Tuesday, May 19, 2020
The Finance Assessment Of The Merchant Of Venice - 1388 Words
Applied Finance Assessment I. Introduction ââ¬Å"My ventures are not in one bottom trusted, Nor to one place; nor is my whole estateâ⬠(Shakespeare et al., 2007, Scene 1 Act 1) This quote discussing the diversification of Antonioââ¬â¢s investments in the first act of Shakespeareââ¬â¢s play ââ¬Å"The Merchant of Veniceâ⬠was written in the 16th century. But it wasnââ¬â¢t until 1952 that Harry Markowitz wrote his paper ââ¬Å"Portfolio Selectionâ⬠that made him ââ¬Å"the father of modern portfolio theoryâ⬠(Markowitz, 1999). Since then, the use of statistical tools by financial professionals has become very common. In this report, the performance of Microsoft Corp. (hereinafter called MSFT) and Apple Inc. (hereinafter called Apple) will be analysed, by looking at both monthly and yearly, simple and excess returns. First, the descriptive statistics of each individual stock will be examined, and the ââ¬Å"Efficient Frontierâ⬠and ââ¬Å"Capital Market Lineâ⬠will be drawn, then the performances of the two shares against each other will be compared, and finally an examination of the performances of both companies using CAPM. A ll the calculations are found on an excel file that will be referenced throughout this report. II. Analysis 1. Descriptive statistics Looking at the Buy and Hold Return (MSFT 37833.33%, Apple 17480.65%) and Compounded Annual Returns (MSFT 23.63%, Apple 20.28%) of both stocks over the whole sample period, it is noticed that MSFT generates a higher return. In addition, MSFT had higher simple yearly returnsShow MoreRelatedThe Merchant of Venice by William Shakespeare Essay example1553 Words à |à 7 PagesThe Merchant of Venice by William Shakespeare The Merchant of Venice is a play full of different relationships ranging from love and friendships to hate. These relationships are affected by gossips and rumours, which due to the close community are flying around all the time. Money is involved in everything in the play; it is at the centre of work, relationships and rumours. It also holds together and makes the main tension of the play. There are many relationshipsRead MoreOrigin of Accounting3836 Words à |à 16 Pagesthe legal codes that evolved penalized the failure to memorialize transactions. The renowned Code of Hammurabi, handed down during the first dynasty of Babylonia (2285 - 2242 B.C.), for example, required that an agent selling goods for a merchant give the merchant a price quotation under seal or face invalidation of a questioned agreement. Thus it is believed that most transactions were recorded and subscribed by the parties during this period. The Mesopotamian equivalent of todays accountant wasRead MoreImpact of Environmental Accounting on Management Accounting7424 Words à |à 30 Pages1.0 Introduction According to The Environment Agency in the United Kingdom (2006), Environmental Accounting can be defined as: ââ¬Å"The collection, analysis and assessment of environmental and financial performance data obtained from business management information systems, environmental management and financial accounting systems. The taking of corrective management action to reduce environmental impacts and costs plus, where appropriate, the external reporting of the environmental and financialRead MoreEvolution of Accounting Thought6174 Words à |à 25 PagesEurope (Renaissance, 14th to the 17th century), and the burgeoning of trade between the Middle East and Europe, things changed. Accounting, as we know it today, began to take shape. The Italian cities were at the cross-roads of the new trade, and merchants and mathematicians in these cities were instrumental in the development of the ââ¬Ënew accountingââ¬â¢. Other events in world history which had a major influence in shaping accounting were the Industrial Revolution (1600s) and the Great Depression (1930s)Read MoreFoundation Course26234 Words à |à 105 Pages Revolving Loans_______________________________________________________ _60 Term Loans ___________________________________________________________6 1 Syndicated Loans/Club Loans _____________________________________________62 Export-Import Finance ___________________________________________________63 Factoring ____________________________________________________________ _64 Bill Discounting_________________________________________________ ________64 Structuring of Loans ___________________________________________________66Read MoreIntern Report on Credit Risk Management of Ncc Bank Limited8134 Words à |à 33 Pagesthan expected. This includes the possibility of losing some or all of the original investment. It is usually measured by calculating the standard deviation of the historical returns or average returns of a specific investment. A fundamental idea in finance is the relationship between risk and return. The greater the amount of risk that an investor is willing to take on, the greater the potential return. The reason for this is that investors need to be compensated for taking on additional risk. All creditRead MoreCareer Opportunities for B.S. Accountancy Students6080 Words à |à 25 PagesLuca Pacioli develop the modern bookkeeping system ââ¬Å"modern of veniceâ⬠which earned him the title of Father of Accounting. Even at this time Fr. Luca Paciolo is considered as the Father of Accounting (Manuel, 2009). While in 15th century the Italian merchants usually entrust their properties to their servants who were required to keep track of their daily activities which composed of the properties or assets, owned by merchants and the debts or the liabilities owed to others are all beingRead MoreThe Ottoman Empire ( 1299 ) Essay6958 Words à |à 28 Pagestwentieth century. It explores the changing relationship between the Ottoman state and Europe as European commerce rose ascendant and an emphasis on the balance of power exerted an influence on European political culture. This essay concludes with an assessment of the partition of Ottoman territories in the wake of Ottoman decline. OTTOMAN STAGNATION AND THE RISE OF EUROPE Ottoman Stagnation and the Rise of Europe By the beginning of the seventeenth century, the Ottoman Empire, a diverse and expansiveRead MoreThesis on Capital Structure26836 Words à |à 108 Pagespower. It would be worthy and productive if such amount is collected from various people and utilized in proper way. Banks are essential financial institutions. They are the principal source of credit that provide short term working capital finance. They contribute to the economy in different manner. They collect money from savers and invest in lucrative sectors. They make profit by paying less for savings than what they charge to the borrowers. Therefore, banks could play a key role in reducingRead MoreThesis on Capital Structure26846 Words à |à 108 Pagespower. It would be worthy and productive if such amount is collected from various people and utilized in proper way. Banks are essential financial institutions. They are the principal source of credit that provide short term working capital finance. They contribute to the economy in different manner. They collect money from savers and invest in lucrative sectors. They make profit by paying less for savings than what they charge to the borrowers. Therefore, banks could play a key role in reducing
Wednesday, May 6, 2020
Analysis Of The Day Before Carina And Ulrich s Wedding
It had finally arrived, the day before Carina and Ulrichââ¬â¢s wedding. Carina and Joan sat before the warm hearth in Carinaââ¬â¢s cottage, braiding hair wreaths of wildflower and ivy before preparing for a supper with friends and courtiers. Carina wanted to enjoy these last moments with Joan, her dearest friend, and enjoy this final day in her cottage. As of tomorrow night, sheââ¬â¢d call the castle her home, and the notion felt bittersweet. Sheââ¬â¢d loved the independence of living in this cottage on her own while her father traveled, but she also looked forward to sharing her life with Ulrich. However, since Carinaââ¬â¢s father, Reece, was not due back to Camelot for over a year, Carina decided to rent out the home. Still, moving felt odd. But she wasâ⬠¦show more contentâ⬠¦In the end, the king insisted he wanted to at least provide use of the Council Chamber and have his kitchen staff to prepare and serve the food. The king emphasized he was forever indebted to Ulrich, and this small favor was the least he could do. Finally, after much cajoling, Carina and Ulrich agreed. ââ¬Å"Joan, I know you have everything under control. Iââ¬â¢m not worried.â⬠Carina sat back and stretched. ââ¬Å"Instead, letââ¬â¢s talk about more pressing matter, such as how I should handle the marriage bed tonight.â⬠ââ¬Å"Oh, again? Weââ¬â¢ve gone over all this?â⬠With a slight smirk, Carina asked, ââ¬Å"Then how will once more hurt?â⬠ââ¬Å"Fine,â⬠said Joan with an exaggerated sigh, pausing from her weaving work. ââ¬Å"You have two choices tomorrow night ââ¬â you can go slowly and get used to your new husbandââ¬â¢sâ⬠¦ invasion ââ¬ââ⬠Carina, unable to suppress a laugh, said, ââ¬Å"Invasion! Heââ¬â¢ll love that. Go onâ⬠¦Ã¢â¬ ââ¬Å"ââ¬â Or, you can let him inside you all at once. But either way, there will be discomfort. I recall it stung and burned.â⬠Joan started weaving holly again. ââ¬Å"A lot. But just at first.â⬠This was the reason why Carina felt the need to hear the story of losing oneââ¬â¢s virginity over and over again ââ¬â she was nervous. While she and Ulrich had engaged in every sexual act short of penetrative sex, this final act, the one where he was inside of her, made her tense. What if it hurt so much she cried? What if she bled a lot, or didnââ¬â¢t bleed at all and people thought sheââ¬â¢d been with
Dystopian Societies Essay - 886 Words
A dystopia the darkest form of government, a utopia gone wrong, a craving for power, struggling for fewer rules. The dystopia is factual the worst possible form of a government. Its the struggle to be so perfect that it fails. There are typically two types of dystopias first a monarchy. A monarchy is a group of people controlled by a king or queen, and they make every last decision. What they want they get. A monarchy is typically born like this example from lord of the flies. ââ¬Å"He became absorbed beyond mere happiness as he felt himself exercising control over living things. He talked to them, urging them, ordering them(Golding 58). This shows that a monarchy starts by one just taking over from the start rather than being aâ⬠¦show more contentâ⬠¦The people are left starved with no food or money having to bask in the king glory and power. An example of that would be Louis XIV. He let the French starve and rot away with no food and no money while he was bathed in riches w ith a million square foot palace made out of gold. He led the French to a revolution, a revolution so large it changed the way we look at monarchies. Its not at all like the king cares about the people. If he does he may have bad ideas and the entire city with collapse. The monarchs of Brunei, Oman, Qatar, Saudi Arabia and Swaziland appear to continue to exercise more political influence than any other single source of authority in their nations, either by constitutional mandate or by tradition (Monarchy). Monarchys are bad but communism is worse, but does one person also have full control in a left dystopia. Communism the worst kind of government, like your being watched every step of the way there is no freedom, no democracy all mind games. Its just too hard to live in if you know what their doing, if you speak up in a negative way to the government its off to the prison camps. North Korea supposedly has 6 known prison camps with hundreds of thousands of people with most of them done nothing wrong. North Korea and countries like it will do anything to keep it utopia status in the minds of their people. In essence its a utopia gone wrong, they makeShow MoreRelatedThe Giver As A Dystopian Society759 Words à |à 4 PagesIn todayââ¬â¢s society there are many authors who write dystopian novels. They write these novels to give knowledge and to tell how our world is very different from dystopian life. Lois Lowry shows readers how people can suffer in dystopian society. In The Giver, Jonasââ¬â¢ community appears to be a utopia, but in reality it is a dystopia because everyone is under the illusion that there is freedom, dehumanization, and their strict regulations. The Giver is considered as a dystopian society because everyoneRead MoreThe Downfall Of A Dystopian Society1588 Words à |à 7 PagesRobertââ¬â¢s statement reminds all of a weak dystopian society, fragile enough to break by one individual. In the dystopian novel, Delirium by Lauren Oliver, major motion picture Divergent directed by Neil Burger as well as written by Veronica Roth, and published journal How power corrupts leaders written by Dr. Ronald E. Riggio one sees how a single catalyst leads to the downfall of the entire society. In all three works, one sees the collapse of a dystopian society is a result of the triumph of love, theRead MoreOppression in Dystopian Societies1154 Words à |à 5 PagesDystopian societies shown in George Orwellââ¬â¢s 1984 and Kurt WImmerââ¬â¢s Equilibrium present the readers with a state of society where everything is totalitarian and environmentally corrupt. Through the Governmentââ¬â¢s methods of control, the citizens lose their indiv iduality and freedom. Acts of fear and oppression though technological advancements in both 1984 and Equilibrium evoke Oceaninans to trust the higher forms of authority to protect them, and make them feel safe. 1984 and Equilibrium portray aRead MoreIs The Giver A Dystopian Society827 Words à |à 4 Pages- an intense feeling of deep affection. As I began to think, is the giver a dystopian or utopian society, I immediately jumped to the conclusion. The giver is obviously a dystopian society, they have absolutely no rights whatsoever. But then I began to think, how I was going to fight for it. This was a bit more of a challenge to answer, because this community really shows all the characteristics of a utopian society. However, my heart really tells me that I could never fight for something thatRead MoreDystopian Society Essay1214 Words à |à 5 Pages Consilience between society and its government requisites a veto of propaganda ploys which separate politics and the populace as two disparate entities. Examination of Henry Reynoldââ¬â¢s monograph memoir Why Werenââ¬â¢t We Told in contrast with Thomas Moreââ¬â¢s political meditations in Utopia and Vladimir Bortkoââ¬â¢s 1988 film adaptation of Heart of a Dog reveals how composers shape their audienceââ¬â¢s political perspectives in support of pellucid law and order. The three texts conclude on a collective consensusRead MoreGattaca Is A Dystopian Society1330 Words à |à 6 Pagesdifferent than yourself as ââ¬Ëthe otherââ¬â¢. The outcast, the lesser, those that you do not need to worry yourself about because they are beneath you. This is an attitude that has been infecting human society as a whole for a long time. Gattaca, for all its advances and appearances of Utopia, is actually a dystopian future that is even more divisive than anything that exists in real ity and exists as a cautionary tale of what can happen when discrimination is allowed to grow out of hand. One of the mostRead MoreDystopian Society Essay1882 Words à |à 8 PagesThe United States: Movements Toward a Dystopian Society The destruction of nature, increase in the pollution across the globe, constant surveillance upon everyone, and the inability to have the freedom to search what you would like on electronic devices. This action will result if the cautionary text, Fahrenheit 451, is not utilized to locate and withdraw flaws in our own modern and developing North American society. Despite the date of the text, the messages displayed can directly correlate toRead MoreThe Dystopian And Utopian Society873 Words à |à 4 PagesThis book is set in a futuristic dystopian/utopian society. Based on the descriptions in the text, the place where Jonas lives seems to be a fairly small community. The community is by a river, as it often mentioned in the plot (at one point, a four year old boy name Caleb drowns in the river). There are various places within the community, such as the House of Old, the Rehabilitation Centre, the Auditorium (where public events are held, such as the ceremony of twelves), and various family unitsRead MoreEssay of Dystopian Societies #21154 Words à |à 5 PagesDystopian Societies Human vegetables, all controlled by the eights of their technology, all unaware of the real problems around them; a dystopian society. Farhenheit 451 and The Island, two stories that share this wretched theme. But both stories each have a character that questions it all. They both go against what others say. They followed what their hearts had to say, and thought for themselves. With no literature for Guy Montag in Farhenheit 451 and the longing for freedom for Lincoln 6-EcoRead More1984 Dystopian Society Essay1164 Words à |à 5 Pageslittle freedom to express their own opinions. This is because dictators create societies that they feel are supreme. In order to have an almighty society, each person has to think and behave the same. George Orwell created a dystopian society, Oceania, where the government was controlled by Big Brother. Winston Smith, the main character, slowly realized that the Party, or the government, was manipulating their society to make the Party immortal. Wins ton presumably wanted to stand up for his beliefs
Policing Cyber Crime Cyberspace Infrastructure
Question: Describe about the Policing Cyber Crime for Cyberspace Infrastructure. Answer: The previous research conducted on the existing subject reflects that the cyberspace and its underlying infrastructure are highly vulnerable to the wider range of risk stemming from the cyber threats and hazards. In the circumstance of the similar statement, it is inferred that the sophisticated cyber actors and the nations states tend to exploit the vulnerabilities if the technical manipulations[1]. Therefore, the current records signify that the percentages of the cyber securities in the global context have increased at a rapid pace. The cyberspace is particularly difficult to secure due to the discrepancies like the linkage between cyberspaces and the physical system. Moreover, complexity in reducing the vulnerability and the consequences in the complex cyber networks has also been the primary reason which tends encourages the occurrence of the cyber crime. The worldwide cyber security market is defined by the market size that is estimated between the ranges of $77 billion in 2015 6 to $ 170 billion in 2020[2]. The Venture Capitalist firms have proclaimed the indifferent recent hundred-million dollar plus cyber security speculation funds during the year 2015. The corporate investors have been identified as the major funding sources for the cyber security start-ups, alongside the Venture Capitalist firms. For example, the US governing authority has managed to spend $100 billion in the cyber security matter. The past records show that the government has kept a budget for $14 billion for the cyber security purpose[3]. The previous records reflect that the cyber attacks are costing the ventures $400 - $500 billion per year, it does not even include the large percentages of the cyber attacks that are not even registered. Moreover, the Heatbleed has been recognised as the catastrophic security bug, which led the entire IT (Information Technology) to experience a strong by the end of 2014[4]. Therefore, the current study evaluates on the concept of privacy that has become redundant of the present age. It aims to finds out the security measures the administrative authority is taking to increase the cyber-related standards. The government has set up a cyber forensic training in different regions. In the collaboration with the Data Security Council, the cyber forensic labs have been set up to track the exact rate of the cyber discrepancies. Different organisations are taking the initiatives of providing the online training to the employees to increase the expertise regarding the data security measures. The specific approach can benefit the enterprises to understand the cyber threats and the online frauds[5]. It has been inferred that the government has started working with the leading industry partners to advance the free e-learning courses to enlighten the internal members of the organisations to increase the awareness regarding the cyber-related threats. In the different situation, it has been assessed the competitors manage to introduce the similar types of products in the market at a lower price range[6]. The specific action occurs due to the ineffective cyber security measures within the organisations. The data and the products related formulas often get leaked in the market. Therefore, the competitors receive the benefits of receiving better reactions with fewer percentages of efforts. The past records signify that the government of different regions have managed to launch the BIS Cyber Essentials accreditation scheme in the year 2014. The specific installation helps to demonstrate the cyber resilience concept. The specific scheme has been designed to support the basic set of the security standards to prevent the major forms of the common attacks[7]. The strategy of introducing the accreditation also leads to encouraging the consumer confidence within the business. In 2014, the digital sector witnessed the launch ofCyber Streetwise,the campaign that is primarily intended for improving the cyber security amongst the public and SMEs (Small Medium Enterprises). The specific set of the campaign might extend to facilitate the larger businesses for reducing the adversities of the online fraud. Law and accountancy enterprises are the attractive sources of information for the criminal based activities. The past researches conducted by the professionals reflect that the property information, sensitive client data and the commercial data are majorly targeted. The survey conducted in 2014 by Information Security Breaches, bespoke by the Department for Business, found that 81% of large enterprises and 60% of small firms have been a victim of the security breach during the tenure of the previous year[8]. The average expenditure of an enterprises' worst breach has been between the range of 65,000 and 115,000, for the small businesses. The leading Giants have to invest between the figure of 600,000 and 1.15 million for large organisations. With the emerging speed of the internet access, the attack attempts have also increased simultaneously. The existing report of the current digital situation states that the maximum percentages of the population are exchanging the conversation through the internet mediums[9]. The social networking sites have become the most efficient and the widely used platforms that increase the communication methods between the individuals. However, high percentages of the population trends have grown excessive knowledge regarding the programming language and the digital specifications. Therefore, the certain percentages of the populations are leading to make misuse of the internet based knowledge. During the year 1989, Robert Morris set free the fist computer virus on the internet platform, which led to destroy several computers in the similar point of time[10]. Luckily, in the late 80s, the internet has not been a high part day-to-day life as it is now, and thus, the effects have not been pronoun ced as the current period. The worm virus has become the first crime, which has been convicted under the legal statement of 1986 Computer Fraud and Abuse Act.The virus case has managed to gain the publicity after a certain unleashes of the early viruses. The records reflect that the worm had been unleashed in the early 1980s, which is similar to the Brain virus of the year 1986. The recent data signify that the credit card details have become extremely vulnerable due to the huge amount of online banking and shopping transaction. The data has become extremely vulnerable. The credit and the debit cards are almost used by 70% of the worlds population[11]. Moreover, the populations are always remaining in a certain rush, which often tends the majority of the users to fail to implement the security process. Therefore, due to the certain discrepancy in the security process, the hackers get the opportunities of misusing the e-information. The final users become the victim of the cyber crime. The governing authorities are taking different advanced measures to stop the cyber-based crimes in the similar context[12]. The research was done by certain scholars conveyed that the UK government has taken several initiatives to increase the cyber security measures. For example, the UK government has already conducted the Cyber Streetwise camping to reduce the cyber-related crimes[13]. The specific campaign has been initiated to spread the precautionary measures, which can often increase the awareness amongst the population. The specific campaign has involved various IT professionals to design the event layouts. The specific aspects have helped the governments to increase the awareness by promoting the further probable mistakes that often leads the populations to be the victim of the cyber crimes. Moreover, the government has already set a target of 2 billion of the cyber security exports in the year 2016. The specific initiation has been taken by forming joint venture initiatives by the cyber growth partnership to establish the cyber security business cluster in the internal region. The government has also promoted the cyber security expertise in the international market to reduce the discrepancies. A clear trend of cyber attack has emerged in the past couple of years. The cyber attackers are increasingly target the important data such as business deals, mergers, property deals and the contracts. For an example the point of sale interruption, denial of service attacks and the web application attacks are majorly responsible for 76% of cyber security incidents in case of the retail industry [14]. Inference can be drawn from the latter context that the figure of expenditure in military protection around the web application attacks, payment card duplication and rejection of service attacks, most of the financial services firms can cover 75% of cyber security incidents[15]. Supervisory Control and Data Acquisition (SCADA) system are one of the major methods in cyber security risk assessment. The SCADA is a type of Industrial Control System (ICS) that controls the process in the industrial sector[16]. This process is helpful to identify the threats that enable most of the security att acks. It has been identified that there several threat patterns that the users faced due to the issues of cyber security. Majority of the threat patterns are as follows: Malware aimed Insider misuse Physical theft or loss Web app attacks Denial of service attacks Cyber spying Point-of-sale interruption Payment card skimmers Apart from this, there are several errors such as sending an email to the wrong personnel. While most of the organisations are deteriorating to keep up the cyber crime, the latest report on cyber crime indicates that big data analytics can reduce the security risk. By adopting the big data analytics into the security risk management, the organisation can turn the wave[17]. Therefore, this approach becomes helpful to the organisation to identify contravene for reducing the time of attackers. This process is helpful to infiltrate the data which is undetected. The cyber spinning is more complex and diverse in nature is continuously increasing since 2007. For an instance, since 2013, China continues to lead in cyber spinning as the most of the website faces the espionage activity [18]. Adding to this, the Eastern Europe region faces the 20% cyber spinning attacks. It has been observed that the Distributed Denial of Service (DDoS) attacks to make the networks and subsystem inaccessible so that the website becomes useless. This type of problems are very frequent to the retail, financial services, information, professional and public sector industries[19]. The NetFlow protocol originated in the 90s is an essential for networking equipment like the routers in order to precise the information on IP (Internet Protocol) activity. MTD system theory is based on the concept of a configurable system which is defined as the configuration parameters. Each configurable system is the aggregation of the current system for all the configuration parameters related to the MTD system. As per the scholars, an MTD system allows to modify the values of the configuration parameters within the configuration state[20]. The MTD system theory is an adaptive system that captures the goal both for the operational and security measures. It has been speculated that adaptations are defined as a sequence of actions to change the system from the starting configuration state to another suitable configuration state. The fundamental system definition of MTD system theory is varied for different cyber security circles. Configuration is one of the first steps that set the valid states of MTD system. The concepts of diversification indicate the diversified system spaces while configuring the system[21]. The randomization helps to randomise th e techniques to adapt the system configuration for improving the system effectiveness. Furthermore, the success of the cyber attack theory depends on its information possessed by the attacker when the attack is commenced. Thus, it has been revealed that information is one of the essential elements of the theory of any cyber attacks [22]. The MTD system theory includes the notion of the configuration of the parameters that incarcerate the information about the configuration of the computer system. Cyber Attack Theory defines the attacks and the attackers knowledge regarding the information parameters [23]. The association between an MTD system's configuration parameters and attack's information parameters, the system administrator, can officially analyse the interactions between the attackers and MTD systems. The operational cyber security theory describes how an organisation develops and maintains a measurement of a program regarding the security. For an instance ISO/IEC standard, 27000-4 and NISTs security metric guide are the potential examples of operational cyber security theory. Adding to this, a general qualitative models has presented over there to describe the set of variables and the required concepts in the security domain [24]. The CORAS consists with a metamodel over the security field to support the security system. For an example, it has been identified that the qualitative model has a special attention on SCADA (Supervisory Control and Data Acquisition) systems to control the complete energy system. Thus, an inference can be drawn that these methods, security metamodels, technical references and the conceptual can support the cyber security assessment program [25]. It is also helpful to define the operational cyber security metrics. Therefore, it can be inferred that IT sy stem cyber security is also important to assess the cyber security measures. The examples of the operational cyber security theory include attack trees, threat trees, protection trees and defence trees attack [26]. Furthermore, the theory of combined cybers security values of a single system to a value for a different system-of-systems. It works as a network and actual trees together for the attack success probabilities. The operational cyber security theory has an inherent quantitative constituent that makes the metrication and estimates the required effort to achieve an attack in a straightforward way. The rapid technological development has provided a vast area of new opportunity and the potential sources for all types of organisation. The Cyber Security is the protection of the system, networks and the data in cyberspace. It is essential to preserve the critical security system of the business. It has been observed that the cyber security industry is growing rapidly. More malware, viruses are being launched by the hackers and specialists day by day [27]. The current statistics indicates that 230,000 new malware samples are being launched on a regular basis [28]. Thus, the more potential resources are being deployed for the counter cyber attacks. The following facts describe the current cyber security related information and problems to define the current information security landscape. Amongst the several facts of cyber crime, one of essential facts is the estimated annual cost for the cyber crime which is almost up to 100 billion dollars. These types of monetary fund come to the hackers by targeting the corporations, banks, other wealthy celebrities and even the individual general users. The Zero Day attack is one of the most powerful malware warnings that can be very dangerous for the users [29]. In this current scenario, it has been guided by the different scholars that the users require to keep up to date the software and the news regarding the cyber security system. It is expected that this process would be helpful to identify the cyber attack for securing the financial and confidential information. Furthermore, the most expensive computer virus is MyDoom which was identified in 2004. This is one of the most expensive fastest spreading email worms across the world. It has been speculated that the estimated financial damage for this virus is $38.5 billion [30]. MyDoom is transmitted via email and hidden as spam email. The cybercriminals get access to the personal computer through this virus. In the addition, the social media is the other option that is the most favourite place for the hackers. The in-depth statistic reflects that more than 1.6 billion social network users are there in the worldwide and more than 64% are the users of the internet and have chances to get infected though email worm and viruses [31]. The link-jacking, phishing and the social spam are the most unwanted problems faced by the users while the people used the social media option. The past scholars advised that do not click on any strange link could be the feasible decision to avoid the cyber attack on soc ial media. Policing in cyber security is significant apart from the Policing Suite of programmes. This programme helps the student with a strong and predominant grounding in policing. The policing suit provides the opportunity for each of the students top specialise in police and policing associated with the related context. As per the opinion of the previous scholars, this is helpful to enable a more intensive understanding regarding the current context. Policing is important for the students to learn the emerging trends in the cyber crime and the international, borderless crime [32]. The evidence-based policing, crime scene and the police governance practices has to be understood by the learners. As per the knowledge of the practical example, the students are encouraged to become volunteers within the criminal justice system. For an example, the opportunities include the volunteering in local police organisation, special constable and the other offenders within the community. The local and st ate level cyber officer would have a degree in cyber security to handle the forensics and the other information networking. The telecommunication factor is one of the minor justices in this type of study. The computer networks and the technology enable the officers to create and maintain the protect law enforcement database. This contains the vital information for avoiding the cyber attack. On the other hand, the Telephony-Denial-of-Service attacks (TDoS) are the other function that maintains the standard DoS attacks. The cyber criminals follow this type of attack to extort the government agencies. Furthermore, the cyber hackers are being successful by exploiting the poor security level. The poor tracking opportunity with the spyware can create a fake employee IDs to gather all the required information. The current statistic on cyber crime indicates that 60% of the businesses are losing the valuable IP and the associated records for the problem of cyber crime [33]. The Internet of Things (IoT) introduces a new cyber security challenges and the vulnerabilities for the aircraft. In