Need an research paper on security, privacy and ethics. Needs to be 3 pages. Please no plagiarism. ID # Security, Privacy and Ethics Introduction At the present, the use of modern technologies such as information systems, computer networks and databases has become essential for the business organizations. Without a doubt, they offer a wide variety of advantages and opportunities for all kinds of businesses. On the other hand, they also cause many issues regarding security, privacy and ethical attacks. In this scenario there is a vital need for the adoption of enhanced security and privacy solutions. In addition, the application of such security based solutions demands effective security management knowledge and expertise. With the implementation of effective security mechanism we can gain a great deal of confidence and peace of mind while using these systems at home or marketplace (Shelly, Cashman and Vermaat. Turban, Leidner and McLean). This paper presents some of the security, privacy and ethical aspects regarding information technology and computer systems.
Security, Privacy and Ethical Issues
There are many issues and threats which are hindering the successful operation and working on information and computer system arrangements. In this scenario, one of the initial risks is security issues from less effectively recruited staff personnel. For instance, any staff member with some illegal aims and objectives can set a virus in the database or hack the overall corporate information. Additionally, this is one of the major ethical dilemmas in information and computer systems (UN. Farshchi, Gharib and Ziyaee).
In addition, differences in operating systems, versions and patches can also create various problems and issues regarding defense and protection of information and computer systems. In the absence of such protection strategy the overall information and data can be hacked or deleted. In worst case the business information can be accessed by corporate competitors. Additionally, absence of antivirus software for information and computer systems can also cause a huge problem for personal or business data and information. In case of such situation any virus can simply attack and destroy or stop the overall working of systems. In addition, one of the main issues is about the absence of internal firewalls. In this scenario, any user of systems and web services are open to virus attacks, malware, or Trojan attacks. In such situation overall information and computer systems can be hacked or influenced in case of effective handling and management of operations (UN. Farshchi, Gharib and Ziyaee).
How Security, Privacy and Ethical Issues Happen?
This section discusses how some of the major and critical security, privacy and ethical issues happen. These issues can be about single network, corporate, business, shop, individual or any kind of person: (UN. Farshchi, Gharib and Ziyaee. Mookhey)
Lack of suitable security policies
No enhanced cryptographic modules
No Backups
No recording logs for users from external interaction
Have no suitable intrusion detection system
No facility of backup snapshots
Have no Secure File Transfer Protocol (SFTP)
Have no Secure Socket Layers (SSL)
No suitable and updated anti-virus and anti-spyware software
There is no documented policy
There is no content filtering
There is no documentation for any of the setup
There is no firewall in existence
Security, Privacy and Ethical Issues Mitigation
This section presents the mitigation and management of critical security, privacy and ethical Issues. This section outlines some of the major methods and techniques for implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of security, privacy and ethical issues. In this section I have suggested some of the important methods and techniques those will be used for the enhanced and effective management of security, privacy and ethical issues: (Magalhaes. Danchev)
Firewalls
Information technology and computer systems can be protected through firewall system that is an essential element of network which is used by the people to access the Internet.
Service packs
For information and computer systems service packs are an essential technology. It basically encompasses new definitions of virus and attacks those can be handled through such technology setup.
Antivirus
This is also one of most important security management solutions used by approximately all individuals and organizations for the overall management of security and privacy.
Strong password practices
In order to protect a system against the outsider attacks we need to build strong passwords. In this scenario we need to choose less frequently used names and numbers so that an outsider cannot gain access to our system.
Other Solutions
Digital Signatures and Certificates
Secure Socket Layers
PCI, SET, Firewalls and Kerberos
Advanced Data Encryption
Instant Suspicious Activity Notifications
Payment Processing Technology
Conclusion
At the present, the use of information technology has become for all the businesses and industries. Despite a number of advantages of information technology there are certain issues also involved with the implementation of information technology. In this scenario, information security, privacy and ethics are some of the most important issues that need to be addressed in order to make best use information technology. In addition, there are many solutions and techniques which can be adopted to deal with these issues.
