Thursday, December 26, 2019

What Makes A Great Leader - 1271 Words

Mahatma Gandhi, Mike Krzyzewski, Pope Francis, and Abraham Lincoln. All great leaders, all posses the same characteristics. When it comes to leadership many different names can be added to the long list. If you were to take a closer look on those people you will find what makes up a great leader. Being a leader is meant for only a certain breed of people. To be a great leader a person must consist of Confidence, Intelligence, and they must be versed. Great Leaders are all alike in someway. A Great leader is always a canny person. A person of great intelligence on the thing that they are trying to lead. Mike Krzyzewski is considered one of the best coaches of all time in the sports world. When younger, Coach Krzyzewski enrolled into the†¦show more content†¦A coach is a leader. Another great leader who shows that great leaders need to have intelligence is Pope Francis. Pope Francis is the head of the Christian Religion. He is of huge importance when it comes to maintaining wo rld peace. A task that requires a great amount of knowledge. Pope Francis attended Colegio Of San Josà ©. One of the top christian academies in the world. Pope Francis thrived at this school (Biography.com). This shows that Pope Francis knows a lot about the Christian religion and the world. He contains great intelligence, a characteristic that all great leaders need to posses. Knowing the answer is only the start, a great leader needs the confidence to present the answer. Confidence is key. A clichà © that everyone in the world has heard at one point in their lives. The only difference is that when it comes to being a notorious leader, confidence is actually key. Without confidence in what they are doing and why they are doing it, a leader would not be considered a leader. To help show this better, let us look back at one of the best leaders the world has ever seen. Mahatma Ghandi. Mahatma Gandhi was the leader of the indian independence movement. A movement to help the people o f India gain independence from Great Britain. During this movement Gandhi gained many followers and support by practicing peaceful protests. These protest were ways of hurting Great

Tuesday, December 17, 2019

The Imperial Presidency By Arthur Schlesinger Jr. S....

Throughout history, the term â€Å"Imperial Presidency† has been used in the 1960s to portray the United States presidents and their utilities. â€Å"Imperial Presidency† is grounded on many citations, observations that are devised by many historians. A numerous number of presidents follow the footsteps of presidents before them, in order to live in the shadow, they leave behind. Residing by the thought of, given that the president achieved his successes during his office, they try to repeat the same idea in order for the same successful outcome. However, there is a high chance for bad outcomes to occur, making it discreditable for the president in the current office. Historian Arthur Schlesinger Jr’s use of â€Å"imperial† president is aimed to convey a president with noble personality with his constant accumulation of power in his presidency. The executive power given to the president, sanctions him to be totalitarian and may create a war-like decision t hat affects the country as a whole. The government holds a crucial status to its citizens, executive branch specifically, is overlooked to symbolize leadership. Nowadays, the president’s office is believed to exemplify the values of the American people. There are certain powers allocated to the president by the United States Constitution, however; the responsibility and vacancy of the President tend to evolve from one president to the next. Characteristics of presidents and their effect on political decisions has beneficial aspectsShow MoreRelatedOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 PagesTwentieth-Century World Bonnie G. Smith 83 4 The Gendering of Human Rights in the International Systems of Law in the Twentieth Century †¢ Jean H. Quataert 116 5 The Impact of the Two World Wars in a Century of Violence †¢ John H. Morrow Jr. 161 6 Locating the United States in Twentieth-Century World History †¢ Carl J. Guarneri 213 7 The Technopolitics of Cold War: Toward a Transregional Perspective †¢ Gabrielle Hecht and Paul N. Edwards 271 8 A Century of Environmental

Monday, December 9, 2019

New Security and Privacy Challenges System †MyAssignmenthelp.com

Question: Discuss about the New Security and Privacy Challenges System. Answer: Introduction Internet of things (IoT) is the interconnection of everyday devices and objects with the internet of computing which allows them to collect and exchange information. Every object has a unique identity, but the computer system can interoperate such identity with internet infrastructure. The IoT enables users to control their devices remotely across the existing infrastructure of the internet, which provides the option of direct integration of computer system in the physical world which improves the competence, accuracy, and advantages of the objects. Convergence means a combination of multiple different technologies into a single device or system. The IoT technology has numerous advantages, but they are vulnerable towards the risk of cyber-attack such as lack of information security, data analytics, hacking, and lack of data protocol standards. The popularity of IoT technology increases the threat of cybercrimes which can be dangerous for the privacy and security of its users. This essay will focus on analysing the benefit of IoT in convergence and convenience. Further, the article will evaluate potential risk in the IoT technology and its impact on users privacy. The essay will recommend measures that can minimise the potential threat of cyber-attack while using IoT technology. The internet of things is the connection of everyday usable devices to the internet such as car, appliances, kitchen, and others. According to Xia et al. (2012), in this technology, the objects are connected to the computer-based system through a single network which allows them to send and receive data with each other. The devices connected to the internet of things can interact with each other and share the information of users which improve their usability. The devices are connected through sensors which assist them to communicate with each other and user can control them using though existing network infrastructure, it allows for a direct integration of the physical world with computer systems. The combination resulted in improved usability of the products because it increases their efficiency, accuracy, and advantages. With the advancement of technology, the technology will be able to use in devices such as smart grids, virtual power plants, home appliances, automatic transport system and smart cities. As per the research firm Gartner, more than 25 billion devices will be connected to the internet of things technology by the year 2020 (Gartner 2015). The internet of things concept was first introduced in the article of Scientific American by Mark Weiser in 1991; the report provided the idea that reducing cost, size, and energy consumption of objects such as microprocessors, electronic appliances, and communication devices will assist in creating a ubiquitous computing experience (Press 2014). The term was attributed by Kevin Ashton, who was the co-founder of MIT Auto-ID center (Maney 2015). Governments and international organisation have recognised the development of the internet of things technology as an essential factor of growth. US National Intelligence Council added the internet of things technology to their list of Six Disruptive Civil Technologies in 2008 (Taylor 2008). The mass usage and popularity of Internet-based smart devices assist in the growth of intent of things technology. Although, the first use of internet of things technology was found in1980s in Coca-Cola machine which was situated in Carnegie Melon Universi ty. Local programmers connect the device to the internet which allows them to check whether the drink is available and cold, before making their trip to the machine (Smith 2015). In modern times, the internet of things technology is used in appliances and wearable, with due to their popularity, more companies are using them in their products. Siriram (2011) provided that convergence means integration of different technologies into single computer network structure; it can also be defined as coming together of communications, computing and broadcasting technology into a single connection to the network infrastructure. The future of internet of things technology can be described as the integration of real-world infrastructure with devices which are connected to the internet-based system. The internet of things technology assists in the convenience of the people by improving the efficiency, accuracy, and usability of devices. In the development of new IP protocol IPv6 eliminate the limit of 4.3 billion addresses to trillions upon trillion, it increases the number of devices connected to the internet from 32 bits to 128 bits (Carpenter et al. 2015). The reduction in the cost of hardware, inexpensive high-speed internet accessibility, cloud service, increased capability of sensors and IPv6 allow more consumer devices to connec t to the internet and improve the convergence and convenience in modern methods. There have been several cases of success and failure of the internet of things technology. Currently, the internet of things technology is prevalent in cloud-based and wearable technology, but it will be widespread in different devices by 2025. As per Kiritsis (2011), the devices use by individuals such as car, headphones, lamps, washing machine, refrigerator, coffee machines, smartphones, wearable products, kitchen appliances and almost every other device will be connected to the internet to share and collect information from other devices. There have been many cases of IoT failure, for example, Target has one of the worst security breaches due to using IoT technology. The company was using HVAC contractor for granting trusted access to their heating and cooling systems, the hacker uses the credentials and installed a credit card skimming software on the sales devices, which causes a data breach. In 2013 cybercriminals were able to hack thousands of IoT refrigerators by using defaul t passwords. The refrigerators was connected to a single network with allowing then access to a large number of devices. They use such devices to send thousands of spam emails to the users (Gubbi et al. 2013). There have been various cases in which IoT was a success, especially in home security market IoT devices has dominated the industry. Security devices such as Ring, SimpliSafe, and DropCam improve the security of houses and provide various other benefits to the users. Many companies are using IoT technology in benefiting consumers, for example, while going to a meeting, a persons car will be able to collect information from the calendar to know the timing of meeting and it can provide the best route to take. While stuck in traffic, a car can send a text to other party stating the approx. The time it will take to get at the location of the meeting. The alarm clock can notify the coffee maker to start brewing coffee once a person turns off his/her alarm. In a business environment, the office equipment knew when the inventory is running low, and it can automatically reorder it. Philips Hue is one of the most popular IoT devices, it allows users to change the colour of their lights with j ust one click, and they can also turn it on or off. Ninja Block adds may sensors to the house which tracks things such as water pipe burst and any motion inside the home; it automatically sends a notification to the users regarding the same. HarvestGreek is an IoT application that saves peoples time by feeding and watering plants based upon their actual growing requirements; it is an automating device which improves the growth of plants without any human interaction (Bandyopadhyay and Sen 2011). As per Miorandi et al. (2012), in case of infrastructure management, the IoT technology can benefit by controlling the operations of bridges, railway tracks, and roads in urban and rural areas. The IoT devices can monitor the process and report any change in the situation which can compromise the security of operation and increase risk in the procedure.A significant portion of the internet of things products are developed for the consumer use. Companies such as Bosch, IBM, Dell, Amazon Web Services, ATT, and Cisco, are making IoT consumer gadgets which include smart wearable, medical gadgets, connected cars, home automation, and smart appliances such as refrigerator, washer, and ovens which are connected through Wi-Fi network. In the manufacturing sector, the IoT technology assists the companies, such as Airware, Sigfox, and MetroMile, in automating the manufacturing equipment, assets, and the procedure. According to Atzori, Lera, and Morabito (2010), the corporations can monitor the practices in real-time which improve the security of the processes. Digital control system assists in automating the overall operation of manufacturing via predictive maintenance, arithmetical assessment, and measurements to maximize dependability of devices. The integration of smart grid can enable real-time power optimisation, evaluation of work, automatic controlling and safety management. As per the research of Daugherty et al. (2016), the development of IoT technology in manufacturing industry will generate more than $12 trillion of worldwide GDP by 2030. In the agriculture sector, wireless sensor can be integrated into the devices which provide necessary information such as temperature, wind speed, soil nutrition, humidi ty, and pest infection to the farmers which can assist in the improvement of the quality and quantity of the crops by reducing risk and wastage. Innovations in the internet of things technology are advancing industries such as military, medical, business, supply chain, education and smart cities. As per Khoo (2011), with the immense advantages provided by the internet of things technology to individuals and society, there are several privacy issues and threats from proponents of cybercrimes. According to Weber (2010), the cybercriminals can use lack of proper security guidelines and weaknesses of the operating system to access the sensitive data of corporations and individuals which imposes a significant risk of their privacy. The threat of internet of things technology includes data security, lack of global standards, analytics complexity, and cyber-attacks. The right of privacy is significant for individuals, as conflict always occurs between modern technology and privacy of users in the industry. With the popularity of social media sites, the risk of privacy exposure has become a considerable threat to many peoples. Caron et al. (2015) conducted a study in Australian context which provided that the privacy regulations in Australia are not adequate to protect the private data of internet of things technology. As per Roman, Zhou, and Lopez (2013), in IoT technology, the sensors in devices collect a significant amount of data naturally which is unrelated to their primary purpose, and such information is distributed to other devices without the requirement of an individual to activate the sensor each time. In past few years, the automation and driverless technology have increased in the automotive industry, companies such as Tesla, Google, Apple, and Uber are testing and producing self-driving cars (Gibbs 2017). The driverless vehicles, such as Tesla Model S, Lexus GS 450h and Audi RS 7, can perform ordinary driving actions such as back from the garage, parallel parking, analysing the road for potential accidental risk and even making call or messages through phones. All these features maximise the users driving pleasure and improve safety while driving, but these functions are not without any flaws. The awareness regarding cybersecurity is rapidly increasing in the automotive industry. Firstly, the security flaw was found in Jeep Cherokee by Charlie Millar and Chris Valasek in 2015; the two experts provided that hackers can easily manipulate connected cars (Greenberg 2016). The cybercriminals can hack essential functions of the vehicle such as brakes or speed; they can apply changes t o the car while sitting miles away from the actual vehicle. Another risk of automated cars is that they are easier to unlock by hackers which makes them a potential target for theft. The connected car cybersecurity risks increase potential risk for individuals and public which reduces their global development. Safety, data confidentiality and lack of interoperability are among the primary risks which can reduce the development of intent of things technology. The lack of robust and modest resource crunching accessibility, complex safety mechanism cannot be embedded in the IoT devices which make them vulnerable towards cyber-attacks by hackers (Vermesan et al. 2011). The DDoS cyber-attack over IoT system is denial to sleep in which hackers target specific IoT devices and machines which are attached to limited power supply sources and access them repeatedly to drain their power (Zargar, Joshi and Tipper 2013). The attack of denial to sleep can threaten the functioning of IoT technology, and it causes data gaps. The cyberterrorist can target particular operating systems on which malware can be processed, which makes the weak operating system and low-security devices vulnerable towards the cyber-attacks. The security breaches conducted by hackers reduce the trust of the public from the IoT syst em, and it exposes its vulnerabilities which can adversity influence the customer's perception. The user of IoT technology might use low quality sensor and sell their data to large corporations. As per Kopetz (2011), the significant amount of data collected by IoT devices can become tradable as an asset; the consumers can sell their personal information to data aggregators, thus turning data into currency. Weber and Weber (2010) provided that the cybercriminals can install malware in IoT devices and control them for their unfair advantage which can be dangerous for the individual and public safety. There is lack of international law which applies to worldwide entities regarding the cyber-attacks, the privacy regulation of states are insufficient as the application of IoT technology is worldwide. The government finds it difficult to capture and punish the cybercriminals due to lack of proper regulations regarding their crimes. Laws and judicial interventions regarding the violation of privacy over the internet are ambiguous, and legislation regarding the security of public lags behind as the technology develops rapidly. The risks of IoT technology reduce its development worldwide; several theories can be applied by companies to ensure the security guideline in IoT devices. In case of DDoS attacks, the companies can use various software applications to protect themselves from the attack. The security site KrebsOnSecurity suffered a DDoS attack which delivers them staggering 620 gigabits per second network traffic; another French web host receives 1.1 terabits per second attack. The common username of hackers has been leaked by the research of Ankit Anubhav, who works with NewSky Security. The DDoS attack uses default passwords for IoT devices to hack and control thousands of devices, companies such as KrebsOnSecurity, now uses randomly generated passwords to avoid the attack of DDoS attacks. The random number generator machine provides various unique passwords to the businesses which they can use to protect the IoT devices, by using this method, IoT devices working on same networks will be protected from cyber-attack. Another theory that can be applied by companies to protect IoT devices of people from year attacks is Nudge Theory. According to Yang (2014), this theory focuses on changing the behaviour of individuals by nudging them towards better security decisions. For example, Facebook privacy nudge prevented users from unintentionally disclosing things which they might regret in future, such as a nasty comment or personal details. The users should continuously change their IoT devices passwords, and the passwords must be unique and difficult to ensure a high level of protection. The IoT devices should be continuously updated because companies can provide new security against malware in updates. The corporations and industry can apply various measures to protect the IoT technology from cybercriminals. As per Wortmann and Fluchter (2015), while decentralising the data, such as cloud service, procedure, gadgets and corporate bodies, it is necessary that such integration is systematic to provide s afety to the data. IoT technology requires real-time interoperability in the devices and security measures need to adapt and prevent data islands. Encryption of data is necessary while implementing an IoT technology while transmitting the data through different IoT gadgets it is necessary that such information is not leaked in the process. Suo et al. (2012) provided that encryption algorithm turns standard text into cipher text which makes it difficult for hackers to understand the data; it ensures the security of information while it transfers between different internets of things devices such as refrigerator, air conditioners, and lights. The encryption procedure is significantly crucial while using smart homes devices because these gadgets continuously send and receive information with each other, and breach in one device can compromise the security of the entire system. Another method is hash-based cryptography theory which uses a digital signature scheme to secure the data of users. This theory ensures that while sharing the information, IoT devices decide whether an application can be trusted or not. Therefore, the proper authentication credentials are required to enter by an application to connect and share with IoT gadgets. As per Vlacheas et al. (2013), there is a considerable lack of identity and access manag ement tools in authentication framework of IoT gateways. The implementation of global structures for authentication will be difficult to establish because solutions are created for the traditional environment, and they did not apply to the varied, heterogeneous and dispersed environment of IoT. Firewall or deep packet inspection theory is required to be embedded in the IoT devices because they have unique protocols which are different from enterprise IT protocols. According to Ning, Liu, and Yang (2013), these protocols assist in recognising malicious payloads which are hidden in non-IT protocols. The Intrusion Prevention System (IPS) is a risk prevention application that examines the flow of network traffic; the examination assists in detection and prevention of vulnerability exploits. The firewall and IPS technology should be embedded in the IoT devices for filtering the network traffic to make optimal use of resources. Secure booting theory is also required in IoT devices by using cryptographically generated digital signatures; these signatures improve the integrity and authenticity of software. The strict regulation of government is also necessary to ensure that proper security measures are taken by companies while creating IoT products. These measures will reduce the r isk of IoT technology and improve its usability for the users. Conclusion In conclusion, the internet of things technology brings various benefits to the convergence and convenience, the efficiency and accuracy of devices increased by using IoT technology. These devices share and collect information with each other to improve their usability, the convergence of technology increase the function of devices which enhance the experience of the user. The IoT can be used in building appliances, automobiles, security devices and smart cities. The use of IoT technology can improve the procedure of various devices, but along with benefits, there are several disadvantages of IoT technology as well. There are several potential risks in IoT technology such as cybersecurity issues, breach of security, data theft, lack of information protocols, and high level of complexity. The companies can implement various security theories to reduce the impact of risk in IoT technology such as using secure booting, firewalls, updates, encryption, and authentication. With proper secu rity measures, IoT technology will provide various benefits to companies are individuals and transform multiple industries and their procedures. References Atzori, L., Iera, A. and Morabito, G., 2010. The internet of things: A survey.Computer networks,54(15), pp.2787-2805. Bandyopadhyay, D. and Sen, J., 2011. Internet of things: Applications and challenges in technology and standardization.Wireless Personal Communications,58(1), pp.49-69. Caron, X., Bosua, R., Maynard, S.B. and Ahmad, A., 2016. The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective.Computer Law Security Review,32(1), pp.4-15. Carpenter, B., Chown, T., Gont, F., Jiang, S., Petrescu, A. and Yourtchenko, A., 2015.Analysis of the 64-bit Boundary in IPv6 Addressing(No. RFC 7421). Daugherty, P., Banerjee, P., Negm, W. and Alter, A.E., 2015. Driving unconventional growth through the industrial internet of things.Accenture (https://www. accenture. com/us-en/_acnmedia/Accenture/next-gen/reassembling-industry/pdf/Accenture-Driving-Unconventional-Growth-through-IIoT. pdf Downloaded 15 July 2016). Gartner., 2015. Gartner Says By 2020, a Quarter Billion Connected Vehicles Will Enable New In-Vehicle Services and Automated Driving Capabilities. Gartner. Retrieved form https://www.gartner.com/newsroom/id/2970017 Gibbs, S., 2017. Samsung self-driving cars take fight to Apple, Uber and Google's Waymo. The Guardian. Retrieved from https://www.theguardian.com/technology/2017/may/02/samsung-self-driving-car-challenge-google-waymo-apple-uber Greenberg, A., 2016. THE JEEP HACKERS ARE BACK TO PROVE CAR HACKING CAN GET MUCH WORSE. Wired. Retrieved from https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering-acceleration-hacks/ Gubbi, J., Buyya, R., Marusic, S. and Palaniswami, M., 2013. Internet of Things (IoT): A vision, architectural elements, and future directions.Future generation computer systems,29(7), pp.1645-1660. Khoo, B., 2011, October. RFID as an enabler of the internet of things: issues of security and privacy. InInternet of Things (iThings/CPSCom), 2011 International Conference on and 4th International Conference on Cyber, Physical and Social Computing(pp. 709-712). IEEE. Kiritsis, D., 2011. Closed-loop PLM for intelligent products in the era of the Internet of things.Computer-Aided Design,43(5), pp.479-501. Kopetz, H., 2011. Internet of things. InReal-time systems(pp. 307-323). Springer US. Maney, K., 2015. MEET KEVIN ASHTON, FATHER OF THE INTERNET OF THINGS. Newsweek. Retrieved from https://www.newsweek.com/2015/03/06/meet-kevin-ashton-father-internet-things-308763.html Miorandi, D., Sicari, S., De Pellegrini, F. and Chlamtac, I., 2012. Internet of things: Vision, applications and research challenges.Ad Hoc Networks,10(7), pp.1497-1516. Ning, H., Liu, H. and Yang, L.T., 2013. Cyberentity security in the internet of things.Computer,46(4), pp.46-53. Press, G., 2014. A Very Short History Of The Internet Of Things. Forbes. Retrieved from https://www.forbes.com/sites/gilpress/2014/06/18/a-very-short-history-of-the-internet-of-things/#26a687c910de Roman, R., Zhou, J. and Lopez, J., 2013. On the features and challenges of security and privacy in distributed internet of things.Computer Networks,57(10), pp.2266-2279. Siriram, R., 2011. Convergence of technologies.South African Journal of Industrial Engineering,22(1), pp.13-27. Smith, G., 2015. From 1982 Coca-Cola vending machine to latest trend: What the Internet of Things means for business. Real Business. Retrieved from https://realbusiness.co.uk/tech-and-innovation/2015/07/15/from-1982-coca-cola-vending-machine-to-latest-trend-what-the-internet-of-things-means-for-business/ Suo, H., Wan, J., Zou, C. and Liu, J., 2012, March. Security in the internet of things: a review. InComputer Science and Electronics Engineering (ICCSEE), 2012 international conference on(Vol. 3, pp. 648-651). IEEE. Taylor, D., 2008. The World in 2025, According to the National Intelligence Council. Old-Thinker News. Retrieved from https://www.oldthinkernews.com/2008/06/26/the-world-in-2025-according-to-the-national-intelligence-council/ Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., Jubert, I.S., Mazura, M., Harrison, M., Eisenhauer, M. and Doody, P., 2011. Internet of things strategic research roadmap.Internet of Things-Global Technological and Societal Trends,1, pp.9-52. Vlacheas, P., Giaffreda, R., Stavroulaki, V., Kelaidonis, D., Foteinos, V., Poulios, G., Demestichas, P., Somov, A., Biswas, A.R. and Moessner, K., 2013. Enabling smart cities through a cognitive management framework for the internet of things.IEEE communications magazine,51(6), pp.102-111. Weber, R.H. and Weber, R., 2010.Internet of things(Vol. 12). New York, NY, USA:: Springer. Weber, R.H., 2010. Internet of ThingsNew security and privacy challenges.Computer law security review,26(1), pp.23-30. Xia, F., Yang, L.T., Wang, L. and Vinel, A., 2012. Internet of things.International Journal of Communication Systems,25(9), p.1101. Yang, S.H., 2014. Internet of things. InWireless Sensor Networks(pp. 247-261). Springer London. Zargar, S.T., Joshi, J. and Tipper, D., 2013. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks.IEEE communications surveys tutorials,15(4), pp.2046-2069.

Monday, December 2, 2019

Yachts Australia Economic Problems

Introduction Background Yachts Australia operates a small fleet of charter yachts in Australia. The business operates in the Great Barrier Reef on the coast of Queensland, with eleven members of staff. It has several sailing boats with varying number of Berths. The business employs temporary employees and backpackers to handle consumer demand during peak seasons and to deal with excess capacity requirements.Advertising We will write a custom essay sample on Yachts Australia Economic Problems specifically for you for only $16.05 $11/page Learn More A number of problems with the existing business systems are stifling expansion prospects. In addition to the primary business of charter yachts, the business also refurbishes yachts and sailboats for resale, and issues franchise agreements to people interested in the yacht charter business across Australia’s waters. This report relates to the exploration of the feasibility of a new system that should han dle the challenges of Yacht Australia. Current Problems The main challenges that Yachts Australia needs to deal with come from the rapid growth that the company has seen in the last few years. It has been expanding operations without expanding the systems supporting the expansion. These problems include information security, human resource management, managing reservations currently characterised by double booking, and managing the commercial aspects of franchises. The problem with information security is that the only computers used to store information do not have secure passwords. Both permanent and temporary employees have access to the information stored there. On the human resource side, the main challenge that the business faces is the high number of temporary staff it employs. They present a huge risk to the business system at several levels. Management of reservations has also been a big issue for the business because of overreliance on manual systems leading to eventualiti es like double booking. In addition to these problems, there is no formal information storage and retrieval system, which causes frustration among the staff. At a strategic level, there is no way of telling whether the business is growing at the same rate as the rest of the industry.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The Opportunities The opportunities that exist in the current business include expanding the business by improving the business system. With the desire to expand the business northwards to capture the market there, there is a clear business opportunity. The company can also benefit a lot by implementing IT based systems to enhance its capacity to handle the new opportunities Minimum System Requirements The system that yacht Australia needs should meet the following requirements. It must enhance information security while at the same time availing relevant informat ion to the members of staff that need it. The idea here is that the business needs to have a secure and efficient information management system. Secondly, it should assist the management with staffing decisions. This will address the current dangerous trend of using backpackers by helping to determine the optimum number of permanent employees required to run the business efficiently. The next requirement is that it should solve the reservation bottlenecks because this has a big impact on service provision, and hence profitability. Double bookings can result in lost business opportunities, or embarrassing lapses in service provision. The fourth element of the system requirements is that it should avail information to help with strategic planning. Technical Feasibility The question to answer while dealing with technical feasibility is whether it is possible to develop a system that can meet the design specifications. On the issue of information security, there are simple procedures su ch as using a system of passwords as opposed to one password. Other measures that can enhance information security such as multilevel passwords or passwords related to sections of the data. The issue of staffing depends on decisions taken after analysing data relating to the human resource management patterns. It is possible to collect that information by preparing appropriate data forms each time the company hires new people, especially the backpackers and those on contract. Dealing with the reservation issues can happen if the business uses an electronic reservation system. It can be a simple online electronic diary.Advertising We will write a custom essay sample on Yachts Australia Economic Problems specifically for you for only $16.05 $11/page Learn More In the area of strategic planning, it depends on information gleaned from sources, but related business decisions require thought. In this sense, a business system cannot make decisions but can faci litate the decisions. Economic Feasibility The economic feasibility of this project aims at establishing whether there will be sufficient economic benefits to justify pursuing the options. Investing in information security will reduce the chances of loosing vital information about business processes, opportunities and contacts because of espionage. Ease of access to information puts the business at the risk of losing vital business opportunities to competitors. Therefore, it makes economic sense to invest in information security. On the other hand, the information should be available to employees that need it for them to make good business decisions. On the issue of staffing, removing the existing bottlenecks will make it possible for the business to streamline its staff requirements by retaining the minimum number of employees required for profitable business. Fixing the problems with the reservation system will improve the capacity of the business to meet the financial objectives. It will be easier to schedule many more bookings compared to the current capacity. This is a desirable economic outcome. Finally, the capacity to make strategic decisions is desirable for any business because it assures long-term success. In an overall sense, these solutions will bring about more economic benefits compared to the costs. Organizational Feasibility Analysis of organisational feasibility aims at finding out whether the organization has the capacity to implement the proposed solutions. Yacht Australia has only nine employees without an established IT department. This means that the institutional capacity to handle this project is lacking. A situation like this one increases the project risks associated with handling the project internally. There are two options available to handle this situation. The first one is to develop capacity internally or secondly, to hire external contractors to develop the solutions. Developing capacity internally has better long-term results because it has the potential to keep down system administration costs.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More However, the lead-time is normally greater which may delay the project. On the other hand, using contractors increases the cost of the project especially if the contract includes a maintenance component. As the situation stands, the project lacks organizational feasibility. There are ways to deal with that, but it will be at a cost. Schedule Feasibility Managing a project schedule is one of the most challenging aspects of project management. The main issues to consider when looking at schedule feasibility include the opportunity cost related to a quick or a slow implementation of the solutions identified. In this case, a long implementation time will increase the likelihood of the business suffering the risks identified. However, a hasty implementation may also lead to the implementation of solutions that are not well developed. Considering that there are no external parties to this process such as regulators, the business should develop a schedule that addresses the concerns as soo n as possible. However, there is no crisis as such since the business has a working system in place. Depending on severity of the current bottlenecks, the project can work with any schedule that solves its most pressing problems first. The choices in the hands of Yacht Australia depend on the company’s priorities hence the feasibility of a schedule does not arise. Resource Feasibility There are two types of systems required to solve the problems at Yacht Australia. There are business process support systems and there are decision support systems. Implementing the decision support systems will require more than just IT applications. They will require greater resource outlay to handle. On the other hand, business process support systems such as the scheduling solution or data security require fewer resources hence they will need fewer resources. Therefore, they have greater resource feasibility. Secondly, the business has several income streams and appears to be in good financi al standing. It therefore means that the business can access the resources for this project. Considering that the business has only two computers, and four locations, it is necessary for it to invest in more computers to meet its emerging needs. In addition, the business will need to develop an IT department to cater for its business needs. For a start, a single person can take up IT duties alongside other duties, and later specialize as business expands. Reference List Kerzner, H 2009, Project Management: A Systems Approach to Planning, Scheduling and Controlling, 10th edn, John Wiley and Sons, Hoboken, NJ. This essay on Yachts Australia Economic Problems was written and submitted by user Yamilet Cervantes to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.