How does that situation change for business communications

Assignment Help Operation Management
Reference no: EM131816291

Securing Collaboration

The collaboration tools described in this chapter do indeed facilitate collaboration: They help groups improve the quality of their work, while reducing travel and other logistical expenses, and they can enable people to participate in meetings asynchronously.

However, they also pose security risks- possibly serious ones. Consider Google Docs. All documents are stored on Google servers, which are located, well, who knows where. Does Google protect those computers appropriately? If those computers are located in, say, San Francisco, will they survive an earthquake?

Google is a responsible, rich, and knowledgeable company that understands the need for disaster preparedness. But, as outsiders, we do not know how they protect their sites. Natural disasters are not the only threat; computer crime, the actions of disgruntled employees, and computer viruses (computer programs that replicate themselves) must be considered as well.

But, chances are-even that phrase is revealing, do you really want to gamble with your data?-Google knows what it is doing, and your data is more than reasonably protected. However, how does the data get to a Google site? As you will learn in Chapter 6, most wireless traffic, including Google Docs, is unprotected from wireless snoopers. Are you processing that data at a local coffee shop?

Do you care that anyone in that shop can copy your data? But, more likely, you pose a greater risk to data security than either Google, Microsoft, or a snooper. To see why, suppose you are the manager of a product line and you observe an odd pattern in sales for your products.

That pattern might be related to differences in advertising among geographic regions, or it might have something to do with changes in consumer purchasing behavior. You decide to have a Webinar with some of your staff, employees of your advertising agency, and a marketing guru who specializes in contemporary consumer behavior. To prepare for the meeting, you access your corporate computer systems and obtain all of the sales for your products over the past 12 months. That data is highly confidential and is protected by your IS department in many ways. You can access it only because you have access authority as an employee.

But, without thinking about security, you post that data in a Windows Live SkyDrive folder and share it with your employees, your advertising agency, and the marketing guru. You have just violated corporate security. That confidential data is now available to the agency and the consultant. Either party can download it, and you have no way of knowing that the download was made or what was done with it. Suppose the marketing guru makes a copy and uses it to improve her knowledge of consumer behavior. Unknown to you, she also consults for your chief rival. She has used your data to improve her knowledge and is now using that knowledge to benefit your competitor.

(This sets aside the even uglier possibility that she gives or sells your data to that competitor.) SharePoint has extensive security features, and as long as the administrator of your SharePoint site has implemented a proper security plan it should be well protected. But, of course, SharePoint makes it easy to download data, and if you share that data with others via Google Docs or SkyDrive . . . well, you get the picture. Collaboration tools have many benefits, but they do open the door to loss of critical assets. Let the collaborator beware!

Discussion Questions

1. Any email or instant message that you send over a wireless device is open. Anyone with some free software and a bit of knowledge can snoop on your communications. In class, your professor could read all of your email and instant messages, as could anyone else in the class. Does this knowledge change your behavior in class? Why or why not?

2. Unless you are so foolish as to reveal personal data, such as credit card numbers, Social Security number, or a driver's license number in an email or instant message, the loss of privacy to you as an individual is small. Someone might learn that you were gossiping about someone else and it might be embarrassing, but that loss is not critical. How does that situation change for business communications? Describe losses, other than those in this Guide, that could occur when using email or Google Docs or Windows Live SkyDrive.

3. In addition to Google Docs, Google offers Gmail, a free email service with an easy-to-use interface and that famous Google search capability. Using Gmail, searching through past emails is easy, fast, and accurate. In addition, because mail is stored on Google computers, it is easy to access one's email, contacts, and other data from any computer at any location. Many employees prefer using Gmail to their corporate email system. What are the consequences to the organization of some employees doing most of their email via Gmail? What are the risks?

4. Summarize the risks of using SkyDrive in a business setting. How can organizations protect themselves from such risks? Is there any new risk here? After all, organizations have been sharing data in other formats with their business partners for years. Is this much ado about nothing? Why or why not?

5. Do you think the risks of using Google Docs or SkyDrive can be so large that it makes sense for organizations to disallow its use? Why or why not? What are the costs of disallowing such use? How could an organization prevent an employee from uploading data using a corporate computer at work and then accessing that data from browsers on iPads or iPhones?

Reference no: EM131816291

Questions Cloud

Calculate the purchases budget in dollars : Avery's Bicycle Shop, a retail store, has an average gross profit ratio of 28 percent. Calculate the purchases budget, in dollars, for the months of April, May
What is firm-specific risk component for the foreign asset : What is the firm-specific risk component for the foreign asset?
Discuss the u.s. tax rate and country js tax rate : How much of USMNC's worldwide income will be taxed in Country J
Impossible to tell from the wording of the question : Did the surveyors want respondents to be in favor or opposed; or is it impossible to tell from the wording of the question?
How does that situation change for business communications : What are the consequences to the organization of some employees doing most of their email via Gmail? What are the risks?
Prepare the operating activities section of the statement : Prepaid expenses increased $150,000 during the year - Prepare the operating activities section of the statement of cash ?ows for the year ended November
Victim to shoot to protect self or dependents : If no police officer is present is it morally correct for the innocent victim to shoot to protect self or dependents from an attack?
Calculate addition to retained earnings expected : You have been given the following information for Kellygirl’s Athletic Wear Corp. for year 2015. Calculate the addition to retained earnings expected in 2016.
Compute depreciation expense on the building : Compute depreciation expense on the building, machinery, and equipment for 2011. Prepare the journal entries to record (1) depreciation

Reviews

Write a Review

Operation Management Questions & Answers

  Book review - the goal

Operations Management is about a book review. Title of the book is "Goal". This book has been written by Dr. Eliyahu Goldartt. The book has been appreciated by many as one of those books which offers an insight into the operations and strategic capac..

  Operational plan in hospitality enterprise

Operational plan pertaining to a hospitality enterprise is given in detail in the solution. The operational plan is an important plan or preparation which gives guidelines regarding the role and responsibilities of each and every operation at all lev..

  Managing operations and information

Recognise the importance of a strategic approach to the development and deployment of organisational information systems. Demonstrate an understanding of the importance of databases and their integration to the organisation's overall information mana..

  A make-or-buy analysis

An analysis of the holding costs, including the appropriate annual holding cost rate.

  Evolution and contributor of operations management

Briefly explain Evolution and contributor of Operations management.

  Functions and responsibilities of an operations manager

A number of drivers of change have transformed the roles, functions and responsibilities of an operations manager over recent years. These drivers have not only been based on technological innovations but also on the need for organisations to develop..

  Compute the optimal order quantity

Compute the Optimal Order quantity of DVD players. Determine the appropriate reorder point.

  Relationship to operations practice in the organisation

Evaluate problems in operations and identify approaches to overcoming them. Critically evaluate operating plans and identify areas for improvement. Justify, implement and evaluate changes to operations in line with modern approaches.

  A make or buy analysis

Develop a report for Figi Fabricating that will address the question of whether the company should continue to purchase the part from the supplier or begin to produce the part itself.

  Prepare a staffing plan

Prepare a staffing plan showing the change of your unit from medical/surgical staffing to oncology staffing.

  Leadership styles in different organizations

Ccompare the effectiveness of different leadership styles in different organizations

  Risk management tools and models

Be able to understand the concept of risk, roles and responsibilities for risk management and risk management tools and models.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd