Wednesday, February 26, 2020

Case Study Assignment Example | Topics and Well Written Essays - 250 words

Case Study - Assignment Example Hackers might focus on a company’s financial data to obtain its earnings before being publicly released. Such knowledge might enable their profit by acquiring or dumping stock. Another threat to data security of a corporate firm is known as the advanced persistent threat. It predominantly involves stealing intellectual property and associates itself with state-sponsored espionage. The gains are not strictly financial because what is at risk is not only the intellectual property of the corporate entity but possibly the national security. APT targets organisations and nations for economic and political motives. The Stuxnet worm case in 2010 is an example of such a case (Plant 1). The Stuxnet worm infiltrated industrial control systems like those that manage water or power plants. Industries at risk include defence industries, financial industries and technology industries. Another potentially dangerous threat is hacktivism. The goal of the hackers in this type is creating or altering the public perception of the brand. For instance, the hackers might hack and get sensitive information about the company and disclose it the whole world especially if the company belongs to the private sector. An example of such a type of threat is WikiLeaks or the digital equivalent of Occupy Wall

Monday, February 10, 2020

Business decision making Essay Example | Topics and Well Written Essays - 500 words - 1

Business decision making - Essay Example The study will also put into consideration the sales value of the organization and factors affecting sales by use of graphs. In addition, measure of performance of the organization will be of much concern and various methods will be used. Some of those methods include; mean mode, median, standard deviation, Variance, correlation coefficient, rage and Net present value methods. 1.1) Primary data usually gives firsthand information about the target market hen coming up with a plan for the following should be considered; research method, contact methods, sampling plan and research techniques and instruments. These methods of collecting data differ from those of secondary methods. In primary research a clear plan of contacting people who will participate will be decided on. This may include the use of phone interviews online surveys and other mediums to find out customer preferences from prospect customers. The sampling plan will involve taking into consideration the size of the sample to be used. The research instruments will involve the use of questionnaires (Boswell, Boswell, and Cannon, 2014) The use of secondary data will involve using data that has been already documented these data may be useful because a comparison of similar organization in the industry may be used in forecasting sales (Kothari, 2005) Collecting primary data has advantages over secondary data because they are fresh, precise and are related to the issue of concern. Secondary data may be outdated thus may give wrong projections, may contain errors, may not be easily accessible and might be of low quality (Mooi, and Sarstedt, 2011). We are going to collect primary data as well as secondary data as indicated below. 1.2) The sampling frame refers to the target group which researchers can use to make selections. It contains a comprehensive and updated list of the members of the population involved in the research. There are various methods, which can be used for