SlideShare a Scribd company logo
1 of 8
Jacob Work:
Labor intensive and capital-intensive techniques are widely
used by many of the organisation based on the need of their
requirements of labor, capital and size of the company etc. In
labor intensive technique a greater number of labor are involved
and less amount of capital is invested. On the other side of
capital investment wherein high capital is used and a smaller
number of labor forces are required. In capital intensive case
more capital is required as majority of the work is digitalis ed
and automated which will replace labor and is practiced in
railways, airline etc. whereas labor intensive technique is used
by agriculture, mining and food chain sectors etc. Network
effect is a situation where with the increase in customers
capability to purchase a product or service will result in
increased price of the product or services. Network effect is the
factor which will largely favour innovation and will allow the
business to make new products and services and can work on
competing other business. Network effect help the business
retain customers and achieve operational excellence(Holmes &
France., 2002).
Aerospace manufacturing is a complex and intricate process
which demand skilled workers with good experience to deal
with complex parts and also aerospace manufacturing has low
production volumes. Now-a-days aerospace industry has shifted
to automation majorly and are using digitalised equipment in
manufacturing their parts and in assembling their counterparts
and product. Boeing Dreamline 787 is one of the key projects of
Boeing and is fuel efficient and light weight than any other
commercial airliners. Boeing Dreamliner made a good network
effect for Boeing’s new product Dreamliner 787. Boeing built
new facilities for making Dreamliner 787 which is more of
automated services with less labor work while dealing with
sensitive and intricate parts. So, Boeing is more of capital -
intensive technique for producing Dreamliner 787(Elahiet al.,
2014).
References:
Heese, J., Srinivasan, S., Lane, D., & Barnett, J. (2017).
Accounting Turbulence at Boeing.
Holmes, S., & France, M. (2002). Boeing’s secret,
BusinessWeek, accessed 25 September 2019.
Elahi, E., Sheikhzadeh, M., & Lamba, N. (2014). An integrated
outsourcing framework: Analysing Boeing's outsourcing
program for Dreamliner (B787). Knowledge and Process
Management, 21(1), 13-28.
Csereklyei, Z., & Stern, D. I. (2018). Flying more efficiently:
joint impacts of fuel prices, capital costs and fleet size on
airline fleet fuel economy (No. 1810). Centre for Climate
Economics & Policy, Crawford School of Public Policy, The
Australian National University.
Dushyanth Work:
Production Economics
McGuigan, Moyer, & Harris (2017) introduced the concept of
production function. The function illustrates the combination of
inputs yielding a given level of output. The producers require
raw materials and labor to produce their commodities. They can
consume both fixed and variable types of input (McGuigan et
al., 2017). In the case of fixed inputs, the cost of input does not
depend on the units produced.
Chui’s (2018) video shows that Boeing company uses
both labor and capital in its operations. For instance, it imports
the Dreamlifter OPS’s materials from different regions. The
regions include South Carolina, North Charleston, Japan, and
Italy. This shows the application of capital. The assembly of the
aircraft occurs in eight regions. Thus, there are supervisors and
controllers to ensure efficiency in each stage. The employees
form part of labor required in the firm (Chui, 2018). They also
assist in wiring the aircraft, where the company requires many
employees if the aircraft has to be completed fast.
The management also require capital, in the form of
machinery to transport the aircraft parts from one assembly
point to the other. The machinery also undertakes some
automated tasks like joinery and painting (Chui, 2018).
Therefore, the company is labor and capital intensive.
Production efficiency relies on the joint efforts of machines and
humans (Chui, 2018). The management cannot effectively
replace one form of input with the other.
Chui (2018) also illustrates that the management
benefits from network effects. The assembly plant has eight
positions, starting from zero to seven. The tasks undertaken in
position zero is utilized by position one up to position seven.
Therefore, the management is able to deliver value from the
initial operations (Jorgenson, 2015). Alternatively, it imports
assembled parts from different regions. The parts become more
valuable after being incorporated into the aircraft.
References
Chui, S. (2018, April 6). How a Boeing 787 Dreamliner is Built
? YouTube Video File. Retrieved on 10th February from
https://www.youtube.com/watch?v=VRfXyccWUP4
Jorgenson, E. (2015, June 22). The Power of Network Effects:
Why they make such Valuable Companies, and how to Harness
them. The Medium, np
McGuigan, J., Moyer, R., & Harris, F. (2017). Managerial
Economics
Applications, Strategies and Tactics, 14e. Cengage Learning
Jacob Work:
The main objective of least privilege concept is to allow the
users to gain access to database based on their needs and
restriction is enabled to certain set of data which is
confidential. Least privilege is a practice of restricting access
rights to specific accounts, users and computing services etc
and providing access to limited number of users to execute their
activties. With the aid of providing least privilege services, it
will ensure users will be provided with right content and there
is no wastage of data and time and can reduce the chances of
unnecessary risks or interruptions as several users work on
database and it is difficult to arrange the services without any
interruption and traffic concerns.
For instance, consider a user belonging to developing
department and one needs access to computer language code and
respective details providing them with other service access will
complex the process and result in wastage of time and
interruption to others. Restricting such access rights is referred
as principle of least privilege. The principle of least privilege
will enable limited services to users based on their need of the
work. With the aid of least privilege concept, one can reduce
the potency of risks and threats as confidential data is accessed
through limited sources and management can monitor the access
as least privilege is provided by management and will restrict
access to sensitive data. This will also compromise the attacks
from origin of the attack and restrict it from spreading it to
other systems(Hammad et al., 2019).
Based on the need of the organisations most of the privileges
are accessed and are role based or depend on the experience and
expertise. “Implementing the POLP helps contain compromise
to their area of origin, stopping them form spreading at
large” (Nate, 2018). The principle of least privilege has the
potential to make huge impact on the database security if it is
implemented successfully. The authentication and authorisation
also play a crucial role in POLP and these steps will ensure that
only authenticated users with authorisation will be allowed to
gain access and has to follow two step verification. In this
modern technological world, there are high chances of data
breaches which will negatively impact the business and there
are many such firms been the victims of data breaches and will
pose great damage to entire business. Upon considering such
aspects of data loss, it is important to maintain high level of
security and necessary measurements like PLOP will ensure
better security of data flow and failing to do so will face the
consequences(Mendoza, 2018).
The system security is enhanced with the aid of principle of
least privilege because the unknown users are not allowed to
gain access and are restricted to download and install software
applications which hold malware content and can pose great
damage to system. This POLP will restrict the users from
executing such actions and will increase the security standard.
The better regulatory and compliance and data security is
possible with principle of least privilege. It is also experienced
that with principle of least privilege a better incident response
plan is executed and change management and respective
configurations are possible(Ellen., 2020).
References:
Nate. Lord. (2018, September 12). What is the Principle of
Least Privilege (POLP)? A Best Practice for Information
Security and
Compliance. https://digitalguardian.com/blog/what-principle-
least-privilege-polp-best-practice-information-security-and-
compliance
Mendoza, M. (2018). The principle of least privilege and how it
can used in cybersecurity. Retrieved
from https://www.welivesecurity.com/2018/07/02/principle-
least-privilege-strategy/
Hammad, M., Bagheri, H., & Malek, S. (2019). DelDroid: An
automated approach for the determination and enforcement of
least-privilege architecture in android. Journal of Systems &
Software, 14(9), 83-100. DOI: 10.1016/j.jss.2018.11.049.
Ellen Neveux. (2020). 5 advantages of the principle of least
privilege. Available at: https://www.securelink.com/blog/what-
are-the-benefits-of-the-least-privileged-principle/.
Dushyanth Work:
Week 5 Discussion Principle of Least Privilege
Lord (2020) argues that, “The principle of least
privilege (POLP) is the idea that at any user, program, or
process should have only the bare minimum privileges
necessary to perform its function.” Therefore, one need not
access unauthorized data void of valid reasons. It implies that
user accounts should not be allowed to possess administr ator
privileges. Moreover, programmers have no right tampering
with an organization’s finances (Lord, 2020). The principle has
several merits to information security experts.
The POLP ensures that users have only the enough
access rights aligned with their required operations. It prevents
data attacks since hackers cannot compromise low-level user
accounts and access highly sensitive data (Lord, 2020). The
hackers will only access data in the compromised region and
fail to advance to the entire system. The author noted that,
“Edward Snowden was able to leak millions of NSA files
because he had admin privileges, though his highest-level task
was creating database backups” (Lord, 2020). The incidence
demonstrated compromise of the POLP.
The management increased security by implementing
the POLP. It ensured that 90 % of the workers could not utilize
administrator privilege (Lord, 2020). The principle also assists
in reducing the attack surface. In the case of Target breach, the
70 million Target customer data stolen resulted from breach of
the POLP. The management allowed an HVAC contractor to
upload executable which was beyond his roles (Lord, 2020).
The implementation of POLP could have reduced the threat
from the contractor.
The principle also mitigates the system from malware
propagation. “Malware that infects a system bolstered by the
principle of least privilege is often contained to the small
section where it entered first” (Lord, 2020). The malware will
be detected in its area of origin before it escalates. The
management should also rely on the POLP to comply with
different regulations (Lord, 2020). Therefore, it avoids
challenges during audits or litigation.
Organizations have different employees who have their
specific roles in data management. For instance, we have the
primary administrator and email team in an organization.
Svidergol (2019) argues that, “If the organization does not
enforce least privileges, both the primary administrator and the
email administrators might be granted administrative access to
all the company’s servers, which introduces unnecessary risk.”
The weakness allows primary administrators to compromise the
roles of their counterparts void of accountability. It should be
addressed by employing the POLP, which will limit the roles of
each employee (Svidergol, 2019). The principle also reduces
probability of accidental and deliberate damage.
Organizations can address various identity risks using
the POLP. The risk are separation of duty, dormant identities,
privilege escalation, and toxic combinations. It is evident that,
“Separation of duties (SoD) is an internal control concept
commonly applied which involves the sharing of a set of
responsibilities and privileges among multiple users with the
intention of preventing fraud and error” (Kedrosky, 2020). SoD
addresses conflict of interest and wrongful acts. It also detects
control failures in security measures. The POLP ensures that all
identities, either people or non-people, have distinct roles.
References
Kedrosky, E. (2020, July 10). Getting to and Maintaining the
Principle of Least Privilege. Sonrai Security
Lord, N. (2020, December 1). What is the Principle of Least
Privilege (POLP)? A Best Practice for Information Security and
Compliance. The Digital Guardian.
Svidergol, B. (2019, April 30). What is the Principle of Least
Access? Netwrix

