ITEC 610-MIDTERM

docx

School

University of Maryland Global Campus (UMGC) *

*We aren’t endorsed by this school

Course

610

Subject

Business

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by toluleye2015

Report
Name: Tolulope Ogunleye Class: ITEC 610 Professor: Lind Mary Date: February 13, 2024 MIDTERM- ITEC 610 Could a business use information technology to increase switching costs and lock in its customers and suppliers?  Use business examples to support your answers. Information technology can be used by organizations to increase switching costs while retaining suppliers and consumers. This tactic is frequently used to establish a competitive edge and strengthen enduring connections. Here are a few ways It can be used in businesses. CRM (Customer Relationship Management) Systems: An explanation CRM system can be used by a company to monitor client preferences and interactions. The organization can customize its goods and services to meet the needs of specific customers by gathering and evaluating customer data. To make it harder for customers to migrate to competitors, Amazon, for instance, leverages its algorithms for recommendation to offer personalized shopping experiences (Rainer & Cegielski, 2019). Interconnected services are another way a business use information technology. Organizations such as Google provide a range of connected services, including Google Calendar, Drive, and Gmail, users get locked in since it would be expensive to transfer providers because they would have to migrate their data and get used to new tools (Laudon & Laudon, 2020). What are several major business benefits and concerns that organizations can realize by connecting all their employees with wireless mobile devices?  Discuss the security issues as well. Wireless mobile devices offer numerous business benefits, including enhanced productivity, improved communication, flexibility, remote work, access to data, improved customer service, cost efficiency, and a competitive advantage. These devices enable employees to access work- related information, emails, and applications from anywhere, reducing downtime and increasing responsiveness to business needs. The initial investment in mobile devices and data plans can outweigh the initial expenses, allowing organizations to respond quickly to market changes and customer demands (Energy, 2023). Wireless mobile devices pose security risks, including data breaches, data privacy concerns, network security vulnerabilities, device management challenges, compatibility issues with existing IT systems, employee training on security protocols, and potential battery life and technical issues. Compliance with data protection regulations, network security, device management, compatibility issues, employee training, and potential technical glitches can all
impact the security and privacy of sensitive company and customer data. Organizations must implement robust security measures to protect against unauthorized access and data interception (Sheldon, 2019). Security is a critical concern when employees use wireless mobile devices, to protect against unauthorized access, strong encryption is essential for data in transit and at rest. Authentication, including strong passwords, biometrics, or two-factor authentication, is also crucial. Mobile Device Management (MDM) solutions can be used to remotely manage and secure devices. App security is essential, and network security is maintained through strong encryption protocols and regular firmware updates. Regular audits are conducted to identify vulnerabilities and ensure compliance with security standards. Employee awareness about security best practices and reporting procedures is also crucial ( SHRM , 2023). CRM raises issues of invasion of privacy since conclusions can be drawn about a customer's behavior from the data commonly collected.  Discuss the potential privacy issues.  How can an organization meet the needs of serving its customers while simultaneously protecting their privacy?  CRM systems are increasingly popular among businesses due to their ability to understand customers and tailor marketing and sales strategies. However, the collection and analysis of personal data raises significant privacy concerns. Sensitive personal information, such as medical history, financial information, and credit score, can be collected without customer consent and used to make decisions about eligibility for credit, insurance, or other services. This practice can lead to discrimination and violations of privacy rights (Baashar, et al, 2020). Data breaches or misuse of personal information by third parties can also occur, as customer data is often stored in databases vulnerable to cyber-attacks or accidental data leaks. Additionally, the creation of detailed customer profiles based on behavior and preferences can be seen as an invasion of privacy. To address these privacy concerns, organizations must be transparent about the data collected and used, inform customers about the types of data collected, how it is processed, and how it is shared with third parties. Additionally, companies can implement security measures to prevent data breaches, such as encryption and access controls. By implementing privacy- enhancing measures, companies can meet customer needs while safeguarding their personal data (Yoo et al., 2016). Assume you are starting a Web-based business.  Are any economic, business, or societal developments occurring that are being overlooked as new Web-based business opportunities, or would you choose a second-mover strategy against an established Web- business?  Discuss the reasons for your choice of a Web-based business. Web-based businesses are experiencing a surge in demand for sustainable and eco-friendly products and services. Consumers are increasingly willing to pay more for sustainable products, and stricter environmental regulations are putting pressure on businesses to comply. The
COVID-19 pandemic has accelerated the adoption of telehealth solutions, creating a need for innovative digital health platforms, remote monitoring tools, and virtual care services. The rise of remote work and virtual collaboration has also created opportunities in the digital workspace sector. Businesses offering productivity tools, project management software, virtual team- building solutions, and remote work infrastructure services are in high demand (McKinsey & Company, 2020). Entering a market as a second mover can provide valuable insights into consumer preferences, market dynamics, and potential gaps. Analyzing the strengths and weaknesses of established players can help identify opportunities for differentiation and innovation. Leveraging existing technologies and infrastructure can reduce time and resources required for market entry, enabling faster scalability and growth. Choosing a Web-based business should align with market trends, consumer demands, and personal expertise and interests. By identifying overlooked opportunities and strategically positioning the business, entrepreneurs can capitalize on emerging trends and achieve sustainable success in the digital economy ( Nielsen, 2015). How can a manager demonstrate that he or she is a responsible end user of information systems?  Give several examples. A manager can demonstrate the following instances as responsible information systems end user by: Following Security Procedures: A manager is responsible for making sure that all security procedures implemented for the company's information systems are followed. This includes changing passwords on a regular basis, keeping confidential information private, and disclosing any suspicious activity or breaches. Data Use Ethics: A manager should use information obtained from the company's information systems in a way that complies with the law and is morally righteous. This entails preserving the privacy of clients and staff as well as refraining from using data for selfish purposes. Deciding Responsibly: A manager ought to base choices on precise information and data obtained from the company's information systems. This entails putting the organization's interests first and making well-informed judgments. Effective Utilization of Resource: A manager must make sure that information systems are used effectively and that neither time nor resources are being wasted. This entails cutting back on wasteful spending and making the best use of technology and software. Ongoing Education: To improve their capacity to employ new technologies and information systems effectively and efficiently, managers should always be learning about them, this includes participating in workshops and training sessions as well as keeping up with new trends.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Reference: Baashar, Y., Alhussian, H., Patel, A., Alkawsi, G., Alzahrani, A. I., Alfarraj, O., & Hayder, G. (2020). Customer relationship management systems (CRMS) in the healthcare environment: A systematic literature review. Computer standards & interfaces, 71, 103442. https://doi.org/10.1016/j.csi.2020.103442 Energy, E. C. (2023, December 1). The Impact of Wireless Technology on Business Productivity. Utilities One. https://utilitiesone.com/the-impact-of-wireless-technology- on-business-productivity Laudon, K. C., & Laudon, J. P. (2020). Management Information Systems: Managing the Digital Firm (16th ed.). Pearson. McKinsey & Company. (2020). Telehealth: A quarter-trillion-dollar post-COVID-19 reality? Retrieved from https://www.mckinsey.com/industries/healthcare-systems-and-services/ our-insights/telehealth-a-quarter-trillion-dollar-post-covid-19-reality Nielsen. (2015). The Sustainability Imperative: New Insights on Consumer Expectations. Retrieved from https://www.nielsen.com/wp-content/uploads/sites/3/2019/04/global- sustainability-report-june-2015.pdf Portable Devices Create Data-Security Challenges. (2023, December 21). SHRM. https://www.shrm.org/topics-tools/news/technology/portable-devices-create-data- security-challenges Rainer, R. K., & Cegielski, C. G. (2019). Introduction to Information Systems: Enabling and Transforming Business (7th ed.). Wiley. Sheldon, R. (2019, September 23). Advantages and disadvantages of mobile devices in business. Mobile Computing. https://www.techtarget.com/searchmobilecomputing/feature/Discover-the-benefits-of- mobile-devices-in-the-enterprise Yoo, J. H., Gretzel, U., & Zach, F. J. (2016). Privacy concerns in personalized and location- based services: An empirical investigation. Computers in Human Behavior.