StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

Security, Crimes, Compliance and Continuity of IT in Enterprises - Case Study Example

Comments (0) Cite this document
Summary
This case study "Security, Crimes, Compliance and Continuity of IT in Enterprises" analyzes Amazon.com with particular reference given to the firm’s data protection policy, information security vulnerabilities, risk management, network security, internal control and compliance.   …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Security, Crimes, Compliance and Continuity of IT in Enterprises
Read Text Preview

Extract of sample "Security, Crimes, Compliance and Continuity of IT in Enterprises"

Download file to see previous pages The major priorities of modern online marketers because the loss of personal customer information/data may adversely affect the credibility and brand loyalty of the organization. Recently many leading online marketers have faced lawsuits as a result of the violations of the stated customer privacy policy. This paper will perform a study about security, crime, compliance, and continuity in Amazon.com with particular reference given to the firm’s data protection policy, information security vulnerabilities, risk management, network security, internal control and compliance.
Amazon.com is a multinational e-commerce company headquartered in Seattle, Washington, United States. The company was founded by Jeff Bezos in 1994. Currently, Amazon is named as the world’s largest online retailer with a strong presence in the consumer electronics sector. Although the organization began its operations as an online bookstore, it quickly grew to a world’s leading retailer of CDs, MP3 downloads, video games, computer software, apparel, and food and toys. As Samhain (2014, p. 19) notes, Amazon Kindle e-book reader and cloud computing services are some of the widely recognized innovations of the company. In addition to offering shipping services to several countries, Amazon maintains distinct websites for countries including the US, UK, Canada, Spain, Italy, Germany, France, China, and Japan. The company’s fast and stable growth throughout its corporate history could be attributed to its innovativeness and strategic management efficiency. As of 2013, the company had revenues worth US$ 74.45 billion and a net income of US$ 274 million (Jar Creative, n.d.).
Protecting data and business operations is of great significance today in the context of the growing intensity of malware attacks, personal data theft, and credit card fraud. According to Wallace (2013), recent experiences indicate that even the name and contact number of a customer can help hackers or intelligent people. ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security, Crimes, Compliance and Continuity of IT in Enterprises Case Study Example | Topics and Well Written Essays - 2250 words, n.d.)
Security, Crimes, Compliance and Continuity of IT in Enterprises Case Study Example | Topics and Well Written Essays - 2250 words. https://studentshare.org/information-technology/1827964-security-crimes-compliance-and-continuity-of-it-in-enterprises
(Security, Crimes, Compliance and Continuity of IT in Enterprises Case Study Example | Topics and Well Written Essays - 2250 Words)
Security, Crimes, Compliance and Continuity of IT in Enterprises Case Study Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/information-technology/1827964-security-crimes-compliance-and-continuity-of-it-in-enterprises.
“Security, Crimes, Compliance and Continuity of IT in Enterprises Case Study Example | Topics and Well Written Essays - 2250 Words”. https://studentshare.org/information-technology/1827964-security-crimes-compliance-and-continuity-of-it-in-enterprises.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security, Crimes, Compliance and Continuity of IT in Enterprises

Continuity Planning

...Security Crimes Compliance and Continuity of IT in Enterprises... Security Crimes Compliance and Continuity of IT in Enterprises... Planning" is the strategy a company has to adopt in anticipation of a disaster and also to recover everything lost if at all a disaster transpires. It takes care that the company's normal operations and business run as usual. That is fundamentally important. The losses should be kept to a minimum. The top brass of the company meet and discuss in advance and finalize the steps to be taken in case of the calamity. In fact they envisage and prepare for not just one but more catastrophes. The duty and responsibility of each authority of the company is defined. The actions to be taken to recover items likely to be...
3 Pages (750 words) Essay

Crimes

...Security Crimes Compliance and Continuity of IT in Enterprises... Security Crimes Compliance and Continuity of IT in Enterprises... Head: CRIMES AGAINST THE PERSON "MURDER", CRIMES AGAINST PROPERTY AND CRIMES AGAINST THE Catrina Jensen POL 303 The AmericanConstitution Presented to Amy Donnoe February 15, 2010 Introduction "All crimes should not be equally punished as they have different weight making it necessary for the punishment given to match this weight" Crime is known to be an act or omission which is not allowed by criminal law and is usually punished by imprisonment or fine. There are two basic classes of law; there is criminal law and civil law. Criminal law is where the government prosecutes a person for an act or omission that...
6 Pages (1500 words) Research Paper

Australias Compliance to IMO and US Maritime Security Regulations: The Obstacles on the Way of Compliance

...Security Crimes Compliance and Continuity of IT in Enterprises... Security Crimes Compliance and Continuity of IT in Enterprises... Compliance to IMO and US Maritime Security Regulations: The Obstacles on the Way of Compliance Australia’s Compliance to IMO and US Maritime Security Regulations: The Obstacles on the Way of Compliance Introduction In spite of having several national maritime security organizations that are ethically in more or less sound harmony with the International maritime security regulations during the recent years Australia has been muddling through the pressing obstacles from the socio-political and, in some cases, the economic contexts of the country in order to achieve the highest possible compliance to the maritime secu...
9 Pages (2250 words) Essay

