Wednesday, December 25, 2019

Creating A Good Product Strategy And Investing On...

Competing in a DataConomy world For most companies, competing is not a matter of just creating a good product strategy and investing on delivering high quality and consistent output: to successfully satisfy customers (internal or external), gain market share, increase profitability and grow the stakeholders value, companies need to unleash the power of each data point that is collected or affects the Supply Chain, the Market and the Resource Providers among other environmental players. Most companies understand the value of information and constantly call out the saying â€Å"Knowledge is power†; however, efforts normally stop on getting few transactional reports and a handful of scorecards without truly creating an organizational culture†¦show more content†¦The success of Microsoft strategy has allowed the company to constantly increase its market share, shareholders value and, ultimately, its growth in this competitive environment. However, Microsoft is not alone; similar giants such Google a nd Amazon constantly delivers new products in the BI space. This market dynamic has created in the last years a culture of BI that is only possible by the advances in technology, analytics frameworks and fierce competition. There is no doubt on the existing capabilities to consume data, transform it into insights and distribute it among the relevant business processes within the organization. Microsoft, Google and Amazon had created powerful tools to help organizations and teams to achieve what Davenport and Harris (2007) called Analytical Competitors, the highest level of the Five Stages of Analytical Competition. Subsequently, the topic to elaborate in this white paper is not about the existence of Business Intelligence capabilities or the access of Microsoft to them, but the usage of such capabilities within the numerous teams and business processes within Microsoft. Usage of Analytics as a competitive strength for Microsoft Thanks to its line of businesses, Microsoft has a privileged position to compete on analytics: the company creates the products adopted by many other organizations to compete on analytics, to have access to vast amounts of data, to understand how to store,Show MoreRelatedSix Sigma in the Contemporary Business Environment3430 Words   |  14 Pagesrecognize the quality of products or services, rather than just looking at the price. As competition between organizations grows more intense, many different factors and dimensions would be considered by the customers when they are going to measure the quality (Stevenson, 1999). In order to remain competitive among those rigorous competitions in the dynamic changing business environment, organizations have to maintain and enhance the quality of the products or services being delivered. â€Å"Quality is consistentRead MoreMarketing Techniques Used By Birla Sun Life And Hdfc Life Essay2977 Words   |  12 Pagescommunicating the value of a product or service to customers, for the main purpose of selling that product or service is known as marketing. The science of choosing target markets through market segmentation and analysis, and understanding consumer behavior while providing superior customer value to the customers is termed as Marketing Management. It can be looked at as one of the most important of the organizational functions and a set of processes for creating, communicating and delivering the value to theirRead MoreMarks and Spencer Financial Principles3125 Words   |  13 PagesIntrodruction Plc (Mamp;S) is an international retailer which is currently operating in 34 countries and has established over 600 UK stores as well as over 219 franchise stores. Mamp;S sell high quality, great value clothing and home products as well as outstanding quality food. Around 21 million customers visit our stores each week and we have 78,000 employees across the UK and 42 territories globally .The company trades in clothing, home furnishings and foods. The company’s corporate objectiveRead MoreCadbury and International Business5868 Words   |  24 PagesOverall Culture 8 International Trade Operations 10 Strategy and the Firm 11 Value Chain Activities 15 Primary Activities 15 Support activities 17 Value creation 18 Location Economies 19 Core Competency 20 Organizational Architecture 21 Organizational Architecture 21 Corporate Culture 21 Structure 23 People 27 Incentives and Controls 29 Competition, Strategy and Structure 30 Organizational Change 31 Entry Strategy and Strategic Alliances 32 Recommendations 35 WorksRead MoreMondi: An International Packaging and Paper Group2995 Words   |  12 PagesStrengths 3 Weaknesses 3 Opportunities 4 Threats 4 CURRENT MARKET SITUATION 5 Market State in the World 5 Branches in Other Countries 5 IT POSITION 6 IT SYSTEM OF THE ORGANISATION 6 System Risks 6 Security 7 Recovery 8 FUTURE STRATEGY 10 CONCLUSION 11 REFERENCES: 12 COMPANY HISTORY According to Mondi Group website, 2013, Mondi is an international packaging and paper Group, with production operations across 30 countries and over 25,700 employees. Its key operations andRead More Mondi: An International Packaging and Paper Group2988 Words   |  12 PagesANALYSIS 2 Strengths 3 Weaknesses 3 Opportunities 4 Threats 4 CURRENT MARKET SITUATION 5 Market State in the World 5 Branches in Other Countries 5 IT POSITION 6 IT SYSTEM OF THE ORGANISATION 6 System Risks 6 Security 7 Recovery 8 FUTURE STRATEGY 10 CONCLUSION 11 REFERENCES: 12 COMPANY HISTORY According to Mondi Group website, 2013, Mondi is an international packaging and paper Group, with production operations across 30 countries and over 25,700 employees. Its key operations and interestsRead MoreTata Ace Case Study Solution3110 Words   |  13 Pagesfacilities i.e.-Roads Medium and high commercial vehicle industry has seen significant slowdown while LCV industry is still experiencing growth. To overcome the slowdown OEMs have started investing in more research in technology, design, innovation, increasing the reach and increasing the standard of aftersales service instead of investing in expansion of output facilities. Some international OEMs like Daimler (Bharat Benz), MAN motors, VE motors and Scania are Investing and expanding in India. InternationalRead MoreInformation Managemewnt6746 Words   |  27 Pages | | |8 | | 3.2 – Supplier Power | | |8 | | 3.3 – Threat of substitute products | | |8 | | 3.4 – Threats of new entrants | | |9 | | 3Read MoreA Critical Evaluation of Amazon’s Strategy, Strategic Choices, Structure, Systems and Culture7541 Words   |  31 PagesSchool | Amazon.com A critical evaluation of Amazon’s strategy, strategic choices, structure, systems and culture Authored by: L. Gounden, C. Hendrikz, R. Ligault, M. Louw, P. Mathopa, A. Omer, S. Patamadai V. Pillay Date: September 22, 2008 TABLE OF CONTENTS 1 Introduction 5 2 Q1. STRATEGY 5 2.1 THE EXTERNAL ENVIRONMENT 6 2.1.1 MACRO ENVIRONMENT 6 2.1.2 Industry environment 9 2.1.3Read MoreTata Ace Case Study Solution3116 Words   |  13 Pagesfacilities i.e.-Roads Medium and high commercial vehicle industry has seen significant slowdown while LCV industry is still experiencing growth. To overcome the slowdown OEMs have started investing in more research in technology, design, innovation, increasing the reach and increasing the standard of aftersales service instead of investing in expansion of output facilities. Some international OEMs like Daimler (Bharat Benz), MAN motors, VE motors and Scania are Investing and expanding in India. International

Tuesday, December 17, 2019

The Method Of Instruction That Physics Teachers - 876 Words

The method of instruction that physics teachers employ to educate their students varies from teacher to teacher with many different approaches that they deem more efficient, engaging, and enriching opposed to other methods. The over-reaching aspect the methods of instruction primarily are based from two aspects of delivering information: A univocal approach to delivering and educating students utilizes the instructor’s prowess with physics directing and leading their students and the dialogical approach of guiding students towards the learning goal. The learning theory encompasses the reasoning behind why teaching and learning is approached in such a broad manner and the influences that go into the relationship in order to best benefit learning. Over time, students vary with how they best learn with the technology and ever- changing world around them. Therefore, instruction should be suited to change with it. These two articles point towards a general concession: that learning and teaching should not depend on one approach, but many directions and angles in order to effectively reach as many students as possible. The aspect of either instructing a course with a univocal or dialogical approach seems too clear cut and standardized when it comes to specific subjects. Math subjects have tended to lean towards teaching the content through a direct and specific univocal approach, one that the individual teacher has honed over the years as a lecture that gets repeated every time.Show MoreRelatedComputer Related Technology Use The Force Concept Inventory1336 Words   |  6 Pages In Computer-related technology use in the high school physics classroom: A case study, the study was done with a focus on qualitative data, but the Force Concept Inventory (FCI) was administered to students and analyzed to add a quantitative component to the study (McClure, 1996). The copy of the Force Concept Inventory in the study shows that it focuses on material from the first half of a physics curriculum, such as Newton’s laws, kinematics, and uniform circular motion. The study Assessing theRead MorePersuasive E ssay : Ineffective Physics999 Words   |  4 PagesIneffective Physics Worksheet Most of the teachers follow a new style of teaching, which requires students to work in groups in order to benefit from each other. However, this style can be ineffective if the text that is provided to each group does not have clearly stated guidelines. It also can be ineffective if it does not specify who should work with whom, especially in science classes where the abilities of one person varies from another. In most of these cases, one or two of the members takeRead MoreTeaching And Assessment Is Important842 Words   |  4 PagesDefining what a teacher should know about the subject that he or she is teaching is highly debated in and of itself. Moreover, there is no consensus on what knowledge is required for proficient teacher practice. Studies suggest that these domains of knowledge are actually interrelated and simultaneously independent. This means that we know that the knowledge that teacher has in physics informs his or her knowledge of the most appropriate methods of sup porting student learning of physics, and vice versaRead MoreThe Limitations Of Science Education1394 Words   |  6 Pagesand equipment. When school has a budget problem it can’t insure all material necessary to science learning, as we know in science each activity has a different type of material its depends on the topic. Sometimes we need a material in Chemistry, Physics or Biology to explain well an activity but the budget of the school can’t support it because it’s very expensive, especially if this material can be used only for one time. This create a big limitation that affect student learning because by practicalRead MoreResearch On Students Learning1100 Words   |  5 PagesResearch on students’ learning in physics classrooms has indicated that there is a noticeable gap between the objectives of the physics instructors while implementing the traditional instruction and the level of students’ conceptual understanding (Heron Meltzer, 200 5). â€Å"Physics Education Research (PER)† groups aim to overcome the challenges of traditional instruction by developing new instructional methods and materials in order to teach more effectively (McDermott Redish, 1999). Several studiesRead MoreA Student Survey of Mechanics Test Data870 Words   |  4 PagesInteractive-Engagement vs. Traditional Methods: A Six Thousand-Student Survey of Mechanics Test Data for Introductory Physics Courses (A Research Journal Critique) In partial fulfillment of the requirements in Physics 501: Theoretical Mechanics during the First Semester of the school year 2008 – 2009 Maria Jocelyn T. Claridad Master of Arts in Science Education with Specialization in Physics Prof. Antriman V. Orleans October, 2008 Interactive-Engagement vs. Traditional Methods: A Six Thousand-StudentRead MoreM4 Research Design Critique Report1143 Words   |  5 Pagesexperimental design would be: What are the differential effects of two different instructional methods, problem based learning and lecture based learning, on the understanding of physics topics on forty students in high school physics. To address concerns of internal validity, two classes of students with a similar learning history and student demographic will be utilized; also, both classes will be taught by the same teacher. To address concerns of external validity, students in both populations will not beRead MoreThe Importance Of The Philosophy Of Science865 Words   |  4 Pagesthem to learn. Teachers have to be creative in their environment to make sure communication takes place between all involved. In science students have to be able to break down words to understand the meaning. Hume’s (2009) basic principle is that the meaning of ideas is best discovered by putting them to an experimental test and then observing the consequences. The use of physics experimentation toRead MoreThe Effect Of Practical Work On Students Performance9732 Words   |  39 Pages EFFECT OF PRACTICAL WORK ON STUDENTS’ PERFORMANCE IN PHYSICS AT SECONDARY SCHOOL LEVEL IN MURANG’A EAST SUB-COUNTY, KENYA. MUCHAI AUGUSTINE NG’ETHE REG. No. E83/20087/2012 A RESEARCH THESIS SUBMITTED IN FULFILLMENT FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN THE SCHOOL OF EDUCATION DEPARTMENT OF EDUCATIONAL COMMUNICATION AND TECHNOLOGY OF KENYATTA UNIVERSITY JANUARY 2014 DECLARATION I declare that this research thesis is my original work and has not been presented for a degree in anyRead MoreBeing Evaluated Can Be A Scary Procedure821 Words   |  4 PagesDomain 1 focuses on the planning and preparation that I must do before I even begin teaching the material to the student. I choose to do an overall look at myself, regardless of the fact that one subject I teach in science is new to the district – Physics. When planning and writing lessons for my students I try to make sure that I read and research more material than the textbook presents. I surf websites and read books that could enhance my presentation of the content. I rated myself in 1a as proficient

Sunday, December 8, 2019

Bring Your Own Device Organizational

Question: Discuss about the Bring Your Own Device Organizational. Answer: Introduction: BYOD is a new technological policy or strategy used by companies to allow their employees to bring their own devices to the workplace and access privileged information or applications. Moreover, BYOD is also known by other names such as Bring Your Own Technology, Bring Your Own Phone (BYOP) and even Bring Your Own Personal Computer (BYOPC). In essence, the name signifies the device incorporated by any given organisation and with the current trends and advancements in technology have seen billions of devices in use, this technology is surely set to rise. Nevertheless, in the definition one is a key item, policy, is very important to its definition. Policy signifies the mandate, authority and even authentication accorded to these individually owned devices (Millman, 2013). As an Information and Technology concept, BYOD is used as a consumerization technology, where resources are used to access certain services. Furthermore, similar strategies are used by other organisations to lower op eration costs, for instance in schools where students are allowed to use their own devices to access class material. Aztec management has seen a substantial increase in customer demands which has increased the number of employees. Acquiring new resources such computers, tablet and mobile devices etc. could prove costly. However, allowing each employee to bring their own device to the workplace and use it to perform their roles is financially sound. In fact, consider the following, according to current estimates, the number of mobile devices in the world over the next five years will be more than 10 billion. These numbers translate to 1.5 devices for every man, woman and child across the planet (ER, 2013). So, why not take advantage of these readily available devices to supplement a companys resources, its financially sound and meet the objectives set. In addition to this, people are increasingly using their devices to perform a basic task which has greatly embedded mobile devices into all aspects of life. Similarly, employees are preferring to use their own devices to perform workplace-related tasks, where they want to synchronise their routines into one big device. This phenomenon is becoming increasingly common that most employees in big corporations are requesting the IT departments to incorporate them (ER, 2013). Now, consider the advantages of this, employees are continuously motivated when they feel included into companys policies. In return, they perform well and maintain high standards of professionalism. However, employers such as Aztec must realise that its hard to separate personal roles and workplace agendas, therefore measures must be put in place to cater for these requirements (CIO Council, 2012). Merits of BYOD According to Wainwright (2016), BYOD increases worker satisfaction as the employees are no longer stuck with the old or boring IT issued devices. They are free to use their devices which are up to date (which also is another merit) and can modify them at will. Secondly, it saves money while increasing productivity. Thirdly, all the devices used are up to date and meet companys objectives at no extra cost. Finally, BYOD encourages after hours work engagement. An employee is likely to answer a query from a customer if he or she use her own personal device as they feel free and in charge of the entire process (Willis, 2013). BYOD review in the Financial Sector Employees using their own devices to access workplace networks is an inevitable phenomenon in any industry, however, this technology brings with it a lot of compliance concerns (Computer weekly, 2016). The financial sector is a critical industry where data stored