Saturday, December 28, 2019

Cyber Attacks And Its Effects On The Nation s Economy

Present day events have shown that cyber-attacks are becoming more prevalent and sophisticated on the internet especially against our nation’s Critical Infrastructures (CI). One of them being the U.S. electrical power grid is also a national security risk that is currently vulnerable to cyber threats from malicious actors on the intent of causing a power blackout. The lack of protection on the power grid can result in an operational nightmare that can cause other government entities or specific CI targets that rely on the power grid to be non-operational. The consequence of a blackout would cost billions and can affect millions of people in the United States by delaying essential services needed to keep the country operational, which is essential for the nation’s economy and security. The complexity to understand cyber threats is ever changing due to technological advances and methods being used by computer hackers. The nation’s electricity system consists o f generators and regional networks of interconnected transmission lines that are vulnerable to a cyber-attack. However, with increased reliance to develop a smart grid to improve system operability such as supervisory control and data acquisition (SCADA) to monitor load balances remotely using internet protocols comes more risk for intruders. This paper will identify the risks associated with the electric grid and discuss the proposed new policy approaches that will help the electric industry which have beenShow MoreRelatedShould Government Implement Laws For Cyber Crime?977 Words   |  4 Pagesprevent cyber crime† Today is the era of technology and globalisation, as it connects the whole world together but also opens new ways to crime. Cyber crime is the result of negative use of technology. Cyber crime refers to a crime which is committed through internet or computer. Cyber crime is of differenr types like stealing of money or information, piracy, electronic vendalism that is destroying or changing the electronic information. Cyber terrorism which threatens not only one single nation butRead MoreChina Saper Threat777 Words   |  4 PagesWeak USA Cyber Policy vs China’s Security Threat to the USA? Abstract A cyber spy network based mainly in China hacked into classified documents from government and private organizations. One of the biggest questions still remains unanswered. Should the U.S. Congress conduct an in depth assessment of Chinese cyber spying and consider imposing tougher penalties on companies that benefit from industrial espionage. In this paper I will review china’s cyber threat and possible USA solutionsRead MoreGovernment Regulation By The Private Sector Essay1570 Words   |  7 PagesIntroduction Today, our nation is under constant attack by hackers, terrorist groups and other enemies. Unfortunately regardless of how innovative our government or private sectors have become with securing the network systems, the frequency and intensity of the attacks have only increased. Over the last decade, security breaches and cyber-attacks have highlighted how dependent our nation is on its critical infrastructure. It was concluded that a total of 54% of cyber-attacks targeted the US in 2013Read MoreThe Cyber Defenses Of The United States887 Words   |  4 PagesStates come under attack weekly if not daily and their cyber defenses must be kept up to par otherwise there will be an extreme loss of information and resources. FBI director James Comey can be quoted as saying â€Å"There are two kinds of big companies in the United States. There are those who ve been hacked by the Chinese and those who don t know they ve been hacked by the Chinese† (Comey). Comey can also be quoted as having said that, â€Å"China was seeking to obtain information that s useful to themRead MoreCyber Espionage Attacks And Cyber Attacks1662 Words   |  7 PagesCyber Espionage Attacks This kind of attacks differ from other types of cyber-attacks as they have a different source from where the actual attack comes from, which is mainly from within the organization that is being attacked. It may be the most difficult type of attack in which organizations are able to defend themselves from, for example if the attack is emanating from an individual that holds a high rank within the company. Taking an example of the United States where the government has a processRead MoreIs Cybercrime A Type Of Crime That Is Committed Over The Internet?1206 Words   |  5 PagesThe uses of Internet and computers have made life much easier; technology in general has improved the economy, medical research, and healthcare. Internet and computers have become a huge part of many people s lives in this era; it allows individuals to stay in touch, find information, and even make a living through online businesses. When there are positive points, there are bound to be some negative ones, and that is Cybercrime. Cybercrime is a type of crime that is committed over the InternetRead MoreThe Threat Of The Industrial Control System1315 Words   |  6 PagesNIST SP800-82 section 3.2 contains a table showing Adversarial Threats to ICS. For your discussion this week, you need to pick two of these and explain it in your own words. You also need to include an explanation of the potential risks to ICS s due to the threats. This means the impacts, consequences, and likelihood associated with each threat type. If possible, include an example of the threats. There are many threats which have the potential to impact industrial control systems. These threatsRead MoreThe United States National Security Strategies1398 Words   |  6 Pagesby the re-emergence of the Russian Federation and its subsequent rise in economic power. Another threat of significant concern can be found with Iran’s persistent efforts at attaining nuclear power; along with the asymmetrical threat of a terrorist attack, both at home and abroad. Regardless of the known security threats which inhibit Americans hunger for change and progression, we have reached a critical time in American history. As a result of our political and economic position, our military isRead MoreHow Technology Has Changed At A Remarkable Speed1470 Words   |  6 PagesOnline Collaboration, and Social Media are all well-known examples of the modern era inventions. They have radically changed the way we live our lives and depict ourselves. The effects of technology can be seen in every genre. In fact, it is the backbone of everything we do as an individual, a company or even as a nation. Since the invention of the Internet, the whole world has become a global village. As a result of this seamless connection, we are able to access information from anywhere in theRead MoreA Brief Note On Cyber Crime Through The Years1482 Words   |  6 PagesImportance of Cyber Security in America â€Å"If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked. -Richard Clarke Cyber Crime through the Years Since the late 1980’s, cyber security has been a growing industry. Viruses such as the Morris Worm proved to the world that the internet was not a safe and secure architecture. In later years the Michelangelo virus, Melissa, and Concept began to push the IT industry for research on cyber security and antivirus

Friday, December 20, 2019

Substance Abuse And Addiction Counselor - 1393 Words

Substance Abuse and Addiction Counselor Substance abuse as well as addiction is a topic many people choose to ignore or tend to believe that it does not affect them. Addiction itself does not seek out certain types of people but can affect anyone, at any time, for any reason. Stress, per pressure, financial trouble, even genetics all play a role in substance abuse and addiction. Unlike others, I don’t see substance abusers as weak willed but instead in need of guidance and someone to talk to about their problems. That is why, when I decided to go to school I was very interested in becoming an Addiction Counselor. I am one of those types of people who really enjoy learning new things and coming up with solutions for myself or others. The biggest reason that I decided to go to college was to find a job that I was actually fascinated with and wouldn’t dread going to work day in and day out. The biggest concern I have for my future job is stability and job availability. One area that I don’t really find hi gh on my priority list is the money. I want to be able to make enough that I can survive and even thrive at times but I’m not looking for a job just for the financial gain. If I’m going to spend my life in a working profession it might as well be doing something I love. When most people think of substance abuse and addiction counseling they often only think of the 12 step program or alcoholics anonymous. The truth is that an addiction counselor must have a vast knowledge in theShow MoreRelatedSubstance Abuse And Addictive Behaviors760 Words   |  4 PagesSchool Counselors support all students so that they can succeed in the school setting, including those that have addictions or addictive behaviors. This is a challenging area, and school counselors must be able to understand causes and recognize signs of addictions, and provide services to support the needs of these students. Therefore, this paper discusses and evaluates the causes of addictions and addictive behaviors, analyzes possible sings of substance abuse and addiction in students, and designsRead MoreThe Effects Of Substance Abuse On The School Aged Populations787 Words   |  4 PagesSings of Substance Abuse and Addiction in the School-Aged Populations One study asked counselors about the prevalence of substances used by high school students and found that the counselors most often dealt with alcohol issues (Burrow-Sanchez Lopez, 2009). While alcohol may be one of the most widely dealt with substances from a counselor’s perspective, it is essential to be able to identify signs of alcohol abuse and other substance abuse so that action can be taken. Signs of substance abuse can varyRead MoreSubstance Abuse Counseling Laws And The Aca Ethics Code1465 Words   |  6 Pages Substance abuse counseling can be a rewarding career for anyone who has a desire to help people who are battling an addiction to drugs or alcohol. A substance abuse counselor can work in hospitals, prisons, therapeutic facilities, and halfway houses. The purpose of a substance abuse counselor is to help those who have an addiction manage it. In this paper I will be discussing Texas state counseling laws and the ACA ethics code and how these two can g uide my work as a substance abuse counselorRead MoreAddiction : The Problem Of Addiction1705 Words   |  7 PagesAddiction A crisis that many communities in Georgia are experiencing is addiction. A large substance that is currently being abuse is methamphetamine. Methamphetamine can be smoked, snorted, injected, taken orally and dissolved in liquids. The most common use is smoking and injecting the drug because of the immediate reaction it has on the body. It is highly addictive and has repeated patterns of binges and crashes with the individual constantly trying to reproduce their euphoric high. A recentRead MoreAddiction Counseling : An Bright Future Essay1191 Words   |  5 PagesAddiction Counseling: An Unfortunately Bright Future As a child, I was surrounded by drug and alcohol addiction. In fact, I didn’t realize this was even abnormal until I was nearly a teenager and saw that not all of my friends’ parents used illegal drugs on a regular basis or threw wild parties every weekend. It was unfortunate, but it was my reality. Being surrounded by addiction made me do everything that I could to stay away from drugs and other illegal substances. I saw the toll it had takenRead More Job Requirements of an Addiction Counselor Essay1007 Words   |  5 PagesThe job of an addiction counselor specializing in, but not limiting my choice to substance abuse is the job profession I have chosen. The opportunities for this field are very open in my area of the country and throughout the Unites States. The counselors that work within range of me are very busy, and have little time to offer to a person in training. I was able to arrange an email interview with a particular counselor working at a rehabilitatio n facility for alcoholics and drug addicts. His jobRead MoreMental Illness And Substance Abuse901 Words   |  4 Pagesmental illness and substance abuse, which may have complications on the actual treatment for mental illness. It is very important for the addiction counselor to properly understand both the differences between acute primary psychiatric disorders and any underlying psychiatric symptoms, caused by alcohol and other drugs. Sometimes the addiction needs to be treated first in order for the mental illness to be properly identified and successfully treated. Also addiction counselors need to understandRead MoreSubstance Abuse Counselors Should Follow The Four Ethical Principles1181 Words   |  5 Pagesinclude: hiring competent substance abuse counselors, effective assessing guidelines, appropriate Evidenced Based Treatment Plans, case management services, programs for Change, family services, and promoting prevention programs. The treatment program being designed will offer a warm and inviting atmosphere that welcomes all clients. Hiring competent substance abuse counselors will be beneficial for designing a successful treatment program. The substance abuse counselors will be unbiased, knowledgeableRead MoreSubstance Abuse Treatment Center Of The World798 Words   |  4 PagesIntroduction to the foundation of the issue. Here in Florida there many substance abuse treatment facilities, in fact there are so many that Southern Florida is not considered the substance abuse treatment center of the world. This is the description of Southern Florida that was talked about in classrooms, at an undergraduate program at Indian River State College (IRSC) in Fort Pierce Florida. Many time a professor would talk about Southern Florida being the treatment capital of the world, and thereRead MoreEssay on Social Aspect of Substance Abuse1001 Words   |  5 PagesAddiction is a difficult disease that involves several different factors including biological, psychological and sociological aspects. Anderson (1997) states that substance use refers generally to the ingestion of illicit drugs such as marijuana, cocaine, opiates, barbiturates, benzodiazepines, PCP, amphetamines, etc. The use of illicit drugs, such as alcohol and nicotine, are less frequently included in this definition, despite their widespread use and und isputed potential for harm. Substance abuse

