capabilities

•Waterproof design        


Part 1.a. Product Description:
Marketing Overview of the Product & its role in the Market

•Go Pro camera brand is known for its exceptional performance and innovative features such as:

•Durability

•Compactness

•High-quality video capabilities

•Waterproof design

Part1.b. Product Description:
Current Product’s competitive position

•The Go Pro Camera holds a substantial market share in the action camera market.

•It boasts for several strengths contributing to its competitive positioning.

•Go Pro Camera is a market leader in the action camera industry.

•It follows a premium pricing strategy, which reflects high-durability and superior performance. 

Part1.c.   Product Description:
Value Proposition

•Its value position lies in its capacity to empower users to relive and capture their adventures.

•Go Pro Camera offers several benefits that effectively satisfy customer needs.

•It stands out from rivals through its distinct capabilities and features.

•Go Pro Camera targets to advance a lifetime value for its target audience by fostering a robust connection with users. 

Part1.d. Product description:
Primary target market characteristics

•The Go Pro Camera primary target market comprises content creatures, sports enthusiasts, and adventure enthusiasts.

•It has adopted a differentiated targeting approach to cater to diverse target market preferences and needs.

•It targets market comprise females and males particularly aged between 18 and 45 years.

•Go Pro camera target market demonstrate specific psychographic traits like self-expression, social connectivity, and those seeking thrills.  

Part 1.e.  Product description:
Target Market Buyer’s decision process

•The Go Pro Camera buyer’s decision process comprises:

•Go Pro Camera provide a variety of options and features allowing the buyer to carefully assess their needs before selecting the right model.

•Potential clients need particular information to make informed choices.

•Go Pro Camera offer exceptional customer support to help address dissonance.

•The Go Pro Camera ensures continued product innovation and launch of new models to cater for buyer’s desire for novelty and technological advancements.

Part 1.f. Product Review:
Brand Strategy of the product/service

•The Go Pro Camera is a national brand and brand equity.

•It has a diverse product line.

•The diverse product line offers consumers a comprehensive ecosystem of solutions to attain their distinct needs.

•The packaging design align with its brand image, high performance and durability. 

Part 1.g.  Product Review:
Type of product/service lifecycle & benefits/features analysis

•Go Pro Camera is in the maturity stage of its product lifecycle.

•It has a well-established brand reputation.

•It has an extensive product line.

•It has a competitive pricing.

•Its features such as video is of high resolution and enhanced connectivity options. 

Part 1  Communications Objectives:
First year communications objectives

•Go Pro Camera communications objectives include:

•Increase brand awareness

•Drive purchase, and 

•Foster customer engagement and advocacy

Issues impacting the objectives attainment

•Though Go Pro Camera has accomplished massive success and market leadership, there times where the objectives of the company have been impacted.

•The major issues that have hindered Go Pro’s objective attainment include:

•Inadequate budgets

•Delay in timely budget approvals.

SWOT Analysis

Strengths: Brand recognition and reputation Rugged design and durability High-performance capacityWeaknesses: Higher pricing Intense competition
Opportunities: Expanding market Collaborations and partnerships Technological advancements.Threats: Smartphone advancements Emerging competition Economic factors. •

Competitive Analysis

Your CompanyCompetitor 1Competitor 2
Factor 1 – PricingGo ProDJI Osmo ActionSony Action Cam
Factor 2 –intense competitionGo ProSony Action CamDJI Osmo Action
Factor 3 – PerformanceGo ProSony Action CamDJI Osmo Action


REFERENCES

•Campbell, C., Sands, S., Ferraro, C., Tsao, H. Y. J., & Mavrommatis, A. (2020). From data to action: How marketers can leverage AI. Business Horizons, 63(2), 227-243.

•Burton, N., & Schlieman, T. (2021). User response to extended reality sponsorship activations on social media: Exploring impressions of GoPro’s use of 360 video in marketing. Journal of Interactive Advertising, 21(2), 93-107.

•Hambrick, M. E. (2019). Investigating GoPro and Its Diffusion of Innovations. In SAGE Business Cases. SAGE Publications: SAGE Business Cases Originals.

Part 2.1 Communications Strategy Recommendations:                  Overall Message Design

qThe “Big Idea” is a versatile camera with endless possibilities, stabilized features, live streaming, and waterproofing.

qThe company promises gadgets that allow customers to capture life, share experiences, and Celebrate life.

qCustomers should use the company website URL to get information, contact us and view the product of sale.

q The message should include supporting visuals such as photos, the business name, tagline, and company logo.

Part 2.a. Communications Strategy Recommendations:
Message Content

qGoPro cameras support a high frame rate at a high resolution to allow high recording speed.  

qThe camera is waterproof.

qThe product targets buyers at the preference readiness stage.

qThere is a fee attached to replacing a damaged product.

qGoPro camera is durable, portable, and handy. 

Part 2.b. Communications Strategy Recommendations:
Message Structure

qWe intend to convey a one-sided argument about the camera: it is well-built and has high-speed recording abilities.

qTwo appeals will be used.

ü Rational appeal, i.e., feedback from users during the advertisement.

üTestimonial appeal, i.e., testimonials from current users.

Part 2.c.Communications Strategy Recommendations:
Format/executional framework

qVarious execution formats and message formats will be applied, as illustrated below, to capture the targeted market in all aspects of various message formats.

vMessage Format

ü45 seconds advertisement on TV

üSocial media platforms include TikTok and Instagram.

üGo Pro keyword optimization on search engines

vExecution framework

üTestimonials of the efficiency of the Go-Pro camera

üDemonstration of the product quality.

Part 2.D. Communications Recommendations:
The Message Source

qThe message source will be celebrity content creators because they have many followers and can influence their followers, converting them into customers (Fleck et al., 2014). 

qThe person must be credible, trustworthy, consistent, creative, and have a massive following.

qYouTube is a favorable and the company will hire a male voice over actor.

qThe spokesperson should not have been used by Go-Pro competitors.

Part 2.e. Marketing Communications Strategy Recommendations
Media Channels

qUse Go-Pro media accounts, such as the company website and social media account, to deliver messages to a target market or audience.

qUse non-traditional and traditional methods to ensure the effectiveness and clarity of the message. Using non-personal and personal accounts will allow Go-Pro to reach a larger audience.

qUse public relations as a media mix as it offers efficiency and effectiveness in public communication.

Part 2.f. Communications Recommendations:
Budget and AD Development

•I would use the flexible budgeting methodology since it is adaptable to changes based on factors such as revenue. The projected budget is $150 million.

•I would outsource to an advertising agency because it could reduce the cost incurred by the company (Graa & Baraka, 2016).

Part 2. g. Marketing Communications Recommendations
Feedback metrics

qWe will estimate the target audience based on the advertising mechanism and platforms. The estimation will help in calculating the cost of advertisements. The advertisement will have a budget outlining the active sessions and timeline where the advertisements will feature. The feedback metrics will include the number of clicks or individuals that accessed the company website. In addition, the feedback metric will determine the duration of attaining a certain audience within a specified period

References

•Graa, A., & Baraka, H. (2016). Outsourcing marketing activities for a successful small and medium sized enterprises. Maghreb Review on Economics and Management3(01).

•Fleck, N., Michel, G., & Zeitoun, V. (2014). Brand personification through the use of spokespeople: An exploratory study of ordinary employees, CEOs, and celebrities featured in advertising. Psychology & marketing31(1), 84-92.

•Leung, X. Y., Bai, B., & Erdem, M. (2017). Hotel social media marketing: a study on message strategy and its effectiveness. Journal of Hospitality and Tourism Technology.

Part 3.1.a  Promotion Mix Tools
Advertising Objectives

•Refer to chapter 7.4. .

•Need to be stated in measurable terms. For ex, objectives could include what % and how often do you recommend the messages reach the target audiences

•Also need to indicate the timing measurements.

Part 3.1B.Promotion Mix Overview:
Media Channels

The integrated marketing communications perspective stresses careful strategic blending of many media tools to be sure that the message touches the target audience in the same way wherever this interaction takes place.

•Use personal, non-personal media or both

•Use traditional, non-traditional media or blend

•Identify what media your direct competitors use. (Point is not to copy them, but to be aware of what they use and why)

•Identify what media mix to use and why.

Part 3.2. Promotion Mix Tools
Promotion Mix Strategy

•Discuss how you plan to integrate the paid advertising, personal selling, sales promotions, etc. Note: in some products mass advertising tools will be the central focus.  In other products, advertising will be used to support a sales force and trade promotions only.

•Do you plan personal, non-personal or both

•Plan for a push, pull or combination & why

•What is the promotional timing, for ex, fall for gift season, slow seasons to simulate sales, etc.

•You need to demonstrate you understand the advantages and disadvantages of the various recommended media .

Part 3.3A. Digital and Mobile Objectives and Strategies

These media are an increasingly important part of the overall marketing communications program. Need to:

•Identify online, mobile, e-mail marketing, buzz marketing, and the web changes needed, such as: a web landing page, etc.

•Recommend what social media to use, including online product reviews & blogs, refer to chapter 9.

Part 3.3B. Media Strategies & Plan

•Name the specific media vehicles, including social media and other digital tools, such as; Google Search, Facebook, etc.

•Determine audience reach, frequency and other relevant measurements.

•Media timing for the product; such as fall and winter months for cold/flu meds, spring and summer for new car intros. Also remember targeting certain months can save on media budgets.

Part 3.3C. Traditional Media

•Identify Traditional Media Mix for the Campaign

•Determine audience reach, frequency and other relevant measurements.

•Media timing for the product; such as fall and winter months for cold/flu meds, spring and summer for new car intros. Also remember targeting certain months can save on media budgets.

Part 3.3D. Public relations and Alternative Marketing Strategies

•The goal of public relations is to build good relationships and enhance the image of the firm with the advertiser’s publics, namely consumers, stockholders, legislators, and employees. However, since public relations messages are not paid media placements, marketing communicators can’t control their use.

•Recommend what tools you want; such as press releases, media events, publicity or crisis management, etc.

•Refer to chapter 13.

References

•Brady, P. C. (2021). Three-dimensional measurements of animal paths using handheld unconstrained GoPro cameras and VSLAM software. Bioinspiration & Biomimetics16(2), 026022.

•Helmholz, P., Long, J., Munsie, T., & Belton, D. (2016). Accuracy assessment of go pro hero 3 (Black) camera in underwater environment. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences41, 477-483.

•Yoon, H., Elanwar, H., Choi, H., Golparvar‐Fard, M., & Spencer Jr, B. F. (2016). Target‐free approach for vision‐based structural system identification using consumer‐grade cameras. Structural Control and Health Monitoring23(12), 1405-1416.

Exhibits – SWOT

SWOT Analysis:

Strengths: Strong Brand Recognition: We have built a strong brand over the years, known for innovation and reliability in the photography industry (Yoon, 2016).

Weaknesses: High Pricing: Our premium pricing strategy may limit our market reach and accessibility to a broader customer base.

Opportunities: Expanding into New Markets: Exploring new markets, both domestically and internationally, can help us tap into unexplored customer segments and revenue streams.

Exhibits – Competitive Analysis

Competitive Analysis: In addition to our internal strengths and weaknesses, it’s crucial to understand our competitors in the market.

Competitor A: Market Share: Competitor A currently holds a significant market share, making them a formidable player.

Strengths: They excel in product innovation and have a robust distribution network.

Weaknesses: However, they struggle with post-purchase customer support and have had some quality control issues.

Competitor B: Market Share: Competitor B has a smaller market share compared to A but is still a noteworthy competitor.

Strengths: They offer competitive pricing and have a strong online presence.

Weaknesses: Their product range is limited, and they lack a comprehensive ecosystem of accessories.

Exhibits – Creative Brief

•GoPro is more than just a camera; it’s a gateway to inspiring adventure and creativity. Our message is to encourage people to seize life’s moments, embark on thrilling journeys, and express their creativity through our exceptional camera technology.

•Our tone is energetic and adventurous, reflecting the spirit of those who use GoPro cameras. We want to convey a sense of excitement, freedom, and the thrill of capturing life’s extraordinary moments.

•Encourage users to capture moments that are out of the ordinary. From extreme sports to breathtaking landscapes, GoPro is the perfect companion for adventures big and small.

Part 3.5 How to Evaluate Plan

Accountability is increasingly important because why spend the money to advertise if it is not accomplishing your communications  & advertising objectives(refer to chapter 14). How & when do you want the entire plan evaluated:

•Return on Investment (ROI)

•What final measurement metrics to use (coupon redemption, new customers etc.

•Pre & Post evaluation of creative messages, etc.

•Tracking and click-though rates on website

DESIGN PROVOCATIONS TO ENCOURAGE ADOLESCENT SCHOOL CHILDREN TO BE MORE ACTIVE

A SUMMARY OF THE PROJECT

Proposed design provocations shall encourage adolescent to be more active
Project shall link disciplinary focussed theory and skills
The skills and theory shall be linked within an interdisciplinary professional practice
The project shall consider a hypothetical South Australian school context
The project shall delve precisely on indoor and outdoor spaces accessible to adolescent students

BACKGROUND OF THE PROJECT

Both lunchtime and recess play crucial role in a child’s development and growth
These breaks are essential since they allow the adolescents to engage in leisure activities
Various leisure activities tend to rejuvenate physical activity levels among the adolescents
Current recess interventions targeting adolescents are scanty
Developed moveable objects by the project shall encourage adolescents engagement in meaningful activities
Some proposed activities include; obstacle course challenge, dance party, sports station, nature scavenger hunt, and active storytelling.

OBSTACLE COURSE CHALLENGE

An obstacle course challenge offers fun and active way of burning off energy from adolescents
As seen from the picture, the tire challenge is fun and engages the minds of the adolescents
The challenge helps the adolescents in developing problem-solving skills

DANCE PARTY

The majority of adolescents have craving for cool music
Dancing is an essential cardiovascular workout that improves coordination and endurance (Shulklapper, 2013)
Dancing enables the adolescents to be active
The social element of dance party enables the adolescents to interact and mingle within themselves

SPORTS STATION

Sport station offers a variety of physical activities
These activities cater for adolescents’ different interests and skills levels
Soccer and volleyball improve physical fitness among the adolescents
The drills enable the adolescents to develop physical and social skills
Besides, the game improves brain activity thereby enhancing blood flow (Reilly & Gilbourne, 2003).

NATURE SCAVENGER HUNT

This activity combines physical activity with the excitement of exploration
Adolescents will be subjected to searching items on the list
As a way of moving around the school, the adolescents will engage in light running as well as jogging
This activity connects the adolescents with outdoor adventures

ACTIVE STORYTELLING

Storytelling is an art that was well mastered by grandmothers and fathers
Captivating stories will be told to the adolescents
Adolescents will be allowed to perform corresponding movements and exercises within the story plot
The adolescents shall be assigned to different story elements in order to improve their attention (Rogelstad, 2021)

CONCLUSION

These activities foster increased physical activity among adolescents
These activities are useful during school breaks and recess since they help in developing overall well-being.
The project identified five activities —obstacle course challenges, dance parties, sports stations, nature scavenger hunts, and active storytelling
Besides, the activities offer engaging avenues for movement, social interaction, and creativity

CONCLUSION

By making physical activity enjoyable and accessible, we can empower adolescents to embrace healthier habits and positively impact their physical, mental, and emotional development.
Proposed activities are ideal for both long and short recess periods
The activities improve blood flow and keep the adolescents healthy
Besides, the activities enhance social interaction among the adolescents

REFERENCES

Reilly, T. & Gilbourne, D. (2003). Science and football: a review of applied research in the football code. Journal of Sports Sciences. 21 (9): 693–705.
Rogelstad, M. (2021). How Teens Can Use Storytelling to Rule the World (or at least their community!). Retrieved from: https://rusticpathways.com/inside-rustic/online-magazine/how-teens-can-use-storytelling-to-rule-the-world-or-at-least-their-community
Shulklapper, K. (2013). Research investigates the science behind dance. The Chronicle

LITERATURE REVIEW

Table of Contents

1. Abstract 3

2. Introduction. 3

3. Presentation of Data. 4

3.1 Inappropriate Organizational Structure. 4

3.2 Poor coordination/communication. 5

3.3 Lack of Regard for employee rights 6

3.4 Outsourcing within major departments 6

4. Presentation of theories and Models. 7

4.1 SWOT Analysis 7

4.2 Porter’s 5 Forces 7

4.3 McKinsey’s 7s 8

4.4 PEST Model 9

5. Discussion. 10

5.1 PEST Analysis of Outsourcing within major departments. 10

5.2 McKinsey’s 7s on inappropriate organization structure. 11

5.3 Porter’s 5s on Lack of Regard for Employee Rights 11

5.4 SWOT Analysis on Poor Communication/Coordination. 12

References List 13

1. Abstract

            The current literature review presents different organizational issues contributing to Yo! Sushi’s high employee turnover rate. The issues include poor management structure and poor communication/coordination with employees. Further, four key business models are employed in this review, including PEST, McKinsey’s 7s, SWOT Analysis, and Porter’s 5 Forces. Sources of data were employed, gathering data from various online databases. The models and their influence on the operation of the Japanese dining group are criticized.

2. Introduction

            This literature review will examine in-depth the main organizational issues affecting the high rate of employee turnover at Yo! Sushi, including a poor management structure and poor communication/coordination with employees. Further, the review will examine poor response/regard for employee rights and the increase in outsourcing within major departments of the franchise as common labor market challenges. Four key business models are deployed in this review, including PEST, McKinsey’s 7s, SWOT Analysis, and Porter’s 5 Forces. Secondary sources of data were employed, gathering data from online databases. All the selected journals/publications were based on keywords drawn from the main research topic and linked to the various facets of this review. YO! Sushi, a British enterprise founded by Simon Woodroffe, has grown significantly over the years from its first central London outlet to a series of global food chains, including Paris, Sydney, and New York, among other notable cities (Farrer & Wang, 2021). With up to 97 restaurants globally, the restaurant franchise intends to increase its operating minimum through mergers and acquisitions.

3. Presentation of Data

3.1 Inappropriate Organizational Structure

            The main organizational issue leading to the high rate of employee turnover at Yo! Sushi is the existence of a poor hierarchical structure within the organization. Although Yo! Sushi is expected to acquire various new outlets across different parts of the globe, including Canada (Global Database, 2023); the firm still faces a high number of employees who shift to other restaurant chains, partly because of the organization structure, which affects coordination and cooperation. The organizational structure includes a wide range of factors, as pointed out by Hendry et al. (2019), including task allocation and supervision, and is described as the nature in which employees perceive their working environments. For instance, Pomada (2023) reported that staff at various dining restaurants often report an increase in wages from management, which may not be reviewed in most instances. In Britain, for example, the number of British workers has gone down significantly by 0.7%, accounting for 55.1% of the total workforce (Zippia Report, 2023). The number of non-EU staff within the hotel business has also decreased over this period, stemming from a wide range of factors, including a lack of job satisfaction (Slide Team 2023). The rise in turnover rates rises amidst an increase in overall Yo! Sushi revenue to nearly $8.5 Million per month (Zippia Report, 2023). Although the food chain company strives to institute change through improving working conditions, concerns of employees remain unresolved partly due to the tumultuous hierarchy at the organization.

Graph 1: Reasons for the high rate of turnover among employees in the fast-food industry

(Source: Slide Team 2023)

3.2 Poor coordination/communication

            Comparative analysis of the findings showed that poor coordination and cooperation during role-playing affect the operations of dining chains, compromising their operations. Kalogiannidis (2020) defines communication as the movement of information from one individual to the other and is key to building a favorable working environment. The poor organizational structure was reported as a key barrier to effective management of the firm, which also affects the mode of communication (Namugenyi et al., 2019). Employees at Yo! Sushi depends on timely and reliable communication to coordinate tasks. As a result, failure of this coordination results in job dissatisfaction, further explaining the reason for the high rate of turnover. Nearly 40% of the total employees who resigned from their respective roles in the restaurant business reported organizational factors among the top reasons (Global Database, 2023), with a higher number of employees reporting organization-related factors, including communication.

3.3 Lack of Regard for employee rights

            The comparative analysis of the qualitative results showed that the restaurant industry generally shows poor regard for employee rights, especially for workers in lower positions (Asadullah et al., 2021). Cajander and Reiman (2019) argue that in most cases, there is no human resources department for franchises, to which managers are entitled to planning, coordination, and formulation of the framework on which the chain operates. As a result, most hiring practices do not strictly observe the standard employee management practices, thus contributing to the high employee turnover rate.

3.4 Outsourcing within major departments

            Iheriohanma and Austin-Egole (2020) pointed out that one of the key practices today in the restaurant business is outsourcing employees, which affects human resources practices and results in a high turnover. Firms opt to hire employees in only senior departments that take part in critical decision-making, leaving employees in less involved roles for outsourcing (Lahiri et al., 2022). For instance, employees at Yo! Sushi faces the imminent challenge of retrenchment or job loss following the introduction of outsourcing. The qualitative research findings’ assessment suggests that restaurant business employees are likely to seek new opportunities if firms opt for outsourcing, translating into a high employee turnover rate.

4. Presentation of theories and Models

4.1 SWOT Analysis

            The SWOT Analysis is a short connotation of Strengths, weaknesses, opportunities, and threats for organizations. One of the key advantages of this model is that it is suitable for both internal and external issues hence effective and efficient (Puyt et al., 2020). An organization’s strengths are key areas that the firm takes advantage of to reduce competition and improve its market share while improving efficiency. Weaknesses are internal challenges that hamper effective operations, while opportunities are new areas where a firm can improve or re-strategize (Gurl, 2017). Threats are potential issues a company is likely to face that may negatively affect day-to-day activities. However, this model’s main shortcoming is that it is unsuitable for large companies or companies operating in more than one niche (Benzaghta et al., 2021). The main focus of this model is a single industry, which may not be suitable for large firms investing in more than one sector.

4.2 Porter’s 5 Forces

            The Five Forces Model, commonly known as “Porter’s 5s,” identifies and deeply explores five competitive issues that affect firms from different niches. Shela et al. (2023) argue that the Five Forces Model can be applied to understand the market, state of competition, and firm position in a specific domain. The first aspect examines competitors and their potential influence on the market segment. Irfan et al. (2019) state that higher competition empowers firms to take appropriate strategies, including price and product reviews. The second aspect of Porter’s 5s is to determine the likelihood of new entrants in the industry, impeding barriers and their potential effects. The power of suppliers aspect determines the power of supply chain partners and how a company would be affected by changes in supplier prices or perspectives. The power of customers and the threat of substitutes are the model’s last aspects and illustrate how consumer tastes/preferences changes can affect the firm’s operations. The Five Forces Model is still used as an analytical tool, allowing firms to understand their position in the market. The findings of Goyal (2020), however, suggest that the model is only suitable for use in the short term and is often impacted by the looming effects of globalization. Mishra and Tripathi (2020) also reported that Porter’s Five Forces is only suitable for a single-domain company and ineffective in situations where companies are linked with more than one industry.

4.3 McKinsey’s 7s

            McKinsey’s 7s is an analysis tool that examines how various key elements interact to attain effectiveness and efficiency (Njeru & Kariuki, 2019). The seven elements include structure, strategy, skill, system, shared values, style, and staff, as shown in the diagram below. The organization of the company and hierarchy of management is the company structure. Strategy refers to the well-defined business plan/framework on which the company deploys to improve its market share and position in a specific niche. The system is the entire platform, including the business and technical infrastructure on which the company operates. Skills are the abilities of human labor within the firm and allow the company to meet its goals (Al-Tamimi, 2023). Style is the code of conduct on culture within the firm on which employees and management of the firm believe in. The staff involves individuals hired by the firm to make key decisions and take day-to-day activities while sharing values are the defining principles that align all organizational activities. The main advantage of this model is the holistic approach on which it is built, empowering users to track and deploy the analytic tool effectively. However, Michulek and Križanová (2022) pointed out that the model is only suitable in the long term. Further, (Al-Tamimi, 2023) also noted that McKinsey’s 7s relies on a wide range of internal factors and is hectic to deploy for firms facing numerous external issues.

4.4 PEST Model

            The PEST Analysis is an analytical tool that is used to determine external factors affecting the performance of an organization (Buye, 2021). The political environment in which a firm operates includes changes in government and policies. For instance, Brexit, which allowed Britain to exit from their allegiance to the European Union, was a politically influenced decision with significant impacts on various sectors. Economic aspects include the level of consumer spending, the state of the economy, and rates of inflation, among others. Changes in economic state and currency valuation have a significant impact on different sectors (Çitilci & Akbalık, 2020). Other regulations and taxes also influence business operations, either forcing firms out of business or encouraging cutthroat competition. Sociological factors, including consumers’ tastes and cultural preferences, also impact how businesses operate, the nature of operations, and the range of products offered. Demographic changes, such as an increase in the youthful generation or the entry of millennials, can also impact how businesses perform. Technological aspects also influence business operations, with firms opting for recent technology at the forefront of development. Changes in technology, therefore, force firms to review their supply chains and adopt more advanced approaches to ward off competition. Although this analytical tool is robust and efficient, it is unsuitable for analyzing a firm’s internal issues (Tikhonov & Zelentsova, 2021). Further, (Buye, 2021) also argued that this tool is only limited to macro-level analysis and thus unsuitable for exploring firms with internal and external challenges.

5. Discussion

5.1 PEST Analysis of Outsourcing within major departments

            The political atmosphere in various parts of the globe affects business operations, including the United Kingdom. The political aspect of the model allows for a better understanding of the legislature in the United Kingdom and its influence on the decisions of the firm. Brexit, for instance, has created restrictions for foreign workers, making it difficult for the human resources department (Hendry et al., 2019). Yo! Sushi operates in a competitive industry that tries to reduce inefficiencies and thus explains the main reason for outsourcing workers. Immigration policies in the United Kingdom have also posed a huge challenge to the human resources department, creating the need for outsourcing (Caplan, 2020). Therefore, these policies affect employees, which subsequently affects the turnover rates.

            The economic aspects of this framework include the competitive nature of the restaurant industry, which determines labor practices and offerings. For instance, employees in managerial positions are highly sought after, which also contributes to outsourcing employees from other firms (Afum et al., 2021). Other regulations and taxes also affect employee income and thus force restaurants to opt for part-time roles instead of normal employment terms.

            Technological factors contributing to outsourcing employees include the advancement of technology, such as mobile applications, which require the services of transport companies. Deliveries by restaurants are often complicated and cost-ineffective, allowing firms in the restaurant industry to hire transportation companies that are more effective and available on demand (Waris et al., 2022). Digital marketing and other tableside technologies also required outsourcing, fuelling employees’ desire to resign or seek employment elsewhere.

5.2 McKinsey’s 7s on inappropriate organization structure

            The firm’s structure, which includes the overall organization of the chain of command, can be reviewed to improve accountability and employee coordination. The strategy allows Yo! Sushi to build a defined plan to retain employees by enhancing efficiency and flow of information. Systems include aligning the business and technical infrastructure of the restaurant chain to improve workflow and employee coordination. Skills help align employees with different abilities in departments where they are most competitive. The style, which defines the attitudes of senior employees, helps build a code of conduct that current and future employees can emulate. The staff and shared values also play a key role in implementing a proper organizational structure through talent management strategies and aligning key elements within Yo! Sushi.

5.3 Porter’s 5s on Lack of Regard for Employee Rights

            Competition in the restaurant industry on which Yo! Sushi operations force firms to center their efforts on generating revenue with minimal concern for employee rights. The potential entry of new players in the industry also forces firms to invest in employees at top managerial/decision-making levels, with minimal regard to the rights of employees in lower positions. The power of suppliers, which drives the cost of production, also affects profitability and revenue scales, contributing to the mass layoff of employees or retrenchments. The power of customers also affects the level of company income and determines key decisions, including employment and the layoff of workers. Threats of substitutes in the industry also affect operations. Reduction of profit levels within Yo! Sushi, for instance, may translate to a reduction of employees within a specific department to meet the new threshold for efficiency.

5.4 SWOT Analysis on Poor Communication/Coordination

            The strengths of Yo! Sushi includes its reputation as one of the leading dining groups with acquisitions and mergers across various parts of the globe. The firm has an increasing revenue scale, which can be implemented in addressing challenges, including improving coordination. The main weakness of the firm is the organizational structure which hampers the effective flow of communication. With an increasing revenue and wide market share, the dining group can implement sustainable human resources practices. However, the competitive nature of this domain poses a threat to successful operations, including employee turnover, which further affects coordination, especially among senior and experienced staff.

References List

Afum, E., Agyabeng-Mensah, Y., Acquah, I.S.K., Baah, C., Dacosta, E., Owusu, C.S. and Amponsah Owusu, J., 2021. Examining the links between logistics outsourcing, company competitiveness, and selected performances: the evidence from an emerging country. The International Journal of Logistics Management32(3), pp.1068-1090.

Al-Tamimi, S.A., 2023. Mckinsey Model and Management Accounting Systems Requirements to Measure and Analyze Performance in Sample of Emerging Companies. International Journal of Professional Business Review: Int. J. Prof. Bus. Rev.8(4), p.21.

Asadullah, M.A., Haq, M.Z.U., Wahba, K., Hashmi, S., Kim, H.M. and Hwang, J., 2021. Gender differences and employee performance: Evidence from the restaurant industry. Journal of Hospitality and Tourism Management48, pp.248-255.

Benzaghta, M.A., Elwalda, A., Mousa, M.M., Erkan, I. and Rahman, M., 2021. SWOT analysis applications: An integrative literature review. Journal of Global Business Insights6(1), pp.55-73.

Buye, R., 2021. Critical examination of the PESTEL Analysis Model. Project: Action Research for Development.

Cajander, N. and Reiman, A., 2019. High-performance work practices and well-being at restaurant work. European Journal of Tourism, Hospitality and Recreation9(1), pp.38-48.

Caplan, P., 2020. Struggling for food in a time of crisis: Responsibility and paradox. Anthropology Today36(3), pp.8-10.

Çitilci, T. and Akbalık, M., 2020. The importance of PESTEL analysis for the environmental scanning process. In Handbook of Research on Decision-Making Techniques in Financial Marketing (pp. 336-357). IGI Global.

Dźwigoł, H., 2017. Organizational structure within the process of organization management. Adres redakcji 00-099 Warszawa, ul. Canaletta 4, p. 301 tel. (22) 827 80 01, w. 314 faks (22) 827 55 67 e-mail: mir@ pwe. Com. Pl, (7), p.172.

Farrer, J. and Wang, C., 2021. Who owns a cuisine? The grassroots politics of Japanese food in Europe. Asian Anthropology20(1), pp.12-29.

Global Report, 2023. Hospitality Industry Reports

Goyal, A., 2020. A Critical Analysis of Porter’s 5 Forces model of competitive advantage. Goyal, A. (2021). A Critical Analysis of Porter’s5.

Gurl, E., 2017. SWOT analysis: a theoretical review.

Hendry, L.C., Stevenson, M., MacBryde, J., Ball, P., Sayed, M. and Liu, L., 2019. Local food supply chain resilience to constitutional change: the Brexit effect. International Journal of Operations & Production Management39(3), pp.429-453.

Irfan, M., Zhao, Z.Y., Ahmad, M., Batool, K., Jan, A. and Mukeshimana, M.C., 2019. Competitive assessment of Indian wind power industry: A five forces model. Journal of Renewable and Sustainable Energy11(6), p.063301.

Iheriohanma, E.B.J. and Austin-Egole, I.S., 2020. Outsourcing and employment trends: An exploratory discourse. Issues in Business Management and Economics.

Kalogiannidis, S., 2020. Impact of effective business communication on employee performance. European Journal of Business and Management Research5(6).

Lahiri, S., Karna, A., Kalubandi, S.C. and Edacherian, S., 2022. Performance implications of outsourcing: A meta-analysis. Journal of Business Research139, pp.1303-1316.

Mishra, S. and Tripathi, A.R., 2020. Literature review on business prototypes for digital platforms. Journal of Innovation and Entrepreneurship9, pp.1-19.

Michulek, J. and Križanová, A., 2022. Analysis of internal marketing communication tools of a selected company in Industry 4.0 using McKinsey 7S analysis. Management dynamics in the knowledge economy10(2), pp.154-166.

Namugenyi, C., Nimmagadda, S.L. and Reiners, T., 2019. Design of a SWOT analysis model and its evaluation in diverse digital business ecosystem contexts. Procedia Computer Science159, pp.1145-1154.

Njeru, K.N. and Kariuki, P., 2019. Influence of McKinsey framework on the competitive advantage of firms in the telecommunication industry in Kenya. Journal of International Business, Innovation, and Strategic Management3(1), pp.68-81.

Puyt, R., Lie, F.B., De Graaf, F.J. and Wilderom, C.P., 2020. Origins of SWOT analysis. In Academy of management proceedings (Vol. 2020, No. 1, p. 17416). Briarcliff Manor, NY 10510: Academy of Management.

Shela, V., Ramayah, T. and Noor Hazlina, A., 2023. Human capital and organizational resilience in the context of manufacturing: a systematic literature review. Journal of Intellectual Capital24(2), pp.535-559.

Slide Team, 2023. Employee turnover chart with multiple reports. https://www.slideteam.net/employee-turnover-report-with-multiple-charts.html

Tikhonov, A. and Zelentsova, L., 2021. Analysis of External and Internal Factors of Business Competitiveness. Quality-Access to Success22(182).

Waris, I., Ali, R., Nayyar, A., Baz, M., Liu, R. and Hameed, I., 2022. An empirical evaluation of customers’ adoption of drone food delivery services: An extended technology acceptance model. Sustainability14(5), p.2922.

Zippia Report, 2023. Employee reports on the state of the Hospitality industry.

MS Project and Word Assignment Part 1 and 2

MS Project and Word Assignment Part 1 and 2

Student’s Name

Institution

Course

Instructor

Due Date

Cell Tower Project

Overview

Future Technologies Limited has been given the opportunity to build a cell phone tower in the city of Capital Heights, Maryland. The awarding of the contract was due to the ongoing phases of commercial and residential  construction in the city. The goal of the cell tower will be to increase network coverage in the newly developed areas, hence eliminating call disruptions for newly established businesses, homes, and any other users in the vicinity.

The cell phone tower will be built in Capital Heights, Maryland, on a portion of the significantly elevated property. The construction of a cell tower that is capable of operating at a high level of efficiency is the goal of the project that Future Technologies are undertaking. The tower will cooperate with the other existing towers to improve the tenants’ overall network connection.

Scope

The scope of the cell tower construction project entails a wide range of tasks, such as site selection, planning, building, and testing. Locating and purchasing an appropriate site for the tower, clearing the area, building a secure storage facility, reinforcing the ground, setting up a power supply center, laying a solid concrete base, erecting a latticed tripod tower, installing antennae, cables, and power, lighting the top of the antennae, and setting up a distribution box are all necessary steps in this undertaking. After construction, the tower will be put through a battery of tests to confirm its readiness.

On the other hand, certain project components to install cell towers are out of the scope of work. These include installing solar panels as extra power sources, adding more dishes to the tower, and modifying the cell tower’s outward look. These pursuits are not a part of the project’s goals, and they go beyond what was originally envisioned for the project’s scope.

Specifications

Microwave systems, towers mounted to buildings, guyed towers, self-supporting towers, and poles, and towers mounted to power poles are all included in the components. The cell tower building is scheduled to be conducted on land that has been zoned for commercial use. The antennas will employ a frequency range varying from 700 to 800 MHZ, and the tower it is mounted on will be between 100 and 200 feet tall. The cell tower should have the capacity to provide service to a number of up to two hundred thousand people.

Construction Materials

  • Sand
  • Concrete
  • Plastic
  • Steel
  • Gravel
  • Wood
  • Aluminum

Stakeholders

  • Landowner
  • Engineers
  • Finance Analyst
  • Workers and Maintenance crew
  • Land surveyor
  • Sub-contactors
  • Capital Heights city
  • Project manager
  • Future Technologies Company

Work Breakdown Structure

Network Diagram

Resource Requirements

Work Packagepeoplematerialsequipmentfacilitiesservices
1.1.1X    
1.1.2X   X
1.1.3    X
1.1.4    X
1.2.1X    
1.2.2X X  
1.2.3X    
1.2.4X    
1.2.5X    
1.2.6X X  
1.3.1X    
1.3.2X XX 
1.3.3X X  
1.3.4X X  
1.3.5X X  
1.3.6XXX  
1.3.7XXX  
1.3.8XXX  
1.3.9XXX  
1.4.1X X  
1.4.2X X X
1.4.3XXX  
1.4.4XXX  
1.4..5X X  
1.5.1X    
1.5.2X X  

Cost

Schedule

Risk Management

RiskRisk Response StrategyRisk Response Action
Harsh weather conditionAcceptHave gum boots or postpone work
Absent staffAvoid 
Equipment malfunctionMitigateTest equipment or use backup
Equipment lossAvoidTight security
Power lossMitigateEnsure backup power
Backup power lossAvoidWait for the power to be back
Behind scheduleAvoidStick to plan
Money issuesAvoidMake allowances in budget
Lack of permitAvoidEnsure the availability of permits
Uncooperative workersMitigateDisciplinary actions

Reference

Kerzner, H. (2017). Project management: A systems approach to planning, scheduling, and controlling.

Literature Review for Order 

Acceptance of Deep Learning Models by Cyber security Managers in Detecting Fake Digital Identifies: A Case Study of Detection of Fake News on Social Media Platforms

Student’s First Name, Middle Initial(s), Last Name

Institutional Affiliation

Course Number and Name

Instructor’s Name and Title

Assignment Due Date

Acceptance of Deep Learning Models by Cybersecurity Managers in Detecting Fake Digital Identifies: A Case Study of Detection of Fake News on Social Media Platforms

Introduction

The literature review provided a review of past studies on the use of deep learning models and approaches in the detection of fake digital identities. The key focus will be using the case study of detection of fake news on social media platforms while determining the acceptance of deep learning models by cybersecurity managers.  The chapter will also discuss the interrelationship between the study variables in the conceptual framework.

Deep Learning Approach

Deep learning is a subset of machine learning that uses artificial neural networks with many layers to learn from data. It is inspired by the way the human brain works, where information is processed through layers of interconnected neurons. The deep learning approach involves training a neural network using a large amount of data to make accurate predictions or classifications. The neural network is designed to learn from the data by adjusting the weights and biases of the network’s neurons. The goal is to minimize the error between the predicted output and the actual output, which is achieved through a process called backpropagation. Deep learning is particularly well-suited to handling large and complex datasets, such as images, videos, and natural language, where traditional machine learning algorithms may struggle to extract meaningful patterns. It has been successfully applied in a wide range of domains, including computer vision, natural language processing, speech recognition, and robotics. Overall, the deep learning approach has revolutionized the field of artificial intelligence, enabling breakthroughs in many areas and paving the way for new and exciting applications in the future.

Deep Learning Approaches Implemented In Cybersecurity

  • Intrusion detection

Intrusion detection is the process of identifying malicious activity on a computer network or system (Berman et al., 2019). Deep learning has shown promising results in intrusion detection as it can learn to detect complex patterns and anomalies in network traffic data. One approach to intrusion detection using deep learning is to train a neural network to classify network traffic as either normal or malicious. This can be done by feeding the network labeled data, where the labels indicate whether each network flow is normal or malicious. The network can then learn to identify patterns and features in the network traffic that are associated with malicious activity. Another approach is to use autoencoders to detect anomalies in network traffic. An autoencoder is trained to learn a compressed representation of the normal network traffic, and then any new traffic that does not match this representation is flagged as an anomaly (Berman et al., 2019). This approach does not require labeled data, making it useful in situations where labeled data is scarce or expensive. Deep learning techniques such as convolutional neural networks (CNNs) and recurrent neural networks (RNNs) have also been used for intrusion detection. CNNs can be used to detect patterns in network packet payloads, while RNNs can be used to analyze network traffic over time and detect temporal patterns.

  • Deep autoencoders

Deep autoencoders are neural networks designed for unsupervised learning that can learn to represent high-dimensional data in a compressed, low-dimensional space. An autoencoder consists of two parts: an encoder and a decoder (Zhou & Paffenroth, 2017). The encoder maps the input data to a lower-dimensional latent representation, and the decoder maps the latent representation back to the original input data. A deep autoencoder is a type of autoencoder that has multiple hidden layers in both the encoder and decoder. The additional layers allow the autoencoder to capture more complex and abstract features of the input data. Deep autoencoders are often used for tasks such as dimensionality reduction, feature extraction, and data compression. Training a deep autoencoder typically involves minimizing the reconstruction error between the original input data and the reconstructed output data. This can be done using a variety of optimization techniques, such as stochastic gradient descent, and different loss functions, such as mean squared error (Krizhevsky & Hinton, 2011). Deep autoencoders have been used in a variety of applications, including image and speech recognition, anomaly detection, and natural language processing. They are particularly useful in situations where labeled training data is scarce or expensive, as they can learn to represent the underlying structure of the data without explicit supervision.

  • Restricted Boltzmann machines

 Restricted Boltzmann machines (RBMs) are a type of artificial neural network that belong to the family of unsupervised learning algorithms. They are composed of two layers of nodes, visible and hidden, where the nodes in each layer are fully connected to each other but there are no connections between nodes within the same layer (Fischer, A., & Igel, 2012). The main goal of an RBM is to learn a probability distribution over the input data. This is achieved by adjusting the weights of the connections between the visible and hidden layers through a process called training. During training, the RBM learns to reconstruct the input data from the hidden layer activations and vice versa. RBMs are particularly useful in the context of dimensionality reduction, feature learning, and generative modeling. They have been successfully applied in a wide range of domains, such as image recognition, natural language processing, and recommendation systems.

  • Recurrent neural networks

Recurrent Neural Networks (RNNs) are a class of neural networks designed to work with sequential data such as time series or text. Unlike feedforward neural networks, RNNs have feedback connections that allow information to persist over time, allowing them to capture temporal dependencies in data (Grossberg, 2013). At each time step, an RNN takes an input vector and its hidden state vector from the previous time step as inputs, and produces an output vector and a new hidden state vector as outputs. The hidden state vector acts as a kind of memory that stores information about previous inputs, and is updated at each time step. One of the key advantages of RNNs is their ability to handle variable-length inputs, as the network can process each input sequentially, one at a time. This makes RNNs well-suited for tasks such as language modeling, speech recognition, and machine translation.

  • Generative adversarial networks

Generative adversarial networks (GANs) are a type of machine learning model that are used for generating new data samples that are similar to a given dataset. GANs consist of two neural networks: a generator network and a discriminator network (Creswell et al., 2018). The generator network takes in a random noise vector as input and generates a new sample that is intended to be similar to the training data. The discriminator network takes in both real training samples and generated samples from the generator network as input, and its goal is to distinguish between the real and generated samples. The two networks are trained in an adversarial fashion, with the generator network trying to produce samples that can fool the discriminator network, and the discriminator network trying to correctly identify the real samples (Wang et al., 2017). Through this process of back-and-forth training, the generator network learns to produce samples that are increasingly similar to the training data, while the discriminator network learns to correctly distinguish between the real and generated samples. Once the GAN has been trained, the generator network can be used to generate new samples that are similar to the original training data.

Using Deep Learning Models In Detection of Fake News on Social Media Platforms

The detection of fake news on social media platforms is a challenging problem that has attracted significant attention in recent years. Deep learning models can be used to address this problem by automatically analyzing large amounts of textual data to identify patterns and characteristics that are indicative of fake news (Tashtoush et al., 2022). One approach to using deep learning models for fake news detection is to train a neural network on a large dataset of labeled news articles, where the labels indicate whether the news is real or fake. The neural network can then be used to predict the label of new articles by analyzing their content and identifying patterns that are consistent with fake news. Several techniques can be used to preprocess the textual data before feeding it into the neural network, such as word embedding and natural language processing techniques. Additionally, various architectures of neural networks can be used, including convolutional neural networks (CNNs) and recurrent neural networks (RNNs), which have been shown to be effective in processing sequential data (Aldhyani & Alkahtani, 2023). Another approach to using deep learning models for fake news detection is to combine them with other techniques, such as network analysis and fact-checking. For example, the spread of fake news on social media can be tracked and analyzed using network analysis techniques, and fact-checking can be used to verify the accuracy of the news. Overall, using deep learning models in the detection of fake news on social media platforms is a promising area of research that has the potential to help mitigate the negative effects of fake news and promote the spread of accurate information.

Theoretical Framework

The theoretical framework that will be applied for this research study is the unified theory of acceptance and use of technology-3 (UTAUT-3) model. The UTAUT-3 model will be applied in the research study because its description agrees with the research objective. The UTAUT-3 model was developed by Farooq et al. (2017) as the UTAUT-2 framework extension and comprises eight technology acceptance determinants that include performance expectancy (PE), social behaviour (SB), effort expectancy (EE), facilitating conditions (FC), habit (HB), price value (PV), personal innovativeness in IT (PI), and hedonic motivation (HM). The UTAUT-3 model authors claim that it has technology adoption prediction potency of 66 per cent in terms of explanation. In addition to the eight constructs, the model has four moderators of the constructs that include age, gender, experience, and voluntariness. The UTAUT-3 model will be preferred in this research study since it will adequately respond to the research questions (Farooq et al., 2017).

The model predicts adequately the incidence of technology acceptance and adoption. Thus, the UTAUT-3 model is useful for researchers to evaluate the possibility of technology adoption depending on how the model variables correlate. Data collection will be done using those constructs in connection with the variables digital driver’s license verification devices, and acceptance and adoption of the technology. The UTAUT-3 variables data will be analyzed using some analysis tools to determine various factors like the influence of a variable on the cybersecurity issues pertaining to use of DDL verification technology. It is important to note that only four of the main UTAUT-3 model constructs will be applied in the research study, and they include performance expectancy, facilitating conditions, social influence, and price value. Through applying the theoretical model in a new social and technological context, the study will contribute in the field of information technology acceptance (Farooq et al., 2017).

The performance expectancy (PE) variable will be instrumental in this study since it is defined as the user conviction of the target technology to improve the operations to obtain gains in terms of business success (Venkatesh et al., 2012). In this study, PE implies that IT managers’ belief that acceptance and adoption of DDL verification devices will enhance security of the organization’s clients and the staff. Thus, it will be used to ascertain the level of effectiveness to ensure that the cyber space is free from any insecurity concerns. Therefore, the PE variable will be used to test the hypotheses H01 and Ha1.

The facilitating Conditions (FC) variable refers to the belief by the user that the availability of infrastructure and institutional support assists targeted technology use (Venkatesh et al., 2012). Typically, infrastructure and technical support that help in usage of a technology system are classified under the facilitating conditions. The Facilitating Conditions affect both the actual usage and the user intention (Venkatesh et al., 2012). Therefore, the variable will be used to test the hypotheses H03 and Ha3: Facilitating Conditions influence the IT managers’ acceptance of DDL verification devices and FCs influence the adoption of the DDL verification devices by the IT managers in their organizations.

The social influence refers to the extent which a person believes that the immediate society expects him to adopt some technology (Venkatesh et al., 2012). In the context of this research study, social influence implies the external pressure that affects the acceptance and adoption of DDL verification devices by IT managers in organizations. Therefore, this study will test the hypothesis stating that social influence affects the behavior intention of IT managers to accept and adopt the DDL verification devices in organizations.

The Price Value (PV) variable refers to the consumers’ context whereby an individual weighs the perceived benefits against the amount spent to obtain an item. The study will test the IT managers’ perception about the cost of investing in the DDL verification technology. Therefore, the study will test the hypotheses H02 and Ha2: PV influences the acceptance of technology, and PV influence on the adoption of DDL verification devices by IT managers of organizations.

Conclusion

References

Aldhyani, T. H., & Alkahtani, H. (2023). Cyber Security for Detecting Distributed Denial of Service Attacks in Agriculture 4.0: Deep Learning Model. Mathematics11(1), 233.

Aldhyani, T. H., & Alkahtani, H. (2023). Cyber security for detecting distributed denial of service attacks in agriculture 4.0: Deep learning model. Mathematics11(1), 233. https://doi.org/10.3390/math11010233

Berman, D. S., Buczak, A. L., Chavis, J. S., & Corbett, C. L. (2019). A survey of deep learning methods for cyber security. Information10(4), 122.

Creswell, A., White, T., Dumoulin, V., Arulkumaran, K., Sengupta, B., & Bharath, A. A. (2018). Generative adversarial networks: An overview. IEEE signal processing magazine35(1), 53-65.

Farooq, M. S., Salam, M., Jaafar, N., Fayolle, A., Ayupp, K., Radović-Marković, M., & Sajid, A. (2017). Acceptance and use of lecture capture system (LCS) in executive business studies : extending UTAUT2. Le Centre Pour La Communication Scientifique Directe – HAL – MemSIC.

Fischer, A., & Igel, C. (2012). An introduction to restricted Boltzmann machines. In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications: 17th Iberoamerican Congress, CIARP 2012, Buenos Aires, Argentina, September 3-6, 2012. Proceedings 17 (pp. 14-36). Springer Berlin Heidelberg.

Grossberg, S. (2013). Recurrent neural networks. Scholarpedia8(2), 1888.

Krizhevsky, A., & Hinton, G. E. (2011, April). Using very deep autoencoders for content-based image retrieval. In ESANN (Vol. 1, p. 2).

Tashtoush, Y., Alrababah, B., Darwish, O., Maabreh, M., & Alsaedi, N. (2022). A deep learning framework for detection of COVID-19 fake news on social media platforms. Data7(5), 65.

Venkatesh, V., Thong, J. Y., & Xu, X. (2012). Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS quarterly, 157-178.

Wang, K., Gou, C., Duan, Y., Lin, Y., Zheng, X., & Wang, F. Y. (2017). Generative adversarial networks: introduction and outlook. IEEE/CAA Journal of Automatica Sinica4(4), 588-598.

Zhou, C., & Paffenroth, R. C. (2017, August). Anomaly detection with robust deep autoencoders. In Proceedings of the 23rd ACM SIGKDD international conference on knowledge discovery and data mining (pp. 665-674).

Acceptance of Deep Learning Models by Cyber security Managers in Detecting Fake Digital Identifies

Student’s First Name, Middle Initial(s), Last Name

Institutional Affiliation

Course Number and Name

Instructor’s Name and Title

Assignment Due Date

Acceptance of Deep Learning Models by Cybersecurity Managers in Detecting Fake Digital Identifies

  • Introduction
  • Deep learning approach
  • Deep learning approaches implemented in cybersecurity
    • Intrusion detection
    • Deep autoencoders
    • Restricted Boltzmann machines
    • Recurrent neural networks
    • Generative adversarial networks
    • Malware detection
    • Phishing/ spam detection
    • Website defacement detection
  • Theoretical framework
  • Conclusion

Examples of References to be used

Aldhyani, T. H., & Alkahtani, H. (2023). Cyber security for detecting distributed denial of service attacks in agriculture 4.0: Deep learning model. Mathematics11(1), 233. https://doi.org/10.3390/math11010233

Berman, D., Buczak, A., Chavis, J., & Corbett, C. (2019). A survey of deep learning methods for cyber security. Information10(4), 122. https://doi.org/10.3390/info10040122

Li, G., Sharma, P., Pan, L., Rajasegarar, S., Karmakar, C., & Patterson, N. (2021). undefined. Journal of Computer Security29(5), 447-471. https://doi.org/10.3233/jcs-200095

Rodriguez, E., Otero, B., Gutierrez, N., & Canal, R. (2021). A survey of deep learning techniques for cybersecurity in mobile networks. IEEE Communications Surveys & Tutorials23(3), 1920-1955. https://doi.org/10.1109/comst.2021.3086296

Tariq, M. I., Memon, N. A., Ahmed, S., Tayyaba, S., Mushtaq, M. T., Mian, N. A., Imran, M., & Ashraf, M. W. (2020). A review of deep learning security and privacy defensive techniques. Mobile Information Systems2020, 1-18. https://doi.org/10.1155/2020/6535834

Ivermectin and Hydroxychloroquine the two medications are safer and effective compared to the vaccine especially for the elderly/Geriatric in home care.

Ivermectin and Hydroxychloroquine the two medications are safer and effective compared to the vaccine especially for the elderly/Geriatric in home care.

Older people are more susceptible to COVID-19’s acute illness and mortality. People above the age of constituted 80% of COVID-19 fatalities in the US, according to statistics from the Centers for Disease Control and Prevention (CDC). Various drugs have been investigated on their ability to manage the adverse effects of the virus. The United States encountered difficulties treating this disease, much like other nations worldwide. For the therapy of mild to severe occurrences of COVID-19 illness, antiviral medications and existing drugs like Hydroxychloroquine, Chloroquine, and, most recently, Ivermectin has been used.

II. Background

History

COVID-19, a novel coronavirus variant, was discovered in Wuhan, China in December 2019 and caused pneumonia in patients. The disease was very contagious and quickly spread across nations. The WHO officially declared it an epidemic in February 2020. Patients with the most severe complaints have mostly been found to be older than 50 and to have comorbid conditions.

Where the problem exists

There is currently no effective treatment option. Antimalarial medications (chloroquine and hydroxychloroquine) have shown antiviral action and accelerated viral clearance, according to in vitro experiments and observational data. The situation creates the need for clinical trials to discover successful therapy alternatives considering that there is currently no accepted standard of care.

III. Quantitative Findings

Article 1

Choudhary et al. (2020) came up with a comprehensive report that combined the knowledge of ivermectin and hydroxychloroquine amongst other drugs altogether in the context of the covid-19 emergency. They evaluate the effectiveness of ivermectin and hydroxychloroquine drugs in the management of COVID-19 and found that the drugs had a potential antiviral response against the coronaviruses.

Article 2

Rajter et al. (2020) sought to determine the link between the use of ivermectin and mortality in hospitalized covid-19 patients. It was determined that Ivermectin treatment resulted in lower mortality during treatment of COVID-19.

Golden nugget

The findings in both researches support the recommendation that nurses may use ivermectin and hydroxychloroquine as a routine treatment of COVID-19.

IV. Qualitative Findings

Article 1

In the observational research by Kerr et al. (2022), it was fond that regular use of ivermectin as a prophylactic agent significantly lowered the rate of COVID-19 infection, hospitalization, and mortality

Article 2

Membrillo et al. (2020) conducted an observational study of 166 patients hospitalized with COVID-19 and determined that hydroxychloroquine treatment improved patient survival upon admission during the stages of the disease.

Golden nugget

There exists a strong link around the effectiveness of ivermectin and hydroxychloroquine in the management of Covid-19.

V. Application to Nursing Practice

This study aims to provide information to guide referral hospitals’ treatment of COVID-19 patients. In this regard, nurses may be able to provide precise messages to elderly/Geriatric in home care regarding the use of these medications to facilitate decision making. Although there are not enough patients to draw definitive conclusions, the studies’ outcomes strongly indicate that both medications work. However, further research is needed to ensure ongoing contributions to meta-analyses that could result in more conclusive findings.

VI. Conclusion

The evidence supporting hydroxychloroquine or chloroquine in treating COVID-19 is remains small. However, a conclusion can be reached that there is proof regarding the advantages of using hydroxychloroquine or chloroquine in treating COVID-19. In turn, it is worth recommending the use of Ivermectin and Hydroxychloroquine, particularly for the aged and geriatric patients receiving home care. It is also important that the use of Ivermectin and hydroxychloroquine for COVID-19 prevention continues to receive further precise evaluations.

References

Choudhary, R., Sharma, A. K., & Choudhary, R. (2020). Potential use of hydroxychloroquine, ivermectin and azithromycin drugs in fighting COVID-19: trends, scope and relevance. New Microbes and New Infections, 35, 100684. https://doi.org/10.1016/j.nmni.2020.100684

Kerr, L., Cadegiani, F. A., Baldi, F., Lobo, R. B., Assagra, W. L. O., Proença, F. C., Kory, P., Hibberd, J. A., & Chamie-Quintero, J. J. (2022). Ivermectin Prophylaxis Used for COVID-19: A Citywide, Prospective, Observational Study of 223,128 Subjects Using Propensity Score Matching. Cureus, 14(1). https://doi.org/10.7759/cureus.21272

Membrillo, F. J., Ramírez-Olivencia, G., Estébanez, M., Dios, B. de, Herrero, M. D., Mata, T., Borobia, A. M., Gutiérrez, C., Simón, M., Ochoa, A., Martínez, Y., Aguirre, A., Alcántara, F. de A., Fernández-González, P., López, E., Valle, P., Campos, S., Navarro, M., & Ballester, L. E. (2020). Early Hydroxychloroquine Is Associated with an Increase of Survival in COVID-19 Patients: An Observational Study. Www.preprints.org. https://doi.org/10.20944/preprints202005.0057.v2

Rajter, J. C., Sherman, M. S., Fatteh, N., Vogel, F., Sacks, J., & Rajter, J.-J. (2020). Use of Ivermectin is Associated with Lower Mortality in Hospitalized Patients with COVID-19 (ICON study). Chest, 159(1). https://doi.org/10.1016/j.chest.2020.10.009

The System by Robert B. Reich

The System by Robert B. Reich

In the book, “The System,” Robert Reich discloses how power and wealth have led to the development of an elite oligarchy, integrated to undermine democracy, and eviscerate the middle class. In his argument, top individuals use phrases like “corporate social responsibility,” “national competitiveness,” “the free market,” “meritocracy,” and the political “center” to divert society’s attention away from taking over the system (Reich, 2020). Consequently, the top group uses these myths to defend their accumulation of additional power and wealth. Reich further reveals that power is wielded through deceit, invites people to salvage it, and further recreates the system for everyone. He further elaborates on how the American administration has been apprehended by powerful and wealthy forces and suggests what the Americans must do to save things (Reich, 2020). Therefore, in this paper I will critically analyses the impact of power and wealth including disparity in education, healthcare, income, criminal justice system, and political-economic systems as demonstrated by Reich and further explores appropriate mechanisms that can be employed to resolve the prevailing condition within the society.

Inequality in the Justice System

Reich (2020) argues that power and wealth influence inequality in the criminal justice system in the current society. Although the perceived effect is associated with historic ethnic profiling and a legal moral dilemma, I think it is mainly influenced by power. The process typically begins with police recruitment and retention, resource disparities between the public defender, and societal perception, which I think aligns with our society today, where the rich and wealthy people buy criminal justice system. An overwhelming number of studies have indicated that most Americans are unfairly treated at various levels of the justice system, ranging from legislation, policing, and sentencing. According to Reich (2020), the super-rich and powerful frequently rig their way out of prison despite their criminal offenses without serving their sentence. On the contrary, I feel that the socially deprived population, the poor, complete their incarceration term.

Reference

Reich, R. B. (2020). The system: Who rigged it, how we fix it. Vintage.

Hypothesis and Conceptual Framework

Hypothesis and Conceptual Framework

Student’s Name:

Institutional Affiliation:

 

 

 

Brief explanation

Theory in TI

Hypothesis

 

Culture

It is a set of beliefs and values or a collection of learned behavior that people in a particular society share with others, giving them a sense of identity and belongingness (Harrison & Skrebneva, 2020). Collins and Callaghan (2022) described a culture from a practical online interaction perspective as a complex construct capturing group/societal values, behavioral patterns, and communication styles. Culture considerably impacts online learning environments’ use, design, and intention. For example, it is probable that there is a preference for online learning in societies where gender segregation is strictly imposed on people. Most of Omani colleges and universities do not enforce gender segregation, however, students still have a tendency to separate themselves. Thus, it is important to study how these students feel about Online learning, and whether or not they prefer it over conventual learning settings. The preference for online learning based on cultural reasons can probably affect the performance of students in online assessments, providing an insight about Online Proctoring and to what extent it is achieving academic integrity.

·         Social construction of technology (SCOT)   

 

·         The theory underpinning the construct of religion is the secularization theory (Stolz & Tanner, 2019). This theory holds that increasing educational status/levels, alongside the proliferation of technology, results in a more cynical attitude and undermining of religious practices and belief systems.

 

 

The aim of this study is to determine whether online proctoring can be used to improve the quality of assessments in an Omani educational institute in order to ensure that the examiners are able to capture the actual performance and potential of the students.

To achieve the research purpose, this study formulates the following hypothesis:

H1: Perceived improved performance will lead to effective adoption of OP in the corporate context. H2: User acceptance will contribute positively to the adoption of OP in the corporate context.

 

 

Educational background

The proposition of using online proctoring is profoundly entrenched in a challenging and authoritarian/controlling educational background. For decades, the educational technology field has strived to subvert that phenomenon.

With the development of technology enabling escalated online contexts interactions, distance education premises have been reconsidered that enhance learners’ self-direction and independence (Andrade, 2018). The level of education, and country where academic degrees were granted, might determine how seriously students take online assessments. 

 

 

 

 

Distance Learning Theory and DeLone and McLean Model

 

 

 

Computer literacy

Computer literacy could be described as one’s ability to create, integrate, understand, manage, assess and create information aptly and safely through digital technologies. Computer literacy skills are essential when scholars want to perform in the online examination. According to AlSheikhTheeb et al. (2022), learners should possess such skills for online examinations to evaluate or assess the concrete knowledge of the primary content that learners are to be tested. However, computer literacy is unevenly distributed across various disadvantage indicators, like educational background, income level, residential area (rural versus urban), or disability. Therefore, a learner’s previous exposure to IT enhances his competence and ability to perform better in online exams than others.

 

Transactional Distance Theory

It holds that the essential ability and learners’ competence interact with technology impedes or facilitates other interactions, influencing their learning profoundly (Abuhassna et al., 2020).

 

 

Language

Oman’s populations use classic Arabic as their first language and English as their second language. Nevertheless, most courses in Oman region are taught in English. Several researchers have studied the viability of online teaching in the context of English language learners and the evaluation of instructors’ and learners’ perspectives with online examinations (Alyahya & Almutairi, 2019). The study revealed the pleasantness and acceptability of faculty members and students with online assessments where the participants applied the English language. English is the primary language of instruction in Oman, particularly in higher education, yet most students are not fluent in English. When taking into account the level of their fluency while studying the effect of Online Proctoring, different conclusions could be reached regarding OP.

The constructivist learning theory best applies to online learning. It holds that learners encode and interpret information based on their experiences and individual perceptions. Contrary to the teacher-centred theory, constructivism comprises teacher guidance and learner interaction (Andrade, 2018). 

