Discuss the influence the commercial operations, Computer Network Security

Assignment Help:

Question:

A regional police force has the following corporate objectives:

? to reduce crime and disorder;
? to promote community safety;
? to contribute to delivering justice and maintaining public confidence in law.
The force aims to achieve these objectives by continuously improving its resources management to meet the needs of stakeholders. It's only financial objective is to stay within its funding limits.

The force is mainly public funded and it has some commercial operations, for example policing matches when the football clubs pay a fee to the police force for its officers working overtime. The police force uses this money to supplement the funding it receives from the government. The national government is proposing to privatise (that is, to sell off) these commercial operations and has already been in preliminary discussions with an international security company. This company's stated financial objectives are:

? to increase earnings per share year on year by 5% per annum; and
? to achieve a 20% per annum return on its investment.

Arguments put forward by the government in favour of privatisation focus on conflict of objectives between the mainstream operations and commercial activities, and savings to the taxpayer. However, the proposals were strongly opposed by most of the force's stakeholders.

(a) State the reasons for the differences in the objectives of the two types of organisations above. Use the scenario details to assist your answer wherever possible.

(b) State the weaknesses of the financial objective of the police force.

(c) Discuss the influence the commercial operations might have on the police force's ability to meet its stated objectives.

(d) Discuss the possible effects the privatisation of the commercial operations will have on the various stakeholder groups.


Related Discussions:- Discuss the influence the commercial operations

Malicious node detection mechanisms, Many applications are vulnerable to in...

Many applications are vulnerable to intrusion attacks and can provide misleading reports about misbehaving nodes. Some of the mechanisms under such a category include the Bayesian

Cost accounting, ?Examples should include direct costs items, indirect cost...

?Examples should include direct costs items, indirect costs items, as well as variable costing. ?What are at least 5 types of expenses that are associated with manufacturing the

Frame format and error detection, FRAME FORMAT AND ERROR DETECTION The...

FRAME FORMAT AND ERROR DETECTION The changed frame format also adds CRC. If there is an error happened in frame, then it typically causes receiver to removed frame. The frame

Data units at different layers of the tcp/ ip protocol suite, Data units at...

Data units at different layers of the TCP/ IP protocol suite The data unit prepared at the application layer is known a message, at the transport layer the data unit build is

Wfabilling project in java, WFABilling project in Java:  Project Title...

WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

Illustrate the label switching procedure in an mpls network, QUESTION ...

QUESTION a) Explain the terms traffic engineering, class-based queuing, shaping and grooming in an MPLS network. b) Using an example topology, illustrate the label swi

Difference between synchronous tdm and statistical tdm, Question (a) A CRC...

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X 4 + X 3 + 1 (i) Encode the data bit sequence 00111011001 using po

Calculate the dynamic range of the 16-bit scanner, You are hired as a consu...

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li

Plain-text using play-fair encryption, What is one-time pad for encryp...

What is one-time pad for encryption?  Describe how it offers both Confusion and Diffusion. Using the letter encoding discussed in class (along with one-time

Analysis of the problem of cyber attack, Q. Analysis of the Problem of cybe...

Q. Analysis of the Problem of cyber attack? According to the case, The EZ Company is a prominent organization specialized in information integration and visualization technolog

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd