SlideShare a Scribd company logo
1 of 46
Running head: FINDING JOB AS A CYBER SECURITY
SPECIALIST
FINDING JOB AS A CYBER SECURITY SPECIALIST 2
Iteration 1: Gathering Requirements
Finding Job as a Cyber Security Specialist
Action Research
Course Code:
Name:
Table of Contents
Plan 3
Act 4
Observe 4
Reflect 5
First Iteration: Gathering Requirements
Plan. The first phase of the iteration is the planning phase that
is concerned with describing the activities that are to take place
in the accomplishment of the iteration. The first iteration is
requirement gathering – that is, gathering information
pertaining to what is required for one to get a job in cyber
security. The planning for this iteration included a number of
activities undertaken by the researcher in order to come up with
a good plan that will see to it that the iteration is a success.
Among the activities undertaken are as discussed below:
1. Establishing the goals of the iteration. The first activity in
the planning phase was to determine the various goals of the
iteration. Undertaking this iteration needs to bear certain
results, and these are defined in order to help the action
researcher chart a path towards their achievement. Among the
goals defined in this phase include determining the minimum
qualifications in cyber security.
2. Determining a set of activities. The second activity
undertaken in the planning phase is establishing those activities
that will aid in the accomplishment of the first iteration. These
activities must be goal-oriented in that their core business is to
help the researcher obtain the information about the career in
cyber security.
3. Determining and allocating resources. Goals do require the
researcher to use various resources to accomplish them. The
third activity entails determining those resources that will be
required to attain the objectives of the first iteration of the
action research. After determining them, the resources are then
allocated to the various activities.
4. Monitoring. Lastly, there is a need to monitor the iteration
and the activities being undertaken in order to ensure everything
goes according to the plan.
Act. The second phase of this iteration is the action phase. This
comes after planning whereby the main aim is to put the plan
into action and accomplish the goals and objectives of the
iteration. This is a phase that can take quite some time, and the
time specified herein for this phase is a minimum of 40 hours.
Since planning is done without specific knowledge of what will
actually happen in the future, the action phase will also have to
make necessary modifications to the plan, as well as take
corrective measures so that the goals will ultimately be
achieved. In determining the minimum requirements for one to
get a job in cyber security, the following actions were
undertaken.
1. Getting the resources ready. The first activity in the action
phase is to get the resources ready so that the researcher can get
set for real action. These resources were as established in the
planning phase, and were made available.
2. Collecting data. The second activity was to collect data
pertaining to the cyber security career. The researcher used
various search engines to extract this data from the internet.
Other sources were also utilized, and these include guides,
handbooks, books, journals, news articles, etc.
3. Data analysis. After obtaining the raw data, data analysis
followed, and this was simply in the form of content analysis to
help extract the useful bits of the data.
4. The last action was to compile a list of the various
requirements for one to get a job in cyber security. Various
sources used did have a different set of requirement, and a
comprehensive list that includes most of these is the end result
of this phase.
Observe. The third phase of this iteration is the observation
phase. The observation phase entails a discussion of the various
activities undertaken throughout the iteration and their
corresponding outcomes. Various issues as observed are
explained herein.
Among the things observed in this iteration is that the cyber
security career, just as is the case with other careers, requires
basic education and certification. The minimum level of
education is the college of which a certificate or diploma is
required as evidence. Proper cyber security teaching programs
do emphasize on the current technology, meaning that a person
entering into this career also needs to be up to date with the
emerging trends in technology. The teaching program should
also equip the learner with the necessary tools and
methodologies that keep knowledge evolving the same way
technology does. Among the courses offered in teaching
programs that forms part of the requirements for a job in cyber
security include a bachelor’s in cyber security. Its coursework
essentials include information security, computer hardware,
vulnerability assessment, computer science and statistics among
others. These are the essential skills in this career.
Various other certifications do improve the employability of a
person, but may not be part of the minimum requirements for a
job in this career. They boost competitiveness in the job market.
Apart from the educational background, experience is vital in
job acquisition in this field, and this is because of its technical
nature. In that case, the person going for this job would need a
particular level of experience which also forms part of the
minimum requirements. The best way to gain this experience is
through internships that are offered by various hiring
organizations.
Reflect. The last phase of this iteration is the reflection phase.
This is the phase that expresses the personal experiences in
undertaking the entire iteration, and discusses not the lessons
learned, but the researcher’s personal feelings and
interpretations of the various incidences as observed within the
iteration. It focuses on the success or failure and the causes of
these, as well as the challenges and restraints encountered in the
iteration.
The entire iteration was a success, and this is an indication that
all went on as planned. The objectives and goals of the iteration
were to establish the various aspects of a career in cyber
security, including the minimum requirements and courses and
skills that one need to possess. This was obtained as the
researcher compiles the comprehensive list of these
requirements. The major process that needs to be improved is
data search. The criterion used for data search was a
comprehensive one that aimed at taking into account all forms
of data sources. However, all these sources end up giving
similar basic requirements despite all the time taken. Time
could be saved by streamlining this process.
Among the challenges experienced in this iteration was data
analysis. As explained earlier on, this entailed content analysis,
which meant going through all the sources made available,
compare and contrast the information and compiling a list. This
was a time consuming event, and this was coupled with the time
restraints of 40 hours. However, everything went on well and
the goals achieved. The major risk herein was generalizing the
requirements, forgetting that there are companies that do require
some form of differentiation or customization.
Enhancement of the marketing systems for Sellers at Flip Kart
Submitted to
Dr. Asila Sayedi
Submitted By
Darapuneni Srikanth
5153179
California University of Management and Science
Date: OCT 3, 2016
Enhancement of the marketing systems for sellers at Flip Kart
1. Research Topic
The research topic revolves around the enhancement of the
online marketing system for sellers. While working at Fli p Kart
during my job placement opportunity, I realized that there are
only a few sellers that possess direct contact for orders and
stuffs. In other words, very few of them have fulfillment service
with Flip Kart since much of the attention is given to the buyers
as opposed to sellers. Despite the fact that Flip Kart alongside
other online marketing applications are establishing themselves
as a household names because of the confidence they have
instilled in their investors, it is important to note that note all
sellers remain satisfied when using Flip Kart because it has
gained popularity among buyers than sellers.
2. Overall Purpose of the Project
AS much as Flip Kart has gained popularity around the globe
because of its products and services, it can be argued that it also
possesses a number of weaknesses as far as online marketing is
concerned.
· Product succumbing in the Flip Kart value chain: Flip Kart is
facing a challenge in personalization, delivery, payment issues
and cyber security that has made Flip kart’s chain of
commanding very challenging.
· Digital literacy and the concept of consumer connect: Based
on some statistics, it is acknowledged that the online marketing
on Flip Kart is implying some signs of improvement but this is
not always the case when it comes to the customer’s level of
digital literacy.
· No net revenues in sight because of instability in management:
Flip kart has infused immense capita from shareholders and
investors and in the process; they are burning the investments
with customer acquisition coupled with heavy discounts. In
other words, the net revenues that are not in sight may cause a
challenge to Flip Kart’s business operations if the break-even
point is not realized.
3. An Overview of the Company
Flip Kart online Services is a commerce industry based in India
that conducts its operations as an online retailer. Additionally,
some of its products include stationery, perfumes, movies,
mobiles, cameras, music, healthcare and personal products and
home and kitchen appliances. Moreover, it also specializes in
the provision of Kids clothes, games, and toys. It started its
operations in the year 2007 under the guidance of Binny Bansai
and Sachin Bansai. Furthermore, it is registered in Singapore
and it is headquartered at Bangalore, Karnataka in India.
4. Recommendations
The current problems that Flip Kart is facing can be improved
through the following suggestions:
· Establishing a way to improve on their shipment and logistics
service: In this case, as much as a strong and perfect logistics
service is one of the primary reasons behind the success of most
online marketing systems, it is acknowledged that Flip Kart is
lagging behind in this department because of the remoteness of
some of the towns in India.
· Creating awareness on the employment of digital marketing
apps: Owing to the fact that quite a number of rural Indian
citizens are unaware of the Flip Kart application, it is important
for Flip Kart to create some learning, training, and development
program that will ensure that individuals improves their
knowledge as far as the Flip kart app is concerned.
· Establish a way of attracting top talent from India: In this
case, because things in India can be less chaotic and less
structured, top talent will ensure that the issues revolving
around management is dealt with accordingly hence eliminating
the challenges associated with the net revenues in sight.
5. Three Step-by-step Implementation Plan
A systematic implementation plan is very crucial to the
elimination of the problem facing sellers at Flip Kart. In this
case, the step-by-step implementation plan is as follows:
· Improving shipment and logistics services
· Collecting data as far as courier services are concerned within
the villagers and local towns
· Eliminating the fear factor associated with conducting an
online transaction
· Improving on the online security regarding personal
information and data
· Awareness creation
· Conducting simulation programs and trainings
· Word of mouth promotions and media advertisements
· Eliminating the challenge of online security among the local
citizens
· Attracting top talent
· Acquisition of well-known companies
· Offering rewards and promotions for high performers
· Acknowledging and giving credit to the work of an employee
6. Projections and Benefits of the Company Based on the
Recommendations
The fear of making online transactions has been one of the
major challenges that sellers have been facing. In other words,
the implementation of the recommendations suggested will
ensure that the shipment and logistics services of Flip Kart are
based on the tastes and preferences of the sellers hence
improving on their service delivery to sellers in the process.
Additionally, a top talent attraction will eliminate the issue of
poor decision making when it comes to management hence in
the process, it will provide profit insights for investors.
Furthermore, through trainings and simulation programs, the
level of digital literacy of the local Indian citizens will improve
hence increasing the number of online transactions for Flip kart
.
Enhancement for Marketing Systems for Sellers at Flip Kart
Enhancement for Marketing Systems for Sellers at Flip Kart
Submitted to
Dr. Asila Sayedi
Submitted by
Srikanth Darapuneni
Student ID
5153179
California University of Management and Science
Date: October 17, 2016
OUTLINE
I. Abstract
II. Introduction
III. Company overview
A. History
B. Business model
IV. Analysis
A. Industry analysis
B. Company analysis
V. PEST analysis
A. Political
B. Environmental
C. Social
D. Legal
VI. SWOT analysis
A. Strengths
B. Weaknesses
C. Opportunities
D. Threats
VII. Recommendations and implementations
A. Improving shipment and logistics services
i. Collecting data as far as courier services are concerned within
the villagers and local towns
ii. Eliminating the fear factor associated with conducting an
online transaction
iii. Improving on the online security regarding personal
information and data
B. Awareness Creation
i. Conducting simulation programs and trainings
ii. Word of mouth promotions and media advertisements
iii. Eliminating the challenge of online security among the local
citizens
C. Attracting Top Talent
i. Acquisition of well-known companies
ii. Offering rewards and promotions for high performers
iii. Acknowledging and giving credit to the work of an
employee
VIII. Conclusion
Introduction
Among many online marketing companies, Flip Kart has had an
advantage of achieving steadier growth to become one of the
most preferred online sellers (Bhasin, 2016). On contrary,
however, Flip Kart has faced several challenges that act as
potential obstacles to continued success. Some of the problems
include disintegration in the supply chain coordination, digital
illiteracy, and poor management (Hollensen, 2015). An
existence of such challenges suggests that Flip Kart does not
have an all-smooth journey to success as they suggest that the
company faces some forces that if unidentified could lead to a
big failure of the company. In addition to the down pulling
forces, there obviously exists positive forces to which Flip Kart
owes its current prosperity. To identify the different forces,
however, sufficient analysis is required to establish the negative
and positive forces (Hollensen, 2015). Some of the most
relevant analysis techniques are the SWOT and PESTLE
analyses.
SWOT Analysis
A SWOT analysis is a technique for analysis that guides a
business organization to identify its favourable and
unfavourable aspects both in the organization and out in its
surroundings (Bhasin, 2016). Favourable aspects are the
strengths while the negative ones are weaknesses. SWOT is an
initiation for strengths, weaknesses, opportunities, and threats.
Strengths are those aspects of a business that provide it a higher
advantage compared to others while weaknesses are the aspects
that place it at an increased disadvantage than other businesses
(Hollensen, 2015). Opportunities, on the other hand, are those
aspects that lie in the business’ environment and which it can
exploit to its benefit. Threats, on the other hand, are those
aspects that pose as potential causes of trouble for the business
and that could result in failure (Yüksel, 2012).
I. Strength
Experience in a given business field acts as a big advantage for
the concerned parties. Flip Kart has founders who had been in
the e-commerce business before and could, therefore,
understand the business better leading to a bigger possibility of
success and highly efficient strategies which in turn make the
company very competitive (Bhasin, 2016). Acquiring act as a
big breakthrough for Flip Kart as well as giving it a big
advantage in achieving a large number of customers (Hollensen,
2015). Currently, Flip Kart has more than 75 million users that
are quite a sufficient number to guarantee it the success.
Being an online seller as well enables Flip Kart to avoid making
unnecessary shipment as they transport those goods that have
been ordered which saves time, fuel and financial resources that
could have been wasted making trial and error shipments
(Hollensen, 2015). Flip Kart offers such a wide range of
products that enable it to increase attractiveness to customers as
they can shop for a variety of products at Flip Kart.
II. Weaknesses
Being an e-commerce business operator translates to the fact,
that customer’s orders are delivered to their requested
destinations that make the responsibility of the item in the
hands of Flip Kart. If in any case goods are damaged, the loss
goes back to Flip Kart and not the customer.
E-commerce is a very competitive field of business and Flip
Kart as part of it has to be a price taker from customers
(Hollensen, 2015). Buyers can switch online marketing service
providers and therefore have the advantage of setting pr ices that
could at times be unfair in the case of Flip Kart.
High costs of acquiring customers are a great drawback for Flip
Kart. Stiff competition in the industry makes the costs of
acquiring new customers and partners relatively high.
III. Opportunities
Flip Kart is one of the most famous e-commerce service
providers that gives it an advantage in achieving new customer
recruitment (Hollensen, 2015). Advertising activities as well
may be done easily because the company is widely known and
no deep explanations are required.
Operating in a wide range of products gives Flip Kart a big
opportunity to expand its business. A wide range of products
provides economies of scale that translate increased returns.
Digital literacy levels are increasing each day giving e-
commerce service providers an advantage in making themselves
known to people. Flip Kart can use the opportunity of
increasing digital literacy to acquire new customers (Bhasin,
2016).
IV. Threats
High-level competition is the biggest threat that Flip Kart faces.
Companies like Amazon and eBay pose a stiff competition that
greatly threatens the performance of Flip Kart.
As an online service provider, Flip Kart faces the threat of
online data breach. Malicious parties might interfere with their
customer records and information affecting service provision
activities and customer satisfaction levels.
Government restrictions as well act as a threat as they may at
times limit the transaction activities that produce the best return
levels. Regulation on FDI related issues in multi-branding retail
has highly interfered with the success levels of success in the
online marketing industry.
Positive
Negative
Internal
Strengths
Experience
Acquisition of big companies
No unnecessary shipments
Wide variety of products
Weaknesses
Price taking
Transportation risks
High costs of customer and partner acquisition
External
Opportunities
Fame
Wide product range
Increased digital literacy
Threats
High competition levels
Online data breach
Government regulations
Figure 1: Swot Analysis Table
· PESTEL Analysis
PESTEL analysis is a framework that is used by businesses to
analyze macro-environmental aspects that affect them. PESTEL
analysis acts as a strategic tool to establish a better
understanding business position, market behavior and offers
directions for operations (Bhasin, 2016). PESTEL analysis
consists of political, economic, socio-cultural, technical,
environmental, and legal aspects surrounding the business
(Hollensen, 2015). Flip Kart’s PESTEL analysis would help
establish the factors of the environment that highly affect it and
guide it on what aspects to concentrate on.
i. Political Factors
Political factors are concerned with government intervention
into the business sector through regulatio n or restriction of
activities (Hollensen, 2015). Regulations have greatly affected
the growth of Flip Kart like in the case where Flip Kart dropped
acquiring Airtel Zero because it was considered not right to
have the advantage of having free internet access while others
are using it at costs.
ii. Economic Factors
Business factors that affect the way a business operates as well
as how it makes its decisions are economic factors. Some
economic factors consist of interest rates, exchange rates,
inflation rates, profit rates, among others (Hollensen, 2015). In
cases where Flip Kart offered large discounts on their Billion-
sale day, it experiences large profit margin drop and had to
remove customer listings to avoid experiencing loss.
iii. Social Factors
Social factors are those business aspects that incorporate the
concerns of the society like health consciousness, cultural
aspects, age distribution, etc. social factors that affect Flip Kart
may involve the level of digital literacy which in turn
influences the level of online purchase embracing, the level of
trust held by people for online purchasing etc.
iv. Technological Factors
Technological factors concern with the way a business is able to
update the production or service provision methods used as
technology advances. Flip Kart has been on its toes to keep pace
with advancing technology that saw it update its purchasing
application to be able to be used in phones.
v. Environmental Factors
Environmental factors include ecological aspects of nature s uch
as weather, climate change, etc. which tend to affect many
industries (Bhasin, 2016). Flip Kart’s nature is not affected
much by environmental factors, but they may interfere with the
delivery of customer orders.
vi. Legal Factors
Factors that affect the way a business runs, the pricing
procedures, product demand, and supply, etc. are legal factors.
Legal factors affect Flip Kart in terms of price controls and
service charges. Charges that Flip Kart fixes on its products
should align with those of other e-commerce companies to avoid
unfair competition through low pricing (Bhasin, 2016).
References
Bhasin, H. (2016). SWOT analysis of Flipkart - Flipkart SWOT
analysis. Marketing91.com. Retrieved 17 October 2016, from
