Sunday, December 29, 2019

Alkoxy Group Definition in Chemistry

An alkoxy group is a functional group containing an alkyl group (carbon and hydrogen chain) bonded to an oxygen atom. Alkoxy groups have the general formula: R-O. An alkoxy group is also known as an alkyloxy group. An alkoxy group bonded to a hydrogen atom is an alcohol.An alkoxy group bonded to another alkyl group is an ether. Examples: The simplest alkoxy group is the methoxy group: CH3O-.

Saturday, December 21, 2019

Pestel Analysis on Motor Industry - 10196 Words

An Overview of Strategy Development Models and the Ward-Rivani Model corresponding author: Dr. David Ward, European School of Economics, Via Chiaravalle 9, 20100 Milan, Italy. All correspondence to Dr David Ward, Via Fornari 46, 20146 Milan, Italy email: daward@tin.it co-author: Elena Rivani, Via Orsoni 41, 40068, San Lazzaro di S. (Bo), Italy. Abstract Numerous models for developing strategy, defining and aligning competitive advantage have been proposed over the years (and even centuries if we consider Arian, Sun Tzu etc.) including probably the most famous of all, the 5 forces model by Porter (P5F). With publications in the field of strategy now in the thousands it is difficult to get an overall picture of how to classify and†¦show more content†¦Another key finding in the development of this paper has been the almost total lack of a complete or partial view of how the P5F model, underlying tools and schools of strategic thought are linked. In fact we found very little trace of links between these three areas and the proposed model provides an overview of how these three levels are linked. In the work that follows we have attempted to achieve the following objectives: †¢ †¢ Explain what the P5F model is, what it is intended for and its position in company strategy development What tools can and are use d by managers and upper management and how these link to the forces described by Porter. We have taken Italy as the reference country because of greater familiarity with the national economic and business world (Rivani, 2005). Tackle and link schools of thought to the P5F model and relative tools in order to leverage all three of the above mentioned levels of strategy development and deployment. Provide a convenient and concise comparison of models and show how new models can be generated or old ones adapted-updated. †¢ †¢ The Five Forces Model of Porter The Five Forces Model (P5F) and the framework behind it dates back to the early 80s and was the work of Michael Porter, a scholar working and teaching at the Harvard Business School. This model (see figure 1), as declared by its creator, was able, at that time, to fill a void, in theShow MoreRelatedThe Current Business Environment Affecting The Industry1222 Words   |  5 PagesSECTION TWO: Analysis of the Current Business Environment affecting the industry CHOOSEN SBU OF YAMAHA MORORS UK: ROAD MOTORCYCLE Macro Environment: PESTEL Frame Work: PESTEL framework is a tool used to analyses the external environment of the business in order to understand the big picture in which the organisation operates. Thus, enabling them to take advantage of the opportunities also it minimizes the threat faced by the business activities(Johnson, Whittington et al. 2011) . The limitationRead MoreThe Long Term Effectiveness Of A Firm Essay829 Words   |  4 Pagesenvironmental analysis on the business industry that one firm belongs to. Environmental factors control and guide firm’s trajectory. The company needs to adapt its strategies based on these external forces to maintain core of the competitive advantage. The industry in which a company operates it can be analyzed through the process of PESTEL Framework and Porter’s five forces model of competition. When the external factors affecting the company are known, a strategic grouping of the industry, opportunitiesRead MorePestel, Porter s 5 Forces, And Swot Analysis1459 Words   |  6 Pagesthe organisation in the market, a situational analysis is conducted on the firm, describing its market and strategic strongholds, as well as weaknesses. For a clear explanation of the organisation’s situation, the PESTEL, Porter’s 5 Forces, and SWOT analysis will be conducted. It will provide a better understanding of the state of the firm, with a consideration of internal and external factors. 2.1 Pestle Analysis please see appendix 1 PESTEL analysis focuses on evaluating the external market throughRead MoreTesla Motors, An Electric Power Train And Car Manufacturer1072 Words   |  5 PagesTesla Motors is a technology company, which manufactures and promotes in-house designs for technological components. Tesla Motors is an electric power train and car manufacturer, founded with the goal of providing an emission-less, cheaper and more reliable automotive vehicle rather than such with an IC engine. The auto manufacturing market is very competitive, especially for alternative fuel vehicles that has become more popular with the rise of environmental concerns. Company has a limited amountRead MorePestel: Electric Vehicle and Tesla Motors Essay807 Words   |  4 PagesCase 5 Tesla Motors and U.S. Auto Industry As a pioneer of green technology car manufactory, Tesla Motors has placed himself in the U.S. automotive industry. Tesla Roadster is considered to be a cash cow in 2009, and it is the only electric cars have been mass product. However, after the competitors had entered the market, alternatives joined the battle of green technology car, such as hybrids, fuel cell ,etc. Furthermore external environment has changed. Elon Musk, the co-founder and head ofRead MoreTesla Case967 Words   |  4 Pagesï » ¿ 1. The PESTEL framework: Political factors:  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The federal tax credit was summed up to 7,500$ for what is called qualified plug-in electric drive vehicles.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The U.S. government imposed taxes and at the same time boosted in investment by supporting it through the $1.3 billion invested in the hydrogen powered research.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The government also imposes regulations which might form/deform the shape of the industry thus affecting it negatively positively.    Economic factors: Read More A Strategic Analysis of Toyota Motor Corporation Essay2465 Words   |  10 Pages A Strategic Analysis of Toyota Motor Corporation Industry: Automotive Industry CONTENTS ABOUT TOYOTA MOTOR CORPORATION PAGE 3 EXTERNAL STRATEGIC ANALYSIS:- PESTEL PORTER’S FIVE FORCE ANALYSIS COMPETITIVE ANALYSIS PAGE 3, 4, 5 AND 6 INTERNAL STRATEGIC ANALYSIS:- SWOT ANALYSIS PORTER’S VALUE CHAIN ANALYSIS PAGE 6, 7 AND 8 STRATEGY FORMULATION:- PORTER’S GENERIC OPTION ANALYSIS ANSOFF MATRIX ANALYSIS PAGE 8,9 AND 10 RECOMMENDATIONSRead MoreToyota Motor Corporate : Japan Essay975 Words   |  4 PagesIntroduction Toyota motor corporate is Japanese Automation Company which manufactures car, bike trucks .Head quarter is located in Toyota, Aichi Japan. The company was in1937 by Kiichiro Toyoda, as a spinoff to create automobile company from his father’s company Toyota industries. In 1934 when I was part of Toyota industries they created type A engine and in 1936 they created first car type AA engine. (Soble, 2010)They operate under 5 different brands that are Toyota brand, Hinno, Ranz, Lexus andRead MorePest Analysis on Tata1416 Words   |  6 PagesINTRODUCTION : - Tata Group was Established under the parent company in year 1945. Tata Motors Limited has become India’s largest automobile company. It was the first Indian automobile company to list on the New York Stock Exchange. Tata Motors began manufacturing commercial vehicles in 1954 with a 15-year collaboration agreement with Daimler Benz of Germany. This partnership has led Tata Motors to not only become India’s larges t automobile company but also India’s largest commercial vehicle manufacturer;Read MoreStrategic Management at General Motors3196 Words   |  13 PagesGeneral Motors (GM) is one of the largest companies involved in the business of designing, building, selling and servicing automobiles and parts in the global market. Company owns several brands such as Chevrolet, Cadillac, Buick, Pontiac, GMC, Oldsmobile, Opel, Hummer, Saturn and Saab Founded by William â€Å"Billy† Durant in 1908, GM held only Buick Motor Company initially, but in a matter of few years acquired more than 20 companies including Oldsmobile, Cadillac, and Oakland, today known as Pontiac

Thursday, December 12, 2019

Security Planning - Policies and Risk Analysis

Question: Discuss about the Security Planning, Policies and Risk Analysis. Answer: Introduction Effective security planning is very important for the application of the good and protective security but is often neglected (Peltier 2016). Moreover, the security planning is implemented primarily in the organization IT environments. Therefore, it can be a proposed plan for controlling as well as protecting a plan or an information system that is within implementation. On the other hand, risk analysis is the process of analyzing and demonstrating the dangers to government agencies, businesses and individuals posed by the human-caused, natural and potential adverse events. The major aim of this research project is to discuss as well as conduct research on the importance of security policies, planning and risk analysis as well for a medium sized organization in Singapore. Apart from that, this study also incorporates how security planning, policies and risk analysis for Garena, which is a well-reputed and medium sized organization in Singapore. On the other hand, this discussion aimed to be made in this assignment incorporates how these assure the business continuity for the company and the proper policies regarding security are aimed to be implemented in this study. Therefore, this study also provides the design of an appropriate security plan for the Singapore based organization, Garena. Company Background Garena was established by Forrest Li and his friends in 2009 because they aspired for transforming their passion for entrepreneurship into a great organization (Garena 2017). Garena distributes exclusively game titles on Garena+ in several nations across Taiwan and Southeast Asia like the multiplayer online battle arena games such as Heroes of Newerth and League of Legends. Moreover, this organization has also launched the online soccer game FIFA Online 3 and the first person shooter games, Alliance of Valiant Arms and Point Blank, which were released on March 2016 (Garena 2017). Garena+ is a social and online game platform and it has the interface equivalent to the platforms of instant messaging. Research and Discussion on the Importance of Security Planning and Policies Garena provides the gaming platform such as Garena+ that is a social as well as an online game platform. On the other hand, it has the interface equivalent to the instant messaging platforms (Garena 2017). Moreover, the features of Garena+ permits gamers for developing lists of buddy, checking on game achievements and progress as well as chatting with friends online. Being a medium sized organization, Garena needs to understand the essence of risk analysis, policies and planning for security (Markmann, Darkow and von der Gracht 2013). In order to implement the security planning and policies, an organization should analyze all the risks associated with the business operation of that particular company. Risk assessment and analysis simply helps Garena to identify and analysis risks so that it would become easy for the company to mitigate the risks. Risk assessment is the very crucial component of planning of computer security. Moreover, risk assessment gives a fundamental baseline to implement the security plans for protecting assets against several threats (Sovacool and Saunders 2014). Therefore, security planning as well as policies plays significant roles for assessing and minimizing risks along with the business operations especially for the small and medium sized organizations. Thus, Garena also has to identify the threats faced by this organization as well as prioritize and analyze those threats accordingly (Haimes 2015). On the other hand, Garena has also to devise the strategies as well as plans for minimizing the likelihood of those threats occurring. This organization also needs to prepare the contingency plans in case the threats are taken place. Figure 1: Security Plan (Source: Sawik, 2013, p.157) For this organization, the security plan and policies can be the fundamental component of the effective program of cyber security. This is simply because of the fact that the security plan and policies provide a beginning edge for Garena seeking to get serious regarding securing their online social and gaming platform (Sadgrove 2016). Apart from that, the security planning and policies can help Garena in formally documenting as well as demonstrating the organizational objectives and goals about the desire and security for exercising due diligence. Besides that, security planning and policies play crucial roles in for recognizing who is responsible formally for maintaining the security purpose of the business activities of Garena (Schumacher et al. 2013). On the other side, in regards to the risk analysis and risk minimization, the security planning and policies also help Garena for properly identifying the major processes, systems, applications and the common risks or threats towards the organization. In addition, Garena can also successfully recognize the important and necessary security plan and policies in terms of supporting the business goals and objectives of this medium sized organization in Singapore (Khouzani et al. 2016). Furthermore, security planning and policies can also provide the scope to this organization for identifying as well as implementing the applicable and suitable frameworks for security control such as state level, CJIS, NG-SEC and other frameworks. Most important fact associated with it is that the security planning and policies are strategic in nature as well as the security plan is the foundation of the security program that can provide the framework for future and consistent Public Safety Answering Point (PSAP) compliance. The security planning and policies should have visibility in terms of being effective (Lincke 2015). On the other side, the security policies should provide particular guidelines for the areas of responsibility and consist of plans that can give the steps for taking and rules for following the policies. Therefore, it must be stated that the good assessment for risks would be capable of determining whether the good security controls as well as security policies are implemented. Moreover, the specification regarding the restrictive policy of account lockout enhances the potential or strength for the denial of service attacks. Risk Analysis Implementation of Appropriate Security Policies Risk assessment and analysis simply helps Garena to identify and analysis risks so that it would become easy for the company to mitigate the risks. Risk assessment is the very crucial component of planning of computer security (Stern 2014). Moreover, risk assessment gives a fundamental baseline to implement the security plans for protecting assets against several threats. there are several ways with the help of which all the risks involved within the business operations of Garena can be identified. Therefore, on way is the collection of personnel from within the company and have brainstorming session where the company enlist several assets and the risks towards those assets of the organization (Lincke 2015). Thus, it would help also fir enhancing the security awareness within the company. Figure 2: Relation between good risk assessment and Security planning (Source: Fitzgerald and Mulkey 2013, p.127) The business risks can come from three major sources such as unintentional risks, intentional risks as well as natural disaster risks. The step of assessing risk within the security strategy is very crucial (Almeshekah and Spafford 2014). The flowchart of risk assessment step within the security strategy cam be segmented into few steps. These are as follows: Recognize the assets, the organization intend to protect as well as the value of those assets Recognize the risks towards every asset Determine the category of the cause of the risk Recognize the techniques, tools or methods utilized by the treats. After the completion of these steps, it is possible for planning thee security planning as well as controlling for reducing the risk realization (Hansson and Aven 2014). Garena is a dynamic organization as well as the security plan of this organization is also dynamic. Therefore, this organization should update the assessment of the risks along with its business operations in a periodic manner. After the asset identification, it is important for determining all the risks, which can influence every asset. One approach of accomplishing it is by recognizing the different avenues through which asset can be destroyed, stolen, altered or damaged such as financial information captured on the database system (Sawik 2013). On the other hand, the risks incorporate the component failure, hardware as well as software misuse, worms, Trojan horses or virus, unauthorized modification or deletion, unauthorized information disclosure, software flaws as well as bugs and penetration. The information processed or produced at the time of the risk analysis should be categorized as per its sensitivity to disclosure or loss in terms of developing an effective policy regarding security planning by Garena. Numerous companies utilize few set of categories of information like proprietary, for internal use only or organization sensitive (Li 2014). On the other hand, the categories utilized within the security policy should be consistent with any existing categories. Therefore, the data should be broken into four classifications of sensitivity with different requirements of handling such as public, private, confidential as well as sensitive (Haimes 2015). This particular classification system of standard data sensitivity should be utilized through the company. After the indemnification of the data sensitivity and risks, the likelihood of every risk occurring should be estimated (Canto-Perello et al. 2013). Treat quantification is a hard work. Obtaining estimates from third parties, basing estimates on the company records, investigating collected statistics or published reports, basing estimates on guesses extrapolated from the previous experience are few significant ways for estimating the risk within the business operation of Garena. Security Plan for the Organization The security of an organization like Garena is comprised of several security policies. These policies provide the specific guidelines for few significant areas of responsibility and are comprised of plans those give steps for taking and protocols for following to implement the policies (Markmann, Darkow and von der Gracht 2013). Therefore, the policies should demonstrate what Garena considers valuable and should also provide the specification regarding which steps should be taken for safeguarding those assets. Moreover, the security policies within security planning can easily be drafted in several ways. Figure 3: Security Planning Process (Source: Sovacool and Saunders 2014, p.641) Apart from that, the other example is a draft policy for numerous sets of assets incorporating remote access policies, internet access policies, password policies and email policies. However, there are two common issues with the organizational policies of Garena. One of the issues is that the policy is a platitude rather than a direction or decision (Haimes 2015). Furthermore, this security policy is not really utilized by the company. Instead of that, it is the piece of paper for showing to the customers, lawyers, auditors and the other organizational components of Garena. Therefore, the policies of computer security should be implemented in such a way so that it can ensure that the unqualified support of the management of Garena is clear, in particular in the environments where the employees realize the inundated with procedures, guidelines, directives and policies (Sadgrove 2016). The security policy of Garena can be the vehicle to emphasize the commitment of the company towards t hee security and making it clear their expectations for the accountability, behavior and performance of the employees. The security policies in regards to the business operation of Garena, can be demonstrated for any area of security (Fitzgerald and Mulkey 2013). Moreover, it is up to the IT manager as well as security administrator in terms of classifying what policies have to be defined and who should make the plan for the security policies. There are few significant types of policies should be implemented by Garena such as password policies, email policies, internet policies as well as restore and backup policies. Password Policies the security provided by the password system is mainly dependent on the passwords those are being kept secret for all times. Therefore, a password can be vulnerable for compromising whether it is known, stored or utilized (Almeshekah and Spafford 2014). Passwords are vulnerable to compromise due to five necessary contexts of password system. The employees may not disclose their passwords to anyone and it would incorporate IT managers and administrators. Administrative Responsibilities the administrator has the responsibility to assign and generate the initial password for every user login. Thus, the user should be informed about the password (Hansson and Aven 2014). It may be essential for preventing exposure of the password to the administrator in some areas. User responsibilities The users should able to understand their responsibilities for keeping the privacy of password and reporting changes in their status, suspected violations of security and so forth (Canto-Perello, Curiel-Esparza and Calvo 2013). Thus, it can recommended that every user be needed for signing a statement for acknowledging the understanding these responsibilities for assuring the security awareness among the user population. Email Policies Email is very crucial to the normal conduct of business of Garena. Therefore, Garena requires the policies for email for helping the workers properly utilize email, for reducing the risk of inadvertent or intentional misuse and for assuring the official records transformed through email are managed properly (Haimes 2015). Internet Policies WWW or World Wide Web contains the body of software and a set of conventions as well as protocols utilized for traversing and finding information over the internet. The web servers can directly be attacked or utilized as jumping off points for attacking the internal networks of Garena (Li 2014). However, the web servers can be secured through few significant ways such as server scripts, web server software and other software. Moreover, proper configuration and firewall of the IP protocol and routers can help for fending off denial of service attacks. Backup and Restore policies Backups are necessary only if the information are captured over the system is of important and value (Stern 2014). These are important due to the computer hardware failure, user error, administrator error, software failure, hacking and vandalism, theft and natural disasters. Conclusion After conducting the entire study, it can be stated as the conclusion that the good assessment for risks would be capable of determining whether the good security controls as well as security policies are implemented. This study has successfully reached to its ultimate conclusion by properly discussing as well as researching the security planning, policies and risk analysis for a medium sized organization in Singapore such as Garena. Therefore, in this regard, this study has successfully portrayed the appropriate security which can help Garena by ensuting its business continuity within the gaming industry. Most importantly, this study has also successfully designed a perfect and an appropriate security plan in regards to Garena, which would ultimately shows this organization a significant way to control its security concerns and risks. References Almeshekah, M.H. and Spafford, E.H., 2014, September. Planning and integrating deception into computer security defenses. InProceedings of the 2014 workshop on New Security Paradigms Workshop(pp. 127-138). ACM. Canto-Perello, J., Curiel-Esparza, J. and Calvo, V., 2013. Criticality and threat analysis on utility tunnels for planning security policies of utilities in urban underground space.Expert Systems with Applications,40(11), pp.4707-4714. Fitzgerald, C.T. and Mulkey, J.R., 2013. Security planning, training, and monitoring.Handbook of Test Security, p.127. Garena - The Official Site. (2017). [online] Intl.garena.com. Available at: https://intl.garena.com/ [Accessed 17 Feb. 2017]. Haimes, Y.Y., 2015.Risk modeling, assessment, and management. John Wiley Sons. Haimes, Y.Y., 2015.Risk modeling, assessment, and management. John Wiley Sons. Hansson, S.O. and Aven, T., 2014. Is risk analysis scientific?.Risk Analysis,34(7), pp.1173-1183.. Khouzani, M.H.R., Malacaria, P., Hankin, C., Fielder, A. and Smeraldi, F., 2016, September. Efficient Numerical Frameworks for Multi-objective Cyber Security Planning. InEuropean Symposium on Research in Computer Security(pp. 179-197). Springer International Publishing. Li, W., 2014.Risk assessment of power systems: models, methods, and applications. John Wiley Sons. Lincke, S., 2015. Managing Risk. InSecurity Planning(pp. 61-83). Springer International Publishing. Lincke, S., 2015. Planning for Network Security. InSecurity Planning(pp. 135-158). Springer International Publishing Markmann, C., Darkow, I.L. and von der Gracht, H., 2013. A Delphi-based risk analysisIdentifying and assessing future challenges for supply chain security in a multi-stakeholder environment.Technological Forecasting and Social Change,80(9), pp.1815-1833. Peltier, T.R., 2016.Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Sadgrove, K., 2016.The complete guide to business risk management. Routledge. Sawik, T., 2013. Selection of optimal countermeasure portfolio in IT security planning.Decision Support Systems,55(1), pp.156-164. Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F. and Sommerlad, P., 2013.Security Patterns: Integrating security and systems engineering. John Wiley Sons. Sovacool, B.K. and Saunders, H., 2014. Competing policy packages and the complexity of energy security.Energy,67, pp.641-651. Stern, D.A., 2014. Balanced Design in Information Systems Security Planning. InThe International Conference in Information Security and Digital Forensics(pp. 110-120). The Society of Digital Information and Wireless Communication.