Thursday, December 12, 2019

Advanced Operating System

Question: Identify three operating systems for Acme Toys Inc. Answer: Introduction: The report identifies three operating systems for Acme Toys Inc, (a leading manufacturer) for its expansion plan with usual departments. Moreover, conducting market research, the report finds out the most suitable operating system for the company. Considering the server should support certain criteria (multiuser environment, multiple processors, types of application as well as high security and memory) the report choose the OS with rules and reasons. Apart from this, it also considers the R D and network departments' requirements. Suitable OS for Acme Toys: According to the company and its expansion plan, the company needs an operating system, which is suitable for all the departments of the enterprise. The OS creates an interface between hardware and software such that internal hardware structure may not be the end-user concern (Stallings, 2016). Os works as program development tool and executor, I/O, system and file accessory as well as error detector and resource. For a vast and expanding network, choice of OS depends on the factors like multi-user environment, multiprocessor, various types of applications, high security and large memory for data files and information. 1. Windows: Windows is a multitasking Os with compatibility to work with multiple 32 and 64 bit CPUs as well as GPU. The easy way to learn the mode (GUI) as well as its availability has made the OS a popular choice. Selection of an OS depends on four factors Stability, functionality, security and workload (Stallings, 2016). Windows has versions for enterprise need. Windows with its modular approach differentiate between application-oriented software and core OS software. Due to its modular approach, error correction in the certain module does not affect other modules or the entire API. Again, it supports four user mode processes like service process, environment subsystems, etc. Windows has client server model that can quickly add new API, reliable and protected partitioned memory, open remote procedure call as well as distributed computing where the local server can pass the message to the remote server (Carpenter, 2016). Flexible OS routines run multiple thread single process execution, as wel l as inter-process communication with OOP features (encapsulation, inheritance), gives flexibility and protection to the process and resources. Windows is an all purpose OS with high-security measures, interoperability with another server like Unix, Macintosh, authentication support Kerberos v5 as well as application support (HTTP, SMTP, Pop, Mac CGI ). Windows Server is a stable OS with cloud readiness on MS Azure and Hyper-V (if cloud platform required). 2. UNIX: UNIX was originated in the BELL lab and gain popularity for high-security systems like research labs, military systems, etc. Its system kernel is isolated from the user application. The OS is known as ideal for utility servers like DNS, DHCP, etc. It has features like high efficiency, different machine compatibility as well as diverse configuration for complex tasks (Silberschatz, Galvin Gagne, 2016). UNIX has command line interface, and that is too difficult to learn for users. However, the new versions of SVR4, BSD as well as Solaris 10 have some new features like a multithreaded kernel, support for SMP, Internet-based server, and firewalls, real time processing support, virtual memory management, etc. but it is still difficult for end users. 3. LINUX: LINUX is a variation of UNIX and has a monolithic structure. The inflexibility of Linux can be compensated with its free package availability in the market. The loadable module feature of the OS gives the advantage over the UNIX. LINUX has some unique features like dynamic linking the kernel in its executing mode and hierarchical module structure. Again, the OS supports global namespace for file systems, TCP/IP protocol suite as well as interrupt handling from devices (Ramachandran Ramachandan, 2016). For the network, LINUX server offers single service with data center charges. Cloud framework like OpenStack supports LINUX. However, finding and fixing bugs in open source like LINUX is easier, but the same feature is taken as a disadvantage for corporate security. The Vserver of LINUX supports many virtual servers yet SELinux is incomparable for Windows server. Recommendation of OS for Acme Toys: According to the market research and comparison with other OS, the report identifies Windows as the most suitable for Acme Toys. However, the RD department requires a secure VPN; they should use UNIX /versions for the VPN. The UNIX-based server can be hosted easily on Windows server. For the rest of the departments, Windows is the best choice as an OS (Carpenter, 2016). 1. Client support and Interoperability: Windows supports NT workstation 4.0, 2000 Professional, XP Pro, Vista business as well as operates on Novel Netware, UNIX, Macintosh, sever 4.0 (Stallings, 2016). 2. Directory and File Services: Windows supports directories for network administrator as well as device addition, file sharing tools, distributed file services, etc (Bassil,2011). 3. Authentication Security: Windows support User level, server level security as well as authentication like interactive login, network authentication, and active directory. 4. Windows versions: Windows for Workgroup supports protocols like NetBEUI, TCP/IP as well as IPX/SPX (Carpenter, 2016). The version is used to increase productivity and sharing information. Windows XP Professional supports remote session, EFS, IPSec, recovery console, etc. Windows Vista supports updated GUI (Aero) as well as new multimedia capabilities (Silberschatz, Galvin Gagne, 2016). Windows7 is efficient in managing files, and Windows NT supports large file management, security, compression, encryption and symbolic links (Ramachandran Ramachandan, 2016). 5. VPN and UNIX: UNIX is stable, scalable with high performance, security and efficiency. The OS is also compatible with Windows and may work well with the VPN (Stevens Rago, 2013). Conclusion: The report compares three OS for an expanding manufacturer and finds out the most suitable OS for the firm. The report also discusses the reasons and criteria for the choice of the OS. References: Bassil, Y. (2011). Windows and linux operating systems from a security perspective. Journal of Global Research in Computer Science, 3(2), 17-24. Carpenter, T. (2016).Microsoft Windows Operating System Essentials.miamibeachhigh.schoolwires.com. Retrieved 14 March 2016, from https://miamibeachhigh.schoolwires.com/cms/lib07/FL01000126/Centricity/Domain/163/Sybex%20Microsoft%20Windows%20Operating%20System%20Essentials.pdf Ramachandran, S., Ramachandan, A. (2016).Rapid and Proactive Approach on Exploration of Vulnerabilities in Cloud based Operating Systems.citeseerx.ist.psu.edu. Retrieved 14 March 2016, from https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.259.4330rep=rep1type=pdf Silberschatz, A., Galvin, P., Gagne, G. (2016).Operating Systems Concept.iit.qau.edu.pk. Retrieved 16 March 2016, from https://iit.qau.edu.pk/books/OS_8th_Edition.pdf Stallings, w. (2016). Operating Systems. sist.sysu.edu. Retrieved 13 March 2016, from https://sist.sysu.edu.cn/~isscwli/OSRef/William%20Stallings%20-%20Operating%20Systems%EF%BC%9AInternals%20and%20Design%20Principles(7th%20Edition)-2011.2.28.pdf Stevens, W. R., Rago, S. A. (2013).Advanced programming in the UNIX environment. Addison-Wesley.

Wednesday, December 4, 2019

Management of Information Technology Services

Question: Write an essay about the "Management of Information Technology Services". Answer: Introduction Information Technology Service Management is mainly defined as the activities those are mostly directed by the structured and organized in processes and supporting procedures those are implemented by a company in terms of planning, designing, operating as well as controlling the services of Information Technology offered to the consumers (Alexander 2013). It can often be equated with the ITIL; even though variety of standards and frameworks are there those can contribute to the entire ITSM discipline. The execution of the processes of IT Service Management in a company, especially those processes those are more workflow-driven. In addition, these processes can also become advantageous significantly from being supported with specialized tools of software. On the other hand, ITIL is mainly a set of practices or such a tool of ITSM that actually aims on the alignment of the IT services with the business requirements. This particular report is mainly implemented in order to shed light on the ITIL adoption strategies of HBZS Mining Rescue Services in terms of IT Service Management (Ali, Soomro and Brohi 2013). Therefore, this particular report has demonstrated a critical awareness regarding the importance as well as the significance of the IT Service Management and the requirement for HBZS Mining Rescue Services to assure that the effective strategies are in place for managing the significant investment in the IT infrastructure. On the other hand, this report is also aimed for demonstrating the potential for comprehending as well as evaluating the associated roles and responsibilities, activities and objectives for enabling the effective improvement, management and planning of the processes of IT service. In addition, in order to accomplish the objectives of this particular report, the ongoing IT Service Management processes are aimed to be analyzed in this report in the context of HBZS Mining Rescue Services. This report is also aimed to provide a view regarding th e future improvements to ITSM at HBZS Mining Rescue Services. On the other side, this particular report based on ITSM, is aimed to analyze the service transition phase as well as aimed to provide a view regarding the critical transition processes of HBZS Mining Rescue Services. Furthermore, this report is also aimed to illustrate the service operation processes followed by HBZS Mining Rescue Services in order to adopt ITIL strategies. It is also focuses on to provide some suggestions regarding the limitations as well as the benefits of outsourcing only service desk while managing the other functions of the internal IT department in order to mitigate the issues associated with outsourcing. On the other hand, this report is also aimed to discuss the Continual Service Improvement in terms of current service reporting in place as well as how it can be extended in future. Apart from that, this report also focuses on the press of fostering the business-OT partnership at all the levels of the operations of HBZS Mining Rescue Services. Company Background HBZS Mining Rescue Services is a prime mining organization in the Czech Republic. It is the only hard coal producer in the country with the annual production of near about 8-9 million tonnes from 4 mines with 23 shafts with the extraction of coal from the depths which is ranging from the 600 (Cyber Fox 2016). This organization mines its coal in the Karvinas Basin in the Upper-Silesiancoal basins Southern part (Cyber Fox 2016). On the other hand, the organization manufactures thermal coal as well as quality coking for the energy and steel markets in Central Europe. HBZS Mining Rescue Services can control the subsidiary, OKD that can pursue in relation to the coal mining (Cyber Fox 2016). It is the biggest employers in the Moravian-Silesian Region. On the other hand, HBZS Mining Rescue Services is the second biggest private employer in Czech Republic. On average 11000 people in 2011 worked for the organization. The primary responsibility of HBZS Mining Rescue Services is the rescue of materials as well as workers from the underground or from the environment that is non-breathable like underwater (Cyber Fox 2016). In addition, people have a huge range of ancillary commercial activities. This organization mainly gives a non-stop emergency service. Ongoing ITSM at HBZS ITSM or the Information Technology Service Management is defined as the entire activities those are simply directed by several specific policies as well as structured and organized in the processes and supporting procedures as well those are performed by a company or the part of a company for designing, planning, delivering, operating and controlling IT services those are offered to the consumers (Barafort, Di Renzo and Merlan 2012). On the other hand, Information Technology Infrastructure Library or ITIL is defined as the set of practices for ITSM or the Information Technology Service Management that aims on the alignment of the IT services with the requirements of business (Borghoff and Pareschi 2013). ITIL mainly demonstrates the checklists, tasks, procedures as well as processes those are not specific in terms of organization. However, it can easily be applied by a company in order to establish integration with the strategy of the company, maintaining a minimum competency level a s well as delivering value. In case of HBZS Mining Rescue Services, at the very first phase of the ITIL adoption, this organization has selected an ITIL adoption approach that is based on tools assuming that organized processes supported by their tools would save both of the resources as well as time. Moreover, they have managed for implementing six processes of ITIL in a short time. These processes are the knowledge management, configuration management, Service Asset, Change Management, Request Fulfillment as well as Incident and Event Management (Chauhan, Raman and Singh 2013). This particular phase has provided a solid base for the future even though this particular phase was mainly IT internal oriented. However, there is a major as well as a crucial constraint has been obtained in this particular phase of the ITIL adoption. It was not the lack of IT staff skills or the resources. The major as well as essential constraint was low maturity of business. IT was not yet considered as a business partners despite all the objectives those HBZS Mining Rescue Services had reached. On the other hand, during the second phase of the ITIL adoption in the business operation of HBZS Mining Rescue Services, a change in the upper management has meant a new scope of improvement (Cots, Casadess and Marimon 2014). Therefore, the IT department consequently has faced few new challenges: these are as follows: First of all, IT department of HBZS Mining Rescue Services has failed for explaining properly to the new management regarding the IT operations (Cox 2013). It was quite obvious that the IT department of HBZS Mining Rescue Services concentrated too much in the on the explanation of technical aspects of their work those were incomprehensible to the rest of the business operations. Secondly, the management change was a significant scope for changing their strategy of communication as well as for achieving a partnership with the business (Dahlstrom, Walker and Dziuban 2013). On the other hand, the business of HBZS Mining Rescue Services has also perceived the IT departments activities widely within the organization, homogeneous fashion. In addition, the IT department of HBZS Mining Rescue Services was paralyzed by the disputes of competency (Davenport 2013). The individual departments of HBZS Mining Rescue Services had mainly conflicted the necessities as well as the IT department was asked for resolving it. The management department of HBZS Mining Rescue Services wants the business for accepting the responsibility to set requirements as well as priorities as the conflict management is not the role of IT. Now the major concern of HBZS Mining Rescue Services should be to discover the techniques through which the Information Technology Service Management of the organization can be improved. In order to do so, additional processes of ITIL should be adopted by HBZS Mining Rescue Services as well as the existing processes should also be improved (Davenport 2013). Both of the mentioned remedies can be applied on the ITSM of HBZS Mining Rescue Services. In this situation, the most effective improvement on the ITIL strategies can be implemented by establishing the Digital Service Catalogue within the ITSM strategies of HBZS Mining Rescue Services (Fitzsimmons and Fitzsimmons 2013). The service catalogue is simply the curated as well as the organized collection of any all the services related to the Information Technology those can be performed by or within an organization. The IT service catalogue or the digital service catalogue is where the IT publishes the services that it mainly offers. F or HBZS Mining Rescue Services, the Digital Service Catalogues would act as the tools of knowledge management for the consultants as well as the employees of this particular organization. It can be done by permitting them for routing their requests regarding and for the services of this organization to the expert or the IT department of the company who has the knowledge regarding the issues encountered in the ITSM operations (Fitzsimmons and Fitzsimmons 2013). The reasons for which the IT service catalogue should be implemented in order to improve the ITSM operations of the organization are as follows: The IT service catalogue is ITIL compliant. It also improves the customer satisfaction It also improves the IT service department reputation of HBZS Mining Rescue Services It gives effectives as well as efficient channel of engagement for the standard services without or with authorizations. The IT service catalogues can also showcase the service availability for the consumption of business user (Foster and Kesselman 2013). The IT service Catalogues can also improve the opportunities of IT for the service automation that is resulted in the performance of higher service delivery. This particular IT service catalogue tool can resolve all the four challenges: The IT service catalogue or the digital service catalogue can divide the activities of the department of Information Technology in accordance with the activities of business as well as utilizing the terminology of business that made it understandable more easily to the business (Galliers and Leidner 2014). The IT service catalogue can play a significant role in implementing the meetings of regular service review established invaluable channels of communication. On the other hand, this particular tool in the ITIL strategy can also assign tickets from the service desk that is connected to the suitable definition of service within the service catalogue; given metrics those are understandable to the business operations of HBZS Mining Rescue Services (Hesson, Soomro and Geray 2012). Service Transition The major objective of the ITIL Service Transition of HBZS Mining Rescue Services is for building as well as deploying the IT services in the business operations of the organization. The major feature of service transition in the business operations of HBZS Mining Rescue Services is for ensuring that the changes to the service management processes as well as services are continued in a well-coordinated and well-organized manner (Iden and Eikebrokk 2014). On the other hand, Service Transition has built as well as deployed modified or new services in the business operations of HBZS Mining Rescue Services. HBZS Mining Rescue Services has followed several major processes of service transition (Ionita and Gordas 2013). HBZS Mining Rescue Services has mainly implemented the process of service transition as per the ITIL 2011. These major processes are as follows: Change Management Process Objective the major process objective of change management in service transition