this current scenario, the annual IBM X Force Cyber Security Intelligence Index report indicates that the business industries are the most affected region for the cyber attacks [34]. The key factors that enable the attackers is the current threat landscape. The team of IBM X Force Cyber Security intelligence works dedicatedly to keep the records of the clients and the latest cyber security threats. In the context of Cyber Security Policy, the National Research Council Computer Science and Telecommunication Board provide the nexus of cyber security policy and the required public policy. The six major findings provided in the informed discussion possess the policies and the events to avoid the cyber crimes [35]. In this regards, it has been speculated that the US has invested a lot amount of money for a proactive Public Policy per cyber security. Monitoring applications with access to the data would be the best effective methods to improve the cyber securities. It has already been assessed that the applications create an enormous impact on the software. It tends to provide the business with the necessary required for the functioning and productivity purpose. The application also bears the sensitive data at risk[36]. When the IT security attempts to defend the critical information, it usually tends to include by raising up the firewalls and edifice the infrastructure around the data that the enterprise prefers to protect. After which the IT experts provides the applications access to this data. The moment the hackers look attempts to hack the data, the security measures in the database system creates an alert. This often tends to minimise the risk of the data-stealing action. A collection of the detailed logs is other precautionary measures that often tend to protect the cyber leakage actions. It is extremely important to make sure that the IT network is secure[37]. The management of the enterprise needs to be very careful enough to hand over the IT related works to the concerned employee. Since, the IT expert would have a detailed knowledge regarding the cyber transactions and the overall data of the firm. Therefore, the expert needs to receive the advice of creating an access control of the entire internal database. By establishing the specific access controls for the entire user base, the entire data can be maintained within a strict security measure[38]. Finally, the users would have the choice of expositing the sensitive data to the before the preferred account holder. Maintaining the security patches is a significant action for preventing the cyber crimes[39]. The researchers have claimed that the cyber criminals are persistently investing on new tools to hack ion the database of the existing users and mentally assaulting the users. In the same manners, the Governments are also executing a persistent effort in innovating the tools and the precautionary measures to futile the efforts of the cyber-criminals. The moment theHome Depots POS systems have been hackedin the last summer, the systems have been in the process of installing the new security patch that would have creates a complete protection over the data[40]. The maintain the entire server network protected, it is essential to make sure that both the hardware and the hardware security is up to date with its new antimalware signatures or the patches. The cyber security related framework can connect the architecture models to assess the cyber security. To the specialist audience, cyber security is important to reduce the risk of the organisation for building the capabilities in three significant areas such as prevention, detection and response. As per the view of the scholars, prevention is a most significant option for governing the problem. This process includes the installation of the fundamentals requirements and the responsibility to deal with the cyber attackers within the organisation. Thus, it is important for everyone to identify the cyber attackers efficiently. Adding to this, detection is important to monitor the incidents. It has been speculated that the organisation can strengthen the technological detection to identify the cyber attacks. On the other hand, excellent equipment facility for data mining would be helpful to detect the data traffic and the other sudden strange patterns within the data parity [41]. This pr ocess is also helpful to monitor and control the system performance within the organisation. Furthermore, being responsive is the other significant part to activate a well-designed plan to resist the cyber attackers. The organisation can only be responsible for activating and deactivating the technological module as per the requirement of the scenario. It is essential to preserve a prospective recovery plan while developing the response to make a counter attack against the cyber criminals [42]. Moreover, it is a continuous process and required more staffs to execute the plan successfully. Understanding the cyber risk is also necessary for the non-specialist person to avoid social damage. The illegal digital activities targeted the organisation and the individual personnel for making harm. The users require understanding the hacking activity and the categories of hacking to keep safe the society and the community. The users can learn various mode of cyber security through a website and from the technical personnel to keep the information safe. To avoid social media hacking users do not click on any link to the website and the personal email. The people has to follow the safe website like government registered site while making an online financial transaction [43]. This process can save the banking information and data. The most internet users need to use the anti-malware application to keep the personal computer safe from the hackers and the other cyber attackers. The use of interconnected devices and the other technical safeguards like the firewall in the home network would be an effective step to avoid the hacker's activities. Moreover, use of common sense is highly essential to be saved and the keep the data secured. The quick cyber security tips provided by the scholars demonstrate that double cheeking the appliances and the devices can raise the user awareness for the security measures. The users would also require to safe the smart TV for avoiding the hacking activities [44]. Additionally, use of trusted DNS services such as OpenDNS would be beneficial for minimising the cyber crime issues. The users also have to be very careful with the mobile devices and the personal computers. In the circumstance of the existing subject matter, the researchers have expressed that the complex server networks have penetrated towards the mobile devices. Therefore, the virtualised environment is pushing the demand for the cyber security professionals to extend the outside perimeter within the system[45]. The Smartphone revolution is throwing more complexities into the mix. The risk to secure the data and system is severely multifold, since, the customers are registering on the mobile applications by enterprise the sensitive data. The cyber criminals have the gets the personal information from the specific vulnerable applications and create harassment over the users[46]. Therefore, the engineers require designing the application software that hardly demands the sensitive information of the users. It is highly understandable that the application demands the personal information to maintain a thorough track of the user numbers using the individual applications. Therefore, the det ails of the users are highly essential to maintain the cyber securities. However, the hackers are targeting on the specific set of the personal information of the users and leading to humiliation. 82% of the employees have reported of not having the appropriate IT experts within the business[47]. Therefore, the managements are required to train the IT professionals regarding the innovative method stat often lead to provide the premium end security services to its users. Using the secure remote access methods is highly essential to cut short on the practices of the cyber criminals. It has been assessed that the ability to connect remotely to a network has included a huge deal of expediency for the end users. However, a preventive access method, for example, the Virtual Private Network (VPN), needs to be used in case the remote access is necessitated. The VPN is considered as the encrypted data channel for the securely sending and receiving the data through the public IT infrastructure. With the support of a VPN, the users are enabled to remotely access the internal resources like printers, files, databases and the websites[48]. The specific set of the remote access can further be made strong by reducing the integer of Internet Protocol (IP) addresses. This can be obtained it by using the network devices and the firewalls to the specific IP addresses. O n the other hand, it has been inferred that the VPN is exclusively a security measure that gets con nected to devices[49]. In case a laptop or a computer gets infected with the malware can lead to