Real estate in Australia is increasing day by day. Now, with the advent of ICT the real estate can be largely benefitted. The realestate.com.au will be focused in this report. SWOT analysis of the impact of ICT on the retail estate sector will be discussed in the report to find the opportunities and the benefits as well as the risks associated within. The cybersecurity, compliance and the business continuity has been discussed in the report as well.
The realestate.com.au has been focused in this report. Real Estate market works almost similar to any other market and numerous management activities are involved and if these processes are deployed significant profit can be gained. The ICT is a new initiative which is going to change the real estate in mere future. With the advent of Big Data, the business activities related to construction, design can be further furnished. The advanced IoT sensors can be used further to collect and analyses data and can also be used to enhance security. Building Information Modelling (BIM) can be utilised to monitor the lifecycle of a construction building. BIM involves the complete monitoring from designing and manufacturing, later the optimisation and examination of building manufacturing components.
Strengths
BIM can save time and money for a particular project, so that time can be utilized into undertaking other tasks. BIM provides the 3D design of the proposed project thus the model can be better understood and for this reason, it can assist in the further construction of the project (Laudon & Traver, 2013). BIM diminishes the errors incurred within the project pretty early thus avoid the threats associated at the time of construction. BIM is utilised widely in the construction industry ranging from mining, construction to facility management.
BIM does not cooperate among other occupations. It does not focus on providing information rather it only focus on building. Various sectors of a company must work collaboratively to effectively implement the BIM model (Laudon & Laudon, 2016). Though BIM gives cost-effective solutions, initially a huge amount of money is required to implement the software.
BIM assists and provides opportunities to stay connected with the BIM international leaders in terms of education. BIM prescribes the whole construction model prior to the construction starts (Anderson, 2014). BIM assists in learning new skills and methodologies in the respective field.
BIM can heavily influence the traditional working procedure of the construction and manufacturing industry sector and can even overtake the traditional industry as well (Khan et al., 2014). The BIM construction companies are comparatively lesser in number; thus the suppliers are quite less.
BIM details the construction process and also with that the required 3D model that can ease the construction industry (Anderson, 2014). For this reason, the real estate sector must adopt this technology, this can help them to build designs prior to construction moreover it saves time.
BIM can help them to diminish the waste of time and money, it will help them to find out the risks and threats prior and also help them to mitigate those risks prior to construction. BIM helps to monitor the construction lifecycle all throughout so it will generally help to reduce the errors incurred (Laudon & Laudon, 2016). Thus BIM can increase overall productivity in real estate sector.
Though a huge capital investment is required initially, in the long run, BIM will help the real estate sector to conduct business activities in quick times and in a profitable way. BIM’ s 3D model technology will help to conduct each and every project in an effective manner (Laudon & Traver, 2013). Thus the real estate sector can earn huge revenues with the help of BIM software.
SWOT Template Organisation: realestate.com.au Date: 19/09/2017 |
|
Building Information Modelling (BIM) can be utilised to monitor the lifecycle of a construction building. BIM involves the complete monitoring from designing and manufacturing, later the optimisation and examination of building manufacturing components. |
|
Strengths i. BIM can save time and money for a particular project, so that time can be utilized into undertaking other tasks. ii. BIM provides the 3D design of the proposed project thus the model can be better understood and for this reason, it can assist in the further construction of the project. iii. BIM diminishes the errors incurred within the project pretty early thus avoid the threats associated at the time of construction. iv. BIM is utilised widely in the construction industry ranging from mining, construction to facility management. |
Weakness i. BIM does not cooperate among other occupations. ii. It does not focus on providing information rather it only focus on building. iii. Various sectors of a company must work collaboratively to effectively implement the BIM model. iv. Though BIM gives cost-effective solutions, initially a huge amount of money is required to implement the software. |
Opportunities i. BIM assists and provides opportunities to stay connected with the BIM international leaders in terms of education. ii. BIM prescribes the whole construction model prior to the construction starts. iii. BIM assists in learning new skills and methodologies in the respective field. |
Threats i. BIM can heavily influence the traditional working procedure of the construction and manufacturing industry sector and can even overtake the traditional industry as well. ii. The BIM construction companies are comparatively lesser in number; thus the suppliers are quite less. |
BIM short-term benefits BIM details the construction process and also with that the required 3D model that can ease the construction industry. For this reason, the real estate sector must adopt this technology, this can help them to build designs prior to construction moreover it saves time BIM midterm benefits BIM can help them to diminish the waste of time and money, it will help them to find out the risks and threats prior and also help them to mitigate those risks prior to construction. BIM helps to monitor the construction lifecycle all throughout so it will generally help to reduce the errors incurred. Thus BIM can increase overall productivity in real estate sector. Though a huge capital investment is required initially, in the long run, BIM will help the real estate sector to conduct business activities in quick times and in a profitable way. BIM’ s 3D model technology will help to conduct each and every project in an effective manner. Thus the real estate sector can earn huge revenues with the help of BIM software. |
The chosen topic for the Part B section of this report is Cyber Security, Compliance, and Business Continuity.
Cybersecurity threats are emerging day by day due to the following vulnerabilities- the malware attack, the lost disks and the threatening DDoS attacks which involve the unauthorized system access. The other kinds of threats that are emerging right now are persistent threats, social web media for social engineering. Social engineering consists of two two procedures-
APT involves attack of intruders over an insecure network over years and gain unauthorised access to steal the important data. APT can be a threat to the national defence system and also the national finance system (Levy, Yu & Prizzia, 2016). They do not cause any damage to the system as the intruders do not want to reveal their presence.
They generally target the national or government website and resources and make it vulnerable thus they steal all vital information. This is because of the insecure network system and the weak security architecture (Furfaro, Gallo & Saccà, 2016). All these gave them the opportunities to get into the loopholes and steal information for their benefits.
The intruders generally carried out their attacks by the in the form of data breaches, data leaks, data theft, threats and privacy invasions. For instance, they attacked Sony in the year 2011 and their system and the database got compromised and the sensitive information of the customers got leaked (Dhillon, 2015). The Sony PlayStation Network, Sony Online Entertainment got hacked and in this way, they lose market share, customer base and at the end lose reputation.
Thus it is absolutely necessary to secure the website and web resources. The web data and web resources must be made accessible all the time having restriction access, implementation of rules and regulations with respect to proper use of hardware and software solutions must be capable to detect and handle any issues or any kind of security breaches (McCollum, 2016). The system and the database must be made compliant to recover back from any kind of disasters and disruptions occur within the network.
The vulnerabilities and threats of the system and the database are the malware attacks. He malware attacks involve the virus attacks, Trojan attack, spyware and any kind of unwanted programs. These can cause disruptions in any enterprises and the business operations suffer due to those data breaches and unauthorised access (Carter & Zheng, 2015). The vulnerabilities and the threats generally affect the confidentiality, integrity and the availability of resources.
Confidentiality refers to the authorized access of individuals and thus ensures protection and privacy of data, only the legitimate users can gain access to the system.
Integrity refers that the assets should not be modified or altered by any means of unauthorized access to the system and the database.
Availability refers to the portion of assets which can be accessed and modified at the time of need and those can be modified or altered by authorized users only (Ojeka, Ben-Caleb & Ekpe, 2017).
Passwords: The passwords can protect one’s system and the database from unauthorised access. The password must be strong enough so that the intruders cannot discover that.
Internal threats: The internal threats involve the insiders or the employees of the organisation. This kind of malicious activity generally carried out by the employees and the intruders and to assure protection from all these kinds of security attacks firewalls, intrusion detection system must be applied (Gordon & Gordon, 2016).
Cloud Computing and Social Networking Risks: Cloud Computing is vulnerable if the security framework used is not secure enough if the hardware, software and the applications are not properly updated time to time. Again, the sharing of personal files, data, images and videos via social media and the social networking sites can lead to the violation of privacy. The intruders can use the media for the benefits, can modify the personal data and in this way, one’s reputation can be at risks.
Defense-in-depth model: The Defense-in-depth model is a multi-layered initiative taken by InfoSec. The procedure lies within, if any layer fails, the other layers come to the rescue, in this way a system can be saved from data breaches to the utmost. For instance, the wireless network connectivity fails to protect data, and then the next layer or the next procedure can protect the data (McCarthy et al., 2016). By means of encrypting data, the data can be protected from all kinds of breaches. However, the process infosec have adopted are-
Unintentional threats involve the human errors, environmental hazards and the failures of the computer system. Al these cause disruptions and malfunctions within the computer system. This can cause the disruptions within the business activities as well.
Intentional threats involve the botnets, spyware, adware, spam and phishing and all these activities require human interactions and they are generally carried out by intruders to steal personal information and resources (Slusky & Goodrich, 2016).
Insider fraud: Insider fraud refers to the intentional use of one’s information and assets for misuse purpose or to conduct any crime within. The insider frauds are carried out by internal employees of a company and the contractors for personal benefits. Special measures should be adopted to prevent this sort of attacks.
Internal fraud detection and prevention: The internal fraud detection and prevention can be carried out by respective companies. The companies should take harsh decisions and also should educate the employees with the fact that they are under constant vigilance of the company’s supervisors and any kind of fraud will not be entertained (Furfaro et al., 2016).