adopted in the business operations of HBZS Mining Rescue Services is for controlling the lifecycle of all the changes encountered in the IT operations (Marchewka 2014). The prime goal of change management in HBZS Mining Rescue Services is for enabling the advantageous changes to be implemented with the minimum disruption to the services of IT. Change Evaluation Process Objective The prime objective of the change evaluation in the service transition is for assessing the important changes such as the introduction of a substantial or a new service to an existing service of HBZS Mining Rescue Services, before those changes are permitted for proceeding to the next stage in the lifecycle of their business operations (Nurfaizah, Utami, and Arief 2015). Project Management (Transition Support and Planning) Process Objective - the major process objective of the Process Management in the service transition in the IT operations of HBZS Mining Rescue Services is for planning as well as coordinating the resources for deploying a prime release (Picard, Renault and Barafort 2015). It has been done within the predicted quality, time as well as cost estimates of the IT operations of HBZS Mining Rescue Services. Application Development Process Objective the process objectives of the application development in the service transition in the business operation of HBZS Mining Rescue Services is for making available systems as well as applications that can give the necessary functionalities or the features of the IT services of the organization (Renault, Cortina and Barafort 2015). This particular process incorporates the maintenance as well as the development of the custom applications and the product customization as well from the vendors of software. Deployment and Release Management Process Objective The process objective of the deployment as well as the release management in the service transition mechanism of HBZS Mining Rescue Services is for planning, controlling as well as scheduling the release movement for testing and living the environments (Schwalbe 2015). The prime objective of the release management for HBZS Mining Rescue Services is to assure that the live environment integrity is secured and that the exact components are released. Service Testing as well as Validation Process Objective the process objective of the service testing and validation in the service transition process of HBZS Mining Rescue Services is for ensuring that the resulting services as well as the deployed releases fulfill the expectations of customer as well as or verifying that the IT operations of HBZS Mining Rescue Services is capable of supporting the new service (Schwalbe 2015). Configuration Management and Service Asset Process Objective The process objective of the configuration management and service asset is for maintaining information regarding the configuration items necessary for delivering an IT service, incorporating their relationships (Willcocks 2013). Knowledge Management Process Objective the process objective of the knowledge management in the service transition in the IT operations of HBZS Mining Rescue Services is for gathering, sharing as well as storing information and knowledge inside a company (Chao and Chandra 2012). The prime purpose of the knowledge management is for improving the efficiency by minimizing the necessity for rediscovering the knowledge. In the first phase or the service transition phase of ITIL adoption of HBZS Mining Rescue Services can result several issues of operations in other enterprises. In case of this organization, HBZS Mining Rescue Services should follow some critical service transition processes in order to mitigate the probable operational issues associated with the service transition processes in the business operations of the organization (Luftman 2014). These critical processes are simply the improvisation of the service transition processes those are followed by HBZS Mining Rescue Services. The critical transition processes are as follows: Transition Planning and Support With the help of the Transition Planning and Support, HBZS Mining Rescue Services can be able to ensure that the orderly transition of a modified or a new service into the production together with the required adaptations to the processes of service management. It must include the operational requirements and service design as well within the transition planning. the Transition Planning and Support has two sets of objectives. Those are the Coordination and planning as well as Improvement and Standardization (Rathnam, Johnsen and Wen 2015). In case of the Coordination as well as Planning, it can help the organization to coordinate the activities as well as resources across the service teams, suppliers, as well as projects needed to modify successfully an existing service or to introduce new service or to retire a particular service. It also manages risks for minimizing failure chances (Santana Tapia 2012). On the other hand, the improvement and the sta ndardization objectives assure adoption of re-usable and standard supporting systems and processes. It would also improve continually the performance of the stage of service transition of the business operations of HBZS Mining Rescue Services. Thus the well-organized as well as a well-managed process of transition planning and support would deliver several benefits to the IT operations of HBZS Mining Rescue Services. In the activities of service transition, consistency through the usage of the accepted set of models, standards as well as policies. Service Validation and Testing the major objective of the service transition as well as testing is for providing the evidence of objective to the changes or new service support, the requirements of stakeholders, business as well as customer of HBZS Mining Rescue Services (Long 2012). It would be helpful for HBZS Mining Rescue Services to support the Deployment and Release process assuring the suitable testing levels are performed at the time of deployment, build and release activities. It can also be applied over the entire lifecycle for ensuring the quality of any aspect of the services of HBZS Mining Rescue Services. Change Evaluation this particular process should be modified in the service transition process of HBZS Mining Rescue Services by aiming to assess the prime changes such as the introduction of the substantial change or the new service change to the existing IT service before those changes are permitted for proceeding to the next phase in their life-cycle (Lloyd et al., 2014). Release and Deployment Management this process can be improvised as well as modified by building delivering as well as testing the ability for providing the services those are specified by the service design and that would accomplish the requirements of stakeholders and deliver the desired solution (Lloyd et al., 2014). Change Management the modification of the change management in the service transition operation of HBZS Mining Rescue Services would respond to the changing business requirements of the consumers of HBZS Mining Rescue Services (Taylor, Case and Spalding 2015). It would also increase the RFC value as well as minimize the re-work, distribution and incidents. Service Asset and Configuration Management This process in the service transition can ensure that the assets needed for delivering services are controlled properly and that reliable and accurate details regarding those assets is present where and while it is required (Taylor, Case and Spalding 2014). It can also assure that the assets under the control of the HBZS Mining Rescue Services are properly cared, controlled as well as identified across the entire lifecycle. Knowledge Management the modification of the knowledge management system can analyzes, share, store and gather information as well as knowledge within HBZS Mining Rescue Services. It can also improve the efficiency by minimizing the requirement for rediscovering knowledge (Case 2014). Knowledge management is the central process of service transition which is responsible to provide knowledge to all the other processes of IT service management. These critical transition processes are significantly inter-related to the other HBSZ as well as the ITIL processes. These processes have the potential for managing as well as planning the resources and capacity necessary to deploy, test, build and package a release into production. On the other hand, as a part of the ITIL adoption of HBZS Mining Rescue Services, it can provide a rigorous and consistent framework to evaluate the risk profile as well as service capability before a changed or a new service is released in HBZS Mining Rescue Services (Vehvilinen, Hyvnen and Alm 2015). On the other hand, while adopting ITIL, these processes also provide good quality of information and knowledge for expediting effective decisions regarding promoting a release to HBZS Mining Rescue Services. Service Operation The Service Operation in ITIL adoption mainly encompasses the daily infrastructure, processes as well as activities those are responsible to deliver value to the business of HBZS Mining Rescue Services with the help of advanced technology. In the service operation of HBZS Mining Rescue Services, service experience and consumerism is the major factors (Pinard et al., 2012). The objective of the service operation in ITIL adoption of HBZS Mining Rescue Services is for maintaining the daily services to the point that there are no consequences. It also ensures the organization that the IT services are effectively and efficiently delivered. The service operation mainly implements the operational tasks. There are few major processes those are the part of the ITIL stage Service Operation. These are as follows: Event Management the project objective of the event management in the service operation of HBZS Mining Rescue Services is for ensuring the services are monitored constantly as well as for filtering and categorizing events in terms of deciding on the suitable actions (Probst, Case and Elephant 2013). Incident Management the major process objective of the incident management in service operation of HBZS Mining Rescue Services is for managing the lifecycle of all incidents (Mesquida et al., 2012). The prime goal of incident management is for returning the IT service towards the users as soon as possible. Request Fulfillment the process objective of request fulfillment is for fulfilling the service requests that in most of the cases are the requests for information or the minor changes. Access Management The process objective of the access management in service operation of the organization is for granting the authorized users the right for using a service at the time of preventing access to the non-authorized users (Suhairi and Gaol 2013). The processes of access management execute essentially policies demonstrated in the Information Security Management. Sometimes, it is also referred to as the Identity Management or Rights Management. Problem Management the process objective of the problem management in the service operation of HBZS Mining Rescue Services is for managing the lifecycle of all issues. The prime goal of problem management is for preventing the incidents from obtaining and for reducing the incident impact that cannot be prevented (Jntti and Hotti 2015). The Proactive Problem Management also analyzes Incident Records and utilizes data gathered by the other processes of IT service management for identifying significant issues or trends. IT Operations Control the process objective of IT operations control is for controlling and monitoring the IT services and their underlying infrastructure. It also executes routine tasks of daily basis based on the operation of the infrastructure applications and components (Alexander 2013). It also incorporates the routine maintenance, output and print management, restore and back up activities and job scheduling. Facilities Management the process objective of the facilities management is for managing the physical environment of HBZS Mining Rescue Services where the IT infrastructure of the company is located (Ali, Soomro