More Related Content

What's hot

CMOs & CIOs: Aligning Marketing & IT to Elevate the Customer Experience
CMOs & CIOs: Aligning Marketing & IT to Elevate the Customer ExperienceCMOs & CIOs: Aligning Marketing & IT to Elevate the Customer Experience
CMOs & CIOs: Aligning Marketing & IT to Elevate the Customer ExperienceCognizant
 
A.T. Kearney: Positioning for the Telematics Tipping Point
A.T. Kearney: Positioning for the Telematics Tipping PointA.T. Kearney: Positioning for the Telematics Tipping Point
A.T. Kearney: Positioning for the Telematics Tipping PointbengillTU
 
The Impact of E-Business Adoption on a Global Marketing: A Case Study of SMEs...
The Impact of E-Business Adoption on a Global Marketing: A Case Study of SMEs...The Impact of E-Business Adoption on a Global Marketing: A Case Study of SMEs...
The Impact of E-Business Adoption on a Global Marketing: A Case Study of SMEs...inventionjournals
 
Ensuring Patient Safety & Beyond
Ensuring Patient Safety & BeyondEnsuring Patient Safety & Beyond
Ensuring Patient Safety & BeyondCognizant
 
Current State of Social Engagement Inside The Large Enterprise | Engagement @...
Current State of Social Engagement Inside The Large Enterprise | Engagement @...Current State of Social Engagement Inside The Large Enterprise | Engagement @...
Current State of Social Engagement Inside The Large Enterprise | Engagement @...Dachis Group
 
Increasing Business Productivity in Connected Enterprises and an Always-On Di...
Increasing Business Productivity in Connected Enterprises and an Always-On Di...Increasing Business Productivity in Connected Enterprises and an Always-On Di...
Increasing Business Productivity in Connected Enterprises and an Always-On Di...Cognizant
 
How Insurers Can Leverage Social and Messaging Apps to Enhance Digital Value
How Insurers Can Leverage Social and Messaging Apps to Enhance Digital ValueHow Insurers Can Leverage Social and Messaging Apps to Enhance Digital Value
How Insurers Can Leverage Social and Messaging Apps to Enhance Digital ValueCognizant
 
Privatization and Public Private Partnership (PPP)
Privatization and Public Private Partnership (PPP)Privatization and Public Private Partnership (PPP)
Privatization and Public Private Partnership (PPP)Mohd Hasim Ujang
 
Wtw insur tech-briefing-q12017
Wtw insur tech-briefing-q12017Wtw insur tech-briefing-q12017
Wtw insur tech-briefing-q12017Marco Crudo
 
The Sharing Economy: Implications for Property & Casualty Insurers
The Sharing Economy: Implications for Property & Casualty InsurersThe Sharing Economy: Implications for Property & Casualty Insurers
The Sharing Economy: Implications for Property & Casualty InsurersCognizant
 
Advanced Technology and Luxury: Behind the Latest Lexus App
Advanced Technology and Luxury: Behind the Latest Lexus AppAdvanced Technology and Luxury: Behind the Latest Lexus App
Advanced Technology and Luxury: Behind the Latest Lexus AppCognizant
 
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Cognizant
 
Green Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for SustainabilityGreen Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for SustainabilityCognizant
 
Executive Pulse 14 FINAL
Executive Pulse 14 FINALExecutive Pulse 14 FINAL
Executive Pulse 14 FINALTom Jones
 
Staffing Industry CoVenture Industry Deck
Staffing Industry CoVenture Industry DeckStaffing Industry CoVenture Industry Deck
Staffing Industry CoVenture Industry DeckAli Hamed
 
Finding Intranet ROI (Whitepaper)
Finding Intranet ROI (Whitepaper)Finding Intranet ROI (Whitepaper)
Finding Intranet ROI (Whitepaper)Elizabeth Lupfer
 

What's hot (18)

CMOs & CIOs: Aligning Marketing & IT to Elevate the Customer Experience
CMOs & CIOs: Aligning Marketing & IT to Elevate the Customer ExperienceCMOs & CIOs: Aligning Marketing & IT to Elevate the Customer Experience
CMOs & CIOs: Aligning Marketing & IT to Elevate the Customer Experience
 
A.T. Kearney: Positioning for the Telematics Tipping Point
A.T. Kearney: Positioning for the Telematics Tipping PointA.T. Kearney: Positioning for the Telematics Tipping Point
A.T. Kearney: Positioning for the Telematics Tipping Point
 
The Impact of E-Business Adoption on a Global Marketing: A Case Study of SMEs...
The Impact of E-Business Adoption on a Global Marketing: A Case Study of SMEs...The Impact of E-Business Adoption on a Global Marketing: A Case Study of SMEs...
The Impact of E-Business Adoption on a Global Marketing: A Case Study of SMEs...
 
Ensuring Patient Safety & Beyond
Ensuring Patient Safety & BeyondEnsuring Patient Safety & Beyond
Ensuring Patient Safety & Beyond
 
Iim b papers
Iim  b papersIim  b papers
Iim b papers
 
Current State of Social Engagement Inside The Large Enterprise | Engagement @...
Current State of Social Engagement Inside The Large Enterprise | Engagement @...Current State of Social Engagement Inside The Large Enterprise | Engagement @...
Current State of Social Engagement Inside The Large Enterprise | Engagement @...
 
Increasing Business Productivity in Connected Enterprises and an Always-On Di...
Increasing Business Productivity in Connected Enterprises and an Always-On Di...Increasing Business Productivity in Connected Enterprises and an Always-On Di...
Increasing Business Productivity in Connected Enterprises and an Always-On Di...
 
How Insurers Can Leverage Social and Messaging Apps to Enhance Digital Value
How Insurers Can Leverage Social and Messaging Apps to Enhance Digital ValueHow Insurers Can Leverage Social and Messaging Apps to Enhance Digital Value
How Insurers Can Leverage Social and Messaging Apps to Enhance Digital Value
 
Privatization and Public Private Partnership (PPP)
Privatization and Public Private Partnership (PPP)Privatization and Public Private Partnership (PPP)
Privatization and Public Private Partnership (PPP)
 
Wtw insur tech-briefing-q12017
Wtw insur tech-briefing-q12017Wtw insur tech-briefing-q12017
Wtw insur tech-briefing-q12017
 
The Sharing Economy: Implications for Property & Casualty Insurers
The Sharing Economy: Implications for Property & Casualty InsurersThe Sharing Economy: Implications for Property & Casualty Insurers
The Sharing Economy: Implications for Property & Casualty Insurers
 
Advanced Technology and Luxury: Behind the Latest Lexus App
Advanced Technology and Luxury: Behind the Latest Lexus AppAdvanced Technology and Luxury: Behind the Latest Lexus App
Advanced Technology and Luxury: Behind the Latest Lexus App
 
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
Profitability in the Direct-to-Consumer Marketplace: A Playbook for Media and...
 
Green Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for SustainabilityGreen Rush: The Economic Imperative for Sustainability
Green Rush: The Economic Imperative for Sustainability
 
Executive Pulse 14 FINAL
Executive Pulse 14 FINALExecutive Pulse 14 FINAL
Executive Pulse 14 FINAL
 
Ppt.
Ppt.Ppt.
Ppt.
 
Staffing Industry CoVenture Industry Deck
Staffing Industry CoVenture Industry DeckStaffing Industry CoVenture Industry Deck
Staffing Industry CoVenture Industry Deck
 
Finding Intranet ROI (Whitepaper)
Finding Intranet ROI (Whitepaper)Finding Intranet ROI (Whitepaper)
Finding Intranet ROI (Whitepaper)
 

Similar to Jacob work labor intensive and capital intensive techniques are

Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...CBOD ANR project U-PSUD
 
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and NeuroscieBRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and NeuroscieVannaSchrader3
 
1Running Head MODULE 7 SUBMISSION6 MODULE 7 SUBMISSION.docx
1Running Head MODULE 7 SUBMISSION6 MODULE 7 SUBMISSION.docx1Running Head MODULE 7 SUBMISSION6 MODULE 7 SUBMISSION.docx
1Running Head MODULE 7 SUBMISSION6 MODULE 7 SUBMISSION.docxdrennanmicah
 
Cloud computing and SME
Cloud computing and SMECloud computing and SME
Cloud computing and SMEDhayis A.abdul
 
Cloud Computing Applications and Benefits for Small Businesses .docx
Cloud Computing Applications and Benefits for Small Businesses   .docxCloud Computing Applications and Benefits for Small Businesses   .docx
Cloud Computing Applications and Benefits for Small Businesses .docxclarebernice
 
Estimating total cost of ownership
Estimating total cost of ownershipEstimating total cost of ownership
Estimating total cost of ownershipNaman Verma
 
Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeDataCore Software
 
Cloud Computing Role in Information technology
Cloud Computing  Role in Information technologyCloud Computing  Role in Information technology
Cloud Computing Role in Information technologyKHakash
 
Masters thesis -_cloud_computing_-_rehan_saleem
Masters thesis -_cloud_computing_-_rehan_saleemMasters thesis -_cloud_computing_-_rehan_saleem
Masters thesis -_cloud_computing_-_rehan_saleemMohammed Hesham
 
Research Report on Finding The Impacts of Cloud Computing on Marketing World
Research Report on Finding The Impacts of Cloud Computing on Marketing WorldResearch Report on Finding The Impacts of Cloud Computing on Marketing World
Research Report on Finding The Impacts of Cloud Computing on Marketing WorldInstant Assignment Help UAE
 
Cloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO'sCloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO'sThe Kalgidar Society - Baru Sahib
 
Disaster recovery with cloud computing
Disaster recovery with cloud computingDisaster recovery with cloud computing
Disaster recovery with cloud computingIsrael Roy Sambu
 
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...csandit
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Jim Mason
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...IBM India Smarter Computing
 
ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...
ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...
ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...Amos Wachanga
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxjeanettehully
 

Similar to Jacob work labor intensive and capital intensive techniques are (20)

Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
Adel Ben Youssef: Determinants of the adoption of cloud computing by tunisian...
 
