Monday, May 18, 2020
Ife, Efe and Cpm Matrix - 1375 Words
Google Case Study EFE (External Factor of Evaluation) S. no | Opportunities | Weight | Rating | Weighted Score | 1. | In future Google expand their coverage of universe with alliance LSST. | 0.05 | 2 | 0.1 | 2. | Google may explore new businesses in future related to telescope. | 0.1 | 2 | 0.2 | 3. | After implementing of LSST telescope build up-to-the-minute image of internet, which will give him competitive advantage. | 0.02 | 2 | 0.04 | 4. | After Acquiring YouTube; it can start new services for the business point of view or explore new talent. | 0.03 | 1 | 0.03 | 5. | Google can offer their professional services; for research and market trend to china mobile. | 0.02 | 1 | 0.02 | 6. | Google can alliance with otherâ⬠¦show more contentâ⬠¦| Economical, political and law in order situation uncertainty and influence | 0.10 | 4 | 0.40 | 5. | New programs offers from competitive universities | 0.15 | 3 | 0.45 | 6. | Old conventional universities values and standards | 0.10 | 2 | 0.20 | | | | | | | | | | | | | 1.00 | | 2.95 | Conclusion: KASBIT has a total weighted score of 2.95 indicating that the firm is above average in its efforts to pursue strategies that capitalization on external opportunities and avoid threats. IFE Internal Factor of Evaluation S. no | Strength | Weight | Rating | Weighted Score | 1. | Recognized with HEC in ââ¬Å"Wâ⬠category | 0.15 | 4 | 0.60 | 2. | Member of AACSB and Certified by URS | 0.05 | 3 | 0.15 | 3 | Located in center of the city | 0.10 | 3 | 0.30 | 4. | M. Phil PhD Programs | 0.05 | 3 | 0.15 | 5. | Four Campuses over different locations in Karachi | 0.10 | 4 | 0.40 | 6. | Renowned as KASB Group | | | | | Weakness | | | | 1. | Condition and atmosphere of Cafeteria | 0.10 | 3 | 0.30 | 2. | Administrative staff | 0.10 | 3 | 0.30 | 3. | Visiting Faculties selecting criteria | 0.10 | 4 | 0.40 | 4. | Space and Collection of Literature is limited in Library. | 0.10 | 3 | 0.30 | 5. | Students inquiries, registration and Announcement procedure is online instead rigid and conventional | 0.15 | 4 | 0.60 | 6. | Only expend their campuses in Karachi instead all over Pakistan. | 1.00 | | 3.35Show MoreRelatedHarley Davidson case analysis -- with IFE, EFE, CPM, and TOWS matrix...1588 Words à |à 7 Pagesà ·Independent distributor in Sweden has developed a floating store and restaurant à ·Spanish local distributor is adding some new dealers to meet the increasing demand Corporate Culture: - Competitive - Goal-Oriented - Creative Internal Evaluation Matrix Internal Strengths WeightRatingWeighted Score 1. Loyalty of its Customers .104.4 2. Harley is the only major American motorcycle manufacturer.104.4 3. Most admired and recognized companies in the world.053.15 4. Has strong financial position/performanceRead MoreCompetitive Analysis : The Competitive Profile Matrix ( Cpm )1519 Words à |à 7 Pages Competitive Analysis The Competitive Profile Matrix (CPM) is a tool that compares the firm and its rivals and reveals their relative strengths and weaknesses (Competitive Profile Matrix, 2013, October 29). These factors are influenced by external and internal challenges. The illustrated CPM below compares Dominoââ¬â¢s Pizza with two of its top competitors, Pizza Hut and Papa Johnââ¬â¢s. The results of the CPM give Dominoââ¬â¢s Pizza a 3.3, which is above average in its respective industry. The firm also hasRead MoreExternal and Internal Analysis of a Company: Project2749 Words à |à 11 Pagescomprehensive SWOT analysis in bulleted form. (10) Prepare the EFE matrix for that company with not more than 10 external factors relevant to the firm. (5) Prepare the IFE matrix for the company with not more than 10 internal factors of the firm. (5) Construct a large nine-cell diagram that will represent your TOWS matrix for the firm. Label the cells appropriately and suggest 5-10 strategies using TOWS matrix. (10) Diagram the BCG matrix for 5-10 products of the selected firm. (10) In the lightRead MoreAnalysis Of Mcdonald s The Golden Arches 1621 Words à |à 7 PagesIFE Matrix The IFE Matrix gives a description followed by a rating and a weighted score of the strengths and weaknesses of McDonaldââ¬â¢s Corporation. McDonaldââ¬â¢s has many strengths but one of their largest is their brand recognition around the world. The ââ¬Å"Golden Archesâ⬠is one of the most iconic and recognizable symbols in the world, hence giving McDonaldââ¬â¢s an immediate source of marketing. McDonaldââ¬â¢s has a majority of the market share among all fast food dining corporations at 15.2% as of 2017. WithRead MoreEstee Lauder Case 1 Analysis2757 Words à |à 12 PagesStatement Mission Statement 4 Vision Statement: 4 Mission Statement: 4 External Audit 5 Opportunities Threats 5 Competitive Profile Matrix (CPM) 6 External Factor Evaluation (EFE) Matrix 7 Internal Audit 8 Strengths Weakness 8 Financial Ratio Analysis 9 Internal Factor Evaluation (IFE) Matrix 10 SWOT Matrix 11 SPACE Matrix 12 Internal External Matrix 13 Recommendations 14 Case Abstract The Estee Lauder Companies Inc. engages in the manufacture, marketing, and sale of skin care, makeupRead MoreVitasoy6494 Words à |à 26 PagesFactor Evaluation (IFE) Matrixâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦...8 