Wednesday, October 16, 2019

Ethics in infofmation systems Term Paper Example | Topics and Well Written Essays - 1500 words

Ethics in infofmation systems - Term Paper Example However, in order to prevent customer data, a number of strategies can be defined are demonstrated below: Persistently maintaining data protection controls and procedures aiding in optimum data integrity An incident response plan that can be triggered, whenever a security breach is found within the network or servers maintaining customer data. An intelligent spyware, ad-ware and antivirus installation on workstations, in order to protect threats emerging from a workstation within the network. Moreover, information technology facilitates CRM to maintain data in databases including customer names, contact details, buying history and usability of services. Likewise, the information retrieved from databases connected to CRM provides personalized processes for an organization to target customers. Likewise, the personalized processes provide value for the customers along with increment in customer loyalty for the organization (Payne & Frow, 2006). For instance, notifications of new service s and products are transmitted via emails; short message services (SMS), phone calls, or WAP services. Consequently, customers are updated related to new services and products (Buttle, Ang, & Iriana, 2006). ... In order to evaluate the value for customers, they need to demonstrate at least one of the three factors listed below (Buttle, Ang, & Iriana, 2006): Customers demonstrating significant life time value Customers demonstrating targeting other customers Customers encouraging modification of suppliers In order to disseminate customer information, cookies can be used, as they are isolated with textual information that is redirected from the web server to a web browser. Likewise, the cookies that are transmitted via hypertext transfer protocol (HTTP) are responsible for authenticating, tracking, and managing precise information related to the user. For instance, they can manage precise information related to site preferences and data associated with shopping carts (Cookie.2007, n.d). 2 Legislation and Other Policy 2.1 Associated and Applicable Legislation To sidestep for any legal issues or security breaches, organization needs to define, document and demonstrate compliance with all applic able statutory, regulatory and contractual requirements for each information system. Owners of the systems must take advice from the information security officers for all issues related to Legal and security information. Local regulations must be addressed that are applicable where data is handled, stored or protected. Likewise, legal officer of the organization will examine applicable laws and regulations of policies at different regions. The legal officer will consult chief information security officer for establishing required exceptions to policies and specific policies to different regions. 2.2 Intellectual Property Rights All employees at the organization will conform to the legal

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.