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and NeuroscieBRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
 
1Running Head MODULE 7 SUBMISSION6 MODULE 7 SUBMISSION.docx
1Running Head MODULE 7 SUBMISSION6 MODULE 7 SUBMISSION.docx1Running Head MODULE 7 SUBMISSION6 MODULE 7 SUBMISSION.docx
1Running Head MODULE 7 SUBMISSION6 MODULE 7 SUBMISSION.docx
 
Cloud computing and SME
Cloud computing and SMECloud computing and SME
Cloud computing and SME
 
Cloud Computing Applications and Benefits for Small Businesses .docx
Cloud Computing Applications and Benefits for Small Businesses   .docxCloud Computing Applications and Benefits for Small Businesses   .docx
Cloud Computing Applications and Benefits for Small Businesses .docx
 
Estimating total cost of ownership
Estimating total cost of ownershipEstimating total cost of ownership
Estimating total cost of ownership
 
Insider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection ImperativeInsider's Guide- The Data Protection Imperative
Insider's Guide- The Data Protection Imperative
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing Role in Information technology
Cloud Computing  Role in Information technologyCloud Computing  Role in Information technology
Cloud Computing Role in Information technology
 
Masters thesis -_cloud_computing_-_rehan_saleem
Masters thesis -_cloud_computing_-_rehan_saleemMasters thesis -_cloud_computing_-_rehan_saleem
Masters thesis -_cloud_computing_-_rehan_saleem
 
Research Report on Finding The Impacts of Cloud Computing on Marketing World
Research Report on Finding The Impacts of Cloud Computing on Marketing WorldResearch Report on Finding The Impacts of Cloud Computing on Marketing World
Research Report on Finding The Impacts of Cloud Computing on Marketing World
 
C037013015
C037013015C037013015
C037013015
 
Cloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO'sCloud Computing- future framework for e- management of NGO's
Cloud Computing- future framework for e- management of NGO's
 
MTW03011USEN.PDF
MTW03011USEN.PDFMTW03011USEN.PDF
MTW03011USEN.PDF
 
Disaster recovery with cloud computing
Disaster recovery with cloud computingDisaster recovery with cloud computing
Disaster recovery with cloud computing
 
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
MEASURING TECHNOLOGICAL, ORGANIZATIONAL AND ENVIRONMENTAL FACTORS INFLUENCING...
 
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
Global_Technology_Services - Technical_Support_Services_White_Paper_External_...
 
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
A Special Report on Infrastructure Futures: Keeping Pace in the Era of Big Da...
 
ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...
ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...
ADOPTION OF CLOUD-BASED SERVICES BY SMEs IN DEVELOPING COUNTRIES: DEVELOPMENT...
 
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docxRunning head INFORMATION SECURITY1INFORMATION SECURITY6.docx
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
 

More from RIYAN43

Major project christy corporation the christy corporation had th
Major project  christy corporation the christy corporation had thMajor project  christy corporation the christy corporation had th
Major project christy corporation the christy corporation had thRIYAN43
 
Maa250 assignment 2 ethics and financial services trimester
Maa250 assignment 2 ethics and financial services trimester Maa250 assignment 2 ethics and financial services trimester
Maa250 assignment 2 ethics and financial services trimester RIYAN43
 
M7.2 discussion better together gecc2020 unread replies.202
M7.2 discussion better together gecc2020 unread replies.202M7.2 discussion better together gecc2020 unread replies.202
M7.2 discussion better together gecc2020 unread replies.202RIYAN43
 
Literature evaluation table student name summary of clinic
Literature evaluation table student name summary of clinicLiterature evaluation table student name summary of clinic
Literature evaluation table student name summary of clinicRIYAN43
 
Literacy toolkit 2 reading and writing part 1 reading an
Literacy toolkit 2 reading and writing part 1 reading anLiteracy toolkit 2 reading and writing part 1 reading an
Literacy toolkit 2 reading and writing part 1 reading anRIYAN43
 
List of articles that were used in past papers that cannot be used
List of articles that were used in past papers that cannot be usedList of articles that were used in past papers that cannot be used
List of articles that were used in past papers that cannot be usedRIYAN43
 
Liking is for cowards. go for what hurts.by jonathan franzen may 2
Liking is for cowards. go for what hurts.by jonathan franzen may 2Liking is for cowards. go for what hurts.by jonathan franzen may 2
Liking is for cowards. go for what hurts.by jonathan franzen may 2RIYAN43
 
Let’s challenge your understanding of computer network requireme
Let’s challenge your understanding of computer network requiremeLet’s challenge your understanding of computer network requireme
Let’s challenge your understanding of computer network requiremeRIYAN43
 
Legislating components of a humane city the economic i
Legislating components of a humane city  the economic iLegislating components of a humane city  the economic i
Legislating components of a humane city the economic iRIYAN43
 
Length format 3 or more typed pages 12 point font doub
Length format 3 or more typed pages 12 point font doubLength format 3 or more typed pages 12 point font doub
Length format 3 or more typed pages 12 point font doubRIYAN43
 
Lego case study tying in from economic freedom and titan
Lego case study tying in from economic freedom and titanLego case study tying in from economic freedom and titan
Lego case study tying in from economic freedom and titanRIYAN43
 
Learning resources required readingsthyer, b. a. (2013).
Learning resources required readingsthyer, b. a. (2013). Learning resources required readingsthyer, b. a. (2013).
Learning resources required readingsthyer, b. a. (2013). RIYAN43
 
Learning resources required readingsdudley, j. r. (2020).
Learning resources required readingsdudley, j. r. (2020).Learning resources required readingsdudley, j. r. (2020).
Learning resources required readingsdudley, j. r. (2020).RIYAN43
 
Learning outcomes after completing this part of the project, stud
Learning outcomes after completing this part of the project, studLearning outcomes after completing this part of the project, stud
Learning outcomes after completing this part of the project, studRIYAN43
 
