Discuss the influence the commercial operations, Computer Network Security

Assignment Help:

Question:

A regional police force has the following corporate objectives:

? to reduce crime and disorder;
? to promote community safety;
? to contribute to delivering justice and maintaining public confidence in law.
The force aims to achieve these objectives by continuously improving its resources management to meet the needs of stakeholders. It's only financial objective is to stay within its funding limits.

The force is mainly public funded and it has some commercial operations, for example policing matches when the football clubs pay a fee to the police force for its officers working overtime. The police force uses this money to supplement the funding it receives from the government. The national government is proposing to privatise (that is, to sell off) these commercial operations and has already been in preliminary discussions with an international security company. This company's stated financial objectives are:

? to increase earnings per share year on year by 5% per annum; and
? to achieve a 20% per annum return on its investment.

Arguments put forward by the government in favour of privatisation focus on conflict of objectives between the mainstream operations and commercial activities, and savings to the taxpayer. However, the proposals were strongly opposed by most of the force's stakeholders.

(a) State the reasons for the differences in the objectives of the two types of organisations above. Use the scenario details to assist your answer wherever possible.

(b) State the weaknesses of the financial objective of the police force.

(c) Discuss the influence the commercial operations might have on the police force's ability to meet its stated objectives.

(d) Discuss the possible effects the privatisation of the commercial operations will have on the various stakeholder groups.


Related Discussions:- Discuss the influence the commercial operations

Explain the security service - confidentiality, Question: (a) Explain t...

Question: (a) Explain the following security services: Confidentiality, Availability. (b) Which attack will be used to bypass even the best physical and logical security m

How an attacker can effectively de-layer and analyse data, Around the globe...

Around the globe the bank controlled Co-ops (Visa, MasterCard, Discover, and American Express) have rolled out millions of smart cards under the EMV (Europay, MasterCard, VISA) sta

Logic bombs - attacks information security, Example 3: Logic bombs In th...

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

Object tracking using wireless sensor networks, This project involves the d...

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

Meaning of dns - domain name system, What do you understand by the DNS? Exp...

What do you understand by the DNS? Explain the usage of the resource rec or ds. Domain Name System is described below: The Domain Name Service (DNS) is the hierarchi

Pcm encoder, You have been asked to setup a remote temperature sensing syst...

You have been asked to setup a remote temperature sensing system for an electric furnace. The system consists of a sensor unit which feeds an analogue signal to a PCM encoder. The

Encryption, How safe is the encryption of virtual private networks?

How safe is the encryption of virtual private networks?

Compare and contrast data encryption standard, Problem (a) Using Vigen...

Problem (a) Using Vigenère cipher and given the key abc, find the ciphertext for the message: simplicity Only the 26 lower-case alphabetical characters are used in messa

Discuss the influence the commercial operations, Question: A regional p...

Question: A regional police force has the following corporate objectives: ? to reduce crime and disorder; ? to promote community safety; ? to contribute to delivering just

Find the services implemented on your computer, Question: (a) Which typ...

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd