Discuss the influence the commercial operations, Computer Network Security

Assignment Help:

Question:

A regional police force has the following corporate objectives:

? to reduce crime and disorder;
? to promote community safety;
? to contribute to delivering justice and maintaining public confidence in law.
The force aims to achieve these objectives by continuously improving its resources management to meet the needs of stakeholders. It's only financial objective is to stay within its funding limits.

The force is mainly public funded and it has some commercial operations, for example policing matches when the football clubs pay a fee to the police force for its officers working overtime. The police force uses this money to supplement the funding it receives from the government. The national government is proposing to privatise (that is, to sell off) these commercial operations and has already been in preliminary discussions with an international security company. This company's stated financial objectives are:

? to increase earnings per share year on year by 5% per annum; and
? to achieve a 20% per annum return on its investment.

Arguments put forward by the government in favour of privatisation focus on conflict of objectives between the mainstream operations and commercial activities, and savings to the taxpayer. However, the proposals were strongly opposed by most of the force's stakeholders.

(a) State the reasons for the differences in the objectives of the two types of organisations above. Use the scenario details to assist your answer wherever possible.

(b) State the weaknesses of the financial objective of the police force.

(c) Discuss the influence the commercial operations might have on the police force's ability to meet its stated objectives.

(d) Discuss the possible effects the privatisation of the commercial operations will have on the various stakeholder groups.


Related Discussions:- Discuss the influence the commercial operations

How an attacker can effectively de-layer and analyse data, Around the globe...

Around the globe the bank controlled Co-ops (Visa, MasterCard, Discover, and American Express) have rolled out millions of smart cards under the EMV (Europay, MasterCard, VISA) sta

How to create a security policy, Five years ago, Calgary Kids' Cloth Ltd wa...

Five years ago, Calgary Kids' Cloth Ltd was just a small retail store in downtown Calgary. The company started their own factory in SE Calgary to produce outdoor clothes for kids.

Evaluations, Evaluations, Assessment, and Maintenance of Risk Controls W...

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef

Explain the close procurement project process, Question 1: Why do we ne...

Question 1: Why do we need a Law of Contract? a Explanation Reasons to have a law of contract b Explain the close procurement project process - Explanation (causes,

Ip datagram header format, IP DATAGRAM HEADER FORMAT:  It is given in...

IP DATAGRAM HEADER FORMAT:  It is given in the figure below:   In the table: VERS denotes the version of IP. H.LEN denotes the header length in units of

Compare and contrast the trust models-pgp, a. PKI and PGP are two methods f...

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI

Systems development life cycle (sdlc)-information security, SDLC Systems ...

SDLC Systems development life cycle (SDLC) is process of developing information systems through analysis, design, investigation, implementation and maintenance. SDLC is called as

Media, what is guided media or unguided media

what is guided media or unguided media

Ip Datagram, Size of Option field of an ip datagram is 20 bytes. What is th...

Size of Option field of an ip datagram is 20 bytes. What is the value of HLEN? What is the value in binary?

Need for security-information security, NEED FOR SECURITY Primary missio...

NEED FOR SECURITY Primary mission of information security to ensure that the systems and contents stay the same If no threats, could focus on improving the systems, resulting in

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd