Discuss the influence the commercial operations, Computer Network Security

Assignment Help:

Question:

A regional police force has the following corporate objectives:

? to reduce crime and disorder;
? to promote community safety;
? to contribute to delivering justice and maintaining public confidence in law.
The force aims to achieve these objectives by continuously improving its resources management to meet the needs of stakeholders. It's only financial objective is to stay within its funding limits.

The force is mainly public funded and it has some commercial operations, for example policing matches when the football clubs pay a fee to the police force for its officers working overtime. The police force uses this money to supplement the funding it receives from the government. The national government is proposing to privatise (that is, to sell off) these commercial operations and has already been in preliminary discussions with an international security company. This company's stated financial objectives are:

? to increase earnings per share year on year by 5% per annum; and
? to achieve a 20% per annum return on its investment.

Arguments put forward by the government in favour of privatisation focus on conflict of objectives between the mainstream operations and commercial activities, and savings to the taxpayer. However, the proposals were strongly opposed by most of the force's stakeholders.

(a) State the reasons for the differences in the objectives of the two types of organisations above. Use the scenario details to assist your answer wherever possible.

(b) State the weaknesses of the financial objective of the police force.

(c) Discuss the influence the commercial operations might have on the police force's ability to meet its stated objectives.

(d) Discuss the possible effects the privatisation of the commercial operations will have on the various stakeholder groups.


Related Discussions:- Discuss the influence the commercial operations

Use the chinese remainder theorem to evaluate x, Use the Chinese remainder ...

Use the Chinese remainder theorem to evaluate x from the following simultaneous congruences: x ≡ 1 (mod 2); x ≡ 2 (mod 3); x ≡ 3 (mod 5). Calculate gcd(14526, 2568). (

Error reporting mechanism (icmp), ERROR REPORTING MECHANISM (ICMP) INT...

ERROR REPORTING MECHANISM (ICMP) INTRODUCTION:  IP gives best-effort delivery. Delivery causes can be ignored; datagrams may be 'dropped on the ground'. Internet Control Me

Functional areas in network management, Question 1 a) Explain how CSMA...

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

Explain security, W h a t do you understand by the terms security, netwo...

W h a t do you understand by the terms security, network security and information security? How network security and information security are connected? Security can be def

Information asset classification-risk management, Information asset classif...

Information asset classification-risk management A number of organizations have data classification schemes (for instance confidential, internal, public data). The classificat

Difference between a class profile and a child profile sheet, QUESTION ...

QUESTION (a) Mention two attitudes of a carer towards an inspector that could lead to negative outcomes (b) Give two performance indicators of Early Childhood Education that

Illustrate the term file carving, QUESTION (a) Illustrate the term fil...

QUESTION (a) Illustrate the term file carving. (b) What are the basic three main techniques for image steganography? (c) Distinguish between vector graphics and raster

Cyber troll case, According to the case, The EZ Company introduced a new te...

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a

People, People,Procedures,Data Asset Identification-Risk Management Th...

People,Procedures,Data Asset Identification-Risk Management The human resources, data information and documentation assets are more difficult to identify. People having knowle

Network design approach, Problem a) Give three reasons why traditional ...

Problem a) Give three reasons why traditional Network Design approach is less appropriate for many of today's networks? b) The network requires of users are organized into m

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd