Wednesday, December 25, 2019

The Nature Of Cyber World - 1411 Words

With the overwhelming increase in the number of people of using internet for their day to day work and run businesses, it has become equally important to understand the nature of cyber world we are living in. The internet is currently being used for all sorts of activities such as browsing, messaging, music, news and on top of it for financial transactions. This is the reason why many people are getting this opportunity to misuse it for the purposes it not meant for i.e. for harming others by using internet tools both in financial and personal terms. There are group of people on internet whose only job is to get involved in such unlawful activities and make money by using other people’s sensitive information. One such cybercrime which is has gained momentum in the recent years is Phishing. In Phishing, the hackers’ tries to obtain both personal as well as financial information of users by posing as genuine websites/emails. This information is further used to bring financial and personal losses to victims. In this assignment, we are focusing on the concept of Phishing, the way it is done, its impact and how it can be prevented. Definition and Description of Phishing With the increase in use of internet for both personal and financial activities, there is an increase in the crimes related to people trying to steal the sensitive information of users for their own benefit. One such activity is called Phishing. Phishing is a process by which a hacker tries to lure peopleShow MoreRelatedCyber Bullying Is Harmful Than Traditional Bullying1512 Words   |  7 PagesCyber-bullying involves the use of technology to cause distress, harm, and torture to the victim. This involves sending abusive or intimidating messages, emails, and pictures through the use of several technological avenues. Traditional bullying involves physical aggression to a victim through using abusive verbal language and physical beating. Cyber- bullying seems to have surpassed traditional bullying because of the increased advance in the world of technology. Most bullies have turned to technologyRead MoreCyber Attacks And Physical Damage1279 Words   |  6 Pages Cyber-Attacks and Physical Damage Name Course details Supervisor Institution Date â€Æ' Abstract The internet is considered to be one of the best things to have been invented in the world. It allows for the fastest transfer of information from one place to another with the least hassle. Furthermore, it has made communication and information easier to find due to the vast and c0neected nature of the world. However, in the recent years, not only have the positive outcomes of the internet become thingsRead MoreThe Achievement And Success Of Cyber Crimes1124 Words   |  5 PagesSuccess in Cybercrime Cyber crimes refer to crimes committed against computers, computer networks of the information stored in computers (Bronk, 2008). In the past, the main problem that law enforcement officers have faced with regard to cyber crimes has had to do with the jurisdiction. With the prominence of the internet as a means communication and computers are a means of accessing information, cyber crimes have become prevalent. However, given the realisation that cyber crimes can be committedRead MoreGermanys Current Cyber Strategy1564 Words   |  7 Pagesseparate countries, Belgium, and Russia, and examine what their cyber strategies are pertaining to warfare and defense or security, and current capabilities of these countries regarding cyber-attacks or warfare. We will also be looking at the potential risks these countries present to the United States and the best was the United States can defend against these potential or emerging threats. First, let us examine Belgium’s current cyber strategy. Belgium is primarily focused on defensive with almostRead MoreCyber Defense And Security Issues789 Words   |  4 PagesUnderstanding cyber defense and security issues such as cyber-crime and cyber-attacks ensure efficient functioning of information systems. Cyber-attacks are real, unexpected and increasing in numbers according to Naumovski and Kenkov (2014) cyber defense is emerging as a high priority with the increased use of information technology. Naumovski et al. (2014) noted that understanding cyber defense and security issues would ensure efficient operation of information systems. Naumovski et al. (2014)Read MoreCyber Warfare Is The New Warfare Domain1528 Words   |  7 Pagespreemptively attack the opposing country using their cyber warfare capabilities. II. Explanation of thesis and short summary. Cyber warfare is the new warfare domain. Understanding how to morally utilize the newfound capabilities will assist the United States to maintain military dominance as well as mitigate possible immoral tragedies. Cyber warfare and war envelops a vast array of topics available for discussion. Therefore, the topics of interest within cyber warfare will be confined to attacks on electricalRead MoreThe Issue Of Cyber Crime1118 Words   |  5 Pagesthe warped sense that their identity will most likely be unknown, which will allow them to evade law enforcement. Due to technological advancements, criminals are more likely to remain anonymous after committing a criminal act when they engage in cyber crime. As a result, organized crime has been able to evolve due to the rapid emergence of technology, presenting the greatest threat to the transnational community known to date. ‘Hacktivism,’ which is the act of breaking into computer systems forRead MoreE Mail Bombing Attacks A re Just As They Sound1517 Words   |  7 Pagesforcing nature. Spam and Cyber Stalking Cyber stalking and spam usually go hand in hand due to the nature of the â€Å"attacker†. Cyber stalking is defined to â€Å"an act which is frequently done by intruding into individuals’ personal lives to cause distress, anxiety and fear† (Goutam 15). Spam on the other hand is defined as irrelevant or inappropriate messages sent on the Internet to a large number of recipients (Oxford Dictionary). With the release of programs like Facebook and Myspace, cyber stalkingRead MoreCyber World: Charms and Challenges1500 Words   |  6 PagesIntroduction The cyber world is the hot topic of discussion. With the advancement of the science and technology, human race are trying to excel their proficiency to compete the creations of the nature. Cyber world is definitely the first step towards the same path. The Internet is something that mankind feels to be an essential part of the life. We are living an era where life would nearly come to a standstill without the use of this technology. We have got into the trap of this cyber world, for whichRead MoreHow Technology Has Changed Our World1171 Words   |  5 PagesThe rapid development in media technology has changed our world in many ways. It presented a variation of challenges and expanded several opportunities for people to shape their social life. For example, Skype, one of the many instant worldwide communication accesses, has helped people gain the benefit of diverse social networks. It altered how people communicate, relate to each other, and perform their business and daily affairs very easily within a long distance range. However, the extraordinary

Tuesday, December 17, 2019

Book - Waiting for the Mahatma - Plot vs Style - 1221 Words

To what extent would you agree that style would be valued more highly than plot in the work you have chosen to explore? R.K. Narayan is one such modern writer whose novels are set in the colonial and post-colonial periods of India. In his works, he created the imaginary town of Malgudi, which was in the state of Tamil Nadu in South India, where realistic characters in a typically Indian setting lived amid unpredictable events. The book ‘Waiting for the Mahatma’ written by Narayan begins in latter part of the colonial era, in the 1940’s, when the Quit India movement is taking place. Though a greater part of this book is set in Malgudi and its surrounding villages, some scenes take place in other parts of the country like Delhi. Style†¦show more content†¦For example when the Mahatma had visited Malgudi, and was addressing people not to have bitterness towards the British and instead love them, he thinks (about Bharati): â€Å"Oh, revered Mahatmaji, have no doubt that my heart is pure and without bitterness. How can I have bitterness in my heart for a creature who looks so divine?† On a broader perspective, the entire story can be an example of this – Sriram becomes a follower of Gandhi and his noble ideas only to fulfil his desire to marry Bharati. The story of Sriram is the story that a greater part of the book is devoted to though the larger story keeps taking place in the background. When Sriram learns that Bharati is a disciple of the Mahatma, he also becomes one. He learns to spin cloth using the charkha, and his job is to spread the message of Quit India throughout the villages surrounding Malgudi. When Gandhi is jailed, Sriram begins to drift away from his non-violent methods and under the guidance of Jagadish, an extremist freedom fighter, derails trains and plants crude bombs in government buildings. When Sriram returns to his house in Malgudi, where his grandmother is dying (and comes back to life on the funeral pyre in an extremely comic incident), the police arrest him and he is sent to jail. He remains in jail for a few months after India attains independence, and is then released, and walks out into a new, free India. On finding out that Bharati is in Delhi with the Mahatma, he goes to DelhiShow MoreRelatedDeveloping Management Skills404131 Words   |  1617 PagesSuzanne Duda Lead Media Project Manager: Denise Vaughn Full-Service Project Management: Sharon Anderson/BookMasters, Inc. Composition: Integra Software Services Printer/Binder: Edwards Brothers Cover Printer: Coral Graphics Text Font: 10/12 Weidemann-Book Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Copyright  © 2011, 2007, 2005, 2002, 1998 Pearson Education, Inc., publishing as Prentice Hall, OneRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 PagesContemporary Management, Fourth Edition Jones−George Driving Shareholder Value Morin−Jarrell Leadership, Fifth Edition Hughes−Ginnett−Curphy The Art of M A: Merger/Acquisitions/Buyout Guide, Third Edition Reed−Lajoux and others . . . This book was printed on recycled paper. Management http://www.mhhe.com/primis/online/ Copyright  ©2005 by The McGraw−Hill Companies, Inc. All rights reserved. Printed in the United States of America. Except as permitted under the United States CopyrightRead MoreLibrary Management204752 Words   |  820 PagesAll rights reserved. No portion of this book may be reproduced, by any process or technique, without the express written consent of the publisher. Library of Congress Catalog Card Number: 2007007922 ISBN: 978–1–59158–408–7 978–1–59158–406–3 (pbk.) First published in 2007 Libraries Unlimited, 88 Post Road West, Westport, CT 06881 A Member of the Greenwood Publishing Group, Inc. www.lu.com Printed in the United States of America The paper used in this book complies with the Permanent Paper StandardRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pages numerous studies have shown the continuing relevance of white ethnicity in the United States, not only regarding public activities like voting but also in terms of intimate behavior such as mores and manners, childrearing practices, adolescent styles, and attitudes toward illness, psychiatric disorders, and authority, even in cases where the individuals examined were not particularly aware of their ethnicity.70 The recent waves of migration are still too new to say anything definite based on

Sunday, December 8, 2019

Engagement for Cyber Warfare-Free-Samples-Myassignmenthelp.com

Question: Discuss about the Terms of Engagement for Cyber Warfare. Answer: Introduction Cyber warfare can be considered to be network or computer based conflict which mainly involve attacks which are politically motivated by a nation state on another nation. Taking into consideration the attacks the main focus point is to disrupt the activity which can be related to organisation or states- nation with the intention of military purpose, strategic or cyberespionage. Although the main point which can be stated putting emphasis on the term is that the attack is mainly initiated with the purpose of disrupting a nation state which initiated by another nation state, it can also be used to describe attacks which are done by hacker groups or terrorist in order to furthering the goals which is related to a particular nation [7]. When the attacks are generated by advanced persistent threats (APT) actors it becomes very much difficult to definitively attribute the cyber-attacks which are imposed on nation state, but this types of attacks are generally linked to a specific nation [8 ]. The report mainly puts direct emphasis on the terms which are related to the cyber warfare. There are many examples which can be stated in context to the topic which are major suspects of the attacks which are related to the cyber warfare taking into consideration recent history. Taking into example a specific case study relating to the topic in order to obtain in-depth knowledge related to the topic is majorly done in this report. History of Cyberwarfare At the beginning of the year 2006 the US air force new mission was announced in which they pledged to fight in space, air and cyberspace [7]. The main recognition of the mission was apparently related to some time: warfare will and can migrate into the concept of the cyberspace. The basic constitution of the cyber warfare mainly consists of operation which are related to the military by the concept of virtual means [1]. It consists of nation states using cyberspace as a mean of attack to achieve a result which is same as compared to initiating attacks with the military force. This is majorly done in order to achieve certain type of advantage over a competing nation or the reverse of protecting themselves from the attack which is generated by another nation [9]. Like the concept of the terrorism, the warfare tends to result in property destruction which is sometimes in a massive scale and result in injury and deaths of the individual. Unlike the term terrorism it is supposed to be very much limited to the clashes between the aggregation of the individual (armies). Since the activity of the warfare is mainly conducted between nation state in order to maintain or restore the concept of external order within the nation. It can be stated that the main focus of the cyber warfare is not the injuring or the death of the civilians and destroying the property of the civilians [5]. Most threatening attacks in near past The threats which are related to the cyber-attacks have eventually become much more complex and sophisticated with the invention of the computer worm which tested the size of the internet by Sir Rober Morris [10]. It can be stated that the cyber warfare is currently happening in the cyber space now. The discovery of the Stuxnet which is the first cyber weapon which was invented became a defining moment in the field of cyber warfare [6]. The Stuxnet was mainly invented for the purpose of the mechanical undercover work. But on the other hand the system did not take control, or the deletion part of the data instead the Stuxnets main objectives by then was to physically annihilate a target which was military based [10]. A recent research stated that the Stuxnet had contaminated more than 60000 personal computers around the world but most in Iran. Taking into consideration the delimitative example was mainly to reprogram programmable logic controller (PLCs) to perform the attack which is intended them to do. In spite the factor that the main creator of the stunt was not properly recognized but the intend of the harm it can create could not be justified with the support of different states. Even though there is no supporting evident relating to the creation, but it was mainly supposing that the creation was done by united states and Israel [27]. Another country which was mainly harmed by the issue was Estonia. The main network of Estonia was targeted by the hackers on april 27 in the year 2007 [21]. This attack mainly ruined for a tenure of about few weeks [19]. It was estimated that around 28 exceptional DDOS attacks was initiated with the focus of hitting the internet convection. The internet packets expanded to around 4 million which was initially 20000 in a time period of every second [13]. Estonia authorities immediately blamed Russia for the attack, but on the other hand European commission and the NATO specialist could not find most evidence into this matter. After a long tenure after the attack was initiated Estonia as of very late got the emergency action of NATO course underway and the whole situation was made normal [26]. According to security experts a target which can be termed as complex which mainly targeted the private information of the nations for example Iran and Israel had been revealed which is known as Flame, which had been in operation since the year 2010 [20]. Regardless of the concept that weather the Flame did any harm to the nation, it mainly affected the Irans gas and old production on the other hand it affected the energy sector also which was mainly due to the factor of cyber-attacks. A self-replicating virus which was named as Shamoun had infected more than 30000 main devices which were related to the biggest oil producer and caused major interruptions in Saudi Armco [5]. Irate monk was another very famous device or software which was used in the concept of justifying the cyber warfare. The main concept which was applied to it was that it gave the applications which where programming the ingenuity on the personal computers which where embedded the hard drive firmware to gain the ex ecution through the master boot record. This concept was mainly created by a group named Equation who were assumed to be the most advanced and the most sophisticated attack groups in the world [18]. Cyber warfare laws It is very much important to take into consideration what the nations can do when they are exposed to the cyber-attacks [13]. Cyber space can be stated as a new warfare and it consist of many legal loopholes in accordance to the international regulations which are enforced. Former NASA director Lt. Gen. Keith B. Alexander emphasised to the members relating to the senate of the armed service committee in the year 2010 that the concept of the cyber warfare advancement was seen so quick that the control of the issue was beyond the reach of anyone [24]. He further stated that there was a mismatch between the capabilities which are technical to conduct different orations related to the attack and the laws and the regulations which were put forward by the government. According to many countries the mere concept of the cyber war was not very much different from the conventional factors which are related to the war. Cyber war can be directly stated in this case to be within the scope of the system relating to the international legal related to war [26]. There are mainly two types of recognizable methods that can be used in the concept of the gander at war under the international law. Both the traditional branches which are related to the war are: The jus as bellum This mainly governs resort to the war The jus in bello This mainly governs the hostility conduct [8] These methods can be directly being applied to the cyber warfare also. Previous experience showed that the preventing of the actions of violation before the actual event occurs is very much crucial and beneficial that trying to fix matters after the event has actually taken place, this concept is also very much valid in the issue of the cyber warfare. In order to achieve the above stated factors the law of armed forces was mainly created (LOAC) [9]. Generally, the applicability which can be related to the LOAC was to regularly relied on a charactering the subjectivity in contention as a war. In order to trigger the LOAC it was very much important to recognize the conditions that could give arise to the condition of war. After the 1949 Geneva conventions the LOAC is mainly activated by the mere presence of the armed conflicts between the states. Even though the concept is for the armed forces it can also act as a starting point in the issue of the cyber warfare. Using of the arm force s are only justified when the there is a situation of self-defence and in order to maintain direct peace and the security. The measure of self-defence which can be exercised by any nation in order to reinforce the concept of self-defence should be immediately be informed to the security council under any time situation [26]. The right of enforcing any self defence strategy is given mainly to those nations if any only if a situation of threat arise or the use of threats against the integrity of territorial or political independence is faced in case of any armed attack. Taking into consideration cyber-attacks, it cannot be justified with the use of arm and are not termed as armed assaults. A very much common mean of starting point in this case is the mere analysis which is to be considered taking into account the impact it the outcomes of an assault which is digital in nature figuring out it mainly crosses the edge of the concept of the armed attack. Over here it can be stated that in order to include the cyber-attack into the concept of the armed attack the violent consequence of the bomb should be produced [21]. Cyber capability of countries Many nations have been creating the apparatus mainly for the PC work of undercover and the assault which may include sabotage and espionage [7]. The main activity which is related to cyber warfare are mainly military doctrine taking into consideration few countries, on the other hand for few of the countries it is related to national security program. Different country has different means or strategy in order to defend themselves for the threat [30]. United states: in the united states the first step was taken by the president in the year 2002. There were mainly four actors involved in the process besides other agencies taking part in it which are USCYBERCOM to plan coordinate, synchronize, integrate and conduct the activities to direct the defence and the operation of the specific department of defence and when directed conduct full spectrum military based cyberspace operation. In this mainly done to enable the sections which are related to the domain, ensure US/Allied freedom which is related to the action in the cyber space and the deny of the same to their adversaries [8]. China: according to the report of the national computer network emergency response team coordination centre of china (CNCERT or CNCERT/CC), China has the most noticeable advanced cyber weapon relating to an advanced infrastructure. According to the china government the aspect of the cyber warfare is a very important issue same as when compared with any other forms of war. After the main initiation of the cyber warfare there was a creation of information technology base which was under the general staff department. This was mainly implemented in the year 2010. In the mid of 2014, the first professional blue army unit troop was introduced by the PLA. The blue army mainly offender the data and the network when contrasting them with conventional military [28]. Russia: taking into consideration the internet, Russia is considered as the most agonized over the risk postured by antagonistic. The federal security service (FSB) is a federal executive body with the main authority to directly implement the government policy in the national security of the Russian federation. This body mainly ensures that the information security of the Russia and the exercising the basic functions of the federal security services which is specified in the Russian legislation [4]. North Korea: according to report north Korea has more than 5000 hacker forces. In the year 1998 a new unit was initially started that mainly concentrated on the digital warfare. The unit was named as unit 121 and it constantly developed in size and the ability on a point to point basis. Sectors of attack The cyber warfare attack can be mainly divided into two parts according to the sectors which the attack tends to target [9] The sectors are: State sponsored attacks: Taking into account the perpetrators, they have never admitted the responsibility but it can be stated that there is clear evidence that nations state actors have been very much behind many cyber incidents. One such attack is the attack which was on the German parliament in the year 2015, it caused widespread disruption by mainly infecting about 20000 computers which were mainly used by the German support staff, politician and the civil servants [14]. The attack mainly involved transmitting of the sensitive data back to the hackers and which finally required millions of euros in order to clean up the cost. The Russian hacktivist with the assumed links to the state of Russia were very much responsible for launching an attack that nearly shutdown many of the websites and the online Estonian parliament and the with it the government even. This hack followed the Estonian government to take decision to relocate a statue commemorating the Soviet Union in the second world war. The Russian hackers were also blamed for the orchestrating which was very much familiar to the cyber discretion during the Russian Georgian conflict in the year 2008. In the year 2015, the Chinese stated hackers where involved in hacking who were accused of breaching the US office of the personnel managements website to merely steal the information on about 22 million former and current government employees. On the other hand, it was proved that the Chinese hackers stole the information related to the design of the military craft. This incident related to barrack Obama calling the framework on the cyber arm control analogous to nuclear arm treaties. This can be considered to the first step the world had taken towards the establishment of such a framework. The overall impact of the attack was that it caused catastrophic security breaches which resulted in stolen information, majorly probed the infrastructure of the countries in the western, provided economic advantage to China, on the other hand political advantage to Russia, fuelled the north Korean and the Iranian the need of the revenge due to the initiation of the attack and finally fed the espionage machine of nation that majorly spy [25]. Attack on the private sectors: According to statement released as per the recent survey it can be stated that the sector of the cyber-attack victim can also be pointed towards the private sector. The Yahoo hack in the year 2016 was mainly sponsored hackers of the state was mainly blamed by the company itself but on the other hand US ISP didnt announce the state which is to be blamed for the issue [28]. The hackers of the North Korean government were very much responsible for the hacking issue which was done on Sony pictures in the year 2014. This attack on the Sony pictures was mainly initiated after the launch of the movie which was related to the leader of north Korea Kim Jong-Un. The north Korean hackers where found to be to using different methods of hacking by the FBI. The means that were mainly followed included encryption algorithm, code and data, methods which could deleted the data and compromise in the section of the malware activity [6]. In this hacking scenario the state hackers mainly used the internet protocol (IP) address which are from the country itself. Taking into consideration the value of the cyber-attacks which are uncaptured by different countries it can be stated that the government of the country should sign on a common treaty on and when the cyber weapons which are related to the cyber warfare can be used. This would directly reduce the amount of cyber-attack which are generated by any country on another country in order to benefit from them [10]. The law which is related to the armed conflict (LOAC) extends to the cyberspace, on the other hand there is a confusion regarding the applicability of the application and its connects that can be used in order to reduce the overall affect that it has on reducing the cyber warfare concept. One of the first nuclear arm control agreement which is named the limited test ban treaty which is in the year 1963 did not emerge until 18 years after the Hiroshima and it was approximately five years befor e the nuclear proliferation treaty which was in the year 1968. This issue nether solved the problem which is related to the cyber warfare but on the other hand created problem with the it. The cyber arm control on the other hand could be equally be as slow and piecemeal even if their development is merely achieved [9]. Prevention The cyber warfare attack basically can be considered as an attack which is generated on the basis of the computer network. Taking precautions related to the computer security aspect in order to deal with the different hacking t=strategy which is incorporated in different ways. Some of the major preventions aspects that can be taken into consideration are stated below. Educate employees: human error can be considered to be a high proportion when relating to the data breaches that occur in any organisation or government. Encouraging the culture where the people are inspired and thought about the basic concepts of the internet should be the main approach [10] Two factor authentication: many of the attack which are related to the cyber warfare mainly include the details and the harassing of the employee of company or the organisation with the use of malware and steal the data [7]. Data encryption: encrypting the data in a secured manner can directly help in securing of the data of the sure of the organisation. on the other hand, it can be used to protect the data from security breaches and saving them from being hacked by the hackers [4]. Shared intelligence: swapping of the experience of the threats and the methods in order to neutralise them and the vendors which are related to the security and the industry peers can directly assist in both cure and the prevention concept. This would directly help in securing the data as well as prevention of the access to data that are very much important from the point of any organisation [7]. Conclusion It can be concluded from the above report that the concept of the cyber warfare in the near future would be more complex and sophisticated and can be a very vital role. The precaution measures that should be enforced by different nations are taken into deep consideration in the report. In the year 2015 the president of the united states of America signed an executive order in a way to authorize the treasury department to the financial sanction with regards to anyone using the concept of the cyber-attack. The term cyber-attack can create a significant threat to the national security of any country, policy which are related to the foreign or the economic health or the financial stability. Despite the fact that there is apparently many confusions regarding the international legal actions which are related to the cyber security aspect. Either in the level of individual person or in the state level hackers should be put on trails due to the law which is super imposed in the prospective of the cyber warfare. It is very much critical for the different states as well as the countries to take into consideration that the cyber warfare could be playing a two-way role in some of the cases. Taking advantage of the concepts of the internet and benefiting them can be very much illegal from the point of view of the government who is enforcing such type of activity. Referencing Jackson, Stephen. "NATO Article 5 and Cyber Warfare: NATO's Ambiguous and Outdated Procedure for Determining When Cyber Aggression Qualifies as an Armed Attack." The CIP Report (2016). Thompson, Marcus. "The ADF and cyber warfare." Australian Defence Forc Bao, Tiffany, et al. "How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games." Computer Security Foundations Symposium (CSF), 2017 IEEE 30th. IEEE, 2017. Demchak, Chris C., and Cyber Warfare Strategy. "Key Trends across a Maturing Cyberspace affecting US and China Future Influences in a Rising deeply Cybered, Conflictual, and Post-Western World." (2017). Bills, Amanda. "Cyber Warfare and Jus in Bello-The Regulation of Cyber'Attacks' under International Humanitarian Law." (2017). Bar-Tal, Daniel. Intractable conflicts. Cambridge University Press, 2016. Leccisotti, Flavia Zappa, Raoul Chiesa, and Daniele De Nicolo. "Analysis of possible future global scenarios in the field of cyber warfare: National cyber defense and cyber attack capabilities." Handbook of research on civil society and national security in the era of cyber warfare. IGI Global, 2016. 181-204. Thompson, Marcus. "Military aspects of cyber warfare." United Service 67.3 (2016): 27. Connell, Michael, and Sarah Vogler. Russia's Approach to Cyber Warfare. Center for Naval Analyses Galliott, Jai. "Cyber warfare, asymmetry, and responsibility: Considerations for defence theorem." Handbook of research on civil society and national security in the era of cyber warfare. IGI Global, 2016. 1-21. Mazanec, Brian, Angelos Stavrou, and Christopher Whyte. Understanding Cyber-warfare: Politics, Policy and Strategy. Routledge, 2018. Almeida, Virgilio AF, Danilo Doneda, and Jacqueline de Souza Abreu. "Cyberwarfare and Digital Governance." IEEE Internet Computing 21.2 (2017): 68-71. Ween, Anthony, et al. "Framing cyber warfare: an analysts perspective." The Journal of Defense Modeling and Simulation (2016): 1548512917725620. Jones, Sam. "Cyber warfare: Iran opens a new front." Financial Times 26 (2016). Lanzendorfer, Quinn E., Scott C. Spangler, and Gary J. DeLorenzo. "INFORMATION WARFARE: THE CHALLENGE OF RELATING INTENT WITH TECHNOLOGY IN CYBERAl-Rodhan, Nayef. "Tomorrow's arsenal." (2016): 1538-1538. Cook, Allan, et al. "SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System." International Journal of Cyber Warfare and Terrorism (IJCWT) 7.2 (2017): 1-15. Vaughan, Ashley. In search of common ground on cyber warfare. Diss. Utica College, 2016. Tutty, Malcolm G., Susana V. McKee, and Elena Sitnikova. "Towards joint fires superiority in kinetic weapons, non-kinetic electronic and cyber warfare operations." 2016 Systems engineering test and evaluation conference: SETE 2016. Engineers Australia, 2016. Laudicina, P. "2017 Will Be the Year of Cyber Warfare." Forbes. com (2016). Kalpokiene, Julija. "Book Review: James A Green (ed.), Cyber Warfare: A Multidisciplinary Analysis." Political Studies Review (2016): 1478929916653044. Friis, Karsten, and Jens Ringsmose, eds. Conflict in Cyber Space: Theoretical, Strategic and Legal Pespectives. Routledge, 2016 Roberts, Margaret E. "Testimony before the US-China Economic and Security Review Commission Hearing on Chinas Information Controls, Global Media Influence, and Cyber Warfare Strategy." (2017). Armistead, L., et al. "Journal of Information Warfare." (2016). Courtney, Martin. "States of cyber-warfare." Engineering Technology 12.3 (2017): 22-25. Gady, Franz-Stefan. "Trump and offensive cyber warfare." The Diplomat (2017). Burke, Ivan D., and Renier P. van Heerden. "The World is Polluted With Leaked Cyber Data." International Journal of Cyber Warfare and Terrorism (IJCWT) 7.4 (2017): 35-51. Korstanje, Maximiliano E., Martti Lehto, and Andrew N. Liaropoulos. "International Journal of Cyber Warfare and Terrorism." International Journal 6.1 (2016). Brown, Gary D. "International Law Applies to Cyber Warfare: Now What." Sw. L. Rev. 46 (2016): 355.

Sunday, December 1, 2019

Tod and business strategy

Strategies to attain growth The core objective every business growth strategy in a firm is to increase its sales revenue and the level of profitability within a particular time frame. Over the years it has been in operation Tod has continuously utilized traditional method of creating awareness regarding its new products.Advertising We will write a custom report sample on Tod and business strategy specifically for you for only $16.05 $11/page Learn More One of the ways through which the firm achieves this is by having the shoe being endorsed by Diego Della Valle, the chairman of the firm by wearing it. In an effort to enhance the firm’s growth, the firm can adopt a number of growth strategies as discussed herein. Market penetration The traditional method of assessing whether its new style of shoe is successful in the market is not effective. This has greatly hindered the firm’s ability to increase its profitability. This arises from the fact that the traditional method adopted is limited with regard to its market coverage. The resultant effect is that the firm’s ability to penetrate the market is has been hindered. To improve its sales revenue, it is paramount for the firm to adopt market penetration strategies. For example, the firm should improve on its marketing efforts in a number of ways. One of these ways relates to creating awareness regarding its new shoes. Under the direction of the chairman, the firm should incorporate the concept of integrated marketing communication in its effort to create market awareness. To be successful the firm has to incorporate traditional and emerging market communication methods. Some of the tactical actions which the firm should adopt include advertising, public relations and sales promotion. In its advertising strategy, the firm should integrate different mediums such as the print media, the television and radio. Additionally, the firm should also consider increasing its s ales revenue by incorporating electronic marketing through integration of the internet technology. Considering the fact that Tod is a multinational firm, electronic marketing would enable information about the firm’s product to reach a large number of customers. This is due to the fact that a large number of individuals access the internet on a daily basis.Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More For internet marketing to be successful, there are a number of tools which a firm can use. Some of these tools include the social networking tools for example Facebook and You Tube. For example, through these social networking tools, the firm can post photos of its shoes being worn by famous individuals such as Princess Stà ©phanie of Monaco and Gwyneth Paltrow and its handbags being wielded by Hillary Rodham Clinton. This will act as an endorsement of the firm’s products he nce attracting a large number of customers. The resultant effect is that the firm will be able to increase its sales revenue hence attaining growth objective. In its market penetration strategy, it is vital for the firm’s management team to consider undertaking process improvement. In order to achieve this, the firm should consider producing its shoes and handbags in markets which are cost effective. For example, the firm can set up production plants in China where production is cost effective. This will greatly enhance the firm’s pricing strategy. For example, the firm will be able to set the price of its shoes at a lower point and at the same time cover its production cost and operates to profitably. This is due to the fact that a large number of customers will be able to afford the firm’s shoes (Birkholz, 2007, p.34). For example, a men’s crocodile loafer costs 3,500 Euros which approximately equals $4,850 in Italy with its cost of production being equ al to 1,590 Euros. However, producing the same shoe in China would cost the firm half the cost incurred by producing it in Italy. Product development The designer shoe and handbag industry is saturated as a result of the large number of firms in the industry. In order to enhance their competitiveness, firms in this industry have to undertake product development strategy. The strategy entails designing new products and marketing them in its existing market. The firm should also consider developing new leather products to market in its existing market. For example, the firm can consider improving the features and design of its existing shoes. Product development will help the firm to counter direct competition.Advertising We will write a custom report sample on Tod and business strategy specifically for you for only $16.05 $11/page Learn More One of the ways through which firms can achieve this is by conducting a comprehensive research and development. Ad ditionally, the firm should consider integrating new technology to enhance its product development. This will play a vital role in increasing the firm’s profitability considering the fact that the firm is already aware of the conditions existing in the market. Diversification strategy It is important for Tod’s to consider diversifying its products. To attain this, the firm should implement new product development strategy. This strategy involves developing new products which are not related to the existing products. The new products are to be introduced in new market segments. Diversification strategy is relatively risky and a firm must have core competencies in order to succeed. In its diversification strategy, Tod’s can consider designing leather jackets. There is a high probability of the firm succeeding in the new market segment considering the fact that it has substantial knowledge with regard to leather. Market development According to Barret and Mayson (2 007, p. 307), market development is one of the main business growth strategies which is adopted by small firms in an effort to grow. However, also large firms can use the strategy to entrench their competitiveness. Over the years it has been in operation, the firm has been risk averse, which is illustrated by the declaration of its chairman that Tod’s does not take risks. This limits the firm’s ability to grow. The firm should venture into new markets by expanding its geographic coverage. For example, the firm should venture into emerging economies where it can market its products. This can be achieved through a number of ways such as by opening outlets in these countries. Alternatively, the firm can expand its market coverage by expanding its distribution channel through exporting. This will have the effect of increasing the firm’s customer base ( Barret Mayson, 2006, p. 447). According to Jankovsky (2007, p.64), overtrading arises from lack of a business unde rstanding its time frame and not following the set policies in its trade system. In most cases overtrading arises from a firm’s effort to attain its growth objective. As a result, it increases its operations.Advertising Looking for report on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Currently, the firm has a policy which stipulates that the stock days should be 60 days. This means that the firm’s average carrying period is 60 days before it restocks. The suggestion to increase the firms’ stock days by one third, that is 20 days would lead into an increment in the carrying cost. Assuming that the firm’s operations are not affected by changes in the business environment, the firm’s profit would be reduced due to increased carrying cost. For example, the firm would be required to pass on the cost to the consumers by increasing the price of its products. This would culminate into a reduction in the firm’s annual sales revenue from the average amount of 10 million pounds. Additionally, reduction in sales revenue would also lead into a reduction in the firm’s gross profit margin. To ensure efficiency with regard to cash flow, the firm has instituted a credit policy whereby its debtors are required to pay the debt within a per iod of 30 days. However, one of the managers has made a suggestion to increase the credit period to 90 days. This is considered to be a traditional method to achieve growth. Traditionally, most firms ensured that they have instituted good credit terms in an effort to increase sales revenue. According to Vause (2009, p.76), adopting this strategy in their sales policy can contribute towards firms attaining a rapid growth in its sales revenue and hence its profitability. Currently, almost half of the firm’s customers who purchase on credit pay within a period of 30 days as stipulated in the firm’s credit policy. The remaining customers pay within a period of 60 days. Its average bad debt is equal to 1% of the firm’s sales which is a relatively small amount. By increasing its credit period to 90 days, there is a high probability of the firm experiencing liquidity problems. This arises from the fact that the customers may take more time before paying the debt thus a ffecting the firm’s cash. Additionally, the customers may opt to get their supplies from a different source which makes the firm to be exposed to more cash flow crisis. For example, a firm may run out of cash thus hindering its ability to continue operating. In an effort to alleviate the problem, the firm may result into credit finance such as overdrafts which are costly since the applicable rate of interest for an overdraft is usually higher than the base rate. Currently, the firm’s rate of interest on its overdraft is 7% higher than the base rate. Considering the increment in the level of uncertainty amongst financial institutions as a result of the 2008-2009 financial crises, there is a high probability of these firms increasing their base interest rate on overdrafts. This would have the effect of increasing the borrowing cost. Over trading leads a firm to expand its operations at a faster rate than its usual capacity. The result is that the firm’s operations are negatively affected since the firm’s working capital is not sufficient to cater for the extra human capital, equipments and machinery required. To avoid this, the firm may consider leasing some of the equipments and machinery required for expansion other than purchasing them. This would caution the firm from experiencing cash crisis since leasing is relatively less costly in the short term compared to purchasing. By leasing, the firm would be able to cover the cost by reaping the benefits in the short term. In addition, the firm is required to wait for a substantial amount of time before collecting sales revenue from new contracts. The resultant effect is that the firm experiences liquidity problems which in worst situation can lead into the business being closed. This arises from the fact that overtrading leads firms to incur cash flow problems. In addition, the cash flow problem is exacerbated by the fact that a substantial amount of money is held up in the large volum e of stock either in form of work-in-progress, finished goods, and raw materials held in the firm’s warehouses. Ultimately, implementing these strategies would lead into a strain in the firm’s finances. Human resource management According to Hannigan ( 2007, p.23), human resource management entails a number of processes such as deploying employees, motivating and developing them with the objective of achieving predetermined organized goals. Firms should not only be concerned with attaining their goals by using the employees. However, they should take into account the various levels of employees needs. These needs relate to psychographic needs, belonging needs, self actualization needs, esteem needs, and safety and security needs. In order to achieve its organizational objectives it is paramount for firms to formulate effective personnel and human resource management concepts (Ferris, 2006, p.1). By taking into consideration these needs, there is a high probability of f irms developing a strong human capital. In its effort to attain a high growth, the owner of Tod’s Luxury Shoes decided to expand the firm. This required the firm to increase its workforce so as to attain operational efficiency. However, the productivity of the workforce is dependent on the management teams’ effectiveness in human resource management and personnel management processes. According to Hannigan (2007, p.23), human resource management entails a number of management functions which include employee recruitment, selecting the qualified employees, and training the employees to ensure that they are productive. By undertaking a comprehensive employee recruitment process, the firm will end up with diverse employees. This can be a challenge to the firm. However, it is the responsibility of the firm’s human resource manager to ensure that employee diversity is well managed. This will play a vital role in ensuring that unity within the firm is maintained. The resultant effect is that the firm will benefit in the long term. Reward system For example, the firm has to ensure that the employees are satisfied. One of the ways through which the firm can achieve this is by instituting