Free Essay

Assignment 4: Internet Technology, Marketing, and Security

In:

Submitted By jacqolivas
Words 1284
Pages 6
Assignment 4: Internet Technology, Marketing, and Security

Bus 508 – Contemporary Business

Abstract
Modern business depends on complex electronic information systems that require computer and internet capability to keep that information flowing. There is a problem when someone outside of that business relationship between the business and the consumer interferes, or hacks, that information flow. An entire industry has been created to protect that information flow from being “hacked”. In 2011, Sony went through what is known as the largest security breach in history. The breach affected 77 million PlayStation Network users, 24.5 million users of Sony Online Entertainment and many more customers across the nation. All this was caused, according to Sony, by an “outdated database from 2007” (Lina, 2011).

Assignment 4: Internet Technology, Marketing, and Security
In 2011, there were more than 300 corporate security breaches. Sony, Citigroup, and Morgan Stanley Smith Barney are among the major firms that have reported to their customers that they have been hacked (Mintzer, 2011). Hacking is continuously happening to companies all over the world.
Sony Corporation is a leading manufacturer of audio, video, game, communications, key device and information technology products for the consumer and professional markets. With its music, pictures, computer entertainment and on-line businesses, Sony is uniquely positioned to be the leading electronics and entertainment company in the world. Sony Corporation was founded on May 7, 1946. The headquarters is located at 1-7-1 Konan, Minato-ku, Tokyo 108-0075, Japan. Its corporate executive officers include Howard Stringer, Chairman, and Kazuo Hirai, President and CEO. The major products that it sells are televisions, digital imaging, audio and video players, personal computers, semiconductors, electrical components, professional solutions and medical equipment. The major offices and research centers for Sony Corp. are Tokyo, Kanagawa, and Miyagi, Japan. The latest head count was 162,700 people. Finally, the consolidated sales and operating revenue for 2011 was 6,493,200 million yen (Sony, 2011). The corporation also has many other affiliated companies such as Sony Pictures Television, Inc. and Sony Music Entertainment. When Sony was hacked for the second time in 2011, there were many other businesses and individuals who were affected.
The way that Sony dealt with the hacking incident was through the freezing of user accounts. They would forcefully log out the users, then make them log back in, but change their password. This way they would know for sure that the information that the hackers had was no longer accurate. On October 11, 2011, Sony’s online gaming and entertainment networks froze 93,000 accounts due to the networks detection that a third party had just attempted to sign in using stolen IDs and passwords (Olson, 2011). This was not the first time that Sony was hacked. In April of 2011, hackers compromised 100 million accounts and did not notify customers until one week later. The hackers, whom call themselves LulzSec, broke into SonyPictures.com and compromised over 1,000,000 users (Schwartz, 2011). The information that was compromised included personal information, passwords, email, addresses, dates of birth and all other data associated with having a Sony account.
Sony has established the Sony Global Information Security Policy and its related subordinate rules, the Sony Global Information Security Standard, which set forth Sony's commitment to information security and define policies to be followed by all Sony personnel (Sony, 2011). There is an actual organization that is in charge of developing, maintaining and implementing this policy. They are also responsible for information security at Sony Group companies and its global affiliates. This organization also formulated the Global Basic Principles on Personal Information which reinforces internal rules and business processes to ensure the appropriate handling of the personal information of its customers and business partners. Employee awareness of both information security and personal information management is vital. According to the Sony website, Sony Corporation requires training programs for its employees to increase their understanding and improve the overall level of information security and personal information management (Sony, 2011).
One suggestion to Sony is to encrypt the data that they are storing; especially if it is sensitive like credit card information. That should also go for passwords to the different websites and secret security questions. The reason why the passwords should be encrypted as well is because even if the credit card data is secure, once a hacker logs into an account, they could find all the information they need to steal a person’s credit card and identity. Another suggestion would be that Sony should update their security measures more often so that the technology they are using to secure their network does not become outdated.
Keeping up with the times and the latest technology is crucial not only to Sony but also for individuals. All individuals should have at least one way of protecting their identity. It does not matter if it is setting up a trigger at your bank so that they do not allow very big withdrawals of money or make sure that foreign transactions are not authorized on your accounts. Steps must be made proactively by every person to avoid the pain of identity theft.
Most companies work to protect their customers’ identities by hiring high level security companies to set up systems to prevent outside hacking of their systems. However, that might not be enough. RSA Security is one of the most reliable security companies that are used to protect many organizations and individuals’ information. On March 17, 2011, a hacker was able to gain remote access to an employee’s computer from where he stole 40 million employee passwords and other systems (Scott, 2012). I believe that the more technology advances, then security measures also become more complex; however, hackers also grow and come up with more sophisticated ways to beat the system. I believe it will be a never ending process trying to keep up with the ever evolving business world. Even the government is at risk for hacking and breaching of security. LulzSec, the group responsible for the Sony breach, also is a known supporter of WikiLeaks, which is full of classified documents and information.
Technology has become essential to most business transactions in the global market. It makes information, goods and currency more readily available and transferrable. When making business transactions over the internet with the use of a company IP address, a personal computer, or a mobile device, several steps are taken to secure customer and company information. A person’s identity must be identified through the use of passwords, personal questions or account numbers. Once a customer has entered this information on any website or device, that information is out there in the information highway. Though most companies use very experienced and expensive security systems to protect user information, there is still a possibility that the information will be hacked, from an outside source. When an unauthorized agent gains access to a computer or computer system, it can cause irreparable damage to the entire system or network and most importantly, it puts customer’s personal information available to others and at risk for identity theft.

References
Mintzer, Rich. (2011, October 3). More Than 300 Corporate Security Breaches Reported in 2011. http://www.savingsaccounts.com.
Scott, Damien. Bracetti, Alex. (2012, May 9). The 11 Worst Online Security Breaches. http://www.complex.com.
Lina. (2011, May 4). Sony’s Security Breach May Be the Biggest Personal Data Heist in History. http://www.lavasoft.com.
Olson, Parmy. (2011, October 12). Sony Freezes 93,000 Online Accounts After Security Breach. www.Forbes.com.
Sony Corp. Info. Retrieved May 25, 2012 from www.sony.net/SonyInfo.
Schwartz, Mathew J. (2011, June 3). Sony Hacked Again, 1 Million Passwords Exposed. Information Week Security. www.techweb.com.

Similar Documents

Premium Essay

Assignment 4: Internet Technology, Marketing, and Security

...BUS 508 - Contemporary Business Ardell Simmons Dr. Daniel Sersland Assignment 4: Internet Technology, Marketing, and Security December 1, 2013 Internet Technology, Marketing, and Security Introduction Social media is a good way for a business to market their products to current customers and also to gain the business of new customers. More and more consumers are using the internet and social media websites to make purchases. Some businesses don’t even advertise in the newspaper anymore or use circulars. It is cheaper for them to go to the internet and use social media websites and they also reach more people. This is definitely the future for businesses. With the success that Pepsi had, I can see more and more businesses doing this in the near future. Reasons social media marketing has become exceedingly popular among businesses More than 66% of small businesses plan to invest as much or more in digital marketing, such as websites, social media and online advertisements, as they did last year. These results were from the 2013 AT&T Small Business Technology Poll, with 1,000 businesses replying to this poll (Eddy, 2013). As we can see from this poll, there is definitely a strong interest from businesses in using this type of avenue for advertisement purposes. I think businesses see that through these social media websites, they can be successful. When you go to the Facebook website, you see advertisements for different businesses. There is also LinkedIn...

Words: 2980 - Pages: 12

Premium Essay

Apple

...Assignment 4: Internet Technology, Marketing, and Security Internet Technology, Marketing, and Security 1 Abstract In this mini-paper, I will evaluate Apple’s website based on its product information, corporation contact information, customization of products for customers, and customer information at purchase. I will evaluate their marketing strategy and competitive advantage its website provides. I will analyze the corporation’s privacy and security policies, and their response to security breaches. Finally, I will recommend two rational methods to ensure greater security for customers. Internet Technology, Marketing, and Security 2 To understand Apple, we must first know the innovative mind behind the company, and it products. Steve Jobs revitalized the company back in the early 1990’s with such products as iMac using effective branding campaigns, stylish designs which caught the attention of consumers. He introduce the world to products such Macbook Air, iPod, and iPhone. These devices later paved the way for his newest intervention Ipad which is primarily a platform for audio-visual media including books, movies, games and apps. Steve Jobs died on October 5, 2001, but not his dream of building products to capture the imagination of consumers. He once stated “your time is limited, so don’t waste it living someone else’s life. Don’t be trapped by dogma – which...

Words: 1623 - Pages: 7

Premium Essay

My Paper

...MBA & MBA (IB) THIRD SEMESTER -- CHOICE BASED CREDIT SYSTEM (NEW SYLLABUS) COMPULSORY PAPERS Title: Total Quality Management Subject Code: 3001 Contact Hours: 45 hrs Work load: 3 hrs per week Credit Points: 3 Evaluation: Continuous Internal Assessment – 25 marks Semester End Examination -- 50 marks Objectives: This cour se is designed to help students to develop basic appreciation of quality concepts and learn the tools and techniques to achieve quality. It also gives the totally integrated effort for gaining competitive advantage by continuously improving every facet of an organization’s activities. Pedagogy : Lectures, Assignments, case studies, seminar, MODULE 1 Introduction to TQM: Various definitions of quality and TQM, Core concepts of quality, The masters of quality(W Edwards Deming, Joseph M Juran, Philiph B Crosby, Kaoru Ishikawa, Ginichi Taguchi, Shigeo shingo) Evolution of quality, The Total Quality Management Excellence Model, Strategic Quality Management, Lecture, Numerical Exercises on cost of quality, TPM 1. Basterfield H Dale and others, Total Quality Management, Pearson Education/PHI, Inc. 2006. 2. K.Shridhar Bhat Total Quality Management (Himalaya publishing house 2005). 3. Poornima M Charantimath, Total Quality Management, Pearson Education, 2003. MODULE 2 Continuous process improvement: Concepts of Kaizen, Kaizen vs. Innovation, Kaizen Strategy...

Words: 5392 - Pages: 22

Premium Essay

Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations

...Graded Assignments The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course. Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 11/04/2011 | All | New Curriculum | | December 2011 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- Graded Discussion/Assignment Requirements Discussion or Assignment Requirements documents provided below must be printed and distributed to students for guidance on completing the discussions and assignments and submitting them for grading. Instructors must remind students to retain all handouts and assignment documents issued in every unit, as well as student-prepared documentation and graded deliverables. Some or all these documents will be used repeatedly across different units. Unit 1 Assignment 1: Effects of Routing on Current Communication Methods Used by Organizations Learning Objectives and Outcomes * Explore the effects of routing on current communication methods used by organizations. Assignment Requirements The Johnson Company provides networking components and services. It sounds simple, but management knows it takes a lot of planning...

Words: 3601 - Pages: 15

Premium Essay

Richdash

...|ELECTRONIC BUSINESS | | | |STUDY GUIDE FOR | |INYM 225 MEC | |*INYM225MEC* | |FACULTY OF COMMERCE AND ADMINISTRATION | |MAFIKENG CAMPUS | Study guide compiled by: Ms S.T. Nthutang Instructional Design by Mrs Annelize Cronje,Senior Academic Development Advisor, ADC Page layout by Roxanne Bremner, Academic Development Centre Printing arrangements and distribution by Department Logistics (Distribution Centre). Printed by Nashua Digidoc Centre (018) 299 2827 Copyright ( 2014 edition. Date of revision 2016. North-West University, Mafikeng Campus. No part of this book may be reproduced in any form or by any means without written permission from the publisher TABLE OF CONTENTS Module information vii Study guide title: Electronic Business vii Module qualification:...

Words: 8803 - Pages: 36

Free Essay

Industry Analysis: Li-Fi

.................................... 2 Table of Tables ............................................................................................................................. 2 Executive Summary ...................................................................................................................... 3 Introduction................................................................................................................................. 4 Li -Fi Technology Assumption ..................................................................................................... 4 Report Scope ............................................................................................................................ 4 Report Structure ....................................................................................................................... 4 Chapter 1 UK Broadband Industry.................................................................................................. 6 Current Technologies ................................................................................................................ 6 Current Market & Key Competitors ............................................................................................ 7 Future Market .......................................................................................................................... 8 Race Online 2012 .................................................................

Words: 6146 - Pages: 25

Premium Essay

Exampaper

...INTI INTERNATIONAL UNIVERSITY COURSE STRUCTURE Programme: Bachelor of Business (BBUS) 1. 2. 3. 4. Name of Course/Module : E-Commerce Course Code: MGT3227 Rationale for the inclusion of the course/module in the programme : This module is designed to provide an insight into the area of e-commerce. Electronic commerce lies at the forefront of modern marketing and strategic management, altering the competitive landscape for large and small corporations alike. The Internet and new media are reshaping industries, creating new opportunities, and challenging existing commercial models and relationships. Total Face to Face Total Total Student Learning Time (SLT) L T P O A B/O IL L = Lecture T = Tutorial P = Practical(Lab) O= Others A= Assessment B/O=Blended /Online learning IL= Independent learning 5. 6. 7. 8. 9. 42 12 2 10 102 Credit Value: 4 Prerequisite (if any): Nil Learning outcomes: On completion of the course, students will be able to: 1. Discuss on the concepts and importance of the building blocks of e-commerce. 2. Demonstrate an ability to identify and analyse of the e-commerce prospects and their practical business significance 3. Analyse the issues related to the best practice of E Commerce contributing towards the organization, consumer and society. Synopsis: This course is designed to provide students with a basic understanding of the underpinnings of electronic commerce in order to make informed...

Words: 882 - Pages: 4

Premium Essay

Acc 564 Entire Course Accounting Information Systems

...for More Tutorials: (http://homeworkfy.com/ ) ACC 564 Week 2 Assignment 1 – Information Needs for the AIS In 1967, Russell Ackoff presented a classical analysis of misinformation in management (Ackoff’s Management Misinformation Systems, Case 1-1, pg. 21 of the text). Now, you need to fast-forward to the present. After reading the case, craft your own version of misinformation in management by developing five (5) key incorrect assumptions that management makes about its accounting information systems. For this assignment, research the Internet or Strayer databases for information related to improper assumptions concerning accounting information systems. Write a five to seven (5-7) page paper in which you: Based on your research, assess how corporate leaders may make improper assumptions related to accounting information systems and the related information. Indicate the most negative potential impacts on business operations related to these assumptions. Provide support for your rationale. Suggest three to four (3-4) ways in which organizational performance may be improved when information is properly managed within a business system. Provide support for your rationale. Evaluate the level of system security (i.e., high, medium, low) needed to ensure information integrity within automated business systems. Provide support for your evaluation. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality...

