Saturday, December 28, 2019

Stop Selling Tobacco And Tobacco Products - 891 Words

American’s spend a startling $156 Billion dollars every year on tobacco and tobacco related products and an additional $133 Billion dollars on healthcare for diseases that originate from smoking and chewing tobacco. The human toll is also significant with a projected 8 million people to die every year by 2030. To combat these extreme statistics CVS Caremark, now CVS Health, has decided to make the hard business decision to stop selling tobacco products in all 7,700 of its drug stores. The decision stemmed from changing its image from a corner store that fills prescriptions to a health care company that is trying to â€Å"reinvent the pharmacy to have a more supportive and active role in health care†. To show support for the idea, petitions have been popping up on Change.com like the one by Michael Brochstein of New York, New York who is calling for other drug store giant Walgreens and its subsidiary Duane Read to follow in CVS’s footsteps and stop selling tobacco products also. Proponents of the idea say that if these giants stop selling tobacco then regular purchasers will have to go elsewhere, making it less convenient and possibly making smokers move in the right direction, to quit smoking and hopefully curve the smoking rate as a whole. This is needed because although smoking has been on the decrease since the early 1990’s, recently getting to a low of 18% percent of white males being smokers, it is still an epidemic that kills more people than alcohol, AIDS, car accidents,Show MoreRelatedThe Ban On Tobacco Advertisements941 Words   |  4 PagesMy thoughts and reasoning may not be that of a business intent but more from a personal aspect, as for the ban on tobacco ads being shown in the country by the Indian Government 02/06/2001. Not only for health purposes such as lung cancer, chronic obstructive pulmonary disease, heart disease, stroke, asthma, reproductive affects in women, diabetes, premature, low birth weight in babies, blindness, cataracts, or age related macular degeneration. With India being a nation with war, as well as lotsRead MoreHow Tobacco Affects The Human Body Essay970 Words   |  4 Pages Tobacco has more than 4000 substances in it. Nicotine is one of these chemicals in tobacco, which makes its user addicted to it. Also, Nicotine can affect the human body by speeding up the nervous system. Smokers feel more energized due to smoking tobacco. When people try to quit smoking, they experience the withdrawal effect. Many health problems are associated with smoking due to the fact that it alters how the body is working. There are about 480,000 deaths related to smoking every yea rRead MoreTobaccos Harmful Effects, Health and Economic Essay1334 Words   |  6 PagesTobacco kills five million people yearly, which is much more then HIV/Aids, Tuberculosis, and Malaria combined, according to International Union Against Cancer. This addicting drug can in fact end up giving the user a death sentence. As the body grows older, the DNA atoms can be mutated by this seemingly harmless plant. This mutation of cells can eventually spread and the user will end up with a body full of cancer. These cancer sticks or cigarettes are not only harmful to your body but also hardRead MoreElectronic Cigarettes : The Future Of Smoking953 Words   |  4 Pagestheir liking, and the smoke does not stink as traditional tobacco cigarette smoke does. In most places e-cigarette shops have been opened and are now selling regulated devices. In a battle between cigarettes and e-cigs, e-cigs are winning in sales and in popularity. Smoking is a dangerous habit causing countless problems in so ciety; however, to curb this trend, smokers may resort to electronic cigarettes, as they help people stop smoking tobacco, promote better health, and satisfy their nicotine addictionsRead MoreAddiction As A Relationship By Jean Kilbourne1288 Words   |  6 Pagesthe conduct of the Tobacco and Alcohol Companies. The effect that tobacco and alcohol have over the users is astronomical. People that you have known before to be kind and caring people, under the use of alcohol could be completely different by just one drink. If this isn’t proof enough that this substance should not only be banned from advertisement, but it should also be illegal because of the amount of consumers that become addicted. The research I found said that tobacco and alcohol consumptionRead MoreE Cigarettes, The Next Big Thing1612 Words   |  7 Pageswar against tobacco, or they are insidious menace that threatens to get kids hooked on nicotine and make smoking socially acceptable again† (Morin). E-cigarettes are now becoming more widespread, especially among young people. The electronic cigarette industry is growing rapidly in the United States due to the rising demand, which is stirring up opinions and research among the masses. While supporters argue that it is a safer and cheaper way of smoking and he lpful for quality tobacco, opponents argueRead MoreEssay on Smoking in America1122 Words   |  5 Pageslethal effects of smoking, why is it still so popular? Guy Smith, a Phillip Morris Tobacco Company executive, claims that their research shows that advertising is the top reason people start smoking (Bailey 34). Most people will argue that this is not true because the do not like to be â€Å"sold† and do not like to admit advertising affects them. Despite their claims, more Americans buy brand name and heavily advertised products than any other country in the world (Bailey 33). Smoking in the mass media isRead MorePersuasive Essay on Smoking883 Words   |  4 Pagesumn.edu/perio ltobacco/secondhandsmoke.html / smoking is hazardous enough to an individual’s health and it’s even more disturbing when people are exposed to dangers caused by smoking. The tobacco company however, had thought false labeling would help the situation when all it has done is worsen t he case. The tobacco company had come with the idea of light cigarettes, which is just a way to think the cigarettes they are smoking are healthier. Second hand smokers are just as endangered as the actualRead More Against Tobacco Essay1542 Words   |  7 PagesAgainst Tobacco â€Å"How-To† suicide kits are readily available all across the country. They are inexpensive and easy to purchase at the young age of eighteen! Sounds ridiculous, right? Maybe. Maybe not. I am referring to tobacco products. They are among some of the top selling products in our country, and a large contributor to our cancer epidemicRead MoreCase Study : Cvs Health Announced854 Words   |  4 Pagesthat it wanted to stop selling all tobacco related products. This will affect every CVS location in the United States of America. The problem that arises in the U.S. is the usage of tobacco products. As a successful pharmacy chain and a lucrative company, CVS health wants to do its best to strengthen the health of American citizens. In order to solve the tobacco problem, the health professionals are taking it upon themselves to make a difference. If the distribution of tobacco products come to a halt

Friday, December 20, 2019

Incorporating Ethics in HR Strategic Policies Case of Automobile Inc Study

Essays on Incorporating Ethics in HR Strategic Policies: Case of Automobile Inc Case Study The paper "Incorporating Ethics in HR Strategic Policies: Case of Automobile Inc" is a perfect example of a case study on human resources. Business firms and corporations that have incorporated ethics into their business strategies do not distinctly operate with the sole objective of making money (Hemingway, 2005). Ethics and good corporate citizenship are key determining factors that dictate the success or failure of any business organization (CIMA, 2010). They influence greatly on the firm’s reputation while also help in defining a working business model that will help the company to immensely performing even during unfavorable operating environments (Porter and Kramer, 2006). Different entities rely on firms for their well-being; suppliers, employees, customers, the local community and the society at large are the direct beneficiaries of the company’s operations. The products and services produced or offered by the company are utilized by the mentioned entities. Howe ver, a company that does not adhere to ethics and corporate social responsibility is likely to negatively influence the environment in diverse ways (Hemingway and Maclagan, 2004).Companies founded on strong ethical policies that not only uphold the law but also add value to their brands have long-term prospects (Porter and Kramer, 2006). Further, firms with quality management information with regard to environment, social, and ethical performance; have the right tools for monitoring environmental and social impacts that company operations may cause (CIMA, 2010). Corporate communication and reporting, particularly on sustainability, must go beyond salaries and wages and implement the green agenda. Being ethical and socially responsible is not just the right thing for an organization to do: it is a critical factor for business success while ensuring its sustainability. This report discusses key strategic issues that must be addressed when preparing HR policies and plans. Using Automob ile Inc. as the case study, ethical issues, Corporate Social Responsibility (CSR), Values and Sustainability will be discussed.Incorporating Ethics in HR Strategic policiesAutomobile Inc. is a successful multination company that deals in car making (Porter and Kramer, 2006). Cross-Examination of this company has solidly revealed that its business operations are ingrained and embedded in strong ethical values. Solid ethical codes drive organizational strategies, business models, and decision-making processes (CIMA, 2010). The company’s socially and environmentally ethical approach to business undertakings has ensured that the company has the ability to thrive and further become successful in the long run (Hemingway and Maclagan, 2004).

Wednesday, December 11, 2019

Cyber Terrorism for Protecting Infrastructure- myassignmenthelp

Question: Discuss about theCyber Terrorism for Protecting National Infrastructure. Answer: Introduction Today with the ubiquity of internet in every sector of social and political life, cyber terrorism is becoming rampant not mentioning its complexity and severity. It is basically an illegal act of extracting or destroying data and information from an individual or an organizations computer. This act is executed either by a gang of people or individuals who are considered as computer genius. Cyberattacks have become even more common since any kind of defence mechanisms against such attacks is far from fool proof and the attackers take very advantage of every loophole that exists in cyber law. Another encouraging factor for these criminals is that Internet governance is subjected to various social and economic constraints as well as it lacks the opportunities for assessing different regulatory tools (Shackelford, 2014). Problems In the modern days, people are eventually depending more and more on the Internet for the sake of surfing and browsing in order to collect information and make business out of it. This has resulted in the expansion of cyberspace and security in the cyber world. Any possibility of threat from use of the Internet can be referred as criminal acts committed using electronic communications networks and information systems or against such networks and systems (Lagazio et al., 2014, p.59). Cyber-attacks can be of three kinds. First, there could be non-permitted intrusions which in turn refer to a condition where the criminal tends to invade a different computer system using hacking techniques. Again, viruses could enter the systems through emails and all the information of another computer could be erased or messed up. Thirdly, services could be denied and this might destroy communication with other parts of the system and other computers functionality (Howitt Pangi, 2003). Challenges The Internet has provided scopes to criminals in the cyber world to be used in the virtual world for misanthropic activities. When different firms and individuals carry out their activities on the Internet, they are usually not aware that this space could become home to criminals who can initiate their attacks. While it is true that the cyber space should be protected from them, IT experts are still not able to completely understand how far cyber-crime is effective and what could be the probable outcomes. Since this aspect cannot be completely determined, cyber security methods are not competent enough (Globalpost, 2011). Different types of criminals can pursue cyberattacks. They use illegal networks which could be built for purpose of building an area for their crimes to be carried out. Cyber law system emphasizes on the specific area of such crimes (Kshetri, 2010). Cyber law is about studying the behavioural tendencies of cyber criminals by assessing their economic effects. However such issues cannot always be evaluated only on basis of economic dimensions. For instances some crimes can take place for seeking vengeance and satisfying psychological needs. This is most likely to not consider the cost or the chance of being pointed out. Economic aspects are useful especially when cybercrimes lead to money laundering related activities. This occurs when expected gains are compared with the costs to be incurred (Lagazio et al., 2014). Applications technology Biometrics is the way of having technology that can distinguish between peoples physical features like thumbprints and retinas. Since, these features are unique for every individual therefore they can act as strong security features as wrong persons, i.e. if the computer cannot recognize the thumbprint or retina, cannot assess any information stored in the computer. Although biometric authentication is considered as an enhanced form of security measure this also has associated risks. For one, people whose physical features are used as security and who have access to confidential sources may not maintain their loyalty. Secondly, people may be unwilling to provide their biometrics as security feature for privacy concerns like relating them to some past crime or misdemeanour. Predicting the future is not free of risk. With the growing need of security methods, the concept of privacy is changing. One major example is travelling by air which requires passengers to agree to body scan and s crutiny of personal luggage, and this is not an option. To enter USA, one needs to provide two fingerprint scans. One major terrorist attack can change the personal concept of privacy as people are lowering their opposition to personal searches and storing personal information by the respective authorities. Although it cannot be said for sure that in future there will be universal acceptance of biometric authentication, the tolerance level is surely increasing (Crowley, 2006). Quantum cryptography is a way of writing messages in a code so that it cannot be read by cyber criminals. Although it is assumed that strongest encryption keys are unbreakable it still cannot guarantee that with time and advancing technology such keys will remain secured forever. Such keys are used in high circles like government and national security centres and therefore demand fool proof method of security. At present 2048-bit keys are used for encryption and they are practically impossible to break since it will thousands of years to do so with one computer. However, in recent time a student in Notre Dame broke a 109-bit key in 549 by running 10,000 computers around the clock. However, this scenario is totally impractical although this incident established if time and resources are there then keys can be broken. It is also possible that someone may invent a mathematical shortcut way to achieve the task (SANS Institute, 2003). Research Question and Vague areas An appropriate research question related to cyberterrorism could be Can cyber security measures be directed to curb or prevent cyber terrorism of different forms? Although there is a constant proliferation of worms and viruses, the scenario is changing with bots and botnets becoming more rampant and full of hassles. One major way of financial gains is making and selling botnets to potential cyber criminals who lack time or energy to make botnets. Moreover, there is a second way of making money by using botnets to attack servers such as DNS or mail servers thus making the servers inaccessible or slow. This is turn gives the opportunity to botnet holders to ask for money from organizations in exchange of leaving their places. In the world of malware, before a new attack is perfected attention is shifted to creating a new one. According to Schultz, (2006, p.8), Writing worms and viruses that cause massive infections is apparently no longer a central focus; writing better bots and creati ng larger botnets is. Importance in real life Stealing of private information is a growing concern in the social media arena. It is a place where people post their personal photographs like vacations, family ceremonies, etc. However, such stuff can be used by hackers, stalkers or potential employers. Moreover, people tend to post their vacation dates on these sites which becomes perfect opportunities for burglars to break into their houses. People who tend to party and smoke joints give out such information in social media which can harm their career also make their friends appear same by association and as such friends can sever contacts with them. Even a harmless picture like that of a baby can label the person as pedophile (Siciliano, 2011). Advantages and disadvantages Before finding the proper solution, motivational aspects can initiate cyber criminals towards cyberattacks. A certain area where cyber criminals are emphasizing upon regarding their criminal acts refers to advanced metering infrastructure (AMI) that refers to the process of recording use of data for utility companies which facilitate decision making for customers on use of energy based upon the initial price of its usage. AMI could not establish security measures. Attackers enter the AMI framework with the motive of cyber attackers to disrupt the infrastructural facilities of a nation. Besides this, evil cyber attackers can try to use AMI as a point of initiation for different attacks on the Internet by virtue of the vast number of devices, their ability to initiate many-pronged attacks, and even their ability to hide malicious or criminal data through dispersion among many nodes (Foreman Gurugubelli, 2015, p.101). When a system is under assault, the effect is not just within a part icular structure. Since the infrastructures are interconnected and interdependent, the impact can be felt upon all kinds of frameworks under attack. Also, the impact can be upon other related frameworks of other systems. One example can be found in the electric industry which, if disrupted can have its impact upon other industries which require electric power. When electricity is disrupted the whole country is affected (Amoroso, 2012, p.294). It is said that the task of aligning IT and business priorities is more art than science (Businessweek,2014). According to a survey conducted by IBM in 2010 on 1,500 CEOs, information management in companies is lagging behind and is not matching up to the constantly changing IT environment (McAfee, 4). In response to this complex situation, cloud computing has emerged as a new technology of keeping all data in data centres, and then lease the digital assets to other users. In such a case, customers will not have to bother with the details and can pay only for the data required. Privacy concerns are related to mapping the virtual machines to the physical machines. In intrusion detection systems, data mining techniques can be available for malware detection in clouds (Sen, n.d.). Conclusion From what we understand the Internet has a key role in the security and economic growth of a country. Cyberattacks are carried out by experts who usually have the expertise and necessary possessions to enter any area such as financial, communication, health care, emergency and public infrastructure areas like water, oil and gas. Cyberattacks are complex and this is clear from the fact that such misdeeds can be executed by terrorists, political enemies and even teenagers. Cyber security measures should take into considerations the purpose and objectives of all kinds of hackers. The idea is to ideally integrate technology into political decisions in order to battle against such cyber criminals on various aspects. Cyber security maintenance should be done carefully without bringing about any leakage in the system. Cyber security is essential in all spheres of life, including households and industries. I also believe that generating personal awareness is the key to prevent cyber-crimes f rom all aspects. My colleagues have given a positive feedback on my paper. They have added issues like cyber crime that can lead people losing credit card money, bank account money. I agree with them that one secured way is to use to use to personal computers with licenced versions of antivirus. References Amoroso, E. (2012) Cyber Attack: Protecting National Infrastructure, Elsevier Businessweek (2010). 5 ways to improve IT effectiveness, Businessweek, retrieved from: https://www.businessweek.com/managing/content/mar2010/ ca20100319_518706.htm Globalpost (2011), China implicated in massive cyber attack targeting US, global post, retrieved from: https://www.globalpost.com/dispatch/news/regions/asia-pacific/china/110803/china- google-cyber-attack- us-spearphish- trawl-dope Crowley, M.C. (2006). Cyber crime and biometric authentication the problem of privacy versus protection of business assets. Australian Information Security Management Conference, Edith Cowan Univ. Foreman, C. and Gurugubelli, D. (2015) Identifying the Cyber Attack Surface of the Advanced Metering Infrastructure. The Electricity Journal, 28(1), 94-103 Howitt, A.M. Pangi, R.L. (2003). Countering Terrorism: Dimensions of Preparedness, MIT Press Kshetri, N. (2010). The Global Cybercrime Industry, Springer Lagazio, M., Sheriff, N. Cushman, M. (2014). A multi-level approach to understanding the impact of cyber crime on the financial sector. Computers Security, 45, 58-74 McAfee, A. (2011). What Every CEO Needs to Know About the Cloud. Harvard Business Review, 89(11) SANS Institute (2003). Quantum Encryption A means to perfect security? SANS Institute, retrieved from: https://www.sans.org/reading-room/whitepapers/vpns/quantum-encryption-means-perfect-security-986 Schultz, E. (2006). Where have the worms and viruses gone New trends in malware. Computer fraud security Sen, J. (n.d.). Security and Privacy issues in cloud computing, TCS, retrieved from: https://pdfs.semanticscholar.org/4dc3/70d253020947a8e66b701e12dd0233161229.pdf Shackelford, S.J. (2014). Managing Cyber Attacks in International Law, Business, and Relations, NY: Cambridge Univ. Press Siciliano, R. (2011). Social media privacy and personal security issues, Huffington Post, retrieved from: https://www.huffingtonpost.com/robert-siciliano/social-media-privacy-and_b_245857.html

Wednesday, December 4, 2019

Improved Customer Services for Starbucks- myassignmenthelp.com

Question: Discuss about theImproved Customer Services for Starbucks. Answer: The feedback from internal customers comes from the organization itself, in order to improve the needs and demands, whereas the external customers feedback comes from the outsiders individual ideas that the organization takes into consideration for their improvement. The process of gathering feedback from internal customers is comparatively cheaper and easier than that of external customers (Powell et al. 2012). It is important to gather feedback from the internal customers as it helps in increasing employees satisfaction. This in turn increases the productivity and performances of the employees. Moreover, it lowers the acquisition costs of the employees. Happy and satisfied employees reflect the culture of the organization. In addition to this, satisfied employees help in meeting the consumers demands and desires easily (Roh, Hong and Min 2014). Starbucks launched mobile order and pay feature services, which helped the customers to buy their beverages and foods, without standing in the line for hours. This helped in satisfying the needs of the customers and the adoption of this technology proved to be a huge success. Coles Supermarkets and Woolworths use the digital media platform to promote its products. Moreover, the company opened their online shopping website, where the consumers can order their items by sitting at home. This also helps them gaining a feedback from the consumers (Chang 2016). HSBC Australia uses the technique of internet banking to let the customers pay their bills, transfer money and perform other activities by sitting at their homes (Bass and Dalal Clayton 2012). The organizational structure helps in determining the adaptability and flexibility of the department of marketing to new techniques. If an organizations structure is not stable, the employees will face severe issues in coping up with the environment. In bigger organization lack of communication can be a major issue for the employees. A well organizational structure helps in determining the relationship between the employees and their employers. If the overall marketing goal is not clear, it will hamper the progress and growth of the organization. Therefore, it is necessary to build a good organizational structure as it contributes to the marketability and the marketing success of products as well as services (Peppard and Ward 2016). Description of the problems The ABC manufacturing company has been facing a decline in their sales. There could be two possible reasons for this. Firstly, the company is not keeping a track of their customers behaviors and attitudes. Customers preferences changes from time to time. Therefore, the company needs to track their feedbacks in order to improve the issues. Secondly, the company needs to improve their marketing and promotional activities. In this era of digital media, the company can use the social media platform for promoting their products (Wandersman, Chien and Katz 2012). Alternative solutions Feedback machines can be installed in the stores in order to track the consumers comments and reactions. Moreover, surveys can be conducted among the employees, which will give detailed information regarding their satisfaction and expectations. In addition to this, the company needs to manage their websites and pages on a regular basis. They need to keep a track of the customers demands and reply to their issues. Furthermore, interactions with the target consumers will prove beneficial for them, as the customers will feel that their opinions and views are valued by the companys owner. This in turn, will enhance their productivity as well as profitability (Theodosiou, Kehagias and Katsikea 2012). Description of the processes Customer feedback and the management processes of complaints can be done by managing and keeping a record of their views. It can contribute to the continuous improvement of the company. Moreover, the company needs to keep a track of their internal and external factors which affects their progress. They can adopt the differentiation strategy in order to compete with their existing competitors. The company can change their servicing styles and levels, which will be impactful. Furthermore, they need to develop their promotional and marketing strategies, for the overall success (Roh, Hong and Min 2014). Strategies The company must undertake certain strategies in order to resolve the issues of sales drop. A thorough research of the customers demands will help in a huge way. The unprofitable products can be dropped or the alternative option is to raise their prices. Adding new products of various ranges would be beneficial for the companys progress. The marketing team must do a thorough research of the companys competitors and work accordingly. Adapting the differentiation strategy can benefit the company on the long run. In addition to this, the company should also focus on the digital marketing segment for its promotional activities (Powell et al. 2012). Cost Installing feedback machines in the stores would cost less than hundred dollars. Costs for opening a website will be minimal. Moreover, social networking pages are easily manageable. Professional trainers and experts can be hired for providing the employees with proper training and mentorship. In addition to this, graphic artists can help in designing the advertisements in a professional yet creative manner, which will grab the attention of the customers. The costs are minimal and thus, the company can easily adopt these strategies for improving their problematic areas (Peppard and Ward 2016). Involvement of the personnel and their roles The senior management team is responsible for the overall inspection. The managers need to check the solutions of the issues and get them approved by the senior management team. On getting approval from them, the managers should work in accordance with that. The marketing team of the company needs to start working on their promotional activities. Professional graphic artists can help by providing with innovative designs for the advertisements, which will attract the customers. Moreover, the company can also lure the customers by providing them with offers and discounts. Regular customers can be given with special benefits on shopping. Furthermore, the company should also hire professional experts as well as certified trainers for training their employees on a regular basis (Kumar and Reinartz 2012). Expected outcomes On applying the strategies, the companys productivity will increase which in turn, will enhance their sales. Interacting with the customers will prove beneficial for the company, as it will give useful insights. The possible outcomes will be satisfied customers, increase in the sales, increase in the level of productivity and improvement in the companys profitability (Bass and Dalal Clayton 2012). Relevant legislation Legislation will help in bringing in more transparency for the customers and business as well, in the aspects of terms and conditions. Moreover, Consumer Rights Bill will boost the economy of the company. In addition to this, the company should also take care of the employees Work health and safety policies. Therefore, both the consumers and the employees satisfaction will prove highly beneficial for the company and increase their sales as well (Jahanshani et al. 2014). Majority of the customers do not bother to complain their issues. It is necessary to encourage the consumers to file their complaints, as it helps the company to improve their shortcomings. Bad news travels faster than the good ones. Similarly, a bad review of any company would reach a large number of customers and change their opinions regarding the organization. Interacting with the consumers can help the company owners gain an understanding of their purchasing behaviors and attitudes (Chang 2016). Moreover, pages on social networking sites must be handled carefully. Their queries need to be resolved regularly by managing the pages. Installation of feedback machines at the stores will help in encouraging the consumers to give their valuable opinions. In addition to this, surveys can be conducted for engaging the customers. Therefore, encouraging customers complaints would help the company flourish and gain useful insights. It will also contribute to its productivity and profitability (Hallstedt, Thompson and Lindahl 2013). References Bass, S. and Dalal Clayton, B., 2012.Sustainable development strategies: a resource book. Routledge. Chang, J.F., 2016.Business process management systems: strategy and implementation. CRC Press. Hallstedt, S.I., Thompson, A.W. and Lindahl, P., 2013. Key elements for implementing a strategic sustainability perspective in the product innovation process.Journal of Cleaner Production,51, pp.277-288. Jahanshani, A. A., Hajizadeh, G. M. A., Mirdhamadi, S. A., Nawaser, K., Khaksar, S. M. S. (2014). Study the effects of customer service and product quality on customer satisfaction and loyalty. Kumar, V. and Reinartz, W., 2012.Customer relationship management: Concept, strategy, and tools. Springer Science Business Media. Peppard, J. and Ward, J., 2016.The strategic management of information systems: Building a digital strategy. John Wiley Sons. Powell, B.J., McMillen, J.C., Proctor, E.K., Carpenter, C.R., Griffey, R.T., Bunger, A.C., Glass, J.E. and York, J.L., 2012. A compilation of strategies for implementing clinical innovations in health and mental health.Medical care research and review,69(2), pp.123-157. Roh, J., Hong, P. and Min, H., 2014. Implementation of a responsive supply chain strategy in global complexity: The case of manufacturing firms.International Journal of Production Economics,147, pp.198-210. Theodosiou, M., Kehagias, J. and Katsikea, E., 2012. Strategic orientations, marketing capabilities and firm performance: An empirical investigation in the context of frontline managers in service organizations.Industrial Marketing Management,41(7), pp.1058-1070. Wandersman, A., Chien, V.H. and Katz, J., 2012. Toward an Evidence?Based System for Innovation Support for Implementing Innovations with Quality: Tools, Training, Technical Assistance, and Quality Assurance/Quality Improvement.American journal of community psychology,50(3-4), pp.445-459.