Saturday, November 9, 2019

Information Systems Security Essay

In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution. The case we have been assigned today deals with physical and logical vulnerabilities and protection against the risks and threats by implying the best controls to either mitigate, avoid and transfer the risks. Being an Information Security officer at a newly opened location in a busy mall, I have been asked to identify physical and logical risks to the pharmacy operations and also to suggest remedies to avoid any huge loss to the business. The pharmacy operations involve the unique transactions which involves the critical patients’ data, valuable medication and access to cash. The regulation set by the government obligates a pharmacy to meet certain standards to secure logical and physical access to information systems. The pharmacy is comprised of 4 work stations, there is a drug storage are and an office in the premises which has a file server, domain controller and a firewall. The three of the four work stations are placed at the counter to record and retrieve information of customers’ order. The entry of the store if from the mall and there the drug storage area is securely locked location behind the front counters. The store has a back door entry which is used by the employees and for delivery of new drugs. As an IT officer I have to protect all aspect of security including physical security of IT systems. Information Systems Security Physical security is an essential part of information technology security. Physical security encompasses not only the area containing system hardware, but also locations of wiring used to connect the systems, supporting services, backup provisions and any other part of the systems. Laptops and other types of mobile computing devices must also be protected from theft. The data on the mobile devices sometimes more than the value of the device. Such devices can also be an entry point on network. First look at the physical vulnerable area to IT systems within the pharmacy. After identifying the IT assets of company we can surly identify the physical risks. * Server Room * File server * Domain controller * Front Counter workstations * Switches/hubs The back door as showed in the floor plan is used by the employees of the pharmacy and it is often used for delivery of drugs. The access through this door is a physical vulnerability. Only authorized personal should be allowed to use this door. Any unidentified entry or activity should be monitored carefully. Such incident can result in loss of physical devices. The server room is a highly secured area which should be allowed only to IT people, other personal should be granted access by seeking special approval. The door should be locked all the time to protect IT assets. The workstations at the front counters should also be locked and placed securely to avoid any theft. The caged area cannot be locked all the time, it would result in low productivity as the staff move between the store, office and front counters. Securing the server room by locking it is the first step; surveillance makes it more effective if someone breaks into the server room. In case of an incident, one can easily pull up the video and check it for a particular time or for a particular event. â€Å"A logical breach affects the network, data and software without physically affecting the hardware. One of the problems with any logical breach of security is that the damage is invisible and its extent is unknown†. (Georgia Institute of Technology). As we read in the book, vulnerabilities are found in all seven domains of the network: * User Domain: * Lack of awareness of security policy * Accidental acceptable use policy violation * Intentional malicious activity * Social engineering * Workstation Domain: Unauthorized user access * Malicious software introduced * Weaknesses in installed software * LAN Domain * Unauthorized network access * Transmitting private data unencrypted * Spreading malicious software * LAN-to-WAN Domain * Exposure and unauthorized access of internal resources to the public * Introduction of malicious software * Loss of productivity due to Internet access * WAN DomainTransmitting private data unencrypted * Malicious attacks from anonymous sources * Denial of Service attacks * Weaknesses in software * Remote Access Domain * Brute-force attacks on access and private data * Unauthorized remote access to resources Data leakage from remote access or lost storage devices * System/Application Domain * Unauthorized physical or logical access to resources * Weaknesses in server operating system or application software * Data loss from errors, failures, or disasters† (Kim, 2012) System and data could be vulnerable due a physical breach where an intruder affects any system or node by uploading some invisible malicious code on one of the computers. Usually the logical breach results due an unauthorized access to the system/network. The users on the front desk should be given access to the information they need to perform their job on need to know basis. Any workstation is capable to breach into sensitive information. Access to any machine could lead to confidential information breach. All users are required to use their credential to access information on the network. A strong password is required by the policy outlined by the IT department. Logical vulnerability deals with anything which is to do with computer software/network other than the physical network. People are the weakest link in the whole chain. They are the biggest threat to the IT network; any user could compromise the system without even knowing the result of his/her actions. Users using personal device on the enterprise network is the biggest threat ever. Use of personal media should be strictly prohibited because it could bring in the malicious code which gives access to hackers to break into network and steal confidential information. A weak password also helps intruders to disguise them as the legitimate user and access the information to compromise the network. Software and antivirus updates could also be crucial if it is not done on time, it can lead into breach. The physical threat and vulnerability can result in huge loss in revenue and confidential information leakage. As mentioned above, any physical vulnerability can result in loss such as theft of the equipment, any device plug to attack remotely or record data. We often printers in the network security, most printers nowadays stores information on built in memory on the printers before printing. If somebody walks out with the printer, access to information in printer’s memory can be accessed easily. Figure 1 Key Logger As showed in the picture, there is a small device which is a key logger. If any personal (internal or external) have access to the assets of the company can install such a device which will not be found with careful examination. Such devices can log the keys strokes which will open a door for attackers to get access to information all the time. Figure 2 Threats & Potential Impact The picture above is self-explanatory, is the network is physically or logically vulnerable any attacker can break which can lead to the impact mentioned above. In case of pharmacy where it is required by the law to take very extra care of customers’ confidential information no risks can be taken. In-case the network is compromised due to physical and logical vulnerability, the attacker can disrupt the whole business. Some disgruntle employee can cause DOS which will bough down the network which will result in delay in orders, low productivity. Vulnerability can also cause loss of information, loss of privacy of customers, legal liability due to leakage of confidential information which is governed by the HIPAA. And above of all reputation among customers, it is very difficult to gain customers’ confidence if it is lost just because of any event. To identity and deal with risks, we are going to take the same approach as defined in the book. After carefully examining the risks, we are going to analyze the impact and based on the impact we will develop a strategy either to mitigate, transfer, avoid or accept the risks. Figure 3 Risk Management Process To deal with the physical risks identified above, the best strategy would be to mitigate or transfer it in-case of any event. Numbers of steps are suggested to mitigate the risk due to physical vulnerability. The back door is used by employees only. The server room is always locked and with prior permission no other than IT personal can enter in it. All IT assets have been locked securely to avoid any theft. Surveillance is also part of our strategy to mitigate any risks. Risks transfer strategy comes into play if anything happened to IT assets. Based on the value of assets most of the assets are covered under insurance. But data is such a valuable asset of the company that no insurance can cover the loss of data theft. After evaluating the logical vulnerabilities, I am going to suggest risk mitigation and risk acceptance strategy. â€Å"Malicious attacks increasingly complex variations are continuously being introduced and can sometimes spread widely before protection software companies deliver the latest detection strings and solutions†. Standard for Technology in Aumotive Retail, 2012) . The first step would be to mitigate the risks at any cost) but since the people are weakest link in the whole IT security scenarios they tend to do things unintentionally which compromise the security. Based on these facts I have also suggested the risk acceptance strategy. This fact is known by most of the businesses but they still do it because they do not perform any operations without manpower. The staff working at front desks or any employee at the pharmacy could use personal media which could lead to any attack. The weak password can also help attackers to use logical bomb technique to guess the password. A strong administrative control is required to avoid such incidents. Some of the suggestions to mitigate the logical vulnerabilities: Security Awareness- as mentioned above the people is the weakest link in the IT security. User awareness on virus control is the most effective tool to control it. In the awareness programs they should be reminded that data should be accepted from the trusted sources. Incase they receive files from untrusted source should not be open. Persona media should be approved by IT department to use. Patch Management- latest patch protects the system against the latest viruses. It is a process that updates the vulnerable areas on the application level. Hackers usually use the flaws and weak points in the system and exploit them to get on the network. Software OEM issues a new update to fix the issue, windows and antivirus auto update is common examples of such patch management. Most organization does not allow automatic updates due to interference in current operations. They usually test the patch on test environment before replicating it to production nodes. Anti-virus scanners – these products scan files and email and instant messaging programs for signature patterns that match known malicious software. Since new viruses are continually emerging, these products can only be effective if they are regularly updated with the latest virus signatures. See your product manual for instructions on how to activate this. Anti-virus scanners can be positioned on gateways to the network and/or on network hosts. Anti-virus scanners need to be frequently updated to be effective. Therefore, regularity and method of update are criteria that need to be considered when selecting anti-virus products. The first line of defense is administrative controls against any physical and logical threats. These are the policies which is prepared and approved by the management to staff for compliance. In pharmacy’s case strict policies are suggested to comply with regulatory compliance (HIPAA). First of all physical access to premises especially from the back door needs to be secure. The policy to enter in the building using a cat card or smart token is mandatory which a control to prohibit any unauthorized access. The IT room is also protected by a digital lock which can only be accessed by ntering correct combination of the password. The IT devices cannot be move out without prior approval from management on a prescribed form. Another preventive control is to disable all removable media from the systems at the front desk. The USB/serial ports are disabled and it can only be granted on special approval. To control logical vulnerabilities I have suggested mix of administrative, detective, preventive, corrective controls. All users by policy are required to use strong passwords, the password must contain, one letter in caps, one symbol/numeric value. The total length should be between 8-20 characters. Users are required to change the password every 30 days and they cannot use passwords any 10 previously used passwords. Users are also cautioned about not to write passwords. Most of the employees have role based access to IT systems. All front desk employees go straight to the application required to book patients’ orders. They cannot open or use personal email on the systems. The access to internet is controlled by the web application filter which only allows users to check pre-approved sited required to manage operations. All systems have the latest updated antivirus software which does not allow any infected file to execute. The best strategy to deal it with is preventive. Similarly to prevent any intruder in the network, IDS are deployed to monitor any unusual activity. Backup of data with regular interval makes it possible to continue the business in case of any break down due to any malicious activity. The data is backed up with only last changed items after every 4 hours. As mentioned earlier the patients’ data is highly confidential, any loop whole can result in legal liabilities.

Thursday, November 7, 2019

Great Guide to Taking Online Tests

Great Guide to Taking Online Tests Great Tips to Help You Succeed in Online Tests While sitting an online test is very similar to taking a classroom test, there are some differences. In truth, many of the same success strategies apply to both types of exams, but there are a few other rules that apply to online tests. The tips provided below are designed to help you get the best possible scores in online tests, in part by making you aware of what mistakes to avoid mistakes that have no bearing on your knowledge of your course material. What to do Prior to an Exam It is important to study beforehand. Sometimes, students think that because they are not visible in an online test, they will have chance to check notes or books while a test is in progress. However, even if you cannot be seen, the time spent checking notes and/or books limits the amount of time left for the actual exam. It does not help much in the long-run if you get a couple more correct answers but do not have time to address all the questions. Therefore, studying in advance is important in order to familiarize yourself with the material. Additionally, unless your exam is of the open book variety, checking notes and books while an exam is in progress is viewed as cheating. So, try not to do this. Even if you are taking an open book exam, it is still necessary to do some advance study in order to understand the materials. This helps to make you more efficient and it maximizes exam time, thereby allowing you to earn the best possible grade(s). Identify a quiet space with no chance of interruption for your exam. Time is limited in exam situations. If you are taking your exam at home, let your family know the exam time and ask for quietness. Look for other options if you think this will not work. A lot of college and local libraries have quiet study rooms. By contrast, the local coffee bar is not a good option. Make sure you know what the technical requirements are.Do you know if your laptop or desktop computer is set up in the required way? Does your link to the test website work properly? Double-check that you are able to access the exam site and that you understand the login procedure well in advance. Another tool that is being increasingly used in online tests is webcam monitoring. If it is the case your particular course uses this technology to detect cheating, make sure your system is set up properly and understand what is and is not permissible. A webcam monitor is often set up to see the test-takers head, hands, computer/laptop screen, and a 180-degree view of the exam space. Understand the parameters of your test. There are a number of things it is essential to know about how a test is to be conducted. You may find some answers in your course syllabus. For instance:What is the duration of the test/exam? If you leave or log out of the test, will you be able to return i.e. log back in? Will you be able to revisit earlier questions or must you submit answers in order to proceed?Understanding the exam rules will allow you to use the allocated time more effectively and efficiently. What Happens While an Exam is in Progress During an exam, only the exam application should be kept open.Other open windows and/or applications could indicate cheating. Additionally, too many open windows can affect speed of response, which means time may be lost. So, do bear this in mind. Keep an eye on time.When you begin, calculate the amount of time you want to allocate to each question or section. This helps ensure you get through everything. Resist cheating. The aim of a test is to accurately measure the participants knowledge. It is unlikely you would employ a dentist or plumber who had cheated during their exams and did not properly understand their profession or trade. The exam system is only effective when participants act with honesty and integrity. In most universities and colleges, cheating is considered a violation of a code of honor. It can lead you to fail a test or entire course, or get you expelled. If you follow this advice, you should succeed in online tests. Feel free to add any of your own tips to our list!

Tuesday, November 5, 2019

6+ Websites and Tools for Your Finance Homework the Wolf of Wall Street Would Approve

6+ Websites and Tools for Your Finance Homework the Wolf of Wall Street Would Approve 6+ Websites and Tools for Your Finance Homework the Wolf of Wall Street Would Approve Economic papers have some distinctive features that you have to take into account while writing a finance homework. The most important thing in creating such kind of assignments is to be an analytical and precise thinker, meaning the person who is savvy in the economic studies. If you find some general finance articles online and try to write in the same way the information is given there, that will be one of the points your professors will lower your grade for because you can’t appear as a journalist or copywriter. You need to look like a true economist who knows what he/she’s talking about. Moreover, it is essential to know about the peculiarities of the economic writing style: Using present tense; Going for active voice; Not employing dramatic verbs and adjectives; Avoiding abbreviations and contractions; Writing short sentences; Not generating filler text; Etc. These are not all requirements, but they are the main ones. After upgrading your knowledge about the economic writing style, you need to find decent sources and tools to use only reliable data for backing up your statements. And guess what? We have already found several ones for you. 1.  Stock Market Simulator This is a great opportunity for you if you wish to write a finance paper within the stock market domain. This simulator grants you $100 000 of virtual money (you don’t need to invest anything whatsoever), and you can play with this capital buying stocks, investing, etc. just to feel like you’re doing everything for real and train your decision-making skills. 2.  Economic History Any economic paper needs a base or reference to its past. In this online resource you will find precise statistics, profound and trustworthy data together with analytical articles. 3.  The Concise Encyclopedia of Economics This encyclopedia was created by several economics enthusiasts who are fond of this sphere and want to share some valuable information with the world. There you can spot articles written by economists, but the information is given in such a manner so that even a non-economist would understand the main points. 4.  ReadyRatios.com This is an online software that evaluates financial statements. It is paid, but there are some free features. If the topic of your finance paper is the analysis of a financial position of some company, this tool is a perfect helper in your case. 5.  Online Calculators There 10 different calculators that can help you estimate incomes, social security taxes, budgets, pension returns, etc. They are interactive and free to use. 6.  Yahoo Finance This is a database of reports, articles and economic forecasts about international state of affairs in the sphere of finance. It contains high quality and credible information, and, most importantly, it’s free. It is a very good tool to use for academic purposes as it provides you with valuable data for your research. Use these online instruments for writing finance papers and produce readable as well as interesting content! P.S. Have your own economic tools that you use for the finance studies? Share them with our homework writing service!

Sunday, November 3, 2019

Third Cinema (address one of the following questions) Essay

Third Cinema (address one of the following questions) - Essay Example Cinema has been divided into three categories, first, second and third cinema. Theses terms had their birth at the Bandung Conference of 1955, the first conference of the Non-Aligned Movement. China propagated the theory of the three distinct worlds. The first world i.e. the advanced capitalist countries included Western Europe, North America and Australasia; the second world i.e. the previous socialist countries of Eastern Europe and Soviet Union. The remaining countries were thus the third world, to which China stated its commitment. (1) First Cinema refers the model identified as the Hollywood movie. Also known as commercial or popular cinema, it corresponds to an ideology which the particular relationship between film and spectator is superfluous, where cinema is conceived as pure entertainment. Aim of this cinema is to maximize profits. This kind of film is made for display in large theatres, with a standardized duration either feature-length or blockbuster. All types of films come under this category even scientific documentary is susceptible to the aspirations of big money. Second Cinema is also known as art or parallel cinema. Parallel cinema has its own structures, patterns of distribution and exhibition, and its own ideologies. Art has become a cinema made by and for the limited social groups. It expresses the aspirations of the middle layers, the petty bourgeoisie and consequently is often revolutionary but pessimist and sometimes mystical. Like first cinema all categories of films may be found in this category. There is a deliberate uncertainty in the term ‘Third Cinema’ which requires clarification. The term ‘Third Cinema’ is derived from the correspondence with the term ‘third world’, referring to the underdeveloped countries of Asia, Africa and Latin America. In the dependent countries, third cinema is a cinema of de-colonization, which expresses the will to national liberation,

Thursday, October 31, 2019

Rebuttal - Why Marijuana should be Legal in the US Essay

Rebuttal - Why Marijuana should be Legal in the US - Essay Example a striking difference can be seen as the results of the poll in 2011 put forward the fact that 50 percent of the Americans wanted marijuana to be legalized now (Carey 2011). The legalization of marijuana has sparked many debates as many benefits of this legalization have been put forward and demands for the revision of the legislation with regard to marijuana has been demanded. The Huffington Post reported the stand of the White House on the issue of the legalization of marijuana. The White House declared the fact that marijuana was a drug which carried many disadvantages and they could not legalize the drug as it would bring much harm to the society. The White House indicated the fact that the government was spending much on research with regard to marijuana and they did not find any strong research that upheld the benefits of this drug. It was further claimed that marijuana resulted in health issues which included â€Å"addiction, respiratory disease, and cognitive impairment.† It was also stated that legalizing of marijuana would not result in any benefit for the community and would rather cause harm to the society (Graves 2011). The benefits of marijuana have been upheld by many groups who consider that legalization of marijuana would result in many positive effects. The use of marijuana in medicine has been one of the most important benefits of the drug. The California Medical Association upheld this stand and put forward the fact that marijuana should be made legal. The Association indicated the fact that advantages of this legalization were much higher than the disadvantages. They also upheld the fact that marijuana was helpful in the relief of pain and thus it should be made legal and regulations should be imposed on drug distribution rather than putting a ban on it (York 2011). The President of Columbia also put forward the fact that the legalization of marijuana had many advantages and he explained that the drug should be made legal throughout the

Tuesday, October 29, 2019

European Business Research Paper Example | Topics and Well Written Essays - 2000 words - 1

European Business - Research Paper Example As a result, various important countries were trapped in a deflationary ensnare. The impact was visible almost in every sector of the global economy. One of the major causes revealed by the evidences is the inefficiency of the financial markets in controlling the liquidity ratio with over liberalised monetary policies in most of the developed countries. Notably, the impact was strongest in terms of international trade and investment (UNCTAD, 2009). Considering the fact, this report will emphasise on the current global economic situation. The impact of the current trends will be further analysed with the example of a multinational company, Nissan in terms of international trade and investment. ... The financial measures undertaken by the governments of developed countries have significantly contributed to the financial stability of the world economy. However, the structural limitations faced by these economies are likely to cause risks in relation to the debt, real estate and credit markets along with other factors which in turn can affect the overall economic stability. Lower GDP growth rate, widening fiscal deficit, political conflict, and other similar issues can be observed as the most effective trends in the current economic situation concerning the developed countries (UNCTAD, 2010). Surprisingly, the developing countries were recorded to be least effected by the recent economic downturn, gaining an extra advantage of sovereignty in the world economy. Comparatively well-structured fiscal policies and a strong growth of GDP have evidently signified the developing countries as the major drivers of economic upturn in the current scenario. Contradicting to the developed econ omies, the growth trends of the developing nations signify ample opportunities for international trade and investment. However, the economies can be witnessed to possess few limitations in terms of their dependency on the developed countries. Moreover, the developing economies are also recorded to face the challenges in terms of structural issues which depict a moderate growth prospect on the future context (Department for Business Innovation & Skills, 2011). These trends can also be witnessed in the context of EU economies. Notably, the member states of EU comprises of both developed as well as developing economies. This depicts that the European market is likely to face the risks of weak and moderate growth along with various challenges in terms of fiscal

Sunday, October 27, 2019

Vodafone Strategy Analysis

Vodafone Strategy Analysis Jump to: Vodafone Business Strategy | Internal and External Analysis | Strategy Evaluation | Strategy Implementation | Conclusion 1.0 INTRODUCTION This report presents an in-depth business; strategic analysis of Vodafone Group Plc. The report provides a comprehensive insight into the company, including strategy formulation, strategy planning, strategy evaluation and selection as well as strategy implementation. This will involve in investigating the organizations external environment, to identify Opportunities and threats it might face, and its strategic capacity, capabilities to isolate key strengths and weakness as well as indentify the significant of significant of the stakeholder analysis and environment and organizational audit OVERVIEW OF THE COMPANY A Multi-National Company named Vodafone is one the leading companies in Telecommunication Industry. Vodafone PLC Vodafone is a leading global player in mobile telecommunications. It operates in over 26 countries worldwide. Vodafone has grown rapidly since it was originally formed in 1984. It has responsibilities to its 60,000 staff and 151 million customers and shareholders. Vodafone offers a wide range Products/Services, such as Voice Services Social Products Messaging Services Vodafone live Vodafone live! With 3G USB modems Vodafone Mobile Connect Data Cards Roaming Services Other Business Services Vodafone was formed in 1984 as a subsidiary of Racal Electronics Plc. Then known as Racal Telecom Limited, approximately 20% of the companys capital was offered to the public in October 1988. Task 01: Strategy Formulation 1.1 Business Strategy Johnson and Scholars defined business Strategy as follows Strategy is the direction and scope of an organization over the long-term: which achieves advantage for the organization through its configuration of resources within a challenging environment, to meet the needs of markets and to fulfill stakeholder expectations. Business strategy is the foundation and core competition of successful business. But there are different types of business strategy. The best business strategies must steer a course between the inevitable internal pressure for business continuity and the demands of a rapidly changing world 1.1.1 Vodafones Business Strategy Vodafones current business strategy is to grow through geographic expansion, acquisition of new customers, retention of existing customers and increasing usage through innovations in technology.This is proving a very successful strategy, as is evident from Vodafones UK success. Vodafone opened the UKs first cellular network on 1 January 1985. It has been the market leader since 1986; its UK networks carry over 100 million calls each week. Vodafone currently has the largest share of the UK cellular market. Vodafone business strategy and their sustainability strategy are inseparable. Meeting societys needs creates enormous opportunities to grow business. Vodafone aim to identify and focus on the areas where their interventions can address sustainability challenges most effectively at the same time as offering an attractive commercial return for their shareholders. Expanding Vodafone business strategy in emerging markets such as Africa and India is extending access to communications and the social and economic benefits this brings. Vodafone can also make an import ant contribution to development and to environmental sustainability by enabling a low-carbon society through bespoke products and services that meet specific needs in local markets. 1.2 Stake Holder Analysis Stakeholder Analysis is the technique used to identify the key people who have to be won over. On other words it analyse key stakeholders, an assessment of their interests and the ways in which these interests affect the project and its viability. 1.2.1 Videophone s Stake Holders are as follows 1.2.2 Significant of Stakeholder Holder Analysis The extent to which stakeholders affect the activities of an organisation depends on the relationship between the stakeholder and the organisation. Mendelows matrix provides a way of mapping stakeholders based on the power to affect the organization and their interest in doing so. It identifies the responses which management needs to make to the stakeholders in the different quadrants. Stakeholder Holder Analysis is very important to any organization. Significant of Stakeholder Holder Analysis of Vodafone PLC. Vodafone PLC can use the opinions of the most powerful stakeholders to shape companies projects at an early stage. Not only does this make it more likely that they will support to organization, their input can also improve the quality of Vodafone future. Gaining support from powerful stakeholders can help Vodafone PLC to win more resources. This makes it more likely that your projects will be successful. By communicating with stakeholders early and often, company can ensure that they know what company is doing and fully understand the benefits of companys project .this means they can support companies actively when necessary. Vodafone PLC can anticipate what peoples reaction to companies future project may be, and build into companies plan the actions that will win peoples support Draws out the interests of stakeholders in relation to the problems which the Vodafones future plans which seeking to address. Vodafone cans identifies conflicts of interest and potential conflict Helps provide an overall picture Helps identify relationships between different stakeholders helps possible coalition. 1.3 Environment and Organizational Audit 1.3.1 Environmental Audits Environmental audits are intended to quantify environmental performance and environmental position. In this way they perform an analogous (similar) function to financial audits. An environmental audit report ideally contains a statement of environmental performance and environmental position, and may also aim to define what needs to be done to sustain or improve on indicators of such performance and position. 1.3.1.1 Environment Audit of Vodafone Vodafone s an environmental audit report ideally contains a statement of environmental performance and environmental position, and may also aim to define what needs to be done to sustain or improve on indicators of such performance and position. It includes Environment Policy Vodafone. Such as Improving energy efficiency Reducing waste Increasing reuse and recycling Environmental audit report includes how Vodafone plc committed to reducing the energy and natural resources they use, and the amount of waste they create. As well as a clear moral obligation, there is a sound business case for good environmental management. It can help them to reduce costs and meet the expectations of our customers and employees. Many of their larger customers now include environmental performance as criteria in their procurement process Energy and waste reduction targets are included in the personal development plans for relevant employees. Vodafones standards encourage suppliers to improve their environmental performance. 