Wednesday, December 18, 2019

Marketing Plan For Apple s Marketing Strategy - 920 Words

In January 2007, Apple entered the smartphone industry with a firm stride. Apple s iPhone be-came a pioneer in the Internet-enabled multimedia cellular phone commerce. Its revolutionary fea-tures combined everything consumer could possibly wish for: a GSM standard phone, an iPod and an Internet browser. In less than three month after launching, Apple sold over 1 million of iPhones. However, its success started to fade as an array of complaints and restrictions struck the company with an unexpected blow. Apple had to face dissatisfied customers and international law authori-ties. The issue laid in the core of its marketing plan. The company was mainly oriented on innovative technology, forgetting who this technology was actually serving.†¦show more content†¦Thus, SWOT analysis is central to this task. Apple iPhone has lots of strengths, such as brand equity, consumer loyalty, high technologies with unique features, and ease of use, developer support and consistency. Beyond that, having Ste-ve Jobs, as a CEO of the company, the guy who could literally pull rabbits out of his hat (Roger Kay), added a tag of innovation onto the aforementioned list. However, weakness play a much more important role. They are: high price, limited production line, its own closed operating system, which is not compatible with any third party applications or services, and expensive RD. As a result, product is perceived by consumers as a luxury device. As far as opportunities go, Apple has great perspectives in continuing technological advance-ments and geographical expansions, as well as enlargements of potential markets. Yet, threats com-ing along with even more extensive force, involving diverse competitors, heavy dependence on sub-sidies from phone carriers, the U.S. International and European laws protecting consumers. Besides, economic situation of the market itself, as well as company s suppliers, could play extremely im-portant role, since it could directly affect consumer purchasing power, and may also create supply

Monday, December 9, 2019

E-Commerce & Marketing Online Security Programming

Question: Discuss the security problems, E-commerce protection and security strategies? Answer: Executive Summery Online security programming is an expansive term that alludes to the different steps people and organizations take to ensure PC frameworks or PC systems that are connected with the web. One of the essential truths behind the Internet assurance programming is that the web is not an ensured domain. The web was at first considered as an open, for the most part connected PC framework that would encourage the free return of thoughts and points of interest. Data sent over the Internetfrom individual email messages to online shopping requests go through a continually changing arrangement of PC frameworks and framework hyperlinks. Therefore, deceitful online programmers and trick craftsmen have adequate chances to distinguish and change the points of interest. It would be basically difficult to secure each PC connected with the web as far and wide as possible, so there will probably dependably be feeble hyperlinks in the chain of subtle information return. Introduction Because of the development in web utilize, the number PC assurance breaks experienced by organizations have expanded quickly as of late. At one time, 80% of security breaks originated from inside the association (Nahari, and Krutz, 2011). At the same time this circumstance has changed as organizations have associated with the web, making their PC arranges more helpless to access from outside troublemakers or industry specialists. At the point when business visionaries do get to be mindful of issues, besides, (Emery, 1995) assessed that just 15% report the security infringement to controllers. Small entrepreneurs need to perceive the different dangers included in performing over the web and build security approaches and strategies to decrease their dangers. Online security programming measures range from programming and equipment assurance against online programmers and infections, to preparing and points of interest projects for specialists and framework chiefs. It might be unimaginable or if nothing else unrealistic for the small enterprise to attain to 100% protected PCs. Yet small enterprise proprietors can discover approaches to adjust the dangers of performing over the web with the profits of fast subtle elements exchange between the association and its specialists, clients, and providers (Hassler, and Moore, 2001). Security Problems A remarkable reason PC issues are virus, or unsafe projects that are given to PCs or procedures. Few viruses alter improvement to make programs ineffectual, while others fight or uproot information. Numerous viruses spread rapidly and work a tad bit, so they may not be perceived until the harm has as of now been carried out (Smith, 2004). Programmers have two principle systems for bringing about issues for organizations' PC frameworks: they either figure out how to get into the project and afterward change or get points of interest from within, or