Monday, May 25, 2020

People Who Can Help You on Election Day

When voters walk into a busy polling place on election day, they see a vast array of people, most of them rushing around, doing lots of different things. Who are these people and what is their function in the election? Besides (hopefully) lots of other voters waiting to vote, youll see: Poll Workers These people are here to help you vote. They check voters in, making sure they are registered to vote and are at the correct polling place. They hand out ballots and show voters where to deposit their ballots after voting. Perhaps most importantly, poll workers can show voters how to use the particular type of voting device being used. If you have any problems using the voting machines or are not sure how to use the machine to complete your ballot, by all means, ask a poll worker. Poll workers either volunteer or are paid a very small stipend. They are not full-time government employees. They are people who are donating their time to help make sure elections are conducted fairly and efficiently. If you run into any problems while voting or waiting to vote, ask a poll worker to help you. If you make a mistake while filling out your ballot, let a poll worker know before you leave the polling place. The poll worker can give you a new ballot. Your old ballot will either be destroyed or placed in a separate ballot box for damaged or incorrectly marked ballots. Election judges At most polling places, there will be one or two election officials or election judges. Some states require one Republican and one Democratic election judge at each polling place. Election judges ensure that the election is conducted fairly. They settle disputes over voter qualification and identification, deal with damaged and incorrectly marked ballots and take care of any other issues involving interpretation and enforcement of election laws. In states that allow Election Day voter registration, election judges also register new voters on Election Day. Election judges officially open and close the polling place and are responsible for the safe and secure delivery of sealed ballot boxes to the vote counting facility after the polls close. As regulated by state laws, election judges are chosen by a board of elections, county official, city or town official, or state official. If an election judge appears to be â€Å"too young to vote† to you, 41 of 50 states allow high school students to serve as election judges or poll workers, even when the students are not yet old enough to vote. Laws in these states typically require that students selected as election judges or poll workers be at least 16 years of age and in good academic standing at their schools.   Other Voters Hopefully, you will see many other voters inside the polling place, waiting their turn to vote. Once inside the polling place, voters may not try to convince others how to vote. In some states, such politicking is prohibited both inside and outside within a certain distance of the doors of the polling place. Exit Poll Takers Especially at lager precincts, exit poll takers, usually representing the media, may ask people leaving the polling place which candidates they voted for. Voters are NOT required to respond to exit poll takers.

Friday, May 15, 2020

Success Is Based On Innovation Through Creativity - Free Essay Example

Sample details Pages: 10 Words: 2928 Downloads: 2 Date added: 2017/06/26 Category Marketing Essay Type Research paper Did you like this example? All organizations are chasing for forceful environmental factors, categorized by rapid changes. They are trying to change the product life cycles and globalization. It is perceptible that the organisations, those are technology based (mobile phones, cameras, laptops etc) are in the market environment need to be more innovative, more creative to endure in the high competition market. Don’t waste time! Our writers will create an original "Success Is Based On Innovation Through Creativity" essay for you Create order Today success is based on innovation through creativity. In return it will give the advantages to the organisation and the same way to the 21st centurys economies. Consequently, Mumford and Gustafson (1988) quoted that the creativity and innovation are increasing significantly in todays world. 2.2 Defining Product Life Cycle: After developing a product it is introduced to the market. Then it gains more customers as it grows. Gradually the market becomes stable and the product move to the mature stage. At the next stage product is replaced the competitors product and then it declines form the market, in due course it has to withdraw from the market place. According to Kotler and Armstrong (2005), product life cycle is sales and growth of a product over its lifetime. Product life cycle involves five stages as follows: Figure 1: Product life cycle stages However Kotler (2003) said that the most of the product life cycles are divided into major four parts. Those are introduction, growth, maturity and decline. The curves of the product life cycles are represented as bell shaped which is also known by sales and profit life cycles. The figure shown below: Figure 2: Sales and profit life cycles Source: Kotler (2003) Introduction: In the product development stage, the producer or company finds a n ew product idea and began to think about all other related matters with marketing. In this stage sales of the company remain zero and only investment occurs. In the introduction stage, new product is introduced in the market and starts slow sales and growth for the product. Growth: In this stage product comes to a growth step. Then it gets rapid market recognition and increase the profit of the producer. Maturity: A product comes to maturity stage when most of the potential buyers purchase the product as a result of sales and growth. Profits start to go down in this stage. Many competitors also arise in some cases and it drives the products towards the decline stage. Decline: In this last stage of product life cycle sales fall and profit of the marketers also decline dramatically. This product life cycle is generalized because some products introduce and then just decline. Some has long maturity stage, so all the products do not fall in this cycle. Product life cycle (PLC) is one of the most controversial and enduring concepts of marketing however this model has been working as important marketing planning and strategy tools for over 30 years. 2.3 Defining Innovation: Innovation is defined as the successful execution of inventive ideas within an organisation (Amabile, 1998). Product innovation based on idea which ultimately focuses on a product innovation increases consumer utility. Though, Jauhari (2001) specified that there are some definitions which have not been expansively accepted yet, the term innovation is among them. On the other hand, the Commission of European Communities (2003) presented that the innovation is the process of successful adaptation, invention and development of uniqueness in the context of social and economic status. Today innovation does not only stand for new products or services, but also focus on new business plan. The model of business innovation is all about how the product or services is formed or how they are paid for. Such as Google, all the advertisement finances the service as a result the users or the customers do not have to pay them. The fashion chain ZARA, they have different business innovation by ha ving the clothing lines in the shop for some weeks, afterword they modify their clothing line for the following some weeks. This company is able to improvise with the new ideas to attract the customers. According to Mcfadzean et al (2005) where the customers and the suppliers both go through the process of new product developments, services and as well as new methods of commercialisation is define as innovation process. This process adds value and degree of novelty to the organisation. Weller et al. (2004) said that innovation and invention are one and the same. However, Allen (2003) argued that the innovation is different form invention, this innovation process which renovates the invention into something of use. Though Allen (2003) agreed that through the innovation process it can create the new ways of doing things. 2.4 Defining customer perceptions: In current economic situation it is very difficult to compete with one company to another. That means this rivalry situation is getting more and more furious. According to Boyle and Lathrop (2008), in some cases the relationship between retail price and customer perceptions of product durability has been ignored. However Farries et al. (2010) added, customer agreement has significant effects within organisations. The employees priority is to fulfilling the customers demand. Farries et al.(2010) also cited if these ratings drop then the whole scenario will change and it will affect the sales and profitability of the company. Customer satisfaction is an abstract thought of customer perception. John (2003) uttered, the success of the organisation depends on how the organisation appraise the customer satisfaction with their products or services. Moreover the organisations also need to target non customers in the same side of the existing customers. Now customer satisfaction and p erception becomes one of the most common performance measures. Understanding customer perception gives a business a competitive advantage and research and development as well as innovation activities fosters with the perception of having a close eye on the customers rather than competitors. Kano et al. (1984) who introduced a two dimensional model of a product or service where it was shown how to assure customer needs in the term of customers perception. Figure 3: Kanos customer satisfaction model Source: Kano et al. (1984) On the other hand the American Customer Satisfaction Index (ACSI) has better validity than any other customers measurement. Fornell et al. (1996) first introduced the American Customer Satisfactory model for ACSI. This is very common and cross industry model which can measures the oraganisations based on market performance. Figrure 4: The ACSI model Source: Fornell et al. (1996) According to Chang and Chen (2011) the service providers need to categori ze detailed elements in more specific way within the services and this is how the customers perception will increse in the aspect of the experience. 2.5 The nature of the product life cycle for component products: The shape of the product life cycle is concern about the level of innovative products. Calantone et al. (2003) said that the industry evolution can be changed based on the relationship between the market concentration and the firms supply chain relationship. This can be done by focusing different product strategies which have direct interaction with customer attitudes and needs. However, Stig (2009) disputed that the development strategy of the product, as each phase of product life cycle and these diverse features affect the organisations operation. Giachetti and Marchi (2010) added the technology based industry such as mobile phone and personal computer focus on competitive advantage via process innovation (for example, Dell), on the other hand some company may preferred to choose a different approach and go on with design innovation (for example, Nokia, Apple) 2.6 New Product Developments: Annacchino (2003), indicated that, a product plan consist with time periods, probability and resource requirements through the New Product Development (NPD). Creativity brings the success of a new product and it is only achievable by the best practice of an innovation. However, Annacchino (2003) also argued that organisations recent new product development movement is more effective by assisting the organisation. Intangible innovation can be ignored at this stage. It is assuming that, the active frame of Research and Development and product process requires purifying. On the other hand, these are absence in the internal innovation of the common organisation who desires to understand innovation. As per Sen and Haq (2011), a large number of small-medium sized firms are collaborated with external core and non core activities and this collaboration is involved with new product development. Cooper (2005) stated that the new product is the result of systematic approach which is based on the success of the best practice. The framework of new product development consists of five stages, which was identified by Cooper and Edgett (2001). The stages are: scoping, building the case, development, testing and validation launch. The decisions are made whether an innovation process goes to the next stage or not that depends on how the framework works within organisation. 2.7 Types of innovation: Innovation can be two types. It can be tangible such as new product development or intangible as new services and new work exercises. According to Ben and Radford (2002), innovation focuses on whether new or improved products, management, processes and organisational development. Hamel and Getz (2004) referred another two forms of innovation such as services and business model innovations. In addition, Hesselbein et al., (2002), proposed another two: technology and organisational innovation. 2.8 The expedition of innovation: An innovation process passes through an organisation to achieve a goal. It is important to realise the value of innovation it passes through the business. Innovation is important to business and it has support from several sources. According to Bean and Radford (2002), it is a fact that innovation holds the life force of a living adaption for an organisation. Develop a new business were inspected as perhaps sharing similarities in process. Though, the distinctions of an industrialist establishing a new project and the innovation expedition were apparently fundamental and restricting importance. Sharma (1999) distinguished that, there is absence of bureaucratic and risk adverse nature of an existing business in a new business. In the same way, large companies may not have flexibility whether this situation is accessible in small enterprising business. Bhat (2010) stated that the mechanism of innovation is to make new and improved products and services, it is required to adapt wit h the changes of markets, technologies and methods of competition. 2.9 Innovation and organisations: Over the last few years, innovation and accomplishing an innovative organisation have been increased widely. Innovation in a business may be restrained. Willams (1999) have demonstrated that, continuous innovation practices are often cause one dimensional innovations. Although, McAdam et al. (2000) argued that by exercising continuous improvement help to develop innovative organisations. Sharma et al. (2010) analysed the ten types of innovation process. These ten types of innovation are segregated into main four parts which are finance, process, offering and delivery. It has been argued that when a company can comply with any 3-4 types of innovation out of ten then the company can do the break through. The results clearly showed that there was support about the findings in this article. Such as TATA Consultancy Service (TSC), Gyan Shala, Dainik Bhaskar and another five well have known companies from India which are successful innovator by practicing 3-4 or even more from out of ten types of innovation. On the other hand Martinez-ros and Labeaga (2009) offered persuasive proposal of innovation activity correlated with sustain competitive advantages. However this is crucial for any organisation to success and to satisfy the customers just to by new product launch. Furthermore the authors added, the company can gain sustain competitive advantages by generating the knowledge from the company environment itself. The persistence is the key issue to obtain the knowledge. The findings of this article clearly support the results of the survey from the Spanish database, which was conducted by the authors from the manufacturing companies from the period of 1990 to 1999. The results supported authors persistence value. Present of persistence can lead the business to successful innovator alternatively absence of this can cause bias results. 2.10 Innovation Decision Process by Rogers: Rogers (2003) clarified a suitable model which helps to identify the process of innovation. There are five steps in this theoretical model. During an innovation this five steps outline the individuals progress. The five steps are followed by the next page: Figure 5: Rogers five steps Source: Rogers (2003) 2.10.1 Knowledge: This is the first step of this model. Rogers (2003) explained that knowledge is introduction of an innovation and it is important to realise it. This only happen when an organisation or an individual conscious of disappointment or frustration. Zaltman et al. (1973) added that an organisation who wants to implement innovation process need to aware of its allegations and benefits. 2.10.2 Persuasion: This step focus on the positive and negative forms of innovation. It indicates the attitude of the innovation rather than just to have knowledge about this. Persuasion involves with implication of the innovation and wishes for more information to evaluate. 