google.com, pub-5012522416583791, DIRECT, f08c47fec0942fa0 google.com, pub-5012522416583791, DIRECT, f08c47fec0942fa0 Colombo Stock Market Financial Research: 2020-11-22 google.com, pub-5012522416583791, DIRECT, f08c47fec0942fa0
google.com, pub-5012522416583791, DIRECT, f08c47fec0942fa0

Monday, November 23, 2020

A STYLE OF GROWTH OF COMPUTER AND INTERNET SECURITY BREACHES IN SRI LANKA

 

A STYLE OF GROWTH OF COMPUTER AND INTERNET SECURITY BREACHES IN SRI LANKA

 

Background

This paper represents the views towards the Computer & internet Security Breaches . Internet Security Breaches has Become the Trend in Modern Society .For this study  I Refer the “An analysis of the Growth of Computer and Internet Security Breaches” As the Base Article  regarding the Analyze of the Computer & internet security breaches. 

 

Methods

This paper surveys recent literature and in the field of Cyber crime, intending to find out the computer & internet security breaches . In order to gather primary data it is expected to use the Questioner.

 

Results

In this paper, researchers find that recent literature and the objectives of analysis computer & internet security breaches, and limitation of the cyber crime. and finally analyze the A style of growth of computer & internet Security breaches.

Discussion and Conclusion

This exploratory study investigates the usefulness of the budgets, limitation of the budgets and how to enhance the usefulness of the budgets.

 

Key words

Computer and Internet security breaches, diffusion model, bad innovation, types of crimes, growth patterns of crimes

 

 

 

 

 

 

Introduction

 

1.1 Introduction

In the recent past it is very common to hear Cyber crime issues and breaches relating to the Internet Security among world. Cyber crime appears to have become a serious problem at internet security. Internet security can be breached by the way of hacking, Stolen laptop/computer, Passwords compromised, Theft by insider/employee, Missing back-up tape. Cyber crime can be done collectively or individually. There has been much discussion about the impact of new technologies on internet security breaches.

 

1.2 Background of the study

Information security “breaches” take many forms. These include lost or misplaced disks or backup tapes, stolen laptops and cell phones, hacked data, improperly secured websites, data lost or stolen in transit, information taken by rogue employees, misdirected mail, and many other forms. California data suggest that most are accidents, rather than the result of deliberate attacks, and many are not so much “breaches” as incidents in which data may — or may not — have been compromised. Most of these incidents do not involve the Internet or other digital technologies. In fact, many involve lost or misplaced information or equipment, rather than theft.

 

Breaches occur in a wide variety of settings,

 

Including many industry sectors, government agencies, universities, and the not-for-profit community.

It appears that only a small percentage of breaches actually involve any harmful use of data. There are many reasons for this, including:

 

  • Many incidents described as information security breaches involve no effort to misuse data at all. Data may be lost, rather than stolen, or obtained incidental to the theft of some other valuable commodity and discarded or destroyed without ever being accessed (for example, a laptop that is stolen for the value of the machine and immediately wiped clean so that it can be used by someone else).

 

  • Not all attempted misuses are successful; industry efforts to detect and block fraudulent charges and illicit access to accounts are highly successful. The financial services industry, for example, intercepts and blocks many fraudulent credit card charges.

 

  • Even the portion of those efforts to misuse personal information that are successful usually result in no financial or physical harm to consumers. The most recent data available indicates that 67% of victims of identity-based frauds report suffering no economic loss and paying no out-of-pocket expenses. The costs were usually paid by businesses, andultimately by all consumers.pe

 

Information security breaches are among the least common ways that personal information falls into the wrong hands. In 2005, for the half of victims of identity-based frauds who reported knowing from where their information had been obtained, the most common source of personal information, by a factor of two to one over any other category, was “lost or stolen wallet, checkbook or credit card.”5 Family members and relatives along with friends and neighbors make up half of all known identity thieves.6 Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information.

 

s of Security Breaches (2005)

 

 

 

 

 

 

1.3 Objective of the study

Overall Objective

 

The overall objective of the study is to evaluate the A style of growth of computer and internet security breaches in Sri Lanka.

 

Specific Aims

  • To Find out the existing internet security breaches among listed companies in Sri Lanka.
  • To Find out the relationship between Internet Security Breaches and Growth of computer among business.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Literature Review

2.1 Summary of the base article

 

This study uses to analyze the growth rates of different types of computer and Internet-related crimes. The Security Breaches is an appropriate diffusion because it is capable of modeling two opposite behaviors: (1) acts of attacks and imitation of attacks and (2) deterrence acts to prevent such attacks. . This study was used to analyze various types of attacks. The results indicated that growth patterns of computer and Internet crimes differ in growth patterns and that a relationship exists between occurrences of such security breaches and uses of certain security technologies. Thus, for example, financial fraud and denial of service are growing at a faster pace. The study also found, for example, that an increase in virus-related incidents does not necessarily increase anti-virus software use.

 

 

2.2 Literature Regarding the Topic

 

Computer and Internet-related crimes show no signs of abatement. A 2003 survey conducted by the CSI/FBI reports that 75% of surveyed firms and agencies detected computer security breaches and acknowledged financial losses as a result of computer breaches [Power, 2003]. CERT/CC [2003] reports computer security vulnerabilities nearly doubled in 2002 with 2437 separate holes reported in 2001 and 4129 reported in 2002. Following the same trends, the number of reported incidents also increased significantly with 52,658 documented in 2001 and 82,694 in 2002. Through the continual monitoring of hundreds of Fortune 1000 companies, Riptech found that general Internet attack trends are showing a 64% annual rate of growth .

 

Neumann [1999] states that costs of cyber crime are difficult to measure; however, these costsare reasonably substantial and growing rapidly. Garg et al. [2003] attempted to quantify the financial impact of IT security breaches by using event-study methodology. They came to the same conclusion: IT breaches are extremely costly. Lukasik [2000] claims that cyber crime costs are essentially doubling each year. The problem becomes even more complicated when oneconsiders that these crimes are underreported. Ullman and Ferrera, [1998] mention that, according to FBI estimates, only 17 percent of computer crimes are reported to government authorities.

 

 Previous studies that focused on computer or information systems security issues lack empirical results on how different these security breaches are from one another and what their growth patterns are. Such empirical studies are important because some attacks enormously and rapidly disrupt the Internet infrastructure for a length of time, thus resulting in millions of dollars in losses. For example, the “Code Red Worm” virus infected more than 250,000 systems around the globe in nine hours on July 19, 2001, and its estimated total global economic impact was as much as $2.6 billion [Householder et al., 2002].

 

The growth of computer and Internet security breaches can be studied from an innovation diffusion perspective [Rogers, 2003]. Innovation diffusion literature is usually concerned with good innovations and thus biased towards good innovations. The study of bad innovations such as security attacks can alert readers to the fact that innovations are not always good and what actions need to be taken to prevent such bad innovations. The present study uses the concept of bad innovations by using the modified Gompertz model [Pitcher et al., 1978] which is capable of capturing attack incidences as well as deterrent activities. Based on past experiences, it can be inferred that not all attacks deserve the same attention and not all attacks may show the same type of growth rate. It is important to know how these various crime rates are growing. This question needs to be investigated empirically. Although estimation with a sparse set of data at an earlier stage of growth is challenging, past studies proved it to be useful. In this paper, we focus on different types of attacks, how these evolved, whether different types of attacks evolved similarly, and how deterrence effects are working.

 

The study is preliminary in nature for a number of reasons. Literature is almost non-existent on this topic. Data on different types of security breaches are sparse [Power, 2002]. One of the most referenced studies of security breaches, the CSI/FBI computer crime and security survey by Richard Power, contains only a few years of recent data [1996-2002]. Modeling such security breaches during the early stages of data availability is difficult but extremely critical. Analysis withsparse data is, however, not uncommon in research literature. For example, marketing literature reports the forecasting of sales of new products with as few as five years of data [Mahajan and Peterson, 1985]. The dynamic behavior of hundreds of good innovations shows similar characteristics during the early phases of growth as observed across many types of products [Bass, 1969; Mahajan et al., 1985; Jepson, 1976]. Previous works on forecasting from early data

with a small number of data points include Lawton and Lawton [1979], Tigert and Farivar [1981], Kalish and Lilien [1986], Wright, Uprichard and Lewis [1997]. Lilien et al. [1981] and Dalal et al. [1998] updated parameter estimates for a new product by using data on similar products or expert judgment in a Bayesian framework. Sultan et al.[1990] used meta-analysis-based prior information with a few data points on a new product to obtain more robust posterior estimates.

 

In the absence of prior information and data on Internet attacks, we use traditional diffusionmodels. Previous research reports that the shape of sales curves of many innovative products during the growth phase is similar [Mahajan et al., 1985]. Sales of new products in the earlyphases tend to grow extremely rapidly. This high growth rate tends to decrease over time andfinally the diffusion matures and tapers off, as newer technologies replace older ones. Previous research also found that while exponential or logistic curves are adequate for modeling purposes in the growth phase, they are not adequate to model many innovations at an earlier stage. A small error at an early stage can result in a large effect on later time period forecasts [Martino, 1972].

 

Modified Gompertz curves, such as the General Sales Growth Curve [Lieb Associates, 2001], are reported which describe the data well and yield good curve fitting and forecasting of new innovations in the early growth phases [Jepson, 1976; Lakhani, 1979]. The Gompertz curve could be a good fit for innovations which rapidly increase in the beginning and then taper off slowly. The point of inflection of the growth curve occurs at 33% of total potential diffusion. Such a model isused in the present study of bad innovations [Pitcher et al., 1978]. In addition, the model’s explanatory power helps to understand how these attacks are developing and what factors are behind such attacks.

 

 

Types of breaches

Some of the important security breaches since 2001 are the results of the following attacks [CERT/CC, 2003]:

·         Multiple vulnerabilities in the Internet Software Consortium's Berkeley Internet Name Domain (BIND) server,

·         Sadmind/IIS worm (a worm that exploits a vulnerability in Solaris systems and

       subsequently installs software to attack Microsoft IIS web servers),

·         Code Red worm (a self-propagating malicious code that exploits IIS-enabled systems),

·         SirCam worm (a malicious code that spreads through email and potentially through unprotected network shares), and

·         Nimda blended threat (a combination of worm, viruses, and other codes that propagates itself via several methods, including email, network shares, or through an infected web

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Research Method

3.1 Data Collection and Methods

Source of data

Researchers are expected to use both primary and secondary data. The primary data will be used to bridge the research gap in the existing literature. The main source of data is the data which collected from questionnaires. Separate questionnaire is designed for the Analyze the style of growth. And a separate questionnaire is designed for the analyze the computer and internet security breaches . Other than that, many academic journals and articles will be used as sources of data.

 

Collection of data

A separate questionnaire is designed for the analyze the style of growth and analyze the computer and internet security breaches.. In the first section of questionnaire is designed to collect demographic information such as designation, gender, age, Industry and etc. From next part onwards it is being asked the view point of computer crimes.

Besides the information gathered from the questionnaires it is expected to use various documents available in the university web sites as the secondary data source.

 

3.2 Population & sample

 

Population of this study contained all listed companies in the sri lanka . The reason for the selection of listed companies in sri lanka for this study is due to the information accessibility. The study sample of 40 participants will be generated by using stratified sampling methods.

 

 

 

 

 

 3.3 Data Management

 

The collected data will be fed to the SPSS software which is one of the best soft ware’s to analysis data, especially in quantitative nature. All the questions in the questionnaires are available in SPSS windows with the given answers and will be coded accordingly. All the questionaries’ themselves available reference numbers, therefore the easy access to the information is highly protected. The information feeding process to SPSS is done in highly accurate manner. One person entered data to SPSS, and another person has to recheck the accuracy of data. Third person has confirmed the accuracy of the coding system.

 

Data Analysis Strategies

 

Secondary data, which were collected through a comprehensive review of literature as detailed in the literature review of this proposal, analyzed to identify gaps in the existing body of knowledge on the issues pertinent to the research topic. The research gaps identified were used as a basis for reaffirming the relevance of the research problem, developing the research.

 

Primary data will be collected using questionnaires and analyze quantitatively. It is expected to analysis data by using SPSS software. For all demographic questions it is panned to generate frequency analysis. The factor analysis is also going to be tested. More importantly it is expected to carry out parametric and non- parametric analysis as appropriately to identify the significance relationships in the collected data. Other than that reliability test, t- tests, post hoc tests, regression analysis also going to be tested.

 

 

 

Chapter 4 Data Analysis

 

Mostly though, previous studies lack empirical results on how different types of attacks grow or provide reliable models of such attack growths. This understanding is important. Some attacks enormously and rapidly disrupt the Internet infrastructure for a length of time, thus resulting in millions of lost dollars. For example, the infamous "Melissa" virus in 1999 infected thousands of computers with rapid speed, causing an estimated $80 million in damages [CCITS, 2002]. The growth process can be studied from an innovation diffusion perspective [Rogers, 1991]. The four main elements in the diffusion process are:

1. the innovation (good or bad),

2. channels of communication,

3. time, and

4. the social system.

 

Although imitative and deterrence acts constitute the background of any attack scenario, the rates of imitation and deterrence may not be the same. When the rate of instigation increases it may mean an overall increase in deterrence rate as more and more security products will be developed. As these products come onto the market, attackers find ways to bypass these products and refine their attacks, which in turn leads to more refined security products. This cycle of reinforcing attack and deterrence continues.

 

Secanario1: Relative increase in net instigation rate is related to relative increase in

deterrence rate.

 

Thus, preventive measures are assumed to be thoroughly outweighed by attacks. Therefore, it is expected that the value of c, the net rate of instigation will be much higher than the value of q, the rate of deterrence or inhibition.

 

Scenario 2: Values of the net rate of instigation, c, will be much higher than values of q, the rate of inhibition for computer and Internet-related bad innovations, i.e., digital crimes and security breaches.

 

Although reported computer crimes are of many types, not all of them are equally popular, due to economic, political, technical and a variety of other reasons. At the beginning, hacking was done primarily for intellectual satisfaction, to break a system. In recent times however, financial profit considerations are one of the main reasons for computer crimes.

 

Scenario 3: Not all computer crimes and security breaches show similar growth rates

 

Security tools or defensive cyber weapons include encryption, authentication, access controls, firewalls, anti-viral software, audit tools, and intrusion detection systems [Denning, 2000]. Although new security tools are being developed (for example, biometrics and digital IDs) and security technologies are increasingly used by many firms, it is useful to investigate whether and how usage is related to attacks that occur. Thus, denial of service attacks, proprietary information theft, and system penetration attacks should lead to more use of intruder detection software, encryption, and firewalls; virus attacks should lead to more antivirus software use and encryption.

 

Secanario 4: The more security incidents happen, the more security technologies are used

 

4a. system penetration attacks should lead to more use of intruder detection software,encryption, and firewalls

4b. denial of service attacks should lead to more use of intruder detection software,

 encryption, and firewall

4c. proprietary information theft should lead to more use of intruder detection software,

encryption, and firewalls

4d. virus attacks should lead to more antivirus software use and encryption use.

Table shows the distribution of the respondents who reported attacks by industry sector. The distribution did not change much over the four year period.

.

 

 

Industry sector

    %

Manufactring

40

Service

10

Banking

20

Insurance

10

Other

20

 

Result

The figure captures the fit of the power function of the relationship between q and

c. The function is: q = .089c(2.19) (R2 = .66). An increase in net instigation rate is greater than the corresponding relative increase in inhibition rate. This result is consistent with results obtained from other types of crimes [Pitcher et al., 1978]. The moderate fit and the positive value of c support Proposition 1.

 

Values of net instigation rate, c, will be much higher than values of inhibition rate,

q, for computer and Internet-related bad innovations, i.e., computer crimes and security breaches. The R2 value from the model fits are high (.80-.99). The values of q and c are

different, for each type of security breach, with values of c much higher than q. When c> q, overall impact of net instigation is more than the inhibition rate and vice versa. The results are again consistent with the results obtained from other types of crimes

 

Not all computer crimes and security breaches show similar growth rates. The pair of values of q and c, as obtained from each run, is very different for each type of crimes, thus confirming Proposition 3. Of these viruses, financial fraud, and theft of proprietary information are projected to be significant and costly in the near future. Denial of service is rising rapidly. Telecom fraud, active wiretapping, laptop theft, and unauthorized insider access will be lower. By comparison, the rest of the crimes are projected to be at a moderate level of intensity.

 

Conclusion

 

Of the four propositions explored in this study, three (Propositions 1-3) were strongly confirmed while the remaining one (Proposition 4) was partially confirmed. In summary, the results of this study led us to conclude that

·         Relative increase in net instigation rate is related to relative increase in inhibition rate which implies that the increasing attack incidences will force organizations and governments to come up with means of preventing or reducing them

 

·         For computer and Internet-related attacks (bad innovations), the values of net         instigation rate is higher than values of inhibition rate, implying more efforts and resources need to be applied toward inhibiting attacks;

·         Different computer crimes and security breaches grow at different rates, which implies that all these crimes should not receive the same level of attention because some crimes are likely to spread more rapidly than others;

·         Real world practice does not always follow the common notion that as more attac incidents occur, more security technologies are used. This finding may imply that organizations and governments do not necessarily spend money on security measures in proportion to the frequency of attack incidences. Ninety percent of respondents in the  2002 survey, for example, used anti-virus software; however, at least 10-15% of  respondents did not detect any virus, due probably to non-use or ignorance [Power,  2002]. Viruses are among those attack incidents that caused financial losses.

 

 This article is a first attempt to identify the nature of growth of various computer and  Internet related crimes, using a sparse set of data. First, a model was selected for bad innovation modeling which can represent both imitative and inhibitive behaviors in attacks. Next, the model was used to derive and compare various types of attack statistics with a sparse set of data

 

 

 

Reference

 

Arquilla, J. (2001) Networks and Netwars: The Future of Terror, Crime, and Militancy, Santa Monica, CA: RAND Corporation.

 

Atkins, D.(199 6) Internet Security Professional Reference. Indianapolis, IN: New Riders Pub.

 

Attrition (2001) http://www.attrition.org/mirror/attrition/stats.html Last consulted 11-27-03.

 

Bass, F.M. (1969) "A New Product Growth Model for Consumer Durables" Management Science, pp. 215-227.

 

Bandura, A. (1986) Social Foundations of Thought and Action. Englewood Cliffs, NJ: Prentice- Hall. A CCITS/Infosech Presentation on Internet Security,2002.

 

CERT/CC Web Site, http://www.cert.org .Last consulted 12-06-03.

 

Convention on Cybercrime http://conventions.coe.int/Treaty/EN/cadreNews.htm .Last consulted 12-06-03.

 

Computer Fraud and Abuse Statute, (2002) http://nsi.org/Library/Compsec/cfa.txt .Last consulted 12-06-03.

 

CTNEWS(2002) http://www.cnetnews.com. Last consulted 11-06-03.

 

Dalal, S., Ho, Y. and Sherman, R. (1998) “Learning from Experience to Improve Early Forecasts:

 

A Posterior Mode Approach” In Business and Economic for the 21st Century, Vol. II

Worcester, MA: Business and Economics Society International,. pp. 338-353.

 

Denning, D.(2000) “Reflections on Cyber weapons Controls” Computer Security Journal, (XVI) 4.

 

 

 

Denning, D. (1998) Information Warfare and Security, Upper Saddle River, NJ: PearsonEducation.

 

Communications of the Association for Information Systems (Volume12, 2003)684-700 699

 

Ford, R. (1999) “No Surprises in Melissa Land” Computers and Security, (18), pp. 300-302.

 

Garg, A., Curtis, J. and Halper, H. (2003) “Quantifying the Financial Impact of IT Security Breaches” Information Management & Security (11)2, pp. 74-83.

 

Householder, A., Houle, K. and Dougherty, C. (2002) “Computer Attack Trends Challenge

Internet Security, Security and Privacy” Supplement to Computer, IEEE Computer

Society.

 

Jepson, C., E. I. DuPont de Nemours & Co., Inc,Internal Presentation, 1976.

 

 

Kalish, S. and Lilien, G. (1986) “A Market Entry Timing Model for New Technologies”

Management Science, 32 (2), pp. 194-205.

 

Katz, M. and Shapiro, C. (1986) “Technology Adoption in the Presence of Network Externalities” Journal of Political Economy (94), pp. 822-841.

 

Krebs, B. (2003). “Good' Worm Fixes Infected Computers” http://www.washingtonpost.com/wpdyn/ articles/A9531-2003Aug18.html. Last consulted 12-06-03.

