Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Internet and Intranet Security Management, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
The definition of social media according to Andreas Kaplan and Michael Haenlein is defined, as ‘A group of Internet-based applications that build on the ideological and technological foundations of Web 2.0 and that allow the creation and exchange of User-generated content.’ (Aggarwal 516). The word social media defines social interaction, between users, through a medium prepared for communication. Likewise, Web sites and mobile technologies are included in the social media that perform an attractive, as well as, effective communications between a group of people and individuals. In the current information age, Internet has become a powerful medium that allows everyone to share pictures, opinions, entertaining stuff etc. A variety of websites for example, Flicker, YouTube; Photo Bucket and many more allows its users to share videos and photos. In addition, Face book, Twitter, Friendster and others are the most popular social networking websites currently that allows its users to share feelings, thoughts, ideas, suggestions, discussions and other related media content among friends and family. Furthermore, Wikipedia and Digg are considered as an online source of information and news.
Social networking websites provides exciting opportunity for individuals to build new relationships and to strengthen previously existing relationships. Likewise, it acts as a platform for communities to make new relationships and share their views. Moreover, school or college students have experienced the real life benefits of social networking, as they have gained confidence to interact with people and to make new friends. In addition, by using various networking websites, youngsters have gained media literacy and become more familiar with the upcoming and growing technologies. The teens that are isolated or under going through any mental illness, can regain their confidence by meeting up with communities on social networking websites that will help them via communication and counseling. Furthermore, individuals can share their views and stories with like-minded people. Another benefit of social networking is that people can share photos, videos, messages and cherish moments with their relatives that are living abroad. The long missed classmates, Lost Childhood friends, former college colleagues and living abroad family relatives can be found and contacted on these social networking websites.
The functional sections based on the applications must be developed while considering the security and safety of that application. Moreover, a security model that is developed on the previously existing application can lead to the failure. Therefore, it is important to understand the basic security measures in order to develop a successful application design. Before developing any of the designs this should made clear that internet is the special medium used for the application development. While deciding on what to secure and when to secure some questions mentioned below must be reviewed initially (Belapurkar et al., 28):
- The system can be used by everyone or it should be user defined?
- What are the procedures regarding the user ids and password restoration?
- Information can be shared by the users within the application or not?
- What are the parts present in the website can be restricted for definite users?
- The files and tools that are present on the desktop van be utilized by the users or not?
- What are the medium used for the availability of website?
- What if the data can be drive through internet?
- What if the information related to the users shared from the internet?
- What are the other security needs that are present in the specific website?
Breaking the problem down
In order to resolve any problem regarding the security issues this has to be made under consideration that the three basic areas are present within the design that can help to resolve any queries. Hardware is the foremost critical part of any design that can affect the security issues present in the other two portions. Next component is the tools and the language that are used while developing any website. In fact, the accurate technology can be utilized by selecting correct language that can help to solve some security issues. Lastly, the third area is the website. In order to develop perfect security functions it is important to consider the critical fractions of the website itself. The user credentials including username and passwords are associated with concerns for storing them on a secure location that must not be known to everyone but can be accessible via the website during execution processes.
In addition, the users are allowed to share information within the website. In fact, users are able to decide whether to share or what kind of information should be shared. There are several parts present in the websites that can be controlled from viewing by users. Furthermore, in some cases users are allowed to access files or tools that are available on the desktops. Many websites that are designed for the intranet can be accessible on the internet as, well. In general, while using any website user’s information that is classified will e sent across the internet but in some cases. However, the security requirements are needed depending upon the nature of the website. Some of the websites that hold clinical data and other important information must follow the rules and regulations made by the government (Janczewski, 24-28).
The above mentioned details may specify some of the security problems related to the websites. At first, the users are informed before using any of the functions present in the websites. For this reason a login screen is developed that request a user to provide a valid user id and password before using any features within the website.
The Technology Choice
A wide range of web or internet based technologies are available now a days in order to use for the website development. In addition, a variety of choice is available within the SAS itself such as, SAS/Intranet®, Design Time Controls, and Integration Technologies in concert with other languages, etc. by choosing any of the technology can indicate the type of website that you are using as, well as the type of security you are expecting. Most common fears faced by the users while using internet based websites is the effects on the hard drive. For this reason, security concerns are weighed because the price is responsible for making the website more trustable and secure.
For addressing individual privacy, data mining technology is not up to the mark. Likewise, it also links data mining to be considered as a social facet. To inspect and study the customer’s buying habits and preferences from the market or predicting valuable patterns that will facilitate in creating futuristic decisions, business transactions are calculated along with the procurement of associated information.
