SlideShare a Scribd company logo
1 of 7
FEASIBILITY REPORT1
FEASIBILITY REPORT6
Feasibility Report
MEMO
TO: Manager
FROM:
DATE:
SUBJECT:
This memo is meant for introducing the feasibility report that
aims at providing a solution to the cases and nation problems
about the cybercrime and the potential proposed solution to curb
up the challenge. These feasibilities we are identified by
studying various critical factors such as the social effects, legal
issues, technical problems, and the economic impact. Therefore,
this memo is very vital for an individual to read and understand
various aspects.
Feasibility Report
It takes much time in planning and preparing to implement a
solution to the major problem in society. During the planning
and preparation process, the proposed solution should be tested
and determined if it is feasible to provide the solution or not.
Cybercrime in united states has been a significant problem and
need to be addressed and solution provided to reduce the
cybercrime.
One of the proposed solutions to this major problem is
providing cybersecurity among very individual. This will enable
most of the people to understand and know the importance of
cybersecurity and thus leading to the reduction of the negative
loses that is caused by the cybercrime in society every year.
Another thing that will ensure that the individuals in the nation
are protected from the impact of the cybercrime is educating
them on ways they can protect themselves over the cybercrime
attempts.
This report will majorly focus on looking at the proposed
solution provided and determine if the answers are feasible or
need some changes. The essential aspects that the story will
focus on include the social impact, the economic effect, and
other elements which will be determined if it can provide a
solution to the problem.
The Social Impact
When looking for a potential solution to be implemented to
solve a specific major problem in society, a positive impact is
always the main objective. When the proposed solution is
applied, such as implementing cybersecurity in the daily lives
of the individuals in the society it will bring a lot of positive
impacts on them. For instance, when the cybersecurity is made
the main focus in the in every place, i.e. schools and workplace,
majority of the individuals will be aware of these threats and
ways of preventing them from affecting their daily lives. This
will also reduce the loss that most of the individuals incur due
to the cybercrime and lack of security in their day-to-day
business operations (Help Net Security, 2015).
When the cybersecurity is introduced in society It will bring
much social impact to the life of the individuals since it will
educate people about the dynamic changes that occur in uses of
the technology. When this provides a solution to the cybercrime
problem in the society, it will be adopted by every nation, and
thus the cybercrime problem is reduced and making every
country secure and safe from the cybercrime problems.
Economic Effect.
One of the most critical aspects of coming up with the proposed
solution is the economic feasibility impact. The projected
resolution calls for basically a change in lifestyle in the United
States. The cybersecurity needs to be the main part of the
individuals that will make them safe and preventing the
occurrence of cybercrime. The cybersecurity has to be
implemented in the workplace and various institutions to
achieve the required objectives of solving the issue of
cybercrime in society.
The process of implementation has a great financial cost, but
the results brought by the proposed solution will bring much
economical cost since it will reduce the amount that could have
been used to solve the loss and cases caused by the cybercrime
in the society. When the financial loss incurred due to the
cybercrime is compared to the cost of implementing the
solution, there is a significant difference since the proposed
solution implementation saves much money.
Technical and Legal Issues
For every proposed solution, becoming successful in solving the
intended problem, there are several legal and professional issues
to be followed during the process of implementation. To
implement cybersecurity in the workplaces and the institutions,
some legal issues have to be developed for it to be successful.
Also, during the process of implementation of the
cybersecurity, the technical aspects have to be looked at. The
technical issues involve various aspects such as unforeseen
failure of the system in providing the solution for the problem.
The technical issues will also identify the bugs that will prevent
the proposed solution from providing the solution to the major
problem. The proposed solutions seem to be free from the
technical and legal issues, and thus it may provide the required
solution to the major problem of cybercrime in the United
States.
Conclusion
Generally, the proposed solution to the major problem of
Cybercrime in the United States is more feasible. The problem
in achieving the solution is the lack of financial support during
the process of implementation of the proposed solution. If the
proposed solution gets financial support, it requires, and it will
be easy to implement it and bring the required resolution.
However, considering all other criteria measured to determine
the feasibility of the proposed solution, I found that
implementing the solution either caused little to no impact or
had a positive effect, such as the case with Social implications.
From the above observation, if there will be no financial
distress during the implementation process, the proposed
solution will be successful in solving the major problem of
cybersecurity.
References
Statistica Research Department. (Published August 9, 2019).
Spending on Cybersecurity in the United States from 2010 to
2018. Statistica.
Retrieved from
https://www.statista.com/statistics/615450/cybersecurity-
spending-in-the-us/
Clement, J. (Published July 9, 2019). Amount of monetary
damage caused by reported cybercrime to the IC3 from 2001 to
2018. Statistica.
Retrieved from https://www.statista.com/statistics/267132/total-
damage-caused-by-by-cyber-crime-in-the-us/
Bada, M. & Nurse, J. (Accessed February 2020). The Social and
Psychological Impact of
Cyber-Attacks. Emerging Cyber Threats and Cognitive
Vulnerabilities.
Retrieved from
https://arxiv.org/ftp/arxiv/papers/1909/1909.13256.pdf
Help Net Security. (Published February 26, 2015). The business
and social impacts of cybersecurity issues.
Retrieved from
https://www.helpnetsecurity.com/2015/02/26/the-business-and-
social-impacts-of-cyber-security-issues/
Proposal
The purpose of the proposal is to present a solution to the
problem you identified early in our course. Building off of our
previous assignments, especially the feasibility report, the
proposal offers a solution to an identified problem, and attempts
to persuade readers to accept a particular course of action.
REQUIRED ELEMENTS:
· Memo cover page
· Title page
· Table of contents
· List of figures
· Executive summary (single-spaced)
· Introduction with purpose statement (answer the questions on
p. 431 thoroughly in the introduction)
· Discussion section: Problem,
Solution
, Context (answer the questions on p. 432 thoroughly in the
discussion)
· Organize the report by subheadings relevant to the proposal
· Conclusion that ends memorably and reiterates main points
· APA references page
RESEARCH: A minimum of five (5) credible sources are
required
REQUIRED STANDARDS:
· 6-8 pages (does not include memo, title page, table of
contents, list of figures, or references page)
· Double-spaced (although proposals are sometimes single-
spaced, this course will utilize double-spacing for the sake of
consistency)
· Times New Roman, 12 pt. font
· 1 inch margins
· Page numbers
· In-text citations and references page in APA format
· A minimum of two (2) visual aids (at least one (1) table,
graph, flow chart, timeline, or illustration created by student,
and one (1) that can be inserted from a source with appropriate
APA reference)

