StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Challenges and Security Issues - Research Paper Example

Cite this document
Summary
The paper 'Challenges and Security Issues' states that McAfee’s management contributed to the software problem in the broader sense that they failed to critically scrutinize the system’s update before authorizing its release to consumers. That procedure was necessary to ascertain whether the product could be detrimental to the consumer…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Challenges and Security Issues
Read Text Preview

Extract of sample "Challenges and Security Issues"

? Running Head: CHALLENGES AND SECURITY ISSUES Chapter 8: When Antivirus Software Cripples your Computers Question McAfee’s management contributed to the soft ware problem in the broader sense that they failed to critically scrutinize system’s update before authorizing its release to consumers. That procedure was necessary to ascertain whether the product could be detrimental to the consumer in any possible way. On the other hand, management failed to conduct a thorough research on MacAfee’s quality assurance procedures. This step is necessary in ensuring that they come up with a product that is free of any defect. Therefore, the organization failed to follow the standards laid down in testing the product before releasing it to the market. That led to the soft ware problem. Laudon (2011) says that in regard to technology, MacAfee’s system failed to detect possible dangers the product was posing to consumers using the windows XP and Service Pack 3, which was widely used in desktop PC configuration. In this case, technological factors played a significant role in MacAfee’s soft ware problem. Question 2 MacAfee lost a significant number of its customers as a result of the software problem. Actually, the company lost loyalty of its key clients after their computers crushed as a result of antivirus updates. According to Laudon (2011), the company lost most of its customers as a result of management’s sluggish response to the crisis, and the company’s initial effort to ignore the issue’s impact to the consumers. MacAfee’s reputation in the corporate business environment was dented as a result of its misleading reaction to the technical hitches on its systems. On the other hand, consumers’ businesses were affected as a result of their computers being crippled. According to Laudon (2011), this slowed down the normal operation of consumers’ businesses; hence leading to loses and idle time in labor. In addition, consumers incurred an extra cost of repairing their non-functioning computers. Question 3 In this context, MacAfee’s response was unacceptable. This is justified by the company’s sluggish reaction and their attempt to downplay the impact of the problem on its consumers. Moreover, the situation worse because of the company’s earlier misleading acknowledgement that a small number of its consumers were affected. This was contrary to the fact that a significant number of clients were affected. Question 4 MacAfee’s management should come up with a set of standards meant to ensure adherence to testing procedures. This will facilitate efforts meant to determining a product’s quality before being released into the market. According to Laudon (2011), this will help to curb any deterrent effect a product may have on consumers. Chapter 8: How Secure is the Cloud Question 1 With respect to the security problem of tracking unauthorized activity, this can be controlled using a cloud vendor. According to Laudon (2011), this is a public company whose mandatory requirement by law is to disclose how it manages information. On the other hand, the problem can be controlled by use of cloud vendor that allow subscribers to choose where their cloud computing work takes place. Question 2 People who contribute to security problems in the cloud include those who hack into data bases and try to access companies’ information. They do this despite the fact that information stored within the subject databases is unauthorized to them. According to Laudon (2011), these people pose a security threat to companies’ information as they subject them to unauthorized alterations. In addition, organizations contribute to unauthorized access as they fail to pay attention to their security practices. Laudon (2011) agrees that they fail to secure their infrastructure. Lastly, the high cost of technology contributes to security problems. That is because of the dynamics and high costs associated with advanced technology. Most firms cannot afford secure systems for them to store and back up there data. In this regard, the high cost of sophisticated systems is responsible for increase in security problems. Question 3 According to Laudon (2011), cloud computing is not fully secured. This is because some of its providers do not meet compliance requirement on market standards for security. An example is Amazon, which stated that they do not intend to meet those rules. In addition, Amazon’s management emphasized that they would not allow compliance auditors on their premises. In this context, cloud computing is facing challenges in trying to curb the unauthorized access of information on cloud. Question 4 In this case, I would clarify how they manage the information. This would help to confirm that data stored within the organization is secure. Secondly, I would identify and evaluate security aspects within premises where cloud computing work takes place. According to Laudon (2011), this will help in tracking the organization’s information from a specified location. Lastly, I would ensure that the cloud vendor meet current compliance requirement regarding security. Question 5 I would entrust my systems to cloud computing because of its lower upfront technology costs and that for additional services. In addition, it also works to improve systems by curbing security problems. Chapter 13: Are Electronic Medical Records a Cure for Health Care? Question 1 Management factors that emerge in setting up of EMR system include the looming challenge of small health care providers, and the inability to afford costs and time associated with upgrading their recordkeeping systems to EMR. Laudon (2011) adds that small health care providers are also facing the business problem of meeting expenditures of overhauling record keeping, which represent a substantial increase in their short-term budgets; hence causing workload to capital budget expenditure. According to Laudon (2011), technological factors affecting build up of EMR include the risk of obsolescence. This means that the EMR adopted at a given time face the risk of being outdated in the coming years. That would make the systems non-compatible and obsolete. In the process, this will hinder the national goal of information sharing by all health care providers. Other technological factors include challenges in developing an EMR that is secure, or that which guarantee privacy of patients’ information. Question 2 Small health care providers find it difficult to afford the expenses and time of upgrading their manual record keeping to digital. According to Laudon (2011), this is because the number of doctors and patients in these hospitals are significantly low, thus with their small budget they cannot afford to migrate to digital. Question 3 Physician work would be more tiring as it is difficult to operate a manual system as opposed to digital systems. This will translate to social impact on doctors in the sense that they will strain at their work place, leaving less time for their families and rest. On the other hand, hospitals would be less inefficient because of the bulkiness of work associated with a manual system. This would adversely affect a hospital’s business as it will be serving few patients per unit time. Socially, the hospital’s reputation would be dented as a result of its systems inefficiency. According to Laudon (2011), insurers will suffer losses as a result of their businesses being prone to fraud associated with manual systems. Patients will also bear the burden of long queues in the hospitals and slow services from health care providing institutions. Question 4 Digitalizing records will lead to efficient and improved services in hospitals. As a result, a lot of time would be saved. The time saved can be used by patients and doctors to engage in other productive activities, which eventually improve the country’s gross domestic product. In addition, digitalized records save the government a lot of money, which could be used in improving the general welfare of the society through provision of services like infrastructural development. Question 5 Physicians will spend less time in diagnosing patients as all information is available online. Patients’ vital medical data, which include personal information and full medical history, will be available in EMR. According to Laudon (2011), hospital administrative costs would significantly reduce with adoption of digitalized records. Question 6 Before EMR Step 1: Doctor writes down the prescription Step 2: The doctor manually looks for location of medicine in the register Step 3: Doctor pick the medicine from the shelf and hands over the medicine to the patient After EMR Step 1: Physician feeds the prescription into the computer Step 2: Physician checks the location of the medicine in the shelf from the computer Step 3: The physician picks medicine from the shelf and hands over to the patient Chapter 14: A Tale of Two is Projects Question 1 Airline reservation systems perform important services such as selling seats, collecting payments and allowing customers to book flights on airline’s website. Laudon (2011) say that airlines depend on reservation systems for their operational activities. Thus an efficient reservation system will allow fast and efficient flow of activities. On the other hand, inefficient reservation system leads to sluggish performance of operations. This would make an airline lose most of its customers. Airlines make their decision based on the efficiency of reservations. In this case, inefficient reservation systems would force a company’s management to initiate programs meant to implement systems change undertakings. Question 2 With respect to customer reactions, this comes into effect if an airline company succeeds in upgrading the systems without the customers’ knowledge. In addition, it also involves the impact caused on the customers as a result of migrating from one system to another. This entails checking if it would affect the flight bookings and time of taking flights to various destinations. Question 3 According to Laudon (2011), West Jet management failed to acknowledge that the inherent systems’ migration would last longer. In addition, it failed to acknowledge the impact it would have on the customers. Actually, management failed to mobilize the organization in detecting delays experienced during the migration to new reservation system. Despite presence of preventive measures, the organization failed to do all the prudent procedures in ensuring that customers were attended. The technology adopted by west Jet failed to meet the company’s threshold standards in safeguarding customer’s flights on time; hence leading to major delays. On the other hand, JetBlue experienced fewer delays because they had anticipated inherent risks; hence taking adequate measures to curb the risks. However, the company experienced few glitches such as calls wait time increasing and some airport kiosks being unavailable online right away due to failure on the part of management to carry out thorough research on the possible risks associated with migration to new reservation. Question 4 I would carry out a thorough research on all possible risks that may arise. Consequently, I will find a solution to each problem so as to avoid any mishap that may occur during implementation of the project. According to Laudon (2011), this would reduce chances of any delays occurring. In addition, I would consult with vendors of the projects on the implementation plan. This will facilitate efforts meant to factor in time and phases of implementing the projects; hence ensuring that normal operations are less affected by the migration. Reference List Laudon, L. (2011). Management Information Systems: Managing the Digital Firm. New York: Pearson Publishing. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Challenges and security issues Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Challenges and security issues Research Paper Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/management/1470339-challenges-and-security-issues
(Challenges and Security Issues Research Paper Example | Topics and Well Written Essays - 1000 Words)
Challenges and Security Issues Research Paper Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/management/1470339-challenges-and-security-issues.
“Challenges and Security Issues Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/management/1470339-challenges-and-security-issues.
  • Cited: 0 times

