Monday, February 17, 2020

MANAGEMENT APPLICATIONS Essay Example | Topics and Well Written Essays - 2500 words

MANAGEMENT APPLICATIONS - Essay Example It does not opt for any visual advertisement – print or media. Its organization structure is divisional in nature and it pays due attention to the environmental security and safety of its employees and non- employees. It is recommended that the company should pay more attention to advertising. It should launch itself into billboard and newspaper advertising which are cheaper and efficient ways of advertising to create brand recall. It should also make use of its website to spread the word of mouth. A major limitation of this project is the unavailability of the financial data. Inspite of repeated attempts to procure the data from the organization, the authors of this report were unable to fetch any data beyond 2004-2005. The report aims at highlighting particulars of the company with respect to its marketing, operations, finance and environmental aspects. It encompasses the background/history of the company, its present activities and its future business plans. Stone & Ceramic Ltd is involved in the design, fabrication, supply, installation & maintenance of natural stones, porcelain, mosaic, ceramic tiles & slab format. It has supplied its products and services in various business sectors such as transportation, hotels, residential, commercial, government, leisure, refurbishment and retail. Its exposure to various sectors speaks for its vast range of products/services. Their ‘objective is to develop into a Specialist dual trade, (Stonework & Tiling) Contractor that operates in the mid to high sector market for Primary repeat Clients’ ( Stone & Ceramic Ltd., 2009) To achieve its stated objectives, the company strives to make its contracts comprehensive enough to convey the range of services offered and maintain an acceptable clear price for the works in the contracts. It makes efforts to honour the contracts as per the agreed quality and time. The company believes that the contracts should reflect

Monday, February 3, 2020

Computer Crime and Security Essay Example | Topics and Well Written Essays - 1500 words

Computer Crime and Security - Essay Example Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future action. In regulating conduct related to the use of computers, the United States government currently defines a computer as "an electronic, optical, electrochemical, or other high-speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such a device" (United States Computer Fraud and Abuse Act (e)(l), 1984, cited in Kipper, 2007, p. 194). This definition accounts for the way in which IT has fused data storage, computing and telecommunications technologies and in so doing, touches upon the potential of both the computing and telecommunications technologies to violate the integrity and confidentiality of the stored data. The United States Department Of Commerce (2000) highlighted this threat in its report on the proliferation of computer use and internet access, not just in the United States but, across the world. As the greater majority of corporat ions, both in the United States and worldwide, are relying on IT for data storage and processing, increased popular access to IT renders corporate systems vulnerable to unauthorized penetration and the associate accessing of private and confidential data (U.S. Department of Commerce, 2000). While it is the responsibility of corporate entities to ensure the securitization of their networks, absolute inviolability is practically impossible to achieve. It is, thus, that recent years have witnessed the ever-increasing adoption of computers in the commission of crimes of fraud and theft (Power, 2000). Our company has recently fallen victim to one such incident. 3 Incident Overview On January 16th, 2008, a periodic review of our IT activities logs evidenced a string of unusual activities. Almost 10,000 patient files had been accessed and the data they contained had been transferred to an external medium, possibly an external hard drive. The IT department had no record of authorizing any individual this level of access and, indeed, there was no legitimate justification for the access of 10,000 patient files. The incident was terribly worrisome as these files contain sensitive data such as patients' social security, insurance and credit card numbers, not to mention home and place of employment addresses and contact information. The IT department immediately contacted the Legal Department and appraised its Director of the situation who, in turn, contacted law enforcement and did the same. 4 Post Mortem After reporting the incident to the Legal Department and law enforcement officials, the IT department launched an intensive post mortem investigation. The investigation, which followed standard procedures which will be described shortly, had several objectives. These were the identification of the source, as in whether it was an insider or outsider incident;