http://www.marketing91.com/swot-analysis-of-flipkart/
Hollensen, S. (2015). Marketing management: A relationship
approach. Pearson Education.
Jurevicius, O. (2013). PEST & PESTEL Analysis,". Strategic
Management Insight, 13, 2013.
PESTEL-PESTLE Analysis of Flipkart. (2016). Free PESTEL
Analysis. Retrieved 17 October 2016, from
http://freepestelanalysis.com/pestel-pestle-analysis-of-flipkart/
Yüksel, I. (2012). Developing a multi-criteria decision making
model for PESTEL analysis. International Journal of Business
and Management, 7(24), 52.
1
ENHANCEMENT OF THE MARKETING SYSTEM FOR
SELLERS AT FLIP KART 12
Enhancement of the Marketing Systems for Sellers at Flip Kart
Literature Review
Submitted to
Dr. Asila Sayedi
Submitted By
Srikanth Darapuneni
Student ID
5153179
California University of Management and Science
Date: October 10, 2016
Contents
3Enhancement of the Marketing Systems for Sellers at Flip Kart
3The Challenges Associated with a Poor Marketing System-
Statement of the Problem
3The Concept of Marketing System-Recommendations
4How to Establish an Effective Marketing System
5Improving Shipment and Logistic Services
6Promoting Digital Literacy
8Attracting Top Talent
9Benefits of a Good Marketing System
11References
Enhancement of the Marketing Systems for Sellers at Flip Kart
The Challenges Associated with a Poor Marketing System-
Statement of the Problem
Maintaining strong, perfect, and reliable logistics service is the
backbone of success for any online marketing system. Flip Kart
however has been witnessed to lag behind in attaining such
shipment and logistics services. Attaining a supply chain that is
able to perfectly coordinate supply chain activities to and from
to best satisfy customer needs. Flip Kart has not achieved a
system that gives its customers the privilege to experience such
satisfaction. Activities across the supply chain tend to slip out
on each other and coordination of the departments involved
becomes hard which in turn brings along poor performance of
the company. Experiencing slip outs in the supply chain
additionally means that customer’s products may sometimes be
delivered in bad condition, less quality or sometimes fail to be
delivered (Ho & Chang, 2015)The Concept of Marketing
System-Recommendations
Using online purchase systems requires enough skill on using
the internet. In the case of Flip Kart, users do not just require to
be familiar with the internet but also possess the knowledge to
use online marketing and shopping applications. India’s
remoteness poses a great challenge for Flip Kart to address as it
continues to seek improved new customer recruitment. Flip Kart
therefore faces a challenge of finding potential customers who
are technologically updated to engage in online purchasing. It is
therefore on Flip Kart’s call to make sure they find solutions to
the challenge and increase their potential customers across India
(Scott, 2012).
Unstable management systems have seen the performance of
Flip Kart Inline Commerce System go down. When a company
does not enough managerial skill at its disposal, it becomes very
easy to lose account of its activities, including financial ones.
Flip Kart is revealed to experience shortage of high-skilled
personnel in its management team. Management is the key
determinant of the overall performance of an investment.
Crucial aspects like making decisions, building strategies, etc.
are the responsibility of the management department. If
individuals in management department lack excellent
managerial skills, then they are sure to fail in making the
investment fail (Dychtwald, Erickson, & Morison, 2013).
How to Establish an Effective Marketing System
An improvement in the supply chain management is clearly
necessary if Flip Kart really aims at providing the best services
to its customers. Ensuring delivery of customer orders in the
expected time is one of the considerations for possible
improvement that Flip Kart should make. Delaying customer
orders may inconvenience customers and they may never be
interested in ordering for goods from the same investment
again. It should be made a priority to monitor all the activities
that take place in the product delivery process. Flip Kart should
ensure that customer orders are responded to in the right time as
well as in the right condition (Dychtwald Erickson & Morison,
2013).
Flip Kart should devote itself towards creating possible
customers in the whole of Indian population. Achieving market
creation all-over India may require methods of promoting
consumer digital literacy. Digital literacy is a key aspect in
achieving a desired consumer mobilization level. When people
do not know how to use the Flip Kart’s purchasing application it
will not in any way be possible for them to make purchases.
Potential customer digital illiteracy hinders expansion of market
that poses a challenge for Flip Kart to ensure that they enlighten
potential customers on digital purchasing to increase the
recruitment levels (Baker, 2014).
Management problems and challenges are a great threat to the
performance of the marketing system in any commercial
investment. An insight of net financial reports should be
provided to assist the company to make decisions. When such
reports are not available, or are not clearly stated, decisions
may not be made appropriately. Flip Kart should take up the
responsibility to recruit highly skilled managers to manage their
transactions. A keen observation on the customer after-sale
services provided should be made to ensure that they are not
offered at the expense of the company’s net revenues going
dangerously down in ways that threat its achievement of a
break-even point (Phillips, 2012).
Improving Shipment and Logistic Services
One way of dealing with a wrecked logistic and shipment
system is acquiring adequate information on courier services.
Having enough as well as relevant information on courier
services within the villages and towns that they operate will
assist Flip Kart in establishing the relevant delivery times and
places. Courier information should especially be obtained for
the remote areas to ensure that they give their customers
achievable delivery deadlines and terminals. On acquiring
information on the nature of transportation services that are
available, the company should then establish a closer
relationship with the concerned personnel so that delivery of
customer orders is ensured. Having established close enough
relationship makes it possible to follow-up the progress of
delivery as well as the condition of goods (Taiminen &
Karjaluoto, 2015).
Elimination of the fear for conducting online transacti ons
should be done to ensure that customers are confident when
making the transactions. Fear of conducting online business
transaction is brought about by the existence of marketing sites
that are not trustworthy. It does not matter why an individual is
scared of making online transactions, devotion to gain their
trusts could make them a potential customer. Flip Kart should
therefore ensure that it avails its team for demonstration and
promotion form time to time. Conducting such events brings the
company closer to the people and this works great extends in
gaining their trust that in turn increases the number of potential
customers. Creation buyer confidence works to the advantage of
the company as it increases its market size that is crucial for
increased returns (Christopher 2016).
Security of information should be ensured to make sure that
personal information and data cannot be accessed by anyone but
the relevant parties. Online information in this case is the
concern for Flip Kart as their customers transact online.
Protection of customer information should be highly preferred
to ensure that privacy is maintained. Customer information
should be submitted through personal accounts and not to a
website to ensure that, an individual’s information is not
accessible by anyone but them. Delivery means should also be
chosen by the customers to ensure that their preferences are met
as long as the choices lie in the ranges provided by the
company. The company should additionally encrypt its website
using high technology that cannot be cracked to protect
customer’s information (Heskett, 2013).
Promoting Digital Literacy
Awareness creation on the existence of online marketing should
be undertaken to inform people. Technology has been on the
rise and a large part of today’s population can access the
relevant mobile phones that allow one to use the marketing
applications. A wide availability of these mobile phones makes
it easier to create awareness of the existence of marketing
applications. Flip Kart on creating awareness of their online
marketing system needs to indulge in making people aware that
what they do exists and provide a brief on how it is done.
Participating in community activities as well could earn the
company more popularity that is a way of awareness creation.
Appearing in community gathering gives people the chance to
know of its existence that marks the start of a process to know
what they do (Fahimnia et al.,2015)
Conducting simulation and program trainings could as well
assist the company in promoting digital literacy. Digital literacy
could be sometimes being hard to learn individually without
assistance. Flip Kart should take the opportunity and train
peoples especially those in the remote areas and villages on how
advantageous it is to be digitally literate. Providing the
education as well provides the company to teach the people to
use their marketing application, as well as state the possible
advantages that come along with using it. Flip kart should seize
to assume that everyone is digitally literate and they can do the
ordering by themselves. Getting into the villages and remote
areas conducting mobilization exercises does a great job
creating new customers (Cheng et al 2014).
Massive publication and advertisement could be used to achieve
digital literacy and knowledge. Flip Kart could make use of the
media inclusive of social media to advertise its operations.
Advertising should be undertaken to increase knowledge of the
company and increase its publicity coverage. Promotions could
as well be used to publicize the company and also its products.
In promotions, the company could give out items that have an
overview or a brief description of the company. By doing these
Flip Kart will achieve a good target of new potential customers.
Advertisement and publication could as well offer the company
a chance to educate people on the benefits of online purchasing.
Creating confidence to use online purchasing services could be
done as well by providing the relevant explanation to instill
confidence.
Attracting Top Talent
Acquisition of well-known companies in many cases
consequently rises to fame the acquiring company. In order to
attract top management skill, Flip Kart might have to consider
acquiring a well-known company. Individuals, especially those
with great work skills tend to believe that they can adequately
exploit their skill in the well-known companies. By buying off a
famous company or becoming a shareholder of one, Flip Kart
would as well get a chance to get close to top skilled
individuals. Getting close to such personnel would then give the
company personnel a chance to convince a highly skilled
manager to join their work force Shankar et al., 2016).
To encourage workers to improve their performance, Flip Kart
Company can use the technique of providing rewards and
benefits for top performers. In order to get employees to devote
themselves towards achieving the company’s best interest, Flip
Kart could set a target that if one meets, an award will be
presented. In the management department for example,
managers could be given the chance to take turns in running the
activities of the company. Turns could be taken for a period of
three months and rotate for a period of one year. Progress of
each manager is well monitored to identify any changes, either
positive or negative. At the end of the year, final evaluation is
done to determine the lead performing manager. The manager
who outdoes his/her colleagues in terms of revenues insight,
effectiveness of strategies among others would then be
considered the winner and presented the award. In addition to
recognition, the top performer could as well be offered a
promotion to be the head of the management department.
Applying the same in other departments would also work
towards improving employee competition, and consequently
performance (Lam & Zhang, 2014).
When an individual performs well, they feel motivated when
they are shown appreciation. Appreciation of employees could
involve acknowledging them and letting them own the credit for
their good job. Acknowledging an employee does not only
involve telling them that they did well, congratulating them, or
telling them to do better. Effective employee motivation
requires more than just words. Acknowledgement may involve
recognition of a good performer in front of other employees.
Being recognized in the presence of others who would otherwise
have had the chance to be recognized gives one a perfection
feeling which motivates them to do even better. Credit award on
the other hand may involve being named employee of the year
or being accorded any other heroic title. To attain the title other
employees will focus on performing better while at the same
time the titleholder will work hard to retain the title.
Benefits of a Good Marketing System
Enhancement of market systems for Flip Kart is an essential
element towards achieving excellent overall performance by the
company. As an online marketing company, it needs to keenly
address the issues stated above to achieve the desired
performance. In this review, a methodology towards achieving
the desired setting of market systems is provided. Through the
statement of recommendations accompanied by their respective
implementation procedures the obstacles to achieving a perfect
state of a marketing system for Flip Kart are effectively
addressed (Lam & Zhang,2014).
Improved shipment and logistic services have the ability to
increase Flip Kart’s market structure perfection by a minimum
of 40%. As provided by the nature of their transactions, Flip
Kart depends on the satisfaction of its customers to determine
their performance. Shipment and logistic services are the main
components of the customer service and therefore the main
determinants of the overall performance in the service sector.
Delivery of customer orders in time and in a good condition is
essential for a good customer service provision. Eliminating the
fear of using online purchasing services has the ability to
increase Flip Kart’s market size by 28%. Creating confidence in
people increases their trust hence willingness to use the online
purchasing services. Ensuring data and information security
increase customer comfort to use online purchasing by over
50%. (Grogger & Hanson 2015)
Absorbing top-talent in the management sector works a great
advantage in ensuring that performance of the company is good
enough. Acquisition of well-known companies increases top
talent attraction by a great percentage as well. Offering rewards
to employees who perform exceptionally well motivates them a
great deal and in return, they are encouraged to perform even
better. Accrediting good performance as well increased
employee motivation that as well promotes continued good
performance (Ellram La Londe & Weber, 2013.
Awareness creation on the other hand offers, Flip Kirt, to
publicize itself and its activities as well. Recruitment of new
customers can then be done more easily when they are aware of
the existence of the company as well as its activities. A word of
mouth promotion as well does the magic in attracting people to
hear and understand better what the company has to offer.
Simulation programs and training provide a chance for the
company to teach people how to use their online purchasing
services (Scott, 2012).
References
1. Fahimnia, B., Bell, M. G., Hensher, D. A., & Sarkis, J.
(2015). The Role of Green Logistics and Transportation in
Sustainable Supply Chains. In Green Logistics and
Transportation (pp. 1-12). Springer International Publishing.
2. Lam, J. S. L., & Zhang, L. (2014). Enhanced logistics service
provider framework for higher integration and efficiency in
maritime logistics. International Journal of Logistics Research
and Applications, 17(2), 89-113.
3. Ellram, L. M., La Londe, B. J., & Weber, M. M. (2013).
Retail logistics. International Journal of Physical Distribution &
Logistics Management.
4. Heskett, J. L. (2013). Controlling customer logistics service.
International Journal of Physical Distribution & Logistics
Management.
5. Christopher, M. (2016). Logistics & supply chain
management. Pearson Higher Ed.
6. Shankar, V., Kleijnen, M., Ramanathan, S., Rizley, R.,
Holland, S., & Morrissey, S. (2016). Mobile Shopper
Marketing: Key Issues, Current Insights, and Future Research
Avenues. Journal of Interactive Marketing, 34, 37-48.
7. Taiminen, H. M., & Karjaluoto, H. (2015). The usage of
digital marketing channels in SMEs. Journal of Small Business
and Enterprise Development, 22(4), 633-651.
8. Cheng, A., Auerbach, M., Hunt, E. A., Chang, T. P., Pusic,
M., Nadkarni, V., & Kessler, D. (2014). Designing and
conducting simulation-based research. Pediatrics, 133(6), 1091-
1101.
9. Phillips, J. J. (2012). Return on investment in training and
performance improvement programs. Routledge.
10. Baker, T. (2014). Attracting and Retaining Talent:
Becoming an Employer of Choice. Springer.
11. Grogger, J., & Hanson, G. H. (2015). Attracting talent:
location choices of foreign-born PhDs in the United States.
Journal of Labor Economics, 33(S1 Part 2), S5-S38.
12. Dychtwald, K., Erickson, T. J., & Morison, R. (2013).
Workforce crisis: How to beat the coming shortage of skills and
talent. Harvard Business Press.
13. Ross, D. F. (2013). Competing through supply chain
management: creating market-winning strategies through supply
chain partnerships. Springer Science & Business Media.
14. Scott, D. (2012). Rentention of key talent and the role of
rewards. WorldatWork Journal.
15. Ho, L. H., & Chang, P. Y. (2015). Innovation capabilities,
service capabilities and corporate performance in logistics
services. International Journal of Organizational Innovation
(Online), 7(3), 24.
ENHANCING THE MARKETING SYSTEM AT FLIP KART
Enhancing the Marketing System at Flip Kart
Week-4 (Recommendation and Implementation)
Submitted to
Dr. Asila Sayedi
Submitted By
Srikanth Darapuneni
Student ID
5153179
California University of Management and Science
Date: October 25, 2016
OUTLINE
I. Abstract
II. Introduction
III. Company overview
A. History
B. Business model
IV. Analysis
A. Industry analysis
B. Company analysis
V. PEST analysis
A. Political
B. Environmental
C. Social
D. Legal
VI. SWOT analysis
A. Strengths
B. Weaknesses
C. Opportunities
D. Threats
VII. Recommendations and implementations
A. Improving shipment and logistics services
i. Collecting data as far as courier services are concerned within
the villagers and local towns
ii. Eliminating the fear factor associated with conducting an
online transaction
iii. Improving on the online security regarding personal
information and data
B. Awareness Creation
i. Conducting simulation programs and trainings
ii. Word of mouth promotions and media advertisements
iii. Eliminating the challenge of online security among the local
citizens
C. Attracting Top Talent
i. Acquisition of well-known companies
ii. Offering rewards and promotions for high performers
iii. Acknowledging and giving credit to the work of an
employee
VIII. Conclusion
Recommendations And Conclusions
A. Establishing a way to improve on their shipment and
logistics service
In this case, as much as a strong and perfect logistics service is
one of the primary reasons behind the success of most online
marketing systems, it is acknowledged that Flip Kart is lagging
behind in this department because of the remoteness of some of
the towns in India (Scott, 2012).
i. Collecting data as far as courier services are concerned within
the villagers and local towns
The shipment of goods and services is one of the most crucial
elements that can enhance the satisfaction of sellers at Flip kart
(Ho & Chang, 2015). Additionally, the proliferation of
technology in each and every business aspect has made so many
customers to prefer new ways of conducting their business
transactions. In this case, Flip Kart sellers have to keep up with
the pace if they need to acquire new customers a while at the
same time retaining their customer loyalty. However, the sellers
at Flip kart face the challenge of ensuring that their customers
are able to obtain exceptional customer experience (Ross,
2013). Therefore, it is the role of Flip kart to ensure that the
satisfaction of sellers at Flip kart has improved by delivering
seamless consumer loyalty across a number of organization’s
touch points.
ii. Eliminating the fear factor associated with conducting an
online transaction
Flip Kart needs to establish their presence on most of the
communication channels preferred by their consumers. In
essence, with a proper contact centre logistics, Flip Kart can
embrace the true Omni-channel experience while simultaneously
offering services across a number of channels like email, web,
mobile IVT and social media channels.
iii. Improving on the online security regarding personal
information and data
With the ever-changing technology advancements and dynamics,
consumer demands have changed hence creating a new set of
challenges for sellers at Flip kart (Grogger & Hanson, 2015).
Establishing a marketing system at FLIP Kart that is more
flexible in such a way that it has the freedom to change the
order within a particular timeline to suit new requirements of
the consumer will be crucial in enhancing the marketing system
for sellers at Flip Kart (Baker, 2014). In fact, a more visible and
transparent system that encourages a complete disclosure
throughout delivery process and order placements in real time
will also be vital in enhancement of the sellers demands at Flip
Kart (Dychtwald, Erickson, & Morison, 2013).
B. Awareness creation
i. Eliminating the challenge of online security among the local
citizens
It is universally acknowledged that, the demands for goods and
services at Flip kart is more likely to increase during the
holiday seasons and the sale periods coupled with increasing
number of orders. In this case, the technology adopted at Flip
Kart should possess the capability of scaling up in an effor t to
meet the requirements of the demands of business.
ii. Word of mouth promotions and media advertisements
With customers waiting impatiently and eagerly for their
services, it is important that an individual maintain a constant
touch with them in terms of time of delivery, status of the goods
and location of delivery to avoid frustrations from the part of
the consumers. In this case, with such communication, other
customers may be more than willing to spread good news about
the company to other customers (Phillips, 2012).
iii. Conducting simulation programs and trainings: Knowledge
based Routing
With the establishment of three skill-based routing at Flip kart,
callers can efficiently and quickly be matched with consultants
and agents that are able to help them as soon as they need
clarifications or inquire about the status of a certain product
Cheng et al.,2014). Besides, it also allows the managers and the
sellers at Flip kart to gather international visibility by routing
the calls made to Flip Kart about a particular product to local
offices that offers primary knowledge and personalized services
to the consumer in question.
Logistics operators are known to incur difficulties because of
lack of departmental integration (Taiminen & Karjaluoto, 2015).
However, with contact centre software at Flip Kart, it can be
argued that back office data can be incorporated with the
customers at Flip Kart to keep each and everyone at Flip kart
including sellers informed at every phase of transaction and
aspect of service. In fact, all the information that is relevant for
customers .In this case, all relevant data on the customers
coupled with their demands and cases can be shared easily and
in the process, making the marketing system at Flip Kart to be
shared easily and in the process, Flip kart marketing system for
sellers to function seamlessly with its customers and other
business partners (Christopher, 2016).
C. Attracting top talent and customers to Flip kart
i. Acquisition of well-known companies
It is accepted that Logistics operators at Flip Kart work together
with business partners, retailers, dispatch units among others
while raising the complexity level for agents when it comes to
dealing with the customers (Shankar et al., 2016). In other
words, they are forced to toggle disparate systems to remove
relevant data to resolve any customer reviews and queries. In
this case therefore, the logistics operators at FLIP Kart require
a CTI screen pop technology designed specifically from the
ground to the top to offer a multi channel platform capable of
arming the government with information regarding the
customers, accou8nt history, social media interaction and
marketing preferences. Therefore, in order to encourage more
customers and other top talent individuals
ii. Offering rewards and promotions for high performers and
special order exceptions
Some online trading companies offer special or custom order
opportunities to consumers as a way of retaining and attracting
new customers (Heskett, 2013). In this case, the time frame that
the consumers expect a certain product to be available on the
market has dropped substantially as the technology advances. In
other words, in the highly competitive and fast paced economy,
consumers in most cases expect turnaround within days. In this
case, through their own marketing system Flip kart can offer
flexible delivery to consumers (Lam & Zhang, 2014). For
instance, an option that encourages a structured data portfolio
where the writers can search they type of products they want
coupled with their preferred seller must be included on Flip
Karts marketing system to ensure that the sellers are well placed
to be accessed by their consumers.
iii. Acknowledging and giving credit to the work of an
employee
It is universally accepted that, in order to improve the
marketing system for sellers at Flip kart, it is important for Flip
Kart to make information about the available sellers at Flip Kart
coupled with the products they are selling in order to make it
easier for the visitors to find the type of information they need
easily. In this case, the modern type of customers finds it easier
to find the information they are looking for without going
through a difficult spell to locate it. In other words, location of
a chat service that is available 24/7 on the Flip kart website will
be crucial in enhancing the marketing system for sellers at Flip
kart (Fahimnia, et al, 2015).
Many online companies operators state the order fill rate and
on-time delivery to validate exceptional consumer services.
Others at times insist that the service accorded to customers
falls into its own category and in the process; it deserves its
own measurement standards. In this case, these standard
measurements are accepted universally as the customer’s
standards of proof of agent performance. Therefore, the Flip
Kart management supervisors and agents can establish ways of
generating reports, historical data or real time data reports that
implicated strategic decision, coaching, and training and
compensation grade for customers and sellers as well at Flip
kart (Ellram, La Londe & Weber, 2013)..
References
Baker, T. (2014). Attracting and Retaining Talent: Becoming an
Employer of Choice. Springer.
Cheng, A., Auerbach, M., Hunt, E. A., Chang, T. P., Pusic, M.,
Nadkarni, V., & Kessler, D. (2014). Designing and conducting
simulation-based research. Pediatrics, 133(6), 1091-1101.
Christopher, M. (2016). Logistics & supply chain management.
Pearson Higher Ed.
Dychtwald, K., Erickson, T. J., & Morison, R. (2013).
Workforce crisis: How to beat the coming shortage of skills and
talent. Harvard Business Press.
Ellram, L. M., La Londe, B. J., & Weber, M. M. (2013). Retail
logistics. International Journal of Physical Distribution &
Logistics Management.
Fahimnia, B., Bell, M. G., Hensher, D. A., & Sarkis, J. (2015).
The Role of Green Logistics and Transportation in Sustainable
Supply Chains. In Green Logistics and Transportation (pp. 1-
12). Springer International Publishing.
Grogger, J., & Hanson, G. H. (2015). Attracting talent: location
choices of foreign-born PhDs in the United States. Journal of
Labor Economics, 33(S1 Part 2), S5-S38.
Heskett, J. L. (2013). Controlling customer logistics service.
International Journal of Physical Distribution & Logistics
Management.
Ho, L. H., & Chang, P. Y. (2015). Innovation capabilities,
service capabilities and corporate performance in logistics
services. International Journal of Organizational Innovation
(Online), 7(3), 24.
Lam, J. S. L., & Zhang, L. (2014). Enhanced logistics servi ce
provider framework for higher integration and efficiency in
maritime logistics. International Journal of Logistics Research
and Applications, 17(2), 89-113.
Phillips, J. J. (2012). Return on investment in training and
performance improvement programs. Routledge.
Ross, D. F. (2013). Competing through supply chain
management: creating market-winning strategies through supply
chain partnerships. Springer Science & Business Media.
Scott, D. (2012). Rentention of key talent and the role of
rewards. WorldatWork Journal.
Shankar, V., Kleijnen, M., Ramanathan, S., Rizley, R., Holland,
S., & Morrissey, S. (2016). Mobile Shopper Marketing: Key
Issues, Current Insights, and Future Research Avenues. Journal
of Interactive Marketing, 34, 37-48.
Taiminen, H. M., & Karjaluoto, H. (2015). The usage of digital
marketing channels in SMEs. Journal of Small Business and
Enterprise Development, 22(4), 633-651.
10
WEEK-1 CHECK LIST
1. Did you create a cover page with student ID, name, professor
name, title of your paper (capitalize major words and it is based
on your problem or recommendations), date format (June 9,
2016), and approved school logo?
2. Did you write how does your recommendation help the
company in terms of Dollar, Percentage, Efficiency and etc.…
3. Did you use the naming conventions to save and email your
document? Student ID-Your Name-Proposal-Project Title
(capitalize major words and leave space between each word) -
Submission Date (two digit for month, 2 digit for day, 2 digit
for the year with no space or special character)?
week -2 check list
1.Do you have 15 to 20 articles in your literature Review?
2. Did you number each of your articles 1-20?
3. Is your references are properly indented (first ling outwards
and second line inwards)?
4. Is your reference page based on the last name of the author?
(Remove the numbers from the reference page).
5. Does each of your references exist at least twice (one in the
body of your lit review and once in reference page?
Week-3 check list
1.Did you make sure there is no bullets and you used paragraph
format (at least 5 sentence in a paragraph) when writing your
analysis?
Week-4 check list
1.In your introductory paragraph do you have the 3
recommendations?
2.Is your reference page based on the last name of the author?
Running Head: FINDING JOB AS A CYBER SECURITY
SPECIALIST 1
Finding a Job as a Cyber Security Specialist
11
Literature Review
Finding Job as a Cyber Security Specialist
Action Research
Course Code:
Name:
Table of Contents
2.0 Literature Review 4
2.1 Significance of Gutsche Job Seeking Model 7
3.0 Proposal 8
3.1 Iterations 8
Iteration 1: Career identification 8
Iteration 2: Relevant skills acquisition. 8
Iteration 3: Job application and interview 9
Iteration 4: Career development. 9
References 10
List of Figures
Figure 2.1: Gutsche Job seeking
model…………………………………………………….7
Figure 2.2: Iterations visual
Representation……………………………………………….9
2.0 Literature Review
The significance of information towards the running of
entities in the present 21 century cannot be overlooked due its
functional aspect in the running of the respective entities. This
is because information is a key aspect in the decision making
process. Technological advancements in the present 21st
century have offered conveniences in the information
technology sector resulting in conveniences and efficiencies
with regard to data collection, entry and processing to
information. The internet is the major technological
advancement that has been in the forefront in facilitating
evolutionary changes in the information technology industry
such as ease of information storage and access by relevant
parties. Despite the advantages associated with the internet
with regard to information, the major challenge faced by
information specialist as a result of technological advances is
cyber security. With the grievous effects of cyber security risks
to various entities, entities have gone ahead and setup cyber
security departments as a way of mitigating cyber security risks
(Hansen, L., & Nissenbaum, 2009).
The attention given to cyber security departments either as
independent units or attached to the information technology
department has had a major effect not only in the corporate
world but also academic world. This has resulted in individuals
specializing in cyber defence career wise as a result of
education institutions offering special courses in cyber security.
In the corporate world, human resource departments have come
up with cyber security positions with clearly laid out job
descriptions in the workplace. Despite the high level of
unemployment rates in our society, cyber security departments
are still finding it difficult to find qualified personnel to match
their information security requirements. The novelty of cyber
security specialist positions coupled by the market’s high
demand alongside a low number of qualified personnel makes
the specialists to be amongst the most sought specialists i n the
present corporate world (Caldwell, 2013). With each company
seeking ways of securing their data, cyber security specialists
are sure of a continued employment increase due to the fact that
organizations are shifting from conventional to digital
functionality. A cyber security specialist is an individual whose
job is to maintain the security of an entity’s information
systems. This is through the prevention of cyber security threats
as well as mitigating risks to the entity’s information system
(O’Connell, 2012). Cyber security specialists work by ensuring
cybercrimes are prevented through their knowledge and
efficiency in forensic analysis, cyber threats and risks diagnosis
and reverse engineering among others to establish solutions and
vulnerable areas. Generally, a cyber-security specialist is in in
charge of the entire information system’s security. In protecting
information system networks, cyber security specialists start by
designing firewalls then proceed to monitor the use of data files
and finally regulate information access. Cyber security
specialists are able to get job opportunities in both private and
public sectors. Potential employers in the public sector range
from military departments to financial institutions. In the
private sector, potential employers range from private
consultation firms to corporate firms among others. Other than
education qualifications, the cyber security specialists are
required to have on job relevant skills and expertise.
Educational requirements and skills for the cyber security
personnel vary with regard to the scope of responsibility with
the lowest entry level being Associate Degree and the highest
being Master’s Degree (Pfleeger & Caputo, 2012).
Various models have been formulated by researchers to
serve as a guide in a job’s search and preparation. These models
often come with various stages that highlight what the job
seeker is required to do at each stage in the build-up to getting a
job. With regard to the cyber security job specialist, the most
appropriate job searching model to be applied is the Gutsche
model. According to the Gutsche model, career objectives are
the models foundation. As a result, a prospective job seeker is
supposed to first consider personal career objectives during the
job application process. Although the job seeker may be
qualified in a variety of jobs, the choice of job to serve should
be aligned to his/her career objectives. Listed objectives enable
a job seeker to effectively explore any jobs before applying in
order to determine job offers that best suit his/her personal
career objectives (
Greitzer, F. L., & Frincke, 2010). Career objectives evaluation
plays a key role in career growth as well as determining the
quality of output in one’s work. A cyber security specialist is a n
overall Information technology student and can work in various
departments in the I.T department. However, wrong choice of
department will lead to zero growth of one’s cyber security
skills resulting in redundancy. An example of this is whereby a
cyber-security specialist starts by working as an information
system’s hardware maintenance officer. Hardware and cyber
security are not directly linked hence one’s knowledge and
skills goes to waste. However, in the event that the same cyber
security specialist starts by working as a software engineer in
an I.T department, the specialist is presented with the
opportunity to develop personal knowledge and skills hence
career growth (Locasto & Sinclair, 2009).
In the basic perspective, career growth simply refers to the
progression an individual makes up the hierarchical ladder in an
organization. Hierarchical growth is often associated with
increased roles and responsibilities at each stage up the
hierarchy. Although the researcher’s focus is on finding a job, a
career is not viewed as a job in this perspective but rather as a
progressive transition since it focuses on the future outcome.
Based on this argumentation, the initial step in career
development is career entry by finding a suitable job (Bagchi -
Sen et al., 2010). Gutsche’s model of job searching, there are
six key step in finding the appropriate job. The six steps are:
1. Identifying one’s career
2. Acquisition of relevant skills
3. Research on the potential employer
4. Job application and Interview
5. Staying motivated and organized in new positions
6. Negotiating for career development
Figure 2.1: Gutsche Job seeking model 2.1 Significance of
Gutsche Job Seeking Model
Career identification entails choosing one’s career based on
one’s ability and passion to work in the said career. Relevant
skills to be applied in the course of the career development
skills are to be achieved through specialised education and
training.
Upon acquisition of the relevant skills and knowledge, the job
seeker should seek prospective job openings and research on the
employer to establish career development prospects (Bagchi -Sen
et al., 2010).
Job openings that are relevant to the job seeker’s career
objectives should be applied and interviews conducted. If
successful the job seeker should view his/her entry position as a
stepping stone for ascension up the career hierarchical ladder
(Cone et al., 2006).
It is advisable that the jobseeker should stay motivated and
organized in new positions as a way of showing ability for new
challenges. The job seeker should also expound his/her
qualifications in case higher career development positions
require additional academic qualifications and skills (Cone et
al., 2006).
Upon satisfying administrators that he/she is
capable of responsibilities and challenges that come with a
higher position, the job seeker should creatively negotiate for
career development (Cone et al., 2006). 3.0 Proposal
This action research’s proposal is a cyber-security
specialist’s job seeking process. The research question
addresses the research problem as job seeking process. The
literature reviews clearly states about the absence of cyber
security specialists hence making it easier for qualified cyber -
security specialists to get jobs. The strategy listed in this
research paper is key in filling a cyber-security position in a
company. This action research process will entail five iteration
processes as listed below.
Iteration 1: Gathering Requirements. This first iteration is
founded on the job’s requirements. Prior to qualification for a
job interview, the interviewer is required to have met all the
prior necessary requirements. Job requirements for the job of a
cyber-security specialist include an undergraduate degree in
Cyber security, relevant on job experience, knowledge of data
security diagnostic tools and IAT level II security certification.
Iteration 2: Gap Analysis. The second iteration is focused on
analysing the gap to be filled by new employee. In order to
secure the job, the new employee is required to impress the
Human resource manager on his/her ability to effectively fill the
job position. The employee is required to have relevant
academic qualifications, relevant job experience, knowledge of
cyber security tools and frameworks such as DIACAP, DISA,
ACAS and SCAP among others. Analytical skills and data
collection capabilities are also relevant in filling the gap in
cyber security specialist.
Iteration 3:Updating Resume
Prior to the application of a new job, a job applicant is required
to update his/her resume so as to meet ensure that his/her
credentials and qualifications are aligned to the job
requirements. Cyber security specialists are often general I.T
conversant with makes them qualified to fulfil various general
I.T roles and responsibilities such as data entry among others.
This therefore necessitates the updating of one’s resume in line
with a new job requirements. In the case of a cyber-security
specialist, the job applicant should focus on specific skills ,
qualifications and credentials to match job requirements.
Iteration 4:Apply for a Job
The other important documents in the job application documents
are a cover letter alongside the resume and other relevant
documents such as copies of credentials. A successful resume
update is always followed by a job application process during
which the applicant may be required to attach copies of
credentials for credibility and background checking among
others.
Iteration 5:Plan to fill Requirements
After a successful job application process and interview, a
successful employee should fill the job requirements through
ones skills, qualifications and on job training to acquaint him
with the necessary on job procedures and protocols. The new
employee should be able to effectively and efficiently fill the
respective roles and responsibilities that come with the position.
Figure 2.2: Iterations visual Representation
The visual representation diagram above shows the four
iterations with each following the four distinct phases of action
research. From one iteration to the next iterations hence closing
in on the expected outcome. The four phases of action research
are plan act, observe and reflect with each iteration following
the laid down action research phases.
References
Bagchi-Sen, S., Rao, H. R., Upadhyaya, S. J., & Chai, S.
(2010). Women in cybersecurity: A study of career
advancement. IT professional, 12(1), 24-31.
{http://ieeexplore.ieee.org/document/5403174/}
Caldwell, T. (2013). Plugging the cyber-security skills
gap. Computer Fraud & Security, 2013(7), 5-10.
{http://www.sciencedirect.com/science/article/pii/S1361372313
700629}
Cone, B. D., Thompson, M. F., Irvine, C. E., & Nguyen, T. D.
(2006, May). Cyber security training and awareness through
game play. In IFIP International Information Security
Conference (pp. 431-436). Springer US.
{http://link.springer.com/chapter/10.1007%2F0-387-33406-
8_37#page-1}
Greitzer, F. L., & Frincke, D. A. (2010). Combining traditional
cyber security audit data with psychosocial data: towards
predictive modeling for insider threat mitigation. In Insider
Threats in Cyber Security (pp. 85-113). Springer US.
{http://link.springer.com/chapter/10.1007/978-1-4419-7133-3}
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber
security, and the Copenhagen School. International Studies
Quarterly, 53(4), 1155-1175.
{http://onlinelibrary.wiley.com/doi/10.1111/j.1468-
2478.2009.00572.x/full}
Locasto, M., & Sinclair, S. (2009, February). An Experience
Report on Undergraduate Cyber-Security Education and
Outreach. In Proceedings of the 2nd Annual Conference on
Education in Information Security (ACEIS 2009), Ames, IA,
USA.{http://pages.cpsc.ucalgary.ca/~locasto/papers/sismat.ACE
IS.pdf}
O’Connell, M. E. (2012). Cyber security without cyber
war. Journal of Conflict and Security Law, 17(2), 187-209. {
http://jcsl.oxfordjournals.org/content/17/2/187.short}
Pfleeger, S. L., & Caputo, D. D. (2012). Leveraging behavioral
science to mitigate cyber security risk. Computers &
security, 31(4), 597-611.
{http://www.sciencedirect.com/science/article/pii/S0167404811
001659}