 

 

 The Conceptual FrameworkThe proposed online examination model comprises of two modules: online examination system enablers and the authentication and continuous monitoring.Authentication and continuous monitoring moduleThis element enrolls, authorizes and monitors the students continuously taking their exams for real time inspection and support of fraudulent activities.Student enrolment and standardizationThe study proposes the adoption of multimodal biometrics for authorizing the users Face recognition and fingerprints are used for authorization.Figure 1: Exam registrationStudent authenticationStudents login through password and username. Then audio, video, and bandwidth tests follows. Students then download, install and open an application that gives remote access to their desktop, audio and webcam. Authentication can be done through webcam at this point. Remote proctor then confirms the presented ID details against registered exam details. Student further confirm deals via facial recognition and fingerprint system. Figure 2: Exam authentication stepsFig. 2 Continuous monitoring and terminationThis study recommends the adoption of real-time automated background sound checks, time delays, facial recognition, holding ID against the student face pause, and head pose for continued monitoring. Additionally, the exam platform need to use and an advanced lockdown browser like the Respondus that controls the software that can be accessed by the learners during their exams.Figure 3: Continuous monitoring activities Fig. 3  ReferencesAbuhassna, H., Al-Rahmi, W. M., Yahya, N., Zakaria, M. A. Z. M., Kosnin, A. B., & Darwish, M. (2020). Development of a new model on utilizing online learning platforms to improve students’ academic achievements and satisfaction. International Journal of Educational Technology in Higher Education17(1), 1-23. https://doi.org/10.1186/s41239-020-00216-zAlSheikhTheeb, T., Sahin, A., Abdelrahman, S., Chuang, R., Affolter, F., Al Mekdad, B., … & Shequem, Y. (2022). Online Examinations in Emergency Contexts: Can Proctoring and Other Technologies Be Feasible Alternatives for Facilitating Inclusive School Exams for All in Emergency Contexts? (No. 41). EdTech Hub. https://doi.org/10.5281/zenodo.6929534Alyahya, D., & Almutairi, N. (2019). The Impact of Electronic Tests on Students’ Performance Assessment. International Education Studies12(5), 109-119.Andrade, M. S. (2018). Online English Language Learning: Theory-Based Course Design and Pedagogy. Journal of Education and Training Studies5(3), 1-10. http://dx.doi.org/10.11114/jets.v5i3.2058Bedford, D. W., Gregg, J. R., & Clinton, M. S. (2011). Preventing online cheating with technology: A pilot study of remote proctor and an update of its use. Journal of Higher Education Theory and Practice11(2), 41-59.Collins, H., & Callaghan, D. (2022). What a difference a zoom makes: Intercultural interactions between host and international students. Journal of Comparative & International Higher Education14(2). https://doi.org/10.32674/jcihe.v14i2.4300Harrison, N., & Skrebneva, I. (2020). A country as pedagogical: enacting an Australian foundation for culturally responsive pedagogy. Journal of Curriculum Studies52(1), 15-26. https://doi.org/10.1080/00220272.2019.1641843Ngqondi, T., Maoneke, P. B., & Mauwa, H. (2021). A secure online exams conceptual framework for South African universities. Social Sciences & Humanities Open3(1), 100132. Raji, I. D., Gebru, T., Mitchell, M., Buolamwini, J., Lee, J., & Denton, E. (2020, February). Saving face: Investigating the ethical concerns of facial recognition auditing. In Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society (pp. 145-151). https://doi.org/10.1145/3375627.3375820Stolz, J., & Tanner, P. (2019). Secularization, Secularity, and Secularism in the New Millennium: Macro-Theories and Research. In Oxford Research Encyclopedia of Politics. https://doi.org/10.1093/acrefore/9780190228637.013.792   

Prompt 1: EvaluaPrompt 1: Evaluating the Importance of Historical Context in Boumediene V. Bush (2008)Prompt 1: Evalua

Prompt 1: Evaluating the Importance of Historical Context in Boumediene V. Bush (2008)

Boumediene v. Bush was a landmark case in the United States. The Supreme Court determined in Boumediene v. Bush (2008) that Guantánamo prisoners had the right to submit habeas corpus petitions to federal courts in Washington to ascertain whether the U.S. government had sufficient evidence to support their prolonged open-ended incarceration without trial. The court’s ruling overturning D.C. was published. Circuit’s decision.82 The Court sided with D.C. Consequently, assuming the law is constitutionally sound, the D.C. Circuit will not have jurisdiction over habeas corpus petitions filed by Guantanamo inmates that were pending on the day of its implementation. It would be appropriate for the Circuit to dismiss the petitions.

The Supreme Court has cited multiple jurisprudence on the matter of habeas corpus and how this issue might apply to these cases. For instance, the Court concluded that petitioners are covered with the privilege to file for the writ, even though the D.C. Circuit concluded that it was unnecessary to assess whether habeas corpus could be adequately replaced. Normally, this Court remands cases for further examination of unresolved issues, but in “extraordinary” cases, an exemption to this norm may be justified. The Court uses the historical context of Cooper Industries v. Aviall Services, Inc., 543 U.S. Which mentions the serious separation-of-powers concerns that these cases pose as well as the reality that petitioners have long been deprived of rightful access to a courtroom. The court also mentioned Reid v. Covert, 354 U.S. 1 wherein applying the Fifth and Sixth Amendment’s jury clauses to American citizens being tried by U.S.S. Both the concurrences and the plurality recognized the importance of practical concerns, not linked to the citizenship of the petitioners but rather the location of their detention and trial.

Prompt 2: Should the New Deal be Considered a Legal Success?

The New Deal was determined as both successful and failure by different economic scholars, however, while the New Deal was rumored to save capitalism in the US, its failure lies in its technicalities and the Government’s inadequacy to act on several issues. For instance, the Supreme Court in Panama Refining Co. v. Ryan, 293 U.S. 388 (1935), involved the Franklin Roosevelt administration’s “hot oil” orders, which were enacted under the 1933 National Industrial Recovery Act (NIRA), which prohibited interstate and international trade in petroleum products produced more than state quotas. The decision was one of many that struck down important components of the administration’s New Deal legislative agenda. Since the relevant provision 9(c) of the NIRA enabled presidential trade interdiction without establishing standards for the proposed restriction’s implementation, it was determined that it constituted an illegal transfer of legislative power. By an 8-1 vote, the Supreme Court sided with the oil companies, concluding that Congress had improperly transferred its regulatory authority to the President without first formulating a solidified statement of legal policy and establishing a specific set of guidelines by which the President was authorized to act.

Another jurisprudence through Humphrey’s Executor v. United States, 295 U.S. 602 (1935) provided another legal failure on the New Deal where the Court made a distinction between quasi-legislative and quasi-judicial officers and executive officers. The Court ruled that the former serves under the influence of the President and may be ousted in his favor, but the latter may only be dismissed via processes complying with legislative restrictions set by Congress. The Federal Trade Commission Act of 1914, which stated that the President could only remove an FTC commissioner “for neglect of duty, inefficiency, or malfeasance in office,” served as the foundation for his lawsuit. Humphrey passed away on February 14, 1934, and his wife, acting as executor of his estate, continued the lawsuit for back pay up to the date of his passing (with interest). When Roosevelt ousted Humphrey from the FTC, Associate Justice George Sutherland cited the court’s ruling, concluding that Roosevelt had indeed overstepped his power since Congress had intended for regulatory agencies like the FTC to be free from executive control. Because it decided cases and issued regulations, the Federal Trade Commission was declared by the court to be a quasi-legislative body. Thus, the President was not permitted to dismiss a member for purely political grounds. Therefore, it was wrong to fire Humphrey.

Another legal failure of the New Deal revolves around ALA Schechter Poultry Corp. V. United States, 295 U.S. 495 (1935) where jurisprudence states that the codes of fair competition, which the NIRA gave the President the authority to issue, were declared invalid by the Court on a unanimous vote by Chief Justice Hughes. The Court determined that the codes were unconstitutional because they represented an improper transfer of legislative authority to the executive branch. The Court further determined that the NIRA provisions exceeded the authority granted to Congress by the Commerce Clause.

Prompt 3: Constitutionality of the use of Military Commissions to Try Detainees in WWII and the Global War on Terror.

Military Commissions during World War II and the Global War on Terror are different from each other. For instance, the question of the constitutionality of both commissions differs in terms of addressing the main issues during their period of establishment. During the Global War on Terror, since the notion of the trial of war crimes was not new, the establishment of new military commissions and human rights conditions on these detainees were common concerns regarding constitutionality. In the case of Hamdan v. Rumsfeld (2006), after originally rejecting review, the Supreme Court took the case and, in a 5–4 ruling, held that Suspension Clause protected Guantánamo detainees who had been designated as enemy detainees and qualified for petition of habeas, despite having been categorized as such. The president’s use of military courts was constrained by the court. They concluded that the military courts were not authorized by Congress, were not necessary for military purposes, and were in violation of the Geneva Conventions.

During World War II, the establishments of military commissions were common to try war criminals. However, compared to the strict scrutiny of the Supreme Court in establishing commissions to try war criminals in the war on terror, the Supreme Court was more lenient and adhered to the need of urgency to address issues on establishing military commissions to try war criminals in World War II. For instance, Japanese General Tomoyuki Yamashita was tried by a military commission for breaking the rules of war as prepared by Army Forces stationed in the Eastern Pacific. In re Yamashita, 327 U.S. 1 (1946), the U.S. Supreme Court upheld the use of the commission, ruling that the President and other military commanders had the authority, following the laws of war, as enshrined in Article of War 15, to try enemy combatants by military commission for breaking the laws of war. The International Military Tribunal for the Far East, which holds trials of Japanese officials for war crimes and other charges in Tokyo, Japan, is also established by the US and its allies.

References

ALA Schechter Poultry Corp. V. United States. (1935). 295 U.S. 495

Cooper Industries Inc v. Aviall Servies Inc. (2004). 543 U.S. 157

Hamdan v. Rumsfeld. (2006).

Humphrey’s Executor v. United States. (1935). 295 U.S. 602

Panama Refining Co. v. Ryan (1935). 293 U.S. 388

Reid v. Covert. (1957). 354 U.S. 1

Yamashita. (1946) 327 U.S. 1