There are four (4) CSR types according to the article, What…
There are four (4) CSR types according to the article, What is Corporate Social Responsibility? _________________________________ under CSR refers to the firm’s duty to conduct its business in a manner that is fair, ethical, and just. This involves adhering to moral principles and standards that go beyond legal requirements and that focus on doing what is right for all stakeholders.
Read DetailsBoeing Corporation, as a federal contractor, has a goal of “…
Boeing Corporation, as a federal contractor, has a goal of “5% spend” with minority-owned, woman-owned, and/or disabled-veteran-owned business enterprises. Their total spend is for Boeing’s Defense, Space, and Security segment is $26B. To-date, the firm has spent $520M with diverse suppliers. How much more with Boeing need to spend with diverse suppliers this year?
Read DetailsYou are a key executive with Google, a multinational high-te…
You are a key executive with Google, a multinational high-tech firm. Your firm has been criticized (in the US) for lacking diversity with respect to the employment of African Americans and Hispanics. What specific tactics would you recommend for recruiting and retaining a more diverse, technical workforce? Be specific. (Talent Management)
Read DetailsWhen implementing succession plans, companies should be inte…
When implementing succession plans, companies should be intentional about including talent from underrepresented groups, i.e., women, Hispanics, etc. Succession planning is the process of creating and maintaining a productive and efficient work environment where all employees can fulfill their full potential.
Read DetailsThe diagram below shows a segment of an organization’s netwo…
The diagram below shows a segment of an organization’s network, where a number of workstations are connected to the router R1. The organization’s information security officer (ISO) has to ensure that only admin workstations are able to access the server (192.168,0.5/24) while everyone can access other servers. What control method should the ISO implement to enforce this restriction?
Read Details