Cheap competitor analysis essay example
Tuesday, August 25, 2020
FDI into China essays
FDI into China articles The Limited Potential of Chinas Western Region Outside Direct Investment in China is required to reach US$100 billion in each time of the eleventh Five-Year Plan period (2006-10) (Annual 1). On the off chance that history is any sign of things to come, at that point China can expect one-sided circulation of these assets during the eleventh Five-Year Plan. Drawing in outside direct speculation isn't a simple assignment. The district must have a requesting buyer showcase, a created framework, and access to universal markets. From 1983 to 2001 an expected US$400 billion worth of FDI streamed into China. All the more explicitly, the eastern beach front locale represented 88% of Chinas absolute inflows of FDI, yet the focal district pulled in just 9% and the western area minimal more than 3%(Ogutcu 13). The Chinese government isn't overlooking this issue. The legislature has in actuality concocted the Western Development Strategy (Xibu Da Kaifa), which it authoritatively propelled in January 2000; be that as it may, variations despite everything remain and will keep on staying until the western district can turn out to be progressively alluring to over the top inflows of outside direct venture. Albeit remote direct venture into China has given quick development and success along the seaside locale, Chinas western area won't see a similar development and outside direct interest in future years. Outside Direct Investment in the Eastern Coastal Region On the off chance that a host nation has a tremendous market size, an effective framework, and access to global markets, at that point it is a prime contender for remote direct venture. Most importantly, outside financial specialists need to think about the expected interest in their picked neighborhood showcase. Beyond a shadow of a doubt, China has the most appealing developing shopper showcase on the planet. In the event that one glances at a populace thickness map (See figure 1 in Appendix) of China, one would see a conspicuous convergence of individuals alone the coast. China flaunts an esti... <!
Saturday, August 22, 2020
Film and Countless Alien Eggs Essay Example for Free
Film and Countless Alien Eggs Essay I was in the center school. I despite everything recalled the inclination when I originally watched this film. It was alarming to such an extent that I couldnââ¬â¢t even inhale, and I once feared that these outsiders would go to our planet and crush our mankind. There is no uncertainty that this film is a perfect work of art in the Sci-Fi/blood and gore movie history. The executive Ridley Scott made an astonishing film. The story mostly tells about a business towing spaceship, which conveys seven group individuals, and gets a signal structure a planet, so they choose to look at it. Three of group part Dallas, Kane and Lambert find a forsaken spaceship which contains incalculable outsider eggs; one of these assaults Kane and makes him oblivious. After Kane is brought to the boat, the peculiar thing occurs. An outsider erupts from Kaneââ¬â¢sââ¬â¢ chest and slaughters all the team individuals with the exception of Ridley. By her knowledge and braveness, she at long last slaughters the outsider and getaway from the spaceship. Movies about UFO and spaceships are incredibly famous in the film business particularly in America, however in different nations itââ¬â¢s not well known by any stretch of the imagination. I think it is on the grounds that schools in United States center more around instructing studentsââ¬â¢ creative mind and imagination. Individuals love to see films about future world and extraterrestrial life. As we probably am aware, our universe is incredibly enormous; many individuals accept that outsiders do exist some place. Some gossip says they visited us and government knew it, however for reasons unknown they didnââ¬â¢t need individuals to know. The greater government needs to hide the presence of outsider, the more individuals need to know reality. Thatââ¬â¢s why Sci-Fi films can prevail in the movies so well. The Alien is one of the best Sci-Fi motion pictures in the history. A few people think it likewise can be classified as a blood and gore film as well. There are such huge numbers of frightening minutes in this film; some are truly gross and appalling. The impact of chest blasting of Kane is as yet astounding; even it was a film that shot 30 years back. Chief made an exceptionally frightening animal, the outsider. They have no sexual orientation, or you can say they are bisexual. They have no belly and duplicate truly quick, and their blood is made by solid corrosive, which can enter a few stories of the monster spaceship. It makes them difficult to execute, and the most frightening thing is they utilize human body to recreate. When the infant outsider all set from its host, they will blast out from their dad/motherââ¬â¢s chest and right away slaughter him/her. The outsider catches all the audienceââ¬â¢s eye. Its mammoth body and gross slobbering mouth makes the unnerving climate, which make crowd fear and tension. The achievement of Alien was firmly connected to the foundation of America around then. The Alien was conceived in the time of the Cold War. Individuals were living under the enormous tension from different nations. The sentiment of the frenzy to the vulnerability simply like an outsider was stowing away in the murkiness, which was going to kill somebody. By watching this film, crowds can discharge the weight and overlook the torment of reality. The Alien is an astounding film, which mixes components of Sci-Fi and awfulness to make a very frightfulness and phenomenal film. I couldn't imagine anything better than to watch this film again and prescribe to all the individuals who like Sci-Fi and blood and gore flicks.
Friday, August 7, 2020
Law of Diminishing Marginal Returns Definition, Explanation and Examples
Law of Diminishing Marginal Returns Definition, Explanation and Examples If you were a farmer, how would you determine the optimum number of farmhands to employ, or the amount of fertilizer to use on your crop?If you owned a pizza outlet, how would you determine the optimum number needed at your pizza joint?In all these situations, the optimum number of chefs and farmhands and amount of fertilizer needed depends on something known as the law of diminishing marginal returns.The law of diminishing marginal returns is a universal economic law that states that, in any production process, if you progressively increase one input, while holding all other factors/inputs constant, you will eventually get to a point where any additional input will have a progressive decrease in output.In other words, you will get to a point where the benefits gained from increasing each extra unit of the input will start decreasing.For instance, holding other factors constant, increasing the number of chefs in your pizza outlet will increase pizza production up to a certain point.H owever, it will get to a point where increasing the number of chefs will not result in any meaningful increase in pizza production. If you keep increasing the number of chefs, it can even result in a decrease in pizza production.The law of diminishing marginal returns is a scientific expression of the common knowledge that too much of a good thing can actually be harmful to you.It is good to note that the law of diminishing marginal returns is only applicable on a short term basis, because some other factor of production will eventually change in the long run.The law of diminishing marginal returns traces its roots back to the worldâs very earliest economists, such as David Ricardo, Thomas Robert Malthus, Johann Heinrich Von Thunen, James Steuart and Jacques Turgot.These early economists, ignoring the possibility that the means of production would be improved by advances in science and technology, used the law of diminishing marginal returns to theorize that due to the increasing world population it would get to a point where the output per head would start decreasing.This would plunge the world into a state of poverty that would effectively keep the global population from further growth. This was the origin of the Malthusian theory of population, which stated that the global population would one day outgrow its food supply.While advances in science and technology have certainly improved the means of production, thereby negating the effects of the law on global population and improving the standards of living despite the growing population, the effects of the law can still be witnessed in stagnant economies where the methods of production have remained unchanged for long periods.The law of diminishing marginal returns can also be referred to as the law of increasing costs, owing to the fact that it can also be described in terms of average cost.When an increase in one factor of production is accompanied by diminishing marginal returns, then this leads to an increase in the average cost of production.For instance, increasing the number of chefs in your pizza joint will be accompanied by an increase in the salary paid to your chefs cumulatively.Once it gets to the point of diminishing marginal returns, increasing an additional chef will increase your production costs (salary paid to chefs) without a proportional increase in pizza production.This is why the law can also be referred to as the law of increasing costs. The law of diminishing marginal returns is usually represented in graphical form using three curves: the marginal product curve, the total product curve and the average product curve.The marginal product curve shows the change in amount of production per input.The total product curve shows the change in production with progressive increase in one production input.The average product curve shows the change in average production.CAUSES FOR THE OPERATION OF THE LAW OF DIMINISHING MARGINAL RETURNSThere are a number of factors that make the operation of the law of diminishing returns possible. These include:Fixed Factors of ProductionThe law of diminishing marginal returns is made possible by the fact that certain factors of production are fixed. The four factors of production â" capital, labor, land and entrepreneurship â" cannot all be increased in every instance.At the same time, all the four factors have to be effectively combined in order for production to occur.This means that effective increase in production can be achieved by increasing all the factors of production.However, the fact that not all factors of production can be increased in every situation create an imbalance in production.This increase in some factors of production while others remain fixed creates the perfect situation for the application of the law of diminishing marginal returns.Scarce FactorsIn some cases, some factors of production, such as land, are limited in nature and can therefore not be increased.In such cases, the law of d iminishing marginal returns will apply.However, this is not limited to land. Any of the other factors of production could also be scarce, depending on the situation.In such instances, an increase in some factors of production without a corresponding increase in others will disturb the balance of the factors, making it impossible for production to be increased at increasing rates.Lack of Perfect SubstitutesSometimes, the law of diminishing marginal returns applies because no perfect substitute can be found to replace one of the factors of production.If there is a decrease in one factor of production and no suitable substitute can be found then the law will definitely apply in this situation.Optimum ProductionThe optimum level of production is only achieved by a delicate balance of all the factors of production.One this optimum level has been achieved, any further increase in any of the factors of production will lead to a less efficient balance of these factors, resulting in a negati ve impact on the rate of production.In other words, increasing any single factor of production once the optimum level of production has been reached will result in the effects of the law of diminishing marginal returns.ASSUMPTIONS OF THE LAW OF DIMINISHING MARGINAL RETURNSFor the law to be applicable in any situation, it makes the following assumptions:No Change in TechnologyThe law assumes that the progressive increase in the input is not accompanied by any change in the techniques of production.A change in the production technique will result in increased efficiency of production, thus negating the effects of the law.Therefore, for this law to apply, the method of production has to remain unchanged.Short TermLike I noted earlier, the law of diminishing marginal returns is only applicable in short term scenarios.It is unlikely that all the other variables factors of production will remain unchanged over a long period of time, making the law inapplicable in long term scenarios.Homog enous UnitsThe law assumes that the units of all the variable factors of production are equal.Measurement of ProductThe law assumes that the output of the production process can be measured or quantified in physical units, such as kilograms, liters or number of units.THE RELATIONSHIP BETWEEN THE LAW OF DIMINISHING RETURNS AND THE 3 STAGES OF PRODUCTIONStage OneThe first stage of production is characterized by tremendous growth.During this stage, any increase in a variable input will lead to a corresponding increase in the rate of production, signifying increasing marginal return.The increase in rate of production outweighs the investment on the variable input. At this stage, all the three curves are positive.Stage TwoIn the second stage of production, the marginal returns start decreasing. Every extra variable unit added will still increase production, but at a decreasing rate.In other words, the benefit gained from every additional unit of input will be less than the benefit gained from the previous unit.It is during this stage that the law of diminishing returns becomes applicable. During this stage, the total product curve is still rising. However, the marginal curve and the average product curve start taking a dip.Stage ThreeThis is the final stage of production. During this stage, the marginal returns become negative. In other words, it becomes counterproductive to keep increasing the variable input.Any increase in the variable input results in a decrease in the rate of production.This happens as a result of limitations arising from inefficiency and the capacity of labor or capital.At this stage, the total product curve starts taking a dip while the other two curves maintain their downward trend.REAL LIFE EXAMPLES OF THE LAW OF DIMINISHING MARGINAL RETURNSExample One: The FarmerLet us imagine a farmer who plans to plant maize on a once acre piece of land. In addition to land, the farmer will need other inputs such as seeds, fertilizer and labor.The farmer has already bought the amount of seeds he needs and he has farmhands to help him out at his farm.However, the farmer is yet to decide on the amount of fertilizer he is going to use on the farm. If he increases the amount of fertilizer, he will definitely increase the amount of grain he stands to harvest from the farm.However, if he keeps increasing the fertilizer, it will get to a point where the fertilizer will become harmful to his crop, resulting in decreased yield from the farm.According to the law of diminishing marginal returns, the farmer will get to a point where adding an extra bag of fertilizer will result in less increase in yield compared to the previous bag.To understand how this works, let us look at the table below.Bags of FertilizerBags of GrainMarginal Bags of Grain1101023020360304802059010680-10If the farmer uses one bag of fertilizer, he will harvest 10 bags of grain from the farm. If he uses two bags of fertilizer, he increases his total yield to 30 bags of grai n.In this case, the marginal (additional) yield gotten from the second bag of fertilizer is 20 bags. If he increases the third bag of fertilizer, the total yield will be 60 bags, while the marginal yield from the third bag of fertilizer will be 30 bags of grain.However, after adding the fourth bag of fertilizer, the law of decreasing marginal returns kicks in.While the fourth bag of fertilizer increases the total yield to 80 bags of grain, the marginal yield is only 20 bags which is a decrease from 30 for the previous bag of fertilizer.After the sixth bag of fertilizer, the marginal yield of each bag will become negative, at which point the total yield will also start decreasing.Example Two: A Small CaféLet us imagine an entrepreneur who sets up a small café and buys four stoves. The entrepreneur then hires 2 chefs to prepare the special dinners for which the café is famous.Each of the two chefs cooks using two stoves. However, their productivity is not maximized, since the chefs cannot efficiently cook two meals simultaneously.As more and more customers come to the café, the entrepreneur decides to hire two more chefs. At this point, more food is prepared, and more customers flock to the café.Since there are four chefs and four stoves, each of the stoves is efficiently utilized, and all the four chefs can cook a meal simultaneously.However, as the number of customers keeps increasing, the entrepreneur decides to hire two more chefs. At this point, the marginal utility of the chefs will decrease.This is because there are more chefs that stoves, meaning two chefs will have to waste time waiting for a stove to be freed.If the entrepreneur decides to hire two more chefs, there will increasing conflict for the stoves, cookware, ingredients, and so on. The chefs will also start getting in each otherâs way, leading to a decrease in the total amount being prepared.Therefore, it becomes impossible for the entrepreneur to increase food production by hiring more chefs. Instead, increasing the chefs starts lowering the food production rate (while increasing the cumulative salary paid to the chefs).Example Three: FactoryImagine a shoe factory where different parts of the shoe are made by hand by the workers, but they all have to pass through one machine where they are stitched together to produce a complete shoe.With a low number of workers making the parts, the stitching machine will be underutilized, with some periods of idleness as it waits for more parts to be made.If the factory increases the number of workers, more shoes will be produced, because there will be more workers making the shoe parts and the stitching machine will be utilized more efficiently.However, if the factory keeps increasing the number of workers, it will get to a point where the workers will be making the different shoe parts at a faster rate than the machine can stitch them together.This is where the law of diminishing returns kicks in. From there, any further incre ase in the number of workers will not increase production, because there will be a backlog at the stitching machine.SIGNIFICANCE OF THE LAW OF DIMINISHING MARGINAL RETURNSThe law of diminishing marginal returns is a very significant law in economics. The law has a number of theoretical and practical applications.Some of the theoretical applications of the law include:The law is used to explain the equilibrium condition and behavior of a rational consumer in regards to a single commodity and a single want.The law of diminishing marginal returns is a universal law that forms the basis of several other economic laws and concepts. For instance, the law of diminishing marginal returns is the basis on which the law of demand is formed. The law of demand states that consumers will purchase larger quantities of commodities at a lower price. This is because, as the consumer purchases more and more units of the commodity, each additional unit provides less and less marginal utility, and there fore it is of less importance to the consumer. As such, the consumer will only buy additional units if they are offered at a lower price.The paradox of value, also referred to as the diamond-water paradox, can also be explained using the law of diminishing marginal returns. The paradox of value is an economic theory that states there are two kinds of value: the value arising from the utility of an object (value-in-use) and the value arising from the purchasing power conveyed by possession of an object (value-in exchange). For instance, diamonds have a great value-in-exchange. This is because of their scarcity, which drives up their marginal utility. Water, on the other hand, is available in abundance, therefore it has very low marginal utility. The result is that diamonds are way more expensive than water, despite being more useful than diamonds. This is because the marginal utility of a commodity determines its price.The law of diminishing marginal utility is the foundation on whic h Prof. Marshallâs theory of taxation and public expenditure is based. Marshallâs theory, which advocates for equitable distribution of wealth, is more like an application of the law of diminishing marginal returns to money. According to Marshall, the utility of money derived from the rich is a lot less than the utility of the same amount of money being accrued to the poor. In other words, if you take $100 from a rich manâs income, it is only a small sacrifice with relatively little utility. However, if the $100 is added to a poor manâs income, it provides greater utility. The satisfaction gained by the poor man from the $100 is a lot more than the loss felt by the rich man for the same $100.The Malthusian Theory of Population, the Ricardian Theory of Rent, the theory of pricing of factors of production, as well as several other theories relating to profits, interest and wages are based on the law of diminishing returns.Apart from these theoretical applications, the law of d iminishing marginal returns also has some practical significance, such as:The practice of promoting sales by reducing prices is based on the law of diminishing marginal returns. When the price of a commodity decreases, the consumer has to decrease the marginal utility in order to attain equilibrium. Since marginal utility decreases with increase in stock, the consumer can purchases more units of the commodity in order to achieve equilibrium.The law has also been used by governments in many countries to come up with appropriate tax policies. These countries apply progressive taxation on higher income earners on the basis that high income earners will feel less impact. This is because an increase in income decreases the marginal utility of money.The law has also been used by socialists to promote social welfare and equitable redistribution of wealth on the basis that the redistribution will result in great gains to the poor with little sacrifice from the rich.The law has also been use d to understand and explain the economic problems faced by developing countries. This is because the main economic activity in most of these countries is agriculture, which is where the effects of the law of diminishing returns are most visible. The law can also be used to boost agricultural productivity in these countries.Managers also use the law of diminishing marginal returns to determine the optimum number of employees required for maximum productivity. If an organization finds itself in Stage One of production, it means that the capital is not being utilized to the maximum, so the solution is to increase the number of employees. If the organization is in Stage Two, the manager can work out the optimum number of employees and the maximum level of productivity the organization is capable of achieving. If the organization is in Stage Three of production, then it means that the organization needs to reduce the number of employees.HOW THE LAW OF DIMINISHING MARGINAL RETURNS APPLIES IN DAILY LIFEWhile it might seem like the law of diminishing returns only applies in business, the law is applicable in our day to day lives.Below are some areas where you might notice the effects of the law:Work: When working on a project, the work you put in initially greatly improves the quality of the project. If you keep working on it for longer time than you needed to complete it, each extra hour you put into the project will only result in slight improvements in quality. If you still continue putting more time into the project, you might actually end up decreasing its quality through over-tweaking.Learning a new thing: Whether it is learning a new language, a new sport, or even working at a new company, you tend to have a very steep learning curve in the first few months. After the first few months, you have learnt most of the things and therefore your learning curve slows down.Eating: If you give a child a piece of chocolate, they will be very happy. If you keep giving them more chocolate, they will continue gobbling it up, although with much less enthusiasm compared to the first piece of chocolate. If you continue giving them more pieces of chocolate, the marginal utility of the chocolate will keep reducing to the point where they will say that they do not want any more chocolate.Recreation: Playing your favorite game or spot, watching a movie, or even hanging out at your favorite joint feels great especially if you needed to unwind. However, the more you keep doing it, the more its marginal utility keeps decreasing. If you keep at it, negative utility kicks in, and you might even start feeling drained from doing something you usually enjoy doing.
Saturday, May 23, 2020
SmartBackpacker Crowdsourcing App - Free Essay Example
Sample details Pages: 10 Words: 3038 Downloads: 2 Date added: 2017/06/26 Category Marketing Essay Type Case study Level High school Did you like this example? SmartBackpacker App 1. Executive Summary SmartBackpacker is a paid crowdsourcing app that will provide travelers with up to date reviews, recommendations and tips from other travellers. From the best places to get your laundry done in Timbuktu to the best stall to buy a taco in Mexico City, SmartBackpacker will hopefully become the must have app for all smart travelers. Donââ¬â¢t waste time! Our writers will create an original "SmartBackpacker Crowdsourcing App" essay for you Create order The success of this app will rest on providing the end-user trustworthy and useful information. The success of this app is also highly dependent on user participation as it is the user who will be posting reviews and sharing their travel knowledge. One of the innovative features of this app is that it will allow users to upload video reviews of places they have stayed, places they have eaten or fun, quirky things that might be off the beaten trail. It is hoped that this feature, along with the clean and easy to use user interface will propel SmartBackpacker to the head of the growing travel app market. SmartBackpacker is both the name of the company and the first product that this company will be launching. All future products will be launched under this company but with different names to reflect the target market. Future products could include SmartWeekends for weekend travelers, SmartStaycations for those looking for travel information in the UK and SmartBusinesstravele r for business travelers. This report will focus on the fir 2. Mission, Vision and Culture SmartBackpacker aims to harness the power of the crowd like no other travel app has managed to do before. Printed travel guides such as The Lonely Planet and The Rough Guide have long been essential purchases for tourists. However, these publications are usually updated every two years and dont provide travelers with up to date information. They are written usually by one person and dont really cater to everyones tastes. Usually they only cover one region or country, meaning that if the traveler is embarking on a multi-country tour they have to purchase more than one of these heavy and expensive guides. As smart phones become more prevalent and WiFi and mobile coverage now standard even in places far off the beaten track, it makes sense for travelers to leave their cumbersome, outdated travel books at home and travel with their phones loaded with an app that is constantly updating them with useful and relevant information. If one user had a killer Mojito in a bar in Sydney they can share that information instantly on SmartBackpacker. King (2002) argues that, ââ¬Å"it is the customer who can decide how and when they access their travel and tourism information and how and through what process they access and purchase their travel and tourism arrangementsâ⬠(p. 106). SmartBackpacker aims to be at the heart of this customer-focused movement by getting tourists to share information directly with each other, bypassing all the traditional channels. This business has to be built on a culture of trust. Users have to be able to trust the information that they are being given. It is this trust that will engender positive feelings towards the product and prompt people to post their own reviews. Surowiecki (2004) argues that, ââ¬Å"under the right circumstances, groups are remarkably intelligentâ⬠(p. xiii). This app will use this group intelligent to improve the travel experience for everyone using this product. SmartBackpacker will be the f irst in a long line of travel related apps from this company. 3. Company Objectives The objectives of this product are as follows: 1. To become the most trusted source of travel information in the growing travel app market. 2. To identify the target market and build up strong brand awareness here. 3. To use the knowledge learned and the success of SmartBackpacker as a springboard to launch other paid travel related apps 4. Opportunity Analysis and Research Tourism is an extremely diverse activity ranging from a weekend shopping trip in New York to a month long trek in the jungles of Borneo. However, one thing that unites all tourism activity is that it usually implies that people are traveling to somewhere new. Information about their surroundings is therefore key to the enjoyment of their experience. However, because tourism is such a diverse activity, it is important that SmartBackpacker is able to identify a core market within which to operate. Since this app relies on user generated content and crowdsourcing, it is important that, for the most part, the users all share the same broad area of interest. For this reason, SmartBackpacker will be aimed squarely at young, tech savvy travelers who probably already use social networking sites in their daily lives and are used to the concept of crowdsourcing. These are travelers who are either taking a gap year or are taking an early career break. Perhaps the best definition of t his market comes from Riley (1988) who states, ââ¬Å"in general they are future pillars of society, on temporary leave from affluence, but with clear and unwavering intentions to return to a normal lifeâ⬠(p. 314). This app would also be useful for younger people taking short trips such as weekend city breaks. 4.1. Industry Analysis 4.1.1 Tourism Market In 2009, visits abroad by UK residents fell by almost 15% on the 2008 figures (ONS, 2010). However, in the second half of 2010 there appears to be signs that international travel is slowly bouncing back. Jarvis (2009) observes that the backpacker market seems to be bucking the decline that has been witnessed in other parts of the travel industry. Australia, a particularly popular backpacker destination for young British travelers has witnessed an increase in international arrivals. This report would argue that in the recession, young people are probably delaying entering the job market for as long as possible. The backpacker market could also be growing due to the fact that so many people have lost their jobs in the past few years. Instead of rushing back into the job market, these young people are choosing to use the time to travel. 4.1.2 Smartphone Market The launch of the iPhone in 2007 signalled the start of all out war in the smartphone market. Phones running the Symbian operating system are the current global leaders with Googles Android system in second place, closely followed by Apple and Research In Motion (Gartner as cited in The Guardian, 2010). Android seems to be the clear winner at the moment, experiencing 22% growth from Q3 2009 to Q3 2010. Symbian lost 8% of its global market share in the same period while Apple also fell by 0.4% (Gartner as cited in The Guardian, 2010). The UK smartphone market seemingly mirrors these global market trends. However, ownership of smartphones is extremely high, accounting for almost 75% of the total mobile phone market. Apples launch of the iPad in early 2010 has also seen a surge in small, portable tablet devices. Although SmartBackpacker will be available on the iPad, the launch of this product will mainly focus on functionality in the smartphone market. 4.1.3 App Market The growth in the smartphone market has also given rise to the app market. Apps are small applications that users can download, either for free or for a small fee that take advantage of the phones advanced processing capabilities to allow users to get the most out of their phones. Thanks to apps, smartphones are now portable gaming devices, gps devices or ereaders. Apple have seemingly been the most successful at realizing the potential of this market. Apps are developed by third parties and then put of Apples online App store. The developers of these apps receive two thirds of the revenue generated from the sale of their apps. Developers can also incorporate Apples iAd system into their apps and earn extra revenue throug h advertising. The success of the app store has been staggering. Since launching in 2008, the app store has had over 3 billion downloads (apple.com, 2010). Developers who have been able to develop easy to use, useful apps have been quick to see huge rewards. One good example is the company Pusenjak, whose 59p app Doodle Jump has been downloaded well over 3.5 million times. This has made the two developers millionaires (mediamemo.com, 2010). The App store for Googles Android is not as well defined in that Apps are not available from a central source, like they are in Apple. Developers have been slow to adopt the Android operating system. However, the surge in the popularity of this system should soon see the popularity of apps on this platform surge as well. Smartbackpacker initially wants to launch on the Anroid and Apple iOS platforms. It is felt that the centralized market that Apple provides should ensure maximum visibility so the focus of the launch will be on the Ap ple version of the app. The travel app market is fairly crowded and already well-established brands such as Lonely Planet and Rough Guide have a presence here. However, none of the existing apps make it particularly easy for other travelers to share information with each other. The flow of information is distinctly one-way. As already stated, this app will allow users to post video reviews. This innovative feature, along with the easy to use interface should help to propel SmartBackpacker to the top of the travel app market. 5 PEST Analysis The purpose of this analysis is to focus on the external factors that could impact on the success of this venture. 5.2.1 Political Factors Tourism is a highly unpredictable product and one that is sensitive to external shocks. Tarlow (2006) notes that, ââ¬Å"tourism sells a highly volatile and capricious productâ⬠(p. 84). Terrorism attacks or changes in the global economic situation can change the supply and demand nature of tourism meaning that there is less of a market for this particular product. However, this report would argue that the need to travel and explore is hardwired within us. As one market dwindles, another one opens up. This report would argue that the target market for this product is a fairly adaptable one. If civil unrest threatens stability in Central America, backpackers will simply plan to travel elsewhere. 5.2.2 Economic Factors As this report has stated, the global economic crisis has severely affected international travel from the UK. However, there are signs that this is bouncing back. This report has also found that the backpacker market seems to be fairly recession proof. In fact, this report would argue that this particular market could actually witness growth in coming years as young people delay their entry to the job market until the labour market picks up again. The target market for this app would probably prefer to be traveling rather than looking for a job. 5.2.3 Sociocultural Factors The UK has a strong culture of encouraging gap years. These young people taking a break before starting university are at the core of this products core market. The government is encouraging more people to go to university so it is possible that the gap year market could grow even more in the coming years. The growth of budget airlines such as EasyJet and Ryan Air has also led to more people being able to take short weekend breaks to European cities. Another target market for this app is these weekend tr avelers looking for a bit of adventure off the beaten track. Shani et al (2010) observe that travelers are now more trusting of autonomous sources of information. We trust these autonomous sources such as customer reviews more than we do more formal types of information such as guidebooks. They state that, ââ¬Å"the boundaries between the induced and autonomous factors seem to have blurred in recent yearsâ⬠(p. 117). It is the belief of this report that SmartBackpacker can become one of these trusted autonomous sources. Tourists are now also increasingly motivated by a desire for real experiences in their tourism. MacCannell (1989) states that, ââ¬Å"touristic consciousness is motivated by its desire for authentic experiences, and the tourist may believe that he is moving in this direction, but often it is very difficult to know for sure if the experience is in fact authenticâ⬠(p. 101). SmartBackpacker will allow tourists to share these ââ¬Ëauthentic expe riences with each other. Although there is a danger that as more tourists have these ââ¬Ëauthentic experiences, the less authentic they actually become. However, the type of tourist that this app is aimed at is inquisitive by nature and will be constantly searching for and sharing new experiences. Fyall and Garrod (2005) argue that tourists are growing increasingly bored of being passive spectators. They want to experience and explore. This report would argue that tourists are the best marketers for destinations so why not harness this power? 5.2.4 Technological Factors The smartphone market is a fairly new one and this report would argue that it will only continue to grow and become more accessible to more and more people. As it grows, the infrastructure that is needed to support it will also continue to improve. This app relies on people being able to post their experiences pretty much while they are having them. In some parts of the world, this is still hard to do. However, as the technology spreads, this will get easier and easier. 6. Marketing Strategies The following marketing strategies have to work towards meeting the objectives as set out in Section 3. 6.1 Target Market This report has already defined the target market for this particular product. 6.2 Product Strategies McGrath (2001) states that a product strategy is, ââ¬Å"like a roadmap, and like a roadmap its only useful when you know where you are and where you want to goâ⬠(p. 3). It is important that this first product from SmartBackpacker is able to set the benchmark for possible future products. Crowdsourcing is an important way of democratizing the information that is available to us. However, this information has to be trustworthy, otherwise people will simply turn to other products. By clearly defining the target market for each product launched, this company should be able to give people exactly the information they need. A business traveler is unlikely to want the same information as a backpacker so each product has to be specifically tailor ed to meet the specific demands of each target market. The knowledge learnt from the development of SmartBackpacker can be utilized in the development of future apps for other sectors of the travel and tourism industry. 6.3 Pricing Strategies Tellis (1986) argues that pricing strategy is defined as, ââ¬Å"a reasoned choice from a set of alternative prices (or price schedules) that aim at profit maximization within a planning period in response to a given scenarioâ⬠(p. 147). He then observes that, ââ¬Å"in a shared economy, one consumer segment or product bears more of the average cost than another, but the average price still reflects cost plus acceptable profitâ⬠(p. 147). The main source of income for this company will be from users paying to download the app either from the Apple app store or from the various Android app markets. As Tellis points out, the pricing strategy should reflect the prices of other apps in this category. Based on this, this repor t would recommend initially pricing the app at à £1.99. It might be possible to look at integrating some sort of advertising feature into later versions of this app, but initially it is important for the user interface to be as clean as possible. This will enhance the user experience and encourage people to use the app to share their tips and recommendations with others. This report would argue that usual models of consumer decision-making dont really apply to this particular market. Because apps are usually so cheap, or even free, people can rely on more than one app in that category. For example, someone using SmartBackpacker could also have Lonely Planet loaded up on their iPhone or HTC phone. 6.4 Promotion Strategy The launch of this product will be supported by a well designed website, a twitter site and also a facebook site. The rise of Web 2.0 has made advertising to a specific target market far easier and far cheaper than it used to be through more traditiona l channels. The use of these new channels should ensure that the target market is reached and that the product receives maximum exposure. Combined with a low price point, this app should quickly be adopted by those already traveling or those planning trips. This app relies on user experiences so it is important that it is quickly adopted and users start to share experiences with each other. 6.5 Distribution Strategies As already stated, this product will be distributed through Apples App Store and also through the various Android marketplaces. The launch of the first product will be specific to these two platforms but could expand to other platforms at a later date. Bibliography and References Arthur, C. (2010). Visualising the smartphone market change: Android leaps, Nokia wobbles. The Guardian, 10 November. Brabham, D.C. (2008). Crowdsourcing as a model for problem solving. International Journal of Research into new Media Technologies. 14(1), pp. 75-90. Fyall , A. and Garrod, B. (2005). Tourism marketing: a collaborative approach. London: Channel View Publications. Jarvis, J. (2009). Billion dollar backpackers: Recession resilient [online] Available from: https://www.south-pacific.travel/news/whats_new/backpack_jjarvis.pdf [Date accessed: 23 November 2010] MacCannell, D. (1989). The tourist: a new theory of the leisure class. California: University of California Press. McGrath, M.E. (2001). Product strategy for high technology companies: accelerating you business to web speed. New York: Mc-Graw-Hill Professional. Mediamemo.com (2010). Meet the App Store millionaires: The brothers behind Doodle Jump [online] Available from: https://mediamemo.allthingsd.com/20100405/meet-the-app-store-millionaires-the-brothers-behind-doodle-jump/ [Date accessed: 23 November 2010] ONS (2010). International Travel [online] Available from: https://www.statistics.gov.uk/cci/nugget.asp?id=178 [Date accessed: 23 November 2010] Reily, P. (1988). Road culture of International long-term budget travelers. Annals of Tourism Research, 15, pp. 313-328. Shani, A., Chen, P., Wang, Y. and Hua, N. (2010). Testing the impact of a promotional video destination image change: application of China as a tourism destination. International Journal of Tourism Research, 12(2), 116-133. Surowiecki, J. (2004). The wisdom of crowds: Why the many are smarter that the few and how collective wisdom shapes business, economies, societies, and nations. New York: Doubleday. Tarlow, P.E. (2006). Terrorism and Tourism, in J. Wilks, D. Pendergast and P. Leggat (eds) Tourism in turbulent times: towards safe experiences for visitors. London: Elsevier, pp. 79-92. Tellis, G.J. (1986). Beyond the many faces of price: an integration of pricing strategies. The Journal of Marketing, 50(4), pp. 146-160. Find out more from UK Essays here: https://www.ukessays.com/services/example-essays/marketing/marketing-plan-app.php#ixzz3EEYub HPT
Tuesday, May 12, 2020
Murder Mystery Comedy Plays
Audiences love a good gasp induced by a shocking murder mystery. They also cant get enough of laughter induced by wacky characters and slapstick hijinks. Combine both worlds and youve got a popular genre known as the murder mystery comedy. Of course, just because you have all of those ingredients doesnt mean the play will actually be suspenseful, mysterious, or even funny. When youve got a bunch of dead bodies on stage, the comedy is going to get quite dark, so it takes a special sort of playwright to properly entwine the macabre with the moronic. Here are a few murder mystery comedies that get it right! The Musical Comedy Murders of 1940 Written by John Bishop, this farcical whodunnit does not take a Sherlock Holmes to reveal the villains. But it does create enough mayhem to leave you guessing about what will happen next. A snowstorm encroaches upon the estate of a wealthy philanthropist, a patron of the arts who has called together a famous songwriting team, an iconic director, a Broadway producer, and a pair of theater wannabes. They think that they are pitching the next musical extravaganzaà when, in fact, they have been summoned in order to discover the Stagedoor Slasher, a madman (or madwoman) who killed three chorus girl dancers and just might kill again. Throw in some Nazi spies, cross-dressing psychopaths, and a bumbling police detective, and you have a murder-mystery-comedy with a vintage flair. The Musical Comedy Murders of 1940 is available at Dramatists Play Service. (And for those of you actors who cannot sing and/or dance, dont worry. Theres hardly any music and no choreography except for some hysterical fight sequences). The Bold, the Young, and the Murdered There must be something intrinsically amusing about actors dealing with creepy killers because its a popular theme found in comedic murder mysteries, including this one by Don Zolodis. Heres the brief synopsis provided by the publishers at Playscripts: The long-running soap opera The Bold and the Young is in its last days: its hunky hero has self-esteem issues, its villainous old man is more interested in soup, and its heroines are slightly psychopathic. The executive producer gives the squabbling cast an ultimatum: Complete one episode overnight or the show dies. But when the director ends up murdered, and other cast members start dropping like flies, it seems like his threat might actually come true. Can these misfits discover the murderer before the show is literally killed off? The script lends itself nicely to high school drama students and professional actors alike. Theres something liberating about letting go and pouring on that soap opera cheesiness. Mandate for Murder Pat Cook is the master of melodramatic comediesà and has the ability to crank out silly characters so fast, his computer keyboard must be smoking when hes done. (Tim Kelley woulds be proud!) Most Cook comedies are as funny as the playwright is prolific. Mandate for Murder, brought to you by Eldridge Plays, is no exception. And its a blast for community theaters to perform, especially around election time. When a political aide is stabbed to death and the murder weapon is a knife pulled from a birthday cake, the crime-solving characters have a lot of questions to ask. However, they arent the only ones. The audience gets to interrogate the suspects too, not only thatââ¬âby the end of the evening, they get to vote in the election! The Murder Room This comedic gem by Jack Sharkey brings back a ton of high school memories. We spent just as much time working on the set, with all of its trap doors and secret entrances, as we did working on the lines. Like other zany mysteries, this one features a wide variety of characters (nearly all of them should be played with English accents). With all of its mix-ups and botched assassinations, by the end of the play the audience isnt sure if anyone has actually been killed off. It also pays homage to Sleuth in that characters who supposedly left the storyline come back into the play wearing a clever disguise. The 39 Steps Imaginatively adapted from a Hitchcock classic, the comic masterpiece The 39 Steps transcends the genre. Audiences rave about the non-stop comedy, the amazingly creative blocking, and the four versatile actors who play over one hundred characters. Directed by Maria Aitken and adapted for the stage by Peter Barlow, this farcical tribute to Hitchcock thrillers has been delighting audiences since 2005.
Wednesday, May 6, 2020
Ab221 Customer Service Free Essays
Running head: On-Time Technology Products Complaint On-Time Technology Products Complaint Kaplan University AB221 Customer Service Tina Engle March 30, 2011 On-Time Technology Products Complaint On-Time Technology Products (OTTP) sells products related to time, and Mark MacGibson is the new President of OTTP. OTTP has seldom had any customer complaints because the companies top priority is customer service. Mary Graff, the supervisor for the Customer Service Representatives plans was to take OTTP to an innovative level of excellent customer service. We will write a custom essay sample on Ab221 Customer Service or any similar topic only for you Order Now Unfortunately, one day the President received a complaint in written from a disabled person, that has prompt his immediate attention. The complaint was in reference to the treatment given by a sales representative (Joanne) during the persons visit to the store. The complaint read, ââ¬Å"Today I was at your store and wanted to purchase a new laptop computer. I never write companies when small incidents occur (relative to my disability of being in a wheelchair), but I feel that todayââ¬â¢s behavior by your sales staff was over the top and warrants this letter. I chose to inform you, the President, so that others in my circumstance at your place of business will not be so offended. I felt very patronized when, after asking a question of your service/sales representative Joanne, she responded in an almost childlike voice ââ¬â not once, but three times! Then she proceeded to lean on my wheelchair as she was demonstrating the laptop to me. I felt it would have been more appropriate for here to use a chair, but when I suggested she do so, she said, ââ¬Å"Oh this will only take a minute or soâ⬠and then continued to lean over me for another five minutes! I am incensed enough to write this letter! By the way, after leaving your store I will purchase my laptop from another store within the hour. â⬠After reading this person written complaint I have come to the conclusion that this complaint is legitimate because Joanne did not serve the disabled customer properly. Joanneââ¬â¢s communication with the customer was inappropriate because she spoke in a child like voice, and leaned on the customersââ¬â¢ wheel chair. Where in actuality, Joanne should have spoke to the customer in a normal tone voice (instead of a childlike voice), sat in a chair at eye level to the customer in the wheel chair (instead of leaning on the persons wheel chair), and continuing to lean on the customers wheel chair after the customer told her what they would prefer for her to do. In my opinion, the President Mr. MacGibson should call (if their telephone number is available), or communicate with this customer personally, and offer his sincere apology as well as compensation for what took place in their store. What I think Mr. MacGibson responds should is; ââ¬Å"Hello Sir. /Mama, I am Mr. MacGibson the President of On-Time Technology Products and I would like to give you my sincere apology for what took place at our store during you visit. I would like to inform you that the mannerism Joanne showed during your visit is unacceptable, and was not the protocol of OTTP. To assure that this does not happen again I will personally make sure that all of our employees are well trained, and aware of the Americans with Disabilities Act. In closing, I would also like to offer you compensation for what took place at our establishment although you stated ââ¬Å"you have purchased a laptop from another business. I would recommend that Mr. MacGibson put into play extensive training at OTTP with understanding disabled customers, customer behavior, and exceptional service, and that should assure to keep up OTTPââ¬â¢s reputation of seldom complaints. I say this because as a customer coming into an establishment they need to be understood, welcome, important, and comfortable with the sales representative. References The World of Customer Service, 2nd edition Pattie Gibson-Odgers (2008). How to cite Ab221 Customer Service, Papers
Friday, May 1, 2020
Addressing Cloud Computing Security Issues ââ¬Myassignmenthelp.Com
Question: Discuss About The Addressing Cloud Computing Security Issues? Answer Introducation Suitable for global organizations this project considers technology risk challenges such as future skill deficit. Banking operations at Aztek need servers, storage and databases management systems for numerous internet applications. Outsourcing saves on costs because Aztek only pays for services and software applications that it can accesses and use. However, compliance to business terms is necessary. Aligning Azteks project plan with its mission and values is important. It is also critical to ensure that the resources are available for the project. Aztek has an objective of implementing continuous improvement practices in its operations and functions. By setting aside resources for this plan, the company is able to avert current and future risks. A good plan guides the company in the adoption of risk management strategies such as insurance. It also encourages compliance by the business companys teams. The implementation of risk management encourages the fulfilment of business goals because it scrutinizes all areas of Aztek. Outsourcing Cloud Computing Economies of scale in cloud computing advocate for reduced costs for IT systems as an operational risk management tactic. Risks present liabilities and high cost of management(Benlian Hess, 2011). Making wrong decisions about the IT capacity needs for Aztek contributes to the risk factors. Websites operating on common applications like ecommerce are at a high risk of manipulation from cybercriminals. An effective transfer of IT app1.lications requires a reliable and safe infrastructure system. The company needs updated cloud solutions for its mobile devices, webservers, and data storage or recovery. These must be free from fraud. Making company websites accessible to multilevel, multidimensional and group systems requires effective models within the legal framework. The development, configuration and administration of applications in the global environment include privacy. Transfer of IT Applications Samandari, Havas, Harle ( 2016) identify future risks in the banking industry to identify technological disruptions among the issues of focus. Although innovation provides solutions to banks and services, it presents fresh challenges every day. Aztek deals with metadata and technology helps in portfolio management, detecting inconsistencies and making projections. Accuracy in the banking sector is a necessity and automated machines such as the ATM and mobile banking cannot afford to make mistakes. IT applications lower the risks giving the bank a competitive advantage. Of concern are privacy issues, data protection and error free business modelling. Definition of Risk E-commerce is a platform for business engagements using the internet(Chiu, Wang, Fang, Huang, 2014). Cloud computing used in the financial sector include the website links and knowledge management systems. These allow for third party access hence security and training concerns emerge. The use of cloud computing in banking services is questionable because of the banking business model. Banks are financial companies but they also stand out as well as high-risk businesses. A risk in this case is the unexpected occurrence, which may hinder the successful implementation of objective 2 of the planned portfolio. The foreseen danger may occur in any form hence there is no certain definition of its magnitude or specific. The planning process involves a cycle process of taking actions against the challenges and evaluating the controls. This is a flow showing the mission, strategy, goals and goals of Aztek as a company and its IT plans. Stakeholders play a key role in defining the process. Regulatory measures and Best practice Licensed under the Australian Banking Act, the financial regulations affect its operations(Hooper, Martini, Choo, 2013). Aztek also designs risks with consideration for the finance industry laws for credit facilities, labour laws, customer relations and banking services apply. The harmonization is under the: Good governance and conduct Privacy and personal data protection Business regulations and operations E-commerce global regulations Project Impact on Current Security Aztek strategic risks cover wide areas including corporate banking, which accommodates for its plans to venture into business alliances. Top on its plan is institutional compliance in which the Bank fulfils its responsibilities of implementing, managing and providing financial security(Rittinghouse Ransome, 2016). The IT outsourcing plan expounds on its agenda of providing reliable information to the stakeholders. Awareness creation and the implementation of risk control is important for both internal and external stakeholders. The bank has in place a system of risk management for its internal operations but it needs an elaborate framework for an external IT related plan. Current plans Azteks Risk management plan comprises of an overall organizational design as well as the departmental breakdown. The framework covers financial risks, governance, credit, developmental, strategic and operational risk levels. This plan derives its motivation from the global threats faced by the financial industry. Top on its list is the liquidity risk followed by technology and organized crime(PWC, 2017). The Australian banking service is an industry, which revolves around the consumer. Efficiency is an important factor in its value chain. Innovation also has a major role in organizations and is a best practice for the banking industry. Aztek as a company has a risk management team whose responsibility features: A risk framework for Aztek and the financial industry Development of a risk strategy and treatment plan Oversight of the risk management agenda Monitoring and ensuring compliance of the plan Coordinating risk management activities across the business Carrying out internal audits for new risk framework IT Security Risk Factors IT Security Policies and Procedures at the company also have structures laid out 3 years ago. Its focus was initially on risk assessment but industry trends indicate the importance of risk management. Its agenda was to address gaps in the infrastructure and they include three levels namely, the infrastructural, software application and development (Zissis Lekkas, 2012). Cloud computing is an advanced technology that falls under this docket. As a software model, it comes with a structure and model that is distinct and critical to Aztek IT systems. It comprises of the change in technology featuring systems designed for the banking services. This change comes from demands in the global sector. The complexity of technology systems and applications calls for risk management by leveraging the company installations with global expectations. Risk assessment leads to strategic approaches to combat and deal with the impending and potential risks. Supply chain risks are inevitable and corporate governance regulations allow the bank to undertake these risk analysis and implementation. The drivers of value creation in risk management is the stakeholder who comprises of large and small companies (Upper, 2011). Risk assessment considers: Possible situations that could happen Process of his could occur What impact it could have on the system Solution to this problem The New Plan In the new plan, risk management considers the risk assessment factors as well as crisis management using a modern approach(Bessis, 2011). It incorporates liquidity risk management and the use of technology services and products. The growth of the online business brings fresh risks for the financial IT systems because consumers now have to make most of their transactions using credit cards. Online transaction risks include credit risks, market challenges, operational and liquidity challenges. The contemporary system has configurations and computer applications to address these issues. Risk management planning highlights the possible risk avenues in order to describe concrete solutions. Outsourcing IT is a major factor affecting Azteks financials and business performance. Its outsourcing framework is an interesting business model that involves a third party service provider. Cloud computing is a new approach to collective operations. IT comprise of an innovative structure that involves a third party supplier. This means the introduction of a new security plan for Aztek communication and information systems plan. It starts with the identification of its security threats and quality business processes. This brings in the IT and Information Systems configuration. Challenges Advanced technology challenges keep advancing over time. This needs strategy improvements to tackle its complex nature. The introduction of collective computing systems provides opportunities and challenges. The new business model targets deeper connectivity and quality management(Bessis, 2011). Reputable banks prepare for uncertainties across through risk management services and products. Online credit risks include the protection of customers personal data and unauthorized access to credit card data. Value Creation Reputational risks include loss of respect in public image or consumer trust. This happens when the stakeholders question the capability of Aztek to carry out its financial services effectively. Reports about the bank or its customers losing data gives a negative image on the company. It gives a negative impression of the brand and customers lose confidence in the company. The company needs a system for detecting crime and credit underwriting. Having an early warning application gives it an edge over the competitions. In the IT financial industry, having insight on the potential risks for outsourcing services is important(Low, Chen, Wu, 2011). Operational risks The introduction of an external cloud process brings new changes such as the introduction of new people, systems and procedures. Change Management arrests the impending risks arising from human and computer generated risks. The computing systems could relay incorrect data or it could leak information to criminals. Data management solves this problem by providing security installations, making changes on personal data safety, permits or licenses. It checks the facilities, capital, space, emergency, and the operational environment. Liquidity risk The reduction of losses is important for the business because it upholds the companys assets and customers. Liquidity risks include daily loses in cash transactions. Security installations in mobile banking is an effort to reduce these risks. Globally secure mobile and internet banking is a problem. Aztek needs concrete plans for this. Credit risks This covers the largest risk factor for banks in the global system. Customers access services through cloud systems and installation applications. Its dangers come from loans, foreign exchange, swiping, equities, trade financing and forex. The modern consumers uses the credit card services for online shopping and payments. Banks face threats from unsuccessful transactions arising from failed processes. The introduction of mobile banking services on mobile devices is due to customer demands, and market changes. Other risks in credit loans include credit delays, the loss of funds due to credit transactions, calculations, exchange rates and exchange value settlement different. Market risks Economic recession and financial trends determine the pricing, interest rates, forex rates and fines. Placed on consumers by the bank it brings about fluctuations in currency, commodity and equity. The contemporary consumer prefers low interest costs and banks, which have long-term strategies against their competition. Business risks include national, regional and global management issues. There are risks arising from systematic risks, which affect the economy of the bank. The external environment such as cloud computing shapes the trend in the market systems. It comprise of perceived risks such as failed investor risks(Fahlenbrach Stiultz,2011). Compliance Contracts address issues such as leases and sponsorship for the projects. In a global organization such as Aztek, the Australian regulations and statutory laws apply(Governement, 2015). These involve employees and the community as well as company installations. Engaging in a business model with an external service provider has challenges among them is the challenge of breach of contract. The Codes of conduct ensure compliance to the rules. Clients need a clear understanding of the terms and penalties, loss of revenue purchasing practices, and litigation challenges. Risk Analysis The success of this project depend on effective management approaches including an analysis of the potential risks. These require an effective management support system. An effective plan looks at the risk factors in a project in order to measure their viability. The Aztek IT Risk Assessment lead involve different stakeholders and technologists hence an effective decision-making process is required. The Australian government incorporates cloud computing among ICT arrangements as illustrated below(Kluwer Delbaere, 2016). Risk management identifies the potential risks, vulnerabilities and the risk control processes. When developing competitive processes, the financial organizations must be aware of the need for compliance with the legal framework affecting business continuity, cloud service provider, and service location. The Risks, Vulnerabilities and Threats Cloud computing and IT installation of technology from external sources poses risks. The project plans to make installations on laptops, pads, tablets and mobile phone devices. Each of these devices face challenges and exposure to malware and other effects. The incorporation of a corporate-wide email for archive systems need a compatible and compliant design. Upgrading applications on desktop operating systems also needs IT Security Policies and procedures. In order to understand the risks, it is crucial to understand vulnerabilities, threats and risks(Grobauer, Walloschek, Stocker, 2011). This clarification provides a guide on the types of risks involved in the process. Threats This is a potential cause of alarm for an organization. It includes system interference. Different agents of these threats include criminals, bank fraudsters and organized criminals. Aztek needs a plan that foresees this as a future challenge for the organization. The legal framework admonishes the financial service provider from compromising client assets. In order to prevent this failure, and combat theft, the plan makes provision for better security software and the training of its employees with codes of conduct for risk aversion(Cappelli, Moore, Trzeciak, 2012). Employees can also become threats if they are not aware of the risks. Competitors often use employees to steal crucial information and company data. The company needs protection from hacking systems and unauthorised access. In some regions, access by government and terror groups(Martini Choo, 2012). Contemporary criminals have the capacity to fabricate identity for unauthorised entries. Vulnerabilities Defined as weaknesses characterising a system, the vulnerabilities expose the system to threats. An example is weak passwords, insecure online banking and constant cyber-attacks. Data security requires privacy protection as one of the major safety measures(Chen Zhao, 2012). This service delivery approach is crucial for cloud computing which involves different IT experts and networking systems. Public clouding is vulnerable to software bugs and information leaks. Broken financial processes also expose the system to such threats. This calls for changes in hardware and software installations. Aztek needs effective measures such as backup systems and prevention of human errors. As part of its customer service, the brand needs to inform its customers about the value of having stronger passwords and protecting personal computer devices. Aztek might consider using top security OS such as Apple devices. Risks Consequences or potential losses or damages leading to the destruction of Azteks assets. This is a result of a vulnerable system or applications such as password access. Cybercrime is one of the major problems facing business organizations today. Cyberstalking and profit-oriented criminals exist in cloud systems. Aztek as a group needs to invest in software applications and systems, which prevent such disruptions. Failure to do so exposes the company to threats of money losses, compromised privacy, loss of confidence and legal suites. As a best practice, the company invests in quality systems that enhance its reputation as a safe financial service provider(Gonzalez, et al., 2012). Data damages such as service interruptions and network unavailability is another risk. In such a case, the company needs to make changes such as upgrading the systems of modification. Practical law for IT in the finance industry includes outsourcing issues(Wang, Wang, Cao, Lou, 2012). These regulations provides guidelines for procedure such as hiring global consultants, purchasing software applications for the office functions and integration of Aztek services with other businesses. A merger between Aztek and a technology company needs clear business terms. The international, local and national environments have adoption and integration. The two companies forming the merger operate within a contract policy that determines payment for technology services or software application. Risk management tackles any issues of conflict that may arise. It shapes an effective framework that includes policy changes and regulations from the industry and the two companies. Infrastructural Framework Poor Management of legal arrangements poses threats to the company image and workforce. Exposing employee data, Aztek facilities and commercial processes makes the organization vulnerable for attacks. A crisis arises when hackers access the company website and share the information to competitors. Research indicates that Australian banks are among the most vulnerable globally(Bavas, 2015). The findings by Kaspersky Lab a cyber-security firm indicated the advancement of criminal networks, which monitor banks and employees to fleece the company of millions through customer account. Aztek has the private cloud system for its employees