Discuss the influence the commercial operations, Computer Network Security

Assignment Help:

Question:

A regional police force has the following corporate objectives:

? to reduce crime and disorder;
? to promote community safety;
? to contribute to delivering justice and maintaining public confidence in law.
The force aims to achieve these objectives by continuously improving its resources management to meet the needs of stakeholders. It's only financial objective is to stay within its funding limits.

The force is mainly public funded and it has some commercial operations, for example policing matches when the football clubs pay a fee to the police force for its officers working overtime. The police force uses this money to supplement the funding it receives from the government. The national government is proposing to privatise (that is, to sell off) these commercial operations and has already been in preliminary discussions with an international security company. This company's stated financial objectives are:

? to increase earnings per share year on year by 5% per annum; and
? to achieve a 20% per annum return on its investment.

Arguments put forward by the government in favour of privatisation focus on conflict of objectives between the mainstream operations and commercial activities, and savings to the taxpayer. However, the proposals were strongly opposed by most of the force's stakeholders.

(a) State the reasons for the differences in the objectives of the two types of organisations above. Use the scenario details to assist your answer wherever possible.

(b) State the weaknesses of the financial objective of the police force.

(c) Discuss the influence the commercial operations might have on the police force's ability to meet its stated objectives.

(d) Discuss the possible effects the privatisation of the commercial operations will have on the various stakeholder groups.


Related Discussions:- Discuss the influence the commercial operations

Threat identification-risk management, Threat Identification After ident...

Threat Identification After identifying and performing a primary classification of an organization’s information assets, the analysis phase moves onto an examination of threats

Explain symmetric and asymmetric encryption system, Question 1: (a) Dif...

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

Man-in-the-middle attacker, - Alice, Bob and Charlie have a secret key a=3,...

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Analysis of the problem of cyber attack, Q. Analysis of the Problem of cybe...

Q. Analysis of the Problem of cyber attack? According to the case, The EZ Company is a prominent organization specialized in information integration and visualization technolog

What type of rfid tag is more appropriate for ws-pass, Consider the followi...

Consider the following case study: In order to avoid criticisms of their existing manned road-toll payment system on its private road, WS-Pass has decided to adopt an automated

Factors of informtion security, Confidentiality Confidentiality of inform...

Confidentiality Confidentiality of information ensures that only those with sufficient privileges may access specific information. When unauthorized individuals can access inform

Explain how can we achieved privacy in an e-mail system, Explain how can we...

Explain how can we achieved privacy in an e-mail system.  The full form of PEM is Privacy Enhanced Mail: PEM  is  the  internet  Privacy  Enhanced  Mail  standard  adopted

ISDN, Explain the architecture of ISDN.....?

Explain the architecture of ISDN.....?

Fragment identification, FRAGMENT IDENTIFICATION: IDENT field in every...

FRAGMENT IDENTIFICATION: IDENT field in every fragment matches IDENT field in real datagram. Fragments from different datagrams may arrive out of order and still be saved out.

Explain the concept of zero knowledge proofs, (a) Describe the concept of ...

(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd