Monday, February 17, 2020

CIS Essay Example | Topics and Well Written Essays - 750 words

CIS - Essay Example Nevertheless, along with it has come the intriguing question of "how safe is it to share" (Martinelli, 2006) The advent of the Internet has provided some major breakthroughs. Social networking and virtual worlds are gaining in popularity and are opening new avenues for businesses. VoIP and visio-conferences eliminate the limitations businesses encounter due to geographical boundaries largely. These provide opportunities for various business houses to advertise, share information with their collaborators, receive feedbacks on their products, equipping them with the cutting edge technologies needed to grow. Thus, to be successful in this highly competitive global business environment, enterprises increasingly adopt flexible, distributed working practices. The outcomes from virtual collaborations form the fundamental contributions to corporate information and knowledge assets. These assets are used for later analysis of data to provide assistance in decision-making, designing action plans for the management. They also provide critical information regarding corporate strategies, operating principles, client information, and personnel records and so on. It is thus of much importance that these information assets be protected. As better ways to collaborate keep coming up, the risks involved in it also increase manifold. Increased reports of cyber crimes are quite disturbing to the new age collaborator fraternity. According to the Georgia Tech Information Security Center (GTISC) annual report, five major threats have emerged as major concerns. Malware, Botnets, cyber warfare, threats toVoIPand mobiledevices, and the "evolving cyber crime economy". Malwaredevelopment proficiency is rapidly growing, perfectly suited to exploit the weaknesses of poorly configured sites, in particular social networking web sites. Reports indicate an increase up to 10 times of malware object detection in 2008. A Botnet infection may occur even through genuine Web sites. With subtle delivery techniques, users do not have to do much, except loading a Web page, triggering a Botnet infection. Around 10 million bot computers are used to spread spam and malware over the net every day. A major issue of concern is Cyber war. Nations equipped with computer technology uses its power to decline, curb or confuse their enemies' military, economic and infrastructure assets. VoIP traffic, like e-mails, is being targeted for various scams, frauds and thefts. Mobile devicesdraw cyber criminals as they are easy targets and are used frequently for transacting business and provide access to sensitive data. Cyber criminals have become increasingly specialized, controlled and profit-driven costing businesses a fortune. These concerning issues have forced agencies spending a good amount to ensure information security. Researchers believe in a three-pronged approach to meet these threats. Technology, Regulation and Education might be the answer to them. (Martinelli, 2006) Technical security measures fall into three primary categories: Network Security, Host-Application Security and Subscriber Access Security. Message encryption, Firewalls, Prevention of Denial of Service (DoS) attacks, Spam prevention, Access Control, Server Security are examples of various technical policies in place to counter threats. DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF) to sign e-mails, along

Monday, February 3, 2020

Total Integration Essay Example | Topics and Well Written Essays - 2250 words

Total Integration - Essay Example Technology played a big role in setting the pace for these changes. As we approach the era of globalisation and liberalisation, and the channels of communication become diverse and more consumer friendly, reaching out to the customer is not considered the task of marketing department in isolation. Now the customer can be reached through the online route, different types of web-services etc. besides the traditional methods like media advertising, sponsorships, word of mouth publicity etc. Now an increasing emphasis is being laid on creating goodwill amongst the existing as well as prospective customers. Such efforts require that an integrated approach is adopted towards the ultimate objective. Total integration strategy is a broader term which involves an integrated approach in dealing with human resources, manufacturing, marketing, R&D and other supporting wings of the business entity. Environmental concerns and philanthropic efforts have also become integral parts of the creating goodwill and adding more market space. In addition to adding more features, value addition becomes the key component of product differentiation. Market led forces necessitate that the company should come out with a product which appeals to the customer's requirements. Piercy (2002) points out that total integration calls for change in thinking of the company from the traditional functions like marketing, sales, production etc. to the need for seeking active cooperation and coordination from all the stakeholders in the business. Such an approach in fact divides the marketing function also in four different segments namely; Integrated or Full service Marketing Departments: Such marketing departments are the one's which have become a norm now a days. Value addition and customer care happen to be the topmost priority in these types of marketing wings. Lack of adequate time, a fast life, range of available other brands in the market and evolving needs of the customer necessitate such an approach on the part of the manufacturer and the service provider. The emphasis in such an approach is not on operational effectiveness, but on value addition and other effective strategies instead. Porter (1996) points out that, for a company to outperform its rivals it has to establish a difference and subsequently to preserve it. This can be done in a effective manner by delivering a greater value to the customer, creating comparable value at lower cost or to do both. The full service marketing departments are not only meant for soliciting sales orders, but they also have the added responsibility of reaching out to the c ustomer, by integrating marketing campaigns or otherwise. In view of added responsibilities to such department Piercy (2002) states that such departments can wield 'clout' in the company affairs. In fact while product differentiation is key to an integrated approach, the evolving nature of core competencies has also become the hallmark of globalisation and competitive era. Nicholas (1996) also points out towards the changing nature of core competencies when he points out that Core competences can indeed deliver sustainable competitive advantage, but with competitor making inroads into the turf and affecting the needs of the customer, a phase invariably arrives when companies are supposed to unlearn these competencies and a company which can move easily through such a transition process find the sustainable business goal rather easily.