Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.
I need an explanation for this Management question to help me study.
. Introduction Provide a brief synopsis of the meaning (not a description) of each Chapter and articles you read, in your own words that will apply to the case study presented.
2. Your Critique
Case Studies in Finance and Accounting
Mercy Hospital: A Case Analysis
Abstract
This is a case study which describes an account (names, other facts changed to preserve anonymity) in which an internal auditor in a hospital setting, due to personal biases and a lack of objectivity, performed a substandard audit of a capital asset acquisition and violated several standards of the International Standards for the Professional Practice of Internal
Auditing as well as the Institute of Internal Auditors (IIA) Code of Ethics. Students use the
Standards and Code of Ethics to form conclusions regarding shortcomings of this audit. The
International IIA Standards and Code of Ethics are online and easily read, with the Standards being twenty one pages in length and the Code of Ethics being two pages. The case is designed to be taught in one class period. Students are exposed to actual standards and required to employ the standards in their analysis of the case.
Mercy Hospital – Background
Mercy Hospital is a leading health-care provider and one of the oldest hospitals in the region.
The 300-bed, acute-care facility is known for its quality of care and respected for their expertise and innovation in the delivery of health care. As a leader in cardiac, trauma, surgical, orthopedic, neurologic, and vascular and cancer care, Mercy Hospital offers patients the latest treatments by providing its medical staff, comprising more than 600 physicians, with the most advanced technology available. Mercy Hospital is one of eight individual hospitals comprising a hospital network located across seven states ranging from Pennsylvania to Mississippi. The eight hospitals have a network headquarters which provides many of the financial functions including internal audit services. Collectively, the hospitals are members of the Mercy Health Network. Management at each hospital is decentralized except all of the hospitals participate in a consortium to purchase medical supplies for a more competitive price than otherwise would be available.
64-Slice CT Scanner
The 64-Slice CT Scanner is a new imaging medical device that helps physicians diagnose and treat a variety of medical conditions by providing a more anatomically detailed image of the patient’s organs. Older CT scanners have been used for years to study internal organs, bones, soft tissue and blood vessels. They are particularly useful in trauma situations to identify injuries to the heart and vessels, liver, kidneys or other internal organs. The scanner is also used to plan for surgery and monitor the treatment of tumors for cancer patients
Heart related maladies are all too common. The United States Center for Health and Human
Services reported that in the USA for the years 2017-2018, over 5 million people arrived in emergency rooms complaining of chest pain (United States National Center for Health
Statistics, 2016, p. 2). The new 64-Slice CT Scanner is judged to be faster and more reliable for diagnosing chest pain. It can evaluate a heart patient by capturing thousands of images of the heart in less than 5 seconds or capture images of the whole body in less than 30 seconds.
The cost of these machines is generally expected to range from $1.5 to $2 million.
Bidding on the 64-Slice CT Scanner can be a very competitive and costly commitment by vendors. They insist that Board approval be granted for the machine before final bids are submitted.
The Audit Process
Mercy Hospital’s capital-asset procurement process for any single acquisition over $100,000 is to have a formal proposal submitted to the board of directors (BOD) who vote on its approval. If the proposal is approved, the funds are transferred to the respective hospital for eventual disbursement. The internal auditors are charged with following up within one year of acquisition to check the propriety of the purchase and disbursal of funds. Recently, a proposal for a new CT scanner was submitted by Mercy Hospital’s controller. The other hospitals were told to “wait and see” until the internal auditors could inspect the documentation of the acquisition and the operating effectiveness and efficiency of the new process before being allowed to submit their own proposals. Mercy’s proposal was the one of the larger proposals submitted over the past several years at a total of $1.625 million dollars plus approximately $25,000 for the labor and other necessary expenditures to remove the old equipment to permit the installation of the new scanner. The cost of the new scanner by itself was listed in the proposal at $1.3 million.
The internal auditor assigned to the acquisition was Jack Jones. Jack had been with the network for over three years performing mostly operational audits (on existing processes), reviewing internal controls, and payroll and travel expenses. Jack believed that the procedures associated with this capital-asset audit would be simple and routine.
This was not Jack’s first visit to Mercy Hospital. In fact, Jack had performed an audit on the hospital’s payroll and travel expenditures only a year ago. Jack’s recollection of the experience was not a pleasant one. He had several “confrontations” with the controller, mostly as a result of clashing personalities. While all the expense issues were easily resolved, Jack felt there was still an adversarial relationship between them and he was “on guard” for any “preemptive strikes” this time around.
It was a long drive to Mercy Hospital so when Jack arrived a little late the day of his audit he was greeted by the controller with a perceived air of indifference and promptly led to a secluded and windowless office room. The controller calmly explained that he was extremely busy and would answer any questions at the end of the day. Jack merely nodded his head and sat down in front of several tall piles of invoices that the controller had furnished and represented the documentation supporting the purchase, set up, and testing of this new technology. Jack was somewhat surprised, fully expecting to see only a handful of invoices, but did not ask for any explanations. As Jack began looking through the myriad of statements and canceled checks he soon found one particular invoice near the top of the first pile which indicated that the actual price paid for just the machine itself was only $902,000!
Jack’s first reaction was to call the director of auditing. When he found that the director was out for the day and could not be reached, he decided to call the VP of Operations at corporate headquarters. Jack was critical of the controller in describing the seriousness of his suspicions based on this preliminary information. Jack didn’t realize that there was a scheduled BOD’s meeting that day and that the news would be passed on to the Board. The Board members were outraged over the alleged misuse of the funds and possible fraud.
Jack was unaware that the controller was soon being lambasted by the chair of the BODs in a private conference call. Seconds after the call, the controller walked up to Jack and had only two words to say—“Get out.” Jack was flabbergasted; he called back to Network’s Home
Office only to receive a rather icy response from the Chair of the BOD’s secretary suggesting that he return immediately. As Jack got into his car and drove back to the home office he wondered what he had done so wrong.
Postscript
Three days later Jack was called in to the director of internal audit’s office. The director told the story of how he personally visited Mercy Hospital the next day after Jack’s visit and performed the capital-asset audit himself. The director found that there were a number of reasonable explanations for the differences in the original proposal and the actual expenditure. To begin with, the companies who sold the machine would not talk about discounting the price until they knew that the funds were available. Once the proposal was approved and the funds were authorized for disbursement, only then did the competing vendors begin slashing their prices because of competition for the sale. This is what drove the cost of the machine down from $1,300,000 to $902,000. Other accessories and services provided by the vendor reduced the initial list price even further by some $57,000. Training and warranty costs were not subject to discounting. However, there were several factors that mitigated some of these savings.
It would take close to a month before the new machine became operational because no one really knew how difficult it was going to be to remove the old machine which had been embedded in the concrete floor (to minimize vibration). It was decided that to save time and costs, the new machine would be set up in a new room adjacent to the room for the older scanner. The new space would have to be renovated and new electrical connections installed.
Since the hospital could not afford to shut down for any extended length of time, the new space had to be renovated before the older machine could be dismantled. Then, while the new equipment was being tested, the old scanner had to be kept running in its temporary location. During the time that both machines were running, machine operators and supporting personnel were asked to work double shifts in order to test and become familiar with the new scanner before closing down the old machine. This took longer than expected because Mercy’s technicians were not familiar with the new machine and had some difficulty with even minor start-up problems. Therefore, for the first two weeks, special outside consultants were hired to operate the scanner at the proper specifications. These additional and unexpected outlays were costly and brought the total to just under $1.4 million ($1.17 million and $230,000 for the renovations and other expenditures) which was still lower than the original estimate of $1.65 million. Even though the list price came in at a reasonable $902,000 (saving $398,000 and other discounts provided additional savings of $57,000), the renovations amounted to $230,000 and exceeded the original estimated renovation costs of $25,000. The director went on to explain to Jack that the reason for the abnormally large number of invoices was due to the renovation cost, additional labor cost associated with the new machine, and the cost of running both machines during the transition. As it turns out, Mercy’s controller actually did a commendable job in overseeing the project and keeping accurate records of the disbursements. In fact, the controller created a specialized installation guide that will probably save hundreds of thousands of dollars when the remaining hospitals install more of these machines. When the director was finished, he told Jack that unless he changed his attitude and re-considered what it means to be a professional internal auditor, he was likely to remain a payroll auditor for the rest of his career. The director told Jack to go back and read a basic internal audit text on interviewing techniques, the Code of Ethics and the Standards for Professional Practice. Jack still didn’t understand. What was the director trying to say?
CASE STUDY CHALLENGE
1. Students should be asked to read the case and discuss all procedures done during this auditory.
2. Comment on Jack’s interviewing techniques.
3. What could Jack have done differently?
4. What did Jack forget to do?
3. Conclusion
Briefly summarize your thoughts & conclusion to your critique of the case study and provide a possible outcome for the Finance department. How did these articles and Chapters influence your opinions about Managing finance and budgets?write answers for these questions in a word document
I need help with a Computer Science question. All explanations and answers will be used to help me learn.
10.1 What are three broad mechanisms that malware can use to propagate? 10.2 What are four broad categories of payloads that malware may carry? 10.3 What are typical phases of operation of a virus or worm? 10.4 What mechanisms can a virus use to conceal itself? 10.5 What is the difference between machine-executable and macro viruses? 10.6 What means can a worm use to access remote systems to propagate? 10.7 What is a “drive-by-download” and how does it differ from a worm? 10.8 What is a “logic bomb”? 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware? 10.10 List some of the different levels in a system that a rootkit may use. 10.11 Describe some malware countermeasure elements. 10.12 List three places malware mitigation mechanisms may be located. 10.13 Briefly describe the four generations of antivirus software. 10.14 How does behavior-blocking software work? 10.15 What is a distributed denial-of-service system?Please answer essay question: nursing essay help
I don’t understand this Social Science question and need help to study.
Write carefully, avoid repeating material in answers, avoid too much quoting, and do NOT use outside sources such as Wikipedia.
Material used throughout semester: McMichael, Philip. 2017. Development and Social Change: A Global Perspective. 6 th Edition. Los Angeles: Sage.
Millstone, Erik and Tim Lang. 2008. The Atlas of Food: Who Eats What, Where, and Why. 2 nd Edition. Berkeley and Los Angeles: University of California Press.
Tucker, Catherine M. 2017. Coffee Culture: Local Experiences, Global Connections. 2 nd Edition. New York: Routledge
What are the Course Objectives?
Understand globalization as a process that has produced development and instabilities; Develop your “sociological imagination,” the ability to see the connections between individual lives and broader social forces, in order to grasp the links between your own life and global change and events in the developing world; Understand the Global South and how its trajectory; Understand the global food system and how it affects the developing and the developed world; Understand the causes, processes, and consequences of global inequality and development; Develop your critical thinking and writing abilities.
ESSAY Question: Explain what you see as the key themes that have emerged in this course on The Developing World. What are the most important things you take away from the course? What would you want to learn more about now that you have finished the course?assume that you work for an Information Technology Security firm in Atlanta and your company has been hired to provide a threat model of Equifax consumer and business data and provide remediation to address the security issue.: nursing assignment help
I’m studying for my Computer Science class and need an explanation.
NO PLAGIARISM
Equifax is one of the three major credit bureau that stores personal and business credit profile information1. Organizations rely on Equifax credit data in order to make pertinent financial lending decisions. In 2017, Equifax revealed that a data breach exposed the sensitive personal information of 143 million Americans2.
In 2018, Equifax budgeted to spend $200 million on security and technology projects for the year3.
In this case study, assume that you work for an Information Technology Security firm in Atlanta and your company has been hired to provide a threat model of Equifax consumer and business data and provide remediation to address the security issue.
Create 20 pages written paper and 25 pages PowerPoint presentation document to address the following area. Key Deliverables Your Company Information
Company profile
Leadership profile and expertise
Equifax
Equifax company background and history
Discuss Equifax 2017 data breach
o Discuss the impact of the security incident
1 https://www.equifax.com/about-equifax/
2 https://www.ftc.gov/equifax-data-breach
3 http://fortune.com/2018/09/07/equifax-data-breach-…
o Discuss the scope of consumers and businesses affected?
o Discuss how Equifax handled the security incident.
o Discuss how the government handled the security incident
Threat Model Proposal
Propose strategies and discuss a threat model for managing Equifax consumer and business data.
Identify Threats
Find and discuss at least three threats to Equifax information systems using one of the threat model strategies. *NOT threat types!
One for data flow, one for data store, one for a process.
Manage and Address Threats
Discuss and recommend at least two remediations per threat identified in the earlier section.
Closing Section
Discuss the likelihood of another data breach and recommend what Equifax needs to do to be prepared and possibly avoid it.
**The Written paper must comply to APA guidelines. Provide references and citations for source.For this assignment, you will create a visual argument about your identity. Using a medium or technology of your choice, you will need to do the following: Create an artifact that visualizes or explains some aspect of your identity. Make sure to focus o
I’m studying and need help with a Computer Science question to help me learn.
For this assignment, you will create a visual argument about your identity. Using a medium or technology of your choice, you will need to do the following:
Create an artifact that visualizes or explains some aspect of your identity. Make sure to focus on your identity or personality traits. Some ideas include:
Creating a professional poster using PowerPoint Creating a slide show presentation Creating a digital picture collage
In a 2 page essay, discuss the following:
What is the identity trait or category you are depicting? How would you define it? Why did you choose this trait? Is it a defining part of your identity, or rather an element of your identity by which you would rather not be characterized? How does this identity trait/category impact your life? Is there a defining event or moment which characterizes this? How do other people perceive or understand this element of your identity? What is it that you want people to learn about you?
*Save your digital artifact and Microsoft Word essay to a folder on your computer. You will need to zip the folder. Submit your zipped file folder (containing both your digital artifact and essay) to the drop box below.