More Related Content

What's hot

Presentation by jayanta debnath
Presentation by jayanta debnathPresentation by jayanta debnath
Presentation by jayanta debnathPMI_IREP_TP
 
Presentation by dakshinamoorthi g
Presentation by dakshinamoorthi  gPresentation by dakshinamoorthi  g
Presentation by dakshinamoorthi gPMI_IREP_TP
 
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...ijmpict
 
Icdec2020_presentation_slides_12
Icdec2020_presentation_slides_12Icdec2020_presentation_slides_12
Icdec2020_presentation_slides_12ICDEcCnferenece
 
Information Technology Project Management
Information Technology Project ManagementInformation Technology Project Management
Information Technology Project ManagementGoutama Bachtiar
 
Development Framework & Methods
Development Framework & MethodsDevelopment Framework & Methods
Development Framework & MethodsNay Lynn Aung
 
Presentation by subhajit bhattacharya1
Presentation by subhajit bhattacharya1Presentation by subhajit bhattacharya1
Presentation by subhajit bhattacharya1PMI_IREP_TP
 
Information Technology Project Management - part 08
Information Technology Project Management - part  08Information Technology Project Management - part  08
Information Technology Project Management - part 08Rizwan Khurram
 
Pranabendu
PranabenduPranabendu
PranabenduPMI2011
 
EuroSPI O'Donnell Richardson Agile Methods in a Very Small Company
EuroSPI O'Donnell Richardson Agile Methods in a Very Small CompanyEuroSPI O'Donnell Richardson Agile Methods in a Very Small Company
EuroSPI O'Donnell Richardson Agile Methods in a Very Small CompanyMichael O'Donnell
 
Information Technology Project Management - part 01
Information Technology Project Management - part 01Information Technology Project Management - part 01
Information Technology Project Management - part 01Rizwan Khurram
 
Presentation by lavika upadhyay
Presentation by lavika upadhyayPresentation by lavika upadhyay
Presentation by lavika upadhyayPMI_IREP_TP
 
Estimation of agile functionality in software development
Estimation of agile functionality in software developmentEstimation of agile functionality in software development
Estimation of agile functionality in software developmentBashir Nasr Azadani
 
Presentation by sathish nataraj sundararajan
Presentation by sathish nataraj sundararajanPresentation by sathish nataraj sundararajan
Presentation by sathish nataraj sundararajanPMI_IREP_TP
 
Software metrics validation
Software metrics validationSoftware metrics validation
Software metrics validationijseajournal
 
Distributed Software Development Process, Initiatives and Key Factors: A Syst...
Distributed Software Development Process, Initiatives and Key Factors: A Syst...Distributed Software Development Process, Initiatives and Key Factors: A Syst...
Distributed Software Development Process, Initiatives and Key Factors: A Syst...zillesubhan
 
1619_DANGANTHANH_GCS190644_AssignmentFull.docx
1619_DANGANTHANH_GCS190644_AssignmentFull.docx1619_DANGANTHANH_GCS190644_AssignmentFull.docx
1619_DANGANTHANH_GCS190644_AssignmentFull.docxkhangphanvan
 

What's hot (20)

Presentation by jayanta debnath
Presentation by jayanta debnathPresentation by jayanta debnath
Presentation by jayanta debnath
 
Presentation by dakshinamoorthi g
Presentation by dakshinamoorthi  gPresentation by dakshinamoorthi  g
Presentation by dakshinamoorthi g
 
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
 
MCP1
MCP1MCP1
MCP1
 
Icdec2020_presentation_slides_12
Icdec2020_presentation_slides_12Icdec2020_presentation_slides_12
Icdec2020_presentation_slides_12
 
Information Technology Project Management
Information Technology Project ManagementInformation Technology Project Management
Information Technology Project Management
 
ISO_2
ISO_2ISO_2
ISO_2
 
Development Framework & Methods
Development Framework & MethodsDevelopment Framework & Methods
Development Framework & Methods
 
Presentation by subhajit bhattacharya1
Presentation by subhajit bhattacharya1Presentation by subhajit bhattacharya1
Presentation by subhajit bhattacharya1
 
Information Technology Project Management - part 08
Information Technology Project Management - part  08Information Technology Project Management - part  08
Information Technology Project Management - part 08
 
ETCA_1
ETCA_1ETCA_1
ETCA_1
 
Pranabendu
PranabenduPranabendu
Pranabendu
 
EuroSPI O'Donnell Richardson Agile Methods in a Very Small Company
EuroSPI O'Donnell Richardson Agile Methods in a Very Small CompanyEuroSPI O'Donnell Richardson Agile Methods in a Very Small Company
EuroSPI O'Donnell Richardson Agile Methods in a Very Small Company
 
Information Technology Project Management - part 01
Information Technology Project Management - part 01Information Technology Project Management - part 01
Information Technology Project Management - part 01
 
Presentation by lavika upadhyay
Presentation by lavika upadhyayPresentation by lavika upadhyay
Presentation by lavika upadhyay
 
Estimation of agile functionality in software development
Estimation of agile functionality in software developmentEstimation of agile functionality in software development
Estimation of agile functionality in software development
 
Presentation by sathish nataraj sundararajan
Presentation by sathish nataraj sundararajanPresentation by sathish nataraj sundararajan
Presentation by sathish nataraj sundararajan
 
Software metrics validation
Software metrics validationSoftware metrics validation
Software metrics validation
 
Distributed Software Development Process, Initiatives and Key Factors: A Syst...
Distributed Software Development Process, Initiatives and Key Factors: A Syst...Distributed Software Development Process, Initiatives and Key Factors: A Syst...
Distributed Software Development Process, Initiatives and Key Factors: A Syst...
 
1619_DANGANTHANH_GCS190644_AssignmentFull.docx
1619_DANGANTHANH_GCS190644_AssignmentFull.docx1619_DANGANTHANH_GCS190644_AssignmentFull.docx
1619_DANGANTHANH_GCS190644_AssignmentFull.docx
 

Similar to Running head finding job as a cyber security specialistfinding

Week-2-Requirements-Elicitation-and-Collaboration.pdf
Week-2-Requirements-Elicitation-and-Collaboration.pdfWeek-2-Requirements-Elicitation-and-Collaboration.pdf
Week-2-Requirements-Elicitation-and-Collaboration.pdfnhung875961
 
Sage Construction and Real Estate Whitepaper - Performing a Needs Analysis
Sage Construction and Real Estate Whitepaper - Performing a Needs AnalysisSage Construction and Real Estate Whitepaper - Performing a Needs Analysis
Sage Construction and Real Estate Whitepaper - Performing a Needs AnalysisSage Construction and Real Estate
 
2Auditing v. MonitoringAuditing v. MonitoringStu.docx
2Auditing v. MonitoringAuditing v. MonitoringStu.docx2Auditing v. MonitoringAuditing v. MonitoringStu.docx
2Auditing v. MonitoringAuditing v. MonitoringStu.docxlorainedeserre
 
training and development mod 2
training and development mod 2training and development mod 2
training and development mod 2POOJA UDAYAN
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Laura Benitez
 
Jayantobose prashantshrivastava-131008015757-phpapp01
Jayantobose prashantshrivastava-131008015757-phpapp01Jayantobose prashantshrivastava-131008015757-phpapp01
Jayantobose prashantshrivastava-131008015757-phpapp01PMI_IREP_TP
 
Jayanto bose prashantshrivastava
Jayanto bose prashantshrivastavaJayanto bose prashantshrivastava
Jayanto bose prashantshrivastavaPMI2011
 
How to-measure-the-return-on-your-hr-investment
How to-measure-the-return-on-your-hr-investmentHow to-measure-the-return-on-your-hr-investment
How to-measure-the-return-on-your-hr-investmentAhmed A.samra
 
Tier 4 Events - Operational Discipline - Do you know how are you performing i...
Tier 4 Events - Operational Discipline - Do you know how are you performing i...Tier 4 Events - Operational Discipline - Do you know how are you performing i...
Tier 4 Events - Operational Discipline - Do you know how are you performing i...Process Safety Culture
 
Certified Predictive Modeler (CPM)
Certified Predictive Modeler (CPM)Certified Predictive Modeler (CPM)
Certified Predictive Modeler (CPM)GICTTraining
 
Learnings from DST survey
Learnings from DST surveyLearnings from DST survey
Learnings from DST surveyParasuram K
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Lanate Drummond
 
Measuring roi of training ppt slides
Measuring roi of training ppt slidesMeasuring roi of training ppt slides
Measuring roi of training ppt slidesYodhia Antariksa
 
The President Of A Company
The President Of A CompanyThe President Of A Company
The President Of A CompanyNavy Savchenko
 
Chinmayy_Purohit_C028_Executive_Summary
Chinmayy_Purohit_C028_Executive_SummaryChinmayy_Purohit_C028_Executive_Summary
Chinmayy_Purohit_C028_Executive_SummaryChinmayy Purohit
 
Modern Elicitation Process
Modern Elicitation ProcessModern Elicitation Process
Modern Elicitation ProcessRajon
 
PEER RESPONSESWeek 3 - Discussion 1Kirkpatricks Taxo.docx
PEER RESPONSESWeek 3 - Discussion 1Kirkpatricks Taxo.docxPEER RESPONSESWeek 3 - Discussion 1Kirkpatricks Taxo.docx
PEER RESPONSESWeek 3 - Discussion 1Kirkpatricks Taxo.docxdanhaley45372
 

Similar to Running head finding job as a cyber security specialistfinding (20)

Week-2-Requirements-Elicitation-and-Collaboration.pdf
Week-2-Requirements-Elicitation-and-Collaboration.pdfWeek-2-Requirements-Elicitation-and-Collaboration.pdf
Week-2-Requirements-Elicitation-and-Collaboration.pdf
 
Sage Construction and Real Estate Whitepaper - Performing a Needs Analysis
Sage Construction and Real Estate Whitepaper - Performing a Needs AnalysisSage Construction and Real Estate Whitepaper - Performing a Needs Analysis
Sage Construction and Real Estate Whitepaper - Performing a Needs Analysis
 
2Auditing v. MonitoringAuditing v. MonitoringStu.docx
2Auditing v. MonitoringAuditing v. MonitoringStu.docx2Auditing v. MonitoringAuditing v. MonitoringStu.docx
2Auditing v. MonitoringAuditing v. MonitoringStu.docx
 
training and development mod 2
training and development mod 2training and development mod 2
training and development mod 2
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
Jayantobose prashantshrivastava-131008015757-phpapp01
Jayantobose prashantshrivastava-131008015757-phpapp01Jayantobose prashantshrivastava-131008015757-phpapp01
Jayantobose prashantshrivastava-131008015757-phpapp01
 
Jayanto bose prashantshrivastava
Jayanto bose prashantshrivastavaJayanto bose prashantshrivastava
Jayanto bose prashantshrivastava
 
Doc1
Doc1Doc1
Doc1
 
How to-measure-the-return-on-your-hr-investment
How to-measure-the-return-on-your-hr-investmentHow to-measure-the-return-on-your-hr-investment
How to-measure-the-return-on-your-hr-investment
 
Tier 4 Events - Operational Discipline - Do you know how are you performing i...
Tier 4 Events - Operational Discipline - Do you know how are you performing i...Tier 4 Events - Operational Discipline - Do you know how are you performing i...
Tier 4 Events - Operational Discipline - Do you know how are you performing i...
 
Certified Predictive Modeler (CPM)
Certified Predictive Modeler (CPM)Certified Predictive Modeler (CPM)
Certified Predictive Modeler (CPM)
 
Learnings from DST survey
Learnings from DST surveyLearnings from DST survey
Learnings from DST survey
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...
 
Measuring roi of training ppt slides
Measuring roi of training ppt slidesMeasuring roi of training ppt slides
Measuring roi of training ppt slides
 
Measuring roi of training
Measuring roi of trainingMeasuring roi of training
Measuring roi of training
 
Selection and recruitment
Selection and recruitmentSelection and recruitment
Selection and recruitment
 
The President Of A Company
The President Of A CompanyThe President Of A Company
The President Of A Company
 
Chinmayy_Purohit_C028_Executive_Summary
Chinmayy_Purohit_C028_Executive_SummaryChinmayy_Purohit_C028_Executive_Summary
Chinmayy_Purohit_C028_Executive_Summary
 
Modern Elicitation Process
Modern Elicitation ProcessModern Elicitation Process
Modern Elicitation Process
 
PEER RESPONSESWeek 3 - Discussion 1Kirkpatricks Taxo.docx
PEER RESPONSESWeek 3 - Discussion 1Kirkpatricks Taxo.docxPEER RESPONSESWeek 3 - Discussion 1Kirkpatricks Taxo.docx
PEER RESPONSESWeek 3 - Discussion 1Kirkpatricks Taxo.docx
 

More from DIPESH30

please write a short essay to address the following questions. Lengt.docx
please write a short essay to address the following questions. Lengt.docxplease write a short essay to address the following questions. Lengt.docx
please write a short essay to address the following questions. Lengt.docxDIPESH30
 
please write a diary entry from the perspective of a French Revoluti.docx
please write a diary entry from the perspective of a French Revoluti.docxplease write a diary entry from the perspective of a French Revoluti.docx
please write a diary entry from the perspective of a French Revoluti.docxDIPESH30
 
Please write the definition for these words and provide .docx
Please write the definition for these words and provide .docxPlease write the definition for these words and provide .docx
Please write the definition for these words and provide .docxDIPESH30
 
Please view the filmThomas A. Edison Father of Invention, A .docx
Please view the filmThomas A. Edison Father of Invention, A .docxPlease view the filmThomas A. Edison Father of Invention, A .docx
Please view the filmThomas A. Edison Father of Invention, A .docxDIPESH30
 
Please watch the clip from the movie The Break Up.  Then reflect w.docx
Please watch the clip from the movie The Break Up.  Then reflect w.docxPlease watch the clip from the movie The Break Up.  Then reflect w.docx
Please watch the clip from the movie The Break Up.  Then reflect w.docxDIPESH30
 
please write a report on Social Media and ERP SystemReport should.docx
please write a report on Social Media and ERP SystemReport should.docxplease write a report on Social Media and ERP SystemReport should.docx
please write a report on Social Media and ERP SystemReport should.docxDIPESH30
 
Please write 200 wordsHow has the healthcare delivery system chang.docx
Please write 200 wordsHow has the healthcare delivery system chang.docxPlease write 200 wordsHow has the healthcare delivery system chang.docx
Please write 200 wordsHow has the healthcare delivery system chang.docxDIPESH30
 
Please view the documentary on Typhoid Mary at httpswww..docx
Please view the documentary on Typhoid Mary at httpswww..docxPlease view the documentary on Typhoid Mary at httpswww..docx
Please view the documentary on Typhoid Mary at httpswww..docxDIPESH30
 
Please use the two attachments posted to complete work.  Detailed in.docx
Please use the two attachments posted to complete work.  Detailed in.docxPlease use the two attachments posted to complete work.  Detailed in.docx
Please use the two attachments posted to complete work.  Detailed in.docxDIPESH30
 
Please use the sources in the outline (see photos)The research.docx
Please use the sources in the outline (see photos)The research.docxPlease use the sources in the outline (see photos)The research.docx
Please use the sources in the outline (see photos)The research.docxDIPESH30
 
Please submit a minimum of five (5) detailed and discussion-provokin.docx
Please submit a minimum of five (5) detailed and discussion-provokin.docxPlease submit a minimum of five (5) detailed and discussion-provokin.docx
Please submit a minimum of five (5) detailed and discussion-provokin.docxDIPESH30
 
Please think about the various learning activities you engaged in du.docx
Please think about the various learning activities you engaged in du.docxPlease think about the various learning activities you engaged in du.docx
Please think about the various learning activities you engaged in du.docxDIPESH30
 
Please type out the question and answer it underneath. Each question.docx
Please type out the question and answer it underneath. Each question.docxPlease type out the question and answer it underneath. Each question.docx
Please type out the question and answer it underneath. Each question.docxDIPESH30
 
Please use the following technique-Outline the legal issues t.docx
Please use the following technique-Outline the legal issues t.docxPlease use the following technique-Outline the legal issues t.docx
Please use the following technique-Outline the legal issues t.docxDIPESH30
 
Please use from these stratagies This homework will be to copyies .docx
Please use from these stratagies This homework will be to copyies .docxPlease use from these stratagies This homework will be to copyies .docx
Please use from these stratagies This homework will be to copyies .docxDIPESH30
 
PLEASE THOROUGHLY ANSWER THE FOLLOWING FIVE QUESTIONS BELOW IN.docx
PLEASE THOROUGHLY ANSWER THE FOLLOWING FIVE QUESTIONS BELOW IN.docxPLEASE THOROUGHLY ANSWER THE FOLLOWING FIVE QUESTIONS BELOW IN.docx
PLEASE THOROUGHLY ANSWER THE FOLLOWING FIVE QUESTIONS BELOW IN.docxDIPESH30
 
Please share your thoughts about how well your employer, military .docx
Please share your thoughts about how well your employer, military .docxPlease share your thoughts about how well your employer, military .docx
Please share your thoughts about how well your employer, military .docxDIPESH30
 
Please select and answer one of the following topics in a well-org.docx
Please select and answer one of the following topics in a well-org.docxPlease select and answer one of the following topics in a well-org.docx
Please select and answer one of the following topics in a well-org.docxDIPESH30
 
Please see the attachment for the actual work that is require.  This.docx
Please see the attachment for the actual work that is require.  This.docxPlease see the attachment for the actual work that is require.  This.docx
Please see the attachment for the actual work that is require.  This.docxDIPESH30
 
Please see the attachment and look over the LOOK HERE FIRST file b.docx
Please see the attachment and look over the LOOK HERE FIRST file b.docxPlease see the attachment and look over the LOOK HERE FIRST file b.docx
Please see the attachment and look over the LOOK HERE FIRST file b.docxDIPESH30
 

More from DIPESH30 (20)

please write a short essay to address the following questions. Lengt.docx
please write a short essay to address the following questions. Lengt.docxplease write a short essay to address the following questions. Lengt.docx
please write a short essay to address the following questions. Lengt.docx
 
please write a diary entry from the perspective of a French Revoluti.docx
please write a diary entry from the perspective of a French Revoluti.docxplease write a diary entry from the perspective of a French Revoluti.docx
please write a diary entry from the perspective of a French Revoluti.docx
 
Please write the definition for these words and provide .docx
Please write the definition for these words and provide .docxPlease write the definition for these words and provide .docx
Please write the definition for these words and provide .docx
 
Please view the filmThomas A. Edison Father of Invention, A .docx
Please view the filmThomas A. Edison Father of Invention, A .docxPlease view the filmThomas A. Edison Father of Invention, A .docx
Please view the filmThomas A. Edison Father of Invention, A .docx
 
Please watch the clip from the movie The Break Up.  Then reflect w.docx
Please watch the clip from the movie The Break Up.  Then reflect w.docxPlease watch the clip from the movie The Break Up.  Then reflect w.docx
Please watch the clip from the movie The Break Up.  Then reflect w.docx
 
please write a report on Social Media and ERP SystemReport should.docx
please write a report on Social Media and ERP SystemReport should.docxplease write a report on Social Media and ERP SystemReport should.docx
please write a report on Social Media and ERP SystemReport should.docx
 
Please write 200 wordsHow has the healthcare delivery system chang.docx
Please write 200 wordsHow has the healthcare delivery system chang.docxPlease write 200 wordsHow has the healthcare delivery system chang.docx
Please write 200 wordsHow has the healthcare delivery system chang.docx
 
Please view the documentary on Typhoid Mary at httpswww..docx
Please view the documentary on Typhoid Mary at httpswww..docxPlease view the documentary on Typhoid Mary at httpswww..docx
Please view the documentary on Typhoid Mary at httpswww..docx
 
Please use the two attachments posted to complete work.  Detailed in.docx
Please use the two attachments posted to complete work.  Detailed in.docxPlease use the two attachments posted to complete work.  Detailed in.docx
Please use the two attachments posted to complete work.  Detailed in.docx
 
Please use the sources in the outline (see photos)The research.docx
Please use the sources in the outline (see photos)The research.docxPlease use the sources in the outline (see photos)The research.docx
Please use the sources in the outline (see photos)The research.docx
 
Please submit a minimum of five (5) detailed and discussion-provokin.docx
Please submit a minimum of five (5) detailed and discussion-provokin.docxPlease submit a minimum of five (5) detailed and discussion-provokin.docx
Please submit a minimum of five (5) detailed and discussion-provokin.docx
 
Please think about the various learning activities you engaged in du.docx
Please think about the various learning activities you engaged in du.docxPlease think about the various learning activities you engaged in du.docx
Please think about the various learning activities you engaged in du.docx
 
Please type out the question and answer it underneath. Each question.docx
Please type out the question and answer it underneath. Each question.docxPlease type out the question and answer it underneath. Each question.docx
Please type out the question and answer it underneath. Each question.docx
 
Please use the following technique-Outline the legal issues t.docx
Please use the following technique-Outline the legal issues t.docxPlease use the following technique-Outline the legal issues t.docx
Please use the following technique-Outline the legal issues t.docx
 
Please use from these stratagies This homework will be to copyies .docx
Please use from these stratagies This homework will be to copyies .docxPlease use from these stratagies This homework will be to copyies .docx
Please use from these stratagies This homework will be to copyies .docx
 
PLEASE THOROUGHLY ANSWER THE FOLLOWING FIVE QUESTIONS BELOW IN.docx
PLEASE THOROUGHLY ANSWER THE FOLLOWING FIVE QUESTIONS BELOW IN.docxPLEASE THOROUGHLY ANSWER THE FOLLOWING FIVE QUESTIONS BELOW IN.docx
PLEASE THOROUGHLY ANSWER THE FOLLOWING FIVE QUESTIONS BELOW IN.docx
 
Please share your thoughts about how well your employer, military .docx
Please share your thoughts about how well your employer, military .docxPlease share your thoughts about how well your employer, military .docx
Please share your thoughts about how well your employer, military .docx
 
Please select and answer one of the following topics in a well-org.docx
Please select and answer one of the following topics in a well-org.docxPlease select and answer one of the following topics in a well-org.docx
Please select and answer one of the following topics in a well-org.docx
 
Please see the attachment for the actual work that is require.  This.docx
Please see the attachment for the actual work that is require.  This.docxPlease see the attachment for the actual work that is require.  This.docx
Please see the attachment for the actual work that is require.  This.docx
 
Please see the attachment and look over the LOOK HERE FIRST file b.docx
Please see the attachment and look over the LOOK HERE FIRST file b.docxPlease see the attachment and look over the LOOK HERE FIRST file b.docx
Please see the attachment and look over the LOOK HERE FIRST file b.docx
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 

