SlideShare a Scribd company logo
1 of 7
FEASIBILITY REPORT1
FEASIBILITY REPORT6
Feasibility Report
MEMO
TO: Manager
FROM:
DATE:
SUBJECT:
This memo is meant for introducing the feasibility report that
aims at providing a solution to the cases and nation problems
about the cybercrime and the potential proposed solution to curb
up the challenge. These feasibilities we are identified by
studying various critical factors such as the social effects, legal
issues, technical problems, and the economic impact. Therefore,
this memo is very vital for an individual to read and understand
various aspects.
Feasibility Report
It takes much time in planning and preparing to implement a
solution to the major problem in society. During the planning
and preparation process, the proposed solution should be tested
and determined if it is feasible to provide the solution or not.
Cybercrime in united states has been a significant problem and
need to be addressed and solution provided to reduce the
cybercrime.
One of the proposed solutions to this major problem is
providing cybersecurity among very individual. This will enable
most of the people to understand and know the importance of
cybersecurity and thus leading to the reduction of the negative
loses that is caused by the cybercrime in society every year.
Another thing that will ensure that the individuals in the nation
are protected from the impact of the cybercrime is educating
them on ways they can protect themselves over the cybercrime
attempts.
This report will majorly focus on looking at the proposed
solution provided and determine if the answers are feasible or
need some changes. The essential aspects that the story will
focus on include the social impact, the economic effect, and
other elements which will be determined if it can provide a
solution to the problem.
The Social Impact
When looking for a potential solution to be implemented to
solve a specific major problem in society, a positive impact is
always the main objective. When the proposed solution is
applied, such as implementing cybersecurity in the daily lives
of the individuals in the society it will bring a lot of positive
impacts on them. For instance, when the cybersecurity is made
the main focus in the in every place, i.e. schools and workplace,
majority of the individuals will be aware of these threats and
ways of preventing them from affecting their daily lives. This
will also reduce the loss that most of the individuals incur due
to the cybercrime and lack of security in their day-to-day
business operations (Help Net Security, 2015).
When the cybersecurity is introduced in society It will bring
much social impact to the life of the individuals since it will
educate people about the dynamic changes that occur in uses of
the technology. When this provides a solution to the cybercrime
problem in the society, it will be adopted by every nation, and
thus the cybercrime problem is reduced and making every
country secure and safe from the cybercrime problems.
Economic Effect.
One of the most critical aspects of coming up with the proposed
solution is the economic feasibility impact. The projected
resolution calls for basically a change in lifestyle in the United
States. The cybersecurity needs to be the main part of the
individuals that will make them safe and preventing the
occurrence of cybercrime. The cybersecurity has to be
implemented in the workplace and various institutions to
achieve the required objectives of solving the issue of
cybercrime in society.
The process of implementation has a great financial cost, but
the results brought by the proposed solution will bring much
economical cost since it will reduce the amount that could have
been used to solve the loss and cases caused by the cybercrime
in the society. When the financial loss incurred due to the
cybercrime is compared to the cost of implementing the
solution, there is a significant difference since the proposed
solution implementation saves much money.
Technical and Legal Issues
For every proposed solution, becoming successful in solving the
intended problem, there are several legal and professional issues
to be followed during the process of implementation. To
implement cybersecurity in the workplaces and the institutions,
some legal issues have to be developed for it to be successful.
Also, during the process of implementation of the
cybersecurity, the technical aspects have to be looked at. The
technical issues involve various aspects such as unforeseen
failure of the system in providing the solution for the problem.
The technical issues will also identify the bugs that will prevent
the proposed solution from providing the solution to the major
problem. The proposed solutions seem to be free from the
technical and legal issues, and thus it may provide the required
solution to the major problem of cybercrime in the United
States.
Conclusion
Generally, the proposed solution to the major problem of
Cybercrime in the United States is more feasible. The problem
in achieving the solution is the lack of financial support during
the process of implementation of the proposed solution. If the
proposed solution gets financial support, it requires, and it will
be easy to implement it and bring the required resolution.
However, considering all other criteria measured to determine
the feasibility of the proposed solution, I found that
implementing the solution either caused little to no impact or
had a positive effect, such as the case with Social implications.
From the above observation, if there will be no financial
distress during the implementation process, the proposed
solution will be successful in solving the major problem of
cybersecurity.
References
Statistica Research Department. (Published August 9, 2019).
Spending on Cybersecurity in the United States from 2010 to
2018. Statistica.
Retrieved from
https://www.statista.com/statistics/615450/cybersecurity-
spending-in-the-us/
Clement, J. (Published July 9, 2019). Amount of monetary
damage caused by reported cybercrime to the IC3 from 2001 to
2018. Statistica.
Retrieved from https://www.statista.com/statistics/267132/total-
damage-caused-by-by-cyber-crime-in-the-us/
Bada, M. & Nurse, J. (Accessed February 2020). The Social and
Psychological Impact of
Cyber-Attacks. Emerging Cyber Threats and Cognitive
Vulnerabilities.
Retrieved from
https://arxiv.org/ftp/arxiv/papers/1909/1909.13256.pdf
Help Net Security. (Published February 26, 2015). The business
and social impacts of cybersecurity issues.
Retrieved from
https://www.helpnetsecurity.com/2015/02/26/the-business-and-
social-impacts-of-cyber-security-issues/
Proposal
The purpose of the proposal is to present a solution to the
problem you identified early in our course. Building off of our
previous assignments, especially the feasibility report, the
proposal offers a solution to an identified problem, and attempts
to persuade readers to accept a particular course of action.
REQUIRED ELEMENTS:
· Memo cover page
· Title page
· Table of contents
· List of figures
· Executive summary (single-spaced)
· Introduction with purpose statement (answer the questions on
p. 431 thoroughly in the introduction)
· Discussion section: Problem,
Solution
, Context (answer the questions on p. 432 thoroughly in the
discussion)
· Organize the report by subheadings relevant to the proposal
· Conclusion that ends memorably and reiterates main points
· APA references page
RESEARCH: A minimum of five (5) credible sources are
required
REQUIRED STANDARDS:
· 6-8 pages (does not include memo, title page, table of
contents, list of figures, or references page)
· Double-spaced (although proposals are sometimes single-
spaced, this course will utilize double-spacing for the sake of
consistency)
· Times New Roman, 12 pt. font
· 1 inch margins
· Page numbers
· In-text citations and references page in APA format
· A minimum of two (2) visual aids (at least one (1) table,
graph, flow chart, timeline, or illustration created by student,
and one (1) that can be inserted from a source with appropriate
APA reference)

