Tuesday, December 31, 2019

Joint Supply Planning For Supply Chain Management Essay

Table of Contents Page No Executive Summary 2 1.0 Introduction 4 2.0 Discussion and Analysis 6 2.1 Collaboration 6 2.1.1 Joint Supply Planning 6 2.1.2 Initiation of Win-Win Relationship with Joint Objectives 6 2.1.3 Magnify OEM- Supplier Partnership 7 2.2 Cost Management 7 2.2.1 Cost Drivers 9 2.3 Proactively Handle Convolution 9 2.3.1 Tracking and Monitoring 10 2.3.2 Transaction Processing 11 2.3.3 Handling and Operations 11 2.3.4 Planning and Decision Support 11 2.4 Develop Tailored Supply Chain to Drive Exports 11 2.5 Development of Key Staff for Supply Chain Management 12 2.6 Enhance Capabilities to Exploit Replacement Parts Segment 12 2.7 Aftermarket Opportunities 13 2.7.1 Parts Consumption Data 2.7.2 Supplier Relationships 2.8 Balancing the Supply Chain 2.9 Facility Selection 2.10 Transportation Route Optimization 3.0 References 1.0 Introduction In the year 2000, automotive industry was going through a major transition globally. This transition in terms of consolidation of networks forced automotive part suppliers to change their working styles and adopt new changes made by automotive industry worldwide. In the long run, these changes can be handled but short-term volatility was creating an environment of uncertainty. Due to this transition, Indian automotive industry was experiencing an interesting evolutionary phase. India being seen as a crucial market of the future by global OEMs. The automotive supply chain needs to play a bigShow MoreRelatedHostel Information System1665 Words   |  7 PagesCASE STUDY ANALYSIS OF EXEL PLC Supply chain management at Haus Mart INDEX TABLE OF CONTENTS Page No. 1. Executive summary 3 2. Problem (Issue) statement 4 3. Data analysis 4 4. Key Decision Criteria 5 5. Alternatives analysis 6 6. Recommendations 8 7. Exhibits 9 EXECUTIVE SUMMARY Exel Plc is the world’s largest third party logistics service provider. The company offers variety of services which can be broadlyRead MoreFactors That Affect India Automotive Supply Chain Essay1339 Words   |  6 Pagesbeing seen as crucial market of the future by global OEMs. The automotive supply chain needs to play a big role in this transition. Supply chain can help companies to get competitive advantage, which means going beyond meeting basic standards of performance such as connecting supply to demand at optimal costs. Following are the issues that can affect India automotive supply chain: †¢ The main concern will be to build a supply chain that can handle long term growth but it is strong, flexible and reactiveRead MoreMaterial Flows And Inventory Policy During Military Scm1484 Words   |  6 PagesMaterial Flows and Inventory Policy in Military SCM According to Major Joshua M. Lenzini in his article Anticipatory Logistics: The Army’s Answer to Supply Chain Management, â€Å"Supply chain management is similar for both corporate and military organizations. However, some significant differences are evident in these models. The first is the absence of maintenance on the corporate model. Another is that transportation, distribution, and warehousing are unidirectional in the corporate model but dualRead MoreCoca Cola And Inventory Forecasting1112 Words   |  5 Pageshas many branches and deals with a whole lot of inventory, there is a need to act proactively and timely so that there are no delays in logistics. Projections of inventory, i.e. inventory forecasting, are often done in the operations and supply chain management so that overproduction and inefficiencies are avoided. Coca-Cola also uses historic data to find out the direction of future trends (Butler, 2015). The process is used by the company to determine near acc urate allocation of budgets for futureRead MorePer Satterlee, Chapter Eight Of Organization Management1338 Words   |  6 Pageschapter eight of Organization Management and Leadership, is about operations management, which is how products or services are provided in the most efficient and effective way. â€Å"Operations management is the implementation of all the functions of management,† (Satterlee, p. 224). This includes where infrastructure may be built, where supplies and materials are obtained, production is scheduled, inventory is managed, and equipment is maintained. Project management takes a leading role within operationsRead MoreThe Supply Chain Of Honda Essay1334 Words   |  6 PagesFrom above, the process of Honda’s supply chain in purchasing is very clear. Firstly, the purchasing division of Honda signs a purchase order with the component suppliers and then these suppliers determines the needed raw materials and sends a demand to Honda after receiving the order. The next is that Honda trading classifies these orders into different materials and signs a purchasing order with these raw materials factories. After then these factories send these raw materials to suppliers. FinallyRead MoreCroc Analysis839 Words   |  4 Pages1) What are Crocs’ core competencies? Crocs’ competencies are supply chain management and small-retailer level marketing, just in time distribution. Crocs has used its core competencies to build a brand familiarity and popularity and to distribute new models and accessories in mid-season. Their supply chain management has helped the company to create a stronger maturity map for their products, and to extend the maturity map through marketing. (Figrure 1. [write a brief description first].Read MoreGeneral Motors E Procurement906 Words   |  4 Pageslarge supply chain. The scope of this supply chain and the role of GM in it is reflected in its annual $63 billion procurement expense. The cost savings associated with e-procurement will be immense. Second, GM’s ability to push adoption of e-procurement by every link of its supply chain raises the volume of sales through its e-procurement system up to $300 billion–$500 billion per year. This will undoubtedly generate further cost savings associated with purchasing across the whole supply chainRead MorePrinciples And Strategic Elements Of Supply Chain Management1323 Words   |  6 Pagesprinciples and strategic elements of Supply Chain Management Supply Chain Management already exists for more than hundred years. It wasn’t defined as terminology for some period of time and it took years to develop it. It began with Fredrick Taylor’s â€Å"The Principles of Scientific Management† that was concentrated on improvement of manual loading processes all the way to Supply Chain Management we have now (Lamprecht, James; Page 180). Because Supply Chain Management spreading beyond location of productionRead MoreAnalyzing Ikea s Growth Of The Firm, Dunning Oli Framework Approach Of Foreign Direct Investment ( Fdi )1325 Words   |  6 Pages(FDI), this essay will also declare several issues may exist in an international business as well as factors should be considered in global supply chain control. Moving on to analyse IKEA s implementation of global supply chain control and emphasize its outsourcing plan, comparing to other corporations what competitive advantage IKEA gain in managing supply chain and outsourcing. Main body: Referring to the leading theories of the firm approach conducted by Edith Penrose (2003) on the endogenous

Sunday, December 22, 2019

Informative Speech Outline Essay - 812 Words

Alissa Jarrar Informative Speech Prof. Dorsey 3/15 Topic: Dubai General Purpose: Tourism Specific Purpose: Attractions, Malls and Hotels I. Introduction A. Attention Getter- Who has ever been to New York City? Who has ever been to Las Vegas? Who has ever been to Miami? Who has ever seen pictures of these places? What if I told you there was another place just like all these places on the other side of the world. Does anyone know of the city of Dubai? It is exactly like New York City, Las Vegas and Miami in one. Dubai’s city is amazing. B. Thesis- Today I would like to inform you about some of the amazing places and things Dubai’s city has, such as their main attractions, malls and astonishing hotels. In a 2006 times†¦show more content†¦III. Malls A. Diera City Centre 1. One of oldest malls 2. Over 300 shops B. Mall of Emirates 1.Ski Dubai 2. Aquarium C. Dubai Mall 1. Biggest mall in the world 2. Over 1200 shops D. Dragon Mart 1. Shaped as a dragon 2. Major flea market Transition: I’ve told you about some attractions and the malls, Finally, I’m going to tell you about the hotels in Dubai and also some major possible future hotel projects. IV. Hotels In the article â€Å"Dubai continues growth as a tourism hotspot† out of the Travel and Tourism News, October 2010 addition states Dubai â€Å"has achieved significant growth in terms of hotel occupancy and tourism arrivals in the first half of 2010, with the number of hotel guests reaching 4,181,326 a nine per cent increase from 3,852,742 guests in the first half of 2009.† A. Burj Al Arab 1. Luxury hotel was opened in 1999. 2. The 4th tallest hotel in the world, it stands 321 meters high and is located on a separate artificial island. Built like a sail 3. At night, the hotel’s exterior is lit by a choreographed show of colors that change every half hour. 4. Huge aquariums, dancing fountains 5. Tiger woods hit golf ball off helicopter pad B. Atlantis 1. This luxury resort is situated on 113 acres, and is considered an architectural wonder 2. Prime location, on the crescent of The Palm Jumeirah, known as the 8th Wonder of the World. 3. This resort features â€Å"Aquaventure† – aShow MoreRelatedInformative Speech Outline802 Words   |  4 PagesInformative Speech Outline I. Introduction A. Thanks 1. Thanks professor Tuckerman for the introduction. B. Salutation 1. Good afternoon ladies and gentlemen. C. Ethos 1. What increases heart rate, causes sleep disturbance, makes people cry, act violent, makes some people sleep more and causes untold aches and pains? It s Wednesday! Six hours of homework to do, babysit the little sister, feed the dog, cut the grass, oh and lets not forget your boyfriend is being a jerkRead MoreInformative Speech Outline1598 Words   |  7 PagesSamantha Audiffred Honors Comm 110 Marieke Spiegelhoff Informative Speech Outline 25 February 2015 Audience Analysis ( ½ page)   Ã‚  Ã‚   The target audience for the informative speech is the honors communication 110 class and the professor. The class makeup is eight males and twelve females for the 20 students. This is a required course for all students attending UW-Whitewater; therefore, the majors and interests of the students will vary greatly. After an activity polling the class, the most popular ofRead MoreInformative Speech Outline2182 Words   |  9 Pageswithout stating to whom these ideas or statements belong to. A student suspected of plagiarism can be given a zero mark, and possibly fail the entire course. Assessment: Impromptu speech 10% Informative speech (15% speech, 5% outline) 20% Show and Tell Poster Session (10% speech, 10% poster) 20% Assignment : Group Interaction 10% Final Examination 40% __________________________________________________________________ Total 100% Read MoreInformative Speech : Speech Outline937 Words   |  4 PagesEmily Murray Informative Speech Outline General Purpose: To Inform Specific Purpose: To inform my audience how Communication Technology is now the face to face human communication; instant, easily accessible and more convenient but you lose a sense of warmth and meaning when all your communication is conducted electronically. Central idea: Humans have always communicated face-to-face and the use of technology poses cognitive obstacles to communication. The lack of human presence during technology-mediatedRead MoreOutline Informative Speech1491 Words   |  6 PagesNAME : Syifa Fadhilah Hamid CLASS : 12 DBM SUBJECT : Outline Informative Speech SPECIFIC PURPOSE : to inform my audience about Deja Vu CENTRAL IDEA : to inform my audience about the theory of Deja Vu. Including what, how and the effect about Deja Vu . INTODUCTION: Attention Getter : I can’t remember any things well while I thought something happened to me, I feel like I ever seen something but I don’t know when it was or where it was. And I also feel like I’ve been somewhere but I don’tRead MoreInformative Speech : Speech Outline1006 Words   |  5 PagesInformative Speech Final Draft Outline I. Introduction A. Attention getter: How many you have ever had a car accident or someone you care about had a car accident? B. Background and Audience Relevance: According to National Highway Traffic Safety Administration, in 2015, about thirty-five hundred people were killed, and four hundred thousand were injured in car crashes. Oral Citation 1: NHTSA, govt website, 2015. C. Speaker credibility: Many of my close family members have been in car accidentsRead MoreOutline Informative Speech1502 Words   |  7 PagesNAME : Syifa Fadhilah Hamid CLASS : 12 DBM SUBJECT : Outline Informative Speech SPECIFIC PURPOSE : to inform my audience about Deja Vu CENTRAL IDEA : to inform my audience about the theory of Deja Vu. Including what, how and the effect about Deja Vu . INTODUCTION: Attention Getter : I can’t remember any things well while I thought something happened to me, I feel like I ever seen something but I don’t know when it was or where it was. And I also feel like I’ve been somewhere but I don’t know whenRead MoreInformative Speech : Speech Outline1066 Words   |  5 PagesInformative Speech Outline I. Introduction a. Attention Material a. Raise your hand if you have or are currently working retail. b. According to Quentin Fottrell, from Market Watch, â€Å"Nearly 4 out of 5 U.S. students†¦ work while in school.† b. Tie to Audience a. Many of you have most likely experienced working retail or know someone who has. c. Credibility a. I recently worked 9 months in Bath and Body Works, so I am well aware of all of the horrors of working in retail. d. Thesis a. Working inRead MoreInformative Speech Outline1175 Words   |  5 PagesInformative Speech Outline Speech 131 Author’s Note: This research is being submitted for Title: Taxes Made Easy! Specific Purpose: To inform my audience about how to use the 1040EZ tax form. Central Idea: Today, I hope to make tax season easier for you by demonstrating to you how easy it is to fill out and file the 1040EZ income tax form, if you qualify. Introduction Stanton Delaplane once joked about the IRS, saying he heard it had suggested a simplified tax form with onlyRead MoreInformative Speech Outline1104 Words   |  5 PagesBCOM-3950 October 21, 2015 Informative speech outline Specific Purpose: To inform the audience how to enhance credibility when making conversation at work-related social events. Central Idea: To inform my classmates how to enhance credibility when making conversation at work-related social event by engaging in a conversation, being honesty, and keep confidences. Introduction: I. Today I would like to inform you on how to enhance your credibility when making conversation at work-related

Saturday, December 14, 2019

Does Television Advertisement Have Positive Impact on Consumer Free Essays

You must have at least once in your life seen television advertisements which made you feel bored and decide that you would never buy these products. In fact, television advertising becomes an indispensable part in marketing strategies. No doubt, there are many commercial advertisements that produce good responses right after its first broad cast. We will write a custom essay sample on Does Television Advertisement Have Positive Impact on Consumer or any similar topic only for you Order Now However, nowadays, consumers are very easy to â€Å"allergic† to the advertisements that they do not have feelings. Television advertisements cause negative effects to consumers because they not fit consumers’ spending habit and thinking, use images that are annoying, and never tell all the truth about products. BODY: Many companies use television advertisements to penetrate the market but they did not succeed. The reason was that they forgot the key principle in marketing which is to put yourself in the consumer’s situation. According to Issabelle Szmigin, The act of consumption by people is very different to the picture sometimes produced from studies of consumption. It is one of the reasons why some brands continue to live a charmed life and others cannot. Children, for example, can respond positively from this generation to the next generation with the same toy and refuse others after a few months of interest. On the other hand, as is the case of Novo, the company very clearly get wrong strategies and retrenches but still become successful in the domain of health care, while some other brands are removed for more complex tactical and strategic reason which the consumer will never know about. In fact, you can see many television advertisements, that aired in the time period are very annoying, especially is midnight. Try asking, at this time, how many people will have to sit before the television waiting to see them. Besides that, many advertisements are very complex and have many details that made the audiences have to think. This causes customers to feel uncomfortable with the product. The important thing here is the television advertising does not suit the consumers’ spending habits, thoughts, so their failure in the market access is inevitable. For years, massive advertising appears on television. Besides the good advertisements, there are many advertisements that using crude images, loss of culture. We still know that the advertising are necessary, but the culture in advertising even more important. Especially, with mothers who are raising young children, advertising is an effective solution in helping children eat and learn, so they require a lot from advertisements. According Scott Ward, the extent to which children attempt to influence parental purchasing is very big. His research also reports data from mothers of young children, concerning their perceptions of the frequency with which television commercials influence their children to want advertised products, and the extent to which parents yield to children’ s purchase influence attempts. (Report Number 1, Effects of Television advertising on children and adolescents, 1971, p. 5). Mother’s decision to purchase much influenced from their children. The choice of image ads is extremely important but in fact, many marketers forgot this issue. There are many ads that use bad images that are not effective to influence the thinking of the children or attractive to them. And of course, the mother would never buy that product. Culture advertising is not only promote the manufacturer’s brand, distribution in the masses in order to sell more goods, but also help consumers select product that suit with their needs. Besides that, culture advertising is the respect of consumers. Thus, television advertising has caused negative impacts on consumer if bad images are used, making viewers allergic to those products. How to cite Does Television Advertisement Have Positive Impact on Consumer, Essay examples

Friday, December 6, 2019

Sociological Versus Metascientific Risk Assessment †Free Samples

Question: Discuss about the Sociological Versus Metascientific Risk Assessment. Answer: Introduction IT risk management is a risk management method in which information technology is assessed to identify the risks it poses or exposes a company to while being utilized. In a business or firm IT risk can be considered as part of a full scale enterprise risk management system (Crockford, 1986). An information security management system which is present in a company which is continually updated and maintained is a sign that the company has setup the necessary resources in helping to identify, manage and assess information security risks. IT risk management involves the assessment of not only the negative effects of using technology in a company but also the benefits that may be accompanied with it (Verin Trumper, 2007). Decision theory should be utilized when assessing risk because it is something that is comprised of a lot of uncertainty. IT risk management as with all forms of risk management should be done continuously to ensure that the information obtained is updated. This is becau se there are changes which are ongoing all the time that can affect a company and therefore for IT risk management to be effective the process of analysis of risk should be continuous to ensure the company can be able to avert a lot of risk when it faces a problem (Katsicas, 2009). Organizations should have in place an enterprise risk management system (ERM) which is very comprehensive. There are four main categories which should be addressed when implementing an enterprise risk management system. They are operations which focuses on the effective use of resources in an organization, compliance which ensures the company is compliant with the legal regulations and laws that are applicable to it, strategy which ensures the systems support are in line with the mission of the organization and financial reporting which ensures financial records are reliable (Flyvbjerg Budzier, 2011). IT risk management encompasses all these categories and therefore plays a critical role within an organization to ensure risk is kept at manageable level in a company. Risk sensitivity and risk appetite should be a guiding in factor within the IT risk management process (Taylor VanMarcke, 2002). Companies are now not being faced with lawsuits due to such cases because it has been stated in the law that all individuals including their employees are not to handle any handheld device while driving. If a company has blocked social media sites their employees can be able to access these sites using their personal devices. They can engage on social media as usual but if there is a case such as racial discrimination on social media which was instigated by an employee while at the work place the company is liable to any damages that may have been caused by the employee (Roehrig, 2006). An unknown device which is lost and found and used within a company can be a major risk factor. The device might contain unwanted information which might put the company at risk of having legal problems. These devices are also used by individuals who have malicious intent against the company or have purposed to carry out corporate espionage. It is therefore very important for the company to ensure tha t it has a strict policy which restricts employees from using their personal devices as they work (Antunes Vincente, 2015). The personal devices pose a major risk factor and are best avoided when at the workplace to ensure the level of risk that may come from them is minimal or none at all. Financial institutions such as Aztec usually have to adhere to the set industry or government compliance or regulation. This is mainly to ensure that such institutions operate within the law by acts such as ensuring they safeguard the data and finances of their clients Kasperson, Renn, Slovic, Brown, Emel et al., 1988). The presence of government or industry regulations ensure that any financial institution such as Aztec which may be in operation follows the set standards as it carries out its mandate. The regulations are created in a way that will reduce risks in which clients may have to face by setting up key standards in which the institution should adhere to while in operation. The regulations also ensure outsourced operations are evaluated before being given out to find out how much risk a financial institution can have when it gives out it work to a third party. Financial institutions such as Aztec handle a lot of sensitive information which belongs to its clients and sharehol ders. In the advent of various digital breaches and ransomware attacks governments and other regulatory bodies have had to enact stringent policies that ensure these financial institution invest heavily in keeping their data secure (British Standard Institute, 2006). It is a good approach both for the financial institutions and their clients. Reviewing of the risks which are posed when individuals are allowed to bring and use their personal devices at Aztec will demonstrate the importance of the IT risk management process and the benefits it has to a company. It will also shed light on the security posture of Aztec. IT risk management includes a number of processes which are undertaken by a company to establish the potential risks they face and how they can be able to mitigate them (ISACA, 2006). The first step involves establishing some context that can be used for the risk assessment. In this stage or process all the relevant information that pertains a company in our case Aztec is acquired followed by the scope, purpose, boundaries and basic criteria of the risk assessment being established (Technical Standard Risk Taxonomy, 2009). In this stage also the organization which will carry out the risk assessment is determined. The gathering of required information based on the scope and purpose of the risk assessment will h elp the individual performing the task to determine in which areas they are going to assess risk so that they may deliver on their mandate. Aztec has commissioned an IT risk analysis expert to assess the risk and impact which faces the company when employees are allowed to user their personal devices such as tablets, mobile phones and laptops as they work and carry out their mandate in the organization. Purpose of Risk Assessment The purpose of establishing context is to ensure that all the legal procedures and requirements are followed and evidence of this should be provided so that the whole IT risk assessment can be certified as a legitimate and trustworthy process (IEEE, 2006). Context establishment is also done to bring strategic value to the business from the information which will be acquired. This means that the risk assessment should be of benefit to the strategic plan of the business by indicating what kind of risks they can take and those that they cannot afford to take. Stakeholders and shareholders in an organization are the people who own the company. The company may have employees and a chief executive officer but these employees all work for the shareholders. The shareholders have invested their money in the organization because they believe in their mission and vision (Lacey, 2011). They also want to turn a profit from their investment. The shareholders invest in the company with the expectat ion of making a profit but with investments come risks. The risk assessment will give the shareholders more insight on the risks the company might face. It will also give the shareholders confidence in the company being able to bring them a profit or dividends while growing their share value (Korstanje, 2014). A risk assessment also enables an organization to establish a baseline which can help them determine the negative consequences which can befall them and to what extent their reputation can be damaged (Verin Trumper, 2007). Information technology being known as a critical resource within any organization helps in running most of the systems in a company. IT risk assessment is therefore a key factor while doing a risk assessment because it is an underlying factor in most of the operations of an organization. The constraints in which an organization faces are also documented and collected for use in guiding the risk assessment process (Spring, Kern Summers, 2015). The constraints may include cultural, technical, political or budgetary constraints. Risk management deals with continuously analyzing, controlling, implementing, monitoring and planning of the measures that a company has implemented to ensure that the security policy is maintained and enforced within a company. Risk assessment is usually carried out on demand or once a year until a clear view of assessed risk can be established. The risk assessment as established was to determine the risk factors that come with employees bringing their persona l devices to the workplace and using them in work related tasks. After the risk to be assessed has been identified the next step is to perform a risk estimation. Risk assessment in relation to information security field can be done through two methods. These methods are the qualitative and quantitative method. Quantitative risk assessment is the act of performing mathematical calculations that are solely about the security metrics of an application or a system (Lieberman, 2009). In quantitative risk assessment each risk scenario that is being assessed is based on a collection of risk factors which lead to the establishment of a single loss expectancy (SLE). After the single loss expectancy is established the annual loss expectancy can be known by finding the product of the annual rate of occurrence and the single loss expectancy based on the probability of a certain event occurring in a set period such as in a year which is the annual rate or occurrence (ARO). When performing a quantitative risk assessment it is a key factor to note that the total value of all the assets of a company are considered rather than the specific resource which was affected by a problem. From the risk assessment being done at Aztec we can demonstrate quantitative risk assessment by understanding that when employe es bring their own devices to the work place they not only expose their devices to risk but they also expose any company or relating data that has passed through their device. The company can be legally liable for any damages such as loss of confidential data or any other issues that pertain to the use of the employees personal devices as they work (Hubbard, 2009). Qualitative Risk Assessment Qualitative risk assessment is a risk assessment process which is utilized when an organization needs a risk assessment to be performed based on some certain constraints in which they may have. These constraints may include the company having a small budget to perform the risk assessment, the company needing the risk assessment to be performed in a short period of time, when the individuals performing the risk assessment are not equipped with the necessary skills such as financial, mathematical or risk assessment experience to perform a conclusive risk assessment or there is an absence of a significant amount of data which may be crucial in performing a comprehensive risk assessment. The main difference between a qualitative and quantitative risk assessment is that a qualitative risk assessment can be accomplished with the use of less data and shorter time periods as compared to the amount of data and time needed to accomplish a quantitative risk assessment (Hallenbeck, 1986). Qualit ative risk assessment are implemented through holding interviews with the involved stakeholders. In our case interviews can be performed on individuals or employees who use their personal devices at the work place as they do their mandated tasks (OBrien, 2002). Qualitative risk assessments are usually compared based on the description versus its measurable extent. In a risk assessment process a qualitative classification is performed which is later followed by a quantitative evaluation between the costs incurred in implementing security measures compared to the highest risks present. Risk estimation comprises of assessing the consequences of how a risk or problem has impacted an organization. This can be done through valuing the assets in which the company holds. It is also done through assessing the chances in which a risk might occur through vulnerability and threat valuation (Flyvbjerg, 2003). Lastly the chances of a risk occurring are recorded in the measured estimates and the consequences which are accompanied with the risk occurring. A risk registry is a document which contains information on all the risks discovered and the value levels of these risks. Risk evaluation is the process of comparing the risk levels obtained from the risk assessment process against the risk acceptance criteria which the company has specified and prioritizing the risks identified with risk treatment indications (Mayo, 2011). Risk mitigation is the process of evaluating, implementing and prioritizing the necessary steps or actions which are recommended to reduce risks which have been identified in the risk assessment process (Lerche Glaesser, 2006). The removal or elimination of risk is a task which is not practical or is hard to achieve. Senior management and other top management within an organization should utilize the least cost approach to have in place the controls which will be appropriate in controlling or reducing the risks which have been identified to reach a level that is minimal or acceptable such that it does not have any adverse impact on the mission or resources of an organization. In an organization such as Aztec there are measures in place to control which employees have access to what kind of information. The problem is that for any employee to play their needed role in carrying out their mandate within the company they needed to be given access to the resources and assets of the compa ny. If an employee used their personal device to login to the company database or system they might put the company at risk. This is because their personal device has not undergone any form of screening or testing to establish whether it is safe for use within the company (Simon Hillson, 2012). Data security is a key aspect in any organization because their data is a valuable resource to them. Data in an organization which is a financial institution such as Aztec is very important and if this data it tampered with or accessed by unauthorized personnel it can become a great risk to the company because they might incur a lot of costs and legal problems (Rob, 2016).. The equipment used by an organization is usually prescreened and continually patched and updated to ensure that it does not pose a risk which can be capitalized upon by malicious individuals in order for them to gain access to the data in a company. Personal devices which are used by employees have not been prescreened to ensure that they are secure for use in an organization. An employee poses a data risk when they come with their personal devices to use in the company. As soon as they gain access to the company data malicious individuals can use this loophole to again access to company data and demand for a rans om for it or tamper with the data which will cost the company being attacked immensely. Devices in which employees do not know of their origin should also not be used in the company. A device such as a flash disk may contain a virus which affects the computer or system in which it is plugged into. The company can reduce risks concerning data security by having a backup of their data such that when their primary database is attacked they can utilize their backup and continue their operations. The company can also instill a policy which bans employees from using their devices while they do their work (Shrader Westra, 1997). This will go a long way to ensure that the level of risk which might be posed by these devices is reduced immensely. Intrusion Detection Systems The company should also have a firewall in place to ensure that even when employees use their personal devices as they work any malicious software can be blocked from accessing the company system and its resources. The firewall will keep the company system protected and will ensure that the data which is stored on the company database is valid and can be used by the employees effectively as they carry out their duties. The company should also implement vulnerability scanners within their system to ensure that they can detect any risks before they become too severe (Caballero, 2009). Vulnerability scanners are built to regularly check a system for any vulnerabilities present. Unlike a firewall the vulnerability scanner is purposes with checking the system periodically for any suspicious software or vulnerabilities. Vulnerability scanners are important because they enable a company to find any malicious software or system which might have embedded itself within the company system. When employees come with their own devices and use them as they work a vulnerability scanner comes in handy in reducing the risk of the company being affected by any vulnerability or malicious software. The vulnerability scanners can scan their devices and block them from accessing the system to ensure that the risk of affecting the company is reduced. Risk assumption is when a company accepts the potential risks it may face and continue with their business operations as they work on ways to lower their level of risk. Most companies when they encounter a risk usually follow this path because they can work on the problem at hand and still serve their clients (Commoner, 2010). It may however be a risky venture because if the risk gets out of hand they might get into more problems than if they had stopped their operations initially to focus all their resources on fixing the issue. Risk avoidance can be practiced by a company if they deal with the cause of the risk and eliminate it. Risk limitation is the reduction or limitation of risk by having in place controls which can reduce the impact a risk may have on a company. Risk planning is when a company manages risk by coming up with a plan to take care of the risk. Research and acknowledgement is when a company or organization accepts that they are being faced with a risk and they rese arch on methods which can help them correct or rectify the risk. Conclusion A company such as Aztec can transfer risks to its insurers. Transferring risk in such a case to an insurer will ensure that any risk the company is exposed to the insurer can cover them (Dorfman, 2007). This is however a costly venture because the insurer has to be paid hefty premiums depending on the kind of cover the company has taken. Although it may be expensive it can help the company to save its reputation if there is a problem. The insurer will simply step in on behalf of the company and cover any damages the company has been imposed on (Costas, Gritzalisa, Petros, Athsnasois Sokratis, 2005). For a company such as Aztec risk assessment and management should be an activity which is carried out regularly to ensure that the company is always alert of any potential risk that may affect their business. When such a company implements a policy which ensures their employees do not use their personal devices for work related activities or at the work place they can be able to mitigate a lot of risks and vulnerabilities before they become adverse and impact the company largely in a negative way. It is therefore very important for such a company to carry out risk assessment regularly so that they are confident in the integrity of their database. It will also give them confidence to operate in the financial industry since they adhere to the legal requirements concerning risk assessment and mitigation. References Anderson K. (2005). Intelligence Based Threat Assessments for Information Networks and Infrastructures: A White Paper. Antunes R. Vincente G. (2015). A Production Model for Construction. A Theoretical Framework. Buildings. 5(1): 209 228. British Standard Institute. (2006). ISMSs-Part 3: Guidelines for information security risk management. Caballero A. (2009). Computer and Information Security Handbook. Morgan Kaufmann Publications Elsevier Inc. p. 232. Commoner B. (2010). Comparing apples to oranges: Risk of cost/benefit analysis. From Contemporary moral controversies in technology. Pp 64 -65. Costas L., Gritzalisa S., Petros H., Athsnasois N. Y. Sokratis K. (2005). A formal model for pricing information systems insurance contracts. Computer Standards Interfaces. p. 531 -532. Crockford N. (1986). An Introduction to Risk Management. Woodhead-Faulkner. p.18. Dorfman M. S. (2007). Introduction to Risk Management and Insurance. Englewood Cliffs, N.J: Prentice Hall. Flyvbjerg B. Budzier A. (2011).Why Your IT Project May Be Riskier Than You Think. Harvard Business Review. 89(9): 601 603. Flyvbjerg B. (2003). Megaproject and Risk: An Anatomy of Ambition. Cambridge University Press. Hallenbeck W. H. (1986). Quantitative risk assessment for environmental and occupational health. Lewis Publishers Hubbard D. (2009).The Failure of Risk Management: Why Its Broken and How to Fix it. John Wiley Sons. p.46 IEEE (2006). Systems and software engineering Life cycle processes Risk management. ISACA (2006). CISA Review Manual 2006. Information Systems Audit and Control Association. p.85. Kasperson R. E, Renn O., Slovic P., Brown H. S., Emel J. et al. (1988). The social amplification of risk: A conceptual framework. Risk Analysis. 8(2): 177 -187. Katsicas S. K. (2009). Computer and Information Security Handbook. Morgan Kaufmann Publications Elsevier Inc. p. 605. Korstanje M. E. (2014). Why risk research is more prominent in English speaking countries in the digital society. International Journal of Cyber Warfare and Terrorism. 4(1): 8 -18. Lacey P. (2011). An Application of Fault Tree Analysis to the identification and Management of Risks in Government Funded Human Service Delivery. Proceedings of the 2nd International Conference on Public Policy and Social Sciences. Lerche I. Glaesser W. (2006). Environmental risk assessment: quantitative measures, anthropogenic influences, human impact. Springer Lieberman D. (2009). Using a Practical Threat Modelling Quantitative Approach for data security. Lock G. (2017) Public Safety Driving Dynamic Risk Assessment. PS Driver Magazine. Mayo D. G. (2011). Sociological versus metascientific views of technological risk assessment. OBrien M. (2002). Making better environmental decisions: an alternative to risk assessment. MIT Press Rob A. (2016). 3 Types of Security Assessments. Threat Sketch Roehrig P. (2006). Bet On Governance To Manage Outsourcing Risk. Business Trends Quarterly. Shrader F. K. Westra L. (1997). Technology and values. Rowman Littlefield. Simon P. Hillson D. (2012). Practical Risk Management: The ATOM Methodology. Management Concepts. Spring J., Kern S. Summers A. (2015). Global adversarial capability modelling. 2015 APWG Symposium on Electronic Crime Research (eCrime) 1- 21. Technical Standard Risk Taxonomy. (2009). Published by The Open Group. Taylor C. VanMarcke E. (2002). Acceptable Risk Processes: Lifelines and Natural Hazards. Verin L. Trumper M. (2007). Project Decisions: The Art and Science. Management Concepts. Verin L. Trumper M. (2007). Project Think: Why Good Managers Make Poor Project Choices. Gower Pub Co.