Works Cited
Danchev, Dancho. Building and Implementing a Successful Information Security Policy. 2003. 03 December 2012 .
Farshchi, Seyyed Mohammad Reza, Fariba Gharib and Reza Ziyaee. “Study of Security Issues on Traditional and New Generation of E-commerce Model.” 2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011). Singapore: IACSIT Press, 2011. 113-117.
Magalhaes, Ricky M. Hardening Windows NT/2000/XP Information Systems. 23 July 2004. 19 November 2012 .
Mookhey, K. K. Common Security Vulnerabilities in e-commerce Systems. 02 November 2010. 27 November 2012 .
Shelly, Cashman and Vermaat. Discovering Computers 2005. Boston: Thomson Course Technology, 2005.
Turban, Efraim, et al. Information Technology for Management: Transforming Organizations in the Digital Economy. New York: Wiley, 2005.
UN. Youth and Information and Communication Technologies (ICT). 2003. 25 November 2012 .
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Need An Research Paper On Sectarian Conflict In Iraq Needs To Be 11 Pages Please
/in Uncategorized /by developerNeed an research paper on sectarian conflict in iraq. Needs to be 11 pages. Please no plagiarism. The first two pages provide an in depth analysis and commentary on the evolving nature of the conflict. It argues that the roots of the conflict have been present since the creation of the country in the aftermath of World War I by the integration of former Ottoman Empire provinces. Further the politics of the country has been based upon totalitarianism and centralized government that has been effective and efficient in suppressing any manifestation of Shiite or Kurdish nationalism and fundamentalism. After this the research study focuses on the efforts of the Iraqi and American administrations in resolving the sectarian problem. Despite superficial attempts to negate the concept of sectarianism the root causes of the conflict persist. The research paper uses the political theory of realism in order to understand the causes and nature of the sectarian conflict in Iraq. Finally it makes recommendations which will assist policy makers in eradicating the scourge of sectarianism in the country.
Iraq was created after World War I by the British administration by joining together former provinces of the Ottoman Empire. Three ethnic and sectarian groups, Kurds, Sunnis, and Shiites inhabited this area. During the Baath party regime of Saddam Hussein, the Sunni elite had managed to suppress any manifestation of Kurdish or Shiite resurgence. However the United States invasion of Iraq and overthrow of the Saddam Hussein regime has dangerously changed the balance of power and monopoly once enjoyed by the Sunni elite. Shiites and Kurds have carved out their respective zones of influence where they dominate the state and security apparatus. Fighting in Iraq has increasingly turned towards a sectarian conflict between Shiites and Sunnis. The struggle has also been a broad part of the struggle between Arab states and Iran to protect and defend their interests in Iraq.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Need An Research Paper On Security Privacy And Ethics Needs To Be 3 Pages Please
/in Uncategorized /by developerNeed an research paper on security, privacy and ethics. Needs to be 3 pages. Please no plagiarism. ID # Security, Privacy and Ethics Introduction At the present, the use of modern technologies such as information systems, computer networks and databases has become essential for the business organizations. Without a doubt, they offer a wide variety of advantages and opportunities for all kinds of businesses. On the other hand, they also cause many issues regarding security, privacy and ethical attacks. In this scenario there is a vital need for the adoption of enhanced security and privacy solutions. In addition, the application of such security based solutions demands effective security management knowledge and expertise. With the implementation of effective security mechanism we can gain a great deal of confidence and peace of mind while using these systems at home or marketplace (Shelly, Cashman and Vermaat. Turban, Leidner and McLean). This paper presents some of the security, privacy and ethical aspects regarding information technology and computer systems.
Security, Privacy and Ethical Issues
There are many issues and threats which are hindering the successful operation and working on information and computer system arrangements. In this scenario, one of the initial risks is security issues from less effectively recruited staff personnel. For instance, any staff member with some illegal aims and objectives can set a virus in the database or hack the overall corporate information. Additionally, this is one of the major ethical dilemmas in information and computer systems (UN. Farshchi, Gharib and Ziyaee).
In addition, differences in operating systems, versions and patches can also create various problems and issues regarding defense and protection of information and computer systems. In the absence of such protection strategy the overall information and data can be hacked or deleted. In worst case the business information can be accessed by corporate competitors. Additionally, absence of antivirus software for information and computer systems can also cause a huge problem for personal or business data and information. In case of such situation any virus can simply attack and destroy or stop the overall working of systems. In addition, one of the main issues is about the absence of internal firewalls. In this scenario, any user of systems and web services are open to virus attacks, malware, or Trojan attacks. In such situation overall information and computer systems can be hacked or influenced in case of effective handling and management of operations (UN. Farshchi, Gharib and Ziyaee).
How Security, Privacy and Ethical Issues Happen?
This section discusses how some of the major and critical security, privacy and ethical issues happen. These issues can be about single network, corporate, business, shop, individual or any kind of person: (UN. Farshchi, Gharib and Ziyaee. Mookhey)
Lack of suitable security policies
No enhanced cryptographic modules
No Backups
No recording logs for users from external interaction
Have no suitable intrusion detection system
No facility of backup snapshots
Have no Secure File Transfer Protocol (SFTP)
Have no Secure Socket Layers (SSL)
No suitable and updated anti-virus and anti-spyware software
There is no documented policy
There is no content filtering
There is no documentation for any of the setup
There is no firewall in existence
Security, Privacy and Ethical Issues Mitigation
This section presents the mitigation and management of critical security, privacy and ethical Issues. This section outlines some of the major methods and techniques for implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses and other related forms of security, privacy and ethical issues. In this section I have suggested some of the important methods and techniques those will be used for the enhanced and effective management of security, privacy and ethical issues: (Magalhaes. Danchev)
Firewalls
Information technology and computer systems can be protected through firewall system that is an essential element of network which is used by the people to access the Internet.
Service packs
For information and computer systems service packs are an essential technology. It basically encompasses new definitions of virus and attacks those can be handled through such technology setup.
Antivirus
This is also one of most important security management solutions used by approximately all individuals and organizations for the overall management of security and privacy.
Strong password practices
In order to protect a system against the outsider attacks we need to build strong passwords. In this scenario we need to choose less frequently used names and numbers so that an outsider cannot gain access to our system.
Other Solutions
Digital Signatures and Certificates
Secure Socket Layers
PCI, SET, Firewalls and Kerberos
Advanced Data Encryption
Instant Suspicious Activity Notifications
Payment Processing Technology
Conclusion
At the present, the use of information technology has become for all the businesses and industries. Despite a number of advantages of information technology there are certain issues also involved with the implementation of information technology. In this scenario, information security, privacy and ethics are some of the most important issues that need to be addressed in order to make best use information technology. In addition, there are many solutions and techniques which can be adopted to deal with these issues.
Works Cited
Danchev, Dancho. Building and Implementing a Successful Information Security Policy. 2003. 03 December 2012 .
Farshchi, Seyyed Mohammad Reza, Fariba Gharib and Reza Ziyaee. “Study of Security Issues on Traditional and New Generation of E-commerce Model.” 2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011). Singapore: IACSIT Press, 2011. 113-117.
Magalhaes, Ricky M. Hardening Windows NT/2000/XP Information Systems. 23 July 2004. 19 November 2012 .
Mookhey, K. K. Common Security Vulnerabilities in e-commerce Systems. 02 November 2010. 27 November 2012 .
Shelly, Cashman and Vermaat. Discovering Computers 2005. Boston: Thomson Course Technology, 2005.
Turban, Efraim, et al. Information Technology for Management: Transforming Organizations in the Digital Economy. New York: Wiley, 2005.
UN. Youth and Information and Communication Technologies (ICT). 2003. 25 November 2012 .
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Need An Research Paper On Segmentation Of The Market And The Ipad Needs To Be 1
/in Uncategorized /by developerNeed an research paper on segmentation of the market and the ipad. Needs to be 1 page. Please no plagiarism. In targeting the parents of small children, Apple has found probably some of the most willing buyers of their product. This segment has more money, more interest in the utility of the product, and may even buy more than one. Demonstrating the applications on the iPad and their positive influence on children as a learning tool is an excellent strategy that targets that market—these parents want a toy that also provides educational value.
Finally, the product positioning of the iPad, for this segment, stresses how it is revolutionary among modern computer technology as well as a learning software. Alone, the use of computers and software is not a new idea—but Apple shows that the iPad as a whole is entirely new. Overall, we see that this is a case of differentiated marketing, and this specific article talks about Apple’s appeal to a certain segment by making their product appear youthful, educational, revolutionary, and completely beneficial.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Need An Research Paper On Should The Uk Join The Euro Needs To Be 4 Pages Please
/in Uncategorized /by developerNeed an research paper on should the uk join the euro. Needs to be 4 pages. Please no plagiarism. Thus it means giving up the traditional pound for a new European wide single medium of exchange that is already in circulation. Moreover, this would also facilitate the adoption of a common EU monetary policy. That is why the British government too is unhappy with the idea because it entails transferring power and economic decision making to the EU bureaucracy. However, the government is not fundamentally opposed as long as there are demonstrated economic benefits of doing so. Also, if it does decide to join, it is a tough decision to make as to precisely when to join the bandwagon because this could have economic consequences too. Then there is the period of turbulence to endure before things settle.
The main benefits of joining are due to the removal of economic barriers that hinder trading. A common currency does away with exchange rate fluctuations and transaction costs. This for example, makes investment more attractive in the UK. So we have the potential to gain in the areas of trade and investment but these benefits must be weighed against the effects of the loss of autonomy over macroeconomic policies and other complications. By not joining though, the UK risks being marginalised within the EU. And, the euro currency is a growing in strength. It is now “the world’s largest by cash value” (Stevenson, 2009).
A successful European wide monetary policy requires that there is economic parity or at least a convergence in the economic circumstances between the euro-adopting states. For instance, if the rest of the EU fares better than the UK during the looming recession, interest rates are likely to be high and this would exasperate the financial difficulties of UK businesses and cause even lower output. On the other hand, low interest rates can cause higher inflation.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Need An Research Paper On Sixth Sense Technology Needs To Be 1 Page Please No Pl
/in Uncategorized /by developerNeed an research paper on sixth sense technology. Needs to be 1 page. Please no plagiarism. All this makes up the technological device that has the ability to implement several applications thus showing its flexibility and usefulness.
With technology, an individual can zoom, pan, stream, draw and use freehand gestures. With the sixth sense technology, objects that would have otherwise remained in the real world have been integrated into the technological interface to be used. From the technological advancements that have been made, the technology is formed from other technologies (Gray, 12). Its technological capability is like no other since it is the fine and final product from a mixer of technologies. The sixth sense technology is efficient, economical, and very much portable.
With the technology, there is the ability for hand recognition, capturing and recapturing of images, it has a processing speed of very impressive speeds and is very much easy to handle and use (Gray, 12). To summarize the uniqueness of this technology, it is user-friendly. The technology also supports multi-user interaction and also has the ability to support multi-touch. This technology is one of the most advanced forms of computer-based interfaces that are bound to take technology to another level (Gray, 12).
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Need An Research Paper On Social Care Reactions In Accordance To The Government
/in Uncategorized /by developerNeed an research paper on social care reactions in accordance to the government policy proposals. Needs to be 10 pages. Please no plagiarism. Some individuals are affected by different forms of impairments from birth while some developmental health condition or impairments during the course of their working life. As a result, they end up using care and support in order to try and maintain their activities as well as independent lives. Majority of these people as they grow older become frail and hence they rely more on the care and the support from others.
The UK government has shown that they are well committed to ensuring that the lives of the people that require care needs are improved. .
With regards to the White paper, the new vision that has been set up by the organization is that of well-improved care as well as a support system that will aim at empowering families, individuals, and communities on how to plan for their future. As a result, this will aim at increasing the standards of care which are focused on the need of each individual together with their careers. The Coalition Government realized the importance of having a reform on policy with regards to care and support.
In May 2010, the government that was in power realized the importance of having reforming care as well as support in England. The coalition Government through their programs focused on providing a strong commitment towards the people that use both care and support by ensuring that they are treated with respect and dignity and that they received adequate care and support to cater for their daily lives. The government, later on, published a report on November 2010 which was aimed at creating a perception of what the reform system should look like.
The Law Commission in May 2011 recommended bringing up various elements of the social health care law to be a modern, single, adult social health care statute. Later on, in 2011, the funding report on care and support by the Dilnot Commission gave out its findings which made recommendations on how to fund both care and support with regards to the future. .  .
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Need An Research Paper On Standards Based Decision Making Needs To Be 4 Pages Pl
/in Uncategorized /by developerNeed an research paper on standards-based decision making. Needs to be 4 pages. Please no plagiarism. ditors are required to state whether an audit client has complied with the Generally Accepted Accounting Principles (G.A.A.P) when preparing financial statements (Williams, 2006).
Green and Associates is an external audit firm to ABC Corporation. The audit firm may provide any of the four types of the audit opinions after completing a corporate financial audit on ABC Corporation’s financial statements. Green and Associates may provide an unqualified or ‘clean’ opinion of the company’s financial statements. An unqualified opinion is only provided when an audit firm ascertains that a company’s financial statements reflect a truthful opinion of its financial operations. The opinion also indicates that the company’s financial statements are in compliance with the G.A.A.P. An unqualified opinion is the best audit report that a company can receive from its auditors.
In our opinion, ABC Corporation’s financial records provide an honest and fair view of its financial operations during the fiscal year ended 31th August and are in compliance with the Generally Accepted Accounting Principles.
An unqualified opinion may warrant an explanatory paragraph if the auditors feel that certain disclosures in the financial statements require a detailed explanation or when there is a change of auditors. It arises when the financial records indicate some minor deviations from G.A.A.P. The explanatory paragraph includes a detailed explanation of the auditor’s opinion.
In our opinion, ABC Corporation’s financial statements require modification to expel the minor inconsistencies with the G.A.A.P, despite reflecting a true and fair view of the company’s financial operations.
An audit report may provide a qualified or an ‘except for’ opinion after completing a corporate financial audit. Green and Associates may provide a qualified opinion if it believes that ABC corporation’s financial records are not in compliance with the G.A.A.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Need An Research Paper On Start Up Shoe Business Needs To Be 8 Pages Please No P
/in Uncategorized /by developerNeed an research paper on start up shoe business. Needs to be 8 pages. Please no plagiarism. high heel, medium heel and low heel. All these three heights can be adjusted in a single product. The heel of this innovative product will be of hard plastic. It can be rotated to adjust the desired heights from three default sizes. This feature is the key attractive feature of the product. Manufacturing cost of this product would be $25. The company will manufacture this product through their own production unit. It will source leather and other required raw materials from the local suppliers. The quality of this multi-featured shoe will be of premium standard so that it can be positioned in the market among the premium brands. Quality will be checked by the expertise of the company’s manufacturing department. Quality control activity involves checking of quality of lather and pasting. These two components of a shoe determine the overall quality of the product. Customers’ feedbacks about the product at initial stage need to be evaluated to find out necessary revisions in production process or product raw materials. Quality control is one of the most important parts of production process. The quality control department always needs to focus on the industry quality standard and position the brand by comparing general feedback of the customers about quality of this product with respect to other brands. This product will be offered in the market with high standard of customer service like 6 months after sales warranty for any kind of damages of the shoe. New shoe will be provided in case of major damages within 6 months. Production flow of this product will be controlled on the basis of the demand of the product in the market. This strategy will be adapted to faster liquidation of the inventory and lower inventory cycle. Customers’ feedback will be given higher priority for further product development in terms of quality and design of this innovative product. Location HIGHLOWS shoe will be manufactured in Springfield, MA. Springfield is one of the most popular cities in England. The manufacturing unit of this product will be established in this location. Therefore, availability of resources needs to be analyzed in this location. For developing manufacturing and warehousing unit, a large hall will be leased for the next 5 years, and the interior of the hall will be designed. This includes separating the total space into two different divisions like manufacturing unit and warehouse. In the manufacturing unit, required machineries will be installed. Electric wearing will be fixed before the installation of the machineries. The generator facility will be necessary to ensure 24 hour electric supply. Renting the required building will be cost effective for this new business as the initial investment needs to be allocated in various activities like marketing, transportation, working capital management etc. Therefore, the cost of developing a building will be allocated in other operating activities. It is the most effective business strategy for a new business to use rented fixed assets at initial stages, which also helps the company to easily withdraw the business in case of the worst case scenario in terms of market demand of the product. 2 to 3 vehicles are necessary for carrying raw material and also for supplying the products to the wholesalers as well as retailers. Again, to reduce initial capital requirements, this service will be outsourced from local transport service providers. To avoid delayed supply of raw materials, local suppliers will be involved in the production of this product.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Need An Research Paper On Steriodogenesis Has A Common Pathway But Hormonal Ster
/in Uncategorized /by developerNeed an research paper on steriodogenesis has a common pathway but hormonal steriods are secreted in a strongly cell specific manner. discuss. Needs to be 3 pages. Please no plagiarism. Steroidogenesis takes place in endocrine glands like the adrenal and gonads.P450side chain linked cleaving enzyme get involved in the interconversion of cholesterol to Carbon18, Carbon19, and Carbon21 and this is the committed step of Steroidogenesis (John 1994, p.33). HMG-CoA or the mevalonate pathway generates isopenteyl pyrophosphate and dimethylallyl pyrophosphate which serve as precursors for steroidal hormones biosynthesis. Isopenteyl pyrophosphate and dimethylallyl pyrophosphate become joined forming geranyl pyrophosphate that becomes lanosterol (Mary 2011, p.55). Lanosterol undergoes Steriodogenesis transformation to form other steroids. All steroid hormones in humans follow this pathway, but not all steroids are hormones (John 1994, p.77). Steroid hormones are crucial for proper functioning of the body. They get synthesized from cholesterol which is also a component of the cell membrane thus the hormone is able to enter the cell and bind to its receptor. Steroid hormones get classified as androgens, estrogens, progestins, mineral corticoids and glucocorticoids. Both estrogens and androgens get generated by the gonads and affect sexual development. Progestrins mediate the menstrual cycle and pregnancy. Excretion of water and salts by the kidney get regulated by mineral corticoids while lipid carbohydrate and protein metabolism become affected by glucocorticoids. Steroid hormones become synthesized when they are need. The brain releases a signal when the body wants a certain protein synthesized or needs a certain process done (John 1994, p.78). These signals get transmitted via the intermediary hormones in other words through trophic hormones. Once released, they act on the central nervous system and the peripheral target tissues (Richardb2010, p.67). One can regulate the amount of steroid hormone secretion by regulating the amount of cholesterol produced because cholesterol is the precursor for these hormones. The adrenal cortex has three main tissue regions: the zona glomerulosa, zona fasciculate, and zona reticular is. These zones are histological and enzymatically distinct and the exact steroid hormone secreted depends on the enzymes present (Reginald 2010, p.34). Adenocorticotropin (ACTH) hormone regulates hormones