4.4.2 External Factor Evaluation (EFE) Matrixâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.9 4.4.3 Competitive Profile Matrix (CPM)â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.10 4.5 Strategy Formulation : Analysis of Strategiesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ 10 4.5.1 Strength-Weakness-Opportunity-Threat (SWOT) Matrixâ⬠¦Ã¢â¬ ¦..11 4.5.2 Internal-External (IE) Matrixâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..12 4.5.3 Boston Consulting Group (BCG) Matrixâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦12 4.5.4 Grand Strategy Matrix â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦13Read MoreEssay about rothaermel exercise 1720 Words à |à 3 Pagesneeds to construct the SWOT Bivariate Strategy Matrix. Deliverables for this section include: SWOT Analysis Internal Factor Evaluation (IFE) Matrix External Factor Evaluation (EFE) Matrix SWOT Bivariate Strategy Matrix BCG Matrix (follow the Strategy Clubââ¬â¢s template, not the textbookââ¬â¢s format) Competitive forces, Competitive Profile Matrix (CPM), and competitorââ¬â¢s ratios Deliverables for this section include: Competitive forces analysis CPM and analysis Competitorââ¬â¢s ratios and analyis Read MoreCompetitive Profile Matrix Emirates2382 Words à |à 10 PagesCompetitive Profile Matrix (CPM) Author:à admin Wednesday, 24 Sep 2014 Step 4. Competitive Profile Matrix (CPM) In order to construct a competitive profile matrix, it is necessary to determine critical success factors in airline industry. These are: strong management, organization of routes, availability of non-stop flights, qualified workforce, in-flight services and service promotions, price competitiveness, effective financial management, cost management. Main competitors of Emirates Airline canRead MoreAvon Company4524 Words à |à 19 PagesEvaluation (EFE) 9 Steps 9 EFE Matrix 10 Score Interpretation 10 The Internal Factor Evaluation (IFE) Matrix 11 Steps 11 IFE Matrix 12 Score Interpretation 12 Competitive Profile Matrix (CPM) 13 Strategy Formulation Framework ââ¬â Matching Stage 14 SWOT Matrix 14 S-O Strategies 14 S-T Strategies 15 Boston Consulting Groupââ¬â¢s Matrix 17 Strategic Position and Action Evaluation (SPACE) Matrix 18 Calculations 18 SPACE Matrix 19 Analysis: 20 Grand Strategy Matrix 21 StrategyRead MoreAnalysis Strategy Macys1608 Words à |à 7 PagesDillardââ¬â¢s, JC Penney, and Saks * Lower price competition * Numerous employee layoff * A change in customers has occurred over the past year, but Macyââ¬â¢s has not changes to satisfy customers. EXTERNAL AUDIT Competitive Profile Matrix (CPM) No | Critical Success Factor | | Macyââ¬â¢s | Dillardââ¬â¢s | Nordstorm | | | Weight | Rating | Weighted score | Rating | Weighted score | Rating | Weighted score | 1 | Advertising | 0,12 | 4 | 0,48 | 3 | 0,36 | 3 | 0,36 | 2 | Financial Position
Wednesday, May 6, 2020
Those That Founded The Constitution Intended For A President
Those that founded the constitution intended for a president to be a man of impeccable prestige but not a man with and excessive amount of power. A great amount of people harbored a considerable amount of rear about if their chief executive became too powerful. Over the time of the Progressive Era, US citizens did not only shift their mindset and notion concerning what the national government should do, but also their views about how strong the president should be. The trident of the Progressive Eraââ¬âRoosevelt, Taft, and Wilsonââ¬â collectively held office from 1901 and 1921. Though opposing in many ways, they all possessed a strong obligation to reform. They defied/challenged the economic and political power of monopolistic giants and strivedâ⬠¦show more contentâ⬠¦Roosevelt believed that Taft would ensure reform in his program. That being said, two men were complete opposites. Roosevelt was outspoken and loved the limelight, whereas, Taft was quiet and reserved. Roosevelt took bold actions, Taft was cautious. In short, Taft was a apprehensive, lackluster campaigner. Yet, Roosevelt s backing was the catalyst that truly caused him to obtain victory. As president, Taft sustained the movement for reform. He battled to bind the supremacy of big corporations and added land to the national forest system. That being said, Taft did not see eye to eye with other progressives. Progressives sought reduced tariffs on imported goods. The result of this would cause foreign products to be less expensive for American consumers. On top of that, lower tariffs would likewise cause a surge competition, forcing American manufacturers to lower their prices. All the leading businesses preferred high tariffs. Although Taft ran for president on a low-tariff platform, yet in 1909 he settled to sign the Payne-Aldrich Bill, which raised tariffs. This action tarnished Taft s record as a progressive. The 1912 election also highlighted a few candidates. Woodrow Wilson, a man of firm progressive principles, represented the Democratic Party. Labor leader Eugene V. Debs, who ran as a socialist, sponsored more radical change, urging voters to make the working classShow MoreRelatedThe Branches Of The Us Government1685 Words à |à 7 PagesWashington, being the first President, are still evident. Although the founding father may not have intended to, they made the Legislative branch the most powerful branch out of the three. The Legislative branch, composed a Senate and a House of Representatives, has the same basic structure that the founding fathers originally created, but the types and amounts of people that are inside to the organizations are drastically different. As an example, when first founded, the Congress, consisting ofRead MoreThe Branches Of The Us Government1668 Words à |à 7 PagesWashington, being the first President, are still evident. Although the founding father may not have intended to, they made the Legislative branch the most powerful branch out of the three. The Legislative branch, composed a Senate and a House of Representatives, has the same basic structure that the founding fathers originally created, but the types and amounts of people that are inside to the organizations are drastically different. As an example, when first founded, the Congress, consisting ofRead MoreEssay about Politics and Money886 Words à |à 4 Pagesdid legalized theft become so acceptable for it is not part of our history? Lets look at some of that history. In 1794, James Madison, the acknowledged father of our Constitution, wrote disapprovingly of a $15,000 appropriation for French refugees saying, I cannot undertake to lay my finger on that article of the Constitution which granted a right to Congress of expending, on objects of benevolence, the money of their constituents. This vision was restated even more forcefully on the floor ofRead MoreComparison Nevada and Us Constitution Essay828 Words à |à 4 PagesComparison of the Nevada and the U.S. Constitutions It is generally understood that the United States is built upon the principles of democracy, in which the majority consensus of the citizens helps to define the shape of issues or elections. However, in assuming that the Constitution - the document upon which such practices are founded ââ¬â is inherently democratic is only partially accurate. Indeed, it has been frequently argued that the U. S. Constitution is representative of the rule of lawRead MoreUS Constitution Then and Now Essay1081 Words à |à 5 PagesUnited States government was founded on a written set of principles known as the Constitution. There have only been 17 amendments, or changes, since ratification. While the United States has evolved with time the role and function of the government, and the way the government guarantees civil rights and liberties, has also evolved. These changes have resulted from changing or broadening of the interpretation of the constitution. Although the core of the constitution has not changed, it has expandedRead More The Civil War Essay925 Words à |à 4 Pagesfound in the Declaration of Independence but not in the Constitution nor in any Federal or State law, as a basic and fundamental concept in America. This is very true since this country was founded on equality but apparently not granted in the Constitution to all. In the time of the Civil War many Americans forgot what equality meant, freedom for all - black and white. nbsp;nbsp;nbsp;nbsp;nbsp;The Gettysburg Address was written by President Abraham Lincoln on November 19, 1863. It was deliveredRead MoreThe United States of America Essay871 Words à |à 4 PagesThe United States of America Founded under the concept of a Republic (a government without a monarch, whoââ¬â¢s elected representatives are responsible to the governed) the founding fathers some 235 years ago set out declare its independence and establish a new nation claiming their own sovereignty and rejecting any allegiances to the British Monarch. This of course sparked the Revolutionary War in April of 1775 that lasted until September of 1783. I am amazed that 38 men and later others could duringRead MorePresident Of The Executive Branch And The President Essay1575 Words à |à 7 PagesFounded on the premise of a Republican Democracy where the three branches of government, elected by the people to which it governs, are held accountable to one another by one another, the expansion of the powers of the Executive Branch and the President is a troubling matter as it at times encroaches on the freedoms and liberties so granted to us as citizens of the country and the earth. This increasing of the powers of the President has ultimately made the President the most dominant force in politicsRead MoreThe Athenian and American Systems of Government1671 Words à |à 7 Pagesthen vote on the laws. They themselves are limited by a constitution. Democracy is a flawed government system. The Constitutional Republic is also flawed, however, it is better at safeguarding individual rights, when applied correctly. Therefore, a Constitutiona l Republic is a better system than a Democracy. Athens was one of the largest Greek city states. (Stockton, 4). It was about one thousand square miles (Stockton, 4). Athens was founded in the 8th century BC (Muller). It was at first ruledRead MoreThe Separation Between Church And State1492 Words à |à 6 Pagesof religion stands as rights both alienable, natural right, and unalienable, God-given right. As President Thomas Jefferson states in letters to the Baptist Association of Danbury, Connecticut, the federal government stands prohibited to regulate or control those who exercise religion. The predominant issue between church and state does not rest on protecting those avoiding religion, but to protect those choosing to practice religious freedom. Roger Williams and John Winthrop firmly believe that church
Business Research Method Proposal Research-Samples for Students
Question: What challenges manifest in the quest for promoting information security management? How much is information security embedded in the goals, strategies, and culture of the Australian university scene? Answer: Introduction Understanding the risks that emerge in the name of cyber crimes and cyber threats is critical in the Australian universities scene, given the widespread usage of information communication technology systems in the sector. First, it is important to consider that in the present world of sharing information online, people work with information that is stored or shared via applications that are stored in the operating systems that computers have (Choo 2010, p. 1). The usage of information services that are available through computer applications continues to grow by the day thanks to the omnipresence of the internet and the standards therein, as established by Van Der Aalst, Ter Hofstede, and Weske (2003, p. 3). This is especially true in the cultures and economies that are deemed as being open, with the example of countries like Australia (Choo 2011, p. 719). Australia has been noted to thrive because of the presence of profound information and communication technologies (Choo 2011, p. 719). However, with the widespread usage of the internet, both positive and negative attributes evolve. When looking at the negativities that emerge from the rampant usage of internet, it is essential to look at the deprivation of privacy (National Research Council 2007, p. vii). Speaking of privacy, it is essential to note that one of the connotations of the concept that has been developed by the National Research Council (2007, p. 3) constitutes the essence of having control over information. The development of ICT systems in businesses as well as the governments has presented an apt environment for the promotion criminal activities under the bracket of cyber crimes and cyber attacks (Choo 2011, p. 719). In Australia for instance, cyber crimes cost businesses the tune of $600 million per annum (Saini, Rao Panda 2012, p. 204). The number of cyber crimes that occur in the business settings in Australia has been reported by the PwC (2015, p. 1) were noted to be the highest in the world, with the large business organizations reporting on the rising cases of the vice. The alarming rank promotes the need for research on the subject of cyber crimes in the Australian business world in particular. In the bid to identify the most suitable area for conducting research, the researcher opted for the Australian universities business scene because universities, as established by the Guardian (2015, p. 1), tend to make use of information systems in almost all of their operations and bus iness. The same can be said for American Universities, which use ICT systems in teaching, learning, administration, and research work (Lane 2007, p. 11). Given the fact that limited research has been present in the understanding of cyber crimes in the Australian universities, and the fact that the country has the largest cyber threat risk, clearly, it is about time that this study gap is filled. On that note, the proposal will seek to precipitate the need for gaining an in-depth understanding of the concept of the risks of cyber threats and cyber crimes in the Australian universities scene. Project Objectives The objectives of the project will be as presented below; To understand the widespread nature of information sharing in the university sector To draw the line between information sharing in universities and the promotion of cyber threat/crime risks by developing a conceptual framework To identify the value that is embedded in information system management To understand the role of the management systems in the Australian university in combating cyber incidents To propose evidence-based recommendations that universities in Australia should consider adopting as a means for promoting cyber protection Project Scope The scope of the project will seek to gain understanding into the concept of cyber security in the Australian business scene, with a bias to the universities. It is essential to note that the ICT systems in the universities contain a plethora of information, which range from financial details, medical data, student biodata, and expensive research as identified by Wagstaff and Sottile (2015, p. 1). The rich information that is available in universities makes them the ultimate targets for hackers (Wagstaff Sottile 2015, p. 1). On that note, the project will seek to dig deeper in the bid to capture the cognizance behind the occurrence of cyber incidents in the Australian universities business scene. Literature Review In the bid to understand the steps that have been made in research, as well as the gaps that are available on the subject of cyber security in the universities, a review of literature was conducted. The literature review section was organized in such a manner that it allowed the researcher to draw attention to certain subjects that are of interest to the topic at hand. On that note, the following themes were considered in the literature review section. Information in the Modern Society One theme that the researcher considers to be essential to the study is the understanding of the role that information plays in the modern society. A study by Lane (2007, p. 21) revealed the fact that there is a growing need for having information accessibility in the modern societies. The meaning is that in the present social structures, an increasing importance in information sharing is becoming fundamental. Information sharing in the current world is facilitated by the presence of electronic communities, and so organizational structures, as well as the foundations of their information systems, are imperative. There is a link that rests between the reliance that exists on information systems in the modern societies, and the information that is shared. This shows that there is a growing need for beefing up protection of ICT systems against the occurrence of threats and risks that may emerge in the form of cyber crimes. ICT in Universities and the Need for having Information Security Protection When looking at the sector for higher learning, it is essential to appreciate the fact that these institutions have developed a dependency in information sharing across online networks to support their core functions. The core functions that were referred to earlier that have prompted the widespread usage of ICT in universities take note of learning, research and teaching, where information is created and shared. Because of the above information regarding the significance of ICT systems in universities, it is imperative to consider the importance of securing information that is of importance to the institutions of higher learning. As established in the studies by Dhillon and Torkzadeh (2006, p. 304), maximizing control systems in the organizations was shown as being essential to the process of instigating the security of information systems. On a similar light, given that universities are considered to be business organizations, they should also consider acknowledging the role of inf ormation security, especially when looking at the business and research information that is available therein. It is essential that universities consider strategic information resource as being a critical asset for universities that has undoubted value. When information is considered as a strategic asset in the institutions of higher learning, automatically, it would mean that this kind of an asset would require protection that is deemed as being appropriate. The proper control would ensure that information availability, integrity and confidentiality are regulated. Challenges and Implementation of Information Security Control It is one thing to point out the need for setting up controls for the ICT systems in the universities as means of mitigating the possible risks that emerge in the form of cyber crimes and threats, and it is another to follow through with the systems that foster implementation of information security. In the universities, adopting the activities that foster ICT control that is effective is not quite clear, as established by Wood (2000). On that note, it is essential to note that awareness is vital to the universities, particularly when it comes to the erection of new positions of office such as Coordinators, and Information and Security Officers, which will play a fundamental role in beefing up information security. Information security should also be considered as being an organizational responsibility that has to be factored in the processes of the organization. This is a major concern given that the funding that is allocated to information security may not seem to match up to the s ecurity needs of the organization. Asides from poor budgetary allocations, other hurdles that impair with the process of promoting adequate information security take note of the lack of commitment, lack of knowledge, and guidance. Oblinger (2003, p. 1) identifies the fact that educators support the need for having information security systems, but differences in opinions occur when options are proposed. This maybe partly because of the absence of adequate risk analysis, which can reveal all the necessary information that is required in launching proposals for beefing information security. When looking at the challenges that emerge in the quest to boost effective information security, it is essential to mention the need to integrate the IS with the cultural values that are in existence in the universities. This idea of integrating IS with the strategies of a firm was propelled by Kotulic and Clark (2003, p. 597). When universities have effective systems that foster information security, it shows that the institutions have the top information structures that support the achievement of its goals. Having an understanding of the best system to adopt for the universities is also essential. Clearly, information security management in the varsities can be achieved with the appreciation of the increased