they make an endeavour to over-whelm the system with subtle information from the outside so it decays. Restricted a programmer may get into a small organization's PC system is through a start port, or the web gets to that remaining part start actually when it is not being utilized. They may additionally make an endeavour to proper assurance secure passwords that are a piece of representatives or other acknowledged customers of a PC. Numerous online programmers are educated at intuition regular assurance security passwords, while others run programs that recognize or catch security secret key subtle information (Oosthuizen, 1998). Another basic technique of attack utilized by online programmers is email satirizing. This technique contains giving acknowledged customers of a PC program counterfeit email that is by all accounts as though it were sent by another person, undoubtedly a customer or other person the customer would know. At that point the programmer tries to technique the customer into disclosing his or her security secret key or other organization methods. At long last, some online programmers handle to close down organization PCs with the dismissal of administration attacks. These attacks incorporate harming an organization's site with a substantial number of points of interest so that no valid subtle information can get in or out (Hanumesh, and Sunder, 2000). E-commerce Protection Notwithstanding shielding their own particular PCs from assurance dangers, associations that work over the web should likewise fare thee well to secure their online customers. People and associations that shop online are getting to be progressively worried about the security of the web pages they visit. A customer encounters issues utilizing the small association's site, they are unrealistic to trust you with their association once more. They may utilize the mass correspondence imminent on the web to advise other planned customers of the perils. Moreover, contenders may exploit the circumstance to take the customers by publicizing a secured web server. Tragically, associations occupied with e-trade are most defenceless against web security application dangers. As (Emery, 1995) clarified, the same projects that encourage electronic shopping likewise make an imminent opening in the PC security. As you gather bank card numbers and other customer subtle elements from fill-in-the-clear structures, or gift forthcoming customers access to the databases loaded with item points of interest, you might likewise abandon itself open to assaults by programmers or focused spies (Aldhouse, 1999). (Emery, 1995) makes a progression of suggestions for associations that work over the web. First and foremost, he focuses on that all web applications ought to be kept the extent that this would be possible from the standard system application. For instance, the small association may utilize a standalone PC to run its Web server or spot a firewall between the Web server and whatever remains of the PC system. It might likewise be conceivable to run a small e-trade operation on an "Internet Service Provider (ISP)'s" PC instead of an association machine. (Emery, 1995) additionally underlines that associations ought to never store customer data, particularly bank card numberson its Web server or some other PC associated with the web. It is additionally a savvy choice to abstain from putting any touchy or restrictive organization company on these machines (Yang, 2011). For associations, which will most likely be unable to utilize PC specialists why should qualified build and see the web assurance application frameworks, (Emery, 1995) prescribes leaving e-business security to an ISP. Numerous ISPs permit associations to buy a Web space on a secured server at a sensible cost. Regardless, small enterprise proprietors ought to measure the expenses of executing a secured Web serverand enlisting the employee to consistently watch and keep up itagainst the forthcoming benefits they may get online purchases. Security Strategies In place for hardware and software safety oriented highlights to be compelling, small organizations must consolidate PC security into their essential capacities. (Korper, and Ellis, 2001) prescribe that small association proprietors secure an arrangement of rules and systems for Internet assurance programming. These rules ought to incorporate PC movement at both the client stage and the system supervisor stage. At the client level, one of the first undertakings is to instruct clients about the significance PC security. Each client ought to oblige a security watchword to get to the association's PC. Security passwords ought to be no less than eight figures in length and incorporate letters, numbers, and signs. Specialists ought to be encouraged to keep away from clear decisions like names or dates of birth. Moreover, representatives ought to be coordinated, never to store their security secret key in a bureau or on a message load up, never to let any other individual log into the system utilizing their name and security watchword, and never to leave their PC on. Generally speaking, small association proprietors need to convince representatives that the data on the association's PC is private, and that they have an obligation to help ensure it (Kosiur, 1997). PC chiefs ought to be included in creating and applying security strategies and methods. They are responsible for guaranteeing that the body application and equipment are secure, and also overseeing and following openness the system. (Korper, and Ellis, 2001) notice various steps executives can take to help secure an association's PC. To start with, they suggest keeping web servers in a shut room with constrained availability. Second, they propose part program information documents from data on the PC framework. Third, they encourage executives to set up infection checking application on all association PCs and keep labourers from copying outside projects or information documents onto the framework. Huge numbers of the system director's obligations include anticipating unlawful individuals both inside and outside the organization from getting to the PC framework. Inside, it is a decent arrangement to cut-off staff's availability the project based upon their employment needs. Case in point, it would presumably not be vital for individual in accounting to have openness faculty records. The supervisor ought to focus client and gathering access rights to permit specialists to carry out their employments without likewise making the system unnecessarily defenceless to assaults from disappointed labourers. Another sound arrangement is to oblige specialists to change security passwords much of the time, and to promptly kill security passwords when labourers leave the association or are finished. Directors ought to likewise allow online association just to those specialists who need it for business purposes. It is conceivable to square staff's availability recreations, newsgroups, and gr own-up destinations on the web, and to set up an application that delivers reports of the online destinations frequented by labourers (Khosrow-Pour, 2004). To stay away from unlawful outside availability the PC, chiefs ought to focus, openness rights gave to suppliers and clients. They ought to likewise verify web spaces are secure, and potentially actualize a firewall system to shield the inner project from outside openness. Another vital strategy is never to store worker passwords on any PC that is associated with the web. Directors ought to likewise be watchful about creating visitor accounts on the association's PC, since some such requests may originate from online programmers or aggressive operators. There are various devices accessible to help program executives in following the security of an association's PC program. For instance, project review programming ways clients who are acquiring the system and what records are being changed. It likewise flags the administrator to intemperate fizzled log-in endeavours. The best review bundles create program use covers request, which permits the administrator to remake occasions in the event of a security infringement (Gengler, 1999). Conclusion Albeit managing the particulars of online security programming may appear to be threatening, there are various assets small organization proprietors can turn to for help. Case in point, numerous organizations has started to offer bundled web security innovations, for example, the equipment based "Web Safe" framework. Likewise, secure Web servers and web program are broadly accessible. These frameworks, which incorporate "Netscape GPS" and "Netscape Server", uproot a great part of the web security software weight from organizations. Furthermore, a few Web destinations give free virus cautions and down-loadable against antivirus or firewall for web programming. References 1. Aldhouse, F. (1999). Data protection and electronic commerce. Information Security Technical Report, 4, pp.25-26. 2. Emery, V. (1995). How to grow your business on the Internet. Scottsdale, Ariz.: Coriolis Group Books. 3. Gengler, B. (1999). E-commerce security study. Network Security, 1999(9), p.7. 4. Hanumesh, V. and Sunder, K. (2000). A Study of Security Issues in E-Commerce Applications. IETE Technical Review, 17(4), pp.209-214. 5. Hassler, V. and Moore, P. (2001). Security fundamentals for e-commerce. Boston, MA: Artech House. 6. Khosrow-Pour, M. (2004). E-commerce security. Hershey, PA: CyberTech Pub. 7. Korper, S. and Ellis, J. (2001). The e-commerce book. San Diego, CA: Academic Press. 8. Kosiur, D. (1997). Understanding electronic commerce. Redmond, Wash.: Microsoft Press. 9. Nahari, H. and Krutz, R. (2011). Web commerce security. Indianapolis: Wiley Pub. 10. Oosthuizen, G. (1998). Security issues related to E-commerce. Network Security, 1998(5), pp.10-11. 11. Smith, G. (2004). Control and security of E-commerce. Hoboken, N.J.: Wiley. 12. Trepper, C. (2000). E-commerce strategies. Redmond, Wash.: Microsoft Press. 13. Yang, C. (2011). Analysis on Protection of E-commerce Consumer Network Privacy. Procedia Engineering, 15, pp.5519-55

Monday, December 2, 2019

Risk And Crisis Management Issues an Example of the Topic Government and Law Essays by

Risk And Crisis Management Issues Crisis is an expected part of business these days and cannot be detached from usual business activity. Corporate crises primarily are more likely to be impulsive by market, organisational compositions, finances, innovative technology or by natural catastrophes, and may result in widespread losses of not only resources but also human life. Corporate crises inevitably injure both the financial structure and also frequently the reputation of the organizations concerned. Strategic crisis preparation is becoming a more and more important issue as organizations seek to cope successfully with possible crises. Need essay sample on "Risk And Crisis Management Issues" topic? We will write a custom essay sample specifically for you Proceed After executives at Soc Gen had unravelled the mystery of Mr Kerviels position and published their findings, the banks reputation for its sophisticated risk management was essentially in tatters along with the its independence (Matlack 2008). The stakeholders who were the most affected as a result of the fraud at Societe Generale included the banke employees and higher management along with the shareholders of the company who had to pick up the pieces. Daniel Bouton, the banks chairman, initially presented the incident merely a short-lived rampage attributed to a rogue trader who had been able to hack into Societe Generales computer systems. The chairman later had to conduct a massive PR exercise just to save his job. The potential impact of crisis upon an organisation's reputation is clear in this case. Crisis is essentially a socially constructed process that is experienced in different ways by different stakeholders (Kellerman 2006). For instance, the banks senior management could have potentially lost there jobs along with other bank employees. The stockholders were also affected but in a slightly different way. Soc Gen had to raise further capital through a rights issue diluting the value of the investment of the original stockholders of the company. It has become amply clear in public perception that Mr Kerviels managers ignored more warning signs that, if properly heeded, would have permitted them to prevent the trader long before he was able to carry out so much damage. When all was said and done, the total loss associated with the scandal was close to pounds 2.5 billion (Evans after and before and therefore the stakeholders were able to identify particular drivers for crisis and their interaction with the organisational culture. Organisational level factors, such as culture, configuration, systems and stakeholders are important elements to consider in analysing SocGens vulnerability to crisis. As in many cases, in the immediate aftermath of a crisis, there are a lot of reports of individuals mistakes as well as actions which may have led directly to the crisis. It also takes the form of scapegoating. The role of the individual, Mr Kerviels is only part of the game and draws upon the notion of human error by Reason (1990). Reason has argued that in many occasions we are unable to understand, prevent and also mitigate the impact of an individuals action until we have a concise understanding of the fact that action, or mistake, is a symptom of wider organisational failures. In this case the systematic failure (where can this be identified from the case and what kind of system can this be referred to, i.e a loosely or tightly coupled system?) of internal controls SocGen played a huge role in the whole episode th at eventually led to the losses (McEachern 2008). In later interviews with bank executives, board members as well as investigators along with rival bankers and Mr Kerviels own testimony to the French prosecutors that have revealed a overconfident, hard-driving culture that had become part of SocGen which allowed even a middle ranking trader to repeatedly make huge bets with the banks money without getting detected. The fact that Mr Kerviel had knowledge about the computer and internal controls systems at Soc Gen as a result of his last position before becoming a trader allowed him to abuse the system. Risk managers were only part to be blamed for the Soc Gen scandal. Jerome Kerviel, was working as a trader on the junior desk at headquarters in Paris, knew very well how to dodge the risk management system in place since he had already worked in the back and also middle office between the years 2000 and 2005 before he became a trader, making it almost impossible to detect the fraud. As he knew the system well, he knew how he could avoid his transactions being detected. No risk management system is totally reliable and there are always backdoor grey areas in which transactions can be undertaken without triggering monitoring activities (Mulcahy & McGinn 2008). One of the keys to this problem is to have an outside system for monitoring activities. The risk management system was made by programmers at Soc Gen and therefore there was more information and in turn vulnerability for an abuse of the system. As with a lot of other financial frauds over the last decade or so, the crisis was systemic failure, an due to multiple failures inside and outside the organisation. The basic principles of risk management had not been respected in the Soc Gen