The defence strategies will be described as follows-
The defence control can be classified into general control measures and physical control measures. The general control can be classified into physical control, access control, data security, communication, administrative, the access controls can again be classified into Biometrics and Web Controls. The Web Controls can be classified into authentication, encryption, cable testers, firewalls and virus protection (Slusky & Goodrich, 2016). The Application Controls can be classified into input, processing and output.
Network security measures involve the three layers-
The internal control and compliance are the working surroundings that are set by the company’s management team for their employees. Therefore, the internal control procedures have been developed to gain-
A well-planned insider fraud and money-laundering activities can destruct the financial sector can affect the nation’s economy. Thus risk management is necessary to control the finances, economy and the financial institutions. The introduction of IT has the capability to enhance the market and mitigate the frauds within.
The audit is here to detect the vital part of the control system. The questions that must be answered to diminish the criminal activities. The questions are whether there are sufficient controls within the system, the controls which are absolutely necessary.
Cost-Benefit analysis can be conducted considering the ethical issues and risk management analysis based on the ethical issues. There are various ethical issues, those issues must be clearly diagnosed, certain controls must be imposed to mitigate those issues, now imposing controls may violate the privacy of individuals and the security can be compromised (McCarthy et al., 2016). Thus superior must consider the ethical issues based on the two doctrines: the duty of care and respondeat superior and must act responsibly to secure the company’s business activities.
Conclusion
It can be concluded from the above discourse that the real estate can be greatly enhanced with the advent of ICT. The realestate.com.au has been focused in this report. SWOT analysis has been performed on the retail estate sector to find the opportunities and the benefits as well as the risks associated within. The CyberSecurity, Compliance and Business continuity has been discussed in the report.
References
Anderson, D. M. (2014). Introduction. In Leveraging (pp. 3-34). Springer International Publishing.
Carter, W. A., & Zheng, D. E. (2015). The Evolution of Cybersecurity Requirements for the US Financial Industry. Center for Strategic and International Studies.
Dhillon, G. (2015). WHAT TO DO BEFORE AND AFTER A CYBERSECURITY BREACH?.
Furfaro, A., Gallo, T., & Saccà, D. (2016, August). Modeling cyber systemic risk for the business continuity plan of a bank. In International Conference on Availability, Reliability, and Security (pp. 158-174). Springer International Publishing.
Furfaro, A., Gallo, T., Garro, A., Saccà, D., & Tundis, A. (2016, May). Requirements specification of a cloud service for cyber security compliance analysis. In Cloud Computing Technologies and Applications (CloudTech), 2016 2nd International Conference on (pp. 205-212). IEEE.
Gordon, K., & Gordon, K. (2016). SEC proposes rules on adviser business continuity and transition plans. Journal of Investment Compliance, 17(4), 65-70.
Khan, H. U., Artail, H. A., Malik, Z., & Niazi, M. (2014, August). Information technology adoption, possible challenges, and framework of supply chain management: a case study of a leading gulf economy. In Engineering Technology and Technopreneuship (ICE2T), 2014 4th International Conference on (pp. 1-5). IEEE.
Laudon, K. C., & Laudon, J. P. (2016). Management information system. Pearson Education India.
Laudon, K. C., & Traver, C. G. (2013). E-commerce. Pearson.
Levy, J., Yu, P., & Prizzia, R. (2016). Economic Disruptions, Business Continuity Planning and Disaster Forensic Analysis: The Hawaii Business Recovery Center (HIBRC) Project. In Disaster Forensics (pp. 315-334). Springer International Publishing.
McCarthy, D., McCarthy, D., Gordon, K., & Gordon, K. (2016). SEC issues guidance on business continuity planning for registered investment companies. Journal of Investment Compliance, 17(4), 71-74.
McCollum, T. (2016). Time to shift the mindset: pulse report urges internal audit to focus on culture and cybersecurity response. Internal Auditor, 73(2), 11-13.
Morano, P., Tajani, F., & Locurcio, M. (2015). Land use, economic welfare and property values: an analysis of the interdependencies of the real-estate market with zonal and socio-economic variables in the municipalities of Apulia region (Italy). International Journal of Agricultural and Environmental Information Systems (IJAEIS), 6(4), 16-39.
Ojeka, S., Ben-Caleb, E., & Ekpe, E. O. I. (2017). Cyber Security in the Nigerian Banking Sector: An Appraisal of Audit Committee Effectiveness. International Review of Management and Marketing, 7(2), 340-346.
Slusky, L., & Goodrich, J. A. (2016, June). Human Factors of Cybersecurity Awareness. In EdMedia: World Conference on Educational Media and Technology (pp. 436-444). Association for the Advancement of Computing in Education (AACE).
Snedaker, S. (2013). Business continuity and disaster recovery planning for IT professionals. Newnes.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download