by its institution is highly delicate and requires the highest form of security. One of BYOD industrial regulation policy concerns the loss of data if a device is lost. BYOD policies call for stringent scrutinization of mobile devices for companies in the financial and health sector. However, according to Littler Medelson (employment lawyer) the shift of IT policies from corporate-owned to personal/employee owned policies clashes with most important government policies. For proper and adequate scrutinization, a persons private data must be accessed, this goes against all laws of privacy and personal security concerns. Nevertheless, a company like Aztec must employ careful assessment measure within the Australian laws to meet the basic BYOD data policies (Hanover, 2012). Aztec can also develop its own private security measures to meet the demands of their operation. Since traditional security compliances fail to meet the demands of BYOD, the conventional way to fulfil this mandate is to use Mobile Device Management (MDM) software or policies. However, even this consideration can fail if the devices are jailbroken, but MDM can detect the process, therefore promote a solution. Furthermore, for a financial institution they must comply with the Payment Card Industry-Data Security Standard (PCI-DSS). This includes protecting customers data and that of the company. To meet this requirement, the following items must be met, otherwise referred to BYOD best practices. BYOD best practices Protect customers data especially their cardholder information, this objective can only be met through encryption of transmitted data. Moreover, transferring cardholder information to BYOD violates all PCI-DSS laws, therefore this process should be prohibited and considered a violation. BYOD devices should never download card holders information, this is the single most important BYOD best practice. Secondly, Aztec should implement strong access procedures to any of its databases or systems. All mobile devices used should have strong passwords only known to the users. Furthermore, restrict access to companys information via a business need to know basis, this will act as an additional security measure to card access restriction. Thirdly, monitor all employees activities by tracking their network access routines. Moreover, accurate and auditable logs should be maintained, this records can then be used to search for cardholders information or violations. In addition to this, the company should maintain an active and strong information security policy. For these policies to work, employees must be educated on the security measures such as reporting lost devices Finally, when all is said and done respect the employees privacy. Regardless of the security measures, if the employees feel compromised they will communicate through different channels which will compromise the entire system. BYOD regulation compliance is important and must be considered at all cost, this includes basic item not mentioned such maintaining an active antivirus software in the devices used, use of automatic device locks and individual user authentication. These simple yet strong security measures can be the crucial security guard against malicious individual with the intentions of harming a companys reputation or data (Winn, 2015). Projects impact on Aztecs IT security measures A financial institution/company like Aztec must have the strongest and most recent IT security measures. For one, any data transmitted by its system concerns customers and their finances or is the actual finances themselves. Therefore, an unauthorised access to this information could prove detrimental to the companys reputation, especially its service delivery charter. BYOD proposes several changes to access policies that largely affects the current Aztec security policies. When implemented Aztec will have to reconsiders its IT policies, modifying them to meet the new demand brought by BYOD. For one, the full control exhibited by Aztec over the devices used by employees will be lost. Now, the employees will expect to have their own devices and also have increased freedom to do their work wherever and whenever (Pearson, 2014). Furthermore, the current trends in technology have led to the rapid diversification as well as changes seen in different business sectors. Today, employees are required to be more flexible to meet their mandated tasks. Moreover, their productivity is also determined by how they associate with their employers and this has led many of the employers to implement strategies that improve their mutual association. BYOD meets most of these strategies by offering lay way between personal life and work agendas. In addition to this, it bridges the gap between employers and employees who now have a better professional association. However, BYOD as seen above completely changes a companys operation structure. First, consider the impact it will have on application and more so the usage of these applications, both personal and professional (work-related) applications. It is difficult to manage the applications accessed by an individual using his/her own device, not unless his accessing them using the organisations network. In such a scenario, the user is likely to access malicious websites and applications that later affect the organisations system or applications (Subhani, 2016). This unregulated access is a strong security threat to a companys data more so, an institution in the financial sector. Data is the single most important commodity in the modern society, in fact, its access, use and interpretation are used to run all modern day organisations. An Aztec employee could download a malicious application which later is able to download customers information, a major security violation. Secondly, we have lost or stolen mobile devices. It is common for a person to lose their device and has little concern over the item. The lack of concern may be due to the information stored or more precisely lack of information. However, for an Aztec employee who regularly accesses the companys system using his device, a loss of this device could stand the risk of unauthorised access if not well protected. Furthermore, consider a lost device used by an unauthorised individual to access a companys information. Aztecs security measures would have to change to incorporate these new possibilities, where a person potentially loses a device. Automatic countermeasures such as automatic locks, access locks and data encryption among others would have to be considered (Garba, Armarego Murray, 2015). These vulnerabilities are just but a few of the many concerns that are presented by BYOD which means a company implementing the concept must adapt to fulfil all the necessary security and company policies. To reduce legal liabilities among other risks a company must analyse their existing security policies to determine how they affect employees who will use their own devices. Some of the policies to be considered include; data classification policies, mobile device access policies, encryption policies and privacy policies among many others. This process may cost time and money but are critical for the success of the new strategy. Moreover, remember there is a big difference between company-owned devices and personal/employee owned devices. It is possible to implement security measure to protect the data accessed by each one of these devices, but the procedures employed must be different for them to work effectively. For instance, Aztec may have to introduce special software that is u sed by employees devices to access a companys information. Such Softwares are used to provide additional security to the mobile devices (InfoLawGroup LLP, 2012). Another impact of BYOD on Aztec security measures or procedures is the alteration in employees privacy requirements in order to fit the new technology. When commissioned the devices used to access personal information will also be used to access a companys information. A number of violations may be made while conducting business or personal business, for instance, consider police officers in the U.S. who were accused of using work devices to text their loved ones (ILG post, 2012). Similarly Aztec will have to consider such scenarios where an employee intentionally or unintentionally violets either professional or personal codes of conduct. Privacy and BYOD depend on how an organisation monitors its employees, its common for an organisation to track employees activities while using the companys network. These procedures are made possible by the devices issued (company devices) and the access control measures in place. However, how do you accomplish the same without having your own dev ices as a company and without infringing on the personal privacy rights of your employees? Possible solutions may lie in authentication, authorization and with the use of special software used to access a companys information. These Softwares can then be monitored to track employees activities. Finally, consider the statistics provided by Trend Micro in 2012, where more than 93 percent of all BYOD devices (tablets, mobile phones, computers etc.) used to access corporate information lack the necessary security systems. This data shows the control offered by BYOD, it does not only reduce an organisational control but also makes it difficult to enforce policies and regulations. Moreover, according to Goode (2012) attackers continuously exploit the vulnerabilities seen in BYOD devices to access organisation information. These exploitations are possible because our current security systems lack the necessary tools to deal with the current trends in technology. Traditional security methods such as host-based firewalls and even the famous content based firewalls cannot meet the demands or threat of mobile based devices. However, organisations cannot prohibit BYOD technologies or concepts because of the threats, instead, they must implement top-notch security measures while maintai ning a high priority on privacy and access control. Risk Assessment based on the threats, vulnerabilities and consequences BYOD presents many advantages over the existing ICT technologies but like any other technologies these merits are also accompanied by several limitation or risks that may reduce the efficiency of the said technology. In the previous section, we did highlight the impact of BYOD on an organisation and more particularly Aztec. In doing so, we did mention some threats of BYOD e.g. malware attacks, loss of data and an unauthorised access. In this section, these threats among others are analysed and in addition to this, we also outline the vulnerabilities and consequences of using BYOD. Social engineering and phishing attempts are a common risk associated with BYOD. Attackers use clever deceptions to acquire private information from unsuspecting individuals e.g. through emails where people are prompted to enter their details. BYOD poses a serious threat to this form of attack as the employees using their own device will access different websites and applications that are not monitored (Dodge, 2007). Aztec may have the necessary precaution to prevent access to a malicious website but may lack the same control when the user device are connected to other networks. In effect, a companys data may be at risk when the affected device is reconnected to the companys network. Similar to phishing, Malwares are becoming predominantly familiar because of mobile devices. Malware target users information or damage the users device. Mobile devices such as those used in BYOD are routinely infected with malware such as viruses, worms, botnet and Trojans because they have basic securi ty measures. In addition to this, users are continuously promoted to install applications that later infect their devices. This malware can command and communicate with an unauthorised user while avoiding a companys IT security measures. Interception of data is another threat posed by BYOD more so spoofing where data is intercepted and modified. Aztec in its daily activities transmits a lot of information via their encrypted channels be it VPNs or otherwise. A mobile device with its limited access control protocols is likely to be spoofed and information sent to the wrong recipient. Furthermore, the same devices can be used to create rogue access points that have limited access control protocols. A companys network even with its encryptions can be compromised if someone gains access to their system or even access to a device physically connected to its VPN networks. However, interruption of data is more profound in wireless access networks. Fraudulent access points encourage a user to connect their devices which later are used to exploit them. Moreover, secure access point protocols are now affected as fraudsters has found a way to compromise them e.g. Hole 196, a vulnerability identified in WPA2, the most common WI- FI security protocol (AirTight Networks, 2010). Company policies that target the employees activities are another serious vulnerability issue that can have grave consequences. A BYOD device can be easily accessed using its vulnerabilities when a user violets any of the set policies and rules. In fact, an employee may lack malicious intentions but owing to their ignorance or carelessness expose a companys data where an attacker capitalises to access the information. An attacker may promote an Aztec BYOD device to disable its firewall or setting in order to have improved speeds and performance rates. An unsuspecting user, tired of the speeds (due to access control e.g. proxy use) will disable said firewalls to have improved speeds, as a result, the attacker will have a way into the companys systems. A good example is this is the Citigroup financial company attack where data from thousands of customers was leaked because an employee used a simple peer to peer software found in BYOD devices (Masin, 2013). Factors that increase BYOD risks, vulnerabilities and their consequences Many factors may increase the occurrence of BYOD risk as seen in the risk assessment done above. Allowing corporate or company information to coexist with personal information is one of these factors. It becomes difficult to maintain a strong corporate structure filled with strong security controls while maintaining user privacy requirements. Furthermore, when the devices used are personal devices, the control procedures become contentious, to say the least. A company may struggle to balance corporate and personal life, which is then exploited (vulnerability) and used to access vital customer information. Grave consequences may follow for instance leakage of information as seen in the example given above (Gajar, Ghosh Rai, 2013). IT departments find it difficult to support users using different devices using different systems. One user may use a windows device while the other an IOS device, moreover, the problem is made more difficult because of the constant updates given and the different operating versions produced each day. In such a case, an administrator may apply certain access control procedures that work differently in different systems. The consequence of this is an inefficient control procedure filled with bugs and constant failures. These failures can slow a companys system, slowing their service delivery mechanisms (Rose, 2013). BYOD risk comes with many serious consequences, in fact, according to the Industrial report (French, Guo Shim, 2014), more than 60 percent of modern day companies risk the consequences of BYOD risks. To start, confidential data stored in e-mails, spreadsheets, applications and users accounts can be easily lost if a device is lost or stolen. Furthermore, according to the same report almost half of the companies allowing BYOD concepts have experienced a breach in their systems. On top of losing their data, these breaches violet may compliance policies and laws, making the companies liable for legal suites. Finally, like the two sides of a coin, BYOD may have a good balance between work-life activities however, some people develop serious work related issues where they work all the time. Such people have difficulties in maintaining serious relationships as they bring their work to all personal activities, even on leisure holidays. As a result, they develop severe work-life conflicts th at develop into stress, eventually slowing their work productivity (Singh, 2012). Data Security and BYOD Data security is the chief concern of BYOD technology as its access (data) can prove detrimental if wrongly accessed. In Aztec case, one type of data should never be used in BYOD devices i.e. confidential cardholder information. Before addressing the types of data to be used by BYOD, this exception must be made. Customers rely on confidentiality to protect their assets and with BYOD devices, this confidentiality is at risk. However, the companys employees could use messaging services where e-mails and other relevant data is involved. Moreover, control information would also have to be used to regulate the flow of information. In essence, the users would have to comply with the companys data protection policies and obligations. Access to information, on the other hand, would be restricted based on authorization provided. Certain staff members would have increased access than other just like in any other control features. Furthermore, access would be limited to departments or faculty departments. These segmentation mechanisms would help monitor the BYOD system and ascertain for security. Moreover, its advisable to have special Softwares or applications to be used to access a companys information. For instance, consider an accounting department where a special application Aztec_accounts is used to access its databases. This system would be closely monitored irrespective of the device used to access it. In terms of data flow, all relevant company information would have to flow via encrypted channels, for instance, VPNs. Virtual Private Networks (VPN) are a secure way of accessing an organisation information via the internet (Ogie, 2016). For Aztec to meet the minimal data security requirements, they must encrypt all the data they use irrespective of the source, destination and channel used. In addition to this, a good BYOD policy must be set and it must include MDM concepts. These concepts allow IT professionals to have the capability to access any device that is able to access a companys information. This IT access can help a company revoke access to sensitive information and even