More Related Content

Similar to FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx

Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxdamilolasunmola
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
Innovative Technologies And Software For Higher Education...
Innovative Technologies And Software For Higher Education...Innovative Technologies And Software For Higher Education...
Innovative Technologies And Software For Higher Education...Robin Anderson
 
Cyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaperCyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaperMicrosoft
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...RAKESH RANA
 
Pin On School Stuff. Online assignment writing service.
Pin On School Stuff. Online assignment writing service.Pin On School Stuff. Online assignment writing service.
Pin On School Stuff. Online assignment writing service.Dawn Robertson
 
Operational risk in IT project
Operational risk in IT projectOperational risk in IT project
Operational risk in IT projectMichel Rochette
 
(IT)Cyber SectorAs required by Presidential Policy Directiv.docx
(IT)Cyber SectorAs required by Presidential Policy Directiv.docx(IT)Cyber SectorAs required by Presidential Policy Directiv.docx
(IT)Cyber SectorAs required by Presidential Policy Directiv.docxhoney725342
 
Discussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docxDiscussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docxcuddietheresa
 
DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...
DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...
DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...Panagiotis Papaioannou
 

Similar to FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx (18)

Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Innovative Technologies And Software For Higher Education...
Innovative Technologies And Software For Higher Education...Innovative Technologies And Software For Higher Education...
Innovative Technologies And Software For Higher Education...
 
Cyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaperCyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaper
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
 
Pin On School Stuff. Online assignment writing service.
Pin On School Stuff. Online assignment writing service.Pin On School Stuff. Online assignment writing service.
Pin On School Stuff. Online assignment writing service.
 
b2025surveysummary (1)
b2025surveysummary (1)b2025surveysummary (1)
b2025surveysummary (1)
 
Operational risk in IT project
Operational risk in IT projectOperational risk in IT project
Operational risk in IT project
 
(IT)Cyber SectorAs required by Presidential Policy Directiv.docx
(IT)Cyber SectorAs required by Presidential Policy Directiv.docx(IT)Cyber SectorAs required by Presidential Policy Directiv.docx
(IT)Cyber SectorAs required by Presidential Policy Directiv.docx
 
Discussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docxDiscussion 1 Importance of Technology Security EducationToday t.docx
Discussion 1 Importance of Technology Security EducationToday t.docx
 
Riskanalysisin housingindustry (1)
Riskanalysisin housingindustry (1)Riskanalysisin housingindustry (1)
Riskanalysisin housingindustry (1)
 
Security Risk Management Essay
Security Risk Management EssaySecurity Risk Management Essay
Security Risk Management Essay
 
DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...
DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...
DOMAIN-DRIVEN DESIGN AND SOFT SYSTEMS METHODOLOGY AS A FRAMEWORK TO AVOID SOF...
 
Social and Biodiversity Impact Assessment - the 7 stages
Social and Biodiversity Impact Assessment  - the 7 stagesSocial and Biodiversity Impact Assessment  - the 7 stages
Social and Biodiversity Impact Assessment - the 7 stages
 
Week 8
Week 8Week 8
Week 8
 

More from mglenn3

Feedback Assignment Set 4Great job on this assignment. I know yo.docx
Feedback Assignment Set 4Great job on this assignment. I know yo.docxFeedback Assignment Set 4Great job on this assignment. I know yo.docx
Feedback Assignment Set 4Great job on this assignment. I know yo.docxmglenn3
 
Feedback Financial Research Report Part 1Thank you for redoing a.docx
Feedback Financial Research Report Part 1Thank you for redoing a.docxFeedback Financial Research Report Part 1Thank you for redoing a.docx
Feedback Financial Research Report Part 1Thank you for redoing a.docxmglenn3
 
Feedback analysis, limitations of project approach, and conclusions .docx
Feedback analysis, limitations of project approach, and conclusions .docxFeedback analysis, limitations of project approach, and conclusions .docx
Feedback analysis, limitations of project approach, and conclusions .docxmglenn3
 
Federated Mutual InsuranceCompany121 East Park Square, O.docx
Federated Mutual InsuranceCompany121 East Park Square, O.docxFederated Mutual InsuranceCompany121 East Park Square, O.docx
Federated Mutual InsuranceCompany121 East Park Square, O.docxmglenn3
 
Federalist 51To the People of the State of New YorkHow shall .docx
Federalist 51To the People of the State of New YorkHow shall .docxFederalist 51To the People of the State of New YorkHow shall .docx
Federalist 51To the People of the State of New YorkHow shall .docxmglenn3
 
Federalism Comparing Government Response in Hurricane Katrina v.docx
Federalism Comparing Government Response in Hurricane Katrina v.docxFederalism Comparing Government Response in Hurricane Katrina v.docx
Federalism Comparing Government Response in Hurricane Katrina v.docxmglenn3
 
Federalism is the structure where two or more levels of government.docx
Federalism is the structure where two or more levels of government.docxFederalism is the structure where two or more levels of government.docx
Federalism is the structure where two or more levels of government.docxmglenn3
 
Federalism is the sharing of powers between the federal and state go.docx
Federalism is the sharing of powers between the federal and state go.docxFederalism is the sharing of powers between the federal and state go.docx
Federalism is the sharing of powers between the federal and state go.docxmglenn3
 
Federal judges do not have a mandatory retirement age, yet Arizona a.docx
Federal judges do not have a mandatory retirement age, yet Arizona a.docxFederal judges do not have a mandatory retirement age, yet Arizona a.docx
Federal judges do not have a mandatory retirement age, yet Arizona a.docxmglenn3
 
Federal Budget SpeechDo you want to know who you are Dont.docx
Federal Budget SpeechDo you want to know who you are Dont.docxFederal Budget SpeechDo you want to know who you are Dont.docx
Federal Budget SpeechDo you want to know who you are Dont.docxmglenn3
 
Federal Budget SpeechDo you want to know who you are Don.docx
Federal Budget SpeechDo you want to know who you are Don.docxFederal Budget SpeechDo you want to know who you are Don.docx
Federal Budget SpeechDo you want to know who you are Don.docxmglenn3
 
February is known as Black History Month. For 30 extra credit points.docx
February is known as Black History Month. For 30 extra credit points.docxFebruary is known as Black History Month. For 30 extra credit points.docx
February is known as Black History Month. For 30 extra credit points.docxmglenn3
 
FEATURE ARTICLE Creating and Capturing Value Through Susta.docx
FEATURE ARTICLE Creating and Capturing Value Through Susta.docxFEATURE ARTICLE Creating and Capturing Value Through Susta.docx
FEATURE ARTICLE Creating and Capturing Value Through Susta.docxmglenn3
 
FEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docx
FEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docxFEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docx
FEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docxmglenn3
 
FEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docx
FEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docxFEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docx
FEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docxmglenn3
 
Fears and Health Needs of Patients with Diabetes A Qualitative Re.docx
Fears and Health Needs of Patients with Diabetes A Qualitative Re.docxFears and Health Needs of Patients with Diabetes A Qualitative Re.docx
Fears and Health Needs of Patients with Diabetes A Qualitative Re.docxmglenn3
 
Featherfall has recently violated several government regulations.docx
Featherfall has recently violated several government regulations.docxFeatherfall has recently violated several government regulations.docx
Featherfall has recently violated several government regulations.docxmglenn3
 
Feasibility of International Trade Global Value Chain .docx
Feasibility of International Trade Global Value Chain     .docxFeasibility of International Trade Global Value Chain     .docx
Feasibility of International Trade Global Value Chain .docxmglenn3
 
FEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docx
FEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docxFEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docx
FEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docxmglenn3
 
Fear-Based Research Paper Topics1. Is it more regressive or prog.docx
Fear-Based Research Paper Topics1. Is it more regressive or prog.docxFear-Based Research Paper Topics1. Is it more regressive or prog.docx
Fear-Based Research Paper Topics1. Is it more regressive or prog.docxmglenn3
 

More from mglenn3 (20)

Feedback Assignment Set 4Great job on this assignment. I know yo.docx
Feedback Assignment Set 4Great job on this assignment. I know yo.docxFeedback Assignment Set 4Great job on this assignment. I know yo.docx
Feedback Assignment Set 4Great job on this assignment. I know yo.docx
 
Feedback Financial Research Report Part 1Thank you for redoing a.docx
Feedback Financial Research Report Part 1Thank you for redoing a.docxFeedback Financial Research Report Part 1Thank you for redoing a.docx
Feedback Financial Research Report Part 1Thank you for redoing a.docx
 
Feedback analysis, limitations of project approach, and conclusions .docx
Feedback analysis, limitations of project approach, and conclusions .docxFeedback analysis, limitations of project approach, and conclusions .docx
Feedback analysis, limitations of project approach, and conclusions .docx
 
Federated Mutual InsuranceCompany121 East Park Square, O.docx
Federated Mutual InsuranceCompany121 East Park Square, O.docxFederated Mutual InsuranceCompany121 East Park Square, O.docx
Federated Mutual InsuranceCompany121 East Park Square, O.docx
 
Federalist 51To the People of the State of New YorkHow shall .docx
Federalist 51To the People of the State of New YorkHow shall .docxFederalist 51To the People of the State of New YorkHow shall .docx
Federalist 51To the People of the State of New YorkHow shall .docx
 
Federalism Comparing Government Response in Hurricane Katrina v.docx
Federalism Comparing Government Response in Hurricane Katrina v.docxFederalism Comparing Government Response in Hurricane Katrina v.docx
Federalism Comparing Government Response in Hurricane Katrina v.docx
 
Federalism is the structure where two or more levels of government.docx
Federalism is the structure where two or more levels of government.docxFederalism is the structure where two or more levels of government.docx
Federalism is the structure where two or more levels of government.docx
 
Federalism is the sharing of powers between the federal and state go.docx
Federalism is the sharing of powers between the federal and state go.docxFederalism is the sharing of powers between the federal and state go.docx
Federalism is the sharing of powers between the federal and state go.docx
 
Federal judges do not have a mandatory retirement age, yet Arizona a.docx
Federal judges do not have a mandatory retirement age, yet Arizona a.docxFederal judges do not have a mandatory retirement age, yet Arizona a.docx
Federal judges do not have a mandatory retirement age, yet Arizona a.docx
 
Federal Budget SpeechDo you want to know who you are Dont.docx
Federal Budget SpeechDo you want to know who you are Dont.docxFederal Budget SpeechDo you want to know who you are Dont.docx
Federal Budget SpeechDo you want to know who you are Dont.docx
 
Federal Budget SpeechDo you want to know who you are Don.docx
Federal Budget SpeechDo you want to know who you are Don.docxFederal Budget SpeechDo you want to know who you are Don.docx
Federal Budget SpeechDo you want to know who you are Don.docx
 
February is known as Black History Month. For 30 extra credit points.docx
February is known as Black History Month. For 30 extra credit points.docxFebruary is known as Black History Month. For 30 extra credit points.docx
February is known as Black History Month. For 30 extra credit points.docx
 
FEATURE ARTICLE Creating and Capturing Value Through Susta.docx
FEATURE ARTICLE Creating and Capturing Value Through Susta.docxFEATURE ARTICLE Creating and Capturing Value Through Susta.docx
FEATURE ARTICLE Creating and Capturing Value Through Susta.docx
 
FEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docx
FEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docxFEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docx
FEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docx
 
FEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docx
FEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docxFEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docx
FEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docx
 
Fears and Health Needs of Patients with Diabetes A Qualitative Re.docx
Fears and Health Needs of Patients with Diabetes A Qualitative Re.docxFears and Health Needs of Patients with Diabetes A Qualitative Re.docx
Fears and Health Needs of Patients with Diabetes A Qualitative Re.docx
 
Featherfall has recently violated several government regulations.docx
Featherfall has recently violated several government regulations.docxFeatherfall has recently violated several government regulations.docx
Featherfall has recently violated several government regulations.docx
 
Feasibility of International Trade Global Value Chain .docx
Feasibility of International Trade Global Value Chain     .docxFeasibility of International Trade Global Value Chain     .docx
Feasibility of International Trade Global Value Chain .docx
 
FEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docx
FEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docxFEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docx
FEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docx
 
Fear-Based Research Paper Topics1. Is it more regressive or prog.docx
Fear-Based Research Paper Topics1. Is it more regressive or prog.docxFear-Based Research Paper Topics1. Is it more regressive or prog.docx
Fear-Based Research Paper Topics1. Is it more regressive or prog.docx
 