and Brohi 2013). It also incorporates all of the aspect of the management of the physical environment such as environmental monitoring, business access management and cooling and power. Application Management It is actually responsible to manage the applications across their entire lifecycle (Borghoff and Pareschi 2013). Technical Management It gives the technical expertise as well as support for the IT infrastructure management. The current and one of the most effective challenges for the company is the possibility that HBZSs Mining Rescue Services would outsource totally the IT department of the organization. HBZS Mining Rescue Services have confronted with the plans for the entire outsourcing of the IT department due to the coal crisis realization (Borghoff and Pareschi 2013). Thus, at present the most important and critical challenge is unquestionably how to define the IT value of the business. The ITIL framework fortunately is oriented strongly to provide and demonstrate the value and the hope of the company is that the organization would be capable of proving that the internal department of IT of the enterprise is more advantageous. The service desk is a prime IT service inside the IT service Management discipline as demonstrated by the ITIL. It is intended for providing a Single Point of Contact for meeting the requirements of communication of both the IT staff and users (Borghoff and Pareschi 2013). Contract with an outside company for providing the technical support is one of the most widely utilized outsourcing forms. However, if any particular business looking for outsourcing the needs of the help desk services for understanding the limitations as well as the benefits and to set the goals of outsourcing. While the outsourcing is discussed often in financial items, the help desk outsourcing impact is much wider than that. It can also have an influence on the productivity at both of the rank-and-file and management levels while utilized as internal support. An outsourced help desk as a customer service resource can become a major driver of the customer retention as well as customer satisfaction (Chauhan, Raman and Singh 2013). The potential influence of an outsourced help desk in short, for worse or for better is so wide that careful selection and goal-setting can be crucial to the success of HBZS Mining Rescue Services. Hence, in the present scenario of HBZS Mining Rescue Services, there are several benefits as well as limitations of outsourcing only the service desk during the process of the maintaining the other functions of the internal IT department of the organization. Service Desk Outsourcing Advantages The benefits or the advantages of the service desk outsourcing by HBZS Mining Rescue Services are as follows: Financial Leverage the service desk outsourcing for the HBZS Mining Rescue Services minimizes the fixed costs. As a result, it can increase the return on investment of this organization. Focus on Core Competencies the outsourcing of the service help desk of HBZS Mining Rescue Services can free up management for spending more time on the areas where the organization is best positioned for adding the value (Cots, Casadess and Marimon 2014). Flexible Capacity It is one of the most crucial advantages of the Service Help Desk outsourcing for HBZS Mining Rescue Services. The call volume of the service help desk outsourcing can greatly vary for the other reasons as well as the seasonal reasons (Cox 2013). The outsourcing through the service help desk creates flexible potential in order to handle these changes in volume. Continual updating training As this organization, HBZS Mining Rescue Services is specialized in the help desk outsourcings services, thus, this organization are better positioned for keeping training current. Limitations of Service Desk Outsourcing The limitations or the shortfalls of the service desk outsourcing by HBZS Mining Rescue Services are as follows: Loss of Control over training - HBZS Mining Rescue Services may be concerned that few nuances can be lost while the training is outsourced. Lack of concern for the consumers the service help desk of HBZS Mining Rescue Services can become the first line of contact with the customers as well as if representatives are not enough professional, thus it can also badly reflect on this organization (Dahlstrom, Walker and Dziuban 2013). Remote Personnel While the service desk outsourcing can take the benefits of the global potential, a more local touch can ignore the cultural differences. HBZS Mining Rescue Services has mainly outsourced the help desk services in search of the positives to be only blindsided by the negatives. These negatives existence should not turn the company against the outsourcing through service help desk as the advantages are still legitimate. The identification of those potential negatives rather should serve as the initial step to overcoming and managing the obstacles to the outsourcing of the service help desk (Davenport 2013). For accentuating the positive that is realizing the advantages of the outsourcing through service help desk without being overwhelmed by the shortfalls, HBZS Mining Rescue Services should three components to planning a successful program of service help desk. Recognize the basic mission the service help desk through outsourcing should have one of three basic missions such as for providing the support of internal technology; for providing support for the users of business-to-business; or for providing support for the customers (Judy 2013). Set measurable objectives It can begin with the financial objectives like the return on investment but it should encompass also the goals of services (Taylor, Case and Spalding 2015). These might incorporate percentage of situations, average length of call and response time resolved on the initial call, user or customer satisfaction as well as customer retention. Demonstrate the help desk search the goals as well as mission demonstrate the specific goals and wider mission of a program of service desk outsource (Case 2014). Then, these demonstrations should generate the search basis for a outsource provider of service help desk. CSI and Business-IT Alignment The IT department of HBZS Mining Rescue Services has moved from a technological point of view to the service point of view (Vehvilinen, Hyvnen and Alm 2015). Therefore, a formalized process of Continual Service Improvement should be established. HBZS Mining Rescue Services are currently using or following a certain continual Service Improvement process. Continual Service Improvement Process As per the current process of Continual Service Improvement followed by HBZS Mining Rescue Services in terms of adopting ITIL, it can be stated that the process of Continual Service Improvement has used the methods from the quality management in terms of learning from the previous failures as well as the successes of the organization (Suhairi and Gaol 2013). On the other hand, the Continual Service Improvement process mainly focuses on the continual improvement of the efficiency as well as the effectiveness of the processes and services of IT, in line with the continual improvement concept adopted in the ISO 20000. There are several major processes are the part of the ITIL adoption stages of the business operations of HBZS Mining Rescue Services. These are as follows: Service Review In case of this particular process, its process objective in terms of CSI followed by HBZS Mining Rescue Services while adopting ITIL is for reviewing the infrastructure as well as business services on a daily basis (Jntti and Hotti 2015). The major aim of this particular process in Continual Service Improvement is for improving the quality of service where necessary as well as for identifying more economical ways to provide a service where possible. Process evaluation On the other hand, the process projective of this particular process of continual service improvement in HBZS Mining Rescue Services in terms of ITIL adoption is for evaluating the processes in a daily basis (Judy 2013). It also incorporates the recognizing areas where the metrics of the targeted processes are not reached as well as holding regular reviews, maturity assessments, audits and benchmarks as well. Definition of the initiatives of Continual Service Improvement the process objective of the CSI initiatives followed by HBZS Mining Rescue Services while adopting ITIL in the IT services of this company is for defining particular initiatives those are focused on the improvement of the processes as well as services (Iden and Eikebrokk 2014). It is mainly done based on the outcomes of the process evaluations as well as the service reviews. Monitoring of the initiatives of Continual Service Improvement the process objective of this particular process is for verifying of the initiatives of improvement are proceeding in accordance with the plan and for introducing also some corrective as well as rectifying measures where required (Ionita and Gordas 2013). From the above discussion, it can be said that HBZS Mining Rescue Services have utilized an effective model of Continual Service Improvement (CSI) in order to adopt an efficient ITIL strategy. However, there are some areas over which few extensions are required in order to improvise the CSI model of HBZS Mining Rescue Services during the ITIL adoption in future. In this particular scenario of HBZS Mining Rescue Services, the Continual Service Improvement process should aim on the increase in the efficiency of the processes in the ITIL adoption of the company (Marchewka 2014). On the other hand, CSI model of HBZS Mining Rescue Services must be capable of maximizing the cost of services as well as the effectiveness and the efficiency of the services or the process under the ITIL adoption and underlying the processes of IT Service Management as well. Continual Service Improvement is the last stage or phase in the life cycle of ITIL (Nurfaizah, Utami and Arief 2015). There are several im portant activities of the extended Continual Service Improvement Process, those can be followed by HBZS Mining Rescue Services while adopting ITIL. These are as follows: The extended CSI would review the information as well as the trends of management for ensuring that the services are meeting the agreed levels of service. The extended Continual Service Improvement can also review the trends and the information of management for ensuring that the outcomes of the processes of IT Service Management are achieving the intended outcomes (Picard, Renault and Barafort 2015). On the other hand, the extended CSI processes followed by HBZS Mining Rescue Services can also conduct the internal audits by verifying compliance It can also conduct the internal as well as the external reviews of the service for identifying the opportunities associated with the extended Continual Service Improvement followed by HBZS Mining Rescue Services (Renault, Cortina and Barafort 2015). The extended Continual Service Improvement processes followed by HBZS Mining Rescue Services can conduct the maturity assessments against the activities as well as roles of process for highlighting areas of concern or improvement (Schwalbe 2015). On the other hand, it can also review the analyzed data In addition, the extended CSI followed by HBZS Mining Rescue Services in ITIL adoption can also present the recommendations to the senior management in terms of improvement The extended Continual Service Improvement processes in ITIL adoption phase of HBZS Mining Rescue Services can help the improvement opportunities based on the higher priority. In addition, it can also manage as well as deliver cross divisional and cross functional improvement projects. On the other side, the extended Continual Service Improvement Service of HBZS Mining Rescue Services can also build the effective relationships with the IT senior managers as well as the business of HBZS Mining Rescue Services (Willcocks 2013). It can also impact all of the levels of management for ensuring that the activities of service improvement are getting the required support as well as are