2 .10.3 Decision: The third step is decision, which is engage to foresee the future of an innovation. Rogers (2003) in his model indicated two clear choices- adopt the innovation or reject the innovation. If the organisation decides to reject it then this process terminate here. Other than, if it is adopted by the company then move to the next level. Decision level can be more difficult for the organisation rather than an individual. As in organisation, the problem may arise due to unwillingness to change and unsupportive framework. 2.10.4 Implementation: The change or modifications, adjustment, re invention of the innovation are engage in this step. These types of changes are essential to implement the innovation process. This will give the company some great benefits to overcome the conflict. 2.10.5 Confirmation: This fifth step may be needed if any decision requires revising or emphasizing the innovations value and validity. If there is any dissatisfaction with the result or if there is any conflict of information then the innovation process can be terminated. Rogers (2003) suggested that, an innovation can be abandoned at any time when an organisation passes though these five steps. This innovation decision process model helps the organisation to seek the proper way to implement the innovation process within the company rather than going through the unplanned innovation. Nutley et al. (2002) stated that, this innovation decision process model is one of the most used quoted models. These five steps are ideal to restructure the organisations innovation process. Although not contesting the significance of this point, it may hamper the original business when operating the innovation process. Even though, Rogers (2003) innovation decision process model gives very significant structure for the purpose of this study. This model lends the elasticity to implement the process all the way through. As per Woodside and Biemans (2005), they used this innovatio n decision process model in an organisational perspective. 2.11 Innovation process management: Innovation process will only be succeeding when this process will work out with the organisations culture, environment and structure. Therefore, Senge (2006) evaluated that, organisational learning concept helps to put together the organisational add individual skills so that enormous change can flourish the competitive business environment. Kotter (1996) recommend that, adaptability, flexibility, accessibility combination will appear in 21st centurys company to do the team development. According to Williams (1999) spotted that, the demand of innovation generation and rewarding enterprises for example admire, chance to work out further innovation or financial benefit. 2.12 Potential stages for innovation to effect expedition: Project definition. There are some steps which potentially helps to outcome the excellent result throughout the innovation expedition. Hamel (2000) suggested that, exchanging the concept to the line managers, building a business concept, looking for a guarantor and structure support to functional occurrences in the structured process. Pinchot and Pellman (1999) distinguished that, to find out the best mix of innovation and to achieve the long term objective it is very important to make sure all the resources are distributed for structural process. Potential steps for innovation expedition are also recommended by Pinchot and Pellman (1999) below: Distributing idea to the managers Set up a Business plan. Find out a sponsor Gather support Action Figure 6: Potential stages for innovation expedition 2.13 Barriers and Support for innovation expedition: The total success of innovation depends on the practices during the innovation expedition. Lack of directions and testing the literature on developing innovative organisations lend a hand to diagnose the barriers that may be lead to the innovation expedition. In the same way supports to the innovative organisation might be performed as facility. Christensen and Raynor (2003) proposed the influences on the innovation expedition can be summarised as: Tangible resources to succeed such as assets, people, things. Processes that assist interaction, coordination, communication, Values that understand the difference between the new and old requirements such as the culture and criteria for decision making. Resistance to change, challenges to existing procedures are the main barriers to innovation process. Christensen and Raynor (2003) stated that, if the innovation process does not succeed, the main reason is managers and the organisations are incompetent or they do not underst and the value of innovation. It is not possible without being compromised the efficiency to fit innovative activities into daily routines. 2.14 Overview: The purpose of the literature review validates that if a business wants to survive and growth then the product life cycle and innovation are most important to them. However the internal innovation outcome process results the unlocking of innovation value. Existing literature focuses on the innovative organisation or offers theoretical concepts rather than pursue the realistic points to process the product life cycle and innovation within the company. Essentially innovation transforms the business and this crucial process need to manage in proper way. When this change comes to the organisation then the resistance began. Only by studying the proper innovation strategy could sustain the business and can overcome all the limitations. This is how innovation can be more effective into the business. The prospect of innovation and product life cycle strategy will provide the great effectiveness of understanding the customer perceptions in the aspect of innovation value.

Wednesday, May 6, 2020

The Analytical Versus Holistic Approach Of Leadership Essay

Overview In general, we are familiar with the quote managers do things right while leaders do the right things. In essence, the analytical versus the holistic approach of leadership addresses these two separate and distinct functions within an organization. For instance, a manager focuses on the daily operations of an organization with an emphasis on team delivery, budgeting, and supervising the employees. Contrarily, leaders within an organization focus their time on improvements and innovation. In particular, leaders can perform this function since they are not responsible for running the team and mired up in minutia. As a result, there is a misnomer that managers are leaders and leaders remain managers, but they are not exclusive. Therefore, being a manager and a leader requires different abilities and dispositions. With this in mind, management entails having the skills to plan, delegate, communicate, and motivation. An individual with the administrative skills may focus on the daily operations of an organization with an emphasis on team delivery, budgeting, and supervising the employees. Moreover, managers are working on organizational efficiency, speeding up the operation to cut costs and increasing productivity, and enforcing the rules and procedures. By having the proper leadership traits, managers can conceive the right decisions and accomplish these goals. As an illustration, consider a manager working on a budget, yet lacks the leadership characteristicShow MoreRelatedThe Analytical Versus Holistic Approach Of Leadership Essay3356 Words   |  14 PagesIntroduction In general, we are familiar with the quote managers do things right while leaders do the right things. In essence, the analytical versus the holistic approach of leadership addresses these two separate and distinct functions within an organization. For instance, a manager focuses on the daily operations of an organization with an emphasis on team delivery, budgeting, and supervising the employees. Contrarily, leaders within an organization focus their time on improvements and innovationRead MoreLiterature Review of Organizational Change, 2000 to 20083057 Words   |  13 PagesSelf, Thal Lo 2002). Many authors concur that the prime task of leaders is to bring about change and that leadership and change management are indeed inextricably linked (Burnes 2003, Stoker 2006, Maurer 2008). Robinson and Harvey (2008) maintain that the acceleration of globalisation has resulted in a tumultuous state of change as organisations struggle to adapt to new models of leadership. Consequently, few would dispute that with such increasing globalisation, deregulation, rapid pace of technologyRead MoreApplication of an Analytical Tool Box Design2236 Words   |  9 PagesIn this report, the aim is to provide company A with an analytical tool box design for achieving this match between research and product development. The final goal of the tools will be to encourage an imaginative climate in Company A which will increase the company’s profit margins in the long run. The report will adjust the normal technical pattern of problem identification through scanning, strategy/implementation and learning. At each stage of the report, the important set of tools will be analyzeRead MoreHow Personality Predicts Employee Performance1857 Words   |  8 Pagesperformance of an employee. Contextual performance refers to voluntary actions which are initiated to advance the interests of the organization. Contextual behaviors include keeping a positive approach, obeying rules and regu lations, politeness, loyalty, voluntarily work etc. Employees having Conscientiousness approach follow directions, are regular and stay far from engaging in unethical actions. Agreeable employees are supportive and caring towards their colleagues; however those employees which scoreRead MoreStrategic Innovation8306 Words   |  34 Pagesinnovation-point.com Page 1 A Framework for Strategic Innovation Table of Contents 1. 1.1. 1.2. THE ART AND DISCIPLINE OF STRATEGIC INNOVATION ............. 3 Traditional strategy versus Strategic Innovation ................................................................. 4 Serendipitous versus Strategic Innovation............................................................................ 4 2. 2.1. THE SEVEN DIMENSIONS OF STRATEGIC INNOVATION............... 5 A Managed InnovationRead MoreGlobal Human Capital Management Trends4491 Words   |  18 Pagesprofitable company but with the globalization of culture and the marketplace, due in part to the technology growth and the internet, they cannot successfully work with an outdated human resource system. The casinos have had a transactional style of leadership; believing that the primary purpose of a subordinate is to do their jobs, create clear work requirements, and expect the job to be done without question and immediately. The leaders have a realist view of thinking and use their expertise as theirRead MoreStarbucks Business Plan31663 Words   |  127 PagesIntroduction – what is Starbucks? 10 2.1 Subject field 11 2.2 Problem and problem formulation 11 2.3 Project design 12 3 Methodology and theory of science 14 3.1.1 Three methodological views of Arbnor and Bjerke 14 3.1.1.1 The analytical view 15 3.1.1.2 The systems view 17 3.1.1.3 The actors view 19 3.1.2 Four sociological paradigms of Burrell and Morgan 21 3.1.3 Functionalist paradigm 22 3.1.4 Interpretive paradigm 23 3.1.5 Radical humanist paradigm 23 3.1Read MoreManaging for the Future Organizational Behavior Processes7280 Words   |  30 Pagesselect the modules you want and we will provide an ISBN to you that will be unique to your custom Ancona text. Each custom order includes, at no additional cost, a short introduction to Managing for the Future, which lays out the texts basic analytical frameworks and varied goals for the course. ATTN: Custom Database Order Coordinator DATE: _ FAX: 800.270.3310 # of PAGES: _ o Please call me with the ISBN o Please e-mail me the ISBN Instructor Name _ School _ Address _ Telephone # _ Read MoreQualitative Research Methods Essay13327 Words   |  54 Pagesis on women in leadership, the objective of this research is to evaluate case study, phenomenological, and grounded theory. In effort to better understand the challenges women in leadership face in climbing the corporate ladder; this researcher selected the phenomenological method for conducting the research. Then, the plan is to synthesize the findings, and in conclusion, analyze the issues associated with sample selection, validity, and bias as they pertain to women in leadership. QualitativeRead MorePROC 5000 Midterm Prep Essay8984 Words   |  36 Pagesin the context of strategic alliances, organizations are looking at total cost as a criterion, thus allowing win-win relationship building to lower total costs. Most public and private sector organizations are expected to use integrative (win-win) versus distributive (win-lose) negotiations, as they move away from adversarial and toward collaborative relationships with suppliers. Supplier Outsourcing In the private sector, executive managements perception of supplier importance and of the purchasing/sourcing

Tuesday, May 5, 2020

Principle of Information Security Case Study of PeopleSharz

Question: Discuss about thePrinciple of Information Securityfor Case Study of PeopleSharz. Answer: Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees adherence to information security policies: An exploratory field study.Information management,51(2), pp.217-224. Introduction The report depicts the problems that has been raised in an organization namely as PeopleSharz, an internet startup company, founded in the year of 2012. In order to develop its position in the competitive marketplace the organization is willing to adopt different business strategies. During analysis it has been found that the website of the company was attacked by the external hackers and the confidential data from the storage area are shared publically. In order to achieve financial stability PeopleSharz has started to analyze the technical problems of the organization. The background of the organization and related problems will be illustrated in this report. The reason behind hacking and dependencies and the critical success factors to the job will also be demonstrated in this report. Background and the Problem Analysis PeopleSharz, an Internet startup company founded in the year of 2012 and the founders of the company are Peter Tweet and Mark Bukerzerg. On 21st April, 2016 the website of the organization was hacked by the hackers and in a teleconference the shared data by the hackers are analyzed and found to be real. From the teleconference the organization came to know that the shared data are similar to the confidential data stored in the database of the organization. The hackers were successful to steal the data from the storage (Rodrigues et al. 2013). Due to this reason the security statement established by PeopleSharz is facing several questionnaires. The main reason behind the hacking was lack of data security or improper usage of encryption keys. The data stored in the database of PeopleSharz used public symmetric key for data encryption but the key was shared key and thus it become easier for the hackers to use the shared key (Fernandes et al. 2014). In order to decrypt the data hackers easily used the shared key. Improper data encryption was the major reason of data hacking. Cryptography is referred to as one of the major area of concern for every organization to maintain the security of the data. Nowadays, the networks used by different organizations are taking global form and information stored in the database is becoming digital (Mahajan and Sachdeva 2013). As information play the vital role, thus open communication channels and stealing of sensitive information are becoming the main target for the hackers. The modern set of cryptography provides robust technology set. However, many benefits and challenges are identified related to encryption (Deligiannidis, et al. 2013). It provides four basic services regarding information security. Encryption technique was used to secure the information and the communication from the unauthenticated users. Authentication is another helpful tool of encryption process which provides authentication such as MAC and digital signature. Digital signature helps to prevent spoofing, snooping and DOS attacks. In addition to this, PeopleSharz encrypted its network traffic to avoid the threat vectors. Introduction of digital signature, and cloud based platform SaaS, PaaS, IaaS to enhance the level of data confidentiality (Li et al. 2013). The website is required to be developed with the help of SSL/TLS. Different operational procedures are adopted to develop the data security of the system. However, PeopleSharz is a startup internet based company, thus the cost estimated or the budget of development was not enough to implement cloud based solution and digital signature process to keep the security of the data. Lack of usage of data security package is one of the major reasons behind the data hacking. The administration or top level management team of PeopleSharz was not using proper data encryption technologies. Virus attacks or malicious attacks on the system administration helped the hackers to steal confidential data from the data storage (Fernandes et al. 2014). The database management system used by the organization must have been used encryption key. By using this technology only the authenticated users access the data stored in the storage. Data disruption, deception, active attack, passive attacks are the different kinds of attacks or hacking methodologies. Analysis of the Threats During threat analysis of PeopleSharz different threats are identified and these are as follows: Malware: This is the acronym of malicious software. Malware can either be software or a virus or a worm as well. The hackers generate programming codes and transmit it through website or network to the users device (Parashar and Arora 2013). If the user access those websites or network then the virus carried out by the site will attack the stored data. Computer virus: This s referred to as virus because it can travel from e infected device to another. Dishonest people generally use this kind of programs to attack the confidential data of an organization or any personnel (Bernstein, Lange and Schwabe 2012). Virus is also capable to delete data, store data or edit data rather virus can even change the content of the data. Rogue security software: This is a special kind of advertisement that forces one user to access the link. Generally, when people uses any kind of social media it has been found that sometimes advertisement regarding popup windows opens and forces the users to click on that particular link (Ren, Wang and Wang 2012). As soon as the user clicks on that link, unwanted malicious generates and attacks the data stored in the files of the device. Crypto wall 2.0 is an incident of data hacking where the users were unable to reassess their data until or unless they provide bit coins to the hackers (Boyle 2014). Botnet: This is referred to as a group of computers connected through a single internet network. Each single device connected to the device is known as zombie computer (Chen and Zhao 2012). This kind of attackers generally attacks the devices by using email or spam. The objective of DOS attack is to bring down a website application by overloaded user request rather it can be said that sometimes it has been found that one website is requested by many users and after each access the data stored in the website can be hacked by the hackers. Trojan horse: This is referred to as software that might attack by simple operating an application or by downloading. If any device is attacked by the Trojan horse then it can do everything (Singh 2013). Different records stored in the database of an organization, can be hijacked and those data can be used by any one regardless of the location and the geographical boundary of the users. Malicious spyware: The malicious spyware is generally used to describe different Trojan applications. The cyber criminals might used this kind of spyware to hack the confidential data of whether any organization or any individual (Deligiannidis, et al. 2013). Over the internet the recorded data can send back to the cyber attackers. Whenever, the top level management team of an organization wants to monitor the workflow or any employee, and then they use this kind of spyware to track the flow of the data. Spam: This is an electronic junk mail (Mahajan and Sachdeva 2013). The users devices might get attacked by the hackers by the usage of this kind of spam. If any user tries to access the spam mal then the other mails stored in the drive of the machine can be hacked by the attackers. Rootkit: In order to achieve administration level access a computer network uses the Rootkit (Bernstein, Lange and Schwabe 2012). It is basically a collection of tools that that used to access the administration level records. This can be installed by the criminals in the users device so that they can access the data from the storage. For exploiting data from the storage this can be used by the cyber criminal or hackers. Mitigation process: In order to mitigate this issue it is recommended to PeopleSharz to adopt the best suited encryption process. The public and private keys used by the organization should have to be shared by nature so that only the authorized users can access the data whenever required (Parashar and Arora 2013). However, it can be said that, they are needed to adopt cloud based technology to resolve or fix the issues of Botnets and Trojan Horses. Additionally, the strong configuration and restricted connectivity is required to be adopted to improve and enhance the efficiency level of data protection. Dependencies and Critical Success Factors to the Job In order to develop the efficiency of an organization, an organization is required to depend on the stakeholders of the organization. The users and employees of an organization are interviewed to collect different sorts of information associated to the security breaches. Host: It can be said that if the reasons of data breaches are the host providers then they are responsible for this process (Boyle 2014). Nevertheless, if the host providers are not the actual responsible person, then also they will suffer due to the violence occurred. Administration: They are the top level management team of PeopleSharz. The board of directors are also part if the administration. It is necessary for them to be aware of all the legal rules and regulations regarding privacy and security (Chen and Zhao 2012). Due to hacking massive part of PeopleSharz are affected very badly. The data stored in the database management system of the organization are hacked and publically released. Improper application of encryption key is another reason thus the administration is also responsible for the attack. Consumers: The consumers of the product of PeopleSharz are affected very badly. The attackers not only attacked the confidential data rather they shared it (Kumari and Chawla 2015). The consumers are facing technology based challenges as the hacked data are financial and personnel by nature. Employees: The employees working for PeopleSharz are mostly responsible because they were not aware of the technical terms regarding data security (Singh 2013). The rules and regulations needed to be followed by each and every employees working for the company to keep the data security. Recommendations In order to improve the security management process for PeopleSharz, certain recommendations are needed to implement. These are as follows: Secured data transition: PeopleSharz is a start up internet based company, and it needed to provide security to data during transaction from host to client. As the current system does not possess proper data security thus they must focus on transmission time data privacy. Proper encryption tools: In order to encrypt data proper encryption tools are needed t be implemented. The system does not possess all the tools thus; PeopleSharz should adopt required algorithms of data encryption. Cloud based management: Cloud based management system is needed to be implemented as it is cost effective and secured by nature. Service oriented network virtualization towards convergence of networking and cloud computing should support the SOA architecture. Secured architecture: The architecture of PeopleSharz is needed to be secured enough so that unauthorized users cannot hack the data from the data storage easily. Conclusion From the overall discussion it can be concluded that, PeopleSharz has not maintained all the rules and regulations that are needed to be implemented to keep the data security. Different wrong things involved in the system, are identified and the mitigation process regard that is also mentioned in this report. The hackers hacked all the confidential data from the database of PeopleSharz and almost all the associated people such as employees, administration, clients and host providers are found to be responsible and affected by the attacks. Moreover, in order to mitigate the problems or in order to improve the security management process, certain mitigations are also mentioned in this report. References: Bernstein, D.J., Lange, T. and Schwabe, P., 2012, October. The security impact of a new cryptographic library. InInternational Conference on Cryptology and Information Security in Latin America(pp. 159-176). Springer Berlin Heidelberg. Boyle, M., 2014. Information Assurance Standards: A Cornerstone for Cyber Defense.Warfare,13, pp.8-18. Chen, D. and Zhao, H., 2012, March. Data security and privacy protection issues in cloud computing. InComputer Science and Electronics Engineering (ICCSEE), 2012 International Conference on(Vol. 1, pp. 647-651). IEEE. Deligiannidis, L., Wiseman, C., Yun, M. and Arabnia, H.R., 2013. Security Projects for Systems and Networking Professionals.Emerging Trends in ICT Security, p.111. Deshmukh, D., Pasha, A. and Qureshi, D., 2013. Transparent Data Encryption--Solution for Security of Database Contents.arXiv preprint arXiv:1303.0418. Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M. and Incio, P.R., 2014. Security issues in cloud environments: a survey.International Journal of Information Security,13(2), pp.113-170. Kumari, S. and Chawla, J., 2015. Comparative Analysis on Different Parameters of Encryption Algorithms for Information Security. Li, M., Yu, S., Zheng, Y., Ren, K. and Lou, W., 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), pp.131-143. Mahajan, P. and Sachdeva, A., 2013. A study of Encryption algorithms AES, DES and RSA for security.Global Journal of Computer Science and Technology,13(15). Mohamed, E.M., Abdelkader, H.S. and El-Etriby, S., 2012, May. Enhanced data security model for cloud computing. InInformatics and Systems (INFOS), 2012 8th International Conference on(pp. CC-12). IEEE. Nafi, K.W., Kar, T.S., Hoque, S.A. and Hashem, M.M.A., 2013. A newer user authentication, file encryption and distributed server based cloud computing security architecture.arXiv preprint arXiv:1303.0598. Parashar, A. and Arora, R., 2013. Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3, pp.1922-1926. Ren, K., Wang, C. and Wang, Q., 2012. Security challenges for the public cloud.IEEE Internet Computing,16(1), p.69. Rodrigues, J.J., de la Torre, I., Fernndez, G. and Lpez-Coronado, M., 2013. Analysis of the security and privacy requirements of cloud-based electronic health records systems.Journal of medical Internet research,15(8), p.e186. Singh, G., 2013. A study of encryption algorithms (RSA, DES, 3DES and AES) for information security.International Journal of Computer Applications,67(19).