DELIVERABLE 1 (GROUP O)

pptx

School

Seneca College *

*We aren’t endorsed by this school

Course

ADMN4896

Subject

Information Systems

Date

Jun 21, 2024

Type

pptx

Pages

21

Uploaded by CountTurkey2826

Report
ADMN 4896A Cu ren t Top ic s in Adm in is t ra t ion 1 De l ive rab le 1 PROFESSOR V inay Y a r lagadda . Due da te : 15 /05 /2024 G roup O Jaykuma r pa te l (239587920 ) Ha rp re t S ingh S idhu (239577030 ) Ha rp re t Kau r (239612870 ) Gagandep Kau r (239536470 ) Jyo t i Ran i (239698540 ) Uzma Fa t ima (229556150 ) Ha rs im ran S ingh (239615480 )
Problem statement Resolving privacy and security weaknesses, especially in data protection, authentication, and cryptography, is crucial for Zoom Video. In the next six months, prompt actions must be taken to advance protections, rebuild trust, and comply with regulations. Zoom may face a serious threat in the market position as well as future growth if the problems are not fully resolved as they can result in a damage to the brand, lack of users’ trust, and imposition of penalties by the authorities.
Strengths Already having established brand recognition and wide adoption. Agile development for fast bug fixes and updates. The dedicated security team which deals with the weaknesses. Establishing solid revenue grounds to invest in security improvements.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Weakness Previous incidents of security breaches becoming a step behind user trust Vulnerability to exploitation of the third-party components some of them are not under your control. The target audience may feel confused about the privacy and security issues that may occur due to lack of clear instructions. There is no full control over users’ behaviors and security of the devices.
Opportunities Partner up with cybersecurity professionals to carry out a valid plan of actions. Have advanced encryption and authentication methods being in place. Use users feedback for experiencing to define the line of development of security features. The need for expanded partnerships with regulatory authorities to keep compliance should be considered as well.
Threats CONSIDERING THAT CYBERSECURITY THREATS ARE CONTINUALLY EMERGING AND BECOMING MORE COMPLEX. TIGHT REGULATORY CONTROLS AND POSSIBILITY OF FINES FOR NON- COMPLIANCE COMPETITIVE PRESSURE FROM THE RIVAL VIDEO CONFERENCING APPS ON THE MARKET AS WELL. AN UNHELPFUL MEDIA WHICH SENSATIONALIZES WORRIES ABOUT PRIVACY AND TRUST .
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
PESTLE Political Economical Social Technologic al Environment al Legal
POLITICAL Privacy data and encryption standards set by the government. Geopolitical tensions dictating cross-border data transfer regulations.
ECONOMICAL Under such economic downturn, the investment to make security infrastructure is also affected. The demand for the safe communication channels in the market is fueling the innovations.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
SOCIAL Boosting the awareness and involvement of users in data privacy issues Shift to remote work will create more stress on necessity of video conferencing systems.
TECHNOLOGICAL The speed of the cyber threats development and their countermeasures is remarkable. Emergence of new technologies for encryption and authentication.
LEGAL Legislation regulating data protection and privacy rights. The liability implication for data breaches as well as the non- compliance with regulations are also a challenge.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ENVIRONMENTAL Environmental elements have nothing to do with privacy and security issues here.
5C’s Analysis for Zoom Video’s privacy and security Issues: Company Customers Collaborato rs Competitor s Context
Company Analyze the existing the Zoom's internal capabilities in dealing with privacy and security issues such as the infrastructure, policies and expertise in cybersecurity.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Customers They know all the needs and the same expectations of a wide select of Zoom's different users, including businesses, educational institutions, and individual consumers, whose expectations about privacy and cyber security most interests you.
Collaborators Examine the partnership network Zoom has built with third party vendors, security agencies and regulatory bodies to tighten up its privacy and security measures.
Competitors To incorporate the best privacy and security practices, check how other video conferencing platforms are addressing privacy and security concerns and then identify areas where Zoom can distinguish itself or learn from industry best practices.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Context Considering the general background where Zoom operates encompassing also the specific regulatory environments, technology trends, and societal attitudes towards privacy and security in the future, it is possible to define better where the challenges and opportunities lie.
Conclusion To sum up, the privacy and security issues of Zoom Video are solved on the technological, regulatory, and educational levels. Enabling strict encryption methods to be applied, increasing authentication standards and engaging more transparently with customers are the necessary steps to rebuild Zoom’s trust further. Working with professionals dealing with cybersecurity, authorities and fellow peers in the industry will essentially bring us to the path of being able to understand and comply with privacy and security regulations even as cybersecurity threats continue evolving. Finally, by showing a devotion to the protection of user data and privacy, Zoom can protect its market position and thus, its long-term success in the competitive video conferencing market.
References: OTHER . SEC EMBLEM. (2021, MARCH 23). HTTPS://WWW.SEC.GOV /OS/ACCESSING-EDGAR- DATA MORSE, J. (2021A, OCTOBER 29). ZOOM IS A WORK-FROM-HOME PRIVACY DISASTER WAITING TO HAPPEN . MASHABLE. HTTPS://MASHABLE.CO M/ARTICLE/ZOOM-CONF ERENCE-CALL-WORK-FR OM-HOME-PRIVACY-CON CERNS STAFF IN THE OFFICE OF TECHNOLOGY. (2021, OCTOBER 2). FTC REQUIRES ZOOM TO ENHANCE ITS SECURITY PRACTICES AS PART OF SETTLEMENT . FEDERAL TRADE COMMISSION. HTTPS://WWW.FTC.GOV/ NEWS-EVENTS/NEWS/P RESS-RELEASES/2020/1 1/FTC-REQUIRES-ZOOM- ENHANCE-ITS-SECURITY -PRACTICES-PART-SETTL EMENT
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help