dependency of the universities upon the electronic sharing of information as well as the emerging events that present a threat to the information that is deemed as being of high value in the universities. Research Design and Methodology In the bid to respond to the above research questions, as well as to meet the study objectives, a research study will be conducted. A quantitative research approach will be employed as noted below. Quantitative Research It is essential to note that quantitative research makes use of numerical analysis, where statistical features are classified, counted and conclusions drawn from causalities (University of Southern California 2017, p. 1). In the present research, a quantitative study design would be facilitated by the use of a structured questionnaire, which will function as the research instrument. The questionnaire will contain questions that will be related to the topic of cyber crimes in Australia's university sector. The design of the study will be a survey research. Survey research is critical in gaining the insight of the participants regarding a particular subject, and many respondents can participate (Alderman Salem 2010). In the survey research, an audience will be identified. The survey provider will then be identified, which will be Google forms. The survey will then be conducted, which will be followed by an evaluation in the form of data analysis. Data analysis will be facilitated by the preparation of a codebook, setting up of the structure of the data, data entry and screening of errors. The data will then be explored by the use of graphs and descriptive information. Finally, determination of relationships will be done in the bid to make a decision. Random sampling will be employed in the study, where the target respondents will be the staff members and management in the Australian universities. The selected sample size is 300 respondents. A pilot test will be done to promote validity and reliability of the study. Research Limitations At the end of the study, the researcher will identify whether the study was effective and if limitations were present in the research design i.e. sampling, research design instrument, data collection, data analysis, and decision-making. Time Schedule (Research Plan) The schedule of the study is as presented in the Gantt chart that is displayed in the Appendix section (Appendix A). Conclusion The problem of cyber crimes presents risks and threats to businesses including universities. The current research is essential to gaining understanding into the concept of cyber crimes in the Australian universities. The research findings will be a step in the direction towards finding evidence-based solutions to curb the adverse effects that would otherwise emanate from the acts of cyber criminals. References Alderman, A.K. and Salem, B., 2010. Survey research. Plastic and reconstructive surgery, 126(4), pp.1381-1389. Choo, K.K.R., 2010. Cloud computing: Challenges and future directions. Trends and Issues in Crime and Criminal Justice, (400), p.1. Choo, K.K.R., 2011. The cyber threat landscape: Challenges and future research directions. Computers Security, 30(8), pp.719-731. Dhillon, G. and Torkzadeh, G., 2006. Value?focused assessment of information system security in organizations. Information Systems Journal, 16(3), pp.293-314. Kotulic, A.G. and Clark, J.G., 2004. Why there arent more information security research studies. Information Management, 41(5), pp.597-607. Lane, T. (2007). Information security management in Australian Universities: An exploratory analysis (Doctoral dissertation, Queensland University of Technology). National Research Council, 2007. Engaging privacy and information technology in a digital age. National Academies Press. Oblinger, D., 2003. IT security and academic values. Luker and Petersen, Computer Network Security in Higher Education, 4. PwC. (2015).Australia Tops Asian Region for Cyber Security Risks: Report. [online] Available at: https://www.pwc.com.au/press-room/2015/cyber-security-risks-oct15.html [Accessed 24 May. 2017]. Saini, H., Rao, Y.S., and Panda, T.C., 2012. Cyber-crimes and their impacts: A review. International Journal of Engineering Research and Applications, 2(2), pp.202-9. The Guardian. (2015).Universities need to plug into threat of cyber-attacks. [online] Available at: https://www.theguardian.com/education/2015/mar/31/universities-cyber-attacks-research-criminals [Accessed 24 May. 2017]. The University of Southern California. 2017. Organizing Your Social Sciences Research Paper: Quantitative Methods. Available at: https://libguides.usc.edu/writingguide/quantitative [Accessed 24 May. 2017]. Van Der Aalst, W.M., Ter Hofstede, A.H. and Weske, M., 2003, June. Business process management: A survey. In International conference on business process management (pp. 1-12). Springer Berlin Heidelberg. Wagstaff, K. and Sottile, C. 2015. Cyberattack 101: Why Hackers Are Going After UniversitiesAvailable at https://www.nbcnews.com/tech/security/universities-become-targets-hackers-n429821 [Accessed 24 May. 2017]. Wood, C.C., 2000. An unappreciated reason why information security policies fail. Computer Fraud Security, 2000(10), pp.13-14.
Subscribe to:
Posts (Atom)