IT Project managers do a lot more than calculations and reporting; they must keep the team on track, ensure ethical decisions are made, deal with conflict, and, depending on the type of organization, they may perform employee evaluations, issue bonuses, hire and lay off personnel, and other tasks. In this paper, you will discuss some of the key elements of the project management process. Write a six to eight (6-8) page paper in which you: 1. Discuss at least two (2) different roles that IT project managers can play in organizational leadership.

IT Project managers do a lot more than calculations and reporting; they must keep the team on track, ensure ethical decisions are made, deal with conflict, and, depending on the type of organization, they may perform employee evaluations, issue bonuses, hire and lay off personnel, and other tasks. In this paper, you will discuss some of the key elements of the project management process.

Write a six to eight (6-8) page paper in which you:

1. Discuss at least two (2) different roles that IT project managers can play in organizational leadership.

2. Describe at least three (3) human resource factors that affect project management.

3. Recommend at least three (3) conflict resolution techniques that IT project managers can utilize to keep team members productive.

4. Explain at least three (3) leadership approaches and when they are best utilized.

5. Describe at least three (3) ethical situations or dilemmas that IT project managers might face in their role within an organization.

6. Assess the role of technology in project management.

7. Go to https://research.strayer.edu to locate at least three (3) quality resources for this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

10-15 Assess the management, organization, and technology issues for using social media to engage with customers.

10-15 Assess the management, organization, and technology issues for using social media to engage with customers.

10-16 What are the advantages and disadvantages of using social media for advertising, brand building, market research, and customer service?

10-17 Give some examples of management decisions that were facilitated by using social media to interact with customers.

10-18 Should all companies use Facebook and Twitter for customer service and marketing? Why or why not? What kinds of companies are best suited to use these platforms?

Case study

To most people, Facebook and Twitter are ways to keep in touch with friends and to let them know what they are doing. For companies of all shapes and sizes, however, Facebook, Twitter, and other social media have become powerful tools for engaging customers, amplifying product messages, discovering trends and influencers, building brand awareness, and taking action on customer requests and recommendations. Half of all Twitter users recommend products in their tweets. It has been said that social media are the world’s largest focus group, with consumers telling you what they want every single day.

About 1.3 billion people use Facebook, and more than 30 million businesses have active Brand Pages to develop “fans” of the brand by enabling users to interact with the brand through blogs, comment pages, contests, and offerings on the brand page. The Like button gives users a chance to share with their social network their feelings about content and other objects they are viewing and Web sites they are visiting. With Like buttons on millions of Web sites, Facebook can track user behavior on other sites and then sell this information to marketers. Facebook also sells display ads to firms that show up in the right column of users’ Homepages, and most other pages in the Facebook interface such as Photos and Apps.

New Haven Connecticut’s Karaoke Heroes bar was started in 2012 and half of its new customers come through Facebook. Karaoke Heroes is the only karaoke bar in the state of Connecticut, and the only superhero-themed karaoke bar in North America. Its customers include college students from the New Haven area, as well as hardcore karaoke and superhero fans, middle-aged couples out for a date night, and Korean and Chinese families that come in to do karaoke in the bar’s private rooms.

Owner Andrew Lebwohl and his wife design Facebook ads to appeal to people most interested in karaoke and superheroes and are able to experiment with different Facebook ads for different audiences without spending a great deal of money. For example, ads can target Connecticut residents who are interested in superheroes, mothers of young children interested in hosting parties during the weekend, or people who speak Cantonese, or Mandarin or Spanish, to let them know about the bar’s music in those languages. When Karaoke Heroes runs special events, it can advertise the bar as an event space.

Twitter has developed many new offerings to interested advertisers, like “Promoted Tweets” and “Promoted Trends”. These features give advertisers the ability to have their tweets displayed more prominently when Twitter users search for certain keywords.

In addition to monitoring people’s chatter on Twitter, Facebook and other social media, some companies are using sentiment analysis (see Chapter 6) to probe more deeply into their likes and dislikes. For example, during the 2014 Golden Globe Awards, thousands of women watching the ceremony tweeted detailed comments about Hayden Panettiere and Kelly Osborne’s slicked-back hairdos. Almost instantaneously, the Twitter feeds of these women received instructions from L’Oréal Paris showing them how to capture various red-carpet looks at home, along with promotions and special deals for L’Oréal products. L’Oréal had worked with Poptip, a real-time market research company to analyze what conversations about hairstyling connected to Golden Globe hashtags and other key phrases were appearing on Twitter. When the Golden Globe red-carpet events began, Poptip’s software looked for similar chatter and analyzed which conversations were genuine discussions from the appropriate demographic. Poptip determined that the target audience was captivated by slicked-back hairdos, and L’Oréal sponsored tweets to land in those Twitter conversations.

Best Western International, the world’s largest hotel chain, worked with Medallia, Inc., a Palo Alto, California-based provider of customer experience management software to create a tool that allows hotels to manage and respond to social feedback and to perform sentiment analysis. For example, a hotel’s Internet speed might elicit the most comments, but the software can show that this has a limited impact on guest likelihood to recommend that hotel com¬ pared to the cleanliness of guest rooms. These findings help Best Western focus its resources on areas that have the greatest impact on recommendations.

Best Western has both a mobile and desktop Web site with social tools. Both sites pull in ratings from TripAdvisor to let users see what others are saying about a hotel. TripAdvisor, with 200 million monthly visitors worldwide, provides a place for people

to share their experiences about hotels, flights, restaurants and rentals. It is a leading example of social feedback driving customer buying decisions. Additionally, visitors to the Best Western sites can “Like” specific hotel pages on the site.

In addition to talking about themselves, companies have gained from posting good comments about their competitors. General Mills has a 30.1 percent share of the cold cereal market and maintains a strong social presence on Facebook, Twitter, Instagram, and Tumblr. Its Facebook group Hello, Cereal Lovers, has more than 366,000 followers. Although General Mills primarily uses these channels to discuss its own brands like Cheerios and Lucky Charms, it occasionally highlights rival cereals. For example, Hello, Cereal Lovers featured a recipe suggested by a user made with Post Honey Bunches of Oats, while on Twitter General Mills reposted a recipe made with Post Fruity Pebbles and Kellogg’s Rice Krispies. Carla Vernon, marketing director for General Mills cereal, believes this “brand agnostic” approach makes the company appear more authentic and inspires better conversations with the people who buy and enjoy its products.

With cold cereal consumed by 92 percent of American households, the market for cold cereal is saturated. A common growth strategy for General Mills and other cereal companies is to increase what marketers call “usage occasions” by promoting how the cereals can be used in recipes, craft projects, or weight-loss programs. General Mills has been using its Web site and social network presence to encourage cereal consumption on these multiple fronts.

TbmTbm, a company that offers digital navigation and mapping products and services, has been using social media to enhance its product-development process. Like other companies, TomTom closely monitors social media conversations as part of its effort to evaluate performance in marketing and customer service. During this process, a company analyst discovered that users posting on a UK forum were focused on connectivity problems and channeled this information to TomTom’s product development teams. The product-development teams then worked directly and in real time with customers to resolve these problems. Social media helped TomTbm improve its processes for research and development (R&D) and product development. TbmTbm now interacts directly with its driving community for ideas on design and product features, as well as to quickly troubleshoot new offerings.

Still, the results of a social presence can be unpredictable, and not always beneficial, as a number of not expect that the people reading the posts will buy one of its products, such as business cards, right away, only that they will remember Vistaprint when they are ready to buy. Vistaprint is able to demonstrate that using Twitter and Facebook has directly increased profits because it keeps track of sales than come through links from social media sites.

Some companies have not been taking advantage of social media capabilities for capturing customer data for analysis. Even when they have the software tools for social media analytics, they might not know how to ask the right questions. According to Jill Dyche of Baseline Consulting, the problem with social media is when you get it to work, what do you do with it? A social community is buzzing about your flagship product? Great! But now what?

Companies may need to experiment. Pradeep Kumar, vice president and customer intelligence director at advertising firm DraftFCB, believes his social media analytics program will pay off eventually, though he’s unsure of how or when. Kumar believes analyzing social media data requires multiple tools and the flexibility to experiment with those tools to see what works and what doesn’t. Kumar and others warn that existing tools for sentiment analysis aren’t always accurate, often failing to pick up on sarcastic or colloquial language.

Questions 1. Analyze the reasons to invest millions of dollars to detect and prevent fraudulent transactions. In your evaluation, do a cost–benefi t analysis to show why the investment cost is worthwhile.

Questions 1. Analyze the reasons to invest millions of dollars to detect

and prevent fraudulent transactions. In your evaluation, do a cost–benefi t analysis to show why the investment cost is worthwhile.

2. Review the two outcomes of the fraud scenario. Assess the business implications of each of the following two goals. Explain why these goals are confl icting. a. To minimize rejecting legitimate purchases by autho-

rized customers b. To minimize the risk of making customers victims of

fraud 3. The Fraud Management solution is based on a scoring

model. For example, assume the scores range from 1 to 10, with 10 being the highest probability that the transac- tion is fraudulent. What cutoff score would you use to decide to approve a purchase? What cutoff score would you use to decide not to approve a purchase? If those cutoff scores are not the same, how do you suggest those falling between scores be treated?

4. Why are approval decisions made in a split second? Would customers tolerate a brief delay in the approval process if it reduced their risk of identity theft? Explain your answer.

5. Research ATM or other banking transaction fraud. How has a fi nancial fi rm been defrauded or harmed?

CASE 9.2 Business Case: HSBC Combats Fraud in Split-second Decisions

With billions of dollars, corporate reputations, customer loyalty, and criminal penalties for noncompliance at stake, fi nancial fi rms must outsmart fraudsters. Detecting and pre- venting fraudulent transactions across many lines of business (checking, savings, credit cards, loans, etc.) and online chan- nels require comprehensive real time data analytics to assess and score transactions. That is, each transaction has to be analyzed within a split second to calculate the probability that it is fraudulent or legitimate. A big part of a bank’s relationship with customers is giving them confi dence that they are protected against fraud, and balancing that protection with their need to have access to your services.