CHECK THESE SAMPLES OF Challenges and Security Issues

Security in the Cloud

However, despite the many benefits that come with cloud computing, there is a thorny issue of privacy and security.... This literature review "security in the Cloud" presents security in the cloud; it will focus on the issue of security as regards the concept of cloud computing.... It is evidently clear that the security risk of cloud computing is real and needs to be addressed in order to protect customers' data....
9 Pages (2250 words) Literature review

The Organization for Security and Cooperation in Europe

The author of the following paper claims that the Organization for Security and Cooperation in Europe was created to serve as the multilateral forum for dialogue and negotiation between East and West with key commitments on Polito-military, economic and environmental and human rights issues.... hellip; These issues were reached in agreement on the Helsinki Final Act signed on 1st August 1975.... The organization forms the largest regional security organization in the world with 56 participating states....
12 Pages (3000 words) Case Study

The Gulf Cooperation Council: the Cooperation Council

As a result, the security of the region has not been established to a Instead, more conflicts have been observed with a strong reliance on US troops on managing security issues and in ensuring stability to the region.... So far, the GCC has not been successful in meeting these objectives and… issues with Iraq instability and Iran's political hegemony are some of the issues being faced by the GCC.... Still, conflicts between and among the countries are difficult to resolve because of underlying economic and political issues which to date are not sufficiently being managed by the individual members and by the GCC as a whole....
61 Pages (15250 words) Essay

Cloud-Based Computing Security

That is to say, a complete solution to data security issues should meet three basic requirements: confidentiality, integrity, and availability.... Moving the enterprises' data and applications away from their servers and facilities is an effective way to improve reliability and security.... This essay summarizes the most important data security requirements (confidentiality, integrity and availability), discusses the security challenges that currently face the enterprise when storing data in its own local servers or deploying it to the cloud and introduces available solutions for these issues....
7 Pages (1750 words) Essay

Best Practice for Software Developers in Mobile Application Development - Security and Challenges

This research "Best Practice for Software Developers in Mobile Application Development - security and Challenges" focuses on the mobile application development cycle, challenges faced in implementation, security challenges, analysis, and maintainability aspects.... The security aspects of the applications....
11 Pages (2750 words) Case Study

Information Security Challenges and Technologies

This coursework "Information Security Challenges and Technologies" describes some of the major information security issues.... t the present, there have emerged a wide variety of security issues that make information security a real challenge.... In this scenario, these issues create the need for organizations to manage information security in a proper and effective manner.... In this scenario, one of the most important issues of information hacking....
6 Pages (1500 words) Coursework

Threats to Global Security

This paper ''Threats to Global security'' tells that while the Millennium Development Goals (MDGs) were supposed to be achieved by 2015, most countries are still grappling with insecurity.... Civil and military violence have also been reported in countries such as the Central African Republic, a situation that further threatens food security and eradication of poverty.... Civil and military violence have also been reported in countries such as the Central African Republic, a situation that further threatens food security and eradication of poverty....
17 Pages (4250 words) Essay

Global Food Security

This paper ''Global Food security'' tells that Currently, the world is evident to be facing potential challenges in the sector of food, and this is attributed to different factors such as increased population, poor climatic changes, and reduced resources in most parts of the world.... hellip; The food security problem is a challenge that is facing every country including the developed countries because sometimes they have to import some of the foods that people consume from producing countries such as those whose economy is built up by agriculture....
9 Pages (2250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us