1.3.2 An Organizational Audit An Organizational Audit is a procedure for examining the practices, procedures, programs, and policies of an Organization. The growing challenge of Organization Design is learning how to adjust strategies and internal operations to the rapidly changing business environment.Through The Organizational Audi program it help Vodafone PLC to change the very nature of how it operates by aligning internal structures, processes, and systems to strategy, while adjusting to the demands of the external environment The length of The Organizational Audit is based on the size and complexity of the organization. It can be completed in a single intervention or spaced over a period of several weeks or months. The Organizational Audi format will be tailored to fit the needs of the organization. 1.4 Strategic Positioning Techniques Strategic positioning is the positioning of an organization (unit) in the future, while taking into account the changing environment, plus the systematic realization of that positioning. The strategic positioning of Vodafone PLC includes the devising of the desired future position of the organization on the basis of present and foreseeable developments, and the making of plans to realize that positioning. The strategic positioning method is derived from the business world. The method is aimed at ensuring the continuity of the organization. The strategy determines the contents and the character of the organizations activities. Terms, such as survival, legitimacy, market positioning, relationship with environment and choice for a certain work area, come up in this context. When developing strategic positioning for Vodafone PLC we have to raise Various questions As follows: How does the Vodafone PLC future look like? How could the Vodafone PLC be roughly positioned in the future? How are things in the Vodafone PLC at present? How can opportunities be seized and how can threats be met? How can this be put into practice in a systematic way? Task 02: Strategic Planning 2.1 Strategic Planning Strategic planning is an organizations process of defining its strategy, or direction, and making decisions on allocating its resources to pursue this strategy, including its capital and people. Various business analysis techniques can be used in strategic planning, including SWOT analysis (Strengths, Weaknesses, Opportunities, and Threats ), PEST analysis (Political, Economic, Social, and Technological), STEER analysis (Socio-cultural, Technological, Economic, Ecological, and Regulatory factors), and EPISTEL (Environment, Political, Informatics, Social, Technological, Economic and Legal) .Therefore before preparing strategic plan we have to understand external and internal factors affecting the Vodafone PLC as follows. 2.1.1 PEST Analysis for Vodafone (P)OLITICAL: Political factors involved the tax policy, labor law, environmental law, trade restrictions, tariff, and political stability. Due to the customer relationships that the company value most, Vodafone is willing to shift their approach away from unit pricing and unit based tariffs to propositions that deliver much more value to customers in return for greater commitment, incremental penetration of the account or more balanced commercial costs. (E)CONOMIC: Economic factors include the economic growth, interest rates, exchange rates and the inflation rate. The pricing factors the company usually do is giving the consumers a right and justly cost so that, everybody can avail or purchase their product in a broad sense. (S)OCIAL: social factors include the cultural aspects and include health consciousness, population growth rate, age distribution, career attitudes and emphasis on safety. The need for an equipment that can be a good device for every age range is available, since everybody are fully oriented in the use of the mobile technologies. (T)ECHNOLOGICAL: technological factors include ecological and environmental aspects, like RD (Research and Development) activity, automation, technology incentives and the rate of technological change. The technology is the thing that Vodafone is very proud of. The technological advancement enables the company to make a customer relationships stronger because of their customers trust that  built over the years. 2.1.2 SWOT Analysis for Vodafone PLC (S)TRENGTHS: The Companys strengths can be the reputation of the business in the local market because of the product in long run. The companys strengths are the strong bond of the company towards the customer and valuing them most as they craft another product. Another strength that can be depicted is the technology that is their greatest asset above the competitors. (W)EAKNESSES: The result of the weaknesses can be shortage of materials needed or more expensive purchase of materials in the target country. Meeting the customers demand is sometimes hard to cope. Every company must admit that reaching the customers taste and preferences are really hard to achieve. But these weaknesses will serve as a challenge in the company and they must prepare actions in answering these needs. (O)PPORTUNITIES: The opportunities can be a well established position when the business successfully landed in the foreign market. On growth opportunities, the three target areas are Mobile data, Enterprise and Broadband (T)HREATS: The threats can be large competitors that are waiting for the business that were undiscovered before conducting the study. This possibility is not that new. The Vodafone is not the only company that serving a kind of delicacy. SWOT Analysis for Vodafone PLC Dominance in Cellular Market Declining Market Share in Japanese Market Wide Geographical Presence Limited Exposure to Emerging Markets Expanding Geographic Presence Emergence of Low-Cost Brands Growth through 3G Market Saturation in Europe 2.1.3 STRATEGIC OPTION DEVELOPMENT Porters Generic Competitive Strategy Vodafone PLC has also been able to use Porters generic strategies to position itself in the marketplace.   This is a direct result of SWOT analysis. This framework also helps in deciding whether the organization is a cost leader, differentiator or a focus player accordingly, a company positions itself by leveraging its strengths. Porters three generic strategies are discussed in more detail in the following section. Cost leadership The companies that attempt to become the lowest-cost producers in an industry can be referred to as those following a cost leadership strategy. The company with the lowest costs would earn the highest profits in the event when the competing products are essentially undifferentiated, and selling at a standard market price. Differentiation When a company differentiates its products, it is often able to charge a premium price for its products or services in the market. Some general examples of differentiation include better service levels to customers, better product performance etc. in comparison with the existing competitors. Porter (1980) has argued that for a company employing a differentiation strategy, there would be extra costs that the company would have to incur. Focus Organisations can make use of the focus strategy by focusing on a specific niche in the market and offering specialised products for that niche. This is why the focus strategy is