Running head finding job as a cyber security specialistfinding

  • 1. Running head: FINDING JOB AS A CYBER SECURITY SPECIALIST FINDING JOB AS A CYBER SECURITY SPECIALIST 2 Iteration 1: Gathering Requirements Finding Job as a Cyber Security Specialist Action Research Course Code: Name: Table of Contents Plan 3 Act 4 Observe 4 Reflect 5 First Iteration: Gathering Requirements Plan. The first phase of the iteration is the planning phase that is concerned with describing the activities that are to take place in the accomplishment of the iteration. The first iteration is requirement gathering – that is, gathering information pertaining to what is required for one to get a job in cyber security. The planning for this iteration included a number of activities undertaken by the researcher in order to come up with a good plan that will see to it that the iteration is a success.
  • 2. Among the activities undertaken are as discussed below: 1. Establishing the goals of the iteration. The first activity in the planning phase was to determine the various goals of the iteration. Undertaking this iteration needs to bear certain results, and these are defined in order to help the action researcher chart a path towards their achievement. Among the goals defined in this phase include determining the minimum qualifications in cyber security. 2. Determining a set of activities. The second activity undertaken in the planning phase is establishing those activities that will aid in the accomplishment of the first iteration. These activities must be goal-oriented in that their core business is to help the researcher obtain the information about the career in cyber security. 3. Determining and allocating resources. Goals do require the researcher to use various resources to accomplish them. The third activity entails determining those resources that will be required to attain the objectives of the first iteration of the action research. After determining them, the resources are then allocated to the various activities. 4. Monitoring. Lastly, there is a need to monitor the iteration and the activities being undertaken in order to ensure everything goes according to the plan. Act. The second phase of this iteration is the action phase. This comes after planning whereby the main aim is to put the plan into action and accomplish the goals and objectives of the iteration. This is a phase that can take quite some time, and the time specified herein for this phase is a minimum of 40 hours. Since planning is done without specific knowledge of what will actually happen in the future, the action phase will also have to make necessary modifications to the plan, as well as take corrective measures so that the goals will ultimately be achieved. In determining the minimum requirements for one to get a job in cyber security, the following actions were undertaken. 1. Getting the resources ready. The first activity in the action
  • 3. phase is to get the resources ready so that the researcher can get set for real action. These resources were as established in the planning phase, and were made available. 2. Collecting data. The second activity was to collect data pertaining to the cyber security career. The researcher used various search engines to extract this data from the internet. Other sources were also utilized, and these include guides, handbooks, books, journals, news articles, etc. 3. Data analysis. After obtaining the raw data, data analysis followed, and this was simply in the form of content analysis to help extract the useful bits of the data. 4. The last action was to compile a list of the various requirements for one to get a job in cyber security. Various sources used did have a different set of requirement, and a comprehensive list that includes most of these is the end result of this phase. Observe. The third phase of this iteration is the observation phase. The observation phase entails a discussion of the various activities undertaken throughout the iteration and their corresponding outcomes. Various issues as observed are explained herein. Among the things observed in this iteration is that the cyber security career, just as is the case with other careers, requires basic education and certification. The minimum level of education is the college of which a certificate or diploma is required as evidence. Proper cyber security teaching programs do emphasize on the current technology, meaning that a person entering into this career also needs to be up to date with the emerging trends in technology. The teaching program should also equip the learner with the necessary tools and methodologies that keep knowledge evolving the same way technology does. Among the courses offered in teaching programs that forms part of the requirements for a job in cyber security include a bachelor’s in cyber security. Its coursework essentials include information security, computer hardware, vulnerability assessment, computer science and statistics among
  • 4. others. These are the essential skills in this career. Various other certifications do improve the employability of a person, but may not be part of the minimum requirements for a job in this career. They boost competitiveness in the job market. Apart from the educational background, experience is vital in job acquisition in this field, and this is because of its technical nature. In that case, the person going for this job would need a particular level of experience which also forms part of the minimum requirements. The best way to gain this experience is through internships that are offered by various hiring organizations. Reflect. The last phase of this iteration is the reflection phase. This is the phase that expresses the personal experiences in undertaking the entire iteration, and discusses not the lessons learned, but the researcher’s personal feelings and interpretations of the various incidences as observed within the iteration. It focuses on the success or failure and the causes of these, as well as the challenges and restraints encountered in the iteration. The entire iteration was a success, and this is an indication that all went on as planned. The objectives and goals of the iteration were to establish the various aspects of a career in cyber security, including the minimum requirements and courses and skills that one need to possess. This was obtained as the researcher compiles the comprehensive list of these requirements. The major process that needs to be improved is data search. The criterion used for data search was a comprehensive one that aimed at taking into account all forms of data sources. However, all these sources end up giving similar basic requirements despite all the time taken. Time could be saved by streamlining this process. Among the challenges experienced in this iteration was data analysis. As explained earlier on, this entailed content analysis, which meant going through all the sources made available, compare and contrast the information and compiling a list. This was a time consuming event, and this was coupled with the time
  • 5. restraints of 40 hours. However, everything went on well and the goals achieved. The major risk herein was generalizing the requirements, forgetting that there are companies that do require some form of differentiation or customization. Enhancement of the marketing systems for Sellers at Flip Kart Submitted to Dr. Asila Sayedi Submitted By Darapuneni Srikanth 5153179 California University of Management and Science Date: OCT 3, 2016 Enhancement of the marketing systems for sellers at Flip Kart 1. Research Topic The research topic revolves around the enhancement of the online marketing system for sellers. While working at Fli p Kart during my job placement opportunity, I realized that there are only a few sellers that possess direct contact for orders and stuffs. In other words, very few of them have fulfillment service with Flip Kart since much of the attention is given to the buyers as opposed to sellers. Despite the fact that Flip Kart alongside other online marketing applications are establishing themselves as a household names because of the confidence they have instilled in their investors, it is important to note that note all sellers remain satisfied when using Flip Kart because it has gained popularity among buyers than sellers.
  • 6. 2. Overall Purpose of the Project AS much as Flip Kart has gained popularity around the globe because of its products and services, it can be argued that it also possesses a number of weaknesses as far as online marketing is concerned. · Product succumbing in the Flip Kart value chain: Flip Kart is facing a challenge in personalization, delivery, payment issues and cyber security that has made Flip kart’s chain of commanding very challenging. · Digital literacy and the concept of consumer connect: Based on some statistics, it is acknowledged that the online marketing on Flip Kart is implying some signs of improvement but this is not always the case when it comes to the customer’s level of digital literacy. · No net revenues in sight because of instability in management: Flip kart has infused immense capita from shareholders and investors and in the process; they are burning the investments with customer acquisition coupled with heavy discounts. In other words, the net revenues that are not in sight may cause a challenge to Flip Kart’s business operations if the break-even point is not realized. 3. An Overview of the Company Flip Kart online Services is a commerce industry based in India that conducts its operations as an online retailer. Additionally, some of its products include stationery, perfumes, movies, mobiles, cameras, music, healthcare and personal products and home and kitchen appliances. Moreover, it also specializes in the provision of Kids clothes, games, and toys. It started its
  • 7. operations in the year 2007 under the guidance of Binny Bansai and Sachin Bansai. Furthermore, it is registered in Singapore and it is headquartered at Bangalore, Karnataka in India. 4. Recommendations The current problems that Flip Kart is facing can be improved through the following suggestions: · Establishing a way to improve on their shipment and logistics service: In this case, as much as a strong and perfect logistics service is one of the primary reasons behind the success of most online marketing systems, it is acknowledged that Flip Kart is lagging behind in this department because of the remoteness of some of the towns in India. · Creating awareness on the employment of digital marketing apps: Owing to the fact that quite a number of rural Indian citizens are unaware of the Flip Kart application, it is important for Flip Kart to create some learning, training, and development program that will ensure that individuals improves their knowledge as far as the Flip kart app is concerned. · Establish a way of attracting top talent from India: In this case, because things in India can be less chaotic and less structured, top talent will ensure that the issues revolving around management is dealt with accordingly hence eliminating the challenges associated with the net revenues in sight. 5. Three Step-by-step Implementation Plan A systematic implementation plan is very crucial to the elimination of the problem facing sellers at Flip Kart. In this case, the step-by-step implementation plan is as follows:
  • 8. · Improving shipment and logistics services · Collecting data as far as courier services are concerned within the villagers and local towns · Eliminating the fear factor associated with conducting an online transaction · Improving on the online security regarding personal information and data · Awareness creation · Conducting simulation programs and trainings · Word of mouth promotions and media advertisements · Eliminating the challenge of online security among the local citizens · Attracting top talent · Acquisition of well-known companies · Offering rewards and promotions for high performers · Acknowledging and giving credit to the work of an employee 6. Projections and Benefits of the Company Based on the Recommendations The fear of making online transactions has been one of the major challenges that sellers have been facing. In other words, the implementation of the recommendations suggested will
  • 9. ensure that the shipment and logistics services of Flip Kart are based on the tastes and preferences of the sellers hence improving on their service delivery to sellers in the process. Additionally, a top talent attraction will eliminate the issue of poor decision making when it comes to management hence in the process, it will provide profit insights for investors. Furthermore, through trainings and simulation programs, the level of digital literacy of the local Indian citizens will improve hence increasing the number of online transactions for Flip kart . Enhancement for Marketing Systems for Sellers at Flip Kart Enhancement for Marketing Systems for Sellers at Flip Kart Submitted to Dr. Asila Sayedi Submitted by Srikanth Darapuneni Student ID 5153179 California University of Management and Science Date: October 17, 2016 OUTLINE I. Abstract II. Introduction III. Company overview A. History
  • 10. B. Business model IV. Analysis A. Industry analysis B. Company analysis V. PEST analysis A. Political B. Environmental C. Social D. Legal VI. SWOT analysis A. Strengths B. Weaknesses C. Opportunities D. Threats VII. Recommendations and implementations A. Improving shipment and logistics services i. Collecting data as far as courier services are concerned within the villagers and local towns
  • 11. ii. Eliminating the fear factor associated with conducting an online transaction iii. Improving on the online security regarding personal information and data B. Awareness Creation i. Conducting simulation programs and trainings ii. Word of mouth promotions and media advertisements iii. Eliminating the challenge of online security among the local citizens C. Attracting Top Talent i. Acquisition of well-known companies ii. Offering rewards and promotions for high performers iii. Acknowledging and giving credit to the work of an employee VIII. Conclusion Introduction Among many online marketing companies, Flip Kart has had an advantage of achieving steadier growth to become one of the most preferred online sellers (Bhasin, 2016). On contrary, however, Flip Kart has faced several challenges that act as potential obstacles to continued success. Some of the problems include disintegration in the supply chain coordination, digital illiteracy, and poor management (Hollensen, 2015). An existence of such challenges suggests that Flip Kart does not have an all-smooth journey to success as they suggest that the company faces some forces that if unidentified could lead to a big failure of the company. In addition to the down pulling
  • 12. forces, there obviously exists positive forces to which Flip Kart owes its current prosperity. To identify the different forces, however, sufficient analysis is required to establish the negative and positive forces (Hollensen, 2015). Some of the most relevant analysis techniques are the SWOT and PESTLE analyses. SWOT Analysis A SWOT analysis is a technique for analysis that guides a business organization to identify its favourable and unfavourable aspects both in the organization and out in its surroundings (Bhasin, 2016). Favourable aspects are the strengths while the negative ones are weaknesses. SWOT is an initiation for strengths, weaknesses, opportunities, and threats. Strengths are those aspects of a business that provide it a higher advantage compared to others while weaknesses are the aspects that place it at an increased disadvantage than other businesses (Hollensen, 2015). Opportunities, on the other hand, are those aspects that lie in the business’ environment and which it can exploit to its benefit. Threats, on the other hand, are those aspects that pose as potential causes of trouble for the business and that could result in failure (Yüksel, 2012). I. Strength Experience in a given business field acts as a big advantage for the concerned parties. Flip Kart has founders who had been in the e-commerce business before and could, therefore, understand the business better leading to a bigger possibility of success and highly efficient strategies which in turn make the company very competitive (Bhasin, 2016). Acquiring act as a big breakthrough for Flip Kart as well as giving it a big advantage in achieving a large number of customers (Hollensen, 2015). Currently, Flip Kart has more than 75 million users that are quite a sufficient number to guarantee it the success.
  • 13. Being an online seller as well enables Flip Kart to avoid making unnecessary shipment as they transport those goods that have been ordered which saves time, fuel and financial resources that could have been wasted making trial and error shipments (Hollensen, 2015). Flip Kart offers such a wide range of products that enable it to increase attractiveness to customers as they can shop for a variety of products at Flip Kart. II. Weaknesses Being an e-commerce business operator translates to the fact, that customer’s orders are delivered to their requested destinations that make the responsibility of the item in the hands of Flip Kart. If in any case goods are damaged, the loss goes back to Flip Kart and not the customer. E-commerce is a very competitive field of business and Flip Kart as part of it has to be a price taker from customers (Hollensen, 2015). Buyers can switch online marketing service providers and therefore have the advantage of setting pr ices that could at times be unfair in the case of Flip Kart. High costs of acquiring customers are a great drawback for Flip Kart. Stiff competition in the industry makes the costs of acquiring new customers and partners relatively high. III. Opportunities Flip Kart is one of the most famous e-commerce service providers that gives it an advantage in achieving new customer recruitment (Hollensen, 2015). Advertising activities as well may be done easily because the company is widely known and
  • 14. no deep explanations are required. Operating in a wide range of products gives Flip Kart a big opportunity to expand its business. A wide range of products provides economies of scale that translate increased returns. Digital literacy levels are increasing each day giving e- commerce service providers an advantage in making themselves known to people. Flip Kart can use the opportunity of increasing digital literacy to acquire new customers (Bhasin, 2016). IV. Threats High-level competition is the biggest threat that Flip Kart faces. Companies like Amazon and eBay pose a stiff competition that greatly threatens the performance of Flip Kart. As an online service provider, Flip Kart faces the threat of online data breach. Malicious parties might interfere with their customer records and information affecting service provision activities and customer satisfaction levels. Government restrictions as well act as a threat as they may at times limit the transaction activities that produce the best return levels. Regulation on FDI related issues in multi-branding retail has highly interfered with the success levels of success in the online marketing industry. Positive Negative Internal
  • 15. Strengths Experience Acquisition of big companies No unnecessary shipments Wide variety of products Weaknesses Price taking Transportation risks High costs of customer and partner acquisition External Opportunities Fame Wide product range Increased digital literacy Threats High competition levels Online data breach Government regulations Figure 1: Swot Analysis Table · PESTEL Analysis PESTEL analysis is a framework that is used by businesses to analyze macro-environmental aspects that affect them. PESTEL
  • 16. analysis acts as a strategic tool to establish a better understanding business position, market behavior and offers directions for operations (Bhasin, 2016). PESTEL analysis consists of political, economic, socio-cultural, technical, environmental, and legal aspects surrounding the business (Hollensen, 2015). Flip Kart’s PESTEL analysis would help establish the factors of the environment that highly affect it and guide it on what aspects to concentrate on. i. Political Factors Political factors are concerned with government intervention into the business sector through regulatio n or restriction of activities (Hollensen, 2015). Regulations have greatly affected the growth of Flip Kart like in the case where Flip Kart dropped acquiring Airtel Zero because it was considered not right to have the advantage of having free internet access while others are using it at costs. ii. Economic Factors Business factors that affect the way a business operates as well as how it makes its decisions are economic factors. Some economic factors consist of interest rates, exchange rates, inflation rates, profit rates, among others (Hollensen, 2015). In cases where Flip Kart offered large discounts on their Billion- sale day, it experiences large profit margin drop and had to remove customer listings to avoid experiencing loss. iii. Social Factors Social factors are those business aspects that incorporate the concerns of the society like health consciousness, cultural aspects, age distribution, etc. social factors that affect Flip Kart may involve the level of digital literacy which in turn influences the level of online purchase embracing, the level of
  • 17. trust held by people for online purchasing etc. iv. Technological Factors Technological factors concern with the way a business is able to update the production or service provision methods used as technology advances. Flip Kart has been on its toes to keep pace with advancing technology that saw it update its purchasing application to be able to be used in phones. v. Environmental Factors Environmental factors include ecological aspects of nature s uch as weather, climate change, etc. which tend to affect many industries (Bhasin, 2016). Flip Kart’s nature is not affected much by environmental factors, but they may interfere with the delivery of customer orders. vi. Legal Factors Factors that affect the way a business runs, the pricing procedures, product demand, and supply, etc. are legal factors. Legal factors affect Flip Kart in terms of price controls and service charges. Charges that Flip Kart fixes on its products should align with those of other e-commerce companies to avoid unfair competition through low pricing (Bhasin, 2016). References Bhasin, H. (2016). SWOT analysis of Flipkart - Flipkart SWOT analysis. Marketing91.com. Retrieved 17 October 2016, from http://www.marketing91.com/swot-analysis-of-flipkart/ Hollensen, S. (2015). Marketing management: A relationship approach. Pearson Education.