introducing those vulnerabilities into the network. This often led to introduce the new infections and negating the security of the VPN. Maintaining the awareness regarding vulnerability would be the arrival of the new situation to increase the practices of the professionals. The majority of the vendors work diligently to establish the patches for recognising the vulnerabilities. However, even after the patches and the updates are released, different systems remain vulnerable due to the casual approach of the management towards the server related issues[50]. As per the Data Breach Investigations Report of 2015, the Verizon figured out that several breaches have enabled by hardly addressing the common vulnerabilities. The statistic expressed that 99.9% of exploited vulnerabilities have been compromised in the specific year after the public disclosure of the problems. Moreover, the Ciscos 2015 Annual Security Report figures out that 40% of CISO employees interviewed in a survey claimed that the company has no system patching programs in the place[51]. The specific set of the unpatched vulnerabilities often leads to incl ude the low-hanging fruit of which the cyber criminals can easily take advantage of. Enforcing policies on the mobile devices is another additional measure to uplift the cyber securities. The previous studies reflect that the proliferation of the laptops, tablets, smartphones, and other several mobile gadgets within the workplace bears the significant security challenges[52]. The mobile nature of the specific smartphone devices displays that the devices are potentially exposed to the external users, compromised with the applications and networks and malicious actors. Further supporting the certain challenge organisations are allowing the increasing trend to its employees to use the personal electronic devices for the professional purposes, which is termed as the Bring Your Own Device (BYOD) phenomenon[53]. Thus, it is highly essential to establish the policies on the verge of certain reasonable limits of mobile devices in the professional networks. The particular sets of measures need to be strictly enforced for all the employees base, as well as for the IT engineers[54]. The devices also need to be password protected to make certain that only the authorised users can log-in. I n the case of discrepancies, an unauthorised user can easily access the restricted networks and files can be misused to the authorised user's device. The preset study emphasises the importance of having security measures to reduce the rate o the cyber-related crimes. Evaluating the study, an inference can b drawn that the governing authorities of remote regions are providing the relative financial support to increase the cyber security measures. However, certain percentages of the industrial firms are taking are filing to take the precautionary measures even after receiving the virus-related symptoms. Moreover, the casual attitude of the IT experts often leads the brand to have unknown data exposure actions. Therefore, the organisations and the government need to make a persistent effort in developing the security tools to decrease the cyber-related issues. Reference: Amoroso, Edward G. Cyber Security. Kingston, NY, United States: Silicon Press, 2006. Awan, Imran and Brian Blakemore. Policing Cyber Hate, Cyber Threats and Cyber Terrorism. United Kingdom: Ashgate Publishing, 2012. Bayuk, Jennifer L. Cyber Attacks. Computers Security 31, no. 2 (March 2012): 251. Carpentier, Deborah. NERC and Enforcement Issues: NERC Gains in Vegetation Management, Cyber and Physical Security, and Reliability Assurance. Natural Gas Electricity 30, no. 10 (April 16, 2014): 2932. Chen, Dong. A Survey on Security Issues of M2M Communications in Cyber-Physical Systems. KSII Transactions on Internet and Information Systems 3, no. 2 (2012): 69103. Clarke, Richard A. and Robert K Knake. Cyber War: The Next Threat to National Security and What to Do about It. New York: HarperCollins Publishers, 2011. DeVilliers, Meiring. Enabling Technologies of Cyber Crime: Why Lawyers Need to Understand It. Pittsburgh Journal of Technology Law and Policy 11, no. 3 (April 1, 2011): 118. Ghernaouti, Solange and Solange Ghernaouti-Helie. Cyber Power: Crime, Conflict and Security in Cyberspace. Boca Raton, FL, United States: EFPL Press, 2013. Grabosky, Peter. Requirements of Prosecution Services to Deal with Cyber Crime. Crime, Law and Social Change 47, no. 4-5 (October 13, 2007): 20123. Greenbaum, D. Cyber Crime 2.0. Science 348, no. 6231 (April 9, 2015): 19394. Healey, Jason, Jeffrey Schmidt, Jennifer L Bayuk, Joseph Weiss, Marcus H Sachs, and Paul Rohmeyer. Cyber Security Policy Guidebook. United States: John Wiley Sons, 2012. Jones, David. Cyber-Crime How Much Is There and What Is Anyone Doing about It? Card Technology Today 19, no. 11-12 (November 2007): 16. Kizza, Joseph Migga. Computer Network Security and Cyber Ethics. New York, NY, United States: McFarland Company, 2006. Kowalski, Robin M., Susan P Limber, and Patricia W Agatston. Cyber Bullying: Bullying in the Digital Age. 2nd ed. Malden, MA: Wiley-Blackwell (an imprint of John Wiley Sons Ltd), 2012. Lehto, Martti. The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. International Journal of Cyber Warfare and Terrorism 3, no. 3 (2013): 118. Lewis, Coleen. Social Media - Cyber Trap Door to Defamation. Masaryk University Journal of Law and Technology 9, no. 1 (June 30, 2015): 3544. Li, Tao, Jiannong Cao, Junbin Liang, and Junhao Zheng. Towards Context-Aware Medical Cyber-Physical Systems: Design Methodology and a Case Study. Cyber-Physical Systems 1, no. 1 (November 10, 2014): 523. Liu, Jing, Yang Xiao, Shuhui Li, Wei Liang, and C. L. Philip Chen. Cyber Security and Privacy Issues in Smart Grids. IEEE Communications Surveys Tutorials 14, no. 4 (2012): 98197. McCusker, Rob. Transnational Organised Cyber Crime: Distinguishing Threat from Reality. Crime, Law and Social Change 46, no. 4-5 (March 23, 2007): 25773. McGuire, Mike and Samantha Dowling. Cyber Crime [electronic Resource]: A Review of the Evidence: Summary of Key Findings and Implications. United Kingdom: Home Office, 2013. Medlin, B. Dawn. Social Engineering Techniques and Password Security: International Journal of Cyber Warfare and Terrorism 3, no. 2 (2013): 5870. Mohd Ali, Maziah. Determinants of Preventing Cyber Crime: A Survey Research. International Journal of Management Science and Business Administration 2, no. 7 (2015): 1624. Pegram, Bob. 10 Alarming Cyber Security Facts That Threaten Your Data [Updated]. May 12, 2016. Accessed September 26, 2016. https://heimdalsecurity.com/blog/10-surprising-cyber-security-facts-that-may-affect-your-online-safety/. Power, Andrew. The Psychology of Cyber Crime: Concepts and Principles. Edited by Grainne / Kirwan. United States: Information Science Reference, 2012. Reyes, Anthony, Richard Brittson, Kevin OShea, and Jim Steel. Cyber Crime Investigations: Bridging the Gaps Between, Security Professionals, Law Enforcement, and Prosecutors. United States: Syngress Publishing, 2007. Robinson, Michael, Kevin Jones, and Helge Janicke. Cyber Warfare: Issues and Challenges. Computers Security 49, no. 2 (March 2015): 7094. Rogers, Michael. A Challenge for the Military Cyber Workforce. Military Cyber Affairs 1, no. 1 (December 2015): 22829. Seam, Neelam. Cyber Crime Against Women. IMS Manthan (The Journal of Innovations) 8, no. 2 (September 15, 2015): 4769. Security, IBM. IBM Cyber Security Intelligence Index - United States. September 19, 2016. Accessed September 26, 2016. https://www-03.ibm.com/security/data-breach/cyber-security-index.html. Shah, Niral and Naveen Vaswani. Cyber Crime and Security- Challenges and Security Mechanisms. International Journal of Engineering Trends and Technology 36, no. 7 (June 25, 2016): 36771. Shrivastava, Anshul. Cyber Security: Issues and Privacy. Communications on Applied Electronics 3, no. 4 (November 25, 2015): 1216. States, United. Cyber Security: Responding to the Threat of Cyber Crime and Terrorism: Hearing Before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, First Session, April 12, 2011. Washington: Government Printing Office, 2011. Terrorism, Nonproliferat Subcommittee on. The Evolution of Terrorist Propaganda: The Paris Attack and Social Media. San Bernardino, CA, United States: Createspace, 2015. Vacca, John R. Cyber Security and IT Infrastructure Protection. Waltham, MA: Syngress Media,U.S., 2013. Voelker, Rebecca. FDA Tackles Cyber Drug Crime. JAMA 316, no. 5 (August 2, 2016): 48586. Wang, Shiuh-Jeng. Measures of Retaining Digital Evidence to Prosecute Computer-Based Cyber-Crimes. Computer Standards Interfaces 29, no. 2 (February 2007): 21623. Yeboah-Boateng, Ezer Osei and Elvis Akwa-Bonsu. Digital Forensic Investigations: Issues of Intangibility, Complications and Inconsistencies in Cyber-Crimes. Journal of Cyber Security and Mobility 4, no. 2 (2016): 87104. Zhang, Yanping, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang, and Hongmei Deng. A Survey of Cyber Crimes. Security and Communication Networks 5, no. 4 (July 13, 2011): 42237.
Nestle Corporate Business Marketing Principles Free Sample
Question: Discuss about theMarketing Principle for Nestle. Answer: Introduction Nestle is a vibrant company that provides a broad range of products to the customers, which represent global standards. The organisation is highly dedicated to the long- term goals with sustainable growth and satisfaction of the shareholders. The reputation of Nestle has expanded greatly, which indicates that the company is doing very well globally. According to Bahadir et al. (2015), Nestle always believes in establishing a benchmark in the food industry. Such a standard is demarcated by providing healthy and nutritious food to the customers. The company integrated a well-structured marketing communication, which inclines a clear message to the customers. As per the opinion of Helm and Gritsch (2014), every organisation needs to grow a clarity in the marketing objectives and follow the strategies to obtain the goals. Nestle also plans scientifically to formulate the best-accepted marketing strategies. The main aim of the firm is to serve the customers with proficient goods and to maintain the standard. The company always try to design innovative marketing strategies for both local as well as international market place. The RD department of Nestle undergo market segmentation process to understand the customer behaviour and needs. The objective of such innovations is to acquire and retain the customers and make the huge profit. Evaluation of Marketing Mix The marketing mix of Nestle confers the 7Ps, which aids the firm to be the strongest FMCG companies of the world. The marketing mix of Nestle boosts up, due to the presence of high product line. The various elements of marketing mix are as follows:- Product Being the world's largest healthy and nutritious food company, it has almost six thousand products, which is widespread in range. Nearly all the daily use goods and occasionally used commodities are a part of Nestle. Several tactical business units within Nestle manage the large food products. The groups segregated the products mainly in 4 categories to maintain the standard and ease in manufacturing the products. The categories are including beverages, milk and dairy products, chocolates and prepared dishes and cooking aids. According to Dominici (2009), these classes are then subdivided into several sections as per the customer choices including different sizes and flavours. Before introducing the products in the market, the RD department undergoes a series of screening. This process includes food processing, micro- analytical research and proper checking of delivery activities so that the customers would get a good commodity. The UHT treatments and tempting and great lasting tetra packaging are the measures for packaging of milk products. The priority of Nestle is to give quality nutrition, and various information is provided on the packages so that customers can check as per preferences. The maintenance of high quality made Nestle as one of the most appreciable company without much complaint in the market. Price The key factor of success of Nestle in the international market is due to the flexible prices of the products (www.theseus.fi, 2014). The company fixes the price, which is reliant on the market for each product. The marketing strategies of Nestle consist of wide-ranging of pricing strategy, which allows them to maintain the prices at a sustainable phase. For example, Maggi and Nescafe are the clear leaders of the market and are priced with high margins for the firm even after the competition. Such pricing becomes possible because the quality of the products is exquisite. Thus, the skimming price will not affect the customer to switch the brands. In addition to this system, Nestle also keeps the prices affordable to almost all the layers of customers. For example, in the case of beverages, the fruit juices are available for the low economy class while the costly tin packed beverages are also doing well. The potency of pricing for Nestle comes from the exclusive packaging. The company offers a variety of sizes and package options. As the market share leader, Nestle enjoys economies of sales, production cost and flexible price distribution help to stand out even in competitions. Other products like KitKat and Munch face competitions from other companies, which is backed up by the competitive pricing. Thus, with such vast varieties, the customers can make own buying decisions as per the requirements. Placement The company follows the FMCG style of distribution that involves breaching the bulk. This system helps the firm to work worldwide. The company has a large number of operating centres that are being run in almost 86 countries. The sales occur globally and impulsively. The products of Nestle have the central business area in Europe, from where nearly 90% of sales and revenues generate. According to Bliss and Cooke (2011), the products are not directly launched in the market but are introduced systematically. The company follows an organised pattern of distribution that includes manufacturing, CF agents, distribution, wholesalers, retailers and finally consumers. Nestle always look forward to expanding the outlets. Thus, the broad range of products is available in maximum stores. Promotion Nestle have the constructive planning department that works for the promotion of the brand. The management is always ready to pay multiples of the estimated sum. According to Richter (2012), Nestle embraced push and pull strategy. Through advertisement, the company creates a demand vacuum that persuades the customers to buy the products. Additionally, the firm utilises the distribution's sales forces and trade promotional activities to push the brands through electronic and print media. The advertisements along with alluring figurations of the brand always prove superior. Thus, it can be said that Nestl's publications pull the consumers from the market. People To achieve competitive advantage, Nestle always promotes internal marketing to attain maximum performance from the employees. The recruitment teams of the company are decentralised, well- selected and locally responsive. Due to the diverse working environment enable the staffs to respond appropriately and minimise the consequence of cultural variations. There are some non-negotiable standards for the suppliers, agents, etc. to ensure high customer services. According to Powers and Loyka (2010), almost 95% of jobs are filled by internal promotion, which motivates the employees to a great extent. The competitive system of wages and benefits are present for the employees which are highly encouraging. Process The customers have authority to contact the firm through email or phone with an effective customer relationship management. Through inventory control system, the product is readily available to avoid customer dissatisfaction. The manufacturing department works constructively to prevent any stoppage in the process of production. This active participation helps the organisation to maintain a continuous supply in the outlets. Physical Evidence The company always introduce the nutrition levels on the packages of the products to give real hints to the customers (www.nestle.com, 2014). For example, the packaging of Cerelac contains nutrition table with "stage indicators" and infant formula to help the mothers to take the right decision. This step helps the customers to develop awareness and loyalty. Short- Term Perspectives The company's immediate perspective is to provide the clients with proper nutrition, health and wellness. To fulfil this criterion, the managers are continuously trying to adopt such strategies that can provide welfare to the customers. According to Manna and Smith (2011), the main aim of the management of Nestle to provide a healthier lifestyle. The administration adopted the industry- leading research and developmental drives to bring highly innovative products. Also, there is a regular renovation of the food and beverage portfolio to attract the new customers and retain the client loyalty. The researchers of Nestle are always exploring the role of nutritional therapies to improve the health of the customers and also help to maintain (Chaffey and Smith, 2012). The company is also taking initiatives to share the insights on global nutrition and health challenges. This initiative builds a partnership and engages the various stakeholders to strive a positive impact on the societies wh ere the company operates. The marketing managers also make strategies that can empower the public to make effective buying decisions. The Management also initiated many health care programs to guide the parents more systematically (Dang, 2014). The interactive and science based instruction program "start healthy and stay healthy" help the parents to provide newborn kids with balanced nutrition. The United for healthier kids program carries this ahead and aids the caregivers to establish healthier eating and drinking habits. The company also works vigorously to encourage the physical activity along with the healthy eating practices. Additionally, the company also delivers the commitment to reduce the use of salt, sugar and saturated fats in the products and eliminate the trans fats. The firm is also trying to enhance the portion guidance and get better labelling and printing GDAs ( Guideline Daily Amounts) so that the customers can quickly read the specifications (Goi, 2009). Thus, the firm always keeps on acc elerate the strategies so that the customer's well-being can be achieved. Long- Term Perspectives According to Codita and Belz (2010), it is vital for every organisation to correlate the marketing objectives with the corporate strategies. The management of the firm always strives to meet the rapid- changing expectations of the customers. It is very critical for the organisation to maintain a sustainable growth and trust in the minds of the customers. The management of Nestle always concerns about maintaining the reputation and goodwill in the market. After the food contamination issue in Australia, the management becomes more conscious towards the customer healthcare issues. The managers of various departments work in a synchronised manner to adopt a public friendly system. The main aim of adopting such strategies is to attract more people and to retain the previous customers. The firm cares deeply about the food safety and quality in a sustainable way. It is imperative to behave responsibly in various operational activities to bring accuracy and standard. As per the opinion of J ackson (2009), it is the fundamental belief of the company to thrive the long term perspective by creating value for the shareholders. At the same time, the value is created for the society also. The another objective of the company is to ensure the Nestl's name to be identical to the products of supreme quality to hold the customer base. It is also essential for the firm to embrace the client loyalty for prolong period. Recently, the reports showed that the organisation is pursuing the policy of diversification and spreading out through divestment and acquisition. The system is adopted to accomplish a more even-handed structure to the business. Another aspect of the adoption of such policies is to provide the consumers with more innovative products so that the customer's choices can get preferences. According to Polo and Cambra (2007), with the implementation of integrated marketing communication (IMC), the firm's ability to reach the right customers has improved. Thus, it becomes easy for the company to send right messages to consumers at the right time to preserve the customers and increase the value proposition rate. Conclusion After evaluating the above study, a conclusion has been drawn that Nestle formulates critical marketing strategies to monitor and analyse the success. Nestle emerged as one of the market leaders in the food industry with the adoption of different marketing strategy. The company maintains the quality and possesses a flexible product line. The prices of the products are fixed in a way that suits almost all levels of consumers. The flexible pricing strategy makes the brand suitable and favourable for everyone. The company also follows a systematic criterion during the introduction of the products to avoid inaccuracy. The attractive advertisements generate a demand vacuum by the people that push the consumers to approach the commodities. According to Pornpitakpan (2010), the firm has a good reputation in the global market, which summarises that majority of users use Nestl's products. The short-term perspective of the company is to maintain the quality of the goods so that the wellness of the consumers can be valued. The aim of the management is to provide a healthier lifestyle with innovative product and safe packaging. However, in the long run, the company follows strategies to attract more customers and retaining the previous ones. Therefore, values are given to the various shareholders to bring a sustainable growth and development. References Bahadir, S.C., Bharadwaj, S.G. and Srivastava, R.K. (2015) Marketing mix and brand sales in global markets: Examining the contingent role of country-market characteristics, Journal of International Business Studies, 46(5), pp. 596619. Bliss, T.V.P. and Cooke, S.F. (2011) Long-term potentiation and long-term depression: A clinical perspective, Clinics, 66, pp. 317. Chaffey, D. and Smith, P. (2012) Emarketing excellence: Planning and optimizing your digital marketing. 4th edn. New York, NY: Taylor Francis. Codita, R. and Belz, F.-M. (2010) Contingency factors of marketing-mix standardization: German consumer goods companies in central and eastern Europe. Wiesbaden: Gabler Verlag / Springer Fachmedien Wiesbaden GmbH, Wiesbaden. Dang, T. (2014) The success of applying marketing mix 4Ps in Vietnamese dairy industry Vinamilk a typical case. Available at: https://www.theseus.fi/bitstream/handle/10024/85926/Dang_Truc.pdf?sequence=1 (Accessed: 26 September 2016). Dominici, G. (2009) From marketing mix to e-marketing mix: A literature overview and classification, International Journal of Business and Management, 4(9). Goi, C.L. (2009) A review of marketing mix: 4Ps or more?, International Journal of Marketing Studies, 1(1). Hajiheydari, N. and Khakbaz, S.B. (2015) Assessment of long-term effects of marketing mix policies:, International Journal of Systems and Society, 2(2), pp. 122. Helm, R. and Gritsch, S. (2014) Examining the influence of uncertainty on marketing mix strategy elements in emerging business to business export-markets, International Business Review, 23(2), pp. 418428. Jackson, A. (2009) Can social marketing bring about long-term behaviour change?, Perspectives in Public Health, 129(6), pp. 260261. Manna, D.R. and Smith, A.D. (2011) Measuring the theoretical paradigm shift from marketing mix to relational marketing, International Business Economics Research Journal (IBER), 2(11). Nestle (2014) Available at: https://www.nestle.com/aboutus/strategy (Accessed: 26 September 2016). Polo Redondo, Y. and Cambra Fierro, J.J. (2007) Importance of company size in longà term orientation of supply function: An empirical research, Journal of Business Industrial Marketing, 22(4), pp. 236248. Pornpitakpan, C. (2010) The effect of option choice framing on short-term regret from actions/inactions: Implications for marketing strategies, Australasian Marketing Journal (AMJ), 18(3), pp. 132137. Powers, T.L. and Loyka, J.J. (2010) Adaptation of marketing mix elements in international markets, Journal of Global Marketing, 23(1), pp. 6579. Richter, T. (2012) International marketing mix management: Theoretical framework, contingency factors and empirical findings from world-markets. Berlin: Logos Verlag Berlin GmbH.
Subscribe to:
Comments (Atom)