Featured Post

Marketing :: essays research papers

The Brand/Product: 1.Attributes: The qualities are the item's essential attributes, both physical and practical. They are what the...

Tuesday, August 25, 2020

Marketing :: essays research papers

The Brand/Product: 1.Attributes: The qualities are the item's essential attributes, both physical and practical. They are what the buyer may perceive first about the item through the five detects. The physical characteristics are what make the item what it is. They are aroma, surface, bundle, substance, assortment and cost. The useful qualities are appeared by how the items work. They incorporate sun assurance, dampness for the skin and an alluring advancement. 2. Advantages:      Benefits are what the genuine item characteristics can accomplish for the customer. It is critical to make these advantages not quite the same as the competition's. Each physical property has certain advantages that fulfill the purchasers needs. The aroma of our item is the thing that makes our salve so extraordinary. None of our opposition brands have a scented sun tan salve available that is focused at our portion; the main other is Coppertone Kids' assortments (5). Our salve arrives in an engaging aroma that causes the buyer to feel good and amped up for putting sun tan moisturizer on their bodies. There is no oppressive or solid sleek aroma like a few creams, and there is no phony smell like the "coconut" tanning oils that are available today (1). The entirety of this was thought about when we came out with our light, reviving and gentle scented aroma called "Summer Rain." All of our assortments of cream will be in this fragrance since it is one that can be speaking to every single diverse kind of individuals, not simply our objective market. The surface is non-slick and doesn't feel excessively overwhelming on the skin. This is significant on the grounds that when individuals utilize our item, they will be satisfied that they don't need to stress over obstructs pores that may prompt skin break out. It additionally leaves the skin feeling more advantageous due to the common lotions. Our moisturizer comes in three unique assortments for various skin types. We have salve for typical skin, dry skin, and slick skin. Every cream has certain measures of Vitamin E, aloe and vera and different lotions with the goal that the skin will "always come back to its characteristic balance" as it is utilized (4). The substance of our item are consistently natural and unadulterated. We utilize just the best and plant fixings, all deliberately tried for immaculateness and adequacy. (4) This makes the item more secure to use for the shopper and for the earth. It is spotless and invigorating, not sleek and bothering.

Saturday, August 22, 2020

Strategic Management of HMV Group Assignment Example | Topics and Well Written Essays - 5500 words

Key Management of HMV Group - Assignment Example (Allude to supplement 1) Upper hand is the reaction of afirm to the squeezing need to sort out and perform discrete exercises. While these requirements may not be never-endingly spelt out, it is the duty of the organizers and executers of strategies to anticipate such circumstances when cooking for development and improvement of the firm n different levels. So this suggests the HMV Company needs to utilize an individual point of view with an association towards the fundamental business type. There are different exercises to mull over on account of the HMV Company. The exercises performed while contending in a specific industry can be assembled into classes, as these exercises can be partitioned extensively into essential exercises and bolster exercises. It has been noticed that essential exercises are those engaged with the progressing creation, advertising, conveyance, and adjusting of the item. While bolster exercises are those that give bought inputs, innovation, HR or the general framework capacities supporting different exercises. Each action utilizes bought inputs, HR, a mix of advances, and draws on firm foundation, for example, general administration and money. Exercises differ in their significance in respect of upper hands from industry to industry. ... While this is a decent hypothesis to deal with, critics are of the conclusion that in this day and age there are 'n' number of effects on an association's exercises and not only a set number of the equivalent. In such manner, the HMV Company may utilize bunches which are gatherings of firms and other wide businesses connected to one another based on different ability and their subsets. These capacity in the circle of giving the fundamental specialized and research based help for different client administrations, by utilizing different establishments and colleges separated from assistants and others. With regards to the HMV Company, porters' hypothesis pose the applicable inquiries What should the organization do to guarantee that the business develops in a manner that is maximally favorable for the association specifically What abilities and capacities should the organization start fabricating now on the off chance that it is to involve the business high ground later on How should the organization sort out for circumstances that may not fit flawlessly inside the limits of current specialty units and divisions The appropriate responses are to be found in not in this hypothesis however in the speculations propounded by Gary Hamel, C.K. Prahalad titled Competing for the Future. The creators are of the firm conviction that when equipped with the data in their discoveries and resulting speculations, an organization can make a professional dynamic motivation for authoritative change and can control its own fate by controlling the fate of its own industry. Hardly any organizations that started the 1980s as industry pioneers finished the decade with their authority in consideration and undiminished. Numerous easily recognized name organizations saw their prosperity disintegrated or pulverized by tides of innovative, segment and administrative change and request of-greatness efficiency increases made by nontraditional

Monday, August 10, 2020

Apply HR theory (Motivation) to company (G4S) Example

Apply HR theory (Motivation) to company (G4S) Example Apply HR theory (Motivation) to company (G4S) â€" Research Paper Example > HR THEORY (MOTIVATION) AT G4S by Introduction It has often been said that human resources are the greatest assets of a service organization and that one of the most essential and vital tasks of management is to motivate that resource to achieve corporate success and maximize its performance (Manion, 2005:34). Motivation as described by Buchbinder and Shanks (2007) is the personal inner drive that guides an individual’s behavior towards a goal. Motivation thus, is important in retaining and getting people to perform (Buchbinder, Shanks, 2007:5). The G4S is British Multinational Security Company that was founded in 2004 after a merger of the Denmark-based Group 4 falck and UK-based Securicor plc. It is also the worlds third-largest private sector employer with over 620,000 employees (Who Profits, 2011). Leadership The leadership at G4S has been particularly important, especially the HR, in motivating employees to perform better in various roles they perform at the company. As such, the company has ensured an enormous range of middle management and support roles in different offices to help employees continually strive to achieve the company business objective (Hersey Blanchard, 1993:34). This has ensured that employees remain focused to serve highly (Egelund Nielsen, 2013). Rewards G4S grows in the belief that its employees are one of the most significant part of the organization’s success. As such, the company HR department ensures that it rewards its employees to perform even much better in the coming years. For example, G4S has an employee of the year awards that is held yearly in different countries of operation like Bahrain. As stated in the company website, reward and recognition is one of the major tools to keep employees motivated and engaged with the company. We have initiated various employee engagement activities that had a significant impact on their morale including introducing the Employee of the Year Award in 2011” (G4S, 2014). This ensures that employees work hard to achieve more. Employee Motivation Motivation is important for employee growth (Vroom, 1964:4). G4S as a company prides in its ability to ensure that its employees are motivated to work and perform highly. Thus, the company has several methods of employee motivation. According to Maslow’s hierarchy of needs, people are more productive when they are psychologically satisfied (Maslow, 1954:13). The company has tried to motivate the employees to make them effective. First, the company HR department has an employee engagement strategy that helps the company improve service delivery for consumers and ensure an increased business growth opportunity. The company has employed the PRIDE model to implement this. P   - Protect their basic needs R   - Respect them as individuals I   - Involve them in the business D   - Develop their skills and potential E   - Engage them fully Culture Culture is a very important aspect in employee motivation. G4S has been able to develop and sustain a culture of hard work and support for its employees that ensures employees of company support even in difficult times. This is highly motivational (Porter, Bigley Steers, 2003:34). For example, the company offers training and development and support for local suppliers through practical or financial assistance at times of difficulty. According to the company website, “In Thailand for example, which has experienced successive and severe floods, the G4S Employee Trust made grants of over £266,000 to support our employees and their families” (G4S, 2014). The company has also established a scholarship program for employee children for instance in Guatemala and Kenya and an employee Trust. Change management At G4S, change management is an important factor to ensure continuity even when leadership or organizational functions change to ensure that employees are always motivated to work hard (Redman Wilkinson, 2001:23). Change has been in G4S since its establishment as it seeks to widen its market arena. However, the company has been able to effectively manage change through company culture and consistency in services and beliefs that leaders come with. This has sustained the company’s significance both in the market and in the employees (Mulongo, 2013). Conclusions G4S has managed to motivate its employees effectively over the years through different aspects as explained in leadership, culture, employee motivation, change management and the reward system. This has made the company successful overall. Recommendations To ensure uniformity, the company should implement similar motivational styles in all its branches worldwide to make all employees feel a sense of belonging. G4S should also align the salary of its employees depending on their qualifications, technical knowhow and experiences in different fields worldwide (Nicholson, 2003). Reference List Buchbinder, Shanks, NH 2007, Introduction to health care management. New York: Jones Bartlett Publishers. Egelund Nielsen, A. (2013). Understanding the failure of the divestment of ISS. G4S, 2014, Social responsibility. Retrieved March 13 2014 from http: //www. g4s. com/en/Social%20Responsibility/Securing%20our%20people/Employee%20welfare/ Hersey P Blanchard K. H, 1993, Management of Organizational Behaviour â€" Utilizing Human Resources, Sixth Edition, Prentice Hall International. Mabey C Salaman G 1995, Strategic Human Resource Management, New York: Blackwell Manion, J 2005, From management to leadership. San Francisco: Jossey-Bass. Maslow, AH 1954, Motivation and personality. New York: Harper Row Nicholson, N 2003, How to motivate your problem people. Harvard Business Review, 81(1), 57â€"65. Mulongo, MD 2013, Change Management Practices and Role of Leadership in Managing Change at G4s Kenya Limited. Available http: //erepository. uonbi. ac. ke: 8080/xmlui/handle/123456789/60646 Porter L. W, Bigley G. A Steers R. M, 2003, Motivation and Work Behavior, Seventh Edition: New York: McGraw-Hill Redman T Wilkinson A, 2001, Contemporary Human Resource Management, New York: Prentice Hall. Vroom, VH 1964, Work and motivation. New York: Wiley Who Profits 2011, The case of G4S: private security companies and the Israeli occupation. Available: http: //whoprofits. org/sites/default/files/WhoProfits Appendix Employee Welfare In 2012, G4S invested £641,000 from the Employee’s Trust and other welfare funds into programs to support the welfare and development of our employees.

Saturday, May 23, 2020

Getting Engaged Narrative Essay Examples

Getting engaged is not as simple, it seems, as it used to bethe moment the question is posed, (Will you marry me?) the hoped-for response stated, (Oh, yes!   Yes!   Of course I will marry you!) and the ring is revealed from a hidden pocket or jewelry store box, applied onto the left hand ring finger with somewhat unsteady hands, (a diamond is traditional but a quality birthstone or other gemstone is quite acceptable) the veritable parade of emotions, events, conversations, purchases, and actions are already marching through the couples‘ lives.   Getting engaged is complicated, especially at this time in our American society, and the dichotomy is that because of our penchant for providing and exploring choices, decisions that must be made are nothing but complex. The people involved experience the emotional high of declaring their feelings, believing in the others’ true, lifetime love for them, and a security in the knowledge that their lifetime mate has been chosen.   This lasts for the rest of the day.   It should be enjoyed and reveled in to the fullest. The following day, the morning is awakened to with an enormous change of usual thought patterns; there is now another human being to be considered with almost any, and perhaps all decisions about everything from now on.   Where to live, what job to accept, what pets to keep/adopt/let go of, what size TV to own, cell phone company plans, silverware patterns, the right model of SUV to acquire, and the thread count of sheets for daily use and guests. How one takes their coffee may mean supplying extra or none of something barely thought about.   Now we must stock creamer, cream, milk, non-fat, soy, or goat’s milk to please our mate.   When is coffee â€Å"put on† in the morning?   Who wakes up grumpy and in need of â€Å"quiet time† each day?   Who will start dinner because they get home earlier? Family, friends, coworkers, and other acquaintances do not remain a constant.   Which sister is not allowed in the house alone with the Jim Beam?   Why does it seem that   Andrea flirts a bit too much after a glass of wine?   Can the TV be reserved during football, baseball, and basketball seasons during weekends?   Must this house always host such events?   Can Uncle Bob camp out on the couch, again, for a few more days?   It is ok to dog sit for the brother again?   He promises to pay for the hall carpet within a month. Weekends are never the same.   The lawn must be mowed, the plants must be pruned, the weeds must be pulled, the house must be cleaned, dusted, vacuumed, picked up and straightened out.   The major shopping must be done.   The errands need to be run.   As a usually dual-income family, these things must be met with compromise, patience, tolerance,   and, oh yes, love. Getting engaged means planning a wedding date and day.   This is where family, friends, coworkers, employers, and acquaintances jump in, jump around in, and bump into the couple and each other within the big bubble of love enveloping the happy, hopeful couple. It requires acknowledgement of many concepts, ideas, and beliefs:   religion, politics, blood relatives, culture, social dictates, engrained principles and traditions, and personal preferences and desires, coupled with each person’s â€Å"track record† and a genuine need to not repeat the past.   Along with all of these items, each and every person involved has their express opinion, advice, history, experience, and education which is their true mission to share with you.   One will learn many interesting anecdotes as you listen, nod your head, and tolerate these well-meant diatribes.   You will find out things about close relationships you had no idea were concerns and actual reality, for these people.   You will probably be so very glad to have your life and your problems and your past that you will gleefully do anything you believe is required to get this marriage off to a great start, and not do that†¦ There is nothing more anticipated than the actual day of any wedding.   The church, the ceremony’s dogma, the officials, the time of day, and the casting and blocking of said ceremony participants hold the premiere place in decision making efforts on the part of the couple.   Then there are themes of color, flowers, wardrobe styles, and chosen lines spoken and responded to that must be decided next.   What to say, when to say it, who authors it, and what it must contain and cannot contain are all important issues to be chosen, again, by the lucky couple.   The cake bakery, size, flavor, champagne, hors d’oeurves, entrees, and coffee brand is only slightly less important but still a choice that needs to be made.   The photographer captures all of this, in high-tech detail, in video, onto DVD, and in glossy or matte photographs to be reflected upon for years to come when placed on furniture pieces in several different homes.   Perfection must be the acquisitio n in the memory banks by all, if not most guests and wedding party members. Honeymoons, perhaps the most desirable, of two days and two nights, home, at rest for most couples usually is spent in Hawaii, Tahiti, Mexico, and Europe, which, in this order, are most often the chosen destinations.   The funds, which have, of course, been somehow appropriated for all of this hard work will be withdrawn via debit, credit, and gift card accounts and the couple now stands†¦married, ready to go back to work Monday morning. Engagements are a promise for a future between two hopefully, equally yoked human beings.   The day two lovers get engaged really means remaining engaged, for many days to come, in each others’ lives.   Complex, complicated, and involving more than the two people who agree to marry, it is the mark of the beginning in sharinga new kind of living, a mutual love and respect, and, along the way through the years, a simpler way of life.   The choice to continue living in our hectic world with a true companion is the simplest one of all.

Wednesday, May 6, 2020

Canada’s Charter of Rights and Freedoms Free Essays

Canada’s Charter of Rights and Freedoms Section 8: Search or seizure Everyone has the right to be secure against unreasonable search or seizure. The first part of the Canadian Charter of Rights and Freedoms that we choose for our project is section 8: Search and Seizure. This section guarantees that everyone has the right to be secure against unreasonable search and seizure. We will write a custom essay sample on Canada’s Charter of Rights and Freedoms or any similar topic only for you Order Now There are two parts to this section, one being unreasonable search and the other being unreasonable seizure. Unreasonable search is when your property, belongings, body, is searched without a warrant or without a probable reasoning to believe that the person would need to be searched. Unreasonable seizure is different; it implies that a person’s belongings have been taken from them by a public authority without the persons consent. Many government activities fall under this law, in all the law helps to secure people’s rights to privacy and it keeps government officials from abusing their power. Many may wonder why search and seizure are under the same section. The reason why they are is because they often fall hand and hand. Seizure often only occurs following a search, and searches only occur for the reasoning of wanting to seizure the person’s illegal belongings. There are many cases of unreasonable search and seizures which exist. For example, if government officials were to go into a man’s house, whom they suspected of dealing Mariana, but didn’t have a good reason to believe so or a warrant, and had taken his illegal Mariana plants then that would be an example of unreasonable search and seizure. Another example of unreasonable search and seizure would be if police officers were to inspect a person’s car at a traffic stop and take belonging inside because they believe they were illegal possessions; this is unreasonable search and seizure because they did not have a good reason to search. Many argue about this right of protection against unreasonable search and seizure because the possessions, weather found reasonably or not, are illegal. Some think that it is the governments right to search belongings of its citizens. An example of this opposition to the rights of Canadians currently occurring in Canada is Bill C-30. Bill C-30 would force Internet Service Providers to give Government Officials your name, address, IP address and a lot of other personal information, without a warrant. With all this information, the government would be empowered with the ability to monitor every action that you make online and use it to catch any illegal activity. This is a complete compromise to the rights of Canadians to protection against unreasonable search and seizure. How to cite Canada’s Charter of Rights and Freedoms, Essay examples

Saturday, May 2, 2020

Identifying the Potential Threats in Relation to Chief Information Sec

Question: You are the Chief Information Security Officer (CISO) for a large multinational enterprise with a very large collection of intellectual property that represents a major portion of your business holdings.What are the threats against your corporate network, where do they come from and what do you need to mitigate against them? Answer: Introduction Risk Assessment is involved in examining the potential measures so that risks can be controlled in any given workplace. The organizations are actively involved in placing effective policy so that risk in the workplace can be controlled and better environment can be provided to employees. Thus, both qualitative and quantitative value of risks is determined under risk assessment by the organizations. The four different processes such as exposure identification, reviewing effect, risk evaluation and application of control is useful so that workplace activities can be managed effectively. The current report will be focusing in Identifying The Potential Threats In Relation To Chief Information Security Officer and finding solutions to gauze the threats. Fits with a profile Policy Profile The responsibility of CISO in a multinational company is to remain protected from the threats relating to many intellectual property collections. The CISO needs to protect these as the large section of the business comprises intellectual property such as cash trade, online marketing and targeting, conversation with shareholders, etc. As per Fitzgerald (2007), CISO act as a senior level executive that is accountable for lining up security initiatives so that technologies and information assets of the business are protected. On the other hand, Gaines Oringer (2012) stated that a CISO has different duties and responsibilities such as: Forming and employing security related policies Making sure of data privacy Administrating regulatory compliance Working with other executives to develop plan for business continuity and for disaster recovery Establishing security architecture for the organization Managing computer security of the company Apart from that, CISO is also involved in delivering consulting services in context to information security right through the organization so that effect of risk can be minimized. Moreover, the information security program can be implemented by the CISO. As per Gilbert (2012), around 60% of organizations are receiving benefit from the Chief Information Security Officer in securing their important data. Therefore, CISO also carries their activities with full determination to provide long run benefit to the organization. Further, the physical and technological aspects are considered by CISO to protect the organization and workplace from probable threats such as health and safety risk or wastage of resources risk. Gray (2006) discussed that in organizations, the technological aspects can be communications, IT system, and software application for assessing risk in the organizations. On the other hand, CISO takes responsibility regarding the activities of security management so that each department of the organization can be protected from the risk or threats. Moreover, CISO is effectively involved in providing training and development to staff to remain aware about the rising risk and handle it effectively and also providing learning about best antivirus so that secure environment can be formed. Tina (2012) proposed that CISO can do the following responsibilities: Responsibilities of CISO Organization Representative: CISO can as a representative on behalf organizations and provide relevant information to organizations customers, partners and shareholders in regards to security strategy. Plan and Test: CISO can be involved in planning information security program for protecting the organization from risk and the test the program whether it can provide better result or not. If it does then CISO recommend it to organizations senior department. Law Enforcement Agency: CISO deals with law enforcement agencies so that threats or risk can be monitored and possible action can be taken (Freeman, 2007). Further, CISO can track the theft done by the employees. Form security procedure and policies: CISO is effectively involved in developing procedure and policies for information system security, database and training procedure for staff. Balance Security: CISO also take active part in balancing the security in all levels of organization so work can be carried in most productive way. Profile Completion The problem that has been registered while working as a chief information security officer relates to poor standard of e-mailing, theft of tax record, differences in protection and monitoring, social engineering, less effective network, etc. The further problem that occurred in workplace can be explained as: Virus The information in database gets damage and confidential file gets corrupted. Around $1.2 billion damage has been done within 15 days over the internet. Blended Attacks The hacker or cyber criminal applies different methods to crack the security system of the organization (Gottschalk, 2002). Phishing The shareholders, employees and customers has little faith on the use of implemented IT system in the company Application Specific Attack The cyber criminal with the use of SQL rob the valuable data relating to customers detail, employees total production, etc. Problems Threats 1: Virus According to Hunter (2011), shared frequency is prime threats that affect the company. On the other hand, around 72% of the business house receive offensive or threats emails. In the recent survey by DTI, it has been found that the email threat percentage has risen to 83 percent. Moreover, the report of Symantecs Security Threats states that Worms and Trojan Horses effectively involved in damaging the documents of corporate house. Further, as a CISO it has been identified that back door virus leads to higher difficulties by generating codes which damage the database of company (Armstrong, Simer Spaniol, 2011). Threat 2: Blended Attacks It is regarded as the grouping of hacks and phishing. This particular threat makes company to lose their valuable data such as companys product or equipment budget or customers details. Threats 3: Phishing It is also considered most effective threat that mostly connected with the banking sector. It has been send customers do their transaction and use their id and password for different purpose such as filling bank form online. Thus, as a chief information security officer, it has been noticed that worms or virus damage the remote system of computer that erase the data (Cresson Wood, 2002). Moreover, cascade volumes are being sent by worms into the mail server of the enterprise and important files of company can be attacked. Therefore, criminals with the use of phishing can access the sensitive information such as credit card information, passwords or usernames and thus important can be theft by the hackers (Dlamini, 2013). Threats 4: Hacking Hacking is done by the attackers to erase or steal the information for their own purpose or just for sake of fun. Moreover, SQL injection is done by the hackers to enter into the security system of the company so that confidential information can be accessed and publish it in public. The hackers try to break the system so that details about customers, employees, strategies plan, and worksheet plan can be robbed and use it for their business (Fitzgerald, 2007). Apart from that, it has been observed while being engaged as CISO that number of marketers were willing to invest for protecting themselves from the threat of hacking so that they maintain their workplace safe and secure. Further, a breach is created by the hackers so that information can be stole while information is being shared over network (Gray, 2006). Solutions In order to protect the important documents or file from the possible threat, the security department of IT system can develop the following layers: First Layer: The prevention technology like RSS method can be effective for the group member in activating suspect element. On the other hand, the anomalous request has to be monitored that may have been received in e-mails (Boihme, 2013). Moreover, the intrusion prevention system can be useful in knowing the threats as the system can monitor the unexpected entries and data traffic. Second Layer: In this layer, a defence has to be added to get protection from virus. Moreover, when an antivirus system is being installed then prevention of back door has to be activated so that any virus could not enter into the system (Warley, 2011). Further, security management system has to be implemented for better protection from malicious threat or viruses. Third Layer: The internet security system has to be enforced for acknowledging vulnerability with business opportunities. Therefore, using the calculation, the system has to be installed and appropriate vulnerable has to be selected with protective measures. Thus, it can be effective in lowering down the risk (Coronado, 2012). Moreover, external security threats can be controlled through this system. Situational Crime Prevention Framework The framework can be valuable in forming strategies so that security virus can be prevented along with phishing and blended attacks. Existing Approaches to the situational prevention The framework is effective in building internal connection among the security breaches for the organizations. According to Garber (2012), instrumental fusion is developed by situational crime which allows in structuring activity among traditional crime and organizational. Moreover, the situation lens can help organization in scanning the malicious code or activity of virus that may be delivered by hackers through e-mails. On the other hand, MacGillivray (2013) mentioned that spillover effect can be useful in limiting the future security breaches in context to selected multinational enterprises. Therefore, organization can be able to track information related to rob information, products, etc from the prevention framework. Apart from that, Michael (2012) pointed that hypotheses structure of knowledge has been developed by situational crime prevention and it helps in directing the staffs as per routine wise. Further, flexibility is being increased and maintenance of proper security can be gained and affect of external threat can be lowered down. On the other side, Oshri, Kotlarsky Hirsch (2007) discussed that providing assistance and guidance to other can be valuable in avoiding number of security attacks with the system of information technology. Therefore, the situational crime prevention can be effective in controlling the security problem from the workplace of MNC. Further, the framework can provide guideline to CISO for including staffs so that higher monitor can be done on the illegal activities of the hackers or cyber attackers. Law Multinational Enterprise Current Law Privacy and Electronic Communication Regulations 2003: The organizations can adopt the system under data protection act section 11 that can help the individual in controlling security whenever there is an unexpected mail from the direct market. Moreover, the regulation provides assistance in the use of communication and electronic media such as cold calls, texts, e-mails, etc if it is employed for marketing (Padayachee, 2012). Terrorism Act 2006: The act delivers the guideline for developing wide array of offences in regards to information security terrorism. In section 19 of the act, it has been mentioned that organization should disclose hacking information rate from IT system (Cs.jhu.edu, 2015). Malicious Communication Act1988: The legal articles can be made by the company for providing information to other parties. Moreover, the act requires that before sending any data malicious activities has to be addressed so that it does not affect other network or system. Therefore, the information can be transferred in more secure manner. Proposed Laws for Multinational Organizations Privacy and Electronic Communication Regulations 2011: The information security can be maintained and secured in much better way as a CISO under this law. The amendment policy of Regulations Act 2011 proposes that company has to oblige it in regards to use of cookies in social sites or internet websites and also receiving mails in the mail server (Sans.org, 2015). Therefore, more secure system can be developed for the information system. Digital Economy Act 2011: This particular act can assist the company in regulating appropriate media for preventing threat whenever the information is being shared within the network or adopting market opportunities on the basis of networking websites of social media (Tina, 2012). On the other hand, digital media act 2010 is effective in dealing with issues related to online such as obligations from the providers of internet service. Therefore, act can help in handling online security of the company. International Scope Viruses: The problem of virus is being faced by many domestic industries along with international ones. The virus attack seriously damages the important information of the company. For instance, in 2008 around 10% of the computer system was affected that were linked to internet by the Morris Worm. Further, it has been found from the report that almost 60000 computers are affected by Morris Worm and access the data available in the computers (Gilbert, 2012). Therefore, due to this worm many industries of world were left with missing important files. Moreover, other viruses such as Trojan Horses, Mapson, trile.C, etc are damaging the computer system of world entities. Phishing: Phishing is also one of the major international problems that affect the information security of the world companies. For instance, Cornell University student received an e-mail with the subject of IT Service Desk Support in January 2015. Further, in the mail it was required that student has to upgrade their personal university email account and they were asked to provide details about the bank account into the mail body of the system (Bristol.ac.uk, 2015). Therefore, it can be understood that, phishing can reach out to global companies as well and make them to do what are feed by the cyber criminals. Hack: Hacking is one of the prime threats in global scenario. Many of baking industry is subjected to hacking. The number of hackers tries to enter into the system of banking industry in order to exploit the information so that they can either use it for their own purpose or destroy it. Therefore, numbers of bankers are actively involved in anti hacker program to safeguard the information from illegal hacking (Gilbert, 2012). For instance, New York Times internal network was hacked in 2002 by a hacker and information was accessed from the database of NYT. Moreover, Mark Zuckerbergs personal facebook page was hacked in 2013 (Dlamini, 2013). Blended Attacks: The blended attack has risen in recent years internationally. Due to this attack numbers of small firm are not able to secure their server and attackers attack the system and access data. For example, in October 2010 a virus was discovered named Zeus MitMo in order to defraud web banking users. Therefore, the attackers managed to get the authentication code that was sent by the bank and as a result they emptied the bank account of customers (Bullguard.com, 2015). Therefore, cyber criminals can send viruses to any location via emails or instant message to enter into the information system of the users or companies for their own benefit. The other virus such as love bug has potential to destroy the information. Conclusion From the whole report, it can be concluded that information security system should be prime focus to protect the files or documents from the potential threat of hacking, blended attacks, phishing and viruses. However, the report has concentrated in understanding the possible effect of threats and proposing solution that can help in lowering down the impact of those online threats. On the other hand, the role of Chief Information Security Officer is important in addressing the threat that can hamper the industry and its various departments and overall workplace. Apart from that, situational crime prevention framework is effective in acknowledging the possible threat and provided some idea that is helpful in mitigating the information security risk. Moreover, it also helped CISO to identifying the threats and provides training to staffs for tacking the threat issues. Further, the current and proposed law is valuable in facing internet challenges and also international scope has been st udied to know the impact of online threats. References Armstrong, S., Simer, L., Spaniol, L. (2011). Models of technology management at the community college: The role of the chief information officer. New Directions For Community Colleges, 2011(154), 87-95. doi:10.1002/cc.449 Boihme, R. (2013). The Economics of Information Security and Privacy. Berlin, Heidelberg: Springer Berlin Heidelberg. Bristol.ac.uk, (2015). Retrieved 4 February 2015, from https://www.bristol.ac.uk/media-library/sites/infosec/migrated/documents/guide.pdf Bullguard.com,. (2015). Rise of the blended attacks. Retrieved 4 February 2015, from https://www.bullguard.com/bullguard-security-center/internet-security/internet-threats/rise-of-the-blended-attacks.aspx Coronado, A. (2012). Corporate Computer and Network Security. Journal Of Information Privacy And Security, 8(4), 81-84. Cresson Wood, C. (2002). Dont Let Role of Information Security Policies in the Arthur Andersen/Enron Case Go Without Mention to your Chief Executive Officer. Computer Fraud Security, 2002(5), 11-13. doi:10.1016/s1361-3723(02)00513-4 Cs.jhu.edu, (2015). Retrieved 4 February 2015, from https://www.cs.jhu.edu/~rubin/courses/sp07/Reading/newlawis.pdf Dlamini, R. (2013). The role of the strategic and adaptive Chief Information Officer in higher education. Educ Inf Technol. doi:10.1007/s10639-013-9269-5 Fitzgerald, T. (2007). Clarifying the Roles of Information Security: 13 Questions the CEO, CIO, and CISO Must Ask Each Other. Information Systems Security, 16(5), 257-263. doi:10.1080/10658980701746577 Freeman, E. (2007). Regulatory Compliance and the Chief Compliance Officer. Information Systems Security, 16(6), 357-361. doi:10.1080/10658980701805050 Gaines, A., Oringer, A. (2012). ERISA. New York, NY: Practising Law Institute. Garber, L. (2012). Security, Privacy, and Policy Roundup. IEEE Security Privacy Magazine, 10(2), 15-17. Gilbert, F. (2012). Thirteenth annual Institute on Privacy and Data Security Law. New York, N.Y.: Practising Law Institute. Gottschalk, P. (2002). The role of the Chief Information Officer in formal strategic information systems planning. International Journal Of Technology, Policy And Management, 2(2), 93. doi:10.1504/ijtpm.2002.001760 Gray, P. (2006). Manager's guide to making decisions about information systems. Hoboken, N.J.: John Wiley Sons. Hunter, M. (2011). Identifying Issues of the Chief Information Officer Role through Qualitative Interviews. International Journal Of Sociotechnology And Knowledge Development, 3(2), 42-52. doi:10.4018/jskd.2011040104 MacGillivray, B. (2013). Heuristics Structure and Pervade Formal Risk Assessment. Risk Analysis, 34(4), 771-787. Michael, K. (2012). Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. Computers Security, 31(2), 249-250. Oshri, I., Kotlarsky, J., Hirsch, C. (2007). Information security in networkable Windows-based operating system devices: Challenges and solutions. Computers Security, 26(2), 177-182. Padayachee, K. (2012). Taxonomy of compliant information security behavior. Computers Security, 31(5), 673-680. Sans.org, (2015). Retrieved 4 February 2015, from https://www.sans.org/reading-room/whitepapers/assurance/mixing-technology-business-roles-responsibilities-chief-information-security-of-1044 Tina, T. (2012). Certified Chief Information Security Officer (CCISO) Secrets To Acing The Exam and Successful Finding And Landing Your Next Certified Chief Information Security Officer (CCISO) Certified Job. Dayboro: Emereo Pub. Warley, R. (2011). Juvenile Homicide. El Paso: LFB Scholarly Pub. LLC.