wipe out an entire device in case its lost by the owner. In addition to VPNs stated above, data flow should be restricted to specific data identifiers, for instance, certain mac-addresses. Furthermore, the company should establish multiple authentication procedures for devices accessing company information. This strict authentication procedure can be accomplished using an Identity Access Management (IAM) solution. IAM is a solution that allows an organisation to have a two-factor authentication procedure, therefore, for a person to access data multiple authentication procedures are requested. This procedure is vital as they ascertain to the authenticity of the user i.e. device does not fall into the wrong hands with the correct password or access (Smith, 2016). Finally, all relevant company information should be stored in a centralised location with access limited to the appropriate members. A central server is easy to monitor, including the data flow associated with it. Furthermore, centralised server can monitor daily activities and have logs detailing those who access them with their respective access time. Nevertheless, a centralised server should then be supplemented with secure transport encryption that is not easily intercepted. Strong transport encryption mechanisms do exist as they are commonly used by many collaboration platforms e.g. Skype and iMessenger. These transport encryption mechanism should be used by the company as a way of regulating data flow (Ogie, 2016). References Abubakar Bello Garba, Jocelyn Armarego David Murray. (2015). Bring your own device organizational information security privacy. ARPN Journal of Engineering and Applied Sciences. 10 (3). Retrieved 10 January, 2017, from: https://www.arpnjournals.com/jeas/research_papers/rp_2015/jeas_0215_1591.pdf AirTight Networks. (2010). WPA2 Hole 196 Vulnerability. Retrieved 10 January, 2017, from: www.airtightnetworks.com/WPA2-Hole196 Bitglass. (2013).PCI Data Security Compliance BYOD. Retrieved 10 January, 2017, from: https://cdn2.hubspot.net/hub/313952/file-704205437-pdf/Collateral/PCI-DSS-BYOD.pdf?t=1398711559627 CIO council. (2012). Bring your own device. A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs. Retrieved 10 January, 2017, from: https://cio.gov/wp-content/uploads/downloads/2012/09/byod-toolkit.pdf (2013). Insights on governance, risk and compliance. Bring your own device. Retrieved 10 January, 2017, from: https://www.ey.com/Publication/vwLUAssets/EY_-_Bring_your_own_device:_mobile_security_and_risk/$FILE/Bring_your_own_device.pdf Goode, A. (2010). Managing mobile security: How are we doing? Network Security, 2010(2), 12-15. doi: https://dx.doi.org/10.1016/S1353-4858(10)70025-8. Hanover Research. (2012).Regulatory Considerations for BYOD Policies. Retrieved 10 January, 2017, from: https://www.attachmate.com/solutions/in-response-to-your-mobility-demands/MobileDeviceManagement/RegulatoryConsiderationsforBYODPolicies.pdf InfoLawGroup LLP. (2012). The Security, Privacy and Legal Implications of BYOD (Bring Your Own Device). Information Law group. Retrieved 10 January, 2017, from: https://www.infolawgroup.com/2012/03/articles/byod/the-security-privacy-and-legal-implications-of-byod-bring-your-own-device/ Masin, J. (2013). Peer-To-Peer (P2P) File Sharing Risks. Retrieved 10 January, 2017, from: https://www.securedocs.com/blog/2013/02/peer-to-peer-p2p-file-sharing-risks/ Singh. (2012). B.Y.O.D. genie is out of the bottle Devil Or Angel. J. Business Manage. Social Sci. Res.1 (3), pp. 112, 2012. Ogie Robert. (2016). bring your own device: an overview of risk assessment. Faculty of engineering and information science. University of Wollongong. Retrieved 10 January, 2017, from: https://ro.uow.edu.au/cgi/viewcontent.cgi?article=6446context=eispapers K. Gajar, A. Ghosh, S. Rai. (2013). bring your own device (byod): Security risks and mitigating strategies. Journal of Global Res. Comput. Sci. 4(4), pp. 6270 Pearson A. (2014). The Impact of BYOD on Organisation Security. Security innovation Europe. Retrieved 10 January, 2017, from: https://www.securityinnovationeurope.com/blog/the-impact-of-byod-on-organisation-security Rene Millman. (2013). Surge in BYOD sees 7/10 employees using their own devices. ITPro. Smith Tom. (2016). BYOD Security: Expert Tips on Policy, Mitigating Risks, Preventing a Breach. Digital guardian. Retrieved 10 January, 2017, from: https://digitalguardian.com/blog/byod-security-expert-tips-policy-mitigating-risks-preventing-breach Wainwright A. (2016). 7 benefits of BYOD on enterprise wireless networks. Securedge networks. Retrieved 10 January, 2017, from: https://www.securedgenetworks.com/blog/7-Benefits-of-BYOD-on-Enterprise-Wireless-Networks Willis D. A. (2013). Bring Your Own Device: The Facts and the Future. Gartner. Retrieved 10 January, 2017, from: https://l1.osdimg.com/remote-support/dam/pdf/en/bring-your-own-device-the-facts-and-the-future.pdf Winn A. (2015). How Regulated Industries Can Successfully Use BYOD. OPSAWT. Retrieved 10 January, 2017, from: https://www.opswat.com/blog/regulated-industries-can-use-byod

Sunday, December 1, 2019

Scr Tims Essay Example

Scr Tims Essay To begin with, upon visiting SCR website I find that the SCR website accompanies the Shelly Cashman Series Systems Analysis and Design text and is a fictitious company used as the focus of a case study. Upon further review of the site, moving through the bulleted list, first entered was the Data Library. This has subsections for SCR Functions and Organization which lists committees and group members; SCR Training Records section has two sample months of training records that includes the company, contact person, phone, title of training course, etc, then there is a JAD Session Example, which is basically a written summary of the discussion of the joint application design meeting that is to launch TIMS (Training Information Management System). Sample of Questionnaire Results was noted, which was brought up during the JAD session meeting to send to a sample of former students and prospective students in order to determine what people liked and to find out what could be improved for future courses. There was also the Summary of Cost-Benefit