well-resourced enough for implementing the solutions (Luftman 2014). Business-IT Alignment Business-IT Alignment is simply a dynamic state in that HBZS Mining Rescue Services can be capable of using effectively IT for achieving the objectives of this particular business organization that is typically improved marketplace competitiveness or financial performance. It has mainly ensured the capacity of the organization for demonstrating a positive relationship between the accepted financial measures of performance and the information technology (Willcocks 2013). The IT department of HBZS Mining Rescue Services has a much clearer need understanding of its customers in terms of their Business-IT Alignment. This business has mainly discovered the benefits to communicate with Information Technology. In order to mitigate the issues associated with the business-IT alignment; this organization has to improve the maturity of its business processes (Willcocks 2013). Therefore, for improving the Business-IT alignment ITIL training and certification were important, not only for the meet ings and the discussions with the counterparts of the company in other organizations but for acquiring new knowledge that can permit the company for comparing its experiences and expand also its viewpoints. Conclusions and Recommendations to the IT Manager HBZS Mining Rescue Services have selected the ITIL framework due to the enhancing demands on the IT department that led to the requirement for making the activities of the organization more effective. ITIL framework has also been selected by HBZS Mining Rescue Services in order to structure the activities of the organization in a consistent way was the way forward. However, there are some issues associated with the ITIL adoption techniques as well as the processes. Therefore, there can be some recommendations which can help HBZS Mining Rescue Services to improve its ITIL framework by making few significant modifications on it. These recommending processes or the modifications are as follows: In order to resolve the issues encountered in the operations of the IT department, HBZS Mining Rescue Services should establish a well-organized as well as well-structured service catalogue. This particular tool can mitigate all of the four challenges associated with the ITIL adoption by the IT department of the organization. Dividing the IT department activities in accordance with the business activities as well as using the business terminology has made it understandable easily to the business. In addition, setting the review meetings of daily service can establish the invaluable channels of communication with the help of the establishment of the service catalogue within the ITIL framework. The organizational size is very much important while approaching the main strategic objective of HBZS Mining Rescue Services. Communication between the business as well as IT is a huge issue for each organization. However, it can be expected that it is more sensitive in the SMB like HBZS Mining Rescue Services to the relative maturity of both of the companys IT department as well as the organization. Hence, in this scenario, the establishment of the Continual Service Improvement Process can become significant to overcome this critical issue. HBZS Mining Rescue Services should work out an appropriate communication policy for the operational purposes or in case of the key incidents. In addition, HBZS Mining Rescue Services should keep simple all the strategies of the implementation ITIL framework of the IT department. On the other side, it should be written three times with an exclamation mark. The organization should not hesitate for cutting off anything that is rarely used as well as proves useless. Furthermore, most importantly, communication is the major bridge that can connect all of the activities of the IT department while adopting the ITIL framework. In order to complete the implementation of the ITIL framework, the IT department has to collect as well as share knowledge regarding the ITIL adoption. HBZS Mining Rescue Services should also publicize as well as celebrate the organizations achievements and successes in order to increase their popularity and reputation. The IT department of HBZS Mining Rescue Services should not be over creating while adopting ITIL. The organization should utilize all kinds of possible ways to accomplish the ITIL adoption without any hesitation. 7.2 Conclusion This particular report has successfully provided a view regarding the significant processes of ITIL adoption that can play an effective role in the IT operations of HBZS Mining Rescue Services. First of all, this report on the IT Service Management of HBZS Mining Rescue Services has clearly illustrated the further future improvements those are required over the IT service management at the organization. Thus, a conclusion has been drawn in this scenario that HBZS Mining Rescue Services have to essentially implement additional ITIL processes as well as have to make few crucial and important improvements over the processes of ITIL adoption. On the other hand, in the phase of the service transition can result in several operational issues in other firms. In order to avoid such issues, HBZS Mining Rescue Services have to follow few critical service transition processes which are greatly inter-related to the ITIL as well as the other processes of the organization. In addition, the major c oncern of HBZS Mining Rescue Services is to mitigate the current outsourcing problem. Therefore, this particular report has successfully conveyed all of the limitations as well as the benefits of the service desk which can then specify the way to resolve such issues of outsourcing. Moreover, the IT department of this particular organization has already moved from a technological viewpoint to the service viewpoint. thus, this report has successfully specified the process of establishing Continual Service Improvement Process. On the other hand, most importantly, this report has also shed light on the significance f the extended CSI process by fostering the Business-IT partnership at all the levels of HBZS Mining Rescue Services. Reference List Alexander, K., 2013.Facilities management: theory and practice. Routledge. Ali, S.M., Soomro, T.R. and Brohi, M.N., 2013. Mapping information technology infrastructure library with other information technology standards and best practices.Journal of Computer Science,9(9), p.1190. Barafort, B., Di Renzo, B. and Merlan, O., 2012. Benefits resulting from the combined use of ISO/IEC 15504 with the Information Technology Infrastructure Library (ITIL). InProduct Focused Software Process Improvement(pp. 314-325). Springer Berlin Heidelberg. Borghoff, U.M. and Pareschi, R. eds., 2013.Information technology for knowledge management. Springer Science Business Media. Case, G., 2014. ITIL v3. Continual Service Improvement.Office of Government Commerce. Chao, C.A. and Chandra, A., 2012. Impact of owner's knowledge of information technology (IT) on strategic alignment and IT adoption in US small firms.Journal of Small Business and Enterprise Development,19(1), pp.114-131. Chauhan, S., Raman, A. and Singh, N.P., 2013. A Comparative Cost Analysis of on Premises IT Infrastructure and Cloud-Based Email Services in an Indian Business School.International Journal of Cloud Applications and Computing (IJCAC),3(2), pp.21-34. Cots, S., Casadess, M. and Marimon, F., 2014. Benefits of ISO 20000 IT service management certification.Information Systems and e-Business Management, pp.1-18. Cox, D.S., 2013. Factors Influencing Adoption of Information Technology Infrastructure Library: Utilizing the Technology Acceptance Model (TAM).ProQuest LLC. Cyber Fox, s. (2016).OKD | OKD, HBZS, a. s.. [online] Okd.cz. Dahlstrom, E., Walker, J.D. and Dziuban, C., 2013.ECAR study of undergraduate students and information technology. 2013. Davenport, T.H., 2013.Process innovation: reengineering work through information technology. Harvard Business Press. Fitzsimmons, J. and Fitzsimmons, M., 2013.Service management: Operations, strategy, information technology. McGraw-Hill Higher Education. Fitzsimmons, J. and Fitzsimmons, M., 2013.Service management: Operations, strategy, information technology. McGraw-Hill Higher Education Foster, I. and Kesselman, C. eds., 2013.The Grid 2: Blueprint for a new computing infrastructure. Elsevier. Galliers, R.D. and Leidner, D.E., 2014.Strategic information management: challenges and strategies in managing information systems. Routledge. Hesson, M., Soomro, T.R. and Geray, O., 2012. Role of Information Technology Infrastructure Library in E-Government. Iden, J. and Eikebrokk, T.R., 2014. Exploring the relationship between information technology infrastructure library and process management: theory development and empirical testing.Knowledge and Process Management,21(4), pp.292-306. Ionita, I. and Gordas, V., 2013. Impact of ISO/IEC 20000 Series Standards on Development of an IT Service Management System.Calitatea,14(134), p.75. Jntti, M. and Hotti, V., 2015. Defining the relationships between IT service management and IT service governance.Information Technology and Management, pp.1-10. Judy, M.S., 2013.Continual Service Improvement for mission and personal success(No. SAND2013-3555C). Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States). Lloyd, V., Wheeldon, D., Lacy, S. and Hanna, A., 2014.ITIL continual service improvement. Tso. Long, J.O., 2012. Continual Service Improvement. InITIL 2011 At a Glance(pp. 91-95). Springer New York. Luftman, J., 2014. Assessing business-IT alignment maturity.Strategies for information technology governance,4, p.99. Marchewka, J.T., 2014.Information technology project management. John Wiley Sons. Mesquida, A.L., Mas, A., Amengual, E. and Calvo-Manzano, J.A., 2012. IT Service Management Process Improvement based on ISO/IEC 15504: A systematic review.Information and Software Technology,54(3), pp.239-247. Nurfaizah, N., Utami, E. and Arief, M.R., 2015. Rancangan Information Technology Service Management Menggunakan Information Technology Infrastructure Library (Studi Kasus: STMIK AMIKOM Purwokerto).Telematika,8(2). Picard, M., Renault, A. and Barafort, B., 2015. A Maturity Model for ISO/IEC 20000-1 Based on the TIPA for ITIL Process Capability Assessment Model. InSystems, Software and Services Process Improvement(pp. 168-179). Springer International Publishing. Pinard, D., Evans, R. and Mankovskii, S., Mitel Corporation, 2012.Web based help desk. U.S. Patent 6,230,287. Probst, J., Case, G. and Elephant, P., 2013. Integrating Six Sigma and ITIL for continual service improvement. Rathnam, R.G., Johnsen, J. and Wen, H.J., 2015. Alignment of business strategy and IT strategy: a case study of a fortune 50 financial services company.Journal of Computer Information Systems,45(2), pp.1-8. Renault, A., Cortina, S. and Barafort, B., 2015. Towards a maturity model for ISO/IEC 20000-1 based on the TIPA for ITIL process capability assessment model. InSoftware Process Improvement and Capability Determination(pp. 188-200). Springer International Publishing. Santana Tapia, R.G., 2012.Assessing business-IT alignment in networked organizations. University of Twente. Schwalbe, K., 2015.Information technology project management. Cengage Learning. Schwalbe, K., 2015.Information technology project management. Cengage Learning. Suhairi, K. and Gaol, F.L., 2013. The Measurement of Optimization Performance of Managed Service Division with ITIL Framework using Statistical Process Control.Journal of Networks,8(3), pp.518-529. Taylor, S., Case, G. and Spalding, G., 2014.Continual service improvement. Stationery Office. Taylor, S., Case, G. and Spalding, G., 2015. ITIL: continual service improvement.Published by TSO (The Stationery Office). Vehvilinen, A., Hyvnen, E. and Alm, O., 2015. A semi-automatic semantic annotation and authoring tool for a library help desk service.Emerging Technologies for Semantic Work Environments: Techniques, Methods, and Applications, IGI Group, Hershey, USA. Willcocks, L., 2013.Information management: the evaluation of information systems investments. Springer.