scandal. It was a procedural breakdown on the whole. In a report on the trading losses, French regulators have revealed that previous inspections by the banking commission operating under Bank of France had discovered weaknesses in Societe Generales control system back 2006 which had led to a serried of recommendations for strengthening the security of operations. Certain mechanisms of the internal controls failed to function at Societe Generale, and the ones which functioned were not properly taken up by appropriate modifications. French economy minister Christine Lagarde in her report to the Prime Minister on the fraud case said that the banks management needs to be fully implicated in risk control, most apparent by creating committees as par t of governance structures which are dedicated to risk supervision as well as internal controls. As is often the case with such fraud scandals, Kerviel had built up too much control illustrating a lack of supervisory procedures as well as lax monitoring from the systems standpoint. All this points to a systematic failure at the bank and the way it ran its internal control systems. Risk management is the process of managing uncertainty that arises in the normal course of activities, including those related to business ventures. Business risks can assume many forms. In the case of Soc Gen a failure to properly assess individual risk factors and do something about them was the key to the whole issue. Various other types of risks impacted Soc Gen as a result including strategic risk, business risk, and reputational risk, among many others like non-financial operating risks (theoretical discussion, highly unnecessary). It is believed by some that the banks management concentrated too much on the credit risk, or the risk that a counterparty will fail to perform as expected on a contractual obligation, leading to a loss; market risk, or the risk that movements in an underlying asset or index will create a loss; and liquidity risk, or the risk that assets cannot be liquidated or funding sources cannot be accessed without creating a loss as a result of the Sub-prime ex posure in America along with the financial crisis in that time period. They failed to properly asses the operational risk which is also an important area of risk management. The same goes for the risk of loss due to flaws or failures in control processes. All risks therefore has to be included in official trading systems, without exception; failure to do so leaves a firm subject to operational risks and possible fraud. A risk process cannot function properly without clear governance. The lack of separation between front- and back-office activities and the failure of market/credit risk controls are just two of the many by-products of an ill-defined governance process. Previous failures like that at Barings had already called for independence between front- and back-office activities, a practice that most firms have but Soc Gen failed to do this on the human resource side of the equation. Crisis preparation has been at the hub of quite a few studies of crisis management, the most significant of which was done by Pearson and Mitroff (1993) in which five stages of crisis management were summarized: signal detection, preparation/prevention, containment/damage limitation, recovery, and learning. The first and second stages Signal Detection and Preparation/Prevention make up the practical types of crisis management. If carried out effectively successfully, then, these activities can prevent many potential crises from taking place in the first place. The third and fourth stages Containment/Damage limitation and Recovery make up the reactive activities carried out after a crisis has occurred and they are called Crash Management. The fifth stage The learning phase concerns the interactive phase of crisis management. This phase can be brought about by as a part of a crisis management planning in the absence of an actual crisis or as an effect of the experience of the crisis. ( Theoretical discussion) The relationship between organisational learning and crisis is also clear in the Soc Gen trading scandal. According to the Audit Committees report, all of the futures positions held have been checked against the counterparty (clearer) and specific control procedures have been implemented subsequently so that the loop holes that became apparent by the activities of trader to avoid controls can no longer repeat themselves. Beyond this, further controls are also planned and the bank has promised that substantial human resources would be mobilized for this along with the support of outside fraud specialists. List of References Reason, J. (1990), Human Error, Cambridge University Press, Cambridge. Carol Matlack 2008. SocGen's Changing of the Guard. Business Week (Online), April 21, Val Mulcahy, Carol McGinn. 2008. SocGen Falls into a Familiar Hole: Protect Your Shop with Back-to-Basics Controls. The RMA Journal, April 1, 58-63,9. Cristina McEachern 2008. CONFESSIONS of a ROGUE TRADER. Wall Street Graeme Evans, Steve Pain. 2008. Societe Generale takes pounds 2.5bn rogue trader hit ; BANKING :[FIRST Edition]. Birmingham Post, February 22,