an effective reward system. The reward system should comprise both monetary and non-monetary rewards. Some of the non-monetary rewards which the firm should consider include medical allowance and recreation allowance. In addition, the firm should include a program aimed at recognizing the employees who portray outstanding performance. This will play a vital role in motivating the employees. Additionally, integration of an effective reward system will lead towards minimizing employee turnover since the employees will be satisfied. According to Rutherford, Buller and McMullen (2003, p. 322), employee turnover is costly to a firm since the firm has to replace the employees who leave the firm. Conducting a recruitment increases the firms cost of operation. In addition , the management team should ensure that the reward system is based on employee performance. For example, the firm should ensure that a comprehensive performance appraisal forms the basis upon which the employees are promoted. Promoting employees increases their level of satisfaction. Employee development In addition to promotion, it is paramount for the firm’s management team to consider developing a training and development program which facilitates workplace learning. According to Walker (2007, p. 294), firms should develop training programs that are inline with the changes in the market. This will aid the firm’s towards enhancing its competiveness. For example, training will contribute towards improving the employees’ efficiency in undertaking their current tasks (Brand Bax, 2002, p.451). On the other hand, development will enable the employees’ deals with future changes in their works. This is due to the fact that obsolescence in its workforce will be eliminated. This means that the firm’s future success is enhanced. Investment in workplace learning illustrates a firm’s commitment towards developing its workforce. Training employees will contribute towards improvement in the employee’s morale. In most cases, employees who are well trained are interested in undertaking their tasks. This will not only enable Tod’s Luxury Shoes to be effective in designing and producing shoes but it will also lead to employee development. The resultant effect is that the employees will develop a strong bond with the employees since it will enable them to achieve their career objective. According to Aswathappa (2005, p.5) assisting employees to realize their personal goals improves their contribution towards the firm’s operational efficiency. However, it is only possible for a firm to ensure that its employees attain their personal goals if they are motivated and retained within the firm for a considerable durati on of time. If this is not attained, the employees will leave the firm. The training program will also contribute towards the firm attracting qualified employees from the labor market hence strengthening its human capital. According to Bratton and Gold (2001, p.58), integrating employee development is a core element in a firm’s effort to survive and attain growth in the current competitive business environment. Effective communication It is also important for the management team of Tod’s Luxury Shoe to ensure that communication within the firm is effective. One of the ways through which the firm can achieve this is by instituting a bottom-up communication system. According to Goyal (2005, p.258), communication is a vital component in the success of the firm. This is due to the fact that the firm’s decision making process is enhanced since employees share ideas, opinions, and facts with the management team. This means that communication aids in enhancing the deve lopment of a superior –subordinate relationship. This relationship cannot thrive in the absence of an effective communication. By adopting the bottom-up communication strategy, employees will feel that they are included in the firm’s decision making process process. This leads into attainment of the desired results. This will have the effect of enhancing employee satisfaction. The firm should also ensure that it nurtures a strong organizational culture. This can be achieved through a number of ways. For example, the firm can incorporate the concept of teamwork. This will aid in enhancing employee relationship within the firm. Teamwork will also aid in creating an environment conducive for working. This arises from the fact that the level of coordination between employees will be improved. In summary, implementing the above human resource management and personnel management practices will contribute towards the firm being successful in its effort to manage its workforce . Reference List Aswathappa, K., 2005. Human resource and personnel management: text and cases.  New Delhi: Tata McGraw Hill. Barret, R. Mayson, S., 2007. Human resource management in growing small firms.  Journal of Small Business and Enterprise Development. Vol. 14, issue 2, pp. 307-320. Barrett, R. Mayson, S., 2006. The science and practice of HRM in small firms. Human  Resource Management Review. Vol. 16, issue 5, pp. 447-455. Birkholz, A., 2007. Business analysis on the web.de AG. Munchen: Grin Verlag GmbH. Brand, M.J. Bax, E.H., 2002. Strategic HRM for SMEs: implications for firms and  policy. Education and Training. Vol, 44, issue 8/9, pp. 451-463. Bratton, J. Gold, J., 2001. Human resource management: theory and practice. New  York: Routledge. Ferris, G., 1996. Handbook of human resource management. Cambridge, Mass:  Blackwell Business. Goyal, H., 2005. Hospital administration and human resource management. New York:  PHI Learning Pvt Limited. Hannigan, T., 2007. Management concepts and practices. New York: Prentice Hall. Kotey, B. Sheridan, A., 2004. Changing HRM practices with firm growth. Journal of  Small Business and Enterprise Development. Vol. 11 , issue 4, pp. 474-484. Jankovsky, J., 2007. Trading rules that work: the essential 28 lessons every trader must  master. Hoboken, N.J: John Wiley and Sons. Rutherford, M.W., Buller, P.F. McCullen, P.R., 2003. Human resource management  problems over the life cycle of small to medium size firms. Human Resource Management. Vol. 42, issue 4, pp. 321-328. Vause, B., 2009. Guide to analyzing companies. New York: Bloomberg Press. Walker, E. Redmond, J., 2007. Small business owners: too busy to train. Journal of  Small Business and Enterprise Development. Vol. 14, issue 4, pp. 294-306. This report on Tod and business strategy was written and submitted by user Jason Mcbride to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.