produced at the zona reticularis and zona fasciculata (Donald 2010, p.56). The hypothalamus releases ACTH in to the blood stream then it become carried to the adrenal glands where it binds to ACTH receptors on the cell membrane activating adenylate cyclase with production of cAMP (second messenger).This leads to ultimate secretion of cortisol. When the body needs to accumulate more sodium, angiotensinogen get released from the liver and it become to angiotensin( i) and later angiotensin (ii) that bind to the cell membrane receptors which get coupled to the phospholipase c of the zona glomerulosa (John 1994, p.32).This leads to secretion of aldosterone. a mineral corticoid. Aldosterone leads to sodium retention by facilitating gene expression of messenger RNA for sodium-potassium ATPase which is responsible for reaccumulation of sodium and potassium. Gonadol steroid hormones become secreted by the testis and ovaries. The important hormones in this category are the estradiol and testosterone. Luteinizing hormone stimulates testosterone production in men by binding to Leydig cells.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
Need An Research Paper On Strategic Initiative Plan Needs To Be 2 Pages Please N
/in Uncategorized /by developerNeed an research paper on strategic initiative plan. Needs to be 2 pages. Please no plagiarism. Strategic planning is a necessary managerial function that must be used to create a long term plan for a company. Most strategic plans foresee three to ten years into the future, but managers can also use strategic management tools to make decisions associated with the day to day operations of the company. “Strategic management consists of the analysis, decisions, and actions an organization undertakes in order to create and sustain competitive advantages” (Eca). There are different ways that managers can implement strategic decisions. For instance a manager can approve a capital project that increases the production capacity of the company. The launch of a new advertising campaign can be used as a strategic move to spur a sales jump in the short term.
Financial planning is another important function that is correlated to strategic planning. A financial plan must be prepared to determine how much investment is needed for any initiatives or strategic projects the company desires to implement. Financial planning involves determining how to obtain the resources needed to finance a project. Some of the sources that can be used to finance a strategic plan include selling common or preferred stocks, bonds, sale of assets, and loans from financial institutions. Strategic planning and financial planning are correlated because the implementation of a strategic plan is dependent of the budget available. A financial planning technique that can be used to predict the future financial outcome of a company is pro-forma financial statements. The master budget is also used to keep track of inflows and outflows of a project. “The master budget is a summary of companys plans that sets specific targets for sales, production, distribution and financing activities” (Accountingformanagement, 2012).
Multinational corporations often utilize strategic and financial planning to achieve the goals of the company. The company I work for has utilized strategic planning effectively in the past. Last year the company entered into a strategic marketing alliance with a competitor in order to increase the overall demand for the product. The firm also utilized strategic planning in its human resource function. Due to the increase production demand the firm had to hire an additional 25 employees. A financial planning initiative that the company performed last year was obtaining a $4 million business loan that was used for leasehold improvements, research and development, and to finance an expansion project.
Large companies such as Starbucks Café also utilize financial and strategic planning on a recurrent basis. The company a few years had to make the strategic change in their expansion strategy because the firm was adversely affected by the global recession. Instead of expanding the number of stores the firm contracted for the first time in decades. During its most recent financial reports the company demonstrated very strong numbers. The company reached global revenues of $11.7 billion which represents an improvement of 11% in comparison with the previous year (Annual Report: Starbucks, 2011). Another strategic move the firm made last year was improving its customer service function. Starbucks is a very socially responsible company.
References
Accountingformanagement.com (2012). Master Budget. Retrieved June 17, 2012 from http://www.accounting4management.com/the_master_budget.htm
Annual Report: Starbucks (2011). Retrieved June 17, 2012 from http://investor.starbucks.com/phoenix.zhtml?c=99518&p=irol-reportsAnnual
Uca.edu. Defining Strategic Management. Retrieved June 17, 2012 from http://www.sbaer.uca.edu/publications/strategic_management/pdf/01.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"