Leadership research findings, practice, and skillseig
Leadership research findings, practice, and skillseigLeadership research findings, practice, and skillseig
Leadership research findings, practice, and skillseigRIYAN43
 
Leadership strategies for hr assignment 2 type your name here
Leadership strategies for hr assignment 2 type your name hereLeadership strategies for hr assignment 2 type your name here
Leadership strategies for hr assignment 2 type your name hereRIYAN43
 
Labor history, vol. 44, no. 3, 2003 sentinels for new south
Labor history, vol. 44, no. 3, 2003 sentinels for new southLabor history, vol. 44, no. 3, 2003 sentinels for new south
Labor history, vol. 44, no. 3, 2003 sentinels for new southRIYAN43
 
Lab 7 the sun, earth and zodiac part i precession and the
Lab 7 the sun, earth and zodiac part i precession and theLab 7 the sun, earth and zodiac part i precession and the
Lab 7 the sun, earth and zodiac part i precession and theRIYAN43
 
Lab 6 tracking the night sky ii part i a coordinate syste
Lab 6 tracking the night sky ii part i a coordinate systeLab 6 tracking the night sky ii part i a coordinate syste
Lab 6 tracking the night sky ii part i a coordinate systeRIYAN43
 
Lab 5 electron configuration chem101l student name click here to
Lab 5 electron configuration chem101l student name click here toLab 5 electron configuration chem101l student name click here to
Lab 5 electron configuration chem101l student name click here toRIYAN43
 

More from RIYAN43 (20)

Major project christy corporation the christy corporation had th
Major project  christy corporation the christy corporation had thMajor project  christy corporation the christy corporation had th
Major project christy corporation the christy corporation had th
 
Maa250 assignment 2 ethics and financial services trimester
Maa250 assignment 2 ethics and financial services trimester Maa250 assignment 2 ethics and financial services trimester
Maa250 assignment 2 ethics and financial services trimester
 
M7.2 discussion better together gecc2020 unread replies.202
M7.2 discussion better together gecc2020 unread replies.202M7.2 discussion better together gecc2020 unread replies.202
M7.2 discussion better together gecc2020 unread replies.202
 
Literature evaluation table student name summary of clinic
Literature evaluation table student name summary of clinicLiterature evaluation table student name summary of clinic
Literature evaluation table student name summary of clinic
 
Literacy toolkit 2 reading and writing part 1 reading an
Literacy toolkit 2 reading and writing part 1 reading anLiteracy toolkit 2 reading and writing part 1 reading an
Literacy toolkit 2 reading and writing part 1 reading an
 
List of articles that were used in past papers that cannot be used
List of articles that were used in past papers that cannot be usedList of articles that were used in past papers that cannot be used
List of articles that were used in past papers that cannot be used
 
Liking is for cowards. go for what hurts.by jonathan franzen may 2
Liking is for cowards. go for what hurts.by jonathan franzen may 2Liking is for cowards. go for what hurts.by jonathan franzen may 2
Liking is for cowards. go for what hurts.by jonathan franzen may 2
 
Let’s challenge your understanding of computer network requireme
Let’s challenge your understanding of computer network requiremeLet’s challenge your understanding of computer network requireme
Let’s challenge your understanding of computer network requireme
 
Legislating components of a humane city the economic i
Legislating components of a humane city  the economic iLegislating components of a humane city  the economic i
Legislating components of a humane city the economic i
 
Length format 3 or more typed pages 12 point font doub
Length format 3 or more typed pages 12 point font doubLength format 3 or more typed pages 12 point font doub
Length format 3 or more typed pages 12 point font doub
 
Lego case study tying in from economic freedom and titan
Lego case study tying in from economic freedom and titanLego case study tying in from economic freedom and titan
Lego case study tying in from economic freedom and titan
 
Learning resources required readingsthyer, b. a. (2013).
Learning resources required readingsthyer, b. a. (2013). Learning resources required readingsthyer, b. a. (2013).
Learning resources required readingsthyer, b. a. (2013).
 
Learning resources required readingsdudley, j. r. (2020).
Learning resources required readingsdudley, j. r. (2020).Learning resources required readingsdudley, j. r. (2020).
Learning resources required readingsdudley, j. r. (2020).
 
Learning outcomes after completing this part of the project, stud
Learning outcomes after completing this part of the project, studLearning outcomes after completing this part of the project, stud
Learning outcomes after completing this part of the project, stud
 
Leadership research findings, practice, and skillseig
Leadership research findings, practice, and skillseigLeadership research findings, practice, and skillseig
Leadership research findings, practice, and skillseig
 
Leadership strategies for hr assignment 2 type your name here
Leadership strategies for hr assignment 2 type your name hereLeadership strategies for hr assignment 2 type your name here
Leadership strategies for hr assignment 2 type your name here
 
Labor history, vol. 44, no. 3, 2003 sentinels for new south
Labor history, vol. 44, no. 3, 2003 sentinels for new southLabor history, vol. 44, no. 3, 2003 sentinels for new south
Labor history, vol. 44, no. 3, 2003 sentinels for new south
 
Lab 7 the sun, earth and zodiac part i precession and the
Lab 7 the sun, earth and zodiac part i precession and theLab 7 the sun, earth and zodiac part i precession and the
Lab 7 the sun, earth and zodiac part i precession and the
 