Data integrity plays a crucial role in data mining for providing authentic data that can be trusted. Likewise, the challenge is to consolidate unpredictable data collected from several sources. For instance, a financial institution or a bank utilized various techniques, tools, databases and methods for capturing data, in order to manage credit card accounts of their customers. Although, there are certain variations while gathering or capturing data in different formats, it is because of dissimilar software products. For addressing these issues, software products must be able to cope up with different systems running on different platforms, in order to gather data in a standardized format.
A database where data is maintained in tabular form is called as a relational database. Relational database can be utilized for data mining techniques for addressing specific queries. As the technology associated with client/server architecture is progressing at a rapid pace and storage is managed at a single location that can be a preferred location for data mining. As there are many hardware equipment manufacturers in the market, cost of hardware has relatively minimized because of tough competition, as a result, the structure of data mining queries has also changed for utilizing optimal hardware features. Likewise, data mining queries are more powerful than before and extract optimal value form the data at ultimate speeds. Speed augments the amount of data acquisition during data mining process and at the same time provides valuable information to make informed decisions.
In the process of data mining, the data associated with people has risky ethical significances. Data mining experts need to deploy norms for making the data application resilient. As far as humans are concerned, this method is associated with disparity along with behaviors such as racialism, as they are negative to norms. Perception that is considered as another example is dependent on the applied classification, as it is recognized in splitting a disease that needs urgent attention. However, in case of a financial institution or a bank, loan acquisition is a non-ethical characteristic. Similarly, there are numerous factors that may be relevant to data mining. For instance, a report that was published from a leading consumer illustrated that in France, customer possessing a red car are more likely to be defaulters in returning loans back. As it is a debatable issue on categorizing it as ethical or non-ethical issue, similarly, insurance companies are always selected and discriminating because the differentiation factor includes a young person with an old lady is addressed in associated statistics, as young people have more likely hood of accidents, resulting in high insurance returns for their damaged cars. Other various issues pertain to data mining is techniques, tools, user involvement, performance and various types of data.
I have used Microsoft office 365 suites that is a cloud based application comprising of the same office components as currently available for Microsoft Windows. The primary advantage of this application is the user activity data that is saved in the cloud. An account is required to log on the system and retrieve all the unfinished work. There is one dependability factor i.e. Internet connectivity is required to connect Microsoft Office 365. Moreover, there is a single point of failure, for instance, if Microsoft office 365 is unreachable due to certain issues, one can only wait. Whereas, desktop users can reinstall the application and start working on the same. Furthermore, if the battery of the mobile device drains out, office 365 will not be accessible. In addition, organizations have concerns over security issues associated with data residing at a remote location, as no non-disclosure agreement is available. The non-disclosure agreement can be challenged in the courts in case of a security breach at one of the remote locations.
CRM is considered a core component of an ERP, as it demonstrates customer service improvement by providing tools to gain customer loyalty. Moreover, CRM also provides marketing campaigns for targeting customers to spread product awareness.
Financial Management is also a core component of any ERP solution, as it is the most frequently used component. Likewise, FM incorporates general ledger, accounts receivable, accounts payable, billing and fixed asset management. As the mid-sized companies tends their way to enter in the international market, the package supports for multiple currencies along with regulation requirements for U.S and other countries. Supply chain management is on top of the list apart from other ERP packages, as it enhances the flow of materials via a supply chain. It is possible by managing, planning, scheduling, procuring and fulfillment functions that are utilized for optimum service levels that leverage maximized profitability.
Comparatively, Business Intelligence (BI) is a new package, as it provides new opportunities for organizations to get optimal performance. A BI tool facilitates to share and analyze data extracted from a unified repository. Likewise, the data is utilized to make informed decisions by executives, line managers, human resource professionals and accountants as well. Therefore, everyone in the organization is empowered to make informed decisions, resulting in better alignment of the organization processes with strategic plans. Key Performance Indicators (KPIs) are values in terms of numbers that defines the current efficiency level of a process or a key goal indicator (KGI). One of the core components of a CRM is service management, as it facilitates customer service agents with customized scripts for discussion with customers along with giving them authorization for product returns along with a searching facility in a knowledge base associated with support information. Marketing has been discussed earlier. Therefore, the overall purpose of CRM is to achieve customer loyalty to gain a competitive advantage by responding to customer via better service management, target them with efficient marketing management and building a database of customers to know them better.
References
Aggarwal, Charu C. Social Network Data Analytics . SpringerPrint.
Belapurkar, A., Chakrabarti, A., Ponnapalli, H., Varadarajan, N., Padmanabhuni, S., & Sundarrajan, S.Distributed systems security: Issues, processes and solutions, 28.Wiley.
Janczewski, L.Internet and intranet security management: Risks and solutions, 25-28.Idea Group Publishing.
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee