Monday, December 30, 2019

Research Proposal - 1193 Words

Research Proposal 1. Proposed working title Global Marketing versus Domestic Marketing- a critical Evaluation. 2. Research Background/ Context This research is focused to understand how a Global company is able to adapt to different marketing situation that is existing in different countries. A company can said to be Global if it can sell its products at a reasonable price with a dependable quality in every nation it serves. The concept of Global Marketing is viewing the entire set of countries markets as one unit and then developing a marketing plan through cost standardisation. When developing a plan the researchers have to understand both controllable and uncontrollable elements of business (Kotler, 2006) that is existing†¦show more content†¦Porter suggested that the intensity of competition is determined by the relative strengths of these forces. Porter analysis helps to understand rivalry between existing sellers in the market, the power exerted by the customers in the market, the impact of the suppliers on the sellers, the potential threat of new sellers entering the market, and the threat of substitute products becoming available in the market. Thurlby (1998) says that understanding of the five forces helps the organization to develop appropriate strategies to be successful in the market. Also various theorists like Hofstede (1980), Charles Handy (2006) is also used as they help to understand the influence of culture and its impact in the performance of the organization. 7. Methodology To conduct this research I have used research Exploratory Method to analyse primarily through Secondary data collection methods that is through Books, Internet and Journals. This method is used as there are thousands of books, journals and articles are polished about global and domestic marketing .This gives a clear view about the topic and helps us to reach a hypothesis. Authors like Boyd.W, Westfall.R, Stasch.F (2004), Bush and Burns (2006) support this argument. Advantages of ExploratoryShow MoreRelatedResearch Proposal661 Words   |  3 PagesTO: Professor Sara Cutting FROM: Kiersten McCaffrey DATE: February 18, 2014 SUBJECT: Begin Business Plan for Potential Future Investment Background In the beginning of the semester you requested that I research a topic related to a personal decision such as a future goal. I am currently employed at a yoga studio and have a general understanding of the hard work that goes into running a small business. At the same time, I also directly see the benefits of owning a successful business.Read MoreProposal For A Research Proposal814 Words   |  4 PagesWhat is it? A typical research proposal is used by scholars and students who have an interest in your field. This usually happens as part of a grant application, postgraduate application (PhD), or for a final year dissertation. It usually ranges from 1,000-3,000 words and is a summary of what is being proposed to study. It is usually judged by content and proposal format. A Research proposal should†¦ Clearly set out what the research is going to be about. This includes a provisional/working titleRead MoreResearch Proposal1267 Words   |  6 PagesResearch Proposal: It addresses a particular project: academic or scientific research.  It also contains extensive literature reviews and must offer convincing support of need for the research study being proposed.   Doctoral dissertations begin with research proposal; the proposal must be accepted by a panel of experts (usually professors) before the actual research can begin.   In addition to providing rationale for the proposed research, the proposal must describe a detailed methodology for conductingRead MoreResearch Proposal1447 Words   |  6 PagesCohort January 2013 Module Title Business Research Issue and Anylysis (Module code BAMG 2104 ) Assignment Topic/ Title Research Proposal Name of Instructor Dr Michael Ng Name of Student 1) AU Kwan Tai, 2) Chan Yan Ki, 3) Choi Chak Pan, 4) Chong Ka Chun DMU Student No. 1) P13014477 , 2) P13014523 3) P13014614, 4) P13014628 Group No. Date of Submission 25 Feb, 2014 DMU Business Research Methods Research P roposal 1. Research Project Title The relationship betweenRead MoreResearch Proposal1706 Words   |  7 PagesMOI UNIVERSITY MAIN CAMPUS SCHOOL OF BUSINESS AND ECONOMICS DEPARTMENT OF ECONOMICS. Course: RESEARCH METHODS Course code: ECO 217 Task: GROUP ASSIGNMENT NAMES REG. NO. SIGN 1. HUSSEIN IBRAHIM ABDIRAHMAN ECO/201/O9 †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2. THIONG AGUTORead MoreResearch Proposal2386 Words   |  10 PagesResearch Proposal Tony Franco, Anita Badejo, Annie Petroian Malhami, Brenda Baillargeon, Christina Hyett, Kenneth Haynes RES/351 June 11, 2012 Dr. James Gartside University of Phoenix Research Proposal In recent years, the amount of media coverage surrounding assisted suicide, or euthanasia, has increased. The term evokes a multitude of emotive responses. The Royal College of Nursing completed research on the issue of euthanasia initiating change in their policy of opposition to euthanasiaRead MoreParts of a Research Proposal2853 Words   |  12 PagesPARTS OF A RESEARCH PROPOSAL Typical parts of a research proposal are: Title (or Cover) Page Abstract Table of Contents Introduction (including Statement of Problem, Purpose of Research, and Significance of Research) Background (including Literature Survey) Description of Proposed Research (including Method or Approach) Description of Relevant Institutional Resources List of References Personnel Budget The Title (or Cover) Page. Most sponsoring agencies specify the format for the title page,Read MoreDifferences Between Formal Research and Business Proposals1403 Words   |  6 PagesDifferences between â€Å"Formal Research† and â€Å"Business Proposals† There is a great difference between a formal research proposal and a business proposal. In fact these two types of proposals seem to be very similar but there are critical differences in the overall purpose, uses and goals. With such distinct differences for a writer it helps in understanding for writing the formal research proposal or business proposal more effectively. The general purpose of a proposal is the identify a particularRead MoreDesign Research Proposal1022 Words   |  5 PagesResearch Design The research question for this research proposal is: is participation in a Housing First program effective in preventing reoccurrences of child maltreatment with families who have a history of housing instability? This research proposal will examine the hypothesis: Families with a history of instability will be less likely to commit child maltreatment when they are enrolled in a Housing First program as compared to those who are not enrolled. A longitudinal design study will be usedRead MoreGuidelines on Writing a Research Proposal2565 Words   |  11 PagesGuidelines on writing a research proposal Introduction This is a guide to writing M.A. research proposals. The same principles apply to dissertation proposals and to proposals to most funding agencies. It includes a model outline, but advisor, committee and funding agency expectations vary and your proposal will be a variation on this basic theme. Use these guidelines as a point of departure for discussions with your advisor. They may serve as a straw-man against which to build your understanding

Sunday, December 22, 2019

reconstruction Essay - 1028 Words

Andrew Johnson took office after the assassination of Abraham Lincoln in 1865. He was a Southern Democrat from Tennessee, when he became president, the Civil War had ended and reconstruction was in its beginning stages. Johnson was then faced with the same problems Lincoln had -- the challenge of mending a broken nation, yet there was a definite difference in the ways Johnson and Lincoln approached the problems of Reconstruction. Johnson was not one of our best or brightest presidents, he did not care about his public appearance and he was not good at making decisions. One of the most illogical decisions Johnson made as president was to start a new reconstruction plan, before his death Lincoln already had a plan set out. Yet Johnson†¦show more content†¦This was not a good idea for Johnson because he already had a lot of enemies because he was a radical democrat from the South. The south loathed him because he was a democrat and the North loathed him due to his lenient treat ment of the South. The North wanted to deal with the South brutality yet Johnson handed out many pardons to the Confederates, pushed to restore civilian control in the Southern states and shied away from implementing voting rights for blacks. From the beginning, Johnson was at odds with the Radical Republicans, who favored radical reconstruction of the defeated Southern states, including military rule and distribution of both land and voting rights to blacks. Later these same people voted to impeach him. Johnson believed that the government should be indulgent with the Southerners. Since that is how he felt he took the insinuative to make a proclamation of amnesty in May 1865, without giving the public any say in the matter. This angered a lot of Democrats and Northerners who felt that the South should not just be pardoned that they should be reprimanded. Then Johnson took it a step further by not only pardoning all of the southerners but, allowing them to have and form their own new governments. This allowed the south to have ex-confederate leaders to hold spaces in the senate, for example, Senator Alexander H. Stephens who was the vice president of the Confederacy. At this point a lot of people were tried of Johnson as thereShow MoreRelatedCrime Scene Reconstruction1438 Words   |  6 PagesKristin Waters Crime Scene Reconstruction ENC 1102-154 Reconstructing a crime scene takes a lot of effort from experienced law enforcement, medical examiners, and criminalists. All of these professionals give unique perspectives to develop a crime-scene reconstruction. Forensic scientists also play a vital role in helping to reconstruct the crime scene. They use the crime-scene reconstruction to show events that occurred prior to, during, and after a crime was committed. (Saferstein, 2009) Read MoreReconstruction Of Reconstruction And Reconstruction1031 Words   |  5 PagesReconstruction what is it?What does it mean to reconstruct? Is it possible to reconstruct nowadays? Reconstruction started in 1865 and ended in 1877.Reconstruction took place mostly in the south. Reconstruction was created to help fix the problems in the new union after slavery, but sadly didn t end well causing an all white government into power and failing the union. New economic,political and industrial growth was being made. New job opportunities were being m ade for the people and former blackRead MoreReconstruction Goals : Reconstruction And Reconstruction1296 Words   |  6 PagesReconstruction Goals Reconstruction started in 1865 after the war was coming to an end and completed in 1877. It Is the process by which federal government controlled the former Confederate states and the conditions for their readmission to the union. Abraham Lincoln was our president at the time and could not form a treaty with the defeated government. After the emancipation, thousands of freedmen left their plantation to find a new life without being owned and forced to work. This began theRead MoreReconstruction : The Failure Of Reconstruction1529 Words   |  7 PagesReconstruction: By: Siryet Girma 1,514 words 7 pages Historical Paper Reconstruction: the failure Reconstruction was a failure because African American were still not equal to White Americans. The Emancipation Proclamation was proclaimed in January 1, 1863. It freed more than 3 million slaves in the Confederate states by January 1, 1863, blacks enlisted in the Union Army in large numbers, reaching some 180,000 by war’sRead MoreReconstruction Of The Reconstruction Era1587 Words   |  7 PagesThe Reconstruction Era was known as a time to reconstruct the United States of America by the expansion of governmental power that began in 1865. â€Å"There were two central problems that animated Reconstruction; providing justice for freedmen and facilitating national reconciliation. (A New Birth of Freedom, pg. 1) After the 12 year span, reconstructing the nation succeeded in only a few of the goals that were set out to achieve within those 12 years that it was in progress. The Reconstruction’s intentionsRead MoreThe Legacy Of Reconstruction And Reconstructio n Essay2362 Words   |  10 PagesRecent books on Reconstruction†¦have infused their subjects with drama by focusing on violent confrontations,† Eric Foner notes in the introduction of the updated edition to his 1988 publication Reconstruction: America’s Unfinished Revolution, 1863-1877. Up until now, Foner’s revisionist historiography of Reconstruction was the only alternative offered to the Dunning School’s account of the important historical era. In recent years a neo-revisionist interpretation of Reconstruction has emerged inRead MoreFacial Reconstructions2008 Words   |  9 PagesForensic Facial Reconstructions Samantha McAnally CRMJ430 April 20, 2013 Abstract This paper will focus mainly on the history and the various techniques that forensic facial reconstruction has to offer. It will also go over some problems or an issue that is process has faced over the years. The Daubert Standard will discuss and how facial reconstruction was allowed as evidence thru this standard. I will go over all the periods of time that facial reconstruction was used. ComputerizedRead MoreBreast Reconstruction Procedures For Women1221 Words   |  5 PagesBrickell neighborhood. He performs breast reconstruction procedures for women who have had a mastectomy. With breast reconstruction surgery, Dr. G can provide women with natural-looking, shapely breasts. Types of Breast Reconstruction Procedures Available Near Brickell For some patients, reconstruction can begin during their mastectomy. Other patients may choose to have their breast reconstruction at some point after their mastectomy. Typically, breast reconstruction surgery involves several surgical sessionsRead More Reconstruction Essay932 Words   |  4 Pages Reconstruction took place after the end of the civil war. The reason for reconstruction was to put the union back together and free the slaves once and for all. Reconstruction took three eras to be completed. The first was Lincoln, the second Andrew Johnson, and the third was the Congressional â€Å"hard plan.† The Lincoln era lasted from 1863-1865. On December of 1863 the decree of â€Å"soft plan† was introduced. The â€Å"soft plan† included amnesty for the southerners that took the loyalty oath. It alsoRead MoreReconstruction Vs Republican Reconstruction Essay1035 Words   |  5 Pagesappearance of the Reconstruction Era in 1865. It was a period in which Americans â€Å"put the pieces together†. People were split after the Civil War, some wanted to reconstruct the Confederate states- where it is politically and economically damaged- and the others wanted to have revenge against the South because they caused the war that resulted with memories of death and suffer the Americans had to endure. And that was a reason of the emerging of the Presidential Reconstruction and the Republican

Saturday, December 14, 2019

Human Resource Management and Industrial Relations Department Free Essays

An efficient work force is important to the overall success of any organization and this also has implications for the overall success of a country’s economy. Not only do organizations require adequate numbers of workers to fill essential positions, these workers need to be highly productive so that the organization makes optimal use of the capital it invests in labour. It is evident therefore that the overall productivity of the workforce will go a far way in determining the eventual viability of the organization. We will write a custom essay sample on Human Resource Management and Industrial Relations Department or any similar topic only for you Order Now Analysts have tended to link worker productivity with increased living standards, arguing that increased efficiency leads to increased remuneration which therefore improves individual as well as national living standards (Monthly Labour Review, 2007). The counter to this position is that employees who are producing below a certain minimum standard may affect the productivity of the entire organization, so much so, that organizational productivity decreases over time. In these days of harsh competition, organizations cannot afford to make such grave mistakes when it comes to recruiting new staff members. All current, new and aspiring employees must have in mind the vision and goal of the company and work towards their accomplishment in the most efficient way possible. Seeing the importance of a productive workforce in determining organizational success, it is evident that organizations have to adopt appropriate strategies to attract the best employees to fill all positions within the organization. While it is difficult to predict, at the initial stages, the level at which a potential employee will produce, it is essential that organizations ensure that mechanisms are put in place which ensure that the recruitment and selection process results in the hiring of employees that will contribute to the overall productivity of the firm by bringing to the job high productivity. Recruitment and selection of employees to a firm cannot be a light matter but must be dealt with by individuals who are themselves highly productive and committed to the overall vision and goals of the organization. Recruitment and selection are functions over which the human resource manager has universal control. It is this category of employees in an organization who are closely conversant with the overall goals of the organization and who are in the best position to decide on appropriate candidates for employment. Management is a process of effectively taking advantage of manpower, materials and resources as well as financial power, to realize the aims of an organization. Since the 1990s the science of management control has witnessed significant changes at both the governmental and organizational levels. The society seems now to be evolving from one that has traditionally been hierarchical to one that features plural management. Nowadays various managers function within a single organization to carry out certain specific functions, decentralizing control. Management science as a field of enquiry developed within large corporations. In the western world the management control literature was piloted at the beginning of the 19th century by theorists such as Taylor and Fayol among others (see Taylor, 1911). In this early era control was seen as an essential aspect and function of management. Control primarily involved the management control of activities, cash flows, people, organizational units and managers. However, as time progressed, the concept of Human Resource Management emerged as an improvement on previous management control models. The HR department is the locus through which the organization is able to meet and sustain its employment needs. Continued and improved worker productivity is therefore one of the primary objectives of the HR department. This department needs to be aware of the organization’s employment strategy, in order to assist by looking for the right talents to help this strategy. It is becoming increasingly clear that the job market is much like the market for goods and services. Employee recruitment has therefore become a mechanism whereby potential employees market their capabilities on the one hand and businesses attempt to recruit the best workers in the particular field (Breaugh, 1992). At the same time, it is of outmost importance that the Human Resources are managed in the most effective way possible in order to achieve the final goal of management control. HR management, through processes such as recruitment and selection provides aspects that link its activities with the strategy of the business itself (McKenna Beech, 1995). Recruitment and selection therefore represents the first step in the management control processes. Although successful recruitment and selection are not hereby means towards achieving successful management control, there must be a good recruitment and selection system in place to contribute towards this end. This dissertation will attempt to address the twin issue of recruitment and selection. Taking the form of a Case Study, this paper will explore and discuss the various methods and procedures of recruitment and selection being used in a specific company – the Yintao Golf Club Co., Ltd. located in China. Aspects pertinent to recruitment and selection, including job descriptions and interviewing practices will be examined in this case study. By examining a single, Chinese company, the researcher will be able to broaden understanding of the Chinese characteristics of HR management. The researcher will attempt therefore to produce an understanding of the nature of Chinese management control at a miniscule level. How to cite Human Resource Management and Industrial Relations Department, Essays

Thursday, December 5, 2019

IT Risk Management Project on Aztek

Question: Discuss about the IT Risk Management Project on Aztek. Answer: IT risk assessment on BYOD within Aztek Financial Services Sector Review In this report, the primary aim is presented to demonstrate the BYOD scheme in projects and its risk management. Risk management is to be conducted with financial services sector reviewing, security requirements, threats identification, and data security risk management. Moreover, these individual sections should be considered with maintaining policy guidelines with necessary initiatives. The risks should be prepared with identifying its severity, impact, likelihood and prioritized mitigation as well (Garcia et al., 2014). The financial sector generally suggests configuring some guidelines to save expenditure and money for integrating it in nay organization. The BYOD strategy is quite efficient with mandatory policy follow-up. Therefore, in this report, the primary risk lies in security and protection concern. As BYOD deals with individual and personal device, security requirements should be enforced among the stakeholders (Bouvain, Baumann Lundmark, 2013). First, the security conce rns are identified as risks from the assessment results and further, the changes were introduced in the study for mitigating them systematically. Most evidently, organizations consider BYOD strategy as saving expenditure with passing their hardware utilization cost and monthly services to the users. To some extent, the finance department should consider some concerns as primary with ensuring limited cost escalation (Fletschner Kenney, 2014). However, the reimbursement should be typically addressed to the eligible devices, conditions for reimbursement, limitations of reimbursement, and monthly stipend amounts. The financial sector should consider the following: Device and Repair Expenditure: The employees should pay for device cost, maintenance, and any repair cost typically (Mols, 2013; Franchoo Pollard, 2012). Moreover, individual employees should be responsible for replacing the devices in terms of most common cases of lost and found. Voice and Data Plan Cost: There are some existing types of cost for payment in BYOD strategy. Some organizations prefer to pay monthly allowance or stipend to the employees for contributing regarding specific data and voice plan. Some organizations entirely pay for the plans whereas, some approach to specific sets of users as managers, executives, and employees (Frame White, 2014). Some of the organizations do not bear any reimbursement cost, they allows a general Wi-Fi connection for employees and allows employees to tether in mobile data plan. In general, the recommendation should be put as not providing any expenses in this aspect as costs can be getting out of control (Chen Zhao, 2012). It is much important considering country wise topics as tax regulations, local service provider contracts, and others. Roaming Charges Responsibility: The roaming charges should be identified as one of the significant risks for any telecom expense management. Telecom expense should avoid this risk as it is a part of EMM solution (Garcia et al., 2014). Moreover, the organizations contact users directly and proactively take notifications from them to avoid device-roaming-state costs. High billing and expenditure can be avoided in this manner. Offer for iTunes Purchases Reimbursement: iTunes is not allowed from most of the organizations for individual applications through it. However, with iTunes and Apples bulk purchasing program, the corporate distribution can purchase most applications and can manage them in EMM tool (Bouvain, Baumann Lundmark, 2013). Mostly, the licensing plan can be beneficial with groups of employees for adoption. For one-off applications, the expense approval can be accepted from manager. Support Cost and Expenditure: The support for Information Technology organizations is identified as community-based approach with offering self-service wikis and up-front support system (Chen Zhao, 2012). The Information Technology support should be responsible for corporate applications, e-mail and calendar software support. Accessories Reimbursement: The personal device accessories should be as per individual responsibility. As individual employee should choose their accessories as their choice; therefore, this cost is solely dependent on employees. Security Posture Review BYOD is one of the most effective and innovative technological advancement of IT that is providing several benefits to the business organizations. Aztek is also implementing this approach within their organization in order to make their positioning better in the financial marketplace (Aebi et al., 2012). In contrast with this scenario, the organization might be facing some of the technological challenges within their premises (Bessis O'Kelly, 2015). When it comes the impact of BYOD within the financial institution or organization these challenges can be classified into four various domains. These are explained as follows: Regulatory environment and financial organization The financial data disclosure is one of the effective aspects that must be regulated within any financial organizations. In contrast with the contemporary situation of Aztek, it is found that the organization is almost providing all the details to their organizational members in order to do their business processes (Bolton et al., 2013). This aspect makes the organization weak in comparison with their competitors. The disclosure of the share values and other financial data to the their competitors make them fall in difficult situation. Mitigation Technique: Mobile life cycle management is only way to reduce this risk from the financial organization. Aztek can implement applications that will be proving security to the organizational data and networks (Chance Brooks, 2015). These policies implementation will be helpful in reducing the risks and other challenges related to BYOD. Business content, device security and business application access BYOD allows the resources and financial data of the Aztek to be shared among the employees of the organization. This introduces the chances of the data leakages and misuses of the organization as well a financial data to be misused (Christoffersen, 2012). This reduces the efficiency and impact of the organization within the target market. The chances of risks and data thefts are increased with the concerned aspects. Mitigation Technique: According to the IDC's U.S. Mobile Enterprise Services Survey done it is found that the financial organizations should secure the mobile access of their employees to their organizational resources in order to misuse or any other kind of usages. This will reduce the impact of the IT risks on the concerned platform of Aztek. These aspects not only focus on the BYOD perspectives but also it tries to focus on the applications that are used by the employees for doing their business operations or their personal searches and details findings. Maintenance of updates and change in policies BYOD is getting popular among all the business sectors; the financial sector is not an exception in this list (Cole et al., 2013). The financial sector is experiencing a massive move to the digital transformation. Aztek is also introducing this innovative technological advancement within their organization. they are trying to implement these updated version of the technological advancement in order to make more money within their concerned target market. This aspect is making the privacy and security of financial data a question (DeAngelo Stulz, 2015). Aztek is implementing the BYO within their concerned organizational structure but they are not aware of the security challenges of these technological advancements. Lack of knowledge in information system, data availability, confidentiality and other important aspects that must be considered in case of the BYOD is casing the disturbed structure of information system in Aztek. Mitigation Technique: In contrast with the problematic situations highlighted for the concerned aspect it is clear that Aztek should include the professional and consulting service for BYOD risk mitigation. In addition to this, this above mentioned policy will not only improve the situation but also it helps in maintaining the life cycle management within the organization (Dorfman Cather, 2012). In contrast with the risk, it is found that this group can also create and implement an organizational strategy for managing the BYOD risks within the Aztek. Management of financial implications related to data and voice usages The use of the personal devices for managing the financial details and data within Aztek involves the easy of operating and dividing the workload among the concerned employees. With the help of this system architecture, the employees can easily manage their personal and professional life as well (Fertis et al., 2012). In contrast with the situation this aspect has benefitted the organization by giving the chance of retaining to the employee but this flexibility includes the a problem related to the management of the business and personal content within the personal devices of the employees. There are the segment highlighted that the voice and data spend on the employee devices or more specifically phones are increasing the operating expenses of Aztek. This critical aspect introduces a threat that the employees are misusing the organizational resources through their personal devices (Glendon et al., 2016). Mitigation Technique: There are several technologies that can be used in finding the solution for the above mentioned problem within the Aztek workplace. That is ATT data solution, which can be applied at the application level for restricting the employees in using the voice and data content while accessing the non-business content during the business operations (Hopkin, 2014). This solution is trusted for its support from the enterprise mobility management solution providers to Aztek. Threats, Vulnerabilities and Consequences Assessment Threats in BYOD platform The BYOD is one of the most effective technological advancements that is improving the database management within the financial organizations (Hu, 2016). Though there are several advantages of BYOD, still several aspects are challenging the BYOD platform in improving the stages of technological development. These threats are described as follows: Increased chances of data leakage: As the workplace is entirely dependent on the mobile devices the chances of data leakage is being increased (Hull, 2012). In addition to this, the concerned scenarios of the Aztek it is found that all the financial document and resources are being shared with the employees as well their personal devices so the chances of misusing the organizational data s well as financial data is increased (Ittner Keusch, 2015). Whenever the personal devices are connected with organizational network and other uses the organizational data for business perspectives as well as to satisfy their own needs they misuse those data and Aztek faces the threats of data leakage from the organizational workplace. Mixing of personal and business data: One of the most massive threats in the workplace of the Aztek is that the organization is that all the organizational and financial data is being stored in a same device (Lam, 2014). Therefore, in contrast with this kind of situation it is found that there are certain kinds of data that can be released in front of the audience or to the eternal world, which is not good for the development of the organization. Therefore, this case needs to be protected. Mobile devices introduce the most effective threat that is the threat of malware detection within the personal devices that may be introduced by the hackers or outsiders of the organization. IT infrastructure: Another most effective threat of Aztek is the IT infrastructure. This aspect is very important in order to maintain the organizational context as well as the IT system architecture of the Aztek. The CIO of the organization needs to maintain the IT infrastructure in order to make all the information system operation perfectly (McNeil et al., 2015). Poor structure of the Information system results into the high impact of the threats on the organizational objectives and goal. Malicious Applications: As the employees are using their personal devices in order to maintain the business operations, this aspect introduces several negative impacts on the organizational objectives (Pritchard PMP, 2014). They members use many applications for their personal usages that may affect the organizational data or financial data of Aztek. BYOD increases challenges concerned with the scenario of the information system. Vulnerabilities of BYOD BYOD is the technological advancement that allows the employees to bring their own device into the workplace in order to do the business requirements (Sodhi t al., 2012). They feel easy to maintain these business operations from their home as well with the help of this policy approved by the Aztek. Previously the financial sectors faced so many problems due to making impossible collaborations possible but after the implementation of the BYOD, structure within Aztek the organization felt so many positive aspects in contrast with their demands and core objectives (Sadgrove, 2016). In contrast with the contemporary scenario of Aztek it is found that the organization is facing so many problems only because of the impact of BYOD in the organization. For the above mentioned aspects the organization needs to analyze the vulnerabilities of the BYOD with respect to their organizational objectives. These vulnerabilities are explained as follows: The biggest problem associated with the BYOD platform is that the BYOD philosophy cannot resists all the inappropriate text, images and other resources that is found in the web content (Soin Collier, 2013). All of these aspects are transmitted along with the information of the concerned organization that is not good for the development of the organization. Another disability of the BYOD is that it cannot also restrict the gaming with the help of the filtering process (Aebi et al., 2012). The so the organizational resources and financial data can also be leaked through the gamming adds provided by the sites. As the employees of the Aztek are fond of using the technological solutions with the help of BYOD it becomes very difficult to make the relation with the employees and with the higher authorities of the organization (Bessis O'Kelly, 2015). This aspect makes the internal bonding weak of the organization. This aspect makes the organization a weak performer in the competitive market. Aztek is one financial organization that has to manage the organizational data with very efficiency (Bolton et al., 2013). The misuse of the financial data may results into the reduction of organizational values. Most of the time, the members use the organizational resources to satisfy their own needs while managing the business aspects. Another major vulnerabilities concerned with the use f BYOD within the organizational perspectives it is found that the organization can face many loss, theft of data and other aspects that may impact on the organizational values and objectives. There are chances of network misuse by the organizational members. This aspect make the organizational members to attack the organizational resources (Chance Brooks, 2015). Consequences of BYOD from IT Risk Control Framework Consequences of the IT control framework that will be measuring the impact of the BYOD on the organizational structure are very important in order to maintain the organizational development (Christoffersen, 2012). The context of the BYOD within Aztek can be explained with the help of the ITIL framework. This framework uses following aspects as the elements: Strategy: This stage of the control framework is necessary in order to check the strategic nature of the IT structure is being used within any organization. This relates the risks and other vulnerabilities that may be caused due to this aspect (Cole et al., 2013). In case of Aztek, using the ITIL framework will be helpful in recognizing the problems. Design: The designing aspect can be easily discussed with the help of the analyzing the design of the BYOD structure and its implications within the Aztek. Transition: Transition is the phase where the control framework can check the transformation of the data and other important aspect that is being related to the BYOD within Aztek. Operation: The operation is one of the most important stages of the IT risk-controlling framework. This stage assures about the operating measures within the context of the BYOD (DeAngelo Stulz, 2015). This aspect mainly supports the various aspect that must be elaborated for the structuring the implementation of the BYOD with respect to the Aztek. Continual improvements: Continual improvements are also necessary in order to maintain the improvements within the risk assessment and management techniques. Recommendations for the Aztek Following recommendations can be given in order to maintain the risk assessment and control measures within Aztek: The risk oversight determination of the BYOD risk factors can be helpful in mitigating those risks. Enhancement of the risk intelligence within the organization can be improvised. Reason behind the risks can be identified with respect to the organization improvements. Entity risk-assessment process for managing the IT risks can be helpful for Aztek. In contrast with the situation of the Aztek, proper communication measures can be helpful in finding the solutions of BYOD issues within the organization. Data Security The data security for BYOD management is always stated as making employees being under watch as well as making them uncomfortable. Mostly, the perception of data security should be ensured for enhanced productivity and rather without hampering the BYOD implementation policy (Sood, 2012; Rewagad Pawar, 2013). Therefore, there are some ways to protect the security and privacy of the employees in order to ensure corporate data under the personal devices as well. The security procedures should include the following: Data privacy and Prime Importance Investigation: The data under BYOD policy should be considered with access rights. The employees should know to what extent they are able to access the data and as well they should be fully aware about it (Zhu et al., 2014). Mostly, the data legislation varies from different regions; hence, it would be challenging for multinational organizations due to different region wise device access rights. There must be some common features as the activity tracing, lock and wipe, and basic monitoring of their data access and application usage (Mohamed, Abdelkader El-Etriby, 2012). The details of such monitoring access should be kept under record to enroll BYOD policy listing. The employees should be listed under this policy to access rights. Data management rather than the device: Implementation of Mobile Application Management (MAM) ensures that work-related data and applications can be used for controlling the data access (Luxton, Kayl Mishkind, 2012). The MAM can be used for specification to the corporate file management and data storage to sort out the shared devices. Mostly, the corporate data and applications can be wiped out in case when the employee shut down the system within shorter time. The device shutdown can cause wiped out data within seconds for volatile entries in table and databases (Fletschner Kenney, 2014; Mols, 2013). In prior systems, the data security was not up to the standard where the data can be removed without any access rights. The application and personal data should be kept separate from the professional data to keep them secure from sudden accidents. Including the Employee Consent for long way: The BYPD policy should have a best way to incorporate the employee consent and as well as the organization transparency. The consent utilization is most effective way to include the rights and responsibilities for data usage (Frame White, 2014; Chen Zhao, 2012). The information and the consequences of losing devices should be kept under the consent for clear outlining. The clear and well-written policies are used for documenting the employee wise devices and their individual access rights. The official employees should have proper consent for avoiding the risk of legislative actions taken from the organization (Rewagad Pawar, 2013). The experts agree that transparency is primary consideration for bringing the trust gap into practice. Personal device security: The personal devices security and suitable data privacy can be maintained with EMM tool as the SAP Afaria for securing the personal and corporate data as well. In case of lost device, the employees should consider the phased approach with dealing alongside the organization policy (Sood, 2012; Rewagad Pawar, 2013). The remote locking scheme can be used for self-service portal access and device control. In cases the device is not recovered the full or selective wiping must be taken into consideration for issues. The selective wiping can moreover remove the corporate data under the process with personal data and as well as the professional records and histories (Bouvain, Baumann Lundmark, 2013). The user can utilize selective wiping of data for under certain situations as well. GPS tracking: The GPS tracking can be turned off with sudden companies for tracking down the employees in most of the time (Frame White, 2014). The EMM tool as the SAP Afaria can be utilized for only capability of tracking GPS turn off features. Therefore, from this report, the primary takeaways should be considered for taking the decision of BYOD and COPE model for several stakeholders (Mols, 2013). The primary takeaways should be the following for essential approach of BYOD: Primary and necessary benefits should be considered from the organization as it can be gained from BYOD model (Garcia et al., 2014). The key stakeholders should be identified for gaining their individual support. Formal sponsorship for executive should be established in this aspect. Communities and self-service scenarios should be utilized for strategic BYOD model preparation (Luxton, Kayl Mishkind, 2012). EMM solution as SAP Afaria can be utilized as ensuring individual requirements were addressed properly in this aspect. Country wise implementation and documentation reuse is required for adjusting the individual countrys individual requirements (Zhu et al., 2014). Scalable BYOD program is often considered as better PR for Information Technology team with general perception of benefits from employee viewpoint. The communication can be rolled out with regional through the executive team entities. References Aebi, V., Sabato, G., Schmid, M. (2012). Risk management, corporate governance, and bank performance in the financial crisis.Journal of Banking Finance,36(12), 3213-3226. Bessis, J., O'Kelly, B. (2015).Risk management in banking. John Wiley Sons. Bolton, P., Chen, H., Wang, N. (2013). Market timing, investment, and risk management.Journal of Financial Economics,109(1), 40-62. Bouvain, P., Baumann, C., Lundmark, E. (2013). Corporate social responsibility in financial services: A comparison of Chinese and East Asian banks vis--vis American banks.International Journal of Bank Marketing,31(6), 420-439. Chance, D. M., Brooks, R. (2015).Introduction to derivatives and risk management. Cengage Learning. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Christoffersen, P. F. (2012).Elements of financial risk management. Academic Press. Cole, S., Gin, X., Tobacman, J., Topalova, P., Townsend, R., Vickery, J. (2013). Barriers to household risk management: Evidence from India.American Economic Journal: Applied Economics,5(1), 104-135. DeAngelo, H., Stulz, R. M. (2015). Liquid-claim production, risk management, and bank capital structure: Why high leverage is optimal for banks.Journal of Financial Economics,116(2), 219-236. Dorfman, M. S., Cather, D. A. (2012).Introduction to risk management and insurance. Pearson Higher Ed. Fertis, A., Baes, M., Lthi, H. J. (2012). Robust risk management.European Journal of Operational Research,222(3), 663-672. Fletschner, D., Kenney, L. (2014). Rural womens access to financial services: credit, savings, and insurance. InGender in agriculture(pp. 187-208). Springer Netherlands. Frame, W. S., White, L. J. (2014). Technological change, financial innovation, and diffusion in banking. Franchoo, T., Pollard, M. (2012). The application of European competition law in the financial services sector.Journal of European competition law practice, lps027. Garcia, C., Wendt, J., Lyon, L., Jones, J., Littell, R. D., Armstrong, M. A., ... Powell, C. B. (2014). Risk management options elected by women after testing positive for a BRCA mutation.Gynecologic oncology,132(2), 428-433. Glendon, A. I., Clarke, S., McKenna, E. (2016).Human safety and risk management. Crc Press. Hopkin, P. (2014).Fundamentals of risk management: understanding, evaluating and implementing effective risk management. Kogan Page Publishers. Hu, W. (2016). Calibration of multivariate generalized hyperbolic distributions using the EM algorithm, with applications in risk management, portfolio optimization and portfolio credit risk. Hull, J. (2012).Risk Management and Financial Institutions,+ Web Site(Vol. 733). John Wiley Sons. Ittner, C. D., Keusch, T. (2015, March). The Influence of Board of Directors Risk Oversight on Risk Management Maturity and Firm Risk-Taking. AAA. Lam, J. (2014).Enterprise risk management: from incentives to controls. John Wiley Sons. Luxton, D. D., Kayl, R. A., Mishkind, M. C. (2012). mHealth data security: The need for HIPAA-compliant standardization.Telemedicine and e-Health,18(4), 284-288. McNeil, A. J., Frey, R., Embrechts, P. (2015).Quantitative risk management: Concepts, techniques and tools. Princeton university press. Mohamed, E. M., Abdelkader, H. S., El-Etriby, S. (2012, May). Enhanced data security model for cloud computing. InInformatics and Systems (INFOS), 2012 8th International Conference on(pp. CC-12). IEEE. Mols, N. P. (2013). The Internet and the banks strategic distribution channel decisions.International Journal of Bank Marketing. Pritchard, C. L., PMP, P. R. (2014).Risk management: concepts and guidance. CRC Press. Rewagad, P., Pawar, Y. (2013, April). Use of digital signature with Diffie Hellman key exchange and AES encryption algorithm to enhance data security in cloud computing. InCommunication Systems and Network Technologies (CSNT), 2013 International Conference on(pp. 437-439). IEEE. Sadgrove, K. (2016).The complete guide to business risk management. Routledge. Sodhi, M. S., Son, B. G., Tang, C. S. (2012). Researchers' perspectives on supply chain risk management.Production and Operations Management,21(1), 1-13. Soin, K., Collier, P. (2013). Risk and risk management in management accounting and control.Management Accounting Research,24(2), 82-87. Sood, S. K. (2012). A combined approach to ensure data security in cloud computing.Journal of Network and Computer Applications,35(6), 1831-1838. Zhu, X., Liu, R., Li, Y., Huang, H., Wang, Q., Wang, D., ... Zhu, H. (2014). An AIE-active boron-difluoride complex: multi-stimuli-responsive fluorescence and application in data security protection.Chemical Communications,50(85), 12951-12954.