Lab 6 tracking the night sky ii part i a coordinate syste
Lab 6 tracking the night sky ii part i a coordinate systeLab 6 tracking the night sky ii part i a coordinate syste
Lab 6 tracking the night sky ii part i a coordinate syste
 
Lab 5 electron configuration chem101l student name click here to
Lab 5 electron configuration chem101l student name click here toLab 5 electron configuration chem101l student name click here to
Lab 5 electron configuration chem101l student name click here to
 

Recently uploaded

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 

Jacob work labor intensive and capital intensive techniques are

  • 1. Jacob Work: Labor intensive and capital-intensive techniques are widely used by many of the organisation based on the need of their requirements of labor, capital and size of the company etc. In labor intensive technique a greater number of labor are involved and less amount of capital is invested. On the other side of capital investment wherein high capital is used and a smaller number of labor forces are required. In capital intensive case more capital is required as majority of the work is digitalis ed and automated which will replace labor and is practiced in railways, airline etc. whereas labor intensive technique is used by agriculture, mining and food chain sectors etc. Network effect is a situation where with the increase in customers capability to purchase a product or service will result in increased price of the product or services. Network effect is the factor which will largely favour innovation and will allow the business to make new products and services and can work on competing other business. Network effect help the business retain customers and achieve operational excellence(Holmes & France., 2002). Aerospace manufacturing is a complex and intricate process which demand skilled workers with good experience to deal with complex parts and also aerospace manufacturing has low production volumes. Now-a-days aerospace industry has shifted to automation majorly and are using digitalised equipment in manufacturing their parts and in assembling their counterparts and product. Boeing Dreamline 787 is one of the key projects of Boeing and is fuel efficient and light weight than any other commercial airliners. Boeing Dreamliner made a good network effect for Boeing’s new product Dreamliner 787. Boeing built new facilities for making Dreamliner 787 which is more of automated services with less labor work while dealing with sensitive and intricate parts. So, Boeing is more of capital - intensive technique for producing Dreamliner 787(Elahiet al.,
  • 2. 2014). References: Heese, J., Srinivasan, S., Lane, D., & Barnett, J. (2017). Accounting Turbulence at Boeing. Holmes, S., & France, M. (2002). Boeing’s secret, BusinessWeek, accessed 25 September 2019. Elahi, E., Sheikhzadeh, M., & Lamba, N. (2014). An integrated outsourcing framework: Analysing Boeing's outsourcing program for Dreamliner (B787). Knowledge and Process Management, 21(1), 13-28. Csereklyei, Z., & Stern, D. I. (2018). Flying more efficiently: joint impacts of fuel prices, capital costs and fleet size on airline fleet fuel economy (No. 1810). Centre for Climate Economics & Policy, Crawford School of Public Policy, The Australian National University. Dushyanth Work: Production Economics McGuigan, Moyer, & Harris (2017) introduced the concept of production function. The function illustrates the combination of inputs yielding a given level of output. The producers require raw materials and labor to produce their commodities. They can consume both fixed and variable types of input (McGuigan et al., 2017). In the case of fixed inputs, the cost of input does not depend on the units produced. Chui’s (2018) video shows that Boeing company uses both labor and capital in its operations. For instance, it imports the Dreamlifter OPS’s materials from different regions. The regions include South Carolina, North Charleston, Japan, and Italy. This shows the application of capital. The assembly of the aircraft occurs in eight regions. Thus, there are supervisors and controllers to ensure efficiency in each stage. The employees form part of labor required in the firm (Chui, 2018). They also assist in wiring the aircraft, where the company requires many
  • 3. employees if the aircraft has to be completed fast. The management also require capital, in the form of machinery to transport the aircraft parts from one assembly point to the other. The machinery also undertakes some automated tasks like joinery and painting (Chui, 2018). Therefore, the company is labor and capital intensive. Production efficiency relies on the joint efforts of machines and humans (Chui, 2018). The management cannot effectively replace one form of input with the other. Chui (2018) also illustrates that the management benefits from network effects. The assembly plant has eight positions, starting from zero to seven. The tasks undertaken in position zero is utilized by position one up to position seven. Therefore, the management is able to deliver value from the initial operations (Jorgenson, 2015). Alternatively, it imports assembled parts from different regions. The parts become more valuable after being incorporated into the aircraft. References Chui, S. (2018, April 6). How a Boeing 787 Dreamliner is Built ? YouTube Video File. Retrieved on 10th February from https://www.youtube.com/watch?v=VRfXyccWUP4 Jorgenson, E. (2015, June 22). The Power of Network Effects: Why they make such Valuable Companies, and how to Harness them. The Medium, np McGuigan, J., Moyer, R., & Harris, F. (2017). Managerial Economics Applications, Strategies and Tactics, 14e. Cengage Learning Jacob Work: The main objective of least privilege concept is to allow the users to gain access to database based on their needs and restriction is enabled to certain set of data which is confidential. Least privilege is a practice of restricting access rights to specific accounts, users and computing services etc and providing access to limited number of users to execute their
  • 4. activties. With the aid of providing least privilege services, it will ensure users will be provided with right content and there is no wastage of data and time and can reduce the chances of unnecessary risks or interruptions as several users work on database and it is difficult to arrange the services without any interruption and traffic concerns. For instance, consider a user belonging to developing department and one needs access to computer language code and respective details providing them with other service access will complex the process and result in wastage of time and interruption to others. Restricting such access rights is referred as principle of least privilege. The principle of least privilege will enable limited services to users based on their need of the work. With the aid of least privilege concept, one can reduce the potency of risks and threats as confidential data is accessed through limited sources and management can monitor the access as least privilege is provided by management and will restrict access to sensitive data. This will also compromise the attacks from origin of the attack and restrict it from spreading it to other systems(Hammad et al., 2019). Based on the need of the organisations most of the privileges are accessed and are role based or depend on the experience and expertise. “Implementing the POLP helps contain compromise to their area of origin, stopping them form spreading at large” (Nate, 2018). The principle of least privilege has the potential to make huge impact on the database security if it is implemented successfully. The authentication and authorisation also play a crucial role in POLP and these steps will ensure that only authenticated users with authorisation will be allowed to gain access and has to follow two step verification. In this modern technological world, there are high chances of data breaches which will negatively impact the business and there are many such firms been the victims of data breaches and will pose great damage to entire business. Upon considering such aspects of data loss, it is important to maintain high level of security and necessary measurements like PLOP will ensure
  • 5. better security of data flow and failing to do so will face the consequences(Mendoza, 2018). The system security is enhanced with the aid of principle of least privilege because the unknown users are not allowed to gain access and are restricted to download and install software applications which hold malware content and can pose great damage to system. This POLP will restrict the users from executing such actions and will increase the security standard. The better regulatory and compliance and data security is possible with principle of least privilege. It is also experienced that with principle of least privilege a better incident response plan is executed and change management and respective configurations are possible(Ellen., 2020). References: Nate. Lord. (2018, September 12). What is the Principle of Least Privilege (POLP)? A Best Practice for Information Security and Compliance. https://digitalguardian.com/blog/what-principle- least-privilege-polp-best-practice-information-security-and- compliance Mendoza, M. (2018). The principle of least privilege and how it can used in cybersecurity. Retrieved from https://www.welivesecurity.com/2018/07/02/principle- least-privilege-strategy/ Hammad, M., Bagheri, H., & Malek, S. (2019). DelDroid: An automated approach for the determination and enforcement of least-privilege architecture in android. Journal of Systems & Software, 14(9), 83-100. DOI: 10.1016/j.jss.2018.11.049. Ellen Neveux. (2020). 5 advantages of the principle of least privilege. Available at: https://www.securelink.com/blog/what- are-the-benefits-of-the-least-privileged-principle/.
  • 6. Dushyanth Work: Week 5 Discussion Principle of Least Privilege Lord (2020) argues that, “The principle of least privilege (POLP) is the idea that at any user, program, or process should have only the bare minimum privileges necessary to perform its function.” Therefore, one need not access unauthorized data void of valid reasons. It implies that user accounts should not be allowed to possess administr ator privileges. Moreover, programmers have no right tampering with an organization’s finances (Lord, 2020). The principle has several merits to information security experts. The POLP ensures that users have only the enough access rights aligned with their required operations. It prevents data attacks since hackers cannot compromise low-level user accounts and access highly sensitive data (Lord, 2020). The hackers will only access data in the compromised region and fail to advance to the entire system. The author noted that, “Edward Snowden was able to leak millions of NSA files because he had admin privileges, though his highest-level task was creating database backups” (Lord, 2020). The incidence demonstrated compromise of the POLP. The management increased security by implementing the POLP. It ensured that 90 % of the workers could not utilize administrator privilege (Lord, 2020). The principle also assists in reducing the attack surface. In the case of Target breach, the 70 million Target customer data stolen resulted from breach of the POLP. The management allowed an HVAC contractor to upload executable which was beyond his roles (Lord, 2020).
  • 7. The implementation of POLP could have reduced the threat from the contractor. The principle also mitigates the system from malware propagation. “Malware that infects a system bolstered by the principle of least privilege is often contained to the small section where it entered first” (Lord, 2020). The malware will be detected in its area of origin before it escalates. The management should also rely on the POLP to comply with different regulations (Lord, 2020). Therefore, it avoids challenges during audits or litigation. Organizations have different employees who have their specific roles in data management. For instance, we have the primary administrator and email team in an organization. Svidergol (2019) argues that, “If the organization does not enforce least privileges, both the primary administrator and the email administrators might be granted administrative access to all the company’s servers, which introduces unnecessary risk.” The weakness allows primary administrators to compromise the roles of their counterparts void of accountability. It should be addressed by employing the POLP, which will limit the roles of each employee (Svidergol, 2019). The principle also reduces probability of accidental and deliberate damage. Organizations can address various identity risks using the POLP. The risk are separation of duty, dormant identities, privilege escalation, and toxic combinations. It is evident that, “Separation of duties (SoD) is an internal control concept commonly applied which involves the sharing of a set of responsibilities and privileges among multiple users with the intention of preventing fraud and error” (Kedrosky, 2020). SoD addresses conflict of interest and wrongful acts. It also detects control failures in security measures. The POLP ensures that all identities, either people or non-people, have distinct roles. References Kedrosky, E. (2020, July 10). Getting to and Maintaining the Principle of Least Privilege. Sonrai Security Lord, N. (2020, December 1). What is the Principle of Least
  • 8. Privilege (POLP)? A Best Practice for Information Security and Compliance. The Digital Guardian. Svidergol, B. (2019, April 30). What is the Principle of Least Access? Netwrix