 

Lakhani, H. (1979) "Empirical Implications of Mathematical Functions Used to Analyze Market Penetration of New Products" Technological Forecasting and Social Change (15)2, pp. 147-156.

 

 

 

Lawton, S. B. and Lawton, W. H. (1979) “An Autocatalytic Model for the Diffusion of Educational Innovations” Educational Administrative Quarterly, 15 (1), pp. 19-46.

 

 

Lukasik, S. J.(2000) “Protecting the Global Information Commons" Telecommu-nication Policy, (24)6-7, pp. 519-531.

 

Mahajan, V., Muller, E. and Bass, F. M. (1990) "New Product Diffusion Models in Marketing: A Review and Directions for Research" Journal of Marketing, (54), pp. 1-26.

 

Mahajan, V. and Peterson, R. (1987) “Models for Innovation Diffusion,” Sage University Paper series on Quantitative Applications in the Social Sciences, (2nd Ed.), Beverly Hills: SAGE Publications.

 

Martino, J. P. (1972) "The Effect of Errors in Estimating the Upper Limit of a Growth Curve" Technological Forecasting and Social Change, (4), pp. 77-84.

 

 

McCrohan, K. F. (2003) “Facing the Threats to Electronic Commerce” Journal of Business & Industrial Marketing, 18 (2) , pp. 133-145.

 

Neumann, P. (1999) “Information System Adversities and Risks” presented at the Conference on International Cooperation to Combat Cyber Crime and Terrorism, Stanford, CA: Hoover Institution, , pp. 1-2, 3. http://www.oas.org/juridico/english/information_system_ adversities_a.htm

 

Parker, D.B. (1983) Fighting Computer Crime. New York: Scribner's.

 

Pitcher, B., Hamblin, R. and Miller, J. (1978) “The Diffusion of Collective Violence” American Sociological Review, (43), pp.23-35.

 

Power, R. (2002) “CSI/FBI Computer Crime and Security Survey” Computer Security Issues and Trends, (8)1, pp. 1-22.

 

Ratnasingam, P. (2002) “The Important of Technology Trust in Web Services Security”

Information Management & Computer Security, (10)5, pp. 255-260.

 

Richardson, R. (2003) The 2003 CSI/FBI Computer Crime and Security Survey. San Francisco: Computer Security Institute Inc., pp. 1-20.

 

Rogers, E. (2003) The Diffusion of Innovation. New York: Free Press.

 

Smith, A. D. and Rupp, W. T. (2002) “Issues in Cybersecurity: Understanding the Potential Risks Associated with Hackers/Crackers” Information Management & Computer Security, (10)4, pp. 178-183.

 

Sofaer, A. D. and Goodman, S. (Eds), (2001) The Transnational Dimension of Cyber Crime and Terrorism, Hoover National Security Forum Series, Stanford, CA: Hoover Institution Press.SPSS 11 Syntax Reference Guide, 2003. Chicago IL: SPSS Publication Sales.

 

Straub, D.W. (1990) “Effective IS Security: An Empirical Study’’ Information Systems Research, (1)3, pp. 255-276.

 

Straub, D., Carlson, P. and Jones, E. (1993) “Deterring Highly Motivated Computer Abusers: A Field Experiment in Computer Security” Journal of Management Systems (5)1, pp. 33-48.

 

Straub, D. and Welke , R. (1998) “Coping with Systems Risk: Security Planning Models for Management Decision-Making” MIS Quarterly, (22)4, pp. 441-469.

 

Sultan, F., Farley, J., and Lehmann, D. (1990) “A Meta-Analysis of Applications of Diffusion Models" Journal of Marketing Research, (27), pp. 70-77.

 

Tigert, D. and Farivar, B. (1981) “The Bass New Product Growth Model: A Sensitivity Analysis for a High Technology Product”. Journal of Marketing, (45), pp. 81-90.

 

Ullman, R. and Ferrera, D. (1998) “Crime on the Internet,” Boston Bar Journal, Nov./Dec., no.6. Wright, M. Upritchard, C. and Lewis, T. (1997) “A Validation of the Bass New Product Diffusion Model in New Zealand” Marketing Bulletin, (8), pp. 15-29.

JAT Holdings PLC

  ABSTRACT   This report presents a comprehensive analysis of five consecutive annual reports of JAT Holdings PLC, a leading company...