More Related Content

Similar to FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx

Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
jeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
glendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
todd581
 
Innovative Technologies And Software For Higher Education...
Innovative Technologies And Software For Higher Education...Innovative Technologies And Software For Higher Education...
Innovative Technologies And Software For Higher Education...
Robin Anderson
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
rrepko
 
(IT)Cyber SectorAs required by Presidential Policy Directiv.docx
(IT)Cyber SectorAs required by Presidential Policy Directiv.docx(IT)Cyber SectorAs required by Presidential Policy Directiv.docx
(IT)Cyber SectorAs required by Presidential Policy Directiv.docx
honey725342
 
Discussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docxDiscussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docx
cuddietheresa
 
DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...
DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...
DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...
Panagiotis Papaioannou
 

Similar to FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx (18)

Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Innovative Technologies And Software For Higher Education...
Innovative Technologies And Software For Higher Education...Innovative Technologies And Software For Higher Education...
Innovative Technologies And Software For Higher Education...
 
Cyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaperCyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaper
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
 
Pin On School Stuff. Online assignment writing service.
Pin On School Stuff. Online assignment writing service.Pin On School Stuff. Online assignment writing service.
Pin On School Stuff. Online assignment writing service.
 
b2025surveysummary (1)
b2025surveysummary (1)b2025surveysummary (1)
b2025surveysummary (1)
 
Operational risk in IT project
Operational risk in IT projectOperational risk in IT project
Operational risk in IT project
 
(IT)Cyber SectorAs required by Presidential Policy Directiv.docx
(IT)Cyber SectorAs required by Presidential Policy Directiv.docx(IT)Cyber SectorAs required by Presidential Policy Directiv.docx
(IT)Cyber SectorAs required by Presidential Policy Directiv.docx
 
Discussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docxDiscussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docx
 
Riskanalysisin housingindustry (1)
Riskanalysisin housingindustry (1)Riskanalysisin housingindustry (1)
Riskanalysisin housingindustry (1)
 
Security Risk Management Essay
Security Risk Management EssaySecurity Risk Management Essay
Security Risk Management Essay
 
DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...
DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...
DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...
 
Social and Biodiversity Impact Assessment - the 7 stages
Social and Biodiversity Impact Assessment  - the 7 stagesSocial and Biodiversity Impact Assessment  - the 7 stages
Social and Biodiversity Impact Assessment - the 7 stages
 
Week 8
Week 8Week 8
Week 8
 

More from lmelaine

James RiverJewelryProjectQuesti.docx
James RiverJewelryProjectQuesti.docxJames RiverJewelryProjectQuesti.docx
James RiverJewelryProjectQuesti.docx
lmelaine
 
It’s easy to dismiss the works from the Dada movement as silly. Cons.docx
It’s easy to dismiss the works from the Dada movement as silly. Cons.docxIt’s easy to dismiss the works from the Dada movement as silly. Cons.docx
It’s easy to dismiss the works from the Dada movement as silly. Cons.docx
lmelaine
 
Jaffe and Jordan want to use financial planning models to prepar.docx
Jaffe and Jordan want to use financial planning models to prepar.docxJaffe and Jordan want to use financial planning models to prepar.docx
Jaffe and Jordan want to use financial planning models to prepar.docx
lmelaine
 
Ive got this assinment due and was wondering if anyone has done any.docx
Ive got this assinment due and was wondering if anyone has done any.docxIve got this assinment due and was wondering if anyone has done any.docx
Ive got this assinment due and was wondering if anyone has done any.docx
lmelaine
 
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docx
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docxIT Strategic Plan, Part 1Using the case provided, analyze the busi.docx
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docx
lmelaine
 
IT Strategic Plan, Part 2Using the case provided, build on Part .docx
IT Strategic Plan, Part 2Using the case provided, build on Part .docxIT Strategic Plan, Part 2Using the case provided, build on Part .docx
IT Strategic Plan, Part 2Using the case provided, build on Part .docx
lmelaine
 

More from lmelaine (20)

Jan 18, 2013 at 217pmNo unread replies.No replies.Post yo.docx
Jan 18, 2013 at 217pmNo unread replies.No replies.Post yo.docxJan 18, 2013 at 217pmNo unread replies.No replies.Post yo.docx
Jan 18, 2013 at 217pmNo unread replies.No replies.Post yo.docx
 
Jan 10, 20141.Definition of law A set of rules and proced.docx
Jan 10, 20141.Definition of law A set of rules and proced.docxJan 10, 20141.Definition of law A set of rules and proced.docx
Jan 10, 20141.Definition of law A set of rules and proced.docx
 
James RiverJewelryProjectQuesti.docx
James RiverJewelryProjectQuesti.docxJames RiverJewelryProjectQuesti.docx
James RiverJewelryProjectQuesti.docx
 
Jacob claims the employer violated his rights. In your opinion, what.docx
Jacob claims the employer violated his rights. In your opinion, what.docxJacob claims the employer violated his rights. In your opinion, what.docx
Jacob claims the employer violated his rights. In your opinion, what.docx
 
Ive been promised A+ papers in the past but so far I have not seen .docx
Ive been promised A+ papers in the past but so far I have not seen .docxIve been promised A+ papers in the past but so far I have not seen .docx
Ive been promised A+ papers in the past but so far I have not seen .docx
 
It’s easy to dismiss the works from the Dada movement as silly. Cons.docx
It’s easy to dismiss the works from the Dada movement as silly. Cons.docxIt’s easy to dismiss the works from the Dada movement as silly. Cons.docx
It’s easy to dismiss the works from the Dada movement as silly. Cons.docx
 
Its meaning is still debated. It could be a symbol of the city of Fl.docx
Its meaning is still debated. It could be a symbol of the city of Fl.docxIts meaning is still debated. It could be a symbol of the city of Fl.docx
Its meaning is still debated. It could be a symbol of the city of Fl.docx
 
Jaffe and Jordan want to use financial planning models to prepar.docx
Jaffe and Jordan want to use financial planning models to prepar.docxJaffe and Jordan want to use financial planning models to prepar.docx
Jaffe and Jordan want to use financial planning models to prepar.docx
 
Ive got this assinment due and was wondering if anyone has done any.docx
Ive got this assinment due and was wondering if anyone has done any.docxIve got this assinment due and was wondering if anyone has done any.docx
Ive got this assinment due and was wondering if anyone has done any.docx
 