across different branches and it has software installations for different services accessed by the consumers. Other stakeholders such as partners also have portals. A reliable infrastructural network that is free from third party access hinders interference from hackers, and malware. Compliance with legal terms helps customers to download applications from reputable company sites. It thus prevents the risks by controlling damage. In case of a breach, or IT systems exposure to fraud, the company also needs a crisis management plan. This includes reorganization of the system and infrastructural networks. Risk management mechanisms have consideration for components such as events, changes in technology, target profile, negative public perception and software manipulation. A comprehensive solution has provisions for Abuse from legitimate users, illegal or rogue users and software vulnerabilities. Sometimes additional installations pose a threat hence Aztek needs an authentic database and Denial of Service (DoS) installations(Zargar, Joshi, Tipper, 2013). Data Security Cloud computing service models comprise of infrastructural systems (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS)(Subashini Kavitha, 2011). Security installation at all these levels is necessary. Mitigating the risks calls for strengthening the IT systems in order to prevent stolen passwords. This includes security installations in multimedia applications for downloads and uploads. Regular hardware and software maintenance must be in place. This includes checks against any communication vulnerabilities that may arise. Employees and other human vulnerabilities also need to be in check. Assessing IT Risks Assessing the IT systems for risk in business terms is critical because it highlights the quantitative and qualitative risk management approaches. This comparison identifies the external factors, internal manipulations and system errors. The quantitative analysis points out the incremental attacks and interference from other channels. It takes note of network weaving and frequency in authorization attacks. It facilitates for the identification of information vulnerabilities arising from IT capacity and software disruption as well as scripts. The quantities risk quantifies objectives, decisions and achievable metrics such as costs and schedules or targets for system installations and upgrades(Shaikh Karjaluoto, 2015). This gives a higher quality analysis with data variations for a better risk analysis. It gives projections for the projects timelines too. Qualitative analysis looks at the business trends and management challenges. It recommends weaknesses in business processes and inadequate controls for effective change management. This form of risk assessment, which facilitates for the classification of risks. It also indicates the relationship between causes of IT insecurities for Aztek and its cloud systems effects. This helps to identify the pros and cons of the broad network access used in the project, which advocates for the use of mobile phones and tablets(Benlian Hess, 2011). Although the quantitative analysis provides for a deeper understanding, it takes time and it may not explain the probability. It is important to have a practical description of the threats for an understanding of the impact and extent of the risk exposure. Therefore, both methods are effectively used together. The qualitative analysis checks for performance metrics in order to bring out the occurrence of the threats. The distribution of the risks helps stakeholders in the industry to make the necessary changes such as system upgrades. Aztek depends on the quantitative risk factors for mathematical simulations but it needs to combine the risks for effective application across the projects. Cloud computing and installation of external software involves a complex IT project that needs software and system applications(Aleksandro, Fedorovich, Victorovna, 2016). Insurance As IT risks continue to advance, companies adopt smart tactics such as risk insurance because technology is expensive. Managing risks calls for limitations or risk transfers. Based on the fact that risks are inevitable in clouding and technology installations, this approach examines the company profiles to create a plan for acceptable and unacceptable risks. Business risk liability can bring down a multinational company hence liability insurance includes IT for data protection and recovery. This is a cover plan for uncertainties(Corner, 2013). It caters for data migration, risk mitigation and insecurities faced by businesses today. The availability of a wide variety of insurance plans includes personal devices such as laptops, pads, and PDA. Such networks are prone to attacks from malware and the financial industry is at the highest risk. In Australia the law is unclear about the external storage of data hence most companies are sceptical about cloud computing insurance. General liability caters for risks in business activities including data damages and losses(Jain Shanbhang, 2012). Risk rating guide Insurance risk rating compares the losses and the compensation. In IT insurance, there are provisions for short-term and long-term coverages for systems protection. The ratings addresses security breaches, down time and effects that this may have on users(Cloud Insure, 2014). In this case, it protects customers from server complications and inconveniences. This is a business strategy for Aztek as well as its IT cloud service provider. Forming partnerships in the acquisition of insurance is one way to overcome these liability challenges. Conclusion Aztek is a financial service in the contemporary system where technology is part of management practices. Innovation improves functions and operations in a financial business. As a best practice, industry players invest in it for successful implementation. This report analyses cloud computing and software installations as a major project underway for Aztek. It brings out the importance of risk management and some of its challenges. References Aebi, V., Sabato, G., Schmid, M. (2012). Risk management, corporate governance and bank perfomance in the financiak crisis. Journal of Banking Finance, 36(12), 3213-3226. Aleksandro, M. e., Fedorovich, N. A., Victorovna, P. (2016). Potential of the internet network in formation of the assortment of the trade organizations. European Science review, 1-2. Bavas, J. (2015, February 17). Australian banks fall victims to multinational hacking attack: cyber security firm. ABC. Retrieved from https://www.abc.net.au/news/2015-02-17/banks-victim-of-multi-national-hacking-attack-security-firm-says/6130370 Benlian, A., Hess, T. (2011). Opportunities and risks of software-as-a service: Findings from a survey of IT executives. Decision Support Systems , 232-246. Bessis, J. (2011). Risk management in banking. John Wiley Sons. Cappelli, D. M., Moore, A. P., Trzeciak, R. F. (2012). The CERT guide to insider threats: how to prevent, detect, and respond to infomration technology crimes ( Theft, Sabotage, Fraud). Addison-Wesley. Chen, D., Zhao, H. (2012). Data security and privacy protection issues in cloud computing. Computer Science and Electronics engineering ( ICCSEE) (pp. 647-651). IEEE. Chiu, C. M., Wang, E. T., Fang, Y. H., Huang, H. Y. (2014). Understanding customers repeat purchase intentions in B2C e-commmerce: the roles of utilitarian value, hedonic value and percieved risk. Information Systems Journal, 24(1), 85-114. Cloud Insure. (2014, May 16). Insurance Program Design and Management for clouds. Cloud insure. Retrieved October 2, 2017, from https://cloudinsure.com/news/news/30 Corner, S. (2013, July 13). Insurerers laging on cloud cover. The Sydney morning Herald. Retrieved October 2, 2017, from https://www.smh.com.au/it-pro/cloud/insurers-lagging-on-cloud-cover-20130708-hv0qa.html Fahlenbrach, R., Stiultz, R. M. (2011). Bank CEO incentives and the credit Bank CEO incentices and credit crisis. Journal of Financial Economics, 99(1), 11-26. Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., carvalho, T., Naslund, M., Pourzandi, M. (2012). A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems, and Applications, 1(1), 11. Governement, A. (2015, August). Information security mangement guidelines: Risk management of outsourced ICT arrangements ( Including Cloud). Retrieved from Protective security: https://www.protectivesecurity.gov.au/informationsecurity/Documents/AustralianGovernmentInformationSecurityManagementGuidelines.pdf Grobauer, B., Walloschek, T., Stocker, E. (2011). Understanding cloud computing vulnerabilities. IEEE Security Privacy, 9(2), 50-57. Hooper, C., Martini, B., Choo, K. K. (2013). Cloud computing and its implications for cybercrime investigations in Australia. Computer Law Security Review, 29(2), 152-163. Jain, A. K., Shanbhang, D. (2012). Addressing security and privacy risks in mobile appllications. IT Professional, 14(5), 28-33. Kluwer, W., Delbaere, W. (2016, October 13). MAS's outsourcing risk management guidelines: Bringing compliance closer to the cloud. Retrieved from Wolkers Kluwerfs: https://www.wolterskluwerfs.com/onesumx/commentary/MAS-outsourcing-risk-management-guidelines.aspx Lekkas, D., Zissis, D. (2012). Adressing cloud computing security systems. Future Geerations Computer Systems, 583-592. Low, C., Chen, Y., Wu. (2011). Understanding the determinants of cloud computing adoption. Industrial Management and Data Systems, 111(7), 1006-1023. Martini, B., Choo, K. K. (2012). An integrated conceptula digital forensic framework for cloud computing. Digital Investigation, 71-80. Melville, J. (2016, October 11). The value of an integrated GRC environment. Retrieved from LinkedIn: https://www.linkedin.com/pulse/value-integrated-grc-environment-james-melville-fcca PWC. (2017). Escaping the Commondity Trap: The future of banking in Australia. Retrieved from Pwc: https://www.pwc.com.au/pdf/pwc-report-future-of-banking-in-australia.pdf Ravi, K. J., Ramachandran, N. (2011). Factors influencing the outsourcing in the banking sector in India. Strategic Outsourcing: An International Journal, 4(3), 294-322. Rittinghouse, J. W., Ransome, J. F. (2016). Cloud computiing implimentation, management and security. CRC Press. Samandari, H., Havas, A., Harle, P. (2016, July). The future of bank risk management. Retrieved from McKinsey Company: https://www.mckinsey.com/business-functions/risk/our-insights/the-future-of-bank-risk-management Shaikh, A. A., Karjaluoto, H. (2015). Mobile banking adoption: A literature review. Telematics and Informatics, 32(1), 129-142. Subashini, S., Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 1-11. Upper, C. (2011). Simulation mehods to methods to assess the danger of contagion in interbank markets. Journal of Financial Stability, 7(3), 111-125. Wang, C., Wang, Q. R., Cao, N., Lou, W. (2012). Toward secure and dependable storage services in cloud computing. IEEE transactions on Services Computing, 220-232. Zargar, S., Joshi, J., Tipper, D. (2013). A survey of defense mechanisms against distributed denial of service ( DDoS) flooding attacks. IEEE communications survey tutorials, 20(16), 20146-2069. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation Computer Systems, 28(3), 583-592.
Subscribe to:
Posts (Atom)