Words: 4485 - Pages: 18

Premium Essay

Acc 564 Entire Course Accounting Information Systems

...for More Tutorials: (http://homeworkfy.com/ ) ACC 564 Week 2 Assignment 1 – Information Needs for the AIS In 1967, Russell Ackoff presented a classical analysis of misinformation in management (Ackoff’s Management Misinformation Systems, Case 1-1, pg. 21 of the text). Now, you need to fast-forward to the present. After reading the case, craft your own version of misinformation in management by developing five (5) key incorrect assumptions that management makes about its accounting information systems. For this assignment, research the Internet or Strayer databases for information related to improper assumptions concerning accounting information systems. Write a five to seven (5-7) page paper in which you: Based on your research, assess how corporate leaders may make improper assumptions related to accounting information systems and the related information. Indicate the most negative potential impacts on business operations related to these assumptions. Provide support for your rationale. Suggest three to four (3-4) ways in which organizational performance may be improved when information is properly managed within a business system. Provide support for your rationale. Evaluate the level of system security (i.e., high, medium, low) needed to ensure information integrity within automated business systems. Provide support for your evaluation. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality...

Words: 4485 - Pages: 18

Premium Essay

Management Information System

... Course Code | CSC-490 | Course Title | Management Information Systems | Credit Hours | 03 | Prerequisites by Course(s) and Topics | | Assessment Instruments with Weights (homework, quizzes, midterms, final, programming assignments, lab work, etc.) | Quizzes | 10 % | Assignment | 20 % | Mid-Term Examination | 20 % | Final Examination | 50 % | Total | 100 % | | Instructor e-mail address (if any) | ravianz99@gmail.com | Current Catalog Description | Understanding and knowledge of use of computer-based information systems in all functional areas of business. Computer and information technology, resources, management and end-user decision making, and system development. Study and present a comprehensive case study/Assignment regarding the understanding and knowledge of the of the skills learned in the course. | Textbook (or Laboratory Manual for Laboratory Courses) | Management Information Systems-Managing Digital Firm, by Laudon, Kenneth C., and Laudon, Jane P., 12th Edition, Publisher: Pearson/Prentice Hall, 2012/13. | Reference Material | Management Information Systems. 2nd Edition...

Words: 1199 - Pages: 5

Premium Essay

Syllbas

...Brooklyn College Electronic Commerce (3 Credits) Course Aims/Description: How the Internet can be used to conduct business. Topics covered include: Internet hardware and software, tools and technologies for creating a Web site, characteristics of successful Web sites, new technologies, the future of the Internet, Web communication strategies, security issues, legal and ethical issues, Internet information services, data mining, global E-commerce. Case studies of successful E-commerce businesses will be examined. Required Materials: Text: Electronic Commerce Gary Schneider ISBN: 9780538469241 Course Technologies 9th Edition (Not the most recent edition.) (You can also use the most recent 10th edition – it overlaps 95%.) Grading Policy (Might vary): On Line Exams: 40% Assignments: 24% Final: 36% Table of topics and dates (Note that we will attempt to adhere to the dates in the following table but they are subject to change) |Chapter |Topics |Availability of Slides and Chapter |Availability of chapter Exams | |Readings | |Projects | | | | |(Discussion Board) | | |Chapter 1 ...

Words: 877 - Pages: 4

Premium Essay

Management Information Technology

... Course Code | CSC-490 | Course Title | Management Information Systems | Credit Hours | 03 | Prerequisites by Course(s) and Topics | | Assessment Instruments with Weights (homework, quizzes, midterms, final, programming assignments, lab work, etc.) | Quizzes | 10 % | Assignment | 20 % | Mid-Term Examination | 20 % | Final Examination | 50 % | Total | 100 % | | Instructor e-mail address (if any) | ravianz99@gmail.com | Current Catalog Description | Understanding and knowledge of use of computer-based information systems in all functional areas of business. Computer and information technology, resources, management and end-user decision making, and system development. Study and present a comprehensive case study/Assignment regarding the understanding and knowledge of the of the skills learned in the course. | Textbook (or Laboratory Manual for Laboratory Courses) | Management Information Systems-Managing Digital Firm, by Laudon, Kenneth C., and Laudon, Jane P., 12th Edition, Publisher: Pearson/Prentice Hall, 2012/13. | Reference Material | Management Information Systems. 2nd Edition...