  • 18. Jurevicius, O. (2013). PEST & PESTEL Analysis,". Strategic Management Insight, 13, 2013. PESTEL-PESTLE Analysis of Flipkart. (2016). Free PESTEL Analysis. Retrieved 17 October 2016, from http://freepestelanalysis.com/pestel-pestle-analysis-of-flipkart/ Yüksel, I. (2012). Developing a multi-criteria decision making model for PESTEL analysis. International Journal of Business and Management, 7(24), 52. 1 ENHANCEMENT OF THE MARKETING SYSTEM FOR SELLERS AT FLIP KART 12 Enhancement of the Marketing Systems for Sellers at Flip Kart Literature Review Submitted to Dr. Asila Sayedi Submitted By Srikanth Darapuneni Student ID 5153179 California University of Management and Science Date: October 10, 2016 Contents
  • 19. 3Enhancement of the Marketing Systems for Sellers at Flip Kart 3The Challenges Associated with a Poor Marketing System- Statement of the Problem 3The Concept of Marketing System-Recommendations 4How to Establish an Effective Marketing System 5Improving Shipment and Logistic Services 6Promoting Digital Literacy 8Attracting Top Talent 9Benefits of a Good Marketing System 11References Enhancement of the Marketing Systems for Sellers at Flip Kart The Challenges Associated with a Poor Marketing System- Statement of the Problem Maintaining strong, perfect, and reliable logistics service is the backbone of success for any online marketing system. Flip Kart however has been witnessed to lag behind in attaining such shipment and logistics services. Attaining a supply chain that is able to perfectly coordinate supply chain activities to and from to best satisfy customer needs. Flip Kart has not achieved a system that gives its customers the privilege to experience such satisfaction. Activities across the supply chain tend to slip out on each other and coordination of the departments involved becomes hard which in turn brings along poor performance of the company. Experiencing slip outs in the supply chain additionally means that customer’s products may sometimes be delivered in bad condition, less quality or sometimes fail to be delivered (Ho & Chang, 2015)The Concept of Marketing System-Recommendations Using online purchase systems requires enough skill on using the internet. In the case of Flip Kart, users do not just require to be familiar with the internet but also possess the knowledge to use online marketing and shopping applications. India’s remoteness poses a great challenge for Flip Kart to address as it continues to seek improved new customer recruitment. Flip Kart
  • 20. therefore faces a challenge of finding potential customers who are technologically updated to engage in online purchasing. It is therefore on Flip Kart’s call to make sure they find solutions to the challenge and increase their potential customers across India (Scott, 2012). Unstable management systems have seen the performance of Flip Kart Inline Commerce System go down. When a company does not enough managerial skill at its disposal, it becomes very easy to lose account of its activities, including financial ones. Flip Kart is revealed to experience shortage of high-skilled personnel in its management team. Management is the key determinant of the overall performance of an investment. Crucial aspects like making decisions, building strategies, etc. are the responsibility of the management department. If individuals in management department lack excellent managerial skills, then they are sure to fail in making the investment fail (Dychtwald, Erickson, & Morison, 2013). How to Establish an Effective Marketing System An improvement in the supply chain management is clearly necessary if Flip Kart really aims at providing the best services to its customers. Ensuring delivery of customer orders in the expected time is one of the considerations for possible improvement that Flip Kart should make. Delaying customer orders may inconvenience customers and they may never be interested in ordering for goods from the same investment again. It should be made a priority to monitor all the activities that take place in the product delivery process. Flip Kart should ensure that customer orders are responded to in the right time as well as in the right condition (Dychtwald Erickson & Morison, 2013). Flip Kart should devote itself towards creating possible customers in the whole of Indian population. Achieving market creation all-over India may require methods of promoting consumer digital literacy. Digital literacy is a key aspect in achieving a desired consumer mobilization level. When people
  • 21. do not know how to use the Flip Kart’s purchasing application it will not in any way be possible for them to make purchases. Potential customer digital illiteracy hinders expansion of market that poses a challenge for Flip Kart to ensure that they enlighten potential customers on digital purchasing to increase the recruitment levels (Baker, 2014). Management problems and challenges are a great threat to the performance of the marketing system in any commercial investment. An insight of net financial reports should be provided to assist the company to make decisions. When such reports are not available, or are not clearly stated, decisions may not be made appropriately. Flip Kart should take up the responsibility to recruit highly skilled managers to manage their transactions. A keen observation on the customer after-sale services provided should be made to ensure that they are not offered at the expense of the company’s net revenues going dangerously down in ways that threat its achievement of a break-even point (Phillips, 2012). Improving Shipment and Logistic Services One way of dealing with a wrecked logistic and shipment system is acquiring adequate information on courier services. Having enough as well as relevant information on courier services within the villages and towns that they operate will assist Flip Kart in establishing the relevant delivery times and places. Courier information should especially be obtained for the remote areas to ensure that they give their customers achievable delivery deadlines and terminals. On acquiring information on the nature of transportation services that are available, the company should then establish a closer relationship with the concerned personnel so that delivery of customer orders is ensured. Having established close enough relationship makes it possible to follow-up the progress of delivery as well as the condition of goods (Taiminen & Karjaluoto, 2015).
  • 22. Elimination of the fear for conducting online transacti ons should be done to ensure that customers are confident when making the transactions. Fear of conducting online business transaction is brought about by the existence of marketing sites that are not trustworthy. It does not matter why an individual is scared of making online transactions, devotion to gain their trusts could make them a potential customer. Flip Kart should therefore ensure that it avails its team for demonstration and promotion form time to time. Conducting such events brings the company closer to the people and this works great extends in gaining their trust that in turn increases the number of potential customers. Creation buyer confidence works to the advantage of the company as it increases its market size that is crucial for increased returns (Christopher 2016). Security of information should be ensured to make sure that personal information and data cannot be accessed by anyone but the relevant parties. Online information in this case is the concern for Flip Kart as their customers transact online. Protection of customer information should be highly preferred to ensure that privacy is maintained. Customer information should be submitted through personal accounts and not to a website to ensure that, an individual’s information is not accessible by anyone but them. Delivery means should also be chosen by the customers to ensure that their preferences are met as long as the choices lie in the ranges provided by the company. The company should additionally encrypt its website using high technology that cannot be cracked to protect customer’s information (Heskett, 2013). Promoting Digital Literacy Awareness creation on the existence of online marketing should be undertaken to inform people. Technology has been on the rise and a large part of today’s population can access the relevant mobile phones that allow one to use the marketing
  • 23. applications. A wide availability of these mobile phones makes it easier to create awareness of the existence of marketing applications. Flip Kart on creating awareness of their online marketing system needs to indulge in making people aware that what they do exists and provide a brief on how it is done. Participating in community activities as well could earn the company more popularity that is a way of awareness creation. Appearing in community gathering gives people the chance to know of its existence that marks the start of a process to know what they do (Fahimnia et al.,2015) Conducting simulation and program trainings could as well assist the company in promoting digital literacy. Digital literacy could be sometimes being hard to learn individually without assistance. Flip Kart should take the opportunity and train peoples especially those in the remote areas and villages on how advantageous it is to be digitally literate. Providing the education as well provides the company to teach the people to use their marketing application, as well as state the possible advantages that come along with using it. Flip kart should seize to assume that everyone is digitally literate and they can do the ordering by themselves. Getting into the villages and remote areas conducting mobilization exercises does a great job creating new customers (Cheng et al 2014). Massive publication and advertisement could be used to achieve digital literacy and knowledge. Flip Kart could make use of the media inclusive of social media to advertise its operations. Advertising should be undertaken to increase knowledge of the company and increase its publicity coverage. Promotions could as well be used to publicize the company and also its products. In promotions, the company could give out items that have an overview or a brief description of the company. By doing these Flip Kart will achieve a good target of new potential customers. Advertisement and publication could as well offer the company a chance to educate people on the benefits of online purchasing. Creating confidence to use online purchasing services could be done as well by providing the relevant explanation to instill
  • 24. confidence. Attracting Top Talent Acquisition of well-known companies in many cases consequently rises to fame the acquiring company. In order to attract top management skill, Flip Kart might have to consider acquiring a well-known company. Individuals, especially those with great work skills tend to believe that they can adequately exploit their skill in the well-known companies. By buying off a famous company or becoming a shareholder of one, Flip Kart would as well get a chance to get close to top skilled individuals. Getting close to such personnel would then give the company personnel a chance to convince a highly skilled manager to join their work force Shankar et al., 2016). To encourage workers to improve their performance, Flip Kart Company can use the technique of providing rewards and benefits for top performers. In order to get employees to devote themselves towards achieving the company’s best interest, Flip Kart could set a target that if one meets, an award will be presented. In the management department for example, managers could be given the chance to take turns in running the activities of the company. Turns could be taken for a period of three months and rotate for a period of one year. Progress of each manager is well monitored to identify any changes, either positive or negative. At the end of the year, final evaluation is done to determine the lead performing manager. The manager who outdoes his/her colleagues in terms of revenues insight, effectiveness of strategies among others would then be considered the winner and presented the award. In addition to recognition, the top performer could as well be offered a promotion to be the head of the management department. Applying the same in other departments would also work towards improving employee competition, and consequently performance (Lam & Zhang, 2014). When an individual performs well, they feel motivated when
  • 25. they are shown appreciation. Appreciation of employees could involve acknowledging them and letting them own the credit for their good job. Acknowledging an employee does not only involve telling them that they did well, congratulating them, or telling them to do better. Effective employee motivation requires more than just words. Acknowledgement may involve recognition of a good performer in front of other employees. Being recognized in the presence of others who would otherwise have had the chance to be recognized gives one a perfection feeling which motivates them to do even better. Credit award on the other hand may involve being named employee of the year or being accorded any other heroic title. To attain the title other employees will focus on performing better while at the same time the titleholder will work hard to retain the title. Benefits of a Good Marketing System Enhancement of market systems for Flip Kart is an essential element towards achieving excellent overall performance by the company. As an online marketing company, it needs to keenly address the issues stated above to achieve the desired performance. In this review, a methodology towards achieving the desired setting of market systems is provided. Through the statement of recommendations accompanied by their respective implementation procedures the obstacles to achieving a perfect state of a marketing system for Flip Kart are effectively addressed (Lam & Zhang,2014). Improved shipment and logistic services have the ability to increase Flip Kart’s market structure perfection by a minimum of 40%. As provided by the nature of their transactions, Flip Kart depends on the satisfaction of its customers to determine their performance. Shipment and logistic services are the main components of the customer service and therefore the main determinants of the overall performance in the service sector.
  • 26. Delivery of customer orders in time and in a good condition is essential for a good customer service provision. Eliminating the fear of using online purchasing services has the ability to increase Flip Kart’s market size by 28%. Creating confidence in people increases their trust hence willingness to use the online purchasing services. Ensuring data and information security increase customer comfort to use online purchasing by over 50%. (Grogger & Hanson 2015) Absorbing top-talent in the management sector works a great advantage in ensuring that performance of the company is good enough. Acquisition of well-known companies increases top talent attraction by a great percentage as well. Offering rewards to employees who perform exceptionally well motivates them a great deal and in return, they are encouraged to perform even better. Accrediting good performance as well increased employee motivation that as well promotes continued good performance (Ellram La Londe & Weber, 2013. Awareness creation on the other hand offers, Flip Kirt, to publicize itself and its activities as well. Recruitment of new customers can then be done more easily when they are aware of the existence of the company as well as its activities. A word of mouth promotion as well does the magic in attracting people to hear and understand better what the company has to offer. Simulation programs and training provide a chance for the company to teach people how to use their online purchasing services (Scott, 2012). References 1. Fahimnia, B., Bell, M. G., Hensher, D. A., & Sarkis, J. (2015). The Role of Green Logistics and Transportation in Sustainable Supply Chains. In Green Logistics and Transportation (pp. 1-12). Springer International Publishing.
  • 27. 2. Lam, J. S. L., & Zhang, L. (2014). Enhanced logistics service provider framework for higher integration and efficiency in maritime logistics. International Journal of Logistics Research and Applications, 17(2), 89-113. 3. Ellram, L. M., La Londe, B. J., & Weber, M. M. (2013). Retail logistics. International Journal of Physical Distribution & Logistics Management. 4. Heskett, J. L. (2013). Controlling customer logistics service. International Journal of Physical Distribution & Logistics Management. 5. Christopher, M. (2016). Logistics & supply chain management. Pearson Higher Ed. 6. Shankar, V., Kleijnen, M., Ramanathan, S., Rizley, R., Holland, S., & Morrissey, S. (2016). Mobile Shopper Marketing: Key Issues, Current Insights, and Future Research Avenues. Journal of Interactive Marketing, 34, 37-48. 7. Taiminen, H. M., & Karjaluoto, H. (2015). The usage of digital marketing channels in SMEs. Journal of Small Business and Enterprise Development, 22(4), 633-651. 8. Cheng, A., Auerbach, M., Hunt, E. A., Chang, T. P., Pusic, M., Nadkarni, V., & Kessler, D. (2014). Designing and conducting simulation-based research. Pediatrics, 133(6), 1091- 1101. 9. Phillips, J. J. (2012). Return on investment in training and performance improvement programs. Routledge. 10. Baker, T. (2014). Attracting and Retaining Talent: Becoming an Employer of Choice. Springer.
  • 28. 11. Grogger, J., & Hanson, G. H. (2015). Attracting talent: location choices of foreign-born PhDs in the United States. Journal of Labor Economics, 33(S1 Part 2), S5-S38. 12. Dychtwald, K., Erickson, T. J., & Morison, R. (2013). Workforce crisis: How to beat the coming shortage of skills and talent. Harvard Business Press. 13. Ross, D. F. (2013). Competing through supply chain management: creating market-winning strategies through supply chain partnerships. Springer Science & Business Media. 14. Scott, D. (2012). Rentention of key talent and the role of rewards. WorldatWork Journal. 15. Ho, L. H., & Chang, P. Y. (2015). Innovation capabilities, service capabilities and corporate performance in logistics services. International Journal of Organizational Innovation (Online), 7(3), 24. ENHANCING THE MARKETING SYSTEM AT FLIP KART Enhancing the Marketing System at Flip Kart Week-4 (Recommendation and Implementation) Submitted to Dr. Asila Sayedi Submitted By Srikanth Darapuneni Student ID 5153179
  • 29. California University of Management and Science Date: October 25, 2016 OUTLINE I. Abstract II. Introduction III. Company overview A. History B. Business model IV. Analysis A. Industry analysis B. Company analysis V. PEST analysis A. Political B. Environmental C. Social D. Legal VI. SWOT analysis A. Strengths B. Weaknesses
  • 30. C. Opportunities D. Threats VII. Recommendations and implementations A. Improving shipment and logistics services i. Collecting data as far as courier services are concerned within the villagers and local towns ii. Eliminating the fear factor associated with conducting an online transaction iii. Improving on the online security regarding personal information and data B. Awareness Creation i. Conducting simulation programs and trainings ii. Word of mouth promotions and media advertisements iii. Eliminating the challenge of online security among the local citizens C. Attracting Top Talent i. Acquisition of well-known companies ii. Offering rewards and promotions for high performers iii. Acknowledging and giving credit to the work of an employee VIII. Conclusion
  • 31. Recommendations And Conclusions A. Establishing a way to improve on their shipment and logistics service In this case, as much as a strong and perfect logistics service is one of the primary reasons behind the success of most online marketing systems, it is acknowledged that Flip Kart is lagging behind in this department because of the remoteness of some of the towns in India (Scott, 2012). i. Collecting data as far as courier services are concerned within the villagers and local towns The shipment of goods and services is one of the most crucial elements that can enhance the satisfaction of sellers at Flip kart (Ho & Chang, 2015). Additionally, the proliferation of technology in each and every business aspect has made so many customers to prefer new ways of conducting their business transactions. In this case, Flip Kart sellers have to keep up with the pace if they need to acquire new customers a while at the same time retaining their customer loyalty. However, the sellers at Flip kart face the challenge of ensuring that their customers are able to obtain exceptional customer experience (Ross, 2013). Therefore, it is the role of Flip kart to ensure that the satisfaction of sellers at Flip kart has improved by delivering seamless consumer loyalty across a number of organization’s touch points. ii. Eliminating the fear factor associated with conducting an online transaction Flip Kart needs to establish their presence on most of the communication channels preferred by their consumers. In essence, with a proper contact centre logistics, Flip Kart can
  • 32. embrace the true Omni-channel experience while simultaneously offering services across a number of channels like email, web, mobile IVT and social media channels. iii. Improving on the online security regarding personal information and data With the ever-changing technology advancements and dynamics, consumer demands have changed hence creating a new set of challenges for sellers at Flip kart (Grogger & Hanson, 2015). Establishing a marketing system at FLIP Kart that is more flexible in such a way that it has the freedom to change the order within a particular timeline to suit new requirements of the consumer will be crucial in enhancing the marketing system for sellers at Flip Kart (Baker, 2014). In fact, a more visible and transparent system that encourages a complete disclosure throughout delivery process and order placements in real time will also be vital in enhancement of the sellers demands at Flip Kart (Dychtwald, Erickson, & Morison, 2013). B. Awareness creation i. Eliminating the challenge of online security among the local citizens It is universally acknowledged that, the demands for goods and services at Flip kart is more likely to increase during the holiday seasons and the sale periods coupled with increasing number of orders. In this case, the technology adopted at Flip Kart should possess the capability of scaling up in an effor t to meet the requirements of the demands of business. ii. Word of mouth promotions and media advertisements With customers waiting impatiently and eagerly for their