It is thought that a metabolic waste product produced by a certain g.docx
It is thought that a metabolic waste product produced by a certain g.docxIt is thought that a metabolic waste product produced by a certain g.docx
It is thought that a metabolic waste product produced by a certain g.docx
 
it is not the eassay it is about anwering the question with 2,3 pa.docx
it is not the eassay it is about anwering the question with 2,3 pa.docxit is not the eassay it is about anwering the question with 2,3 pa.docx
it is not the eassay it is about anwering the question with 2,3 pa.docx
 
It is now time to select sources and take some notes. You will nee.docx
It is now time to select sources and take some notes. You will nee.docxIt is now time to select sources and take some notes. You will nee.docx
It is now time to select sources and take some notes. You will nee.docx
 
Its a linear equations question...Neilsen Media Research surveys .docx
Its a linear equations question...Neilsen Media Research surveys .docxIts a linear equations question...Neilsen Media Research surveys .docx
Its a linear equations question...Neilsen Media Research surveys .docx
 
itively impact job satisfactionWeek 3 - Learning Team Paper - Due .docx
itively impact job satisfactionWeek 3 - Learning Team Paper - Due .docxitively impact job satisfactionWeek 3 - Learning Team Paper - Due .docx
itively impact job satisfactionWeek 3 - Learning Team Paper - Due .docx
 
IT205 Management of Information SystemsHello, I am looking for he.docx
IT205 Management of Information SystemsHello, I am looking for he.docxIT205 Management of Information SystemsHello, I am looking for he.docx
IT205 Management of Information SystemsHello, I am looking for he.docx
 
It is not an online course so i cannot share any login details. No d.docx
It is not an online course so i cannot share any login details. No d.docxIt is not an online course so i cannot share any login details. No d.docx
It is not an online course so i cannot share any login details. No d.docx
 
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docx
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docxIT Strategic Plan, Part 1Using the case provided, analyze the busi.docx
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docx
 
It should be in API format.Research paper should be on Ethernet .docx
It should be in API format.Research paper should be on Ethernet .docxIt should be in API format.Research paper should be on Ethernet .docx
It should be in API format.Research paper should be on Ethernet .docx
 
IT Strategic Plan, Part 2Using the case provided, build on Part .docx
IT Strategic Plan, Part 2Using the case provided, build on Part .docxIT Strategic Plan, Part 2Using the case provided, build on Part .docx
IT Strategic Plan, Part 2Using the case provided, build on Part .docx
 
It seems most everything we buy these days has the label made in Ch.docx
It seems most everything we buy these days has the label made in Ch.docxIt seems most everything we buy these days has the label made in Ch.docx
It seems most everything we buy these days has the label made in Ch.docx
 

Recently uploaded

Recently uploaded (20)

OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 

FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx

  • 1. FEASIBILITY REPORT1 FEASIBILITY REPORT6 Feasibility Report MEMO TO: Manager FROM: DATE: SUBJECT: This memo is meant for introducing the feasibility report that aims at providing a solution to the cases and nation problems about the cybercrime and the potential proposed solution to curb up the challenge. These feasibilities we are identified by studying various critical factors such as the social effects, legal issues, technical problems, and the economic impact. Therefore, this memo is very vital for an individual to read and understand various aspects.
  • 2. Feasibility Report It takes much time in planning and preparing to implement a solution to the major problem in society. During the planning and preparation process, the proposed solution should be tested and determined if it is feasible to provide the solution or not. Cybercrime in united states has been a significant problem and need to be addressed and solution provided to reduce the cybercrime. One of the proposed solutions to this major problem is providing cybersecurity among very individual. This will enable most of the people to understand and know the importance of cybersecurity and thus leading to the reduction of the negative loses that is caused by the cybercrime in society every year. Another thing that will ensure that the individuals in the nation are protected from the impact of the cybercrime is educating them on ways they can protect themselves over the cybercrime attempts. This report will majorly focus on looking at the proposed solution provided and determine if the answers are feasible or need some changes. The essential aspects that the story will focus on include the social impact, the economic effect, and other elements which will be determined if it can provide a solution to the problem. The Social Impact When looking for a potential solution to be implemented to solve a specific major problem in society, a positive impact is always the main objective. When the proposed solution is applied, such as implementing cybersecurity in the daily lives
  • 3. of the individuals in the society it will bring a lot of positive impacts on them. For instance, when the cybersecurity is made the main focus in the in every place, i.e. schools and workplace, majority of the individuals will be aware of these threats and ways of preventing them from affecting their daily lives. This will also reduce the loss that most of the individuals incur due to the cybercrime and lack of security in their day-to-day business operations (Help Net Security, 2015). When the cybersecurity is introduced in society It will bring much social impact to the life of the individuals since it will educate people about the dynamic changes that occur in uses of the technology. When this provides a solution to the cybercrime problem in the society, it will be adopted by every nation, and thus the cybercrime problem is reduced and making every country secure and safe from the cybercrime problems. Economic Effect. One of the most critical aspects of coming up with the proposed solution is the economic feasibility impact. The projected resolution calls for basically a change in lifestyle in the United States. The cybersecurity needs to be the main part of the individuals that will make them safe and preventing the occurrence of cybercrime. The cybersecurity has to be implemented in the workplace and various institutions to achieve the required objectives of solving the issue of cybercrime in society. The process of implementation has a great financial cost, but the results brought by the proposed solution will bring much economical cost since it will reduce the amount that could have been used to solve the loss and cases caused by the cybercrime in the society. When the financial loss incurred due to the cybercrime is compared to the cost of implementing the solution, there is a significant difference since the proposed solution implementation saves much money. Technical and Legal Issues
  • 4. For every proposed solution, becoming successful in solving the intended problem, there are several legal and professional issues to be followed during the process of implementation. To implement cybersecurity in the workplaces and the institutions, some legal issues have to be developed for it to be successful. Also, during the process of implementation of the cybersecurity, the technical aspects have to be looked at. The technical issues involve various aspects such as unforeseen failure of the system in providing the solution for the problem. The technical issues will also identify the bugs that will prevent the proposed solution from providing the solution to the major problem. The proposed solutions seem to be free from the technical and legal issues, and thus it may provide the required solution to the major problem of cybercrime in the United States. Conclusion Generally, the proposed solution to the major problem of Cybercrime in the United States is more feasible. The problem in achieving the solution is the lack of financial support during the process of implementation of the proposed solution. If the proposed solution gets financial support, it requires, and it will be easy to implement it and bring the required resolution. However, considering all other criteria measured to determine the feasibility of the proposed solution, I found that implementing the solution either caused little to no impact or had a positive effect, such as the case with Social implications. From the above observation, if there will be no financial distress during the implementation process, the proposed solution will be successful in solving the major problem of cybersecurity. References Statistica Research Department. (Published August 9, 2019). Spending on Cybersecurity in the United States from 2010 to 2018. Statistica.
  • 5. Retrieved from https://www.statista.com/statistics/615450/cybersecurity- spending-in-the-us/ Clement, J. (Published July 9, 2019). Amount of monetary damage caused by reported cybercrime to the IC3 from 2001 to 2018. Statistica. Retrieved from https://www.statista.com/statistics/267132/total- damage-caused-by-by-cyber-crime-in-the-us/ Bada, M. & Nurse, J. (Accessed February 2020). The Social and Psychological Impact of Cyber-Attacks. Emerging Cyber Threats and Cognitive Vulnerabilities. Retrieved from https://arxiv.org/ftp/arxiv/papers/1909/1909.13256.pdf Help Net Security. (Published February 26, 2015). The business and social impacts of cybersecurity issues. Retrieved from https://www.helpnetsecurity.com/2015/02/26/the-business-and- social-impacts-of-cyber-security-issues/ Proposal The purpose of the proposal is to present a solution to the problem you identified early in our course. Building off of our previous assignments, especially the feasibility report, the proposal offers a solution to an identified problem, and attempts to persuade readers to accept a particular course of action. REQUIRED ELEMENTS: · Memo cover page · Title page · Table of contents · List of figures · Executive summary (single-spaced) · Introduction with purpose statement (answer the questions on p. 431 thoroughly in the introduction) · Discussion section: Problem,
  • 6. Solution , Context (answer the questions on p. 432 thoroughly in the discussion) · Organize the report by subheadings relevant to the proposal · Conclusion that ends memorably and reiterates main points · APA references page RESEARCH: A minimum of five (5) credible sources are required REQUIRED STANDARDS: · 6-8 pages (does not include memo, title page, table of contents, list of figures, or references page) · Double-spaced (although proposals are sometimes single- spaced, this course will utilize double-spacing for the sake of consistency) · Times New Roman, 12 pt. font · 1 inch margins · Page numbers · In-text citations and references page in APA format · A minimum of two (2) visual aids (at least one (1) table, graph, flow chart, timeline, or illustration created by student, and one (1) that can be inserted from a source with appropriate