HSCB Overview HSBC is a commercial bank known by many as the “world’s local bank.” HSBC is a United Kingdom–based company that provides a wide range of banking and related fi nancial services. The bank reported a pre-tax profi t of $6.8 billion in the fi rst quarter of 2014 (1Q 2014). It has 6,300 offi ces in 75 countries and over 54 million customers.

Fighting Fraudulent Transactions HSBC was able to reduce the incidence of fraud across tens of millions of debit and credit card accounts. The bank imple- mented the latest Fraud Management software from SAS. The software includes an application programming interface (API) and a real time transaction scoring system based on advanced data analytics. Using the Fraud Management app, HSBC has reduced its losses from fraudulent transactions worldwide and its exposure to increasingly aggressive threats. The antifraud solution is live in the United States, Europe, and Asia, where it protects 100 percent of credit card transactions in real time.

Scenario Consider this scenario. A credit card transaction request comes in for the purchase of $6,000 in home appliances. The bank has a moment to decide to approve the transaction, or reject it as potentially fraudulent. Two outcomes are possible:

• Legitimate purchase rejected: When a legitimate pur- chase is rejected, the customer might pay with another card. The bank loses the fee income from the purchase and the interest fee. Risk of account churn increases.

• Fraudulent purchase accepted: When a fraudulent pur- chase is accepted, a legitimate customer becomes a victim of a crime. The bank incurs the $6,000 loss, the cost of the fraud investigation, potential regulatory scrutiny, and bad publicity. Chances of recovering any losses are almost zero.

With trillions of dollars in assets, HSBC Holdings plc is a prime target for fraud. Fighting all forms of fraud—unauthorized use of cards for payment and online transactions, and even

customer fraud—has risen to the top of the corporate agenda. Fraud losses are operating costs that damage the bottom line. As required by regulations, HSBC has implemented poli- cies to segregate duties, create dual controls, and establish strong audit trails to detect anomalies. In addition, the bank has antifraud technology, which includes SAS Fraud Manage- ment, to monitor and score the millions of daily transactions. It is the cornerstone of these efforts.

Fraud Management In 2007 HSBC’s fi rst SAS implementation went live in the United States, which was their largest portfolio with 30 million cards issued there. All transactions were scored in real time. Detection rates on debit ATM transactions have been very effective. HSBC has updated its Fraud Management solution multiple times as newer technology and threats emerged. Of course, fi nancial fraud morphs to avoid new detec- tion methods so antifraud models have a very short shelf life. Once HSBC closes up one loophole, thieves devise new threats to exploit other potential vulnerabilities. To counter- act threats, fraud-monitoring algorithms and scoring models require constant refreshing.

Sources: BusinessWire (2011), SAS.com (2014), Reuters (2014), YouTube video “HSBC Relies on SAS for Comprehensive Fraud Detection.”

Telephone systems are designed to transfer voice signals (4000 Hz). When a voice signal is digitized using pulse code modulation what is the sampling rate, and how many quantization levels are used? How much data does that generate in one second? Are these the same sampling rate and quantization levels used on a CD? Can you verify your answer?

Telephone systems are designed to transfer voice signals (4000 Hz). When a voice signal is digitized using pulse code modulation what is the sampling rate, and how many quantization levels are used? How much data does that generate in one second? Are these the same sampling rate and quantization levels used on a CD? Can you verify your answer?

You are working for a company that has a network application for accessing a database corporate profiles. From your computer workstation, a request for a profile travels over the corporate local area network to a modem. The modem, using DSL, connects to the Internet and finally into the database service. the data base service is essentially a modem and a mainframe computer. Create a table ( or draw a figure) that shows every time data or signals are converted to different form in the process. For each entry in the table, show where the conversion is taking place, the form of the incoming information, and the form of the outgoing information.

You are working for a company that has a network application for accessing a database corporate profiles. From your computer workstation, a request for a profile travels over the corporate local area network to a modem. The modem, using DSL, connects to the Internet and finally into the database service. the data base service is essentially a modem and a mainframe computer. Create a table ( or draw a figure) that shows every time data or signals are converted to different form in the process. For each entry in the table, show where the conversion is taking place, the form of the incoming information, and the form of the outgoing information.

1. What is the frequency in Hertz of a signal that repeats 80,000 times within one minute? What is its period?

1. What is the frequency in Hertz of a signal that repeats 80,000 times within one minute? What is its period?

2. What is the bandwidth of a signal composed of frequencies from 50 Hz to 500 Hz?

4. What is the baud rate of a digital signal that employs differential Manchester and has a data transfer rate of 2000 bps?

9. A signal starts at point X. As it travels to point Y, it loses 8 dB. At point Y, the signal is boosted by 10 bB. As the signal travels to point Z, it loses 7 dB. What is the dB strength of the signal at point Z?