Data, which is a data table of developmental costs, operational costs for the first year of operation, and revenue estimates, finally the SCR Network which shows a diagram of the new system which the committee members were really keen on. We will write a custom essay sample on Scr Tims specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Scr Tims specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Scr Tims specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Upon visiting the Forms Library it revealed a list of forms such as Request for Information Services, Preliminary Investigation Report, System Requirements Document, System Design Specification, System Requirements Change Request, and many more forms as part of the tools available to assist in completing projects for the course. The Resources Library has many categories to choose from including CASE (computer-aided systems engineering) tools, Communications Tools, Encyclopedia, Financial Tools, IT news, other links, Search tool, and Vendor that have links to other web sites all of which are valuable resources to complete assignment requirements. Next, a review of the SCR Internet Site was completed and this is the web site of the fictitious IT Consulting Firm utilized for this course. Finally, the TIMS work session was also visited and reviewed showing session by session information on weekly assignments. Overall, signing into the web site was quite easy and reviewing all the sections and subsections provided an overall view and comprehensive look at all the tools and methods to be used to carry out the design and implementation of an information system. Thus, the brief summary of the items found on the website ensures a thorough and successful examination was completed. IT Consulting is a field that focuses on advising businesses on how best to use information technology to meet their business objectives. In addition to providing advice, IT consultants often implement, deploy, and administer systems on businesses behalf. With this in mind, the results of Internet research the following are three IT consulting firms: First, Techsperts is one that provides effective, in-office computer help for all technological needs and has services offering a wide range of hardware, software, plus resolves network problems. The personnel in this particular company are experienced and industry certified with each having more than 5 years of experience in the competitive IT solutions industry (techspertsllc. com). Business services and solutions include wireless/wired network setup, adding devices to existing networks, computer maintenance and optimization, set up and installation of local or network printers. They also provide diagnostics for troubleshooting, backup solutions to protect all sensitive information on computers or databases with the ability to retrieve important materials immediately. Overall, Techsperts have the expert knowledge and experience for an IT consulting firm that has fast, friendly, and informative services. Now, Marathon Consulting helps business owners stay focused on keeping their business efficient and profitable through innovative IT Solutions. The goal for this company is to assist every client to achieve increased margins in their business by using information technology to enhance people and productivity gains. As experts, they are reliable and take all business needs seriously and at the same time recommend the perfect solution for each client. Some of Marathon’s services include backup and disaster recovery, proactive monitoring and maintenance, remote Help Desk, onsite/offsite data storage solutions, installing/maintaining network security, firewall management, network maintenance, VOIP system maintenance, and server administration. As well, Marathon offers virtualization and Cloud Computing because the traditional server-desktop infrastructure although still valuable in today’s businesses, the changeover to virtualization is quickly approaching (marathonconsulting. com). As a result, the demand from many software vendors is to have a single server for their application as this ensures that operations are at peak performance. However, the problem is with multiple applications, they require isolation, and the infrastructure grows unnecessarily and by providing this service, virtualization and Cloud Computing make sense and Marathon provides this solution. Finally, Dataprise IT Consulting considers factors in today’s IT projects to bring about more than just functional challenges, they work on issues such as security, scalability, redundancy, information architecture and speed of performance. In fact, these are just a few of the criteria that are evaluated in the early stages of planning an information technology project. Dataprise also has on staff an experienced team of IT consultants that handle projects large and small, from needs assessment through to implementation. Some examples of IT projects they specialize in include: Network Administration with design, builds, migrations, upgrades, Help Desks, Disaster Planning and Recovery, as well as Enterprise System Design. Enterprise computing systems refers to information systems that support company-wide operations and data management requirements (Shelly Rosenblatt, 2008). Other services include Network Installation and integration, Datacom Services, Network Security, consulting, special projects and an IT assessment. Without question, businesses can benefit from comprehensive, affordable and personalized IT services, support and solutions. References Dataprise it services for growing businesses. (2010). Retrieved from http://www. dataprise. com/services. spx Information technology consulting. (2010, October 18). In Wikipedia, The Free Encyclopedia. Retrieved from http://en. wikipedia. org/w/index. php? title=Information_technology_consultingoldid=391431537 Marathon consulting. (2010). Computer Consults NY. Retrieved from http://www. marathonconsulting. com/ Shelly, G, Rosenblatt, H. (2008). S ystem analysis and design, video enhanced. Boston, MA: Thomson Course Technology. Techsperts: business technology solutions. (2008). Retrieved from http://www. techspertsllc. com/services. php