also sometimes referred to as the niche strategy (Lynch, 2003). Stuck in the middle According to Porter (1980), a companys failure to make a choice between cost leadership and differentiation essentially implies that the company is stuck in the middle. There is no competitive advantage for a company that is stuck in the middle and the result is often poor financial performance (Porter, 1980). Vodafone Generic Competitive Strategy is Low cost Competency Uniqueness Competency Border Target Narrow Target 2.1.4 STRATEGIC OPTIONS Vodafone PLC also aspires to uphold a high level of growth .Vodafones strategy up to date has been the key factor in its huge success and can carry on applying all of these strategies for the foreseeable future. Vodafones few strategic options are as follows 1. Merge between Vodafone and 3 Mobile Vodafone PLC and 3 mobile has proposed merger of the two companies. Both companies confirmed that, in the event of the merger proceeding as planned, all new and existing contract customers of Vodafone and 3 will be able to enjoy the same great value offered on all existing Vodafone and 3 mobile voice and data plans for the next 2 years. 2. Vodafone is considering a buyout of T-Mobile Vodafone is considering a buyout of T-Mobile Currently, O2 has the largest share of the UK market, but Vodafones 25% combined with T-Mobiles 15% would give the company two out of every five UK mobile customers. 3. Focusing for Diversification -Vodafone entering into Electronic equipment Market Diversification is the name given to the growth strategy where a business markets new products in new markets. This is an inherently more risk strategy because the business is moving into markets in which it has little or no experience. Vodafone PLC can enter into electronic equipment market by using diversification strategy. Vodafone can produce Vodafone Television, Vodafone Microwaves, Vodafone Washing machine etc. Vodafone diversification production Task 03: Strategy Evaluation and Selection 3.1 Evaluations of Options The evaluation of strategic options is an important part of the strategy process, whether largely incremental and implicit or an explicit stage within a formal planning system. The Evaluation of Business Strategy we can Use SAF module .In corporate strategy, Johnson, Scholars and Whittington present a model in which strategic options are evaluated against three key success criteria. Suitability (would it work?) Feasibility (can it be made to work?) Acceptability (will they work it?) For evaluating purpose, I have selected only few strategic options. Strategic Option 01 Focusing for Diversification -Vodafone entering into Electronic equipment Market Strategic Option 02 Merge between Vodafone and 3 Mobile 3.2 Evaluations of selected Options Suitability Option 01 Option 02 Does the strategy address the circumstances In which the organisation is operating? Yes Yes Is the strategy viable? Yes Yes Does the strategy exploit core competences? Yes Yes Does the strategy address the external environment? Yes Yes Is the strategy viable and achievable given conditions within environment? Yes Yes Does the strategy build upon or exploit the strategic capabilities of the organisation? Yes Yes Does the strategy fit with the current Yes Yes corporate culture of the organisation? Does the strategy create/maintain Competitive advantage? Yes Yes Acceptability Share holders Does the strategy provide adequate financial Yes Yes retunes? Does the strategy lead to unacceptable risk? No Yes Will there be issues at social responsibility? No Yes Management Will the Management support the strategy Yes Yes Will they leave they leave the organization No Yes Staff Will there be strike or turnover due to No Yes Implementing new strategy? Will they support to the implementing Yes Yes the Strategy? Does the strategy have impact over there salary? Yes Yes Does the strategy have impact over job security? No Yes Customers Will They use our new services? Yes Yes Will it satisfy there needs? Yes Yes Will it answer their complaints? Yes Yes Supplies Will the suppliers support to the strategy? Yes Yes Will the change there product, Process and location Yes Yes To support our strategy? Do we can make guarantee on financial security ? Yes Yes after implementing new strategy? National Government Will be misfit with the law? No No Will theses violating policy of the government? No No Will government provide support for us? Yes Yes Pressure Group Will it be damaging Outcry? Yes Yes Does it go far enough to satisfy three complaints? No No Feasibility Does the organisation have the resources and capabilities to deliver the strategy? Yes Yes Does Vodafone has previous experience in Yes Yes Similar Strategy? 3.2 Strategic Decision and Recommendation Strategy When evaluating selected strategic options ,option 01 would be most favourable option over option 2. Vodafone entering into Electronic equipment Market Vodafone PLC can enter into electronic equipment market by using diversification strategy. Vodafone can produce Vodafone Television ,Vodafone Microwaves ,Vodafone Washing machine etcà ¢Ã¢â€š ¬Ã‚ ¦ Diversification is the name given to the growth strategy where a business markets new products in new markets. This is an inherently more risk strategy because the business is moving into markets in which it has little or no experience. Option 1 would fit to addresses the challenges of the external environment, is based upon or enhances the resources and capabilities of the organisation, builds or exploits synergies and is consistent with its corporate culture. This strategy complies with consideration of the anticipated rewards relative to the goals of the organisation. In addition, expectations of its key stakeholder groups. Anticipated rewards of option 1 will achieve possible returns relative to the risks incurred. Task 04: Strategy Implementation 4.1 Comparison of Role and Responsibility of Strategy Implementation Implementing Strategy gives a broad view of implementation and a thorough understanding of each piece of the implementation process. when implementing strategy will learn how to properly align corporate structure with corporate strategies and how to integrate strategy formulation and implementation by focusing on core areas. Strategy implementation skills are not easily mastered, unfortunately. In fact, virtually all managers find implementation the most difficult aspect of their jobs more difficult than strategic analysis or strategy formulation. When Implementing Strategy Someone needs to sign up as responsible for the action plan. Someone must say, yes, Ill do it. Youve got to identify that one person who will be carrying the ball. This is an absolute necessity for monitoring the plan. we must know whom to ask how is it going? And youve got to know whom to offer help to if, for whatever reason, the strategy isnt being accomplished. The manager responsible for the action plan is the same person responsible for the strategy the action plan is intended to implement. He signed up for that responsibility way back at strategy sessions. Selected Organization Marks Spencer (MS) M S is a major British retailer, with over 895 stores in more than 40 territories around the world, over 600 domestic and 295 international.. Virgin Trains: Virgin Trains is a train operating company in the United Kingdom. Although it is branded as part of the Virgin Group, the groups share in the company is only 51%, with the remaining 49% held by Stagecoach Group 4.2 Comparison of role and responsibilities in Strategy Implementation process. Even in the same industry the organisations practices different types of strategies to get competitive advantage over the industry and to become a market leader. In the strategy implementation process managers liable to carry out strategy implementation process as required. It should be lined with pre set standards. When comparing strategies of Virgin Train and Mark Spence they have their own strategies. The Virgin Train operates in the transport industry and where top management must make sure that strategy is comply with pre set objectives and it is going on in the right way. They need to always check whether there is any deviation from action plan. Resource allocation should be done throughout the implementation process as appropriate. Where top management need to concern about their major competitors while the strategy implementation process. In the Mark Spencer they are operating in the retail industry. Asda, Tesco, Morison, Sainsbury are their major competitors in the market. So that in the strategy implementation process Mark Spencer need to aware of their competitors strategies as well. Even organisations practices different types of strategies to get competitive advantages main roles and responsibilities are very common for every organisation. Common steps need to be fallowed in the strategy implementation process. Comply with action plan, resources allocation, identify deviation from objectives, monitoring and take control action, etc. Are can be seen in the every strategy implementation. In this process responsibilities have been allocated to relevant personnel and their responsibility is to act according to the action plan. 4.2 Resource Requirement of Implementing Selected Strategy When implementing strategy, Vodafone has to allocate resources in a logical order. . Those resources include financial, facilities and equipment, people and information. Vodafone PLC need to quantify the specific resources required to complete each of those action steps. Resources and capabilities of any firms can be measured through identifying its tangible and intangible resources and capabilities within. It ranges from financial, physical, technological and organizational; while intangible can be human, innovation and reputation assets Human Resource Normally most managers focus primarily on the financial resource. The resource which turns up scarce more often than any other is the human resource. Most often companies just plain run out of time or talent or time of their most talented people. No of employment must be decided by Line managers and floor Managers of the Vodafone PLC Financial Resources: Budget for Vodafone entering into Electronic equipment Market 4.3 Proposal for Vodafone Entering into Electronic Equipment Market This proposal is prepare to evaluate whether this strategy is success or not. After indentify external and internal factors affecting, Vodafone PLC has to decide whether all the selected strategy is financially viable and ability of meeting the selected target as well as it within the budget and time frame. 4.3.1 Target for Vodafone entering into Electronic equipment Market Introduce new product to existing customers and new customers by 10% within next six month [April 2011-September 2011] Improve frequency of purchase of Vodafone entering into Electronic equipment by 10% within each year. Re-position using the marketing mix. Increase Impulse segment by 25% within 12 month. 5.0 Conclusion Recommendation In a nut shell, the report examined Vodafone entering into Electronic Equipment Market. The report provided comprehensive insight into the company, including strategy formulation, strategy planning, strategy evaluation and selection as well as strategy implementation. This will involve in investigating the organizations external environment, to identify Opportunities and threats it might face, and its strategic capacity, capabilities to isolate key strengths and weakness as well as indentify the significant of significant of the stakeholder analysis and environment and organizational audit Business strategy plan is based on various business analysis techniques including SWOT analysis (Strengths, Weaknesses, Opportunities, and Threats), PEST analysis (Political, Economic, Social, and Technological), Marketing plan is based on SOSTAC framework. All activities integrated to achieve pre-established strategic objectives. External and internal forces have been evaluated by using SWOT analysis and PEST analysis model. Vodafone PLC could use its strong brand position. As financial aspect concerns NPV is positive, therefore based on financial points this strategy for into Electronic Equipment Market. The strategy is viable. But we need to take into account of non financial factors as well. Vodafone has to develop strong Marketing strategy when into Electronic Equipment Market .finally all These performances must be in line with bonus scheme to motivate employee 6.0 References Annual Report 2009. Vodafone. http://www.vodafone.com/static/annual_report09/downloads/VF_Annual_Report_2009.pdf. Retrieved 2009-10-31.   Who we are. Vodafone Group Plc. http://www.vodafone.com/start/about_vodafone/who_we_are.html. Retrieved 23 August 2010.   Our global footprint. Vodafone Group Plc. http://www.vodafone.com/start/about_vodafone/where_we_are.html. Retrieved 23 August 2010.   FTSE All-Share Index Ranking. stockchallenge.co.uk. http://www.stockchallenge.co.uk/ftse.php. Retrieved 2010-08-12.   David, F Strategic Management, Columbus:Merrill Publishing Company, 1989 Lamb, Robert, Boyden Competitive strategic management, Englewood Cliffs, NJ: Prentice-Hall, 1984 Johnson, G, Scholes, K, Whittington, R Exploring Corporate Strategy, 8th Edition, FT Prentice Hall, Essex, 2008, ISBN 978-0-273-71192-6 Chandler, Alfred Strategy and Structure: Chapters in the history of industrial enterprise, Doubleday, New York, 1962. Ansoff, Igor Corporate Strategy McGraw Hill, New York, 1965. Drucker, Peter The Practice of Management, Harper and Row, New York, 1954. Chaffee, E. Three models of strategy, Academy of Management Review, vol 10, no. 1, 1985. Buzzell, R. and Gale, B. The PIMS Principles: Linking Strategy to Performance, Free Press, New York, 1987. chumacher, E.F. Small is Beautiful: a Study of Economics as if People Mattered, ISBN 0-06-131778-0 (also ISBN 0-88179-169-5) Krause, Reinhardt (1999-06-08). Vodafones Quest Begins With AirTouch Alliance. Investors Business Daily. http://investors.com/IBDArchives/ArtShow.asp?atn=324329775205550sy=kw=ps=440ac=WBM. Mannesmann rejects Vodafone bid. BBC News Online (BBC). 1999-11-14. http://news.bbc.co.uk/1/hi/business/the_company_file/519813.stm. Retrieved 2007-04-06.   Vodafone seals Mannesmann merger. BBC News Online (BBC). 2000-02-03. http://news.bbc.co.uk/1/hi/business/630166.stm. Retrieved 2007-04-06.ÂÂ