Thursday, February 13, 2020
Asian Management - Management in India Essay Example | Topics and Well Written Essays - 1500 words
Asian Management - Management in India - Essay Example Indian economy during 1950 to 1980 was highly dominated by the agriculture sector and the five year plan. Some of the acts which were introduced during this period were Industrial Policy Resolution 1956 also called as the unleashing of ââ¬Ëlicense rajââ¬â¢, Monopolies and Restrictive Trade Practices Act (MRTP) and Import substitution. (PBS, 2004) Bureaucratic control of private sector through licenses, permits, taxes and tariff infuriated quality global competitiveness and managerial imagination. This high level restriction, poor quality of infrastructure along with high level of corruption caused to migration of entrepreneurs from India. Family conglomeration was seen in the Indian corporate sector led by names like Birla, Reliance, Tata, Bajaj, Mahindra, Godrej and Thapar. Rajiv Gandhi emphasizes economic liberalization and pushes for development of the technology sector. The government introduces economic reforms, including reduced quantitative restrictions on imports, decreased subsidies, fewer licensing requirements, the sale of shares in select public enterprises, and tax reforms.(Source: Veen R.V., 2006) During this period of liberalization comprehensive changes were seen in the mindset of corporate leaders. India became the host for the global firms which brought world class management in the country. Indian education system improved and India produced half a million of engineers, thousands of doctor and MBAs per year. Indian entrepreneurs who were used to the art of manipulating, managing and circumventing the regime of controls and restrictions and the power centre of licensing, would be able to break away from the past and rise to the occasion of liberalization. The country stepped into liberalization. The government sold off shares in its companies and opens the door to foreign investment. Liberalization brought GDP growth to 7 percent, and pushed the inflation down. A new private sector emerged, especially in technology services, side by side
Saturday, February 1, 2020
Information security management framework Research Paper
Information security management framework - Research Paper Example Frameworks are based on existing standards that have been accepted as well as guidelines and sets of practices that reflect the conduct of an initial community of organizations that perform highly(HrÃÅ'ebià cÃÅ'ek, Schimak&Denzer, 2011). Governments along with business organizations have an ability to implement frameworks with the practices they prefer or are supposed to use for their market sectors and the entire country. Some of the benefits of possessing frameworks for information security management include the fact that they create a secure and well-arranged working environment while at the same time protecting information and information assets. Having frameworks for information security management also assists in the reduction of internal and external breaches in security, creating confidence among the employees and customers when dealing with the operations of the business and integrating recovery from disasters in order to ensure continuity of the business(Gantz&Philpott, 2013). Further benefits include prevention of information security incidences from taking place and detection of incidences from occurring. In the event that incidences take place, the frameworks for information security management are able to measure the impact of the incidences and respond to them in order to minimize the resulting damage. Additionally, they are able to embed continuous improvement in processes associated with information security while complying with rules and regulations. Information security frameworks are a sequence of standard procedures that are employed in defining policies and processes associated with the execution and continuous running of information security controls in an venture setting. The frameworks are essentially a plan for the creation of an information security plan with the aim of managing risks and reducing any vulnerability. Professionals in information security can employ
Subscribe to:
Posts (Atom)