Saturday, October 5, 2019

Systems and Operations Management Essay Example | Topics and Well Written Essays - 2000 words - 1

Systems and Operations Management - Essay Example The main importance of such strategies is to ensure that the relationship with customers is enhanced in order to improve the processes of sales and marketing. Nonetheless, the lack of or presence of internet security is likely to be a major topic of discussion among different countries as well as in a large number of corporations (Peng, 2008). Part One: Option 4 Summary of the text; Achieving Operational Excellence and Customer Intimacy Technology has been extensively applied in transforming the shape of marketing as is used in different organizations. However, with the development and implementation of these advanced technologies a number of changes are experienced within the operational functions of the business. There is thus need to safeguard and protect the information systems, data as well as other information technologies. In this chapter, the major processes associated with advanced technology in the form of online and internet use of the computer is highlighted. The number o f challenges is depicted to be related to Facebook whose users are warned to watch out. In relation to this, there have been a number of reported cases related to theft and presence of malicious software. These are associated with spam, malware as well as other serious security issues. With time, several destructive elements have been introduced into these systems. Similarly to the other viruses circulating within the computer system, these areas were faced with the introduction of Koobface worm in December 2008, the 18 month hacker scam for passwords, which resulted in the entry of the Trojan horse. It is as a result of this that financial data was stolen around the year 2009. The other main challenge was the emails that were created in May 2010 with an intention of stealing logins (Laudon & Laudon, 2013). In comparison to other online tools such as e-mails social sites and especially Facebook is shown as the main target that is used by hackers. It has been related to a high gullib ility level of the users. This is despite the high security measures that have been placed by its dedicated team to include up-to-date measures. The hackers thus make use of â€Å"social engineering† malicious software to develop the attacks aimed at the consumers. As such, it is indicated that there main activities include the theft of passwords and data as well as using botnets. As Laudon and Laudon indicate, it is because of this that different organizations are faced with the task of constantly developing advanced security policies. This is done through the people who include stakeholders within the organization. With this, the organization and specifically its management are presented with the duty to deploy a serious security team to ensure that security is always maintained. These have to be achieved through the application of current technological advancements. They may include the implementation of the website security system, technology that is able to authenticate and security technologies that are applied on an individual basis (2013). The most appropriate way to attain this is through the identification of most of the malicious codes normally used, to identify the different sources of spam and to protect user data. All this is stated as the effort towards responding while making use of the information systems and operations. As such, these steps enhance the action towards providing a number of business solutions since

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.