Business continuity for the White House security staff

...Security Crimes Compliance and Continuity of IT in Enterprises... Security Crimes Compliance and Continuity of IT in Enterprises... It is the duty of the security personnel and staff in the White House to make sure that there is a policy in place for the continuity and back up for the operations of the country. The purpose of the policy is to have in place a secure and outlined way of how to handle attacks or disasters in Whit e House by security staff. The details of the Government plans have been kept secret due to security concerns. Therefore business continuity of the security staff in the White House means the coordinated efforts and means by systems and personnel to make sure that the functions of the government continue to exist and be...
4 Pages (1000 words) Admission/Application Essay

Continuity of Operations Planning

...Security Crimes Compliance and Continuity of IT in Enterprises... Security Crimes Compliance and Continuity of IT in Enterprises... of Operations Planning al affiliation Continuity of Operations Planning The issue of cyber security is a serious issue that cannot be overlooked. With more and more people now using the internet, cyber security threat has become alive and the issue can no longer be overlooked. Yes, cyber security is one of the delayed issues that should have already been taken up by homeland security. This is because of the billions that are lost every year due to cyber security. Many organizations in the United States are going bankrupt due to cyber security. The government is losing the fight on cyber security and they should hand...
1 Pages (250 words) Essay

Compliance

...Security Crimes Compliance and Continuity of IT in Enterprises... Security Crimes Compliance and Continuity of IT in Enterprises... al Affiliation) The 2002 Sarbanes-Oxley Act (SOX) sought to curb financial ment fraud in American public companies. SOX define the executive’s financial and accounting responsibility. Wobbly Wheels (WW) Distribution Company is vulnerable to SOX compliance issue. The compliance issue might affect the company’s the information systems by defining the financial and accounting responsibility of the CFO. It might also determine the design of WW’s financial reporting requirements and financial reporting processes (Lane, 2011). SOX compliance issue might require the company to adopt and report on internal financial controls ...
1 Pages (250 words) Essay

Security, Risk, and Compliance

...Security Crimes Compliance and Continuity of IT in Enterprises... Security Crimes Compliance and Continuity of IT in Enterprises... This paper addresses network security, in the context of risk analysis and federal guidelines. The first part introduces the problem. The second part of the paper is a literature review, in which the current research regarding this problem is explicated and condensed. An analysis of the problem and the solutions follows. After that a discussion about the important issues, and how solutions might be implemented. Lastly, a conclusion that wraps up the entire paper. Introduction Network security is crucial to any organization. There are many threats that come from sources, both inside the organization and outside the ...
8 Pages (2000 words) Research Paper

Cyber Crimes and Security on the Internet

...Security Crimes Compliance and Continuity of IT in Enterprises... Security Crimes Compliance and Continuity of IT in Enterprises... internet has revolutionized business landscape given that the information highways created by digital technology make it possible for different types of businesses to be conducted online. This space is commonly referred to as cyberspace and is not affected by any geographical or physical barrier (Hofman, 17). The internet has also increased the speed with which business can be conducted online and this method is secure. However, there has been a growing concern about issues related to cyber security since there are numerous cyber crimes that have been reported in the media in different parts of the globe. As such,...
8 Pages (2000 words) Research Paper

Security, Audit and Compliance

...Security Crimes Compliance and Continuity of IT in Enterprises... Security Crimes Compliance and Continuity of IT in Enterprises... AUDIT AND COMPLIANCE due: Table of Contents Table of Contents 2 Basic definitions 3 Abstract 4 Introduction 5 Literature review 6 Principles of data protection Act 1998 on business 6 The impact & interaction with other related standards and requirements (e.g. ecommerce rules) 8 The success of the enforcement of the laws 10 Data analysis 10 Limitations of the UK personal data protection laws 11 Discussion of findings 12 Conclusion 12 Recommendations 13 Bibliography 15 Basic definitions 1. Monetary penalty notice - notice compelling an offender to pay a particular amount of money decided by the Information Commissioner ...
13 Pages (3250 words) Research Paper

Security Audit and Compliance

...Security Crimes Compliance and Continuity of IT in Enterprises... Security Crimes Compliance and Continuity of IT in Enterprises... Audit and Compliance. An evaluation of the factors that support and inhibit the creation of an information security culture within organizations. Name; Number; Course; Code; Date; Lecturer; Abstract In order to establish or create strong and reliable information security culture in an organization. It is important to identify factors that support and those that hinder the process of creating organizational information culture. The article provides the findings of a research on the evaluation of the factors determining the creation of information security culture in an organization. The research was done by carryin...
11 Pages (2750 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Security, Crimes, Compliance and Continuity of IT in Enterprises for FREE!

Contact Us