dolution

dolution.

Students are going through a three-step process to obtain their ID cards. Each student will first visit the only registration desk before going to one of 6 cashiers to pay a fee for the card. After that, he/she will visit one of the 5 ID processing stations to have his/her picture taken and the ID card printed. Registration takes 4 minutes. Visits to the cashier and ID processing station take 10 and 15 minutes, respectively. If the bottleneck resource has the utilization of 73%, what is the per hour flow rate through the process?

7. Consider a simple process where work flows from Activity A to Activity B to Activity C to Activity D. Activity A takes 3 minutes and is performed by Aaron. Activity B takes 5 minutes and is performed by Aaron and Betty together. Activity C takes 4 minutes and is performed by Betty and David together. Activity D is performed by David and takes 3 minutes. What is the bottleneck of the process?

Activity B

Aaron

Betty

None of these

Activity C

dolution

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

dolution

dolution.

6. Effects of a tariff Suppose the following graph shows the domestic demand (D) and domestic supply (S) for cheese in Algeria, which is a producer as well as an importer of cheese. The free trade world price of cheese (P.) is $2,500 per tonne. 7000 Price with Tariff Tariff Revenue PRICE COST (Dollars per tonne) Change in PS DWL 1500+ 1000
QUANTITY (Milions of tonnes) per tonne. Algeria would produce million tonnes of cheese and import With free trade, the price of cheese in Nigeria would be s million tonnes. Suppose Algeria’s government imposes a 60% tariff on cheese imports. Assume the tariff does not influence the world price of cheese. On the preceding graph, use the black line (plus symbol) to show the world supply of cheese with the tariff its domestic consumption by The tariff million tonnes, and Algeria’s production of cheese by million tonnes, its imports by million tonnes. On the preceding graph, use the green quadrilateral triangle symbols) to shade the area that represents tariff revenue. Then use the purple point (diamond symbol) to shade the area that represents the change in the producer surplus resulting from the tariff. Finally, use the black points to shade the area, or areas if there are more than one on the graph, that together represent the deadweight loss resulting from the tariff Note: Select and drag a fill area point from the palette to the graph. To fill in regions on the graph, merely drop the fill area point on the desired region.
On the preceding graph, use the green quadrilateral (triangle symbols) to shade the area that represents tariff revenue. Then use the purple point (diamond symbol) to shade the area that represents the change in the producer surplus resulting from the tariff. Finally, use the black points to shade the area, or areas if there are more than one on the graph, that tooether represent the deadweight loss resulting from the tariff Note: Select and drag a fill area point from the palette to the graph. To fill in regions on the graph, merely drop the fill area point on the desired region FH in the blank calls in the following table to summarize the effects of the tariff on Algeria’s welfare. (Hint: The area of each shaded region on the graph can be found by clicking on the polygon.) Amount of Change (Millions of dollars) Change In… Gain or Loss Tariff revenue Producer surplus Consumer surplus Change in total welfare

dolution

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

dolution

dolution.

cleaning company

  • Product/service (Describe & Explain with details)
  • Unique Selling Position (How will your products/services succeed in the market where others may have failed? What gives your products/services a distinctive edge?)
  • Value to Customers (How do your customers value your products/services? Are they a necessity, luxury, or something in between?
  • Market Position (Where do your products/services fit in the market? Are they high-end, competitive, or a low-cost alternative to the products/services offered by your competitors? How does this compare to your competitors?
  • Your Company`s SWOT (Your strengths, weaknesses, opportunities, & Threats)…your business not the competition!
  • Target Market (Who are you selling to? Why would they buy your products/services over others?)
  • Customer Demographics (Define who your target customers are and how they behave. You can include age, gender, social status, education, and attitudes. What are their lifestyles, activities, values, needs, interests or opinions? Where are they located?
  • Key Customers (Identify your key customers. (These can be large consumers of your products or individuals whose satisfaction is key to the success of your business.) How will you target your products/services to them? How will you deliver your product/service to them?
  • Customer Relationship Management (CRM)(How will you maintain a good relationship with your customers? What techniques will you use? How will you keep your customers coming back? Have you introduced customer service standards? Do you follow any particular code of practice?
  • Marketing Strategy (How do you plan to enter the market? How do you intend to attract customers? How and why will this work? What steps or activities will you undertake to achieve your goals/objectives? For each marketing activity/milestone: Marketing activity/milestone: Print advertising, online advertising, mail-out, giveaway, media release, event, website, blog/social media, public relations, branding, and artwork, or publications and catalogs.

dolution

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

dolution

dolution.

The cybersecurity landscape continues to evolve as cybercriminals become ever more sophisticated, and digital security tools accelerate to mitigate the risks as much as possible. 2020 presented even more opportunities for hackers to strike, for example, using email phishing scams such as purporting to be authentic PPE providers, or from HMRC to dupe unsuspecting victims. More recently we have seen how phishers are now using the vaccine rollout to trick people into paying for fake vaccines.

Artificial Intelligence and Machine Learning have been heralded as innovative technologies to help thwart evolving exploits and are a key part of any cybersecurity arsenal. But AI is not necessarily the right tool for every job. Humans are still able to perform intricate decision making far better than machines, especially when it comes to determining what data is safe to send outside of the organisation. As such, relying on AI for this decision making can cause issues, or worse, lead to leaked data if the AI is not mature enough to fully grasp what is sensitive and what is not. So where can AI play an effective part in a cyber defence strategy and where can it present challenges to the user? Oliver Paterson, Product Expert VIPRE Security Awareness Training and SafeSend, explains.

Spotting Similarities

One of the primary challenges for AI to mitigate the risk from accidental insider breaches is being able to spot similarities between documents or knowing if it is ok to send a particular document to a specific person. Company templates such as invoices appear to be very similar each time they are sent, with minor differences that typically, Machine Learning and AI failto pick up. The technology will register the document as it usually would, despite there being very few differences in the numbers or words used, and would typically allow the user to send the attachment. Whereas in this example, a human would know which invoice or sales quote should be sent to which customer or prospect. Deploying AI for this purpose in a large corporation would likely only stop a small proportion of emails from being sent. But even when the AI detects an issue to flag, it will alert the administration team rather than the user. This is because if the AI believes that the email shouldn’t be sent, it doesn’t want the user to override it and send the email anyway. This can therefore become an additional burden for the admin team and cause frustration for the user at the same time.

Data Storage

AI can also be very data-intensive when used for this defence strategy. This is due to the fact that in this setup, every email must be sent to an external system, off-site, to be analysed. Especially for industries that deal with highly sensitive information, the fact that their data is going somewhere else to be scanned is a concern. Moreover, with Machine Learning, the technology has to keep a part of this sensitive information in order to learn rules from it and use it again and again, to make an accurate decision the next time. Given the Machine Learning nature of these types of solutions, they cannot work straight off the shelf, but have a learning phase that lasts a few months, and therefore cannot provide instant security controls. Understandably, a lot of companies, especially at enterprise-level, are not comfortable with their sensitive data being sent elsewhere. The last thing they want is it being stored off-site, even if it is just for analysis. AI, therefore, adds an unnecessary and unwanted element of risk to sensitive material.

The Role of AI in Cybersecurity

AI does have a critical role to play in many elements of a business’ cyber defence strategy. Antivirus technology, for example, operates a strict ‘yes or no’ policy as to whether a file is potentially malicious or not. It’s not subjective, through a strict level of parameters, something is either considered a threat or not. The AI can quickly determine whether it’s going to crash the device, lock the machine, take down the network and as such, it is either removed or allowed. It is important to note that VIPRE uses AI and ML as key components in their email and endpoint security services for example as part of their email security attachment sandboxing solution where an email attachment is opened and tested by AI in an isolated environment away from a customer’s network. So while AI might not be an ideal method for preventing accidental data leakage through email, it does have an important part to play in specific areas such as virus detection, sandboxing and threat analysis.

Conclusion

With so much reliance on email within business practices, accidental data leakage is an inevitable risk. The implications of reputational impact, compliance breach and associated financial damage can be devastating. A cyber-aware culture with continuous training is essential, and so is the right technology. Providing a technology that alerts users when they are potentially about to make a mistake – either by sending an email to the wrong person or sharing sensitive data about the company, its customers or staff – not only minimises errors, it helps to create a better email culture. Mistakes are easily made in a fast-paced, pressured working environment – especially with the increase in home working not providing the immediate peer review that many are used to. But rather than leaving this responsibility to Artificial Intelligence, this type of technology, combined with trained human insight, can enable users to make more informed decisions about the nature and legitimacy of their email before acting on it. Ultimately, supporting organisations to mitigate against this high-risk element of business, and reinforcing compliance credentials through a cyber-aware culture.

Answer the following question based on case study

a) What are your recommendations to the online risk policy makers in context to AI enabled cyber security measures as mentioned in the case study? Justify your answer with analogy to Risk Governance Framework from International Risk Governance Council (IRGC).

b) There is an ongoing cybersecurity warfare. Better technology is winning. Explain the need for cybersecurity experts in such a case scenario.

dolution

 
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"