Thursday, November 28, 2019

Top 7 Rules for Writing a Good Analysis Essay

It is standard to have to write an analysis essay in college or university. You might be asked to analyze a research paper, a movie, a company, a book, or an event or allowed to choose from a selection of analysis essay topics. But what about actual writing a critical essay? Regardless of what you are required to analyze, a critical analysis essay must be written in according to a series of rules that will ensure you have right the structure and content of the analysis paper. Keep reading to learn the top 20 rules for writing an analysis paper from Custom-writing.org experts†¦ 1. Basic principles Before you learn how to start a critical essay, you should understand some fundamentals of writing this paper. In other words, you must understand how to write a good analysis. Essentially, when writing an analysis paper, you aren’t just describing the topic (the what); you write about peculiarities and essence of the topic. When writing a critical analysis essay, you will need to do the following throughout your paper: Explain the meaning of the topic Analyze the topic without bias Compare the topic of the essay to something relevant. You can most easily do this by uncoveringpluses and minuses of the topic and what it is being compared to. Evaluate the subject by providing an argument and defending that opinion with evidence to support it In order to do this, you will have to compose a thesis statement.

Sunday, November 24, 2019

Harley davidson Essay Example

Harley davidson Essay Example Harley davidson Paper Harley davidson Paper The video presents a Harley riding family as they venture from California to Milwaukee. The film presents footage of these popular machines, along with a look at the various types of people who consider themselves motorcycle enthusiasts. Having Embedded Into films, movies, and American culture, the high quality motorbikes became American legends ranking Harley Davidson Motor Cycles Company brand, logo and name among the worlds leading companies. In incense Harley Davidson is the Spirit of America. But Harley Davidson Motor Cycles Company offered a unique product during this period of 100 years such that there were high barriers for entry for other competitors Into he high quality motorbikes that It offered to Its most popular market, the American people. Financial difficulties in the sasss led to the parent company, MAP putting the motorcycle division up for sale. Lack of buyers, a group of Harley managers bought out the company and rescued it with a business turnaround that included brand extensions into licensed goods, such as apparel and related accessories. Now a publicly owned company, Harley has scored double-digit growth for eighteen consecutive years. Harley transformed Itself Into a strong marketing company with a Men From Hell, who meet up with new friends along their route is mentioned in the documentary. Michael Lighter, a photographer who has taken motorcycle images. Later, a large group of Harley riders hit an art gallery to check out and chat about Lighters work. Another big segment of the documentary is devoted to women of all ages who have moved on from riding on the back of the seat on to their own Harley, and the brand has responded by making bikes optimized for women. : Finally, towards the end of the video, it tells more about the Hells Angels and the charity work they do. Theres also more about some of the famed yearly rides. It is very interesting about their marketing management to make Harley Davidson becomes the spirit of America. Case analysis The Harley-Davidson Corporation has been dominating the motorcycle industry for many decades. Today, it continues to have a strong presence in the American market. The mission statement of the company is To fulfill dreams through the experience of motorcycling, by providing to motorcyclists and to the general public and expanding line of motorcycles and branded products and services in selected market segments. Harley-Davidson, Inc. Is the parent company for the group of companies doing equines as Harley-Davidson Motor Company, Bull Motorcycle Company and Harley- Davidson Financial Services. Harley-Davidson Motor Company manufactures five families of motorcycles: Supporters 8, Dana Glide, Softball 8, Touring and VRRP. Bull Motorcycles Company produces sport motorcycles, including four big-twin CB models, and the single-cylinder Bull Blast 8. Bull also offers a line of motorcycles parts, accessories, apparel and general merchandise. Harley-Davidson Financial Services provide wholesale and retail financing and insurance pogroms primarily to Harley- Davidson/Bull dealers and customers. This case could be analysis by using: S. W. O. T. Analysts Strengths According to the video, Harley-Davidson celebrated its 100-year anniversary. Over the past century, the company has created a strong brand image and a loyal customer base. It maintains a close relationship with its customers through a variety of program, such as Hog Owners Group (H. O. G. ), product offerings and events such as Daytona, motor shows, and rallies. In addition, Harley-Davidson has a strong financial position, excellent supply chain management, and a superior product line, which are enabled through creative engineering technology and design. Due to the decline in the market share to Japanese companies in the seventies, Harley-Davidson phased out its weak models, becoming more selective in targeting a specific customer segment and limiting sales and promotion. This strategy created a niche market for their bikes in which the company enjoys a strong position today. Weaknesses First, the company is in its maturity stage and, unless it manages to protect its position, it will be faced with the decline period again. Secondly, the companys products are expensive, which limits them to a specific niche in the market and makes it difficult to grow their customer base. They also have a wait-list for certain products, which can create a substitute effect. Lastly, they are lacking a strong presence in Europe. Opportunity There are various opportunities in the market for Harley-Davidson today, especially with the introduction of the new V-Rod motorcycle. The company has the innovator status advantage in the Performance Cruiser class market segment. They are expanding their partnerships with various European manufacturers, which should increase the presence of Harley-Davidson products in Europe. The corporation is well positioned to attract younger customers, and the company has plenty of room for Roth due to the high demands for its products. Threats Harley-Davidson is facing rigorous competition from Japanese manufacturers, specifically Honda and Yamaha. Yamaha targets the low-end market by providing a variety of products at affordable costs. Yamahas core competencies are small engines, electronic control, and fiberglass reinforced plastic. Yamaha is currently focusing on increasing its global competitive position. Honda is one of Harley- Davidson strongest competitors and is responsible for one-third of all motorcycle sales in the U. S. It has a strong financial base and reliable products. It continues to improve the performance of its motorcycles by focusing on fuel efficiency and lower emissions. In addition, Honda is beginning to increase its performance in the market by introducing information technology tools through its dealerships. These tools help increase dealer performance and create a more positive experience for the customer. The Marketing Mix In order to overcome the problems that Harley Davidson faced in the early sass and help the company regain its market share, a restructuring plan was implemented. Terrain developed an innovative system known as Circles of Management for ringing both workers and dealers together and involving them in taking key decisions relating to the company. A new marketing philosophy was developed based on the desires of the customers and Harley made efforts to position motorcycles as a lifestyle product. Product It was only grey color motorcycles that was offered to its customers and provided three basic styles at the time when Harley was formed. However, the company realized that in order to survive, it had to offer more choice to its customers. Harley realized that it would not be possible to compete with the Japanese manufacturers on the pricing front. This was because manufacturers like Honda not only manufactured a low-priced high-quality product, but also spent heavily on advertising their products. Place Harley started selling its motorcycles through its dealers in 1904. The companys first dealer was CHI Lang of Chicago, Illinois (Refer to Exhibit IV for the number of H-Dos full-line dealer outlets in the US). All the dealers were independent individuals with a business orientation. Promotion Over the decades, Harley had adopted several strategies to promote its motorcycle brand. The products were sold to retail customers mainly through dealer promotions, customer events, and advertising through national television, print, radio, direct mailings, and through advertising on the Internet. Recommendations Harley buyers said, When they are buying a Harley, they are buying an image and a lifestyle first and a motorcycle second. But, Harley-Davidson has to do more to ensure another 100 years of success. I would recommend that Harley do a few things differently. First, they could have researched the literature on what types of problems mechanistic manufacturing organizations face when they try to implement an ERP system in a highly inflexible environment. There was enough research and case analysis available to do this. While they were clearly aware of potential change resistance and the need to get all stakeholders involved, the amount of time their search and selection process required was ridiculous in todays business environment. We speculate that the sheer demand and high prices of their product allowed them to wallow in their inefficiencies a few more years before they had to bite the bullet. Second, obtaining the advice of experienced software and supply chain consultants earlier in the process probably could have saved some time and created a defined focus. Often, managers use the discipline and recommendations of insulates to reinforce the need for organizational change. With the purchasing process out of control, they could have brought in some purchasing expertise to clean up some of the mess before selecting a software system to help organize the process. Third, we questioned the research methods and bias of the data. However, if Harley eventually got what they wanted and it turned out to be a success for them, then perhaps their methods were valid. Harley buyers is 46, compared with an industry average of 38. This could have a damaging affect on consumers perception of a Harley being the old guys bike. Harley-Davidson produces only heavyweight motorcycles that are categorized into touring and cruiser motorcycles. To be successful here, Harley needs to provide smaller, easier to handle, comfortable, and good quality bikes to build up brand loyalty. The European market has great potential for Harley-Davidson since Europeans have higher disposable income and enjoy a higher standard of living. To succeed in this market, Harley-Davidson would have to modify their products to meet local needs, expand its distribution networks, and create strong customer service. Nowadays, as the feelings of American patriotism are so strong, Harley-Davidson deeds to continue to strengthen its positioning strategy by building on the Own an American Icon slogan. In summary, Harley-Davidson should capitalize on its current reputation and success by rapidly increasing demand, and by expanding its product line to reach new consumer markets, especially overseas. It needs to target a younger, technologically conscious and affluent market segment in order to increase its share of the market. The company is well positioned to attract younger customers and they have plenty of room for growth due to the high demands for its products. They also need to set an appropriate pricing strategy, in order to appeal to a wider market segment. Conclusion A feeling of independent, individualism, and freedom is what the Harley-Davidson sells. Theses strong emotional connections have made Harley-Davidson ownership much more of a lifestyle than merely a product consumption experience. To support that lifestyle, the company recognizes that its most important marketing tools is the network of individuals who ride Harley. Harley has adopted those management techniques and building a solid base between the management and the Unions/ employees made it possible for Harley-Davidson to improve its management processes. The realization of the importance of customer feedback led Harley to develop new marketing techniques. We can clearly see the impact Harveys improved manufacturing process, which consisted of: SIT, E, and SOC had on their continuously improving environment. The degree of relationship, loyalty, connection with consumers, the development of brand and product type and innovate new products regularly make Harley Davidson a strong brand, and never be afraid of any competitors. By the Journey and what they have managed and run their business sakes me no wonder why Harley Davidson has become a true American icon. Questions and Answer marketing success? Answer Harley Davidson has considered itself more than motorcycles, but they are legends. It is an American icon brand. When concerning most motorcycle owners have purchased their bikes as a second vehicle, using them more during weekends and free time instead of during the workweek. This implies that the motorcycles serve for recreational riding purposes. In the United States, Harley-Davidson has had much success because of responding the market trends and tastes people enjoy. Moreover, Harley-Davidson has position itself in the motorcycle industry is differentiate itself from its competitors by offering motorcycles that have more power, custom accessories, and carry the Harley-Davidson brand name and logo. Creating a sense of not only a motorcycle for a sport traveling, but also a chance for riders to meeting, riding, and sharing trip and vacation together. More important is building a strong sense of unity and harmony among them too. There are some key factors of Harley Davidson market success include having a strong and adaptable brand image, avian a strong marketing effort (both domestically and globally), and having a strong network of dealers. Harley-Davidson has found ways to turn these factors into strengths while pursuing a strategy using focused differentiation to sell its products. Harley-Davidson has created a network among its clients known as the Harley Owners Groups (HOG) which allows for people in certain geographic regions who own Harley-Davidson motorcycles to socialize or ride with other owners. 2. How does Harley Davidson build long-term customer relationships? As the matter of fact that Harley-Davidson produced the best quality motorcycle, customer satisfaction is their motto and its customers can experience the taste of reality of motorcycle dreams by relaying their satisfaction on them. Harley-Davidson is dedicated to use the advanced technology to produce the most superior motorcycle in domestic and international markets. The Harley has a strategy to build strong relationships with customers and dealers with varieties of activities like events, rallies, road-trip, festival or parade continuously. So the people both domestic and worldwide increase their recognition and making Harley Davidson brand loyalty to become a legend and a dream of many people who would like to own. Moreover, when a person buys a Harley-Davidson motorcycle, they receive a free I-year membership to the Harley Owners Group (HOG), which was developed in 1983 as a program to keep people active with their Harley especially keeps the company close to its customer. These are two major building blocks for long-term customer relationships. One is customer satisfaction and the other is adding customer value. First of all, Harley Davidson builds long term customer relationships by all kind of to customers. Harley Davidson has also embedded the American culture of customers and which help creating loyal customers. . What is Harley Davidson value proposition? Harley-Davidson stands for independence, freedom, individuality, expressing ones self, adventure on the open road, and experiencing life to its fullest. Harley-Davidson has a value mentally greater than the value to applications. Harley-Davidson has a unique and illustrates the lifestyle of the American people. It is a dream of many people who have owned or ridden caused lot of pride. Creating a common experience between the brand and the consumer over 100 years of Harley-Davidson, so the customers caused relationship and the value of Harley-Davidson together. Individuality, expressing ones self, adventure on the open road, and experiencing life to its fullest. This is what people are buying when they buy a Harley. 4. Relate the concept of customer equity to Harley-Davidson. How does Harley Davidson strategy focus on the right relationships with the right customers? Harley-Davidson made a detailed plan to analyze customers need and their consumption potential. Developing club marketing to keep long-term customer relation is the base of right relation and right customer. Harley-Davidson understands the power of a deep connection to a client is a true brand. They benefit room a long cycle life and indispensable to bring revenue and competitive advantage. So the thing that makes them different from one another. The belief that the consumer owns the brand, not the company has any idea on this. Consumers have become the people we need to build relationships. Harley Davidson strategy focuses on the right relationships with the right customers by gathering meaningful customer insights, utilizing new marketing technology and has kept in connection with customers to asses their needs so that Harley Davidson can building a strong and attractive brand and a product that can satisfy these needs.

Thursday, November 21, 2019

Regal Movie Theaters (marketing research) Essay Example | Topics and Well Written Essays - 500 words

Regal Movie Theaters (marketing research) - Essay Example There are people who finish late, go home for dinner and catch a late night movie. Hence post 6pm the theatres are crowded as compared to any other time of the day. There can be many strategies based on price strategy (giving discounts), privacy (giving priority seats with no body near you) or even family attraction deals (a form of discounting like 3 for 2 or 4 for 2). Privacy: Give couple seats which are not surrounded by people. And don’t allocate seats near them to anyone allowing letting them have a sense of privacy. Through this may lead to issues of nuisance that might happen with dodgy couples which remains to be tackled. Family deals: there are grand parents who might want to take their grand children out for a movie. Couples sometimes take leave from work for half a day work and can spend the rest of the half in a movie theatre taking benefit of this scheme. Tickets of Regal movie theatres are fairly priced as compared to its competitors. It’s slightly cheaper in few and slightly dearer in few. Regal movies do not believe in giving differential pricing between weekends and weekdays which they can try to create a market pull for weekdays. Regal is trying to give almost everything right form discounts, family schemes, cheap pop corns and candies to card points at a reasonable price. This is hitting their bottom line hard and there seems to be a scope of either increasing the prices or modifying the scheme to get more benefit out of it. It does not need any numbers or expert comments when it comes to gauge the success IMAX and 3D movies have had in recent time. Attendance and ticket sales are two major factors with which the industry measures its success or failures. In 2010 the attendance was down by 5.25% which might be considered as a devastating drop but thanks to the revenue from 3D films that gave the industry $10.5 Billion dollar ticket sales. The extra prices for 3D movies charged by

Wednesday, November 20, 2019

Handling customer complaints in hospitality Essay

Handling customer complaints in hospitality - Essay Example This essay examines the various ways through which resources and activities can be reconfigured to accommodate and reduce variability in the handling of customer complaints. CAPACITY The main structural features of hospitality have significant implications for the management of operations in the sector. These structural factors also influence the nature of operations in hospitality. The most important of these structural considerations are related to the effect of seasonality on demand for the hospitality industry (Hayes, 2011). Most activities that are attractive to tourists also play a significant role in leisure consumption at the local level are highly seasonal in terms of feasibility and entertainment. Take Skiing as an example, it plays a role in both tourism and leisure, and at the same time an activity confined to winter and as such localities and operations relating to the provision of facilities and services are time limited (Hill, 2012). Likewise, outdoor activities depend on warm weather such as water sports are limited to summer unless one is in the tropical and sub-tropical locations. Most of the time ‘the operational season’ can be exceedingly short in ‘extreme’ tourism destinations, lasting between six weeks to two months. During which time suppliers seek to maximize on profits from tourism activities to generate sufficient income to cover the full year (Sloan, 2009) However, these structural considerations extend beyond seasonality. Location and distance from key centers of population, while essentially geographical in nature, may lead to the impact of peripherals on hospitality provision (Barrows, 2009). Peripheral locations suffer poor communications and access, and incur competitive disadvantage associated with destinations that offer the same opportunities and facilities, but found closer to the main urban areas with near excellent transport points. For example, Island locations have been the subject of wide study due to the specific influence that insularity brings on the performance and nature of the hospitality sector. Maintaining operations in remote areas can bring in  a challenge in hospitality (Jones, 2002). SERVICESCAPE AND PROCESS DESIGN The business ownership within the hospitality industry can be termed as another operational consideration. The weighing scale between large, chain-owned multiples and small, independent operators in the hospitality industry outlines the way the industry operates and how businesses are shaped (Krajewski). In most parts of the developed world there is a trend of increasing multiple operation and ownership, either by means of various forms of management or franchise or a direct model. This enacts requirements and standards on the operational standards adopted in these businesses. In other destinations mainly in the developing world, hospitality operations experience substantial contrast between micro operations of local entrepreneurs and big multinati onal operations in terms of market activities food or souvenir. Some states in the developing world that have pushed forward the early stages of growth in hospitality based on multinational investment currently recognize the importance of micro businesses to the future sustainability of the hospitality industry (â€Å"Managing service quality†). In hospitality customer expectations vary considerably across the sector on the basis of the type of business, where it is located, and the price-value benefit that

Monday, November 18, 2019

Research report in the field of Web Development and emerging standards Essay

Research report in the field of Web Development and emerging standards - Essay Example ly, UH Solutions is Bizzolutions soft group that conduct their activities based on the latest innovative technologies and prior role of the development teams and engineers for keeping the performance up-to-date towards maintaining the competitive edge of the company in the global environment (Turnbull, 2013). In the real world, the continuous revolutionary approaches in all the spheres and dimensions of technology have imposed enormous impacts over the inhabitant’s lives. To be precise, significant development of Information Technology (IT) has strong impacts over the entire industrial sector especially in the software sector. The emergency of the internet evolves from development of electronic computers with the concept of packet networking. The concept of internet has also been linked to the development of ARPANET by the US Department of Defence’s Advanced Research Projects Agency (ARPA), which is packet-switching network designed to form communication among the ARPA terminals during 60’s. Besides, Paul Baran and Donald Davies have made the first stable linkage among the multiple computers with the use of ARPANET during the year 1969 after ten year of development of initial conceptual network that develop by Paul Baran and Donald Davies. Though at such time the com puter were highly expensive but with the significant development of IT, the use and benefits of internet has been recognise in every sphere of industries (New Media Institute, 2014; Computer History Museum, 2004). Initially, the development of internet has not resulted into the prevalence of the concept of web. Web has been developed with the use of three key protocols including HTML (Hypertext markup language), HTTP (Hypertext Transfer Protocol) and URLS (Uniform resource locator). Murray Leinster has initially developed this idea in 1946 but the real version has been developed earlier in 80’s when Tim Berners Lee work over the ‘Enquire’ project. ‘Enquire’ consist of database of

Friday, November 15, 2019

Marketing Concepts And Principles Of Success Of Subway Marketing Essay

Marketing Concepts And Principles Of Success Of Subway Marketing Essay Marketing analysis consists of finding out the group of potential customers or consumers as well as the market you are targeting. we need to find out their potential needs how can we develop and modify the product or services to develop their needs. We should also know the preferable usage the customer might have for the product or service. We should also be aware of the competitors operation throughout the market that is their pricing policy so that we can be one step ahead of our competitors. We should also be careful about the distribution of the product and services in order to make sure it reaches the right target of the market both local and international. This report is written by studying Subway a leading sandwich shop in Britain. Synopsis The story begins in Bridgeport, Connecticut, USA during the summer of 1965. Fred DeLuca, an ambitious 17-year-old high school graduate, was looking for a way to make enough money to pay for his university tuition. The solution came at a BBQ during a conversation with a family friend, Dr. Peter Buck. Dr. Buck suggested to Fred that he open a submarine sandwich shop having seen a sandwich shop in his hometown experience huge success.   With a $1,000 loan from Dr. Buck, the partnership was formed and Petes Super Submarines opened in August 1965. The first year was a challenge and a learning experience for the young entrepreneurs. They opened their second location a year later and quickly realised that marketing and visibility were going to be key factors in the success of the business the third outlet was in a highly visible location and its still serving sandwiches today. The name was shortened from Petes Super Submarines to SUBWAY ® and the familiar bright yellow logo was introduced.   The next step was to formulate a business plan that outlined the SUBWAY ® chains goals. In an effort to reach those goals, SUBWAY ® outlets began franchising, giving others the opportunity to succeed in their own business venture. The first SUBWAY ® franchise opened in Connecticut in 1974. Literature Review Compare alternative definitions of marketing.(P1) Marketing is a social and managerial process by which individuals and groups obtain what they need and want through creating and exchanging products and value with others.(kotler 2003). Marketing is the management process which identifies,anticipates and supplies customer requirements,efficiently and profitably.(Chartered Institute of Marketing). Marketing is the process of planning and executing the conception, pricing,promotion and distribution of ideas,goods and services to create exchange and satisfy international and organizational objects.(AMA 2004). As far as we can see in the above definitions that all of them is trying to say the same thing that it is a process. Some say it is a social process some say it is a planning process. I would define marketing as a way to reach the consumers as well as customers as AMA American Marketing 2004 has the definition that it is the perfect finishing of pricing promotion and distribution of ideas. I agree with that definition. Identify the main characteristics of marketing oriented organizations.(P2) All marketing oriented organizations develop their business around the customer. They focus on the environment and make a key factor in their decision making Ans:there are four main characteristics which explain the marketing oriented organizations. They are-1)Shared values. 2)Organization. 3)Strategy. 4)Stakeholders. 3)Strategy-Every market oriented company should have a good long term strategy. This is because the company will have a target of gaining its ultimate goal that is to be a market leader that is why from the first they should have a strong strategy which is understandable and flexible also. 4)Stakeholders-Stakeholders are those who has a direct or indirect stake which can be affected by the organisations behaviour or activity.For an organization stakeholders are a very sensitive issue.They should be careful when they make any decisions because the decision must be taken in consideration with the view point of the stakeholders.If the stakeholders are unhappy then this might affect the organization very badly. 3:Explain the various elements of marketing concept.(P3) Team work and Integrated approach to business Profitability Customer orientation Identify and assess the benefits and costs of marketing approach.P4 Ans: the cost and benefits of marketing approach are- Cost 1Regular marketing research-Company needs to do regular market research in order to stay updated according to the market. 2)Building excellent services-Company needs to give a good service both with the suppliers and the customers in order to build a goodwill for the company. 3)distribution-Company needs to be very particular in terms of the distribution costs.if the distribution cost is high it might affect them in the long run in terms of increasing the total cost. Benefits- 1)Profit-A good marketing approach means that it is going to hit the right point which should be the profit. 2)Customer loyalty and trust-Customer loyalty should be one of the key benefit. loyalty comes with the trust which is an important factor. when a customer trusts a company the customer will recommend it to the others. that is how the company will increase its benefit from the marketing approach. P5:Identify and explain macro and micro environmental factors which influence marketing decisions. RELATE INFORMATION TO SUBWAY Macro environmental factors which influence marketing decisions are(P5/M2) Economic Environment It is best described as having the factors that affect consumer buying power and spending patterns (Kotler et al 1998). These factors include income, levels of employment, inflation, value of the currency and many others. The income is a very important factor in terms of macro-environment as any customer because the customer should have the purchasing power to buy the product. If they have the purchasing power they are most likely going to buy at subway. Value of the currency is an important factor. If the value fluctuates then we cannot value the correct value of sub according to the market. Political Social Technology Micro environmental factors which influence marketing decisions are- 1)Customers-Organisations survive by satisfying the needs, wants and providing the benefits of the customers. For e.g-Subway gives special offers to the customers like the sub of the day. 2)Employees-Employing the correct staff and keeping this staff motivated is a very important part in terms of strategic planning process of the organization. Training and development is an important factor in subway in terms of getting a competitive edge than any other fast food joint. 3)Suppliers- Keeping a good relationship with the supplier is a very important factor. Prices of raw materials might increase. A good relationship ensures that they get the products of good quality at a competitive price. P6:Propose segmentation criteria to be used for two products in different markets. Ans: Market segmentation is the fundamental component of a market-based strategy. A market segment is a specific group of customers with distinctive customer needs, purchase behaviours and different descriptive characteristics.(Best 2000). We can talk about the halal stores in subway and the general store of subway. They are two products in different markets. One is aimed generally. Another one is specially aimed at the muslim customers who wants to eat at subway. P7:Outline the factors which influence the choice of targeting strategy. Ans: targeting strategy is the selection of potential customers to whom the business wants to target them to sell products or service. Factors influencing the choice of targeting strategy are- 1)Markets diversity- Market goes on to take different routes like the case of subway which is diversifying their sandwich products. 2)The level of competition-Subway has to ensure their goal beside the level of competition that they are facing. This is why they are targeting health conscious customers by introducing low fat subs like chicken teriyaki. They also use the slogan called Eat Fresh to target people who want to eat out but wants to avoid junk food. 8)Explain how buyer behavior affects marketing activities in two different buying situations. Ans: Buyer behavior affects marketing activities in many situations. One may be the way the customers lifestyle is. For e.g.-if the customer is an marketing officer he is more likely to buy formal clothes than a plumber who needs informal clothes like jeans because it will be more suitable for him to work with a pair of jeans. Another situation might be a psychological factors. For e.g-customers of mark and spencer might belief that ms products are very much better than the others. This might influence them to buy that product.