Words: 1199 - Pages: 5

Premium Essay

Ebusiness Assignment

...eBusiness Assignment 1 eBusiness Development and Strategies Name | Maksis Rudovs | Class | BM | Exam No | 6506276P | Teacher | Marie Boner | Contents Methodology 3 Introduction 4 Current Developments in eBusiness 6 eBusiness Strategies 11 Conclusion 14 Recommendations 14 Refrences 14 Bibliography 14 Methodology Brief * Research the development of eBusiness to include emerging eBusiness technologies and applications. * Appraise the main eBusiness strategies and technologies in current use to include business to consumer, business to business and business to government markets. * Utilise a range of current eBusiness terms within the context of providing eBusiness solutions. Objectives * To define the terms eBusiness and eCommerce. * To talk about eBusiness types 1. Bricks and Clicks 2. Pureplay 3. Brick and Mortar * To discuss different eCommerce modules: 1. Business to Consumer 2. Business to Business 3. Business to Government * To investigate current developments of eBusiness including: 1. Web1,2,3 2. Mobile Technology 3. Social Media 4. Big Data, Data Mining, Data Warehousing, Data Analytics Research Design Scope and Limitations Action Plan Introduction This assignment is a report to gather information about eBusiness, eCommerce, current developments in the area and different types of Strategies in use. It is very popular nowadays to use the...

Words: 6150 - Pages: 25

Premium Essay

What Is E-Commerce? the Key Components to Establishing and Providing a Successful E-Commerce Solution Within an E-Business Environment.

...ASSIGNMENT 2 16/04/2012 What is e-commerce? The key components to establishing and providing a successful e-commerce solution within an e-business environment. CONTENTS CHAPTER | PAGE | Introduction & Aims/Objectives of assignment. | 3 | 1. What is e-commerce? | 5 | 2. E-environment | 6 | 3. Establishing an e-business. How to support an e-business? | 9 | 4. E-business systems: infrastructure of hardware and software | 14 | 5. E-Logistics: Supply Chain & Procurement | 17 | 6. E-Security: Protecting and e-business & its infrastructure | 19 | 7. E-Marketing: How to push your e-commerce business using marketing tools online. | 21 | 8. E-CRM: Managing customer relations online | 24 | 9. The future of e-business | 29 | Conclusion | 31 | Bibliography | 34 | Introduction: Through this assignment I will be discussing the use of e-commerce in modern retailing. This essay aims to explore: What e-commerce is, the infrastructure needed to establish an e-business and the wider impact of e-commerce on the traditional business and retail environment. These aims will outline the main effects of e-commerce on a business. These will be achieved through: * Outlining the origins of e-business * Assessing the external impact of e-commerce on the environment & traditional retailing. * Examining the implementation and sustainability of an e-commerce business: Systems, Structures & Costs. * The...

Words: 9784 - Pages: 40

Premium Essay

Technology

...Assignment: Required First Week Assignment After reviewing the modules and Introduction for Management Systems two of the modules stand out and have piqued my interest. Those modules are module 3 EBusiness : Electronic Business Value and module 6 Data: Business Intelligence. Module 3 interests me because it deals with the advantages of web technologies in business and how buyer seller relationships are handled. This relates to my current job role as manager of website operations for an online college. The majority of our marketing budget is geared towards web marketing and learning more about how this integrates in to our business model and gaining potential students. I have equal interest in module 6 due to the information regarding business intelligence, as a manager I rely heavily on data and analytics that help me make decisions regarding our web business. Having access to data and how to better use my data is what I hope to gain from this module. One of my least favorite modules is module 1 Management Information Systems: Business Driven MIS, my low level of interest in this module is due to the fact that I’ve been in business and information technology for many years and I feel I have mastered this section due to my experience. Another module that I have a low level of interest in is module 2 Decisions and Processes: Value Driven Business due to this module dealing with tools that managers use to make decisions. Again with my years of experience and the various...

Words: 497 - Pages: 2