Recently uploaded

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

FEASIBILITY REPORT1FEASIBILITY REPORT6Fe.docx

  • 1. FEASIBILITY REPORT1 FEASIBILITY REPORT6 Feasibility Report MEMO TO: Manager FROM: DATE: SUBJECT: This memo is meant for introducing the feasibility report that aims at providing a solution to the cases and nation problems about the cybercrime and the potential proposed solution to curb up the challenge. These feasibilities we are identified by studying various critical factors such as the social effects, legal issues, technical problems, and the economic impact. Therefore, this memo is very vital for an individual to read and understand various aspects.
  • 2. Feasibility Report It takes much time in planning and preparing to implement a solution to the major problem in society. During the planning and preparation process, the proposed solution should be tested and determined if it is feasible to provide the solution or not. Cybercrime in united states has been a significant problem and need to be addressed and solution provided to reduce the cybercrime. One of the proposed solutions to this major problem is providing cybersecurity among very individual. This will enable most of the people to understand and know the importance of cybersecurity and thus leading to the reduction of the negative loses that is caused by the cybercrime in society every year. Another thing that will ensure that the individuals in the nation are protected from the impact of the cybercrime is educating them on ways they can protect themselves over the cybercrime attempts. This report will majorly focus on looking at the proposed solution provided and determine if the answers are feasible or need some changes. The essential aspects that the story will focus on include the social impact, the economic effect, and other elements which will be determined if it can provide a solution to the problem. The Social Impact When looking for a potential solution to be implemented to solve a specific major problem in society, a positive impact is always the main objective. When the proposed solution is applied, such as implementing cybersecurity in the daily lives
  • 3. of the individuals in the society it will bring a lot of positive impacts on them. For instance, when the cybersecurity is made the main focus in the in every place, i.e. schools and workplace, majority of the individuals will be aware of these threats and ways of preventing them from affecting their daily lives. This will also reduce the loss that most of the individuals incur due to the cybercrime and lack of security in their day-to-day business operations (Help Net Security, 2015). When the cybersecurity is introduced in society It will bring much social impact to the life of the individuals since it will educate people about the dynamic changes that occur in uses of the technology. When this provides a solution to the cybercrime problem in the society, it will be adopted by every nation, and thus the cybercrime problem is reduced and making every country secure and safe from the cybercrime problems. Economic Effect. One of the most critical aspects of coming up with the proposed solution is the economic feasibility impact. The projected resolution calls for basically a change in lifestyle in the United States. The cybersecurity needs to be the main part of the individuals that will make them safe and preventing the occurrence of cybercrime. The cybersecurity has to be implemented in the workplace and various institutions to achieve the required objectives of solving the issue of cybercrime in society. The process of implementation has a great financial cost, but the results brought by the proposed solution will bring much economical cost since it will reduce the amount that could have been used to solve the loss and cases caused by the cybercrime in the society. When the financial loss incurred due to the cybercrime is compared to the cost of implementing the solution, there is a significant difference since the proposed solution implementation saves much money. Technical and Legal Issues
  • 4. For every proposed solution, becoming successful in solving the intended problem, there are several legal and professional issues to be followed during the process of implementation. To implement cybersecurity in the workplaces and the institutions, some legal issues have to be developed for it to be successful. Also, during the process of implementation of the cybersecurity, the technical aspects have to be looked at. The technical issues involve various aspects such as unforeseen failure of the system in providing the solution for the problem. The technical issues will also identify the bugs that will prevent the proposed solution from providing the solution to the major problem. The proposed solutions seem to be free from the technical and legal issues, and thus it may provide the required solution to the major problem of cybercrime in the United States. Conclusion Generally, the proposed solution to the major problem of Cybercrime in the United States is more feasible. The problem in achieving the solution is the lack of financial support during the process of implementation of the proposed solution. If the proposed solution gets financial support, it requires, and it will be easy to implement it and bring the required resolution. However, considering all other criteria measured to determine the feasibility of the proposed solution, I found that implementing the solution either caused little to no impact or had a positive effect, such as the case with Social implications. From the above observation, if there will be no financial distress during the implementation process, the proposed solution will be successful in solving the major problem of cybersecurity. References Statistica Research Department. (Published August 9, 2019). Spending on Cybersecurity in the United States from 2010 to 2018. Statistica.
  • 5. Retrieved from https://www.statista.com/statistics/615450/cybersecurity- spending-in-the-us/ Clement, J. (Published July 9, 2019). Amount of monetary damage caused by reported cybercrime to the IC3 from 2001 to 2018. Statistica. Retrieved from https://www.statista.com/statistics/267132/total- damage-caused-by-by-cyber-crime-in-the-us/ Bada, M. & Nurse, J. (Accessed February 2020). The Social and Psychological Impact of Cyber-Attacks. Emerging Cyber Threats and Cognitive Vulnerabilities. Retrieved from https://arxiv.org/ftp/arxiv/papers/1909/1909.13256.pdf Help Net Security. (Published February 26, 2015). The business and social impacts of cybersecurity issues. Retrieved from https://www.helpnetsecurity.com/2015/02/26/the-business-and- social-impacts-of-cyber-security-issues/ Proposal The purpose of the proposal is to present a solution to the problem you identified early in our course. Building off of our previous assignments, especially the feasibility report, the proposal offers a solution to an identified problem, and attempts to persuade readers to accept a particular course of action. REQUIRED ELEMENTS: · Memo cover page · Title page · Table of contents · List of figures · Executive summary (single-spaced) · Introduction with purpose statement (answer the questions on p. 431 thoroughly in the introduction) · Discussion section: Problem,
  • 6. Solution , Context (answer the questions on p. 432 thoroughly in the discussion) · Organize the report by subheadings relevant to the proposal · Conclusion that ends memorably and reiterates main points · APA references page RESEARCH: A minimum of five (5) credible sources are required REQUIRED STANDARDS: · 6-8 pages (does not include memo, title page, table of contents, list of figures, or references page) · Double-spaced (although proposals are sometimes single- spaced, this course will utilize double-spacing for the sake of consistency) · Times New Roman, 12 pt. font · 1 inch margins · Page numbers · In-text citations and references page in APA format · A minimum of two (2) visual aids (at least one (1) table, graph, flow chart, timeline, or illustration created by student, and one (1) that can be inserted from a source with appropriate