  • 33. services, it is important that an individual maintain a constant touch with them in terms of time of delivery, status of the goods and location of delivery to avoid frustrations from the part of the consumers. In this case, with such communication, other customers may be more than willing to spread good news about the company to other customers (Phillips, 2012). iii. Conducting simulation programs and trainings: Knowledge based Routing With the establishment of three skill-based routing at Flip kart, callers can efficiently and quickly be matched with consultants and agents that are able to help them as soon as they need clarifications or inquire about the status of a certain product Cheng et al.,2014). Besides, it also allows the managers and the sellers at Flip kart to gather international visibility by routing the calls made to Flip Kart about a particular product to local offices that offers primary knowledge and personalized services to the consumer in question. Logistics operators are known to incur difficulties because of lack of departmental integration (Taiminen & Karjaluoto, 2015). However, with contact centre software at Flip Kart, it can be argued that back office data can be incorporated with the customers at Flip Kart to keep each and everyone at Flip kart including sellers informed at every phase of transaction and aspect of service. In fact, all the information that is relevant for customers .In this case, all relevant data on the customers coupled with their demands and cases can be shared easily and in the process, making the marketing system at Flip Kart to be shared easily and in the process, Flip kart marketing system for sellers to function seamlessly with its customers and other business partners (Christopher, 2016). C. Attracting top talent and customers to Flip kart
  • 34. i. Acquisition of well-known companies It is accepted that Logistics operators at Flip Kart work together with business partners, retailers, dispatch units among others while raising the complexity level for agents when it comes to dealing with the customers (Shankar et al., 2016). In other words, they are forced to toggle disparate systems to remove relevant data to resolve any customer reviews and queries. In this case therefore, the logistics operators at FLIP Kart require a CTI screen pop technology designed specifically from the ground to the top to offer a multi channel platform capable of arming the government with information regarding the customers, accou8nt history, social media interaction and marketing preferences. Therefore, in order to encourage more customers and other top talent individuals ii. Offering rewards and promotions for high performers and special order exceptions Some online trading companies offer special or custom order opportunities to consumers as a way of retaining and attracting new customers (Heskett, 2013). In this case, the time frame that the consumers expect a certain product to be available on the market has dropped substantially as the technology advances. In other words, in the highly competitive and fast paced economy, consumers in most cases expect turnaround within days. In this case, through their own marketing system Flip kart can offer flexible delivery to consumers (Lam & Zhang, 2014). For instance, an option that encourages a structured data portfolio where the writers can search they type of products they want coupled with their preferred seller must be included on Flip Karts marketing system to ensure that the sellers are well placed to be accessed by their consumers. iii. Acknowledging and giving credit to the work of an employee
  • 35. It is universally accepted that, in order to improve the marketing system for sellers at Flip kart, it is important for Flip Kart to make information about the available sellers at Flip Kart coupled with the products they are selling in order to make it easier for the visitors to find the type of information they need easily. In this case, the modern type of customers finds it easier to find the information they are looking for without going through a difficult spell to locate it. In other words, location of a chat service that is available 24/7 on the Flip kart website will be crucial in enhancing the marketing system for sellers at Flip kart (Fahimnia, et al, 2015). Many online companies operators state the order fill rate and on-time delivery to validate exceptional consumer services. Others at times insist that the service accorded to customers falls into its own category and in the process; it deserves its own measurement standards. In this case, these standard measurements are accepted universally as the customer’s standards of proof of agent performance. Therefore, the Flip Kart management supervisors and agents can establish ways of generating reports, historical data or real time data reports that implicated strategic decision, coaching, and training and compensation grade for customers and sellers as well at Flip kart (Ellram, La Londe & Weber, 2013).. References Baker, T. (2014). Attracting and Retaining Talent: Becoming an Employer of Choice. Springer. Cheng, A., Auerbach, M., Hunt, E. A., Chang, T. P., Pusic, M., Nadkarni, V., & Kessler, D. (2014). Designing and conducting simulation-based research. Pediatrics, 133(6), 1091-1101.
  • 36. Christopher, M. (2016). Logistics & supply chain management. Pearson Higher Ed. Dychtwald, K., Erickson, T. J., & Morison, R. (2013). Workforce crisis: How to beat the coming shortage of skills and talent. Harvard Business Press. Ellram, L. M., La Londe, B. J., & Weber, M. M. (2013). Retail logistics. International Journal of Physical Distribution & Logistics Management. Fahimnia, B., Bell, M. G., Hensher, D. A., & Sarkis, J. (2015). The Role of Green Logistics and Transportation in Sustainable Supply Chains. In Green Logistics and Transportation (pp. 1- 12). Springer International Publishing. Grogger, J., & Hanson, G. H. (2015). Attracting talent: location choices of foreign-born PhDs in the United States. Journal of Labor Economics, 33(S1 Part 2), S5-S38. Heskett, J. L. (2013). Controlling customer logistics service. International Journal of Physical Distribution & Logistics Management. Ho, L. H., & Chang, P. Y. (2015). Innovation capabilities, service capabilities and corporate performance in logistics services. International Journal of Organizational Innovation (Online), 7(3), 24. Lam, J. S. L., & Zhang, L. (2014). Enhanced logistics servi ce provider framework for higher integration and efficiency in maritime logistics. International Journal of Logistics Research and Applications, 17(2), 89-113. Phillips, J. J. (2012). Return on investment in training and performance improvement programs. Routledge.
  • 37. Ross, D. F. (2013). Competing through supply chain management: creating market-winning strategies through supply chain partnerships. Springer Science & Business Media. Scott, D. (2012). Rentention of key talent and the role of rewards. WorldatWork Journal. Shankar, V., Kleijnen, M., Ramanathan, S., Rizley, R., Holland, S., & Morrissey, S. (2016). Mobile Shopper Marketing: Key Issues, Current Insights, and Future Research Avenues. Journal of Interactive Marketing, 34, 37-48. Taiminen, H. M., & Karjaluoto, H. (2015). The usage of digital marketing channels in SMEs. Journal of Small Business and Enterprise Development, 22(4), 633-651. 10 WEEK-1 CHECK LIST 1. Did you create a cover page with student ID, name, professor name, title of your paper (capitalize major words and it is based on your problem or recommendations), date format (June 9, 2016), and approved school logo? 2. Did you write how does your recommendation help the company in terms of Dollar, Percentage, Efficiency and etc.… 3. Did you use the naming conventions to save and email your document? Student ID-Your Name-Proposal-Project Title (capitalize major words and leave space between each word) - Submission Date (two digit for month, 2 digit for day, 2 digit for the year with no space or special character)? week -2 check list 1.Do you have 15 to 20 articles in your literature Review? 2. Did you number each of your articles 1-20? 3. Is your references are properly indented (first ling outwards
  • 38. and second line inwards)? 4. Is your reference page based on the last name of the author? (Remove the numbers from the reference page). 5. Does each of your references exist at least twice (one in the body of your lit review and once in reference page? Week-3 check list 1.Did you make sure there is no bullets and you used paragraph format (at least 5 sentence in a paragraph) when writing your analysis? Week-4 check list 1.In your introductory paragraph do you have the 3 recommendations? 2.Is your reference page based on the last name of the author? Running Head: FINDING JOB AS A CYBER SECURITY SPECIALIST 1 Finding a Job as a Cyber Security Specialist 11 Literature Review Finding Job as a Cyber Security Specialist Action Research Course Code: Name: Table of Contents
  • 39. 2.0 Literature Review 4 2.1 Significance of Gutsche Job Seeking Model 7 3.0 Proposal 8 3.1 Iterations 8 Iteration 1: Career identification 8 Iteration 2: Relevant skills acquisition. 8 Iteration 3: Job application and interview 9 Iteration 4: Career development. 9 References 10 List of Figures Figure 2.1: Gutsche Job seeking model…………………………………………………….7 Figure 2.2: Iterations visual Representation……………………………………………….9 2.0 Literature Review The significance of information towards the running of entities in the present 21 century cannot be overlooked due its functional aspect in the running of the respective entities. This is because information is a key aspect in the decision making process. Technological advancements in the present 21st century have offered conveniences in the information technology sector resulting in conveniences and efficiencies with regard to data collection, entry and processing to information. The internet is the major technological advancement that has been in the forefront in facilitating evolutionary changes in the information technology industry such as ease of information storage and access by relevant parties. Despite the advantages associated with the internet with regard to information, the major challenge faced by information specialist as a result of technological advances is cyber security. With the grievous effects of cyber security risks to various entities, entities have gone ahead and setup cyber security departments as a way of mitigating cyber security risks (Hansen, L., & Nissenbaum, 2009).
  • 40. The attention given to cyber security departments either as independent units or attached to the information technology department has had a major effect not only in the corporate world but also academic world. This has resulted in individuals specializing in cyber defence career wise as a result of education institutions offering special courses in cyber security. In the corporate world, human resource departments have come up with cyber security positions with clearly laid out job descriptions in the workplace. Despite the high level of unemployment rates in our society, cyber security departments are still finding it difficult to find qualified personnel to match their information security requirements. The novelty of cyber security specialist positions coupled by the market’s high demand alongside a low number of qualified personnel makes the specialists to be amongst the most sought specialists i n the present corporate world (Caldwell, 2013). With each company seeking ways of securing their data, cyber security specialists are sure of a continued employment increase due to the fact that organizations are shifting from conventional to digital functionality. A cyber security specialist is an individual whose job is to maintain the security of an entity’s information systems. This is through the prevention of cyber security threats as well as mitigating risks to the entity’s information system (O’Connell, 2012). Cyber security specialists work by ensuring cybercrimes are prevented through their knowledge and efficiency in forensic analysis, cyber threats and risks diagnosis and reverse engineering among others to establish solutions and vulnerable areas. Generally, a cyber-security specialist is in in charge of the entire information system’s security. In protecting information system networks, cyber security specialists start by designing firewalls then proceed to monitor the use of data files and finally regulate information access. Cyber security specialists are able to get job opportunities in both private and public sectors. Potential employers in the public sector range from military departments to financial institutions. In the private sector, potential employers range from private
  • 41. consultation firms to corporate firms among others. Other than education qualifications, the cyber security specialists are required to have on job relevant skills and expertise. Educational requirements and skills for the cyber security personnel vary with regard to the scope of responsibility with the lowest entry level being Associate Degree and the highest being Master’s Degree (Pfleeger & Caputo, 2012). Various models have been formulated by researchers to serve as a guide in a job’s search and preparation. These models often come with various stages that highlight what the job seeker is required to do at each stage in the build-up to getting a job. With regard to the cyber security job specialist, the most appropriate job searching model to be applied is the Gutsche model. According to the Gutsche model, career objectives are the models foundation. As a result, a prospective job seeker is supposed to first consider personal career objectives during the job application process. Although the job seeker may be qualified in a variety of jobs, the choice of job to serve should be aligned to his/her career objectives. Listed objectives enable a job seeker to effectively explore any jobs before applying in order to determine job offers that best suit his/her personal career objectives ( Greitzer, F. L., & Frincke, 2010). Career objectives evaluation plays a key role in career growth as well as determining the quality of output in one’s work. A cyber security specialist is a n overall Information technology student and can work in various departments in the I.T department. However, wrong choice of department will lead to zero growth of one’s cyber security skills resulting in redundancy. An example of this is whereby a cyber-security specialist starts by working as an information system’s hardware maintenance officer. Hardware and cyber security are not directly linked hence one’s knowledge and skills goes to waste. However, in the event that the same cyber security specialist starts by working as a software engineer in an I.T department, the specialist is presented with the opportunity to develop personal knowledge and skills hence
  • 42. career growth (Locasto & Sinclair, 2009). In the basic perspective, career growth simply refers to the progression an individual makes up the hierarchical ladder in an organization. Hierarchical growth is often associated with increased roles and responsibilities at each stage up the hierarchy. Although the researcher’s focus is on finding a job, a career is not viewed as a job in this perspective but rather as a progressive transition since it focuses on the future outcome. Based on this argumentation, the initial step in career development is career entry by finding a suitable job (Bagchi - Sen et al., 2010). Gutsche’s model of job searching, there are six key step in finding the appropriate job. The six steps are: 1. Identifying one’s career 2. Acquisition of relevant skills 3. Research on the potential employer 4. Job application and Interview 5. Staying motivated and organized in new positions 6. Negotiating for career development Figure 2.1: Gutsche Job seeking model 2.1 Significance of Gutsche Job Seeking Model Career identification entails choosing one’s career based on one’s ability and passion to work in the said career. Relevant skills to be applied in the course of the career development skills are to be achieved through specialised education and training. Upon acquisition of the relevant skills and knowledge, the job seeker should seek prospective job openings and research on the employer to establish career development prospects (Bagchi -Sen et al., 2010). Job openings that are relevant to the job seeker’s career objectives should be applied and interviews conducted. If successful the job seeker should view his/her entry position as a stepping stone for ascension up the career hierarchical ladder
  • 43. (Cone et al., 2006). It is advisable that the jobseeker should stay motivated and organized in new positions as a way of showing ability for new challenges. The job seeker should also expound his/her qualifications in case higher career development positions require additional academic qualifications and skills (Cone et al., 2006). Upon satisfying administrators that he/she is capable of responsibilities and challenges that come with a higher position, the job seeker should creatively negotiate for career development (Cone et al., 2006). 3.0 Proposal This action research’s proposal is a cyber-security specialist’s job seeking process. The research question addresses the research problem as job seeking process. The literature reviews clearly states about the absence of cyber security specialists hence making it easier for qualified cyber - security specialists to get jobs. The strategy listed in this research paper is key in filling a cyber-security position in a company. This action research process will entail five iteration processes as listed below. Iteration 1: Gathering Requirements. This first iteration is founded on the job’s requirements. Prior to qualification for a job interview, the interviewer is required to have met all the prior necessary requirements. Job requirements for the job of a cyber-security specialist include an undergraduate degree in Cyber security, relevant on job experience, knowledge of data security diagnostic tools and IAT level II security certification. Iteration 2: Gap Analysis. The second iteration is focused on analysing the gap to be filled by new employee. In order to secure the job, the new employee is required to impress the Human resource manager on his/her ability to effectively fill the job position. The employee is required to have relevant academic qualifications, relevant job experience, knowledge of cyber security tools and frameworks such as DIACAP, DISA, ACAS and SCAP among others. Analytical skills and data collection capabilities are also relevant in filling the gap in
  • 44. cyber security specialist. Iteration 3:Updating Resume Prior to the application of a new job, a job applicant is required to update his/her resume so as to meet ensure that his/her credentials and qualifications are aligned to the job requirements. Cyber security specialists are often general I.T conversant with makes them qualified to fulfil various general I.T roles and responsibilities such as data entry among others. This therefore necessitates the updating of one’s resume in line with a new job requirements. In the case of a cyber-security specialist, the job applicant should focus on specific skills , qualifications and credentials to match job requirements. Iteration 4:Apply for a Job The other important documents in the job application documents are a cover letter alongside the resume and other relevant documents such as copies of credentials. A successful resume update is always followed by a job application process during which the applicant may be required to attach copies of credentials for credibility and background checking among others. Iteration 5:Plan to fill Requirements After a successful job application process and interview, a successful employee should fill the job requirements through ones skills, qualifications and on job training to acquaint him with the necessary on job procedures and protocols. The new employee should be able to effectively and efficiently fill the respective roles and responsibilities that come with the position. Figure 2.2: Iterations visual Representation The visual representation diagram above shows the four iterations with each following the four distinct phases of action research. From one iteration to the next iterations hence closing in on the expected outcome. The four phases of action research are plan act, observe and reflect with each iteration following the laid down action research phases.
  • 45. References Bagchi-Sen, S., Rao, H. R., Upadhyaya, S. J., & Chai, S. (2010). Women in cybersecurity: A study of career advancement. IT professional, 12(1), 24-31. {http://ieeexplore.ieee.org/document/5403174/} Caldwell, T. (2013). Plugging the cyber-security skills gap. Computer Fraud & Security, 2013(7), 5-10. {http://www.sciencedirect.com/science/article/pii/S1361372313 700629} Cone, B. D., Thompson, M. F., Irvine, C. E., & Nguyen, T. D. (2006, May). Cyber security training and awareness through game play. In IFIP International Information Security Conference (pp. 431-436). Springer US. {http://link.springer.com/chapter/10.1007%2F0-387-33406- 8_37#page-1} Greitzer, F. L., & Frincke, D. A. (2010). Combining traditional cyber security audit data with psychosocial data: towards predictive modeling for insider threat mitigation. In Insider Threats in Cyber Security (pp. 85-113). Springer US. {http://link.springer.com/chapter/10.1007/978-1-4419-7133-3} Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen School. International Studies Quarterly, 53(4), 1155-1175. {http://onlinelibrary.wiley.com/doi/10.1111/j.1468- 2478.2009.00572.x/full} Locasto, M., & Sinclair, S. (2009, February). An Experience Report on Undergraduate Cyber-Security Education and Outreach. In Proceedings of the 2nd Annual Conference on Education in Information Security (ACEIS 2009), Ames, IA, USA.{http://pages.cpsc.ucalgary.ca/~locasto/papers/sismat.ACE IS.pdf} O’Connell, M. E. (2012). Cyber security without cyber war. Journal of Conflict and Security Law, 17(2), 187-209. { http://jcsl.oxfordjournals.org/content/17/2/187.short} Pfleeger, S. L., & Caputo, D. D. (2012). Leveraging behavioral science to mitigate cyber security risk. Computers &