Ø
Current Situation
Ø
Techiniques
Ø
Sub_employed Resources
Ø
Over_employed Resources.
Ø
Installations that doesn't work?
Ø
Information Fraudes(steal,robbery)
Ø
Cost of Current Informationl
Ø
Information Resource Saving
Ø
Detection